Skip to content

Releases: wahern/cqueues

rel-20200726

26 Jul 11:36
rel-20200726
b0c2bc5
Compare
Choose a tag to compare
  • Fix compilation with Lua 5.4 (#239)

rel-20200603

03 Jun 06:58
rel-20200603
f33d4fe
Compare
Choose a tag to compare
  • Fix compilation with GCC 10 (#233)
  • Add cqueues.create as non-throwing variant of cqueues.new (#229)

rel-20190813

13 Aug 09:09
rel-20190813
813664c
Compare
Choose a tag to compare
  • Fix feature detection (#227)

rel-20190731

31 Jul 13:52
rel-20190731
c17d0c1
Compare
Choose a tag to compare
  • Fix compilation in GCC 9 (#224)
  • Fix dns.c aliasing issue (#200)
  • Add support for passing bind.path for a unix socket (#195)
  • Introduce workarounds for LuaJIT 47bit userdata (#225)

rel-20171014

14 Oct 00:05
rel-20171014
36b4b8c
Compare
Choose a tag to compare
  • Fix compilation with GCC 7
  • Fix some compiler warnings
  • Fix compilation with LuaJIT 2.1-beta3

rel-20161215

16 Dec 11:48
Compare
Choose a tag to compare
  • disallow cq:close() when invoked from a thread resumed by cqueue_step

rel-20161214

15 Dec 01:59
Compare
Choose a tag to compare
  • Accept SSL instance in socket:starttls.
  • Support cqueue:close.
  • Correctly cancel any controller descriptors before destroying a controller.
  • Fix OpenSSL 1.1 support by correctly defaulting to client connect mode in socket:starttls when neither accept nor connect mode is explicitly specified.

20160812

19 Aug 07:16
Compare
Choose a tag to compare
  • Support older Linux environments lacking signalfd by falling back to sigtimedwait as we do for Solaris.
  • On BSDs set FD_CLOEXEC on the signal.c kqueue descriptor.

20160808

09 Aug 03:30
Compare
Choose a tag to compare
  • Use userdata values (userdata environments in Lua 5.1) instead of relying on ephemeron tables.
  • Update dns.c with various bug fixes.
  • Immediately put resolvers back into resolver pool. (@torhve)

20160316

17 Mar 06:00
Compare
Choose a tag to compare
  • Allow yielding through cqueues:step. (@daurnimator)
  • Use SSLv23_server_method instead of SSLv3_server_method when guessing the TLS handshake mode--server or client--as many OpenSSL forks have deprecated or removed SSLv3-specific APIs. (@daurnimator)
  • Support SO_BROADCAST. (@daurnimator)
  • Fix v6only flag. (@daurnimator)