- Apr 23, 2018
-
-
Wrapping the error code in a structure preserves both the numeric value and the ability to convert it into textual format.
-
Previous implementation forgot to clear the compression table, which is an internal structure to packet. So when a recycled packet was reused, it compared owners of newly inserted records with dangling pointers left in the compression table. This is less of a problem in query processing, as each packet uses a memory pool, so the pointed names were never deallocated, but it would write out wrong compression pointers because the compression table kept pointing into packet that was now cleared and reused for something else. It is more of a problem with packets created without a memory pool, as the compression table kept references to memory that was already freed.
-
This is generally useful for parsing records from packet, as they are broken into individual RRs that need reassembling.
-
This adds metatype wrappers for kr_cache_insert_rr and kr_cache_sync for the cache metatype, and tests.
-
This updates the metatype to wrap knot_rrset_add_rdata and knot_rrset_init_empty in a nicer way, and adds automatic GC destructor and tests.
-
Before the API depended on the qry object which only makes sense during resolution of requests, not when manipulating cache out of it.
-
Vladimír Čunát authored
This commit abstracts out stash_rrset from stash_rrarray_entry, and fixes incrementing metrics on actual record insertion. It then resurfaces kr_cache_insert_rr that was deleted in 2.0 using the extracted function. vcunat separated stash_rrset_precond() later during rebase.
-
Vladimír Čunát authored
Closes #334 and #336
-
Vladimír Čunát authored
- TLS errors were mentioned twice - the option mode wasn't changed, just a static function name
-
Vladimír Čunát authored
They didn't work locally for me, at least.
-
Petr Špaček authored
Release 2.3.0 Closes #334 and #336 See merge request knot/knot-resolver-security!3
-
Petr Špaček authored
-
Inspired by Marek's MR.
-
The NULL is never tested, and it was breaking our usual iteration pattern.
-
This is an attempt to fix two problems: 1. kresd tries to close incoming TCP connection too early. This may lead to multiple client reconnections. This problem primarily affects TCP/TLS clients who send several queries over single TCP connection. 2. In certain circumstances outbound TCP connection doesn't timeout despite that fact that upstream doesn't send back any answers. This may lead to timeouts on non-problematic queries.
-
Petr Špaček authored
Handle RRs with non-Internet class and meta-types Closes #334 See merge request knot/knot-resolver-security!2
-
Petr Špaček authored
Refuse EDNS cookie requests if cookie module is missing Closes #336 See merge request knot/knot-resolver-security!4
-
Petr Špaček authored
Protection against slowlorris attack on autoritative side See merge request knot/knot-resolver-security!5
-
- Apr 20, 2018
-
-
Petr Špaček authored
serve_stale: log only in verbose mode See merge request !564
-
Petr Špaček authored
-
Tomas Krizek authored
distro/rpm: update dependency declarations to conform with pkg standards See merge request !563
-
Tomas Krizek authored
-
Tomas Krizek authored
distro/deb: add prefill module See merge request !562
-
Tomas Krizek authored
-
Petr Špaček authored
export a JSON decode function to lua See merge request !560
-
Since there is already a bundled JSON library, expose it to lua for modules to use.
-
- Apr 19, 2018
-
-
Petr Špaček authored
daemon/worker: separate counter for TLS sendings See merge request !557
-
-
- Apr 18, 2018
-
-
Petr Špaček authored
root zone import implementation See merge request !511
-
Petr Špaček authored
-