]>
git.ipfire.org Git - thirdparty/pdns.git/log
Remi Gacogne [Wed, 30 Jun 2021 13:26:57 +0000 (15:26 +0200)]
rec: Appease the formatting gods (negcache.hh)
Otto [Fri, 25 Jun 2021 09:16:04 +0000 (11:16 +0200)]
Change the static lock() method of MemRecursorCache to be an instance
method of MapCombo. Likewise for negcache.
Remi Gacogne [Wed, 16 Jun 2021 15:41:26 +0000 (17:41 +0200)]
Document how our wrappers around mutexes work
Remi Gacogne [Wed, 16 Jun 2021 15:31:38 +0000 (17:31 +0200)]
rec: Do not require taking the lock to know the size of a cache
Remi Gacogne [Tue, 25 May 2021 07:52:32 +0000 (09:52 +0200)]
dnsdist: Remove unused mutex include
Remi Gacogne [Thu, 20 May 2021 07:12:25 +0000 (09:12 +0200)]
rec: Store the carbon configuration in a StateHolder
Remi Gacogne [Thu, 20 May 2021 06:38:59 +0000 (08:38 +0200)]
rec: Convert the dynmetrics to LockGuarded
Remi Gacogne [Thu, 20 May 2021 06:23:31 +0000 (08:23 +0200)]
rec: Move the record caches to LockGuarded (WIP: size() should not need a lock)
Remi Gacogne [Wed, 19 May 2021 10:57:09 +0000 (12:57 +0200)]
Rename the lock() method to write_lock() for shared mutexes
Remi Gacogne [Mon, 10 May 2021 16:19:14 +0000 (18:19 +0200)]
rec: Move the NOD code to LockGuarded
Remi Gacogne [Mon, 10 May 2021 15:57:53 +0000 (17:57 +0200)]
rec: Convert RPZ loader stats to LockGuarded
Remi Gacogne [Fri, 7 May 2021 16:29:04 +0000 (18:29 +0200)]
rec: Convert the aggressive NSEC cache to LockGuarded
Remi Gacogne [Fri, 7 May 2021 09:10:33 +0000 (11:10 +0200)]
dnsdist: Convert remaining Action mutexes to LockGuarded
Remi Gacogne [Fri, 7 May 2021 09:09:38 +0000 (11:09 +0200)]
LockGuarded: Add move constructors
Remi Gacogne [Fri, 30 Apr 2021 13:53:30 +0000 (15:53 +0200)]
dnsdist: Convert most of the remaining locks to LockGuarded
Remi Gacogne [Fri, 30 Apr 2021 13:53:00 +0000 (15:53 +0200)]
Convert the StateHolder to LockGuarded
Remi Gacogne [Fri, 30 Apr 2021 13:52:12 +0000 (15:52 +0200)]
dnsdist: Convert CDBKVStore to SharedLockGuarded
Remi Gacogne [Fri, 30 Apr 2021 13:51:35 +0000 (15:51 +0200)]
dnsdist: Convert the dynamic blocks topN to LockGuarded
Remi Gacogne [Fri, 30 Apr 2021 13:51:00 +0000 (15:51 +0200)]
dnsdist: Convert ConcurrentConnectionManager to LockGuarded
Remi Gacogne [Fri, 30 Apr 2021 13:50:09 +0000 (15:50 +0200)]
dnsdist: Convert GnuTLSTicketsKey to SharedLockGuarded
Remi Gacogne [Fri, 30 Apr 2021 13:49:34 +0000 (15:49 +0200)]
dnsdist: Convert the web server configuration to LockGuarded
Remi Gacogne [Fri, 30 Apr 2021 13:48:58 +0000 (15:48 +0200)]
dnsdist: Convert the TCP client counts map to LockGuarded
Remi Gacogne [Fri, 30 Apr 2021 13:48:26 +0000 (15:48 +0200)]
dnsdist: Convert DynBPF to LockGuarded
Remi Gacogne [Fri, 30 Apr 2021 13:47:41 +0000 (15:47 +0200)]
dnsdist: Convert the Packet Cache to SharedLockGuarded
Remi Gacogne [Fri, 30 Apr 2021 13:46:02 +0000 (15:46 +0200)]
dnsdist: Convert DNSCrypt to SharedLockGuarded
Remi Gacogne [Fri, 30 Apr 2021 13:43:25 +0000 (15:43 +0200)]
speedtest: Add tests for LockGuarded
Remi Gacogne [Fri, 30 Apr 2021 13:42:10 +0000 (15:42 +0200)]
Add SharedLockGuarded, a read-write lock version of LockGuarded
Remi Gacogne [Fri, 16 Apr 2021 13:40:34 +0000 (15:40 +0200)]
dnsdist: Move the Lua mutex to LockGuarded
Remi Gacogne [Fri, 16 Apr 2021 13:39:53 +0000 (15:39 +0200)]
dnsdist: Move the ring buffers to LockGuarded
Remi Gacogne [Fri, 16 Apr 2021 13:39:18 +0000 (15:39 +0200)]
Move the remote logger class to LockGuarded
Remi Gacogne [Fri, 16 Apr 2021 13:38:55 +0000 (15:38 +0200)]
dnsdist: Move the eBPF filter class to LockGuarded
Remi Gacogne [Fri, 16 Apr 2021 13:34:50 +0000 (15:34 +0200)]
Introduce LockGuarded, a lock-protected data
The general idea has been borrowed from Rust's locks: instead of
defining two objects, the one to be protected, T, and the lock, we
define a single LockGuarded<T> object which contains the object.
That provides two big advantages:
- it is immediately clear which data is protected by the lock
- that data simply can't be accessed without holding the lock.
Otto Moerbeek [Tue, 17 Aug 2021 09:43:14 +0000 (11:43 +0200)]
Merge pull request #10546 from omoerbeek/rec-dns64-metrics
rec: Add dns64 metrics
Otto Moerbeek [Tue, 17 Aug 2021 07:42:10 +0000 (09:42 +0200)]
Merge pull request #10602 from omoerbeek/rec-drop-after-preresolve
rec: Process policy and potential Drop action after Lua hooks
Remi Gacogne [Tue, 17 Aug 2021 07:37:34 +0000 (09:37 +0200)]
Merge pull request #10647 from rgacogne/decaf-polymorphic-exception
Fix a warning about catching a polymorphic exception type by value
Remi Gacogne [Mon, 16 Aug 2021 08:01:04 +0000 (10:01 +0200)]
Fix a warning about catching a polymorphic exception type by value
```
decafsigners.cc: In member function ‘virtual bool DecafED25519DNSCryptoKeyEngine::verify(const string&, const string&) const’:
decafsigners.cc:140:11: warning: catching polymorphic type ‘class decaf::CryptoException’ by value [-Wcatch-value=]
140 | } catch(CryptoException) {
| ^~~~~~~~~~~~~~~
decafsigners.cc: In member function ‘virtual bool DecafED448DNSCryptoKeyEngine::verify(const string&, const string&) const’:
decafsigners.cc:276:11: warning: catching polymorphic type ‘class decaf::CryptoException’ by value [-Wcatch-value=]
276 | } catch(CryptoException) {
| ^~~~~~~~~~~~~~~
```
Remi Gacogne [Mon, 16 Aug 2021 07:03:36 +0000 (09:03 +0200)]
Merge pull request #10640 from Habbie/dnsdist-docs-grepq
dnsdist docs: clarify grepq num parameter
Peter van Dijk [Tue, 10 Aug 2021 13:18:45 +0000 (15:18 +0200)]
Merge pull request #10642 from Habbie/checkkey-null-error
checkKey: handle NULL error string from OpenSSL more gracefully
Peter van Dijk [Tue, 10 Aug 2021 11:56:25 +0000 (13:56 +0200)]
checkKey: handle NULL error string from OpenSSL more gracefully
fixes #10641
Otto Moerbeek [Tue, 10 Aug 2021 09:49:06 +0000 (11:49 +0200)]
Merge pull request #10639 from omoerbeek/rec-tfo-update
rec: Google is working to fix their TFO issues on their DNS servers
Peter van Dijk [Tue, 10 Aug 2021 07:52:47 +0000 (09:52 +0200)]
dnsdist docs: clarify grepq num parameter
Otto [Tue, 10 Aug 2021 07:22:52 +0000 (09:22 +0200)]
Google is working to fix their TFO issues on their DNS servers
Otto Moerbeek [Mon, 9 Aug 2021 06:19:43 +0000 (08:19 +0200)]
Merge pull request #10627 from omoerbeek/rec-policy-rm-race
rec: Check in more places if the policy has been updated before using or modifying it.
Otto [Fri, 6 Aug 2021 10:08:24 +0000 (12:08 +0200)]
Handle policy hit after nodata nxdomain Lua hooks and add
regression test for those two and the preresolve case.
Otto Moerbeek [Fri, 6 Aug 2021 09:42:57 +0000 (11:42 +0200)]
Merge pull request #10634 from omoerbeek/rec-macos-kqueue-and-fixes
Move MacOS to kqueue and assorted compile fixes
Otto [Fri, 6 Aug 2021 08:26:41 +0000 (10:26 +0200)]
Move MacOS to kqueue and assorted compile fixes
Remi Gacogne [Thu, 5 Aug 2021 06:47:54 +0000 (08:47 +0200)]
Merge pull request #10626 from aj-gh/doc-dnsdist-setecsoverride
dnsdist: Document that setECSOverride has its drawbacks
Otto Moerbeek [Tue, 3 Aug 2021 11:48:49 +0000 (13:48 +0200)]
Merge pull request #10623 from omoerbeek/rec-tcp-states
Rec: make all PacketIDs shared_ptr
Otto [Tue, 3 Aug 2021 08:32:57 +0000 (10:32 +0200)]
Add test case and comments
Andreas Jakum [Tue, 3 Aug 2021 07:56:50 +0000 (09:56 +0200)]
dnsdist: Document that setECSOverride has drawbacks under certain conditions.
Remi Gacogne [Tue, 3 Aug 2021 07:42:42 +0000 (09:42 +0200)]
Merge pull request #10601 from steffann/master
Document setTag(Response)Action behaviour
Otto [Tue, 3 Aug 2021 07:08:09 +0000 (09:08 +0200)]
Check in more places if the config policy has been updated before
using or modifying it.
Otto [Mon, 2 Aug 2021 12:15:53 +0000 (14:15 +0200)]
Use explicit PacketIDCompare
Otto [Mon, 2 Aug 2021 07:50:10 +0000 (09:50 +0200)]
When using equal_range with a different compare function than the one used by the index, it
should be consistent with the way the index is ordered.
In particular PacketIDBirthdayCompare did not agree with operator< for PacketIDs
Otto [Tue, 27 Jul 2021 12:29:23 +0000 (14:29 +0200)]
Move to a shared PacketID
There is an issue with equal_range() in asendto() that I fixed with an extra
test for the moment.
Otto [Tue, 27 Jul 2021 07:57:16 +0000 (09:57 +0200)]
Add FD to TCPLOG lines
Remi Gacogne [Sun, 1 Aug 2021 15:19:14 +0000 (17:19 +0200)]
Merge pull request #10525 from rgacogne/ddist-lmdb-range
dnsdist: Add support for range-based lookups into a Key-Value store
Otto Moerbeek [Fri, 30 Jul 2021 09:46:59 +0000 (11:46 +0200)]
Merge pull request #10616 from omoerbeek/rec-prep-4.4.5-and-4.5.5
rec: Prep for rec-4.4.5 and rec-4.5.5
Peter van Dijk [Thu, 29 Jul 2021 22:08:07 +0000 (00:08 +0200)]
Merge pull request #10572 from pieterlexis/dockerignore
docker: ignore compiled files
Peter van Dijk [Thu, 29 Jul 2021 22:07:36 +0000 (00:07 +0200)]
Merge pull request #10607 from peterthomassen/patch-3
Document RFC 6742 types
Peter van Dijk [Thu, 29 Jul 2021 22:07:21 +0000 (00:07 +0200)]
Merge pull request #10610 from Habbie/auth-4.5-eol-update
auth: EOL update after 4.5 release
Peter van Dijk [Thu, 29 Jul 2021 21:56:32 +0000 (23:56 +0200)]
Merge pull request #10613 from Habbie/responsestats-type65535
auth: correct upper bounds on d_qtypecounters
Peter van Dijk [Wed, 28 Jul 2021 17:57:43 +0000 (19:57 +0200)]
Merge pull request #10595 from Habbie/auth45-upgradenotes-zonecache
auth 4.5 upgrade notes and settings: more words on the zone cache
Otto [Wed, 28 Jul 2021 11:16:23 +0000 (13:16 +0200)]
Prep for rec-4.4.5 and rec-4.5.5
Including a few 2->3 upgrades for known vulnerability status for auth
Otto Moerbeek [Wed, 28 Jul 2021 06:03:02 +0000 (08:03 +0200)]
Merge pull request #10587 from rgacogne/rec-aggressive-nsec3-ancestor
rec: Ancestor NSEC3s can only deny the existence of a DS
Otto Moerbeek [Wed, 28 Jul 2021 06:00:07 +0000 (08:00 +0200)]
Merge pull request #10570 from rgacogne/rec-hunt-cuts-on-bogus
rec: Make really sure we did not miss a cut on validation failure
Otto Moerbeek [Tue, 27 Jul 2021 14:10:11 +0000 (16:10 +0200)]
Merge pull request #10565 from Habbie/rec-non-apex-dnskey
rec: do not use DNSKEYs found below an apex for validation
Peter van Dijk [Mon, 26 Jul 2021 12:58:42 +0000 (14:58 +0200)]
auth 4.5.1 changelog: fix PR number
Peter van Dijk [Thu, 15 Jul 2021 13:47:18 +0000 (15:47 +0200)]
correct upper bounds on d_qtypecounters
Peter van Dijk [Mon, 26 Jul 2021 12:28:18 +0000 (14:28 +0200)]
Merge pull request #10612 from Habbie/auth-sec-2021-01
auth-4.5.1: advisory, changelog, secpoll
Peter van Dijk [Fri, 23 Jul 2021 10:35:25 +0000 (12:35 +0200)]
auth-4.5.1: advisory, changelog, secpoll
Peter van Dijk [Thu, 22 Jul 2021 08:03:10 +0000 (10:03 +0200)]
auth: EOL update after 4.5 release
Peter van Dijk [Fri, 16 Jul 2021 17:54:00 +0000 (19:54 +0200)]
auth 4.5 upgrade notes and settings: more words on the zone cache
Peter Thomassen [Wed, 21 Jul 2021 19:17:14 +0000 (21:17 +0200)]
Document RFC 6742 types
Otto [Tue, 20 Jul 2021 12:10:18 +0000 (14:10 +0200)]
Process potential Drop action after preresolve Lua hook.
Sander Steffann [Tue, 20 Jul 2021 11:02:41 +0000 (13:02 +0200)]
Document setTag(Array) behaviour
Explicitly document that setTag and setTagArray do not overwrite existing tag values.
Sander Steffann [Tue, 20 Jul 2021 10:50:19 +0000 (12:50 +0200)]
Document setTag(Response)Action behaviour
Explicitly document that setTagAction and setTagResponseAction do not overwrite existing tag values.
Remi Gacogne [Fri, 9 Jul 2021 12:21:04 +0000 (14:21 +0200)]
dnsdist: Document that range-based lookups expect addresses in network byte order
Also document that tags are always created on a lookup, even when the
key does not exist. It's a bit weird but we should probably not change
that right now.
Remi Gacogne [Thu, 24 Jun 2021 16:07:00 +0000 (18:07 +0200)]
dnsdist: Add support for range-based lookups into a Key-Value store
This feature allows doing a range-based lookup (mostly useful for IP addresses), assuming that:
- there is a key for the last element of the range (2001:0db8:ffff:ffff:ffff:ffff:ffff:ffff for 2001:db8::/32)
which contains the first element of the range (2001:0db8:0000:0000:0000:0000:0000:0000) followed by any data in the value
- AND there is no overlapping ranges in the database !!
This requires that the underlying store supports ordered keys, which is true for LMDB but not for CDB, for example.
Remi Gacogne [Tue, 20 Jul 2021 08:57:23 +0000 (10:57 +0200)]
Merge pull request #10520 from rgacogne/ddist-kvs-lmdb-dbi
dnsdist: Don't look up the LMDB dbi by name for every query
Remi Gacogne [Tue, 20 Jul 2021 08:55:50 +0000 (10:55 +0200)]
Merge pull request #10501 from rgacogne/ddist-per-thread-lua-ffi
dnsdist: Add support for Lua per-thread FFI rules and actions
Remi Gacogne [Mon, 19 Jul 2021 14:41:27 +0000 (16:41 +0200)]
rec: Fix wrong comments in the Aggressive NSEC cache unit tests
Otto Moerbeek [Mon, 19 Jul 2021 10:10:30 +0000 (12:10 +0200)]
Merge pull request #10571 from Habbie/rec-warnings
rec: fix some compiler warnings
Otto Moerbeek [Mon, 19 Jul 2021 09:07:47 +0000 (11:07 +0200)]
Merge branch 'master' into rec-warnings
Remi Gacogne [Fri, 16 Jul 2021 08:09:03 +0000 (10:09 +0200)]
rec: Fix formatting in test-aggressive_nsec_cc.cc
Peter van Dijk [Tue, 13 Jul 2021 17:32:25 +0000 (19:32 +0200)]
Merge pull request #10588 from jsoref/master-spelling-0.0.19
Upgrade check-spelling to v0.0.19
Remi Gacogne [Tue, 13 Jul 2021 16:29:50 +0000 (18:29 +0200)]
rec: The root denies its own DS with a NSEC(3)s from the child zone
Remi Gacogne [Tue, 13 Jul 2021 14:57:40 +0000 (16:57 +0200)]
rec: Check that NSEC(3)s from the child zone are not used to deny the DS
Remi Gacogne [Tue, 13 Jul 2021 12:55:47 +0000 (14:55 +0200)]
rec: Fix the NSEC3 ancestor check for DS in the aggressive cache
Remi Gacogne [Tue, 13 Jul 2021 09:56:00 +0000 (11:56 +0200)]
rec: Ancestor NSEC3s can only deny the existence of a DS
Before that commit, the aggressive NSEC(3) cache could have
mistakenly used NSEC3s from the parent zone to prove that a given
name in the child zone did not exist, which is incorrect.
It happened because we did not properly detect that the NSEC3 for
the closest encloser was an ancestor NSEC3 indicating a delegation,
and then in the unlikely but possible case that we found a NSEC3
from the parent zone whose hashes covered the next closer we wrongly
concluded that the name did not exist, returning a NXDomain with an
invalid proof of denial.
Peter van Dijk [Tue, 13 Jul 2021 11:05:28 +0000 (13:05 +0200)]
Merge pull request #10581 from Habbie/auth-4.5.0-secpoll-docs
auth-4.5.0: secpoll and docs
Josh Soref [Tue, 13 Jul 2021 07:30:54 +0000 (03:30 -0400)]
Upgrade check-spelling to v0.0.19
Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
Peter van Dijk [Mon, 12 Jul 2021 13:02:42 +0000 (15:02 +0200)]
Merge pull request #10583 from Habbie/mibs-local-range
SNMP: allocate local-use ranges for traps and trapObjects
Peter van Dijk [Mon, 12 Jul 2021 12:18:15 +0000 (14:18 +0200)]
SNMP: allocate local-use ranges for traps and trapObjects
Peter van Dijk [Mon, 12 Jul 2021 10:43:35 +0000 (12:43 +0200)]
auth-4.5.0: secpoll and docs
Peter van Dijk [Mon, 12 Jul 2021 11:12:58 +0000 (13:12 +0200)]
Merge pull request #10487 from Habbie/docs-texlive
build docs using the texlive image
Peter van Dijk [Mon, 12 Jul 2021 10:00:45 +0000 (12:00 +0200)]
Merge pull request #10568 from Habbie/auth-bind-no-sqlite3
auth: allow building bindbackend without sqlite3
Remi Gacogne [Mon, 12 Jul 2021 08:10:18 +0000 (10:10 +0200)]
Merge pull request #10578 from natesales/natesales/fix-dnsdist-docs
fix: dnsdist docs quickstart typo
Nate Sales [Mon, 12 Jul 2021 01:47:09 +0000 (18:47 -0700)]
fix: dnsdist docs quickstart typo
Otto Moerbeek [Fri, 9 Jul 2021 14:42:39 +0000 (16:42 +0200)]
Merge pull request #10576 from omoerbeek/log-qtype-tostring
Zap a few redundant toString() method call for logging qtype names