8fcad10ccf
feat(mdns): support allocating mDNS task from SPIRAM
2025-02-10 11:18:19 +01:00
64d818b2d3
bump(mdns): 1.5.2 -> 1.5.3
...
1.5.3
Bug Fixes
- Fix responder to ignore only invalid queries (cd07228f
, #754 )
2025-02-07 14:31:18 +01:00
cd07228f81
fix(mdns): Fix responder to ignore only invalid queries
...
not the entire packet, so we can still reply to next questions
Closes https://github.com/espressif/esp-protocols/issues/754
2025-02-07 14:30:10 +01:00
39866116f5
bump(websocket): 1.3.0 -> 1.4.0
...
1.4.0
Features
- Support DS peripheral for mutual TLS (55385ec3
)
Bug Fixes
- wait for task on destroy (42674b49
)
- Fix pytest to verify client correctly (9046af8f
)
- propagate error type (eeeb9006
)
- fix example buffer leak (5219c39d
)
Updated
- chore(websocket): align structure members (beb6e57e
)
- chore(websocket): remove unused client variable (15d3a01e
)
2025-01-30 07:16:24 +01:00
7740b591b6
Merge pull request #749 from david-cermak/fix/ws_client_test
...
[websocket]: Fix pytest to verify client correctly
2025-01-30 07:09:34 +01:00
42674b49f9
fix(websocket): wait for task on destroy
2025-01-29 14:30:32 +01:00
e069ae7762
Merge pull request #520 from johanstokking/feature/websocket/client_ds_data
...
feat(websocket): Support DS peripheral for mutual TLS (IDFGH-12285)
2025-01-28 16:59:34 +01:00
55385ec312
feat(websocket): Support DS peripheral for mutual TLS
2025-01-28 14:58:54 +01:00
84c47c37f1
bump(mdns): 1.5.1 -> 1.5.2
...
1.5.2
Bug Fixes
- Fix potential NULL deref when sending sub-buy (e7273c46
)
- Fix _mdns_append_fqdn excessive stack usage (bd23c233
)
2025-01-28 09:54:54 +01:00
e7273c46ec
fix(mdns): Fix potential NULL deref when sending sub-buy
...
Closes coverity reported issue: 473829 Dereference null return value
2025-01-28 09:54:16 +01:00
2e7d240abd
Merge pull request #744 from andrew-lifx/fix/mdns_append_fqdn
...
fix(mdns): Fix _mdns_append_fqdn excessive stack usage (IDFGH-14506)
2025-01-28 07:28:00 +01:00
d4a004b5b4
Merge pull request #694 from johanstokking/fix/websocket-esp-tls-errors
...
fix(websocket): propagate error type (IDFGH-14518)
2025-01-27 15:50:32 +01:00
9046af8f8d
fix(websocket): Fix pytest to verify client correctly
2025-01-27 15:34:49 +01:00
eeeb9006eb
fix(websocket): propagate error type
2025-01-25 21:52:06 +01:00
72ba24470d
bump(asio): Publish 1.32.0 to component manager
...
Related to the bump-commit: ac6a388cdd
but missed to update idf_component.yml
This publishes ASIO-1.32-0~0
2025-01-24 14:32:20 +01:00
ac6a388cdd
bump(asio): 1.28.0 -> 1.32.0
...
1.32.0
Features
- Upgrade asio to 1.32 (9bdd429c
)
- Drop esp/asio patches in favor of sock-utils (27435b7f
)
Bug Fixes
- Fix chat example to print only the message body (76aaea08
)
- Make asio enable if_nametoindex to fix linking (5db32cce
)
- Re-applie refs to common comps idf_component.yml (9fe44a45
)
- Reference common component from IDF (74fc228c
)
- Revert referencing protocol_examples_common from IDF (f9e0281a
)
- reference protocol_examples_common from IDF (09abb18b
)
- specify override_path in example manifest files (1d8923cf
)
Updated
- docs(asio): Updates asio docs (ce9337d3
)
2025-01-24 12:40:45 +01:00
76aaea08d2
fix(asio): Fix chat example to print only the message body
2025-01-24 12:37:39 +01:00
5db32cce30
fix(asio): Make asio enable if_nametoindex to fix linking
2025-01-24 12:37:39 +01:00
9bdd429c7c
feat(asio): Upgrade asio to 1.32
2025-01-24 10:47:54 +01:00
27435b7f34
feat(asio): Drop esp/asio patches in favor of sock-utils
2025-01-24 10:47:54 +01:00
bd23c233a4
fix(mdns): Fix _mdns_append_fqdn excessive stack usage
...
Move "mdns_name_t name" declaration inside loop to move it out of scope and reclain stack space before recursion call.
2025-01-24 17:39:04 +10:30
96eae25096
bump(mdns): 1.5.0 -> 1.5.1
...
1.5.1
Bug Fixes
- Fix incorrect memory free for mdns browse (4451a8c5
)
2025-01-23 09:00:01 +01:00
4451a8c5ad
fix(mdns): Fix incorrect memory free for mdns browse
2025-01-23 09:08:25 +08:00
9162de1150
fix(mosq): Remove temp modification of IDF files
2025-01-21 12:27:09 +01:00
dbd164dd91
fix(mosq): Add a note about stack size
2025-01-21 12:27:09 +01:00
84caca465d
bump(mdns): 1.4.3 -> 1.5.0
...
1.5.0
Features
- supported removal of subtype when updating service (4ad88e29
)
Bug Fixes
- Fix zero-sized VLA clang-tidy warnings (196198ec
)
- Remove dead store to arg variable shared (e838bf03
)
- Fix name mangling not to use strcpy() (99b54ac3
)
- Fix potential null derefernce in _mdns_execute_action() (f5be2f41
)
- Fix AFL test mock per espressif/esp-idf@a5bc08fb55 (3d8835cf
)
- Fixed potential out-of-bound interface error (24f55ce9
)
- Fixed incorrect error conversion (8f8516cc
)
- Fixed potential overflow when allocating txt data (75a8e864
)
- Move MDNS_NAME_BUF_LEN to public headers (907087c0
, #724 )
- Cleanup includes in mdns.c (68a9e148
, #725 )
- Allow advertizing service with port==0 (827ea65f
)
- Fixed complier warning if MDNS_MAX_SERVICES==0 (95377216
, #611 )
2025-01-20 17:57:07 +01:00
265e38d684
Merge pull request #731 from tanyanquan/feat/update_subtype_removal
...
feat(mdns): supported removal of subtype when updating service (IDFGH-14413)
2025-01-20 09:48:27 +01:00
4ad88e297f
feat(mdns): supported removal of subtype when updating service
2025-01-16 10:56:54 +08:00
196198ecc9
fix(mdns): Fix zero-sized VLA clang-tidy warnings
...
and some minor leaks in creation of browse results
2025-01-15 14:23:34 +01:00
e838bf03f4
fix(mdns): Remove dead store to arg variable shared
...
Fixing: warning: Value stored to 'shared' is never read [clang-analyzer-deadcode.DeadStores]
2025-01-15 14:23:34 +01:00
99b54ac384
fix(mdns): Fix name mangling not to use strcpy()
...
Since it was flagged by clang-tidy as insecture API
2025-01-15 14:23:34 +01:00
f5be2f4115
fix(mdns): Fix potential null derefernce in _mdns_execute_action()
...
We did check for null-deref before checking 'a->type', but contol
continues and passes potential null-ptr to the processing function
_mdns_execute_action()
Fixed by asserting action != NULL, since it is an invalid state which
should never happen.
2025-01-15 14:21:59 +01:00
3d8835cfb9
fix(mdns): Fix AFL test mock per espressif/esp-idf@a5bc08fb55
2025-01-15 11:42:34 +01:00
24f55ce9b4
fix(mdns): Fixed potential out-of-bound interface error
...
invalid mdns_if was handled for enabling/announcing pcbs,
but not for the consequent browsing
Closes coverity isssue: 470162 Out-of-bounds access
2025-01-15 10:46:15 +01:00
8f8516cc3f
fix(mdns): Fixed incorrect error conversion
...
Mixing esp_err_t (int) with err_t (uint8_t) from lwip.
Closes coverity isssue: 470139 Overflowed return value
2025-01-15 10:46:15 +01:00
75a8e8640a
fix(mdns): Fixed potential overflow when allocating txt data
...
Closes coverity warning: 470092 Overflowed integer argument
2025-01-15 10:46:15 +01:00
907087c09b
fix(mdns): Move MDNS_NAME_BUF_LEN to public headers
...
Since it's used by public API as maximum length of user buffer
Closes https://github.com/espressif/esp-protocols/issues/724
2025-01-15 10:46:10 +01:00
68a9e14898
fix(mdns): Cleanup includes in mdns.c
...
Closes https://github.com/espressif/esp-protocols/issues/725
2025-01-15 10:44:12 +01:00
827ea65fd5
fix(mdns): Allow advertizing service with port==0
...
Closes https://github.com/espressif/esp-idf/issues/14335
2025-01-15 10:44:12 +01:00
9537721600
fix(mdns): Fixed complier warning if MDNS_MAX_SERVICES==0
...
Closes https://github.com/espressif/esp-protocols/issues/611
2025-01-15 10:44:07 +01:00
9b0ba6060f
bump(mdns): 1.4.2 -> 1.4.3
...
1.4.3
Features
- support zero item when update subtype (5bd82c01
)
2025-01-08 09:42:38 +01:00
7c6a3098af
Merge pull request #726 from zwx1995esp/feature/support_update_zero_item_of_subtype_for_mdns
...
feat(mdns): support zero item when update subtype (IDFGH-14369)
2025-01-07 18:40:25 +01:00
9ed835ba3f
bump(sockutls): 0.2.1 -> 0.2.2
...
0.2.2
Bug Fixes
- Fix gai_strerror() impl to return const string (f12a2056
)
2025-01-07 14:06:42 +01:00
f12a205657
fix(sockutls): Fix gai_strerror() impl to return const string
...
Previous gai_strerror() returned numeric representation of the code,
but used TLS storage, which might cause issues with stack sizes on all
tasks in the system. Alternatively we can leave the storage to static
only (which wouldn't be thread-safe) or we could one-time allocate and
never free (which is wrong).
This option uses hardcoded strings for common error codes used in lwip.
The disadvantage is that we might need to update the impl in the future
when lwip adds more codes.
2025-01-07 14:06:00 +01:00
5bd82c01a5
feat(mdns): support zero item when update subtype
2025-01-07 10:28:02 +08:00
0499ed93df
bump(sockutls): 0.2.0 -> 0.2.1
...
0.2.1
Bug Fixes
- Fix potential macro colission including standard headers (ade9448c
)
2024-12-20 15:41:10 +01:00
ade9448c01
fix(sockutls): Fix potential macro colission including standard headers
2024-12-20 15:40:54 +01:00
73e523e736
bump(mosq): 2.0.20 -> 2.0.20~1
...
2.0.20~1
Bug Fixes
- Use sock_utils instead of func stubs (3cd0ed37
)
- Update API docs adding on-message callback (5dcc3330
)
2024-12-20 15:09:41 +01:00
3cd0ed377b
fix(mosq): Use sock_utils instead of func stubs
2024-12-20 15:07:42 +01:00
5dcc33300f
fix(mosq): Update API docs adding on-message callback
2024-12-20 12:09:48 +01:00