- Feb 09, 2017
-
-
Vladimír Čunát authored
-
- Jan 31, 2017
-
-
Vladimír Čunát authored
Fixes #147.
-
- Jan 27, 2017
-
-
Vladimír Čunát authored
I believe it was unused, so no risk was caused, but better remove it. There's the complication that its signature has changed since libknot-2.4.0. Fixes https://gitlab.labs.nic.cz/knot/resolver/issues/146
-
Vladimír Čunát authored
-
Vladimír Čunát authored
These shouldn't make any problems: - the verbose messages don't print any scope, and - reputation cache doesn't consider scope.
-
- Jan 26, 2017
-
-
Vladimír Čunát authored
-
- Jan 25, 2017
-
-
Ondřej Surý authored
-
Ondřej Surý authored
-
- Jan 24, 2017
-
-
Vladimír Čunát authored
-
- Jan 23, 2017
-
-
Grigorii Demidov authored
-
- Jan 20, 2017
-
-
Grigorii Demidov authored
-
- Jan 18, 2017
-
-
Grigorii Demidov authored
-
- Jan 17, 2017
-
-
Marek Vavruša authored
-
- Jan 16, 2017
-
-
Petr Špaček authored
-
Ondřej Surý authored
-
Ondřej Surý authored
-
Grigorii Demidov authored
-
-
Marek Vavruša authored
-
- Jan 11, 2017
-
-
On standard 64-bit: 24 -> 16 bytes per element.
-
-
Grigorii Demidov authored
-
- Jan 09, 2017
-
-
Vladimír Čunát authored
Fixes https://gitlab.labs.nic.cz/knot/resolver/issues/76
-
Vladimír Čunát authored
-
- Jan 06, 2017
-
-
Ondřej Surý authored
-
Ondřej Surý authored
-
Ondřej Surý authored
-
Daniel Kahn Gillmor authored
-
Daniel Kahn Gillmor authored
If the ephemeral X.509 certificate is due for renewal in less than a week, regenerate it automatically.
-
Daniel Kahn Gillmor authored
If kresd is configured to listen using TLS, but it has no credentials, it should fall back to generating ephemeral credentials and using them. It stores the ephemerally-generated secret key in the same directory as the cache, using the name "ephemeral_key.pem". If the cache persists, then the key will too, even if the daemon dies. This means that any set of daemons that share a cache will also share an ephemeral secret key. The ephemeral X.509 certificate that corresponds to the key will be automatically generated (self-signed), will have a lifetime of about 90 days (matching Let's Encrypt policy). The ephemeral cert is never written to disk; it is always dynamically-generated by kresd. This should make it very easy to get DNS-over-TLS working in opportunistic mode.
-
Daniel Kahn Gillmor authored
This can be useful for scheduling checks in the future, for logging when we're using an expired cert, requesting a new cert, refreshing an ephemeral cert, etc.
-
- Dec 19, 2016
-
-
Ondřej Surý authored
-
Ondřej Surý authored
-
Motivation: maintaining these by hand in kres.lua is tricky, as just inserting or reordering the structures can do anything and isn't detected in general. For example, `rr_array_t::at` has always "missed a star". A couple libknot structure fields have apparently changed name since the old definitions were written; in most cases I renamed them in *.lua. The file daemon/lua/kres-gen.lua will be regenerated only if explicitly deleted. That requires building with debug symbols and gdb on $PATH.
-
- Dec 12, 2016
-
-
Vladimír Čunát authored
Now that we renamed "debug" to "verbose", the old name didn't seem very suitable anymore; this new identifier haven't got to master yet.
-
Ondřej Surý authored
Split NDEBUG to NDEBUG (asserts) and NOVERBOSELOG (verbose logging); rename all related symbols to use VERBOSE instead of DEBUG
-
- Dec 07, 2016
-
-
Vladimír Čunát authored
... but don't raise any kind of error. The lua function `verbose()` behaved reasonably already. It doesn't warn, but docs for the function do mention `NLOGDEBUG`.
-
Vladimír Čunát authored
In particular, don't require to call an externally defined function to find if in --verbose mode or not. Now it's just an extern bool. I'm confident the performance impact of not using -DNLOGDEBUG should be negligible now. This comes with a small incompatible API+ABI change, but that shouldn't matter as we've had a couple of those already since the last release.
-
- Dec 02, 2016
-
-
Vladimír Čunát authored
Fixes https://github.com/CZ-NIC/knot-resolver/issues/35.
-
- Nov 30, 2016
-
-
Vladimír Čunát authored
This reverts commit 64f80706. TL;DR: it brought almost no benefits AFAIK and potential for problems. The "portable bytecode" produced by luajit isn't compatible when (lib)luajit version changes or when some build-time configuration of it changes. If you mix these up, kresd fails to start.
-