- May 10, 2017
-
-
Vladimír Čunát authored
It had no implementation for years - since 456e5446.
-
- May 02, 2017
-
-
Vladimír Čunát authored
Upstream released the bump yesterday. Tested with 2.0.4, 2.1.0-beta{2,3}.
-
Vladimír Čunát authored
It added a function from lua > 5.1, without bumping the language version. The changelog seems safe and Deckard still passes.
-
- Apr 28, 2017
-
-
Grigorii Demidov authored
lib/dnssec: bugfix; libdnssec data structure was prematurely released after unsu… See merge request !288
-
Grigorii Demidov authored
lib/dnssec: bugfix; libdnssec data structure was prematurely released after unsuccessful attempt of signature validation
-
- Apr 26, 2017
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
I'd like to add NEWS entries already in the merge requests, but I often forget. Also mark version with -dev.
-
- Apr 25, 2017
-
-
Vladimír Čunát authored
-
- Apr 24, 2017
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
It's up to iterator to pick the interesting cases to auth_selected.
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Vladimír Čunát authored
Hopefully this will fix the ./configure problem on Jenkins. Also, an incorrect flag was passed.
-
Ondřej Surý authored
NEWS: prepare for 1.2.6 See merge request !280
-
Vladimír Čunát authored
-
Ondřej Surý authored
Update deckard to latest master See merge request !279
-
Ondřej Surý authored
-
Ondřej Surý authored
Allow canceling respdiff without penalty See merge request !281
-
Ondřej Surý authored
-
Vladimír Čunát authored
Closes #179 and #178.
-
Vladimír Čunát authored
-
- Apr 21, 2017
-
-
Grigorii Demidov authored
-
- Apr 19, 2017
-
-
Grigorii Demidov authored
-
Petr Špaček authored
CI: run respdiff using docker image in Gitlab CI See merge request !275
-
- Apr 18, 2017
-
-
Petr Špaček authored
rrcache: don't clobber pkt if failing the second step See merge request !274
-
Vladimír Čunát authored
I hope fixing this bug should diminish the recent experiences of Google domains failing to resolve on Turris Omnia.
-
Vladimír Čunát authored
dnssec/nsec3: don't set AD flag in properly signed wildcard nodata answers See merge request !273
-
- Apr 13, 2017
-
-
Vladimír Čunát authored
The jump may lead to secure zone, so let the sub-query find out by itself. Otherwise we might cache those RRs with INSECURE rank even though they are secure. This shouldn't harm AD flags anymore.
-
Jan Holuša authored
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
When reconstructing the signed data for RRSet synthesized from wildcard, omit leftmost name labels for each RR in RRSet, not only for the first RR.
-
Grigorii Demidov authored
-
- Apr 10, 2017
-
-
Vladimír Čunát authored
This part of code still deserves better review. It's a bit surprising that our current tests didn't discover it. We incorrectly answered with AD in some cases, e.g. ntp.pool.org AAAA.
-
Vladimír Čunát authored
-
Vladimír Čunát authored
If a server puts NS into the authority section that refers to itself, accept it as autoritative and validate it (if applicable). This fixes the val_nsec3_cnametocnamewctoposwc test, as unvalidated NS in the final answer would prevent adding the AD flag. The iter_pcname test is broken by this, but the team's consensus is to prefer this solution. Nitpicks: cleaner style in the function, and don't force inlining anymore. (It's no longer a trivial function and compilers should be good at determining whether to inline static functions or not.)
-
Vladimír Čunát authored
Especially when stashing into the cache, it was unclear which RRset was being referred to. Let's add type and owner name.
-
Petr Špaček authored
don't retry if REFUSED See merge request !271
-
- Apr 07, 2017
-
-
Vladimír Čunát authored
-