- Apr 02, 2020
-
-
Vladimír Čunát authored
DENY, DENY_MSG, DROP, REFUSE and TC will now clear the _selected RRs. I believe that's what people usually expect of these actions anyway.
-
Tomas Krizek authored
modules/meson.build: move test definitions closer to modules See merge request !971
-
Vladimír Čunát authored
-
Vladimír Čunát authored
Closes #553.
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Tomas Krizek authored
-
Tomas Krizek authored
Previously, all those actions caused resolver to return SERVFAIL, because the lua code failed to evaluate. Notably, deny action now properly returns NXDOMAIN instead of SERVFAIL. The drop action still returns SERVFAIL.
-
Tomas Krizek authored
-
Old favicon used Knot DNS colors (dark blue) instead of Knot Resolver colors (light blue).
-
Rule ID is a number, not a string.
-
consensus() function is affected by https://gitlab.labs.nic.cz/knot/knot-resolver/issues/554 so this fix helps only with single-instance scenarios.
-
Tomas Krizek authored
tests: revert broken commits in Deckard repo See merge request !970
-
Petr Špaček authored
I don't know why exactly it fails ... let's unblock release.
-
- Apr 01, 2020
-
-
Vladimír Čunát authored
-
From our TCP benchmarks, values over 128 don't seem to have any measurable benefits, even with hundreds of thousands of connections. On the contrary, during very high TCP and CPU load, smaller backlog seems to dramatically improve latency for clients that keep idle TCP connections. During normal/low load, smaller backlog doesn't seem to have any benefits. When measured against "aggressive" clients that immediately close the TCP connection once their query is answered, backlog smaller than 128 was measured to hurt performance. The application's backlog size is ultimately limited by net.core.somaxconn, which has been set to 128 prior to Linux 5.4. Therefore, this change only affects newer kernels and those who have manually set this value to a higher size. For more, see https://gitlab.labs.nic.cz/knot/knot-resolver/-/merge_requests/968
-
Vladimír Čunát authored
-
Petr Špaček authored
lua resolve(): correctly include EDNS0 in the virtual packet See merge request !963
-
- Mar 31, 2020
-
-
Petr Špaček authored
Deckard does not support these and it leads to confusing errors. In long term we need to migrate Deckard to different network backend: https://gitlab.labs.nic.cz/knot/deckard/issues/42
-
- Mar 27, 2020
-
-
Vladimír Čunát authored
The new allocation approach isn't perfectly optimal, but it seems relatively easy to understand and handles OOM conditions OK (I think).
-
- Mar 26, 2020
-
-
Vladimír Čunát authored
-
Vladimír Čunát authored
-
Petr Špaček authored
-
- Mar 25, 2020
-
-
Petr Špaček authored
This new approach uses per-request variables in Lua and creates new callback for each DEBUG_IF call instead of each request.
-
Petr Špaček authored
Intended usage: Quick resolution attempt with an empty cache. export QNAME=... export QTYPE=... sudo -E docker run -e QNAME -e QTYPE krestest:latest '-n' '-c' '/etc/knot-resolver/kresd.conf'
-
Petr Špaček authored
It creates new callback functions for every request which uses "callback chaining" but these should be rare.
-
Petr Špaček authored
It seems there is no reason to keep this function private in policy module.
-
Petr Špaček authored
It did not log through request->trace_log and is not very useful anyway.
-
Petr Špaček authored
-