- Oct 20, 2021
- Aug 10, 2021
-
-
The logs can be triggered from policy actions, in per-request fashion: - they're on LOG_DEBUG level but always sent, regardless of log config - those messages will show double group tags: "[reqdbg][foo ]" (but they lack proper meta-data - about location of the log's origin) - reqdbg is *in addition* to normal logs, so the lines may be duplicated if that's how the logging was configured
-
- Jul 29, 2021
- Jun 23, 2021
-
-
Perhaps this bug was now more pronounced since 5.3.0 changes. Example problem was disabling minimization or 0x20 (globally or for some problematic requests); without this change they would get re-enabled during some fallback actions... which might be exactly the wrong moment wrt. the motivation to setting these. https://gitter.im/CZ-NIC/knot-resolver?at=60a221e86a950f3d46ed1cd9
-
- Feb 08, 2021
-
-
Vladimír Čunát authored
- return SOA in NODATA answers and allow customizing it - only call ensure_answer() if really generating an answer (otherwise we might e.g. deplete XDP buffers, in extreme cases)
-
- Dec 31, 2020
- Nov 10, 2020
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
This amends commit 99e014ac.
-
- Oct 21, 2020
-
-
Vladimír Čunát authored
For now I was too afraid to use "multi-flag" kr_request::state, so I kept it at _FAIL; anyone can recognize it by NULL answer anyway. Lua wrapper: using exception was considered but didn't seem good. I utilized the fact that modules can return nil meaning no state change.
-
Vladimír Čunát authored
FIXME: see FIXMEs in diff, document the API change, re-review.
-
- Jun 30, 2020
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
... by allowing .rdata to be a table. Larger RRsets seem useful.
-
Vladimír Čunát authored
- use parser-detected $ORIGIN instead of looking at SOA owner - skip records outside $ORIGIN (and warn) instead of nesting them - simplify a bit, and tweak warnings
-
Vladimír Čunát authored
Also utilize table indexing. This was a "regression" from extending RPZ support in 5.1.0. NS and SOA are even mandatory, as RPZ is supposed to be a valid zone: https://tools.ietf.org/html/draft-ietf-dnsop-dns-rpz-00#section-2
-
- Apr 14, 2020
- Apr 02, 2020
-
-
Vladimír Čunát authored
Some rules need it and it was nil until now.
-
Vladimír Čunát authored
DENY, DENY_MSG, DROP, REFUSE and TC will now clear the _selected RRs. I believe that's what people usually expect of these actions anyway.
-
- Mar 25, 2020
-
-
Petr Špaček authored
This new approach uses per-request variables in Lua and creates new callback for each DEBUG_IF call instead of each request.
-
Petr Špaček authored
It creates new callback functions for every request which uses "callback chaining" but these should be rare.
-
Petr Špaček authored
It seems there is no reason to keep this function private in policy module.
-
Petr Špaček authored
-
Petr Špaček authored
DEBUG_IF accepts user-supplied function which decides which requests should be logged.
-
Petr Špaček authored
Attempt to avoid duplicating ten lines in debug_logfinish_cb lead me to splitting kr_log_qverbose_impl into two functions kr_log_q and kr_log_req. This is another minor change to API exposed to modules.
-
Petr Špaček authored
Formerly both logs used slightly different formats and duplicated code. From now on verbose log and request tracing are generated using the same code. This required a small change to request trace_log_f definition so it might affect external modules.
-
- Mar 09, 2020
-
-
Tomas Krizek authored
-
- Feb 25, 2020
-
-
These files did not have GNU GPL v3 boilderplate in them so I've added machine readable tag with appropriate license.
-
- Jan 23, 2020
-
-
Vladimír Čunát authored
In finish() phase DONE is (almost?) always set, so it didn't make sense. The mistake came from c16728f5 !678.
-
- Dec 20, 2019
- Dec 02, 2019
-
-
Running the full special-domain checks is relatively expensive.
-
- Nov 28, 2019
-
-
Vladimír Čunát authored
I've never seen anyone use postrules.
-