- 12 Jan, 2018 11 commits
-
-
Petr Špaček authored
daemon: TLS-handshake timeout timer was not properly activated; fix See merge request knot/knot-resolver!441
-
Grigorii Demidov authored
-
Petr Špaček authored
ci: add -Werror to CFLAGS, added clang build target See merge request knot/knot-resolver!432
-
Marek Vavruša authored
this checks things such as inconsistent declarations and definitions
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
This supports linting of C code using clang-tidy to fix common security and code quality issues early in the development workflow. The benefit is that less time has to be spent in code reviews to point out obvious problems, and ideally when the outstanding issues are fixed, clang-tidy (and clang-format) can also be used to to automatically fix basic problems and enforce common code style, similarly to `go vet && go fmt` workflow.
-
- 11 Jan, 2018 11 commits
-
-
Marek Vavruša authored
-
Petr Špaček authored
fixup! CI: add Clang scan-build to the pipeline See merge request knot/knot-resolver!438
-
Petr Špaček authored
Forgot to `git add` Dockerfile with Clang tools.
-
Petr Špaček authored
Systemd modifications See merge request knot/knot-resolver!436
-
Tomas Krizek authored
The `knot-resolver` name is used for paths and user name. Creating a systemd alias with the same name is user-friendly to end users who won't have to remember another name (`kresd`). Note: Systemd Alias is only created after service is enabled. Packagers are thus advised to create symlinks for unit files during package installation so users can use `knot-resolver` name right from the start.
-
Tomas Krizek authored
The /run directory is non-persistent. Use /var/cache/knot-resolver as a persistent cache.
-
Tomas Krizek authored
-
Petr Špaček authored
CI: add Clan scan build to pipeline See merge request knot/knot-resolver!437
-
Petr Špaček authored
For now error produced by scan-build are not fatal. We need to fix these first.
-
Petr Špaček authored
-
Petr Špaček authored
systemd: drop WantedBy directive from kresd.service See merge request knot/knot-resolver!433
-
- 10 Jan, 2018 3 commits
-
-
Daniel Kahn Gillmor authored
This directive is unnecessary in the .service file, and it also causes a dependency cycle that systemd is obliged to break. Since kresd is socket-activated, there is no need for the WantedBy directive in the .service file itself. As long as the .socket files are installed, the service will run when it is used.
-
Petr Špaček authored
systemd: enable manual activation of kresd.service as non-root user See merge request knot/knot-resolver!434
-
Tomas Krizek authored
To be able to bind to a well known port as a non-root user, the CAP_NET_BIND_SERVICE capability is required.
-
- 09 Jan, 2018 2 commits
-
-
Vladimír Čunát authored
-
Grigorii Demidov authored
-
- 08 Jan, 2018 13 commits
-
-
Petr Špaček authored
outbound TCP connections sharing; TLS over outbound TCP connections Closes #104 See merge request knot/knot-resolver!379
-
Grigorii Demidov authored
-
Grigorii Demidov authored
-
Grigorii Demidov authored
-
Grigorii Demidov authored
-
Vladimír Čunát authored
-
Petr Špaček authored
-
Grigorii Demidov authored
-
Grigorii Demidov authored
-
Grigorii Demidov authored
-
Grigorii Demidov authored
-
Grigorii Demidov authored
-
Grigorii Demidov authored
-