Commit Graph

  • 69d32696a1 fix documentation for SSL torrents arvidn 2020-03-11 16:31:49 +0100
  • bc666052c7 fix typo in building documentation arvidn 2020-03-08 23:34:31 +0100
  • 0f337b9ce7 bump version to 1.2.5 arvidn 2020-03-08 01:20:12 +0100
  • eaa18ff7a1 announce port=1 instead of port=0, when there is no listen port arvidn 2020-03-07 16:12:30 +0100
  • 9469913cb2 fix typo in lsd::start arvidn 2020-03-07 12:53:01 +0100
  • 6480b9df8c minor tweak to set_queue_position to ensure trigger_auto_managed() is always called Arvid Norberg 2020-03-05 12:10:41 +0100
  • 9bfb108b4f enable all disabled trackers when listen sockets are re-opened Arvid Norberg 2020-03-05 11:46:04 +0100
  • 5c869f697c add control of queue position in client_test arvidn 2020-03-04 15:07:08 +0100
  • 06ce1b4747 fix issue where want_tick could get out of sync with the lists the torrent belonged to arvidn 2020-03-04 12:51:26 +0100
  • 65d6e83b1a add support for TCP_NOTSENT_LOWAT arvidn 2020-03-03 13:54:45 +0100
  • 83bbefc008 fix correct interface binding of local service discovery multicast Arvid Norberg 2020-03-03 22:07:08 +0100
  • ee38106465 restore in-class flag types, for backwards compatibility with libtorrent-1.1 arvidn 2020-03-03 10:01:50 +0100
  • 14d5c99a18 expanding a device does not look for a default route arvidn 2020-02-28 18:17:21 +0100
  • 1e4083b3fb rely less on the ability to enumerate the routing table reliably. Any IP address explicitly specified is assumed to represent an externally available IP, unless marked with the l-flag. If a device name or an unspecified address is used, they are expanded and only for such expanded entries is there a heuristic to determine which addresses are externally available and which are local. The default is to assume it's local only, unless it has a globally routable IP address or a default route can be found for the device. arvidn 2020-02-18 22:50:19 +0100
  • 47012b506a extend timeout for invalidation-of-torrent_handle test arvidn 2020-03-01 00:01:20 +0100
  • a48adc8730 add link to ABI report to README arvidn 2020-02-29 17:14:39 +0100
  • 9f3192f691 exempt issues belonging to milestones from being marked stale arvidn 2020-02-29 14:23:27 +0100
  • 36f6affa3b add stale config for github arvidn 2020-02-27 21:49:23 +0100
  • 0eee042bf9 Fix some more unlikely integer truncation FranciscoPombal 2020-02-27 12:38:25 +0000
  • a647fd475e fix msvc warning arvidn 2020-02-25 15:57:35 +0100
  • 1dcbeb2e60 remove some seemingly unnecessary TORRENT_TRY and TORRENT_CATCH from is_local(), is_any() and is_teredo(). simplify is_loopback() arvidn 2020-02-26 10:59:57 +0100
  • cc792d8638 improve error messages and error reporting of failing enum_routes() arvidn 2020-02-26 09:04:37 +0100
  • 8dbb7c4232 don't repeat the settings documentation. add note to announce_ip arvidn 2020-02-21 12:19:45 +0100
  • 091dbd6494 Fix possible output truncation in test_dht FranciscoPombal 2020-02-22 00:43:31 +0000
  • 68a57218e7 add note about listening to port 0. Add bittorrent glossary arvidn 2020-02-18 13:06:29 +0100
  • c299004abf undeprecate settings_pack::dht_upload_rate_limit. Make sure it doesn't overflow if set too high arvidn 2020-02-18 14:48:29 +0100
  • 14f1266199 fix strncpy() warnings and ensure C strings are 0-terminated arvidn 2020-02-15 11:08:04 +0100
  • 224cc0ec6d include tiny version in DHT v field arvidn 2020-02-18 13:08:26 +0100
  • dcdadb16ce update python to 3.7 on osx travis arvidn 2020-02-16 10:44:33 +0100
  • ad83b1c0eb fix one more float->int conversion warning arvidn 2020-02-09 00:15:54 +0100
  • 0a4a06ce74 apparently on VPNs it's common for the gateway for a route to be outside of the netmask of the network it's a router for. fix that in get_gateway arvidn 2020-02-08 21:11:39 +0100
  • 6d5bdbdb1a fix recent clang warnings arvidn 2020-02-08 12:14:09 +0100
  • 3092b7ca44 fix binding TCP and UDP sockets to the same port, when specifying port 0 arvidn 2020-02-05 18:01:38 +0100
  • b4cda2989e fix announcing port=0 when configured with no listen interfaces arvidn 2020-02-06 02:05:37 +0100
  • d607328b45 fix announce_to_all_trackers and announce_to_all_tiers behavior arvidn 2020-02-03 12:45:37 +0100
  • 86183358e9 bump version to 1.2.4 arvidn 2020-02-03 14:18:33 +0100
  • 8dffe0def0 remove debug printing arvidn 2020-02-04 22:45:32 +0100
  • 9344dcc9b1 update make_torrent example to support controlling tracker tiers arvidn 2020-02-03 02:34:45 +0100
  • f099f356c6 improve tracker debug logging arvidn 2020-02-02 20:09:27 +0100
  • 6d865f0c60 extend tracker test to test announce_to_all_trackers and announce_to_all_tiers as well arvidn 2020-02-03 01:15:17 +0100
  • bdee0b563c fix suggest_read_cache setting arvidn 2020-01-30 14:24:05 +0100
  • 07191dc5ad when generating documentation, don't only highlight function names but also data members and constants arvidn 2020-02-02 00:56:51 +0100
  • 94d90ce96f back-off tracker hostname looksups resulting in NXDOMAIN arvidn 2020-01-09 16:08:08 +0100
  • 5e4686c30f Add vcpkg installation instructions PhoebeHui 2020-01-22 00:34:04 -0800
  • bf22f56d74 order static and constexpr consistently arvidn 2020-02-01 10:18:48 +0100
  • acbd1c3d4c fix issue where if the last requested blocks are rejected, we may not have been requesting any new blocks arvidn 2020-01-31 08:39:05 +0100
  • bc6444a251 lower TCP keepalive timeout for SOCKS5 UDP tunnel, to detect network failures and retry arvidn 2020-01-29 15:58:31 +0100
  • 6a88ffc585 update BEP links to www.bittorrent.org domain Chocobo1 2020-01-26 12:19:59 +0800
  • 45a4da4fe6 use https Chocobo1 2020-01-26 12:17:21 +0800
  • cc8cbcaf9d fix infinite loop when announcing Steven Siloti 2020-01-24 21:38:30 -0800
  • 4054cbbaee store stop_when_ready flag in fastresume data Vladimir Golovnev (glassez) 2020-01-22 11:45:11 +0300
  • 8013216550 document multi-homed support arvidn 2020-01-18 17:32:51 +0100
  • 208d71ba77 support source-hint from routing table, where supported arvidn 2020-01-19 23:22:39 +0100
  • bc0274ed6a limit the number of DHT nodes to run arvidn 2020-01-21 00:46:09 +0100
  • 2c8cf4834b simplify the local service discovery logic to only deal with a single network. Instantiate LSD once per listen_socket_t instead of just once arvidn 2020-01-15 08:04:51 +0100
  • 819eea722b backport of warning related fixes Alden Torres 2020-01-19 23:09:44 -0500
  • 69fe7a9ad6 debug test_transfer arvidn 2020-01-19 20:48:43 +0100
  • f94c09c95d use our local address correctly for user port-mapping requests arvidn 2020-01-19 20:16:57 +0100
  • 7529d3e67e remove now unused, in_local_network() functions arvidn 2020-01-15 00:03:49 +0100
  • b5ea5bb82c move upnp mapper to have one per listen_socket_t. simplify the upnp logic to only deal with a single network. arvidn 2020-01-15 00:03:31 +0100
  • b8726bd4f6 refactor discover_device() away from upnp arvidn 2020-01-14 23:52:08 +0100
  • a40ae61f15 improve SOCKS5 error alerts by including the interface address in no-route-to-host errors arvidn 2020-01-19 19:39:35 +0100
  • f5ebd4e354 simplify natpmp by requiring it to be tied to a specific network, and use get_gateway() and remove unused get_default_route() functions arvidn 2020-01-18 15:23:29 +0100
  • a53d3a8746 factor out get_gateway function and add unit tests. IPv6 gateways are not addressed in the same network, so we can't use match_addr_mask(). Assume all local IPv6 addresses do not have a gateway arvidn 2020-01-18 11:03:58 +0100
  • 571952fd19 bind SOCKS5 connection to correct outgoing interface arvidn 2020-01-13 19:18:18 +0100
  • 95df88e7a3 make it a build error if we don't know how to enumerate network interfaces or network routes arvidn 2020-01-12 22:36:36 +0100
  • a1d78aa60e only start natpmp on listen sockets that have a router (since NATPMP needs one) arvidn 2020-01-11 20:04:21 +0100
  • 88d9c05e3c expand IPv4 in expand_unspecified_address arvidn 2020-01-09 15:41:47 +0100
  • 0961427b50 expand unspecified to loopback as well arvidn 2020-01-09 00:32:43 +0100
  • 8be7ab559a remove outgoing udp sockets and replace with listen_socket_t arvidn 2020-01-07 17:53:45 +0100
  • 4ceb2ea467 limit tracker announces and SOCKS5 connection attempts to listen_socket_t that actually can reach the target arvidn 2020-01-06 10:11:21 +0100
  • a0b0f2aec5 fix clearing of netmask if it's not known, on windows arvidn 2020-01-17 01:09:23 +0100
  • d13109426a fix test_lsd to pass reliably arvidn 2020-01-18 01:34:01 +0100
  • e4e967335c populate ip_interface.netmask on Windows Steven Siloti 2020-01-15 20:25:47 -0800
  • 82d4d1927d restrict DHT nodes to the network they are associated with (multi-homed) arvidn 2020-01-15 19:47:41 +0100
  • df85b31490 deprecate and remvoe broadcast_lsd setting arvidn 2020-01-15 11:35:32 +0100
  • fa79697f45 deprecate (and remove) upnp_ignore_nonrouters setting arvidn 2020-01-14 23:46:05 +0100
  • bd43c9b83f remove unused overload of set_external_address arvidn 2020-01-15 14:35:39 +0100
  • 659a78eb56 improve test_upnp by responding with a unicast message arvidn 2020-01-14 23:06:19 +0100
  • 2a15b25ab3 fix `Extension` creation without compile_cmd se-m 2020-01-07 21:24:06 +0300
  • 549db2beb9 fix comment arvidn 2020-01-14 14:20:19 +0100
  • ab07eceead don't attempt sending event=stopped if event=start never succeeded arvidn 2020-01-08 15:33:17 +0100
  • af12f5d6b8 keep peer list sorted in client_test arvidn 2020-01-11 11:49:01 +0100
  • e18366bb6b make sure &key= stays consistent between different source IPs (as mandated by BEP7) arvidn 2020-01-11 02:01:07 +0100
  • 7320568c3c minor cleanup of debug logging for peer_list arvidn 2020-01-11 01:13:16 +0100
  • 7754f8ef1b improve logic for disable tracker-endpoint, and add debug logging arvidn 2020-01-09 21:30:10 +0100
  • 96ad81f00d fix minor typo in torrent debug logging arvidn 2020-01-09 17:41:20 +0100
  • 4d28ad0fea add feature to client_test to print the local IP for peer connections (for multi-homing) arvidn 2020-01-09 17:39:50 +0100
  • 1cdff958f1 minor fix to socks5 simulation arvidn 2020-01-07 18:12:45 +0100
  • 37063afd5c improve enum_routes and enum_net_interfaces for simulator arvidn 2020-01-07 18:14:36 +0100
  • 2e15b3edfa use span in expand_unspecified_address arvidn 2020-01-07 18:10:54 +0100
  • f508a433a4 fix binding of outgoing interface, when configured arvidn 2020-01-07 18:04:37 +0100
  • 96695fa714 fix build_netmask to treat the count as a prefix and add tests arvidn 2020-01-06 10:57:34 +0100
  • af3d084092 convert the duplex enum into a flags field, on listen_socket_t and listen_endpoint arvidn 2020-01-06 11:07:54 +0100
  • 3569b8885e fix null termination of description and friendly_name in ip_interface on linux arvidn 2020-01-04 22:49:16 +0100
  • 3caae922aa simplify and clean up enum_routes() a bit Arvid Norberg 2020-01-04 21:20:41 +0100
  • c7c7cd41d2 remove m_inode Pavel Pimenov 2019-12-31 16:55:00 +0300
  • 55e83e40d2 suppress future attempts to announce to a tracker from an interface with an incompatible address family arvidn 2019-12-31 02:47:17 +0100
  • 0675bd263f add new socks5_alert to trouble shoot SOCKS5 proxies Arvid Norberg 2019-12-22 00:48:05 +0100
  • b5bf6c3260 fix http_stream::handshake2 Pavel Pimenov 2019-12-20 21:15:11 +0300