- Sep 07, 2016
-
-
Vladimír Čunát authored
As noted in #94, it feels natural to call it like: ``net.listen({net.lo, '192.168.1.1'})`` Also, minor fixes were done in that function and corresponding docs.
-
- Aug 05, 2016
-
-
Ondřej Surý authored
-
Ondřej Surý authored
-
Marek Vavruša authored
there are cases where switches or middle-boxes block DNS/UDP answers >512 octets completely, this gives user an option to mitigate that. however, there are authoritatives serving large answers that don't support TCP, so it's a compromise as always
-
Jan Včelák authored
-
- Jul 20, 2016
-
-
Ondřej Surý authored
-
Marek Vavruša authored
there are cases where switches or middle-boxes block DNS/UDP answers >512 octets completely, this gives user an option to mitigate that. however, there are authoritatives serving large answers that don't support TCP, so it's a compromise as always
-
- Jul 16, 2016
-
-
Daniel Kahn Gillmor authored
-
- Jul 11, 2016
-
-
Vladimír Čunát authored
-
- Jul 06, 2016
-
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
this allows for efficient variable-interval running events, so that the timer doesn't have to be closed and recreated for each iteration
-
- May 23, 2016
-
-
Marek Vavruša authored
this allows embedding other event loops or just asynchronous events triggered by socket activity. this is required for things like cooperative HTTP server, monitoring endpoint or remote configuration daemon/controller
-
- May 20, 2016
-
-
Marek Vavruša authored
this change introduces new API for cache backends, that is a subset of knot_db_api_t from libknot with several cache-specific operations major changes are: * merged 'cachectl' module into 'cache' as it is 99% default-on and it simplifies things * not transaction oriented, transactions may be reused and cached for higher performance * scatter/gather API, this is important for latency and performance of non-local backends like Redis * faster and reliable cache clearing * cache-specific operations (prefix scan, ...) in the API not hacked in * simpler code for both backends and caller
-
- May 03, 2016
-
-
Marek Vavruša authored
* daemon now processes messages over TCP stream out-of-order and concurrently * support for TCP_DEFER_ACCEPT * support for TCP Fast-Open * there are now deadlines for TCP for idle/slow streams (to prevent slowloris; pruning) * there is now per-request limit on timeouts (each request is allowed 4 timeouts before bailing) * faster request closing, unified retry/timeout timers * rare race condition in timer closing fixed
-
- Apr 18, 2016
-
-
Marek Vavruša authored
the daemon has now three modes of strictness checking from strict to permissive. it reflects the tradeoff between resolving the query in as few steps as possible and security for insecure zones
-
- Apr 07, 2016
-
-
Marek Vavruša authored
-
- Apr 06, 2016
-
-
Marek Vavruša authored
new trust anchors variables: * trust_anchors.hold_down_time = 30 * day * trust_anchors.refresh_time = nil * trust_anchors.keep_removed = 0 these could be used to control how often should root trust anchors be checked and how many removed keys should be kept in log (0 by default)
-
- Apr 04, 2016
-
-
Tomáš Hozza authored
Signed-off-by:
Tomas Hozza <thozza@redhat.com>
-
- Mar 30, 2016
-
-
Marek Vavruša authored
-
- Mar 29, 2016
-
-
Marek Vavruša authored
-
Marek Vavruša authored
addition to previous generic socket activation fixes #11
-
Marek Vavruša authored
daemon can accept existing fds on command line, thus supporting process managers like circus or upstart. a tiny supervisor script is attached
-
- Feb 03, 2016
-
-
Marek Vavruša authored
-
- Jan 30, 2016
-
-
Marek Vavruša authored
-
Marek Vavruša authored
-
- Jan 22, 2016
-
-
Marek Vavruša authored
the second parameter to resolve() callback function is request (kres.request_t), so the caller can look into request stats, timing and zone cut data
-
- Dec 10, 2015
-
-
Marek Vavruša authored
-
- Dec 08, 2015
-
-
Marek Vavruša authored
-
- Dec 05, 2015
-
-
Marek Vavruša authored
if the root key file doesn’t exist, it will be populated from root DNSKEY query, which will be validated against root trust anchors retrieved over HTTPS with IANA cert verification against built-in current IANA cert CA. it requires luasocket and luasec for it to work. trust anchors XML file signature is not checked, as there’s no facility for PKCS7 checking yet.
-
- Oct 18, 2015
-
-
Marek Vavruša authored
-
- Oct 08, 2015
-
-
Marek Vavruša authored
-
- Oct 07, 2015
-
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
effectively enables/disables usage of given IP protocol for subrequests (the server can still listen on these)
-
- Oct 02, 2015
-
-
Marek Vavruša authored
-
- Oct 01, 2015
-
-
Marek Vavruša authored
-
- Sep 30, 2015
-
-
Marek Vavruša authored
-
Marek Vavruša authored
-
- Sep 28, 2015
-
-
Marek Vavruša authored
-