hickory-dns/CHANGELOG.md

931 lines
32 KiB
Markdown
Raw Normal View History

2019-01-27 21:09:04 +00:00
# Change Log: Trust-DNS
All notable changes to this project will be documented in this file.
This project adheres to [Semantic Versioning](http://semver.org/).
All notes should be prepended with the location of the change, e.g. `(proto)` or `(resolver)`.
2020-02-28 02:17:54 +00:00
## 0.19.4
### Added
- (resolver) option to include intermediate (CNAME) records in results (@balboah) #1028
2020-04-10 21:57:29 +00:00
- (async-std-resolver) added implementation for async-std! woohoo! (@belak) #1067 #1051 #926
2020-02-28 02:17:54 +00:00
### Changed
- (all) updated rustls to 0.17
- (all) updated tokio-rustls to 0.13
2020-02-15 18:45:46 +00:00
## 0.19.3
### Changes
- (all) update all dependencies
- (all) minimize `futures` dependency to `std` features (@antonylsg) #1003
- (all) cleanup clippy warnings for Rust v.1.41 #1008
- (proto) make all fields public on `ResolverOpts` for ease of use (@ackintosh) #1009
2020-01-17 02:12:24 +00:00
## 0.19.2
### Changes
2020-02-15 18:45:46 +00:00
- (resolver) make system config loading optional to support fuchsia (@chunyingw) #996
2020-01-17 02:12:24 +00:00
2020-01-16 15:21:20 +00:00
## 0.19.1
### Changes
2020-02-15 18:45:46 +00:00
- (resolver) dependency on `trust-dns-proto` no is no-default-features (@chunyingw) #993
2020-01-16 15:21:20 +00:00
## 0.19.0
### Changes
- (resolver) AsyncResolver abstract over `RuntimeProvider` (@chunyingw) #975
2020-01-14 16:20:05 +00:00
- (resolver) TokioAsyncResolver implementation now has default methods that have a default Handle::current set `TokioAsyncResolver::tokio`
### Added
- (resolver) testing module for generic tests across generic async runtime impls (@chunyingw) #979
2020-01-14 16:20:05 +00:00
- (proto) support for building into WASM (@moshevds) #987 #990 #991
2020-01-12 03:28:02 +00:00
### Removed
- (all) failure is no longer used for error types, std::Error impls only
2020-01-04 22:09:30 +00:00
## 0.18.1
### Fixes
- (server) Fix issue when MX or other records collect additionals based of `.`, root, targets #980
## 0.18.0
### Changes
- (all) CHANGELOG.md is now merged from the Resolver crate and the top-level. All notes from the Resolver CHANGELOG were merged into this changelog, with the format `## {version} (Resolver)` and the existing notes from the top-level are formatted as `## {version} (Client/Server`. This should make notes on releases easier. Going forward the scope of changes across crates will be captured as `- ({crate}) {note}` where all is used for across the board updates.
- (all) After the 0.18 release, all crates will be versioned uniformally, and released at the same time, this will resolve some issues around consistency with releases. The final Resolver release before this was `0.12`.
- *breaking* Generally, any interface that took a 0.1 Future, now returns or consumes a std::future::Future
- *breaking* (client) rebranded from `trust-dns` to `trust-dns-client`
- *breaking* (named) moved from `trust-dns-server` to `trust-dns`, in bin/**
- *breaking* (all) all internals updated to std::future and async/await (requires `Rust 1.39` minimum)
- *breaking* (client) AsyncClient now returns a connect future which resolves to the client and it's background.
- *breaking* (resolver) AsyncResolver::new changed to AsyncResolver::connect, requires awaiting the returned future
- (client) ClientFuture renamed to AsyncClient
- (resolver) AsyncResolver now requires a ConnectionProvider type parameter, see TokioAsyncResolver as a predefined type without it
- (resolver) Now returns a connect future to connect the start all background tasks
- (proto, resolver) renamed the `tokio-compat` feature to `tokio-runtime`
2019-12-15 01:10:15 +00:00
- (all) added cargo-make Makefile.toml to support all automation in Github workflow
- (proto) renamed `SecureDnsHandle` to `DnssecDnsHandle`
- (client) renamed `SecureSyncClient` to `SyncDnssecClient`
2019-12-22 20:39:15 +00:00
- Abstractions around Tokio for generic Executors #960 (@chunyingw)
- Enable early data on tokio-rustls #911 (@daareiza)
### Fixes
2019-12-15 01:10:15 +00:00
- (proto) Removed deadlock from UDPSocket stream impl
- (named) made tests a little more resilient to port stealing
- (proto) Unknown ResponseCodes will no longer cause a panic
### Removed
- (client) client::BasicClientHandle, ClientFuture no longer requires Background or the separate Handle, this can generally be replaced with just ClientFuture itself in most use cases.
- *breaking* (resolver) Background type removed
- (resolver) removed deprecated AsyncResolver::lookup_service, see AsyncResolver::lookup_srv
- (client) removed all deprecated reexports from trust_dns_proto
- (proto) removed unused xfer::BasicDnsHandle, xfer::MessageStreamHandle
- (resolver) removed all unused custom LookupFuture types SrvLookupFuture, ReverseLookupFuture, Ipv4LookupFuture, Ipv6LookupFuture, MxLookupFuture, TxtLookupFuture, SoaLookupFuture, NsLookupFuture
2019-12-15 01:10:15 +00:00
- (resolver) removed Background, BackgroundLookup, and BackgroundLookupIp
2019-12-22 20:39:15 +00:00
- (resolver|client) DoH no longer sends User-Agent header #962 (@quininer)
2019-12-15 01:10:15 +00:00
### Added
2019-12-22 20:39:15 +00:00
- (proto) proto now has a `testing` feature to allow dependencies that might want access to some of the testing harnesses. #936 (@chunyingw)
## 0.17.0 (Client/Server)
### Added
- (all) Licenses copied into all crates #832 (@divinerapier)
- `UdpSocket` for compatibility with Tokio, when not using non-Tokio executors #824 (@chunyingw)
- `Connect` for Tcp connection compatibility with Tokio, when not using non-Tokio executors #794 (@chunyingw)
### Changes
- *breaking* (client) TcpClientConnect requires generic stream param #794 (@chunyingw)
- *breaking* (client) UdpClientStream requires generic socket param #824 (@chunyingw)
- *breaking* (proto) UdpStream and UdpClientStream requires generic socket #824 (@chunyingw)
- *breaking* (proto) TcpStream and TcpClientStream require generic stream param #794 (@chunyingw)
- Algorithm::from_u8 is now infallible #800 (@zackangelo)
- Algorithm::hash_len now returns Option #800 (@zackangelo)
### Removed
- `byteorder` dep dropped in favor of `std` implementations #844 (@lukaslueg)
## 0.16.1 (Client/Server)
- disables the `socket2/reuseport` feature except when `mdns` is enabled
## 0.16.0 (Client/Server)
### Fixed
- (proto) UDP Sockets not being properly closed in timeout scenarios #635
2019-04-06 17:22:18 +00:00
- (server) CNAME resolutions #720
- (server) NSEC evaluation for NODATA and NXDOMAIN responses #697
- (server) Call add_update_auth_key in named.rs #683 (@Darkspirit)
2019-01-06 08:53:37 +00:00
### Added
- (proto) support for the OPENPGPKEY and SSHFP record types #646 #647
2019-04-06 17:22:18 +00:00
- (server/client) support ECDSA signing with ring #688 (@Darkspirit)
- (server) forwarding support in server with trust-dns-resolver (default feature) #674
- (server) Authority trait for generic Authorities (File, Sqlite, Forwarder) #674
2019-04-06 17:22:18 +00:00
- (server) ANAME resolutions #720
- (server) Additional section processing for ANAME, CNAME, MX, NS, and SRV #720
- (server) Added endpoint name config to DoH and DoT TLS endpoint #714
- (proto) NAPTR record data (no additional record processing support) #731
2019-04-14 05:36:35 +00:00
- (server) Added support for wildcard lookups, i.e. `*.example.com` in zone files
2019-01-06 08:53:37 +00:00
### Changed
- *breaking* (proto) UdpClientStream and UdpClientConnection refactored to associate UDP sockets to single requests #635
- *breaking* (server) configuration for sqlite dynamic update different, see dnssec_with_update.toml for example #622
- *breaking* (util)/dnskey_to_pem has been renamed to bind_dnskey_to_pem for clarity #622
- *breaking* (proto) Record::from_rdata no longer requires RecordType parameter #674
- *breaking* (server) AuthLookup inner types simplified #674
- *breaking* (server) RequestHandler now requires associated type for Future results of lookups #674
- *breaking* (server) ResponseHandler now requires Clone and 'static #674
- *breaking* (server) Catalog::lookup takes ownership of MessageRequest and returns a LookupFuture #674
- *breaking* (server) MessageRequest and Queries no longer carrying lifetime parameters #674
## 0.15.0 (Client/Server)
### Fixed
2019-06-20 15:37:50 +00:00
- Fix two separate integer overflows from subtractions #585 (@oherrala)
2018-11-01 05:29:06 +00:00
- strictly enforce name and label lengths during label parsing #584
- enforce that only prior labels are used in label expansion, decompression #578 (@oherrala)
2019-06-20 15:37:50 +00:00
- CAA now properly performs case-insensitive compares #587 (@oherrala)
2018-10-19 14:58:19 +00:00
- overhauled rdata parsers with Restrict type to reduce potential of overflowing operations #586
2018-09-09 02:15:49 +00:00
### Added
2018-09-23 00:33:42 +00:00
- feature `dns-over-rustls` to `trust-dns-server` (server) and `trust-dns` (client)
2018-11-01 05:29:06 +00:00
- feature `dns-over-https-rustls` *experimental* #557
2018-09-23 00:33:42 +00:00
- new configuration options for tls, see `server/tests/named_test_configs/dns_over_tls_rustls_and_openssl.toml`
- new utility for querying root key-signing-keys, `util/get-root-ksks`
- updated root trust-anchor to include new `20326` RSA root ksk
2018-09-23 00:33:42 +00:00
### Changed
2018-11-01 05:29:06 +00:00
- Make trust_dns_server::server::ResponseHandler Send #593 (sticnarf)
- Wrap types in Restrict and force validation before usage from streams #586
2018-08-06 05:46:45 +00:00
- *breaking* Overhauled all `ClientFuture` implementations to align with new `DnsExchange` and `DnsMultiplexer` components in proto.
- *breaking* `ClientFuture` after construction, now returns a "background" `ClientFuture` and a "foreground" `BasicClientHandle`
- *breaking* `Client` has more type parameters, these match with the same types returned by the `*ClientConnection` constructors
2018-09-10 13:11:37 +00:00
- *breaking* all default features, removed: "dns-over-openssl", "dnssec-openssl". Use --features=dns-over-openssl,dnssec-openssl to enable
- *breaking* `named` configuration now has AXFR disabled by default.
2018-11-01 05:29:06 +00:00
- *breaking* Migrated from error_chain to Failure #474 (@silwol)
2018-09-09 02:15:49 +00:00
- feature `tls` renamed to `dns-over-openssl`
- upgraded `native-tls` and `tokio-tls` to 0.2
2018-10-23 18:25:33 +00:00
- upgraded `rusqlite` to 0.15
## 0.14.0 (Client/Server)
2018-02-06 06:55:31 +00:00
### Changed
- Updated `trust-dns-proto` to `0.3`, which brings in better `Name` and `Label` impls
- rusqlite updated to 0.13 #331 (@oherrala)
- Many serialization improvements #317
2018-05-16 14:15:24 +00:00
- Use tokio-timer (part of tokio upgrade) @justinlatimer #411
- Backtrace now optional @briansmith #416
- Use tokio-tcp (part of tokio upgrade) @Keruspe #426
- Use tokio-udp (part of tokio upgrade) @Keruspe #426
- Upgrade to tokio-executor (tokio upgrade) @Keruspe and @justinlatimer #438
- Send (Sync where applicable) enforced on all DnsHandle::send and other interfaces #460
- ClientHandle api return Send @ariwaranosai #465
2018-02-06 06:55:31 +00:00
### Added
- `Name` and `Label` now support idna, punycode, see `Name::from_str`
- `trust_dns::rr::ZoneUsage` for detecting restrictions on `Name`s and their associated zones
### Fixed
- octal escapes fixed in `Name` parsing #330
- `NULL` record type incorrectly valued at `0` to proper `10` #329 (@jannic)
2018-05-16 14:15:24 +00:00
- BinEncoder panic on record sets of extreme sizes #352
- Panic when oneshot channel receiver goes away #356
- Hung server on UDP due to bad data #407
### Removed
- usage of tokio-core::Core @Keruspe #446
2018-02-06 06:55:31 +00:00
## 0.13.0 (Client/Server)
2017-09-27 05:42:58 +00:00
2017-10-08 19:51:04 +00:00
### Added
2019-01-27 21:09:04 +00:00
- Trust-DNS Proto crate to separate server management from base operations #222
- Trust-DNS Util crate for dnssec management tools (@briansmith)
2017-10-08 19:51:04 +00:00
- Integration tests for Server to validate all supported DNSSec key types
2017-11-30 05:47:59 +00:00
- *breaking* Common features `dnssec-ring`, `dnssec-openssl`, and `dnssec` across all crates (replaces `openssl` and `ring` features)
2019-06-20 15:37:50 +00:00
- Clarified `tls` feature with `tls-openssl`, and `tls` in server (in preparation for `tls-rustls`)
2017-11-30 05:47:59 +00:00
- Support for rfc6844, CAA record type #234
- Support for rfc6698, TLSA record type #285
- Clippy validation in CI #288 (@little-dude)
2017-10-08 19:51:04 +00:00
2017-09-28 06:36:12 +00:00
### Changed
2017-10-01 14:56:25 +00:00
- DNSKEY is now self-signed
2017-10-08 19:51:04 +00:00
- Internal API changes to `client` calling into `proto` for actual implementations
- Large refactoring of internal APIs to more cleanly support \*ring\* and OpenSSL features (@briansmith)
- `ClientHandle::send` moved to `trust_dns_proto::DnsHandle::send` (internal API)
2017-10-13 06:21:02 +00:00
- Many interfaces moved from `client::ClientStreamHandle` to `trust_dns_proto::DnsStreamHandle`
- `Message::sign` has been renamed and change to the more general method `Message::finalize`
2017-10-13 06:21:02 +00:00
- Some `io::Error`s have been converted to `trust_dns_proto::ProtoError`
2017-11-01 12:48:16 +00:00
- `SyncClient` and `SecureSyncClient` are now `Send + Sync` #245
2017-11-30 05:47:59 +00:00
- Unknown RecordTypes and RDatas will no longer error #294
2017-10-08 19:51:04 +00:00
### Fixed
2017-11-01 12:48:16 +00:00
- Server: signing issues when loading from persistence
- Server: When SupportedAlgorithms (rfc6975) not supplied default to returning all signatures #215
2017-11-30 05:47:59 +00:00
- Proto: u16::from(DNSClass) now enforces OPT is greater than/or 512 per spec #303
- Improve usage of Rand for message ids and port assignment #291 & #292
- NxDomain and empty NoData responses to be compliant #286 (lots of help from @Darkspirit)
2017-09-28 06:36:12 +00:00
### Removed
2017-11-01 13:13:36 +00:00
- Removed the `NativeTls` and `OpenSSL` `ClientConnection` variants, use the Rustls impls or the tokio based `TlsClientStream` instead. This was required for `SyncClient` being `Send + Sync`
2017-11-01 12:48:16 +00:00
- Server: no longer auto-generate keys on startup #218
- All deprecated APIs removed from -proto #262
2019-06-20 15:37:50 +00:00
- Server: removed deprecated RSA config loading options, see reference test cargo.tomls #276 (@briansmith)
## 0.12.0 (Resolver)
- Internal updates related to generification of executors
## 0.12.0 (Client/Server)
2017-09-28 06:36:12 +00:00
2017-09-27 05:42:58 +00:00
### Fixed
- Server was not properly signing zone after fresh start
2017-09-03 07:41:56 +00:00
### Added
2017-09-24 05:31:40 +00:00
- RSA and ECDSA validation with *ring* for DNSSec, removes dependency on openssl (@briansmith)
2017-09-03 07:41:56 +00:00
- `lookup` to `ClientHandle`, simpler form with `Query`
- `query` to `Query` for ease of Query creation
2017-09-24 05:31:40 +00:00
### Changed
- Large celanup of signing and verification paths in DNSSec (@briansmith)
- *breaking* changed `TrustAnchor::insert_trust_anchor` to more safely consume `PublicKey` rather than `Vec<u8>`
## 0.11.2 (Client/Server)
2017-08-20 18:53:44 +00:00
(README.md documentation changes for crates.io)
## 0.11.1 (Resolver)
- disables the `socket2/reuseport` feature except when `mdns` is enabled
## 0.11.1 (Client/Server)
### Changed
- Updates to `Name::is_fqdn` for more accuracy (@rushmorem)
### Added
- per project Readme.md for crates.io
## 0.11 (Resolver)
### Fixed
- Ignore UDP responses not from target src address #629 #630 #631 (@aep)
- Improved NSEC validation of responses #697
### Added
- New option to execute queries concurrently, default is 2 #615
- Lookup::record_iter for listing all records returned in request #674
- NAPTR record data (no additional record processing support) #731
### Changed
- Added option to distrust Nameservers on SERVFAIL responses, continue resolution #613
- *breaking* Record::from_rdata no longer requires RecordType parameter #674
- LRU cache is now based on Query rather than just name #674
## 0.11.0 (Client/Server)
### Added
- `Name::FromStr` for simpler parsing, specify trailing `.` for FQDN
- `Name::append_label` for clearer usage while appending labels to a Name
- `Name::append_name` for clearer usage while appending one name to another
- `Name::append_domain` alias for append_name and marking as FQDN
### Changed
2017-07-30 14:00:52 +00:00
- *breaking* all `&mut self` methods on `Name` deprecated as unsafe, Name labels are now immutable.
- *breaking* All `ClientHandle` traits now take `&Handle` instead of `Handle` (@rushmorem)
- *warning* `Name` now tracks if it is a fully qualified domain name, slightly changes name parsing rules, allowing `www.example.com` without the trailing `.`, which means that FQDN names are not enforced.
### Removed
- *deprecated* `Name::with_labels` see `Name::from_labels`
- *deprecated* `Name::append` wasn't clean, see `Name::append_name`
- *deprecated* `Name::add_label` exposed internal data structure, see `Name::append_label`
- *deprecated* `Name::label` unclear usage/name, see `Name::append_label`
2017-07-30 14:00:52 +00:00
- *deprecated* `Name::prepend_label` exposed internal data structure, unclear usage *no replacement*
- *deprecated* `Record::add_name` unclear usage *no replacement*
## 0.10.5 (Client/Server)
2017-07-07 06:49:12 +00:00
### Added
2017-07-07 06:49:12 +00:00
- Library documentation, examples for client query and update
### Changed
2017-07-07 06:49:12 +00:00
- ServerFuture now Accepts generic RequestHandler (@Antti)
## 0.10.4 (Client/Server)
2017-06-23 14:34:50 +00:00
2017-06-28 05:49:55 +00:00
### Added
2017-06-28 05:49:55 +00:00
- Allow more options with Key and KeyUsage
- Initial Resolver implementation
2017-06-23 14:34:50 +00:00
### Fixed
2017-06-28 05:49:55 +00:00
- NSEC coverage bitmap overflow in nightly
- Name::zone_of panic (@SAPikachu)
2017-06-23 14:34:50 +00:00
## 0.10.3 (Client/Server)
2017-05-30 13:08:47 +00:00
### Fixed
2017-06-11 04:44:13 +00:00
- Proper TCP connection timeout
- Fixed signature format of ECDSA (@SAPikachu) #141
2017-05-30 13:08:47 +00:00
## 0.10.2 (Resolver)
### Fixed
- all optional dependencies updated #640
## 0.10.2 (Client/Server)
### Fixed
- Fixed format of ED25519 keys (@briansmith) #129
### Changed
- Revamped signer and keypair to better deal with public key (possible breaking change)
- Upgraded *ring* to 0.9.x series, requires pkcs8 for key storage
- Dropped support for dangerous private key byte access (possible breaking change)
- Upgraded tokio-rustls and rustls dependencies to support *ring* updates
### Added
- PublicKey and Verifier for verifying with zero copy from KEY and DNSKEY (possible breaking change)
- Pkcs8 as a supported KeyFormat for storage (possible breaking change)
## 0.10.1 (Resolver)
### Fixed
- UDP Sockets not being properly closed in timeout scenarios #635
## 0.10.1 (Client/Server)
2017-03-26 01:42:32 +00:00
### Added
- Added `From<IpAddr>` for Name (reverse DNS) #105
- AppVeyor support #103
- rustls client tls support (separate crate)
- full support for KEY RR in client
2017-05-08 06:55:28 +00:00
- compatibility tests with BIND for SIG0 updates
- Added full implementation of KEY type
2017-03-12 06:29:04 +00:00
### Changed
2017-05-08 06:55:28 +00:00
- Updated TLS documentation, added more elsewhere, docs required; fixes #102
2017-03-26 01:42:32 +00:00
- Upgraded tokio-core and moved to tokio-io
- *Important* Some `Server` types have been migrated to [RFC#344](https://github.com/aturon/rfcs/blob/conventions-galore/active/0000-conventions-galore.md#gettersetter-apis) style. `get_field()` -> `field()`; `field()` -> `set_field()`
- Moved native-tls client impl to separate crate
2017-04-22 02:11:51 +00:00
- Defaulted to OpenSSL for tls implementation
2017-03-12 06:29:04 +00:00
2017-05-08 06:55:28 +00:00
### Fixed
2017-05-08 06:55:28 +00:00
- key_tag calculation for DNSKEY and KEY now correct #118 (@jannic)
- SIG0 signing fixed to match RFC and BIND #120 (@jannic)
## 0.10 (Resolver)
### Fixed
- Fix two separate integer overflows from subtractions #585 (@oherrala)
- strictly enforce name and label lengths during label parsing #584
- enforce that only prior labels are used in label expansion, decompression #578 (@oherrala)
- CAA now properly performs case-insensitive compares #587 (@oherrala)
- overhauled rdata parsers with Restrict type to reduce potential of overflowing operations #586
- Propagate TTLs for NXDOMAIN responses #485 (@hawkw)
- LookupIpFuture implementation to be proper in regards to loop control #480 (@hawkw)
- max query depth tracking in Resolver #469
### Changed
- Wrap types in Restrict and force validation before usage from streams #586
- Delays all connections until actual use #566
- Relax parsing rules for CAA issuer keys and values #517
- `ResolverFuture` renamed to `AsyncResolver` #487 (@hawkw)
- *breaking* `AsyncResolver::new` returns a tuple of an `AsyncResolver` and a future that drives DNS lookups in the background #487 (@hawkw)
- *breaking* All `AsyncResolver` lookup methods return `BackgroundLookup<T>` rather than `T` #487 (@hawkw)
- *breaking* Migrated from error_chain to Failure #474 (@silwol)
- improve truncation to always return records #497
### Added
- updated root trust-anchor to include new `20326` RSA root ksk
- DNS over HTTPS support #520
## 0.10.0 (Client/Server)
### Changed
- *Important* Possible breaking API change, the original Client has been renamed.
In an attempt to reduce the overhead of managing the project. The original
Client has now been revamped to essentially be a synchronous Client over the
ClientFuture implementation. The ClientFuture has proven to be a more stable
and reliable implementation. It was attempted to make the move seamless,
but two new types were introduced, `SyncClient` and `SecureSyncClient`, which
are both synchronous implementations of the old Client function interfaces.
Please read those docs on those new types and the Client trait.
2017-02-09 08:35:44 +00:00
- When EDNS option is present, return only the digest understood matching RRSETs
- All code reformatted with rustfmt
- *Important* breaking change, all `Record` and associated types have been migrated to [RFC#344](https://github.com/aturon/rfcs/blob/conventions-galore/active/0000-conventions-galore.md#gettersetter-apis) style. `get_field()` -> `field()`; `field()` -> `set_field()`
### Removed
- *Important* The original Server implementation was removed entirely.
Please use the ServerFuture implementation from now on. Sorry for the inconvenience,
but this is necessary to make sure that the software remains at a high quality
and there is no easy way to migrate the original Server to use ServerFuture.
### Added
2017-02-09 08:35:44 +00:00
- Initial support for ECDSAP256SHA256, ECDSAP384SHA384 and ED25519 (client and server)
- additional config options for keys to named, see `tests/named_test_configs/example.toml`
2017-02-09 08:35:44 +00:00
- Added DNS over TLS support, RFC 7858, #38
- Added native-tls with support for macOS and Linux (DNS over TLS)
- matrixed tests for all features to Travis
## 0.9.3 (Client/Server)
### Changed
- updated to rust-openssl 0.9.x series
- restructured dnssec code to better support alternate key formats
## 0.9.2 (Client/Server)
### Changed
- mio_client is now an optional feature in favor of the futures-rs ClientFuture
## 0.9.1 (Resolver)
### Fixes
- Fixes the MAX TTL being outside the bounds of 32bit systems, reduces max to 1 day #528
## 0.9.1 (Client/Server)
2016-12-19 01:39:09 +00:00
### Changed
2016-12-19 01:39:09 +00:00
- OpenSSL is now an optional feature for the client
## 0.9 (Resolver)
### Added
- DNS-over-TLS configurations (requires one of `dns-over-native-tls` or `dns-over-rustls` features) #396
- Experimental DNS-SD, service discovery (RFC 6763, `mdns` feature required) #363
- Experimental mDNS, multicast DNS, known issues persist (RFC 6762, `mdns` feature required) #337
- Exposed TTLs on `Lookup` objects @hawkw #444
- Added global resolver example #460
### Changed
- Use tokio-timer (part of tokio upgrade) @justinlatimer #411
- Backtrace now optional @briansmith #416
- Upgrade to tokio-tcp (tokio upgrade) @Keruspe #426
- Upgrade to tokio-udp (tokio upgrade) @Keruspe #427
- Upgrade to tokio-executor (tokio upgrade) @Keruspe and @justinlatimer #438
- Always reattempt nameserver reconnections regardless of time #457
- Defaulted type parameter for LookupFuture, removed InnerLookupFuture #459
### Fixed
- BinEncoder panic on record sets of extreme sizes #352
- Panic when oneshot channel receiver goes away #356
- Incorrect IPv6 configuration for Google nameservers #358
- Properly yield on failure to acquire lock #372
- Correct order of search list with ndots variable #410
- Send (Sync where applicable) enforced on all DnsHandle::send and other interfaces #460
- Properly track max query depth as a `task_local` not `thread_local` #460, #469
- IPv4 like name resolution in lookup_ip with search order #467
### Removed
- usage of tokio-core::Core @Keruspe #446
## 0.9.0 (Client/Server)
2016-11-23 20:05:09 +00:00
### Added
2016-11-23 20:05:09 +00:00
- new ServerFuture tokio and futures based server, #61
- UdpStream & TcpSteam to support stream of messages with src address
- TimeoutStream to wrap TcpStreams to help guard against malicious clients
- Added Notify support to ClientFuture
2016-12-17 07:48:58 +00:00
- Added IntoRecordSet and conversion impls for RecordSet and Record
2016-11-23 20:05:09 +00:00
### Changed
- Split Server and Client into separate crates, #43
- Moved many integration tests to `tests` from `src`, #52
2016-11-24 07:11:57 +00:00
- Migrated all handles to new futures::sync::mpsc impls
2016-12-17 07:48:58 +00:00
- Modified all requisite client methods for IntoRecordSet.
- All client methods now support multiple records per query, update, notify and delete
2016-11-23 20:05:09 +00:00
### Fixed
2016-11-23 20:05:09 +00:00
- Flush TcpStream after fully sending Message
- Recognize no bytes read as closed TcpStream
## 0.8.1 (Resolver)
### Changed
- Make read_system_conf() function public #338 (@oherrala)
- Hosts map was not properly reference counted #342
### Fixed
- Panic in edge case of label compression #341 (@SAPikachu)
- Fix `localhost` lookup and no longer panic on no names #343
## 0.8.1 (Client/Server)
2016-11-04 02:30:58 +00:00
### Fixed
2016-11-04 02:30:58 +00:00
- Fix build on rustc 1.11, #66
## 0.8.0 (Resolver)
### Changed
- Updated `trust-dns-proto` to `0.3`, which brings in better `Name` and `Label` impls
- Dropped LALRPOP `resolv.conf` parser in favor of the `resolv-conf` #335 (@cssivision & @little-dude)
- Improved message serialization #311 (@little-dude)
- Many serialization improvements #317
- Dependencies updated #334 (@oherrala)
### Added
- `Name` and `Label` now support idna, punycode, see `Name::from_str`
- Clippy added to build #304! (@neosilky)
- `from_system_conf` on now supported on Windows 32bit targets (previously just 64bit) #313 (@liranringel)
### Fixed
- octal escapes fixed in `Name` parsing #330
- `NULL` record type incorrectly valued at `0` to proper `10` #329 (@jannic)
## 0.8.0 (Client/Server)
2016-10-01 14:08:40 +00:00
### Added
2016-10-21 04:49:00 +00:00
- SecureClientHandle, for future based DNSSec validation.
2016-10-01 14:08:40 +00:00
- ClientFuture, futures based client implementation, #32
2016-06-29 06:36:15 +00:00
### Fixed
2016-06-29 06:36:15 +00:00
- Randomized ports for client connections and message ids, #23
2016-10-21 04:49:00 +00:00
- OpCode::From for u8 removed, added OpCode::from_u8(), #36
- Fix for named startup related to ipv6, #56
2016-06-29 06:36:15 +00:00
### Changed
2016-10-21 04:49:00 +00:00
- Upgraded OpenSSL to 0.8.* #50
- Cleaned up the Server implementation to isolate connection handlers
2016-11-03 05:54:58 +00:00
- Deprecated old Client will possibly remove in the future
2016-10-01 14:08:40 +00:00
## 0.7.3 (Client/Server 2016-08-12)
### Fixed
- Issue #27: label case sensitivity revisited for RRSIG signing, RFC 6840
- TCP reregister on would-block errors
## 0.7.2 (Client/Server 2016-08-10)
### Fixed
- Issue #28: RRSIG validation of wildcards, label length > wildcard length
## 0.7.1 (Client/Server 2016-08-09)
### Fixed
- Issue #27: remove implicit case conversion of labels (fixes NSEC validation)
## 0.7.0 (Resolver)
### Changed
- Resolver no longer depends on Client
- *breaking* Resolver no longer returns io:Errors, use `From<ResolveError>` for `io::Error`
- Resolver is now `Send`
- DNSSec now disabled by default in Resolver, see `dnssec-ring` or `dnssec-openssl` features #268
- CNAME chaining was cleaned up #271 (@briansmith)
- On hostname parsing to IpAddr, return without lookup #302 (@cssivision)
- Change default `LookupIpStrategy` from `Ipv4AndIpv6` to `Ipv4thenIpv6` #301 (@cssivision)
### Added
- ResolveError and associated types
### Fixed
- Cleaned up CNAME chained lookups, better TTL enforcement, etc #298
## 0.7.0 (Client/Server 2016-06-20)
### Added
- Added recovery from journal to named startup
- SQLite journal for dynamic update persistence
2016-06-21 06:28:34 +00:00
- Private Key generation during startup, for dnssec zones
- Read private key from filesystem during start and registers to zone
### Changed
- Removed many of the unwraps in named binary
2016-06-21 06:28:34 +00:00
- Reworked all errors to use error-chain
- Adjusted interface for Signer to use duration
- All `#[cfg(ftest)]` tests now `#[ignore]`
### Fixed
- TXT record case sensitivity
## 0.6.0 (Resolver)
### Changed
- Split UDP and TCP into different NS pools, prefer UDP lookups first
- On truncated UDP responses, promote to TCP for resolution
### Added
- 64bit Windows support for reading DNS configuration! (@liranringel)
- CNAME chain resolution (where CNAME results are not returned in the same query)
- Resolution prefers `/etc/hosts` before querying (@cssivision)
## 0.6.0 (Client/Server 2016-06-01)
### Added
2016-05-15 08:15:34 +00:00
- Documentation on all modules, and many standard RFC types
- Authority zone signing now complete, still need to load/save private keys
2016-05-19 07:00:40 +00:00
- DNSKEYs auto inserted for added private keys
- New mocked network client tests, to verify zone signing
2016-05-23 06:58:29 +00:00
- NSEC record creation for zone, with tests
2016-05-30 08:28:25 +00:00
- SIG0 validation for Authentication on for dynamic updates
- Client CQADDD operations, delete_by_rdata, delete_rrset, delete_all
- Client compare_and_swap operation... atomics are here!
### Fixed
- Added loop on TCP accept requests
- Added loop on UDP reads
2016-05-03 04:54:35 +00:00
- Upgraded to mio 0.5.1 for some bug fixes
2016-05-23 06:58:29 +00:00
- Not returning RRSIGs with SOA records on authoritative answers
### Changed
- Internal representation of record sets now a full data structure
- Better rrset keys for fewer clones
- Removed many excessive clones (should make requests even faster)
- Cleaned up authority upsert and lookup interfaces
- All authorities default to IN DNSCLASS now (none others currently supported)
- Cleaned up the Signer interface to support zone signing
2016-05-11 05:11:45 +00:00
- Simplified RData variant implementations
2016-05-30 08:28:25 +00:00
- Improved ENDS and SIG0 parsing on Message deserialization
## 0.5.3 (Client/Server 2016-04-07)
2016-04-08 06:46:25 +00:00
### Fixed
2016-04-08 06:46:25 +00:00
- [Linux TCP server mio issues](https://github.com/bluejekyll/trust-dns/issues/9)
### Changed
2016-04-08 06:46:25 +00:00
- combined the TCP client and server handlers
- reusing buffer in TCP handler between send and receive (performance)
## 0.5.2 (Client/Server 2016-04-04)
2016-03-31 06:40:05 +00:00
### Changed
- updated mio to 0.5.0
2016-03-31 06:40:05 +00:00
- updated chrono to 0.2.21
- updated docopt to 0.6.78
- updated log to 0.3.5
- updated openssl to 0.7.8
- updated openssl-sys to 0.7.8
- updated rustc-serialize to 0.3.18
- updated toml to 0.1.28
2016-03-31 06:20:11 +00:00
## 0.5.1 (Client/Server 2016-03-30)
### Added
2016-03-23 04:36:17 +00:00
- NSEC3 resolver validation
- data-ecoding as a dependency (base32hex)
- trust-dns banner on boot of server
### Changed
- Changed the bin.rs to named.rs, more accurate, allow for other binaries
2016-03-23 04:36:17 +00:00
## 0.5.0 (Resolver)
### Changed
- *breaking* `LookupIp` now returns an iterator over owned data (IpAddr is Copy + Clone ref not necessary)
- *breaking* `Resolver::lookup` will now return an Err on NxDomain and NoData responses
- rewrote much of the caching and lookup functionality for generic RecordType lookups
- removed &mut from resolver fn interfaces, make it easier to use
### Added
- Generic record type lookup
- reverse_lookup for IP to Name lookups
- ipv4_lookup for looking up *only* ipv4 (lookup_ip has options for dual-stack)
- ipv6_lookup for looking up *only* ipv6 (lookup_ip has options for dual-stack)
- mx_lookup for querying mail exchanges
- srv_lookup for service records and also a specialized form for ease of use lookup_service
- txt_lookup for text record lookups
## 0.5.0 (Client/Server 2016-03-22)
2016-03-23 04:36:17 +00:00
### Added
2016-03-23 04:48:54 +00:00
- Updated rust-openssl to 0.7.8 which include new RSA creation bindings
2016-03-23 04:36:17 +00:00
- NSEC resolver validation
2016-03-15 06:59:49 +00:00
- NSEC3 parsing support
- DNSSec validation of RRSIG and DNSKEY records back to root cert
- Integration with OpenSSL (depends on fork until rust-openssl 0.7.6+ is cut)
2016-03-15 06:59:49 +00:00
- Binary serialization and deserialization of all DNSSec RFC4034 record types
- EDNS support
- Coveralls support added
- Partial implementation of SIG0 support for dynamic update
- SRV record support
### Changed
- Dual licensed with MIT (and Apache 2.0)
- Abstracted Client over TCP and UDP for common implementation of queries
### Fixed
- Binary Serialization and Deserialization of NSEC3
- AXFR SOA ordering
- Travis build failing
### Deprecated
2016-03-15 06:59:49 +00:00
- See updated trust_dns::client::Client API
## 0.4.0 (Resolver)
### Removed
- *breaking* impl `Iterator` removed from `LookupIp` result type, see `LookupIp::iter` for replacement
### Added
- Support for DNSSec validation
- LRU Cache
## 0.4.0 (Client/Server 2015-10-17)
### Added
- Added AXFR support
- Dynamic update support
### Fixed
- Name pointer support
## 0.3.1 (Client/Server 2015-10-04)
### Fixed
- Removed buffer clone during label pointer decoding (speed/memory)
2016-03-15 06:59:49 +00:00
- Removed a lot of unnecessary clones, heavier use of Rc
- Binary server bugs (fully functional)
## 0.3.0 (Resolver)
### Added
- `options attempts:N` aka `ResolverOpts::attempts` support, aka retries
- Google IPv6 nameservers as defaults for `ResolverConfig::default`
- support for domain name search in `ResolverConfig` and `LookupIpFuture`
- support for search names in `ResolverConfig` and `LookupIpFuture`
- `LookupIpFuture` type alias to `LookupIpFuture<NameServerPool>` *compatibility*
### Changed
- *breaking* `LookupIpFuture` renamed to `LookupIpFuture`
- *breaking* `LookupIpFuture` now takes a generic parameter, generally `<NameServerPool>`
## 0.3.0 (Client/Server 2015-09-27)
### Added
- Master zone files support BIND time formats, e.g. #h#d
- Toml config file support (not compatible with BIND)
## 0.2.1 (Client/Server 2015-09-17)
### Added
- Functional tests to verify against other DNS servers
### Changed
- mio replaced std::net operators
## 0.2.0 (Resolver)
### Added
- ipv6 parallel lookup
- multiple ipv4 and ipv6 lookup strategies
- library documentation examples
- test coverage for resolver
## 0.2.0 (Client/Server 2015-09-07)
### Added
- Server support with catalog and tests for example.com
- Parsing example rfc1035 master file
- new lexer for master zone files with simplified FSM
- Travis CI testing support
- Supported Client with operational query
- Writers for Record Data
- All RFC1035 fields parsing!
- label parsing with UTF8 support
- DNS Class and RecordType enums
### Fixed
- Crates.io keywords, etc.
### Changed
- Cleaned up binary encoders and decoders with objects
## 0.1.0 (Resolver 2017-6-27)
### Added
- Initial release of the Trust-DNS Resolver
## 0.1.0 (Client/Server 2015-08-07)
### Added
- Started parsing resource records
- Initial Commit!