- Jun 12, 2023
-
-
Vladimír Čunát authored
Example: assert(require('ffi').C.kr_view_insert_action( '127.0.0.0/24', 'policy.DENY_MSG("message")' ) == 0)
-
Vladimír Čunát authored
Also switch the localhost rule there, finishing migration of all special names from the policy module.
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Vladimír Čunát authored
fixes modules/dns64 test
-
Vladimír Čunát authored
-
Vladimír Čunát authored
Picked up old work, rebase-squashed after many months; then fixed up a little as needed in this newer version. (and later many minor fixes got squashed in)
-
- May 10, 2023
-
-
Vladimír Čunát authored
The removed tip seemed especially misleading; I don't think our root hints could've ever been used that way. And latency to root servers has practically no impact on latency of replies to reasonable answers (just like... once per day and TLD).
-
- Mar 10, 2023
-
-
Vladimír Čunát authored
Apparently it's never worked since its introduction. .addr is non-nil exactly when .dst_addr is non-nil (which hapens iff the query originated externally). Now we have semantics which was probably intended by the original code (98216295 from 2016) but that semantics is still problematic if you need both kinds of matching in a single request from client. This matching by destination has never made it to docs, so let's just add this simple fixup for now, and later we'll steer users to new policy configuration anyway.
-
- Mar 08, 2023
-
-
This commit adds support for building on Cygwin/MSYS2. Signed-off-by:
Christopher Ng <facboy@gmail.com>
-
Vladimír Čunát authored
This reverts commit 0b9524b7. The hack shouldn't be needed anymore: https://github.com/Homebrew/homebrew-core/commit/4369052170f4360b7ad545f23b8a01a4ccb37683#diff-59a7902ada251dd9dba99b5bd323c1dba1d102d244ce766c06ce00097fb82e8fL71 This isn't an exact revert, but differences are minor.
-
- Dec 22, 2022
-
-
Vladimír Čunát authored
That setting is recommended by documentation but it would still leave the timer triggering repeatedly. Maybe it didn't cause any practical difference, but it was unnecessary and possibly confusing.
-
- Dec 14, 2022
-
-
Oto Šťáva authored
-
- Dec 13, 2022
-
-
Vladimír Čunát authored
- apply to first (uncached) answer already - don't extend over signature validity Nit: the tests were using too high TTL (RFCs disallow the "sign bit"). It was working because (manual) cache-insertion was applying bounds, but now the bounds don't get applied anymore, so it would fail.
-
Vladimír Čunát authored
When a whole packet is cached (instead of individual RRs), let's simplify the way the packet's TTL gets computed. The previous mechanism came from commit 5b383a2b, probably a misunderstanding of: https://datatracker.ietf.org/doc/html/rfc2308#section-5 Anyway, I see no motivation to do it, and this way we should get rid of some weird cases where we might extend TTL of some records, except if they were below the cache.min_ttl() setting (5s default).
-
- Dec 06, 2022
-
-
Vladimír Čunát authored
In particular, avoids unintentional NXDOMAIN on grafted subtrees. Consequently the users can drop 'NO_CACHE' flag and get caching.
-
- Dec 05, 2022
-
-
Vladimír Čunát authored
I broke this in 54ab3f78 or closely around, so this never worked well since 5.4.1, and maybe structured logging (5.4.0) had related issues.
-
- Oct 14, 2022
-
-
It's resonable to assume that people would also want to disable DNS64 for IPv4 source addresses if they only enable it for some IPv6 sources. Close https://github.com/CZ-NIC/knot-resolver/pull/83
-
- Sep 27, 2022
-
-
Jakub Ružička authored
Cleanup before introduction of new packaging tests. See: #612
-
- Aug 08, 2022
- Aug 01, 2022
-
- Jul 07, 2022
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
- Jun 27, 2022
-
-
Vladimír Čunát authored
When kresd starts without working internet connection, these would spam logs by default every 10 seconds, which doesn't seem useful.
-
Vladimír Čunát authored
I can't see sufficient motivation here. The cache will be slightly less ready, but it's not often that you need to contact a root server. Most importantly, kresd must work well anyway, even with empty cache. Also, the compiled-in address set of root servers should be quite accurate - the NS set has never changed, and the last address change was five years ago with just one of 26 records changing.
-
- Jun 09, 2022
- Jun 01, 2022
-
-
Vladimír Čunát authored
WARNING: You should add the boolean check kwarg to the run_command call. It currently defaults to false, but it will default to true in future releases of meson. See also: https://github.com/mesonbuild/meson/issues/9300 In almost all cases we already check the return code explicitly and throw a more descriptive message than what would be the default.
-
Oto Šťáva authored
-
Oto Šťáva authored
-
- May 30, 2022
-
-
Vladimír Čunát authored
-
https://github.com/CZ-NIC/knot-resolver/pull/77 originally but changed by vcunat quite a bit.
-
- May 11, 2022
-
-
Oto Šťáva authored
-
- Apr 08, 2022
-
-
FIXME: add a NEWS entry for this
-
- Mar 21, 2022
-
-
Also change the return type of kr_pkt_has_dnssec() and lua's :dobit()
-
- Mar 14, 2022
-
-
Vladimír Čunát authored
We're still run into people who thought that the example config is a suitable default. Example where it caused practical issues: https://lists.nic.cz/hyperkitty/list/knot-resolver-users@lists.nic.cz/thread/WQDJJ3LLEIZ5U3VVSCITW6DZPICW4L7U/
-
Vladimír Čunát authored
-
- Feb 28, 2022
-
-
Vladimír Čunát authored
The main thing is the "failed to open socket" message. But let's also elevate other fatal one-off logs to ERROR level.
-
Vladimír Čunát authored
Usually in configuration the module is loaded in a separate command from passing configuration to it. For dnstap this loading would immediately lead to opening the default socket path, even if the configuration actually specifies (a different) path later. Users can still force using the default by passing an empty table: `dnstap.config({})` or `modules = { dnstap = {}}` (though I doubt the utility of the default /tmp/dnstap.sock anyway)
-