^^^^^^^
- The monitor command **set** no longer allows the changing of
- non-existent variables.
+ nonexistent variables.
- IBM Universal Database DB2 backend now included in source
distribution (untested!)
- Oracle backend now included in source distribution (slightly tested!)
S.declare(
"xfr-queue", "Size of the queue of zones to be XFRd", [](const string&) { return Communicator.getSuckRequestsWaiting(); }, StatType::gauge);
S.declareDNSNameQTypeRing("queries", "UDP Queries Received");
- S.declareDNSNameQTypeRing("nxdomain-queries", "Queries for non-existent records within existent zones");
+ S.declareDNSNameQTypeRing("nxdomain-queries", "Queries for nonexistent records within existent zones");
S.declareDNSNameQTypeRing("noerror-queries", "Queries for existing records, but for type we don't have");
S.declareDNSNameQTypeRing("servfail-queries", "Queries that could not be answered due to backend errors");
S.declareDNSNameQTypeRing("unauth-queries", "Queries for zones that we are not authoritative for");
- 'Make install' when an existing configuration file contained a 'fork'
statement has been fixed. Spotted by Darren Gamble, code in `commit
1534 <http://wiki.powerdns.com/projects/trac/changeset/1534>`__.
-- Reloading a non-existent allow-from-file caused the control thread to
+- Reloading a nonexistent allow-from-file caused the control thread to
stop working. Spotted by Imre Gergely, code in `commit
1532 <http://wiki.powerdns.com/projects/trac/changeset/1532>`__.
- Parser got confused by reading en empty line in auth-forward-zones.
if (!d_init) {
filesystem::path p(cachedir);
if (!exists(p))
- throw PDNSException("NODDB setCacheDir specified non-existent directory: " + cachedir);
+ throw PDNSException("NODDB setCacheDir specified nonexistent directory: " + cachedir);
else if (!is_directory(p))
throw PDNSException("NODDB setCacheDir specified a file not a directory: " + cachedir);
d_cachedir = cachedir;
if (d_doRings) {
auto it = d_rings.find(name);
if (it == d_rings.end()) {
- throw runtime_error("Attempting to account to non-existent ring '"+std::string(name)+"'");
+ throw runtime_error("Attempting to account to nonexistent ring '"+std::string(name)+"'");
}
it->second.lock()->account(item);
if (d_doRings) {
auto it = d_comboRings.find(name);
if (it == d_comboRings.end()) {
- throw runtime_error("Attempting to account to non-existent comboRing '"+std::string(name)+"'");
+ throw runtime_error("Attempting to account to nonexistent comboRing '"+std::string(name)+"'");
}
it->second.lock()->account(item);
}
if (d_doRings) {
auto it = d_dnsnameqtyperings.find(name);
if (it == d_dnsnameqtyperings.end()) {
- throw runtime_error("Attempting to account to non-existent dnsname+qtype ring '"+std::string(name)+"'");
+ throw runtime_error("Attempting to account to nonexistent dnsname+qtype ring '"+std::string(name)+"'");
}
it->second.lock()->account(std::make_tuple(dnsname, qtype));
}
def testNoData(self):
self.wipe()
- # first we query a non-existent type, to get the NSEC in our cache
+ # first we query a nonexistent type, to get the NSEC in our cache
entries = self.getMetric('aggressive-nsec-cache-entries')
res = self.sendQuery('host1.secure.example.', 'TXT')
self.assertRcodeEqual(res, dns.rcode.NOERROR)
def testNXD(self):
self.wipe()
- # first we query a non-existent name, to get the needed NSECs (name + widcard) in our cache
+ # first we query a nonexistent name, to get the needed NSECs (name + widcard) in our cache
entries = self.getMetric('aggressive-nsec-cache-entries')
hits = self.getMetric('aggressive-nsec-cache-nsec-hits')
res = self.sendQuery('host2.secure.example.', 'TXT')
def testWildcard(self):
self.wipe()
- # first we query a non-existent name, but for which a wildcard matches,
+ # first we query a nonexistent name, but for which a wildcard matches,
# to get the NSEC in our cache
res = self.sendQuery('test1.wildcard.secure.example.', 'A')
expected = dns.rrset.from_text('test1.wildcard.secure.example.', 0, dns.rdataclass.IN, 'A', '{prefix}.10'.format(prefix=self._PREFIX))
def testNXD(self):
self.wipe()
- # first we query a non-existent name, to get the needed NSEC3s in our cache
+ # first we query a nonexistent name, to get the needed NSEC3s in our cache
res = self.sendQuery('host2.secure.example.', 'TXT')
self.assertRcodeEqual(res, dns.rcode.NXDOMAIN)
self.assertAnswerEmpty(res)
self.assertAuthorityHasSOA(res)
self.assertMessageIsAuthenticated(res)
- # we query a non-existent name, but for which a wildcard matches,
+ # we query a nonexistent name, but for which a wildcard matches,
# to get the NSEC3 in our cache
res = self.sendQuery('test5.wildcard.secure.example.', 'A')
expected = dns.rrset.from_text('test5.wildcard.secure.example.', 0, dns.rdataclass.IN, 'A', '{prefix}.10'.format(prefix=self._PREFIX))
-This test tries to resolve a non-existent DS at apex
+This test tries to resolve a nonexistent DS at apex
-Minimal zone (only NS records) Make sure non-existent hosts generates a correct
+Minimal zone (only NS records) Make sure nonexistent hosts generates a correct
NSEC(3) denial.