- May 05, 2022
-
-
Daniel Salzman authored
-
Daniel Salzman authored
This is a slight simplification of the test.
-
Daniel Salzman authored
This is needed even without Valgrind when running massively in parallel
-
Daniel Salzman authored
On slaves one common ACL for all actions has been replaced with a sequence of ACLs for notify, one rule for one master.
-
- May 02, 2022
-
-
Libor Peltan authored
the heap-element-replace bug fix See merge request !1452
-
-
This avoids the timeouts in master and as a result the "TCP, terminated inactive client" messages in the master's log are eliminated. Slave seems to be busy for too long when signing the zones under Valgrind.
-
In contrast with Knot coding style, most single line "if" constructions retained.
-
Possible as a result of modified heap_replace().
-
Current code as used by evsched_schedule() has led to a corrupted heap (with its elements out of order), resulting in unpredictable event scheduling behaviour, including events being processed out of order or already scheduled events being postponed, sometimes for several days, weeks, or maybe longer. Solving it by modifying the heap.c library a little -- the new code properly handles a situation when the original element and the element it's being replaced by are identical (that is, the same memory object), but already containing a modified value than what originally was in the heap. Instead of comparing the new element with the one it replaces, we now start comparing it with its parent. This commit fixes an old bug introduced in: 925ad42d
-
David Vasek authored
-
David Vasek authored
-
David Vasek authored
It's said timercmp() == is broken in the same broken implementations too. Furthemore, this expression is simpler and faster. While there, fix some coding style.
-
- Apr 30, 2022
-
-
Daniel Salzman authored
MSAN is unable to correctly evaluate explicit_bzero() for memory zeroing in wire_ctx operations. Then OSS-Fuzz creates false-positive issues. Using bzero() seems to be a reasonable workaround.
-
- Apr 28, 2022
-
-
Daniel Salzman authored
-
Daniel Salzman authored
zonedb: replan events for new zone_t instance no sooner... See merge request !1451
-
Daniel Salzman authored
This helps the server to process pending operations, which were triggered by a signal before the poll execution in knot_ctl_accept().
-
...as it might be planned by incomming NOTIFY during zonedb-reload and in this case its not in timers
-
-
...if e.g. SIGUSR1 signal has already arrived during previous server/zonedb reload, dont proceed to ctl as that ctl poll wont be interrupted by the already processed signal
-
...than all workers (UDP, TCP...) guaranteed to work... ...with new zonedb and new zone_t instance. Otherwise they may plan events to old zone_t instance and it gets lost. Usually reproduced with catalogs.
-
-
- Apr 27, 2022
-
-
Libor Peltan authored
Automatic ACL See merge request !1450
-
-
-
- Apr 22, 2022
-
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
- Apr 20, 2022
-
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
tests-extra: remove security/protos as the binaries no longer work on Ubuntu 22.04 and are unavailable
-
Daniel Salzman authored
-
Daniel Salzman authored
-
- Apr 12, 2022
-
-
Daniel Salzman authored
Multi signer support See merge request !1398
-
...this can still be achieved by ACL/update-type
-
-
-
Libor Peltan authored
Add soft mode to semantic checks See merge request !1446
-
Daniel Salzman authored
This solves the situation when a CNAME is present at the zone apex and SOA query is responded with the CNAME.
-