- Aug 10, 2018
-
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Tomas Krizek authored
-
- Aug 07, 2018
-
-
Tomas Krizek authored
ci: add curl to debian-stable, skip respdiff See merge request !647
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Petr Špaček authored
fixup! fixup! ci: do not re-run tests on master, use nightly instead See merge request !646
-
Petr Špaček authored
Oh well, this is nightmare to debug.
-
Petr Špaček authored
fixup! ci: do not re-run tests on master, use nightly instead See merge request !645
-
Petr Špaček authored
-
Petr Špaček authored
ci: do not re-run tests on master, use nightly instead See merge request !644
-
Petr Špaček authored
All tests are executed before merge and we allow only fast-forward merges so it is pointless to re-run them again on merge commit. Code coverage and OBS will be done on auto-synchornized nightly branch.
-
Petr Špaček authored
trust anchors: use parallel-safe temporary name See merge request !643
-
Vladimír Čunát authored
Previously multiple kresd processes might use the same .lock file at once and thus have a race between writing and renaming. That could happen relatively often if starting many instances *at once*.
-
Petr Špaček authored
ci: fixes and optimizations See merge request !641
-
Replaced by a visually recognizable dummy value, for simplicity. These were introduced in commits: cache: don't require cached NS for aggresive answers cache closest_NS(): factor out the inside of a loop
-
Petr Špaček authored
Sometimes, for a unknown reason, coverage computation fails in Deckard pipeline: $ MAKEFLAGS="--jobs $(nproc)" make coverage-c coverage-lua COVERAGE_STAGE=gcov-deckard 2>&1 | grep -vE '(source file is newer than notes file)|(the message is displayed only once per source file)' lcov: Need one of options -z, -c, -a, -e, -r, -l, --diff or --summary Use lcov --help to get usage information coverage.mk:15: recipe for target 'coverage-c' failed make: *** [coverage-c] Error 255 This is now normally disabled not to interfere with normal development.
-
Petr Špaček authored
-
Petr Špaček authored
This helps with debugging.
-
-
Petr Špaček authored
nitpicks: comment + unused variables See merge request !642
-
Vladimír Čunát authored
I forgot to squash this before 2.4.1; better late than never.
-
Vladimír Čunát authored
These happen with -DNDEBUG only, and clang detects them (not gcc 7).
-
- Aug 06, 2018
-
-
Petr Špaček authored
zimport nitpick: fix printing of uint64_t See merge request !640
-
Vladimír Čunát authored
Equality to `unsigned long` is not guaranteed, and was getting us warnings on macos (maybe it's not equal there). Also reduce the overlong lines.
-
Petr Špaček authored
ci: run respdiff jobs See merge request !638
-
-
- Aug 03, 2018
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
The catch is that during configuration file processing, no cache is open (yet), as kresd can't know if the config does open it in some later part (with non-default path or size). Now we just throw an error. Exceptions: - cache.open() and cache.backends(), of course :-) - cache.ns_tout() - not required, it's not really inside cache - cache.close() - it sounds reasonable to allow "closing a closed cache" This immediately caught a typo in cache metatable.
-
- Aug 02, 2018
-
-
Tomas Krizek authored
update NEWS, version and deckard See merge request !637
-
Vladimír Čunát authored
-
(cherry picked from commit 54797e88)
-
Tomas Krizek authored
cache: fix TTL overflow in packet due to min_ttl See merge request knot/knot-resolver-security!8
-
- `min_ttl()` enforces packet being alive longer than original TTL of some records; but - the packet is copied to cache as it was. Resolution: just serve packet the same but with those record's TTLs remaining at zero.
-
Tomas Krizek authored
validate: additional bailiwick checks See merge request knot/knot-resolver-security!9
-
Let's use this as another layer of defense against our internal bugs.
-
Tomas Krizek authored
layer/iterate: fix cache injection via CNAME See merge request knot/knot-resolver-security!7
-
The current default mode doesn't check bailiwick anymore when unrolling CNAME chains, so if an answer contains: ``` testingme.com. 3600 IN CNAME victim.com. victim.com. 172800 IN NS attackers.ns ``` The resolver will cache both records as authoritative even though `victim.com` isn't in the current bailiwick. This was previously checked in 79d9931d, but removed in refactoring.
-