1
0
mirror of https://github.com/coturn/coturn.git synced 2025-10-30 14:31:29 +01:00

1502 Commits

Author SHA1 Message Date
Mészáros Mihály
3121747ade Update Changelog 2021-09-22 13:43:33 +02:00
Mészáros Mihály
a19bc7c464 Revert by hand merge PR825 in favor PR755 more simple solution 2021-09-22 13:32:34 +02:00
Mészáros Mihály
b5a597836b Merge branch 'master' into fix_sqlite_shutdown_race 2021-09-22 11:12:41 +02:00
Mészáros Mihály
82e74935db
Merge pull request #825 from whereby/argggh/no-sqlite3-shutdown
dbd_sqlite: Don't shutdown sqlite3 db during init
2021-09-22 10:59:16 +02:00
Mészáros Mihály
60eaa25d2b
Merge pull request #826 from giavac/master
Issue #699 Return codes for prom server
2021-09-22 08:51:21 +02:00
Giacomo Vacca
8aded3556e Issue #699 Return codes for prom server 2021-09-21 17:26:48 +02:00
Arne Georg Gisnås Gleditsch
8d66122d91 dbd_sqlite: Don't shutdown sqlite3 db during init
Ref https://www.sqlite.org/c3ref/initialize.html:

    The sqlite3_initialize() interface is threadsafe, but
    sqlite3_shutdown() is not.

We currently call `sqlite3_shutdown` from all threads as part of
`sqlite_init_multithreaded`, and this has been observed to have
adversarial effects during startup if many threads receive their first
inbound request at the same time. The apparent motivation behind
calling shutdown is to make the subsequent calls to `sqlite3_config`
succeed, since these ordinarily return SQLITE_MISUSE if called
multiple times. However, this function is also documented to not be
thread safe, so introduce a barrier that ensures we only initialize
once over all threads.
2021-09-20 16:33:25 +02:00
tyranron
4c059b0d3b
Mention UDP port in Docker image's README (#819) 2021-09-13 12:01:44 +03:00
tyranron
dc8f405f85
Fix typo in Docker image CHANGELOG 2021-08-29 16:19:22 +03:00
tyranron
7a82602b61
Upgrade debian to 'bullseye' version in Docker image docker/4.5.2-r5 2021-08-29 14:39:51 +03:00
tyranron
f383e5e823
Update alpine to 3.14.2 version in Docker image to fix CVE-2021-3711 and CVE-2021-3712
Additionally:
- slightly refactor Makefile for Docker images
docker/4.5.2-r4
2021-08-28 12:18:57 +03:00
tyranron
60e7a199fe
Update alpine to 3.14.1 version in Docker image to fix CVE-2021-36159 docker/4.5.2-r3 2021-08-09 11:38:55 +03:00
z00316370
5cf657cdff Fix user quota release #786 2021-07-15 19:26:31 +08:00
KORAY VATANSEVER
22af3ea567 Add syslog facility configuration 2021-07-07 15:56:30 +03:00
Daniil Meitis
99aa623aaf Add current allocations number gauge metric 2021-06-21 17:21:17 +04:00
tyranron
553ce02168
Upgrade alpine to 3.14 version in Docker image docker/4.5.2-r2 2021-06-21 11:30:40 +03:00
Mészáros Mihály
ee432e160f Fix for log_binding (regression) 2021-06-17 13:06:02 +02:00
Mészáros Mihály
6492f51a63
Merge pull request #767 from ggalperi/patch-1
Fix server->log_binding usage
2021-06-17 12:57:45 +02:00
Mark Hills
713bbefd5e Fix a segfault when a TLS context is not used
If the configuration contains entries such as:

  no-tlsv1
  no-tlsv1_1

then the SSL context is NULL. The previous code was simple enough that it
handled this case; the new code needs to deal with it explicitly.

[*] https://github.com/coturn/coturn/issues/770
2021-06-15 23:44:02 +02:00
Mészáros Mihály
e5f62d5c67
Travis.org is not compiling the latest master.
Travis.org is shutting down, not compliling the latest master source. We need to move all checks to travis.com if it is possible.
2021-06-06 09:38:51 +02:00
Mészáros Mihály
4ee8f8e7d8 Update man pages 2021-06-05 22:10:31 +02:00
Mészáros Mihály
7ad04a37d6 Not send SOFTWARE attr, if no_sotware_attribute on 2021-06-05 22:10:31 +02:00
Mészáros Mihály
708b83ea78 RESPONSE_ORIGIN attribute only if rfc5780 is on 2021-06-05 22:10:31 +02:00
Mészáros Mihály
54ef051844 Disable stun backward compatibility 2021-06-05 22:10:31 +02:00
Mészáros Mihály
e7ddfb4f4b Tidy in turnserver.conf rfc5780 option 2021-06-05 22:10:31 +02:00
Mészáros Mihály
398a606744 Update man after README change 2021-06-05 22:10:31 +02:00
Mészáros Mihály
eda11698f0 Add option no-rfc5780
To avoid any amplifiaction STUN binding attacks.
2021-06-05 22:10:31 +02:00
Mészáros Mihály
8c9622ad18 Add a check, don't SSL_CTX_up_ref a null pointer
This cause segmentation failure. Regression..
2021-06-05 22:10:31 +02:00
Mészáros Mihály
88f5119e1b Include ssl.h 2021-06-05 22:10:31 +02:00
tyranron
9ba8ab38e4
Aid alpine Docker image for 4.5.2 Coturn release docker/4.5.2-r1 2021-06-03 14:22:51 +03:00
tyranron
6953126633
Prepare 4.5.2-r1 release of Docker image 2021-06-03 10:19:12 +03:00
Kai Ren
55b506c4a2
Merge pull request #753 from j1elo/master
Use DNS requests to discover external IP address
2021-06-03 10:09:29 +03:00
Haseeb Abdul Qadir
e88de80abd Make sure we zero out any padding added to the attribute 2021-05-22 11:53:25 -04:00
Haseeb Abdul Qadir
93c5387180 Avoid using bzero for the entire stun_buffer_list_elem and only init metadata
On high traffic servers bzero -> memset takes a significant amount of time because each stun_buffer_list_elem can be ~64kb
2021-05-21 07:51:45 -04:00
tyranron
f2f8796e8c
Hack IFS in 'detect-external-ip' script of Docker image to support both Debian and Alpine 2021-05-17 23:38:38 +03:00
tyranron
484c88ea2a
Disable IPv6 tests of Docker image by default 2021-05-17 21:09:00 +03:00
tyranron
7ed7c438a7
Add tests for 'detect-external-ip' script of Docker image 2021-05-17 20:40:49 +03:00
tyranron
e5af5a813f
Get rid of nasty subshell in 'detect-external-ip' script of Docker image 2021-05-17 20:40:24 +03:00
tyranron
e921203fdb
Mention IPv6 detection capability in README of Docker image 2021-05-17 19:02:33 +03:00
tyranron
311b01507a
Merge branch 'master' into j1elo
# Conflicts:
#	docker/coturn/CHANGELOG.md
#	docker/coturn/alpine/Dockerfile
#	docker/coturn/debian/Dockerfile
2021-05-17 18:56:59 +03:00
ggalperi
0ac3fda6dd
Fix server->log_binding usage
The server->log_binding ptr should be dereferenced
2021-05-14 16:34:52 -04:00
Mészáros Mihály
d8026372af Remove trusty add focal 2021-05-08 06:39:35 +02:00
Mészáros Mihály
8fbe513300 Fix typo (---allow-loopback-peers) 2021-05-07 21:25:40 +02:00
Mészáros Mihály
dd1b11da80 Update Changelog with PR#739 2021-05-07 21:23:24 +02:00
Mészáros Mihály
d90c689c99
Merge pull request #739 from hills/ssl-reload-crashes
SSL reload has hidden bugs which cause crashes
2021-05-07 21:10:18 +02:00
Mészáros Mihály
a264b1652e
Merge pull request #754 from coturn/prometheus-in-docker
Support Prometheus in Docker image
2021-05-02 21:32:56 +02:00
Serhii Charykov
0f7ff3ec4a Change sqlite_init_multithreaded return type to void
to satisfy pthread_once() interface because
previously return from sqlite_init_multithreaded
was not used
2021-04-26 23:47:11 +03:00
Serhii Charykov
2d12ad4f29 Refactor code 2021-04-26 23:34:24 +03:00
Serhii Charykov
34e18533cf Fix sqlite3_config call only once before using any other sqlite utilities 2021-04-26 22:19:16 +03:00
Serhii Charykov
0b709a05b7 Remove sqlite3_shutdown()
Because:
1. According to sqlite3 docs sqlite3_initialize() and sqlite3_shutdown() are not must to be invoked
2. sqlite3_initialize() is never called explicilty
3. sqlite3_shutdown() is not threadsafe and sqlite_init_multithreaded is not called holding a lock
4. According to docs all connections must be closed before invoking sqlite3_shutdown() but they are not (from the different threads).

Possible issue:
sqlite3_config must be called before sqlite3_initialize() or after sqlite3_shutdown() (and only once?)
2021-04-26 21:36:28 +03:00