Split CLI for managed and unmanaged trust anchor modes
Original interface with single -k
option whose behavior
depended on file permissions was confusing.
Closes #145 (closed): Added two separate command line argument for keyfile for managed and unmanaged mode. Removed setting based on folder and file permission.
Closes #168 (closed):
Added makefile variable KEYFILE_DEFAULT
to specify default keyfile,
which is used when no other keyfile is specified.
This is mainly useful for distributions which skip root keys.
Merge request reports
Activity
- Resolved by Vladimír Čunát
changed milestone to %1.4.0
- Resolved by Petr Špaček
- Resolved by Vladimír Čunát
- Resolved by Petr Špaček
added 9 commits
- cac63b1b...3c1d9d6e - 5 commits from branch
master
- 4b716fd1 - keyfile argument distiguish managed and unmanaged mode
- 187fd7f7 - compile time option to specify default keyfile
- 4e79eb64 - default keyfile set in Lua code
- 759200b7 - keyfile: update doc, help and manpage
Toggle commit list- cac63b1b...3c1d9d6e - 5 commits from branch
- Resolved by Vladimír Čunát
- Resolved by Vladimír Čunát
- Resolved by Vladimír Čunát
- Resolved by Vitezslav Kriz
Actually, I'm thinking again on the naming, because it might be slightly confusing ATM. The "unmanaged" mode in our case currently really differs only in changes not being persisted in any file, but otherwise it's 5011-managed the same way. (Of course, in default settings changes need a month to apply, so without persisting the timers there probably won't be too much practical difference.)
Maybe
--keyfile-readonly
or--keyfile-ro
. Or keep the name and change the semantics of-K
to really static anchors, i.e. cmdline equivalents of http://knot-resolver.readthedocs.io/en/latest/daemon.html#c.trust_anchors.add (In docs the parameter isn't even called confusingly "unmanaged" like in code but "readonly" :-)@vcunat Thank you for bringing this up!
I see my comments within the TA code aren't sufficient to explain such things, unfortunately.
One advantage is that for completely unmanaged TAs it's very easy to support mixing multiple TA owner names within a single file – we can simply read the whole file and push the string into
trust_anchors.add
. (It won't guard for managed TAs overwriting those later, but I don't think that's needed.)