]>
git.ipfire.org Git - thirdparty/pdns.git/log
Robert Schwartz [Sat, 10 Sep 2022 14:21:20 +0000 (10:21 -0400)]
fix typo
Peter van Dijk [Fri, 9 Sep 2022 22:37:22 +0000 (00:37 +0200)]
Merge pull request #11920 from omoerbeek/auth-gsstsig-followup
auth: Fix CID
1497843 : Execution cannot reach this statement
Otto Moerbeek [Fri, 9 Sep 2022 15:15:38 +0000 (17:15 +0200)]
Merge pull request #11890 from omoerbeek/rec-dnskey-failure-insecure
rec: Failure to retrieve DNSKEYs of an Insecure zone should not be fatal.
Otto Moerbeek [Wed, 31 Aug 2022 08:34:18 +0000 (10:34 +0200)]
Failure to retrieve DNSKEYs of an Insecure zone should not be fatal.
This issue happens if a record set is signed even though the zone
itself is Insecure. Syncres then tries to retrieve DNSKEYs and a
timeout on that would lead to an ImmediateServFailException.
Only throw exception later in validateRecordsWithSigs, after checking
zone cuts, when we are sure the zone is Secure.
Otto Moerbeek [Fri, 9 Sep 2022 13:18:02 +0000 (15:18 +0200)]
Merge pull request #11776 from omoerbeek/rec-serve-stale2
Rec: serve stale
Peter van Dijk [Fri, 9 Sep 2022 08:12:37 +0000 (10:12 +0200)]
Merge pull request #11918 from mind04/auth-api-nsec3parm
auth: api, nsec3param improvements
Peter van Dijk [Fri, 9 Sep 2022 07:56:51 +0000 (09:56 +0200)]
Merge pull request #11919 from mind04/auth-gcc-warning
auth: fix gcc warning
Otto Moerbeek [Fri, 9 Sep 2022 06:45:14 +0000 (08:45 +0200)]
Typos in comments
Otto Moerbeek [Mon, 11 Jul 2022 13:25:48 +0000 (15:25 +0200)]
Add a comment block describing how serve-stale works
Plus docs and a few tweaks
Otto Moerbeek [Mon, 11 Jul 2022 11:55:58 +0000 (13:55 +0200)]
Basic serve-stale test
Otto Moerbeek [Mon, 11 Jul 2022 11:55:22 +0000 (13:55 +0200)]
Add a setNow() method to SyncRes for cache debugging/testing purposes
Otto Moerbeek [Fri, 8 Jul 2022 11:49:34 +0000 (13:49 +0200)]
When refreshing, consider entries being served stale as *really* stale
Otto Moerbeek [Mon, 4 Jul 2022 07:54:09 +0000 (09:54 +0200)]
Negcache serve-stale
This commit also disables some of the ecs changes, as it was causing a unit-test failure.
Otto Moerbeek [Fri, 1 Jul 2022 11:03:29 +0000 (13:03 +0200)]
Make serve stale more robust by making the view of the record cache
and SyncRes consistent: remove the > 5 for the ttl test in SyncRes
glue access code.
Plus fix a few record cache get flags
Otto Moerbeek [Wed, 29 Jun 2022 09:46:51 +0000 (11:46 +0200)]
Make serveStale a field instead of a parameter passed around
Otto Moerbeek [Wed, 29 Jun 2022 09:19:06 +0000 (11:19 +0200)]
Change main serve stale loop to catch exception
Otto Moerbeek [Wed, 29 Jun 2022 09:03:14 +0000 (11:03 +0200)]
Handle serve stale for infra queries
Otto Moerbeek [Tue, 14 Jun 2022 13:42:41 +0000 (15:42 +0200)]
Implementation of serve-stale from record cache.
If a resolve fails, we try it again with serveStale is true. If
serveStale is true or a record is already being server stale, the
record cache is willing to produce (and extend the ttd) of stale
records. It wil also keep a count of the extensions, to be able to
limit those and trigger a task te refresh once every while.
If we (potentially) serve stale, we are less aggessive evicting
stale records from the record cache.
Enable by setting server-stale-extensions (default 0). The unit is
30s. So a value of 2880 will keep serving the record for 24 hours, even
if it cannot be refreshed. If the original ttl of a record is less than 30,
the extension unit will be that ttl.
Otto Moerbeek [Tue, 14 Jun 2022 10:14:15 +0000 (12:14 +0200)]
Move from a few booleans to flags for MemRecursorCache::get()
Otto Moerbeek [Fri, 9 Sep 2022 07:27:23 +0000 (09:27 +0200)]
Merge pull request #11904 from omoerbeek/rec-sample-ns2
rec: For zones having many NS records take a sample
Otto Moerbeek [Fri, 9 Sep 2022 07:11:06 +0000 (09:11 +0200)]
Fix CID
1497843 : Execution cannot reach this statement
Followup to #11143.
Not a bug per se, but the unreachable code should be guarded by proper #ifdef
Kees Monshouwer [Thu, 8 Sep 2022 20:50:31 +0000 (22:50 +0200)]
auth: fix gcc warning
Kees Monshouwer [Thu, 8 Sep 2022 15:01:33 +0000 (17:01 +0200)]
auth: api, nsec3param improvements
Peter van Dijk [Thu, 8 Sep 2022 09:21:49 +0000 (11:21 +0200)]
Merge pull request #11508 from klaus-nicat/soa-check-skip-doflag
New setting compare-signatures-on-zone-freshness-check to disable DO flag for SOA checks
Peter van Dijk [Thu, 8 Sep 2022 09:20:29 +0000 (11:20 +0200)]
Merge pull request #11860 from omoerbeek/auth-macos-libcrypto
Auth: fix libcrypto handling in automake files
Peter van Dijk [Thu, 8 Sep 2022 07:03:07 +0000 (09:03 +0200)]
Merge pull request #11858 from mind04/auth-sdig-swap
auth: change sdig output order
Peter van Dijk [Thu, 8 Sep 2022 07:00:46 +0000 (09:00 +0200)]
Merge pull request #11143 from omoerbeek/gssapi
auth: Reintroduce GSS-TSIG processing
Peter van Dijk [Thu, 8 Sep 2022 06:58:44 +0000 (08:58 +0200)]
Merge pull request #11908 from mind04/auth-zonecache-init
auth: initialize zone cache after dropping privileges
Otto Moerbeek [Tue, 6 Sep 2022 07:50:52 +0000 (09:50 +0200)]
For zones having many NS records, we are not interested in all so take a sample.
Otto Moerbeek [Wed, 7 Sep 2022 08:13:36 +0000 (10:13 +0200)]
Merge pull request #11906 from omoerbeek/rec-auth-padding
rec: Implement padding of (DoT) messages to auth
Otto Moerbeek [Wed, 7 Sep 2022 07:59:13 +0000 (09:59 +0200)]
Merge pull request #11800 from fredmorcos/log-fix
Log socket directory
Remi Gacogne [Wed, 7 Sep 2022 07:57:31 +0000 (09:57 +0200)]
Merge pull request #11862 from rgacogne/unfck-openssl-3
libssl: Properly load ciphers and digests with OpenSSL 3.0
Kees Monshouwer [Tue, 6 Sep 2022 13:52:51 +0000 (15:52 +0200)]
auth: initialize zone cache after dropping privileges
Otto Moerbeek [Tue, 6 Sep 2022 14:02:25 +0000 (16:02 +0200)]
Docs and setting (edns-padding-out, defaults to "yes").
Otto Moerbeek [Tue, 6 Sep 2022 11:30:21 +0000 (13:30 +0200)]
Implement padding of (DoT) messages to auth
Remi Gacogne [Mon, 5 Sep 2022 07:38:49 +0000 (09:38 +0200)]
Merge pull request #11889 from FredericDT/master
dnsdist: Add local ComboAddress parameter for SBind() at TeeAction()
Otto Moerbeek [Fri, 2 Sep 2022 12:33:31 +0000 (14:33 +0200)]
Adapt update policy load to new loadFile semantics, which throws on error.
Otto Moerbeek [Fri, 2 Sep 2022 10:39:32 +0000 (12:39 +0200)]
More strict ENABLE_GSS_TSIG #ifdefs and checking of g_doGSSTSIG.
In some (low level) code, g_doGSSTSIG cannot be used as the code is shared betwen various executables,
but the functionality should be conditional in the higher level processing.
This is a bit tricky to get right, so carefull checks needed.
Peter van Dijk [Fri, 25 Mar 2022 13:16:19 +0000 (14:16 +0100)]
spelling, review comments
Otto Moerbeek [Mon, 10 Jan 2022 11:38:36 +0000 (12:38 +0100)]
libgss is not needed for build (it provides yet another gssapi implementation), but we use the kerberos provided one.
Found out when trying to build for centos7.
Otto Moerbeek [Fri, 7 Jan 2022 09:36:20 +0000 (10:36 +0100)]
Reinstate AXFR code for GSS-TSIG, respecting global enable flag.
Otto Moerbeek [Fri, 7 Jan 2022 08:14:21 +0000 (09:14 +0100)]
Kill string leaks in processError
Otto Moerbeek [Wed, 5 Jan 2022 12:21:56 +0000 (13:21 +0100)]
Documentation updates: new runtime switch and some clarification for configuring zones.
Otto Moerbeek [Wed, 5 Jan 2022 12:21:43 +0000 (13:21 +0100)]
Add feature printing so it's more easy to check if GSS-TSIG is compiled in.
Otto Moerbeek [Wed, 5 Jan 2022 11:49:45 +0000 (12:49 +0100)]
If the update policy Lua file cannot be read, don't fall back to allow-all policy.
Otto Moerbeek [Tue, 4 Jan 2022 15:10:46 +0000 (16:10 +0100)]
Start kerberos services using docker for regression tests.
Otto [Tue, 4 Jan 2022 13:22:22 +0000 (14:22 +0100)]
Answer can be nullptr, so test for it to avoid null deref.
Otto [Tue, 4 Jan 2022 08:52:30 +0000 (09:52 +0100)]
Add --enable-experimental-gss-tsig for auth build in CI.
Otto Moerbeek [Mon, 3 Jan 2022 16:15:53 +0000 (17:15 +0100)]
Introduce runtime switch `enable-gss-tsig` so that GSS-TSIG is disabled by default even if it is compiled in.
Otto Moerbeek [Mon, 3 Jan 2022 14:28:24 +0000 (15:28 +0100)]
Be more strict on conditional compiling (#ifdef ENABLE_GSS_TSIG), fixing non ENABLE_GSS_TSIG builds.
Otto Moerbeek [Fri, 24 Dec 2021 12:10:29 +0000 (13:10 +0100)]
Add helper to get map counts and remove unneeded error function.
Otto Moerbeek [Tue, 7 Dec 2021 16:07:43 +0000 (17:07 +0100)]
Revert of 9385 (which removed GSS_TSIG functionality) and rebase to master
Reformat according to project settings
We prefer C++ style casts and change NULL into nullptr
Move includes from gss_context.hh to gss_context.cc if possible, remove unused ones and move from boost::shared_ptr to std::shared_ptr.
Protect access to global maps by a mechanic translation to use
LockGuarded. The scopes of the locks should be verified, they might need
to be wider!
Otto Moerbeek [Fri, 2 Sep 2022 11:25:08 +0000 (13:25 +0200)]
Merge pull request #11896 from omoerbeek/rec-11881-followup
Fix build if dnstap is not enabled
Otto Moerbeek [Fri, 2 Sep 2022 10:27:53 +0000 (12:27 +0200)]
Fix build if dnstap is not enabled
Remi Gacogne [Fri, 2 Sep 2022 09:35:22 +0000 (11:35 +0200)]
Merge pull request #11883 from rgacogne/ddist-optional-rings
dnsdist: Make recording queries/responses in the ringbuffers optional
Peter van Dijk [Fri, 2 Sep 2022 07:24:03 +0000 (09:24 +0200)]
Merge pull request #11836 from Habbie/catalog-column-order
auth catalog zones: simplify migration schemas by appending columns
Fred Morcos [Fri, 2 Sep 2022 06:53:49 +0000 (08:53 +0200)]
Merge pull request #11823 from fredmorcos/handle-lua-script-loading-errors
Handle Lua script loading errors
Remi Gacogne [Thu, 1 Sep 2022 12:22:30 +0000 (14:22 +0200)]
dnsdist: Deprecated setRingBuffersLockRetries()
Fred Morcos [Wed, 3 Aug 2022 11:34:01 +0000 (13:34 +0200)]
Cleanup
Fred Morcos [Wed, 3 Aug 2022 11:32:54 +0000 (13:32 +0200)]
Formatting
Fred Morcos [Wed, 3 Aug 2022 11:09:38 +0000 (13:09 +0200)]
Handle file-related errors when loading Lua scripts
Peter van Dijk [Thu, 1 Sep 2022 07:34:44 +0000 (09:34 +0200)]
Merge pull request #11813 from zeha/webnoversion
auth/rec web: stop sending Server: header
Peter van Dijk [Thu, 1 Sep 2022 05:41:17 +0000 (07:41 +0200)]
Merge pull request #11891 from Habbie/no-install-recommends
builder: add --no-install-recommends to apt-get install
Peter van Dijk [Wed, 31 Aug 2022 10:47:25 +0000 (12:47 +0200)]
builder: add --no-install-recommends to apt-get install
This was triggered by Ubuntu Kinetic pulling in a version of
systemd-resolved that breaks inside Docker. systemd-resolved
is an indirect (via Recommends somewhere) dependency of devscripts,
which we need.
However, if we were relying on Recommends, that was a bug, so I'm
applying the flag to all distributions.
FredericDT [Wed, 31 Aug 2022 09:53:47 +0000 (17:53 +0800)]
Not saving ComboAddress d_local in class TeeAction this time
Accoding to https://github.com/PowerDNS/pdns/pull/11889
> rgacogne
> Since we only use the local address in the constructor, I don't think we need to keep it around?
>
> FredericDT
> Possibly using that d_local in statistical function?
>
> rgacogne
> I would prefer not keeping it for now, we can always add it back later when we actually decide to do something with it :)
Signed-off-by: FredericDT <frederic.dt.twh@gmail.com>
FredericDT [Wed, 31 Aug 2022 08:09:22 +0000 (16:09 +0800)]
Commit docs in pdns/dnsdistdist/docs/rules-actions.rst
The optional parameter `local` shall be added in version 1.8.0
Signed-off-by: FredericDT <frederic.dt.twh@gmail.com>
FredericDT [Wed, 31 Aug 2022 08:02:19 +0000 (16:02 +0800)]
Drop setLocalBindAddress bool parameter, pass
boost::optional<ComboAddress> instead.
According to https://github.com/PowerDNS/pdns/pull/11889
> An extra boolean flag is no needed for boost::optional<x>
Thanks Moerbeek and Gacogne
Signed-off-by: FredericDT <frederic.dt.twh@gmail.com>
FredericDT [Wed, 31 Aug 2022 01:54:04 +0000 (09:54 +0800)]
dnsdist: Commit TeeAction optional local parameter docs and console
keywords
Signed-off-by: FredericDT <frederic.dt.twh@gmail.com>
FredericDT [Tue, 30 Aug 2022 12:34:35 +0000 (20:34 +0800)]
Add local ComboAddress parameter for SBind() at TeeAction()
Uasge:
`addAction(AllRule(), TeeAction("192.0.2.54", false, "192.0.2.53"))`
In which case, "192.0.2.54" is the ComboAddress of receiver, "192.0.2.53"
is the ComboAddress of sender.
Signed-off-by: FredericDT <frederic.dt.twh@gmail.com>
Remi Gacogne [Tue, 30 Aug 2022 15:38:30 +0000 (17:38 +0200)]
Merge pull request #11839 from rgacogne/ddist-ebpf-apparmor-memlock
dnsdist: Document that AppArmor can impact eBPF operations
Otto Moerbeek [Mon, 29 Aug 2022 10:51:50 +0000 (12:51 +0200)]
Merge pull request #11848 from omoerbeek/rec-throttled-maxqperq
rec: Also check qperq limit if throttling happened, as it increases counters.
Otto Moerbeek [Mon, 29 Aug 2022 10:14:10 +0000 (12:14 +0200)]
Merge pull request #11867 from omoerbeek/rec-control-version
rec_control: test for "--version" before requiring an argument.
Peter van Dijk [Mon, 29 Aug 2022 08:15:30 +0000 (10:15 +0200)]
Merge pull request #11882 from fredmorcos/fred/11731-fix-pdnsutil-query-logging-segfault
Log "NULL" for nullptr-bound properties instead of dereferencing
Otto Moerbeek [Fri, 26 Aug 2022 14:36:11 +0000 (16:36 +0200)]
Merge pull request #11881 from omoerbeek/pb-queueData-log
Reorganize protobuf queueData() with respect to logging
Otto Moerbeek [Fri, 26 Aug 2022 13:02:46 +0000 (15:02 +0200)]
Proces review comments by rgacogne, thanks!
Remi Gacogne [Tue, 16 Aug 2022 15:07:14 +0000 (17:07 +0200)]
dnsdist: Make recording queries/responses in the ringbuffers optional
Fred Morcos [Wed, 24 Aug 2022 21:13:49 +0000 (23:13 +0200)]
Log "NULL" for nullptr-bound properties instead of dereferencing
Fixes the issue where pdnsutil would segfault when query logging is enabled, and would
leave the db unmodified. Surprisingly, the segfault only happened on FreeBSD.
Fixes #11731
Otto Moerbeek [Wed, 24 Aug 2022 07:56:26 +0000 (09:56 +0200)]
Reorganize queueData() with respect to logging.
Let queueData() return a status and log that via a program supplied helper.
This way, the program specific (recursor,dnsdist) logging isn't polluting the common code.
There are a few other cases that need to be dealt with some day.
dnsdist log levels should be reviewed (I copied the existing), they might be too verbose.
Peter van Dijk [Tue, 23 Aug 2022 14:21:36 +0000 (16:21 +0200)]
use TEXT consistently between pg schema and migration
Peter van Dijk [Tue, 23 Aug 2022 14:19:31 +0000 (16:19 +0200)]
do sqlite migration without temp table
Otto Moerbeek [Tue, 23 Aug 2022 14:15:54 +0000 (16:15 +0200)]
Merge pull request #11878 from omoerbeek/rec-psa-2022-02-tweaks
PSA 2022-02 tweaks and add PR#'s
Otto Moerbeek [Tue, 23 Aug 2022 11:36:02 +0000 (13:36 +0200)]
PSA 2022-02 tweaks and add PR#'s
Otto Moerbeek [Tue, 23 Aug 2022 10:17:02 +0000 (12:17 +0200)]
Merge pull request #11874 from omoerbeek/rec-pb-size
Rec: check protobuf size
Otto Moerbeek [Tue, 23 Aug 2022 09:55:38 +0000 (11:55 +0200)]
Merge pull request #11873 from omoerbeek/rec-prep-
20220823
Rec prep
20220823
Otto Moerbeek [Tue, 23 Aug 2022 09:50:34 +0000 (11:50 +0200)]
Apply suggestions from code review
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
Otto Moerbeek [Fri, 5 Aug 2022 08:21:01 +0000 (10:21 +0200)]
Check variable length cases to not create protobufs > max / 2
Otto Moerbeek [Wed, 3 Aug 2022 09:33:02 +0000 (11:33 +0200)]
Check sizes of generated protobuf messages
Otto Moerbeek [Tue, 23 Aug 2022 07:13:56 +0000 (09:13 +0200)]
Merge pull request #11869 from omoerbeek/rec-maintenance-metrics
rec: Keep time and count metrics when maintenance is called.
Otto Moerbeek [Mon, 22 Aug 2022 12:00:15 +0000 (14:00 +0200)]
Add 2022-02 PSA
Otto Moerbeek [Mon, 22 Aug 2022 12:50:03 +0000 (14:50 +0200)]
These metrics are counters
Co-authored-by: Remi Gacogne <github@coredump.fr>
Peter van Dijk [Mon, 22 Aug 2022 12:43:35 +0000 (14:43 +0200)]
Merge pull request #11842 from mind04/auth-remotes
auth: use getInnerRemote() for the remotes ring
Peter van Dijk [Mon, 8 Aug 2022 13:51:50 +0000 (15:51 +0200)]
auth catalog zones: simplify migration schemas by appending columns
Otto Moerbeek [Mon, 22 Aug 2022 11:52:03 +0000 (13:52 +0200)]
Fix MIB, it was missing the objects defs.
Otto Moerbeek [Mon, 22 Aug 2022 09:40:38 +0000 (11:40 +0200)]
rec: Keep time and count metrics when maintenance is called.
Fixes #6981
Otto Moerbeek [Mon, 22 Aug 2022 08:30:44 +0000 (10:30 +0200)]
rec_control: test for "--version" before requiring an argument.
Fixes #11864
Otto Moerbeek [Mon, 22 Aug 2022 07:29:57 +0000 (09:29 +0200)]
Prep for August 23 2022 releases
Otto Moerbeek [Mon, 22 Aug 2022 06:49:34 +0000 (08:49 +0200)]
Merge pull request #11849 from omoerbeek/rec-dns64-vs-rcode
Rec: consider dns64 processing in more cases than Rcode == NoError
Otto Moerbeek [Mon, 22 Aug 2022 05:52:13 +0000 (07:52 +0200)]
Merge pull request #11859 from omoerbeek/rec-incfiles
rec: only include minimized js files and remove unused underscore*.js
Otto Moerbeek [Fri, 19 Aug 2022 10:01:16 +0000 (12:01 +0200)]
Two more DNS64 test cases: "timeout on AAAA" and "Lua handled things"
Remi Gacogne [Fri, 19 Aug 2022 07:37:48 +0000 (09:37 +0200)]
Merge pull request #11819 from darnuria/auth-tsan-supp
[tsan] add data race suppression for avg_latency and send_latencyres …