- Aug 10, 2021
-
-
The logs can be triggered from policy actions, in per-request fashion: - they're on LOG_DEBUG level but always sent, regardless of log config - those messages will show double group tags: "[reqdbg][foo ]" (but they lack proper meta-data - about location of the log's origin) - reqdbg is *in addition* to normal logs, so the lines may be duplicated if that's how the logging was configured
-
- Jul 29, 2021
- Jun 23, 2021
-
-
Perhaps this bug was now more pronounced since 5.3.0 changes. Example problem was disabling minimization or 0x20 (globally or for some problematic requests); without this change they would get re-enabled during some fallback actions... which might be exactly the wrong moment wrt. the motivation to setting these. https://gitter.im/CZ-NIC/knot-resolver?at=60a221e86a950f3d46ed1cd9
-
- Feb 08, 2021
-
-
Vladimír Čunát authored
- return SOA in NODATA answers and allow customizing it - only call ensure_answer() if really generating an answer (otherwise we might e.g. deplete XDP buffers, in extreme cases)
-
- Dec 31, 2020
- Nov 10, 2020
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
This amends commit 99e014ac.
-
- Oct 21, 2020
-
-
Vladimír Čunát authored
For now I was too afraid to use "multi-flag" kr_request::state, so I kept it at _FAIL; anyone can recognize it by NULL answer anyway. Lua wrapper: using exception was considered but didn't seem good. I utilized the fact that modules can return nil meaning no state change.
-
Vladimír Čunát authored
FIXME: see FIXMEs in diff, document the API change, re-review.
-
- Jun 30, 2020
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
... by allowing .rdata to be a table. Larger RRsets seem useful.
-
Vladimír Čunát authored
- use parser-detected $ORIGIN instead of looking at SOA owner - skip records outside $ORIGIN (and warn) instead of nesting them - simplify a bit, and tweak warnings
-
Vladimír Čunát authored
Also utilize table indexing. This was a "regression" from extending RPZ support in 5.1.0. NS and SOA are even mandatory, as RPZ is supposed to be a valid zone: https://tools.ietf.org/html/draft-ietf-dnsop-dns-rpz-00#section-2
-
- Apr 14, 2020
- Apr 02, 2020
-
-
Vladimír Čunát authored
Some rules need it and it was nil until now.
-
Vladimír Čunát authored
DENY, DENY_MSG, DROP, REFUSE and TC will now clear the _selected RRs. I believe that's what people usually expect of these actions anyway.
-
- Mar 25, 2020
-
-
Petr Špaček authored
This new approach uses per-request variables in Lua and creates new callback for each DEBUG_IF call instead of each request.
-
Petr Špaček authored
It creates new callback functions for every request which uses "callback chaining" but these should be rare.
-
Petr Špaček authored
It seems there is no reason to keep this function private in policy module.
-
Petr Špaček authored
-
Petr Špaček authored
DEBUG_IF accepts user-supplied function which decides which requests should be logged.
-
Petr Špaček authored
Attempt to avoid duplicating ten lines in debug_logfinish_cb lead me to splitting kr_log_qverbose_impl into two functions kr_log_q and kr_log_req. This is another minor change to API exposed to modules.
-
Petr Špaček authored
Formerly both logs used slightly different formats and duplicated code. From now on verbose log and request tracing are generated using the same code. This required a small change to request trace_log_f definition so it might affect external modules.
-
- Mar 09, 2020
-
-
Tomas Krizek authored
-
- Feb 25, 2020
-
-
These files did not have GNU GPL v3 boilderplate in them so I've added machine readable tag with appropriate license.
-
- Jan 23, 2020
-
-
Vladimír Čunát authored
In finish() phase DONE is (almost?) always set, so it didn't make sense. The mistake came from c16728f5 !678.
-
- Dec 20, 2019
- Dec 02, 2019
-
-
Running the full special-domain checks is relatively expensive.
-
- Nov 28, 2019
-
-
Vladimír Čunát authored
I've never seen anyone use postrules.
-
- Sep 20, 2019
-
-
- home.arpa.: 4. from https://tools.ietf.org/html/rfc8375#section-4 - local.: 4. from https://tools.ietf.org/html/rfc6762#section-22.1 Well, it's just an approximation... if the user specifies a forwarding policy, any special names will also get forwarded, even though the RFC says not to. And this code will also reply NXDOMAIN to home.arpa. DS. Some of these DENY rules are perhaps unnecessary, but for now we keep the same approach. For arguments see the MR 855 thread and linked ML.
-
- Aug 05, 2019
-
-
Tomas Krizek authored
-