Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump trust-dns-proto from 0.20.4 to 0.21.1 #776

Merged
merged 1 commit into from
Feb 28, 2022

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Feb 28, 2022

Bumps trust-dns-proto from 0.20.4 to 0.21.1.

Release notes

Sourced from trust-dns-proto's releases.

v0.21.1

0.21.1

Fixed

  • (util) fixed feature build issue in resolve #1649

v0.21.0

0.21.0

Added

Changed

  • (util) openssl is no longer default enabled in trust-dns-utils, bins marked as required as necessary #1644
  • (proto) deprecate outdated dnssec algorithms #1640
  • (server) pass RequestInfo into Authority on search #1620
  • (proto) SSHFP: Ed448 is assigned algorithm 6 in RFC 8709 #1604
  • (resolver) Do not retry the same name server on a negative response (@​peterthejohnston) #1589
  • (all) with-backtrace feature renamed to backtrace (@​pinkisemils) #1577
  • (resolver) TCP for truncated message responses, but not for other failures on responses (switch for old behavior try_tcp_on_error) ( @​peterthejohnston) #1562
  • (server) Multiple queries in a message will always result in a FormError now #1554
  • (server) ServerFuture and other Catalog related API changes #1554
  • (server) By default, the server will now only log a single log line based for a given request (debug will be needed for more details) #1554
  • (server) ResponseHandler now must return a ResponseInfo to allow for more consistent logging #1554
  • (resolver) Correct behavior around trust_nx_responses (@​peterthejohnston) #1556
  • (server) ResponseHandler trait is now async_trait, requires all impls to be annotated with #[async_trait] #1550
  • (server) Authority impls required to be internally modifiable and Send + Sync #1550
  • (server) Most Authority methods changes to async fn rather than returning custom Future impls #1550
  • (server) Authority trait is now async_trait, requires all impls to be annotated with #[async_trait] #1550
  • (proto) Header now stores ResponseCode instead of just u8 #1537
  • (client) improved async client example documentation (@​ErwanDL) #1539
  • (resolver) on REFUSED (and other negative) response(s), fall back to other nameservers (@​peterthejohnston) #1513 #1526
  • (client) the feature dnssec is no longer enabled by default, use dnssec-ring or dnssec-openssl #1506
  • (server) dnssec functions of Authority moved into DnsSecAuthority #1506
  • (all) Most public enum types are now marked #[non_exaustive] #1426
  • (resolver) DnsRequestOptions and ResolverOpts now #[non_exaustive] #1426
  • (proto) all I/O Streams now use BufDnsStreamHandle rather than generic DnsStreamHandle #1433
  • (proto) DnsResponse response now contains only a single Response #1433

... (truncated)

Changelog

Sourced from trust-dns-proto's changelog.

0.21.1

Fixed

  • (util) fixed feature build issue in resolve #1649

0.21.0

Added

Changed

  • (util) openssl is no longer default enabled in trust-dns-utils, bins marked as required as necessary #1644
  • (proto) deprecate outdated dnssec algorithms #1640
  • (server) pass RequestInfo into Authority on search #1620
  • (proto) SSHFP: Ed448 is assigned algorithm 6 in RFC 8709 #1604
  • (resolver) Do not retry the same name server on a negative response (@​peterthejohnston) #1589
  • (all) with-backtrace feature renamed to backtrace (@​pinkisemils) #1577
  • (resolver) TCP for truncated message responses, but not for other failures on responses (switch for old behavior try_tcp_on_error) ( @​peterthejohnston) #1562
  • (server) Multiple queries in a message will always result in a FormError now #1554
  • (server) ServerFuture and other Catalog related API changes #1554
  • (server) By default, the server will now only log a single log line based for a given request (debug will be needed for more details) #1554
  • (server) ResponseHandler now must return a ResponseInfo to allow for more consistent logging #1554
  • (resolver) Correct behavior around trust_nx_responses (@​peterthejohnston) #1556
  • (server) ResponseHandler trait is now async_trait, requires all impls to be annotated with #[async_trait] #1550
  • (server) Authority impls required to be internally modifiable and Send + Sync #1550
  • (server) Most Authority methods changes to async fn rather than returning custom Future impls #1550
  • (server) Authority trait is now async_trait, requires all impls to be annotated with #[async_trait] #1550
  • (proto) Header now stores ResponseCode instead of just u8 #1537
  • (client) improved async client example documentation (@​ErwanDL) #1539
  • (resolver) on REFUSED (and other negative) response(s), fall back to other nameservers (@​peterthejohnston) #1513 #1526
  • (client) the feature dnssec is no longer enabled by default, use dnssec-ring or dnssec-openssl #1506
  • (server) dnssec functions of Authority moved into DnsSecAuthority #1506
  • (all) Most public enum types are now marked #[non_exaustive] #1426
  • (resolver) DnsRequestOptions and ResolverOpts now #[non_exaustive] #1426
  • (proto) all I/O Streams now use BufDnsStreamHandle rather than generic DnsStreamHandle #1433
  • (proto) DnsResponse response now contains only a single Response #1433
  • (proto) Name::append_name and Name::append_domain now properly fallible when name is too long #1448
  • (resolver) special handling of the onion. TLD added to static resolution with negative responses (@​trinity-1686a) #1479

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [trust-dns-proto](https://github.com/bluejekyll/trust-dns) from 0.20.4 to 0.21.1.
- [Release notes](https://github.com/bluejekyll/trust-dns/releases)
- [Changelog](https://github.com/bluejekyll/trust-dns/blob/main/CHANGELOG.md)
- [Commits](hickory-dns/hickory-dns@v0.20.4...v0.21.1)

---
updated-dependencies:
- dependency-name: trust-dns-proto
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Feb 28, 2022
@zonyitoo zonyitoo merged commit 8cef7ef into master Feb 28, 2022
@zonyitoo zonyitoo deleted the dependabot/cargo/trust-dns-proto-0.21.1 branch February 28, 2022 15:21
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant