- Aug 14, 2018
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Vladimír Čunát authored
When at it, switch to generating the libzscanner bindings.
-
Vladimír Čunát authored
-
Vladimír Čunát authored
The _t isn't uint8_t* anymore but a structure with .len and .data.
-
Vladimír Čunát authored
To work on RRSIG TTLs, libknot >= 2.7.1 is needed.
-
Vladimír Čunát authored
- <dnssec/**> -> <libdnssec/**> - <zscanner/**> -> <libzscanner/**>
-
- Aug 07, 2018
-
-
Vladimír Čunát authored
Previously multiple kresd processes might use the same .lock file at once and thus have a race between writing and renaming. That could happen relatively often if starting many instances *at once*.
-
Vladimír Čunát authored
These happen with -DNDEBUG only, and clang detects them (not gcc 7).
-
- Aug 06, 2018
-
-
Vladimír Čunát authored
Equality to `unsigned long` is not guaranteed, and was getting us warnings on macos (maybe it's not equal there). Also reduce the overlong lines.
-
- Aug 03, 2018
-
-
Vladimír Čunát authored
The catch is that during configuration file processing, no cache is open (yet), as kresd can't know if the config does open it in some later part (with non-default path or size). Now we just throw an error. Exceptions: - cache.open() and cache.backends(), of course :-) - cache.ns_tout() - not required, it's not really inside cache - cache.close() - it sounds reasonable to allow "closing a closed cache" This immediately caught a typo in cache metatable.
-
- Jul 24, 2018
-
-
Vladimír Čunát authored
This should fix #385: possible floods with > scheduling rotation check in 0 ms
-
- Jul 23, 2018
-
-
- Jul 16, 2018
-
-
The package_version() function returns current build information. Removed the version module instead of fixing, as it's being obsoleted.
-
-
-
- Jul 02, 2018
- Jun 29, 2018
-
-
- Jun 26, 2018
- Jun 25, 2018
- Jun 13, 2018
-
-
Petr Špaček authored
There is no GnuTLS version which would make this safe. See https://gitlab.com/gnutls/gnutls/issues/477
-
Petr Špaček authored
-
- Jun 08, 2018
-
-
Vladimír Čunát authored
Otherwise CentOS 7 enables those two "ciphers" by default. Noticed in #355.
-
Vladimír Čunát authored
-
- Jun 06, 2018
-
-
daemon/tls: system CA's are used by default with TLS_FORWARD policy when ca_file parameter is omitted
-
-
- May 31, 2018
-
-
Previously the module was created on configuration time, so it wasn't possible to inject custom endpoints to the default interface.
-
The AD indicates validation request (but not request for DNSSEC records). If the response can't be validated, resolver flips the AD to 0.
-
- May 30, 2018
-
-
Marek Vavruša authored
The handlers in Lua can now store per-request variables that are automatically GC'd when the request is finished. This is useful for stateful modules, such as DNS64 that uses internal option flags for state tracking. The layers can now get a variable table like so: ``` local vars = kres.request_t(r):vars() vars.hello = true ``` The variables are persisted between different layers for each request.
-
- May 28, 2018
-
-
Vladimír Čunát authored
I don't think it's good to write that we "provide a library", as it currently doesn't seem suitable for usage outside kresd.
-
- May 11, 2018