]>
git.ipfire.org Git - thirdparty/pdns.git/log
Otto Moerbeek [Mon, 19 Feb 2024 10:05:32 +0000 (11:05 +0100)]
rec: dnspython's API changed wrt NSID, apply (version dependent) fix in regression test
See https://dnspython.readthedocs.io/en/stable/whatsnew.html 2.6.0 2nd bullet
Peter van Dijk [Thu, 15 Feb 2024 15:13:58 +0000 (16:13 +0100)]
Merge pull request #13803 from Habbie/lmdb-sync-mode
lmdb: remove mapasync mode, it was always a lie
Peter van Dijk [Thu, 15 Feb 2024 14:20:47 +0000 (15:20 +0100)]
Merge pull request #13802 from chbruyand/ixfrdist-coverity-
1534483
ixfrist: fix coverity report
1534483
Peter van Dijk [Thu, 15 Feb 2024 14:16:50 +0000 (15:16 +0100)]
lmdb: remove mapasync mode, it was always a lie
fixes #12888
Peter van Dijk [Thu, 15 Feb 2024 13:59:25 +0000 (14:59 +0100)]
Merge pull request #11431 from jroessler-ox/docs-kskzskroll-update
updated KSK and ZSK Rollover procedures, small fixes in Algorithm Rol…
Charles-Henri Bruyand [Thu, 15 Feb 2024 13:00:08 +0000 (14:00 +0100)]
ixfrist: fix coverity report
1534483
Peter van Dijk [Thu, 15 Feb 2024 12:00:01 +0000 (13:00 +0100)]
Merge pull request #13801 from chbruyand/ixfrdist-fix-centos-build
ixfrdist: fix centos build
Charles-Henri Bruyand [Thu, 15 Feb 2024 10:49:10 +0000 (11:49 +0100)]
ixfrdist: fix centos build
Peter van Dijk [Wed, 14 Feb 2024 19:10:27 +0000 (20:10 +0100)]
Merge pull request #13753 from chbruyand/ixfrdist-notify-out
ixfrdist: add support for outgoing notify
Peter van Dijk [Wed, 14 Feb 2024 19:07:46 +0000 (20:07 +0100)]
Merge pull request #13752 from chbruyand/auth-lua-pickchashed
auth: lua records, pickchashed function
Otto Moerbeek [Wed, 14 Feb 2024 12:11:27 +0000 (13:11 +0100)]
Merge pull request #13788 from omoerbeek/rec-ztc-regression
rec: fix the zoneToCache regression introduced by SA 2024-01
Otto Moerbeek [Wed, 14 Feb 2024 11:39:57 +0000 (12:39 +0100)]
Test ZTC with root zone
1. If code changes make the validation fail we want to know.
2. If root zone changes break something we want to know as well, this might even be more important than 1.
So I think we just have to accept the occasional network issues on GH.
Otto Moerbeek [Tue, 13 Feb 2024 15:55:10 +0000 (16:55 +0100)]
rec: fix the zoneToCache regression introduced by SA 2024-01
Test will follow
Remi Gacogne [Tue, 13 Feb 2024 16:35:46 +0000 (17:35 +0100)]
Merge pull request #13787 from omoerbeek/rec-regr-test-skip
rec: skip a few tests that depend on sidnlab's public test setup that no longer works
Otto Moerbeek [Tue, 13 Feb 2024 15:31:35 +0000 (16:31 +0100)]
rec: skip a few test that depend on sidnlab's public test setup that no longer works
Otto Moerbeek [Tue, 13 Feb 2024 13:41:19 +0000 (14:41 +0100)]
Merge pull request #13785 from omoerbeek/rec-prep-2024-01
rec: Prep for 2024-01 release
Otto Moerbeek [Tue, 13 Feb 2024 12:49:02 +0000 (13:49 +0100)]
Merge pull request #13781 from omoerbeek/rec-keytrap-public
rec: CVE-2023-50387 and CVE-2023-50868
Otto Moerbeek [Mon, 12 Feb 2024 10:19:09 +0000 (11:19 +0100)]
Prep for 2024-01
Remi Gacogne [Tue, 13 Feb 2024 10:44:35 +0000 (11:44 +0100)]
Merge pull request #13760 from rgacogne/ddist-doc-rules-mgmt
dnsdist: Refactor the rules (selectors and actions) documentation
Remi Gacogne [Tue, 13 Feb 2024 10:44:27 +0000 (11:44 +0100)]
Merge pull request #13780 from rgacogne/ddist-better-wording-setSuffixMatchRule
dnsdist: Clarify that setSuffixMatchRule blocks per suffix, not labels
Remi Gacogne [Tue, 13 Feb 2024 09:04:08 +0000 (10:04 +0100)]
dnsdist: Clarify that setSuffixMatchRule blocks per suffix, not labels
Remi Gacogne [Mon, 12 Feb 2024 09:54:21 +0000 (10:54 +0100)]
Merge pull request #13779 from rgacogne/ddist-coverity-
20240212
dnsdist: Fix performance inefficiencies reported by Coverity
Remi Gacogne [Mon, 12 Feb 2024 09:08:56 +0000 (10:08 +0100)]
dnsdist: Fix performance inefficiencies reported by Coverity
Reported by Coverity as 414759 and 414760:
> Performance inefficiencies (COPY_INSTEAD_OF_MOVE)
Otto Moerbeek [Sun, 11 Feb 2024 18:40:36 +0000 (19:40 +0100)]
Merge pull request #13778 from M0NsTeRRR/master
fix(doc): incorrect setting `query_local_address`
Ludovic Ortega [Sun, 11 Feb 2024 18:38:48 +0000 (19:38 +0100)]
fix: replace missing query_local_address
Ludovic Ortega [Sun, 11 Feb 2024 18:29:57 +0000 (19:29 +0100)]
fix(doc): incorrect setting `query_local_address`
Remi Gacogne [Fri, 9 Feb 2024 15:09:29 +0000 (16:09 +0100)]
Merge pull request #13774 from rgacogne/ddist-quiche-config-atomic-load
dnsdist: Fix a missing explicit atomic load of the Quiche configuration
Remi Gacogne [Fri, 9 Feb 2024 15:00:56 +0000 (16:00 +0100)]
Merge pull request #13771 from omoerbeek/dnsdist-lua-align
dnsdist: do not allocate 16-byte aligned objects through lua(jit)
Remi Gacogne [Fri, 9 Feb 2024 14:28:57 +0000 (15:28 +0100)]
dnsdist: Fix a missing explicit atomic load of the Quiche configuration
Reported by TSAN.
Charles-Henri Bruyand [Thu, 8 Feb 2024 13:20:45 +0000 (14:20 +0100)]
auth: lua-records, support cleaning old hashed entries
Charles-Henri Bruyand [Fri, 9 Feb 2024 12:27:38 +0000 (13:27 +0100)]
ixfrdist: clang-tidy cleanup
Charles-Henri Bruyand [Fri, 9 Feb 2024 10:27:22 +0000 (11:27 +0100)]
ixfrdist: add a simple test for outgoing notify
Charles-Henri Bruyand [Thu, 8 Feb 2024 15:11:14 +0000 (16:11 +0100)]
ixfrdist: add examples of notify out configuration
Charles-Henri Bruyand [Thu, 8 Feb 2024 14:46:16 +0000 (15:46 +0100)]
ixfrdist: clang-tidy cleanup
Charles-Henri Bruyand [Wed, 31 Jan 2024 17:22:50 +0000 (18:22 +0100)]
ixfrdist: send out notify
Otto Moerbeek [Fri, 9 Feb 2024 12:28:00 +0000 (13:28 +0100)]
rec: CVE-2023-50387 and CVE-2023-50868
Remi Gacogne [Fri, 9 Feb 2024 10:59:07 +0000 (11:59 +0100)]
Merge pull request #13759 from rgacogne/ddist-doc-tls-certificates
dnsdist: Improve the documentation around TLS certificates and keys
Charles-Henri Bruyand [Wed, 31 Jan 2024 13:25:34 +0000 (14:25 +0100)]
auth: fix typo in tests
Charles-Henri Bruyand [Wed, 31 Jan 2024 12:19:08 +0000 (13:19 +0100)]
auth: clang-tidy fixes
Charles-Henri Bruyand [Tue, 30 Jan 2024 15:30:18 +0000 (16:30 +0100)]
auth: tell spell check about pickchashed
Charles-Henri Bruyand [Tue, 30 Jan 2024 15:15:20 +0000 (16:15 +0100)]
auth: lua-records, add support for pickchashed function
Remi Gacogne [Fri, 9 Feb 2024 10:28:12 +0000 (11:28 +0100)]
dnsdist: Prevent useless allocation+copy in `setPoolServerPolicy`
Remi Gacogne [Fri, 9 Feb 2024 10:16:12 +0000 (11:16 +0100)]
dnsdist: Fix newServerPolicy, add regression tests for custom policies
Peter van Dijk [Fri, 9 Feb 2024 10:15:33 +0000 (11:15 +0100)]
Merge pull request #13391 from devicenull/master
Add Lua function to pick records via name hash
Otto Moerbeek [Thu, 8 Feb 2024 15:36:09 +0000 (16:36 +0100)]
Experiment
Remi Gacogne [Thu, 8 Feb 2024 14:58:38 +0000 (15:58 +0100)]
dnsdist: Fix an issue spotted by TSAN: we need to use atomic_load_explicit along with atomic_store_explicit
Remi Gacogne [Thu, 8 Feb 2024 14:36:55 +0000 (15:36 +0100)]
Merge pull request #13756 from rgacogne/ddist-xsk-doc-typos
dnsdist: Fix typos in the AF_XDP documentation
Remi Gacogne [Thu, 8 Feb 2024 14:31:55 +0000 (15:31 +0100)]
Merge pull request #13768 from rgacogne/ddist-maintenance-hook
dnsdist: Add a Lua maintenance hook
Remi Gacogne [Thu, 8 Feb 2024 14:31:09 +0000 (15:31 +0100)]
Merge pull request #13757 from rgacogne/ddist-coverty-warning-
20240201
dnsdist: Fix a warning reported by Coverity
Otto Moerbeek [Thu, 8 Feb 2024 14:28:24 +0000 (15:28 +0100)]
dnsdist: make sure we do not allocate 16-byte aligned objects through lua(jit)
luajit aligns only to 8 bytes by default, and some objects require
16 byte alignment.
Fixes #13766
Note that the static assert in LuaContext.hpp is commented out in
one case. This trips on some platforms, but does not seem to be
harmful right now.
The fundamental solution remains the have luajit agree with C++ on
minimal alignment of its allocators.
Remi Gacogne [Thu, 8 Feb 2024 14:23:25 +0000 (15:23 +0100)]
dnsdist: Delint the 'reloadCertificates' methods
Remi Gacogne [Thu, 8 Feb 2024 13:43:18 +0000 (14:43 +0100)]
dnsdist: Add a regression test for DoQ certs/keys reloading
Remi Gacogne [Thu, 8 Feb 2024 13:42:47 +0000 (14:42 +0100)]
dnsdist: Document certs/keys reloading for DoQ and DoH3
Remi Gacogne [Thu, 8 Feb 2024 13:42:04 +0000 (14:42 +0100)]
dnsdist: Implementation reloading of TLS certs/keys for DoQ and DoH3
Remi Gacogne [Thu, 8 Feb 2024 09:43:56 +0000 (10:43 +0100)]
dnsdist: Apply suggestions from code review, delint
Remi Gacogne [Thu, 8 Feb 2024 08:01:06 +0000 (09:01 +0100)]
Merge pull request #13755 from rgacogne/ddist-quic-unsupported-version
dnsdist: Better handling of short, non-initial QUIC headers
Remi Gacogne [Tue, 6 Feb 2024 15:22:49 +0000 (16:22 +0100)]
dnsdist: Clear the Lua maintenance callbacks before exiting
Remi Gacogne [Tue, 6 Feb 2024 15:20:17 +0000 (16:20 +0100)]
Merge pull request #13761 from rgacogne/ddist-test-ebpf
dnsdist: Add regression tests for eBPF blocks (static / dynamic)
Peter van Dijk [Tue, 6 Feb 2024 15:15:40 +0000 (16:15 +0100)]
Merge pull request #12359 from Habbie/auth-lua-dblookup
auth LUA: add dblookup function
Remi Gacogne [Tue, 6 Feb 2024 14:44:35 +0000 (15:44 +0100)]
dnsdist: Add a Lua maintenance hook
Having a hook that can accept multiple callbacks makes it a lot easier
to manage the execution of several, independant tasks that needs to be
called regularly.
Peter van Dijk [Fri, 1 Dec 2023 15:29:22 +0000 (16:29 +0100)]
fix formatting
Brian Rak [Thu, 30 Nov 2023 16:30:26 +0000 (16:30 +0000)]
Update minor code/doc nits
Brian Rak [Thu, 19 Oct 2023 13:36:15 +0000 (13:36 +0000)]
Appease lint
Brian Rak [Wed, 18 Oct 2023 20:09:30 +0000 (20:09 +0000)]
Fix typo
Brian Rak [Wed, 18 Oct 2023 01:24:08 +0000 (01:24 +0000)]
Add Lua function to pick records via name hash
This adds a Lua function to return a record based on a weighted hash
of the DNS record name. One use case here is to consistently return
the same IP address for a particular cache server based on what
subdomain is requesting the data.
Peter van Dijk [Tue, 6 Feb 2024 11:08:30 +0000 (12:08 +0100)]
code review from otto, thanks
Peter van Dijk [Tue, 6 Feb 2024 10:24:43 +0000 (11:24 +0100)]
Merge pull request #13743 from Habbie/auth-api-priority-error
auth API: reject priority element in record, closes #12657
Remi Gacogne [Mon, 5 Feb 2024 08:41:18 +0000 (09:41 +0100)]
dnsdist: Preserve 'LLVM_PROFILE_FILE' in sudo-enabled regression tests
Remi Gacogne [Thu, 1 Feb 2024 13:46:11 +0000 (14:46 +0100)]
dnsdist: Reduce the timeout on Dynamic Block tests expected to fail
Remi Gacogne [Thu, 1 Feb 2024 13:45:40 +0000 (14:45 +0100)]
dnsdist: Enable eBPF regression tests in our CI
Remi Gacogne [Thu, 1 Feb 2024 13:44:45 +0000 (14:44 +0100)]
dnsdist: Add regression tests for eBPF blocks (static / dynamic)
romeroalx [Fri, 2 Feb 2024 10:43:18 +0000 (11:43 +0100)]
Merge pull request #13764 from romeroalx/fix-build-ubuntu-noble
GH Actions: fix builds for ubuntu noble. Remove pkg usrmerge
romeroalx [Thu, 1 Feb 2024 23:35:28 +0000 (00:35 +0100)]
fix builds ubuntu noble. remove pkg usrmerge
Remi Gacogne [Thu, 1 Feb 2024 14:33:37 +0000 (15:33 +0100)]
dnsdist: Refactor the rules (selectors and actions) documentation
Remi Gacogne [Thu, 1 Feb 2024 11:16:56 +0000 (12:16 +0100)]
dnsdist: Improve the documentation around TLS certificates and keys
Remi Gacogne [Thu, 1 Feb 2024 09:00:19 +0000 (10:00 +0100)]
dnsdist: Fix a warning reported by Coverity
CID 414570 and CID 414569 (Uninitialized variables) are false
positives as far as I can tell, the variables are properly set
by the call to `bpf_get_next_key`, but let's zero-initialize them
anyway, while delinting the code.
Remi Gacogne [Thu, 1 Feb 2024 08:32:16 +0000 (09:32 +0100)]
dnsdist: Better handling of short, non-initial QUIC headers
After a QUIC connection has been negotiated, we mostly get short QUIC
headers that do not contain the QUIC version. This is fine as long as
we still know about the connection, which might not be the case if it
has been idle for longer that our timer and thus we forgot about its
connection ID. What happens then is that we will mistakenly think that
the remote peer is trying to establish a new QUIC connection with a
version set to 0, which we don't support, and therefore start the
version negotiation process. What we should instead do is notice that
the packet is not a 'Initial' one and discard it, as we cannot open
a new connection from a short header anyway. Note that the peer knows
about our idle timer so in theory it should not try to reuse such a
connection, but it does happen from time to time.
Remi Gacogne [Thu, 1 Feb 2024 08:23:26 +0000 (09:23 +0100)]
dnsdist: Document AF_XDP's limitations
Remi Gacogne [Thu, 1 Feb 2024 08:15:50 +0000 (09:15 +0100)]
dnsdist: Fix typos in the AF_XDP documentation
Reported by Chris Hofstaedtler (thanks!).
Otto Moerbeek [Wed, 31 Jan 2024 08:33:25 +0000 (09:33 +0100)]
Merge pull request #13746 from omoerbeek/rec-resolve-context-tidy
rec: tidy ResolveContext class
Otto Moerbeek [Tue, 30 Jan 2024 17:17:22 +0000 (18:17 +0100)]
one last lint
Otto Moerbeek [Tue, 30 Jan 2024 10:12:34 +0000 (11:12 +0100)]
Avoid a cases of `an exception may be thrown in function '' which should not throw exceptions (bugprone-exception-escape)`
The use of a DNSName capture by value is the culprit. Avoid those by using
[&]', telling the compiler to figure out the captures by itself but use refs.
This *could* lead to issues if we modify the value in the lambda, so this conversion should be checked!
Remi Gacogne [Tue, 30 Jan 2024 14:02:45 +0000 (15:02 +0100)]
Merge pull request #13740 from rgacogne/ddist-190rc1-changelog-secpoll
dnsdist: ChangeLog and secpoll update for 1.9.0-rc1
Remi Gacogne [Tue, 30 Jan 2024 10:56:58 +0000 (11:56 +0100)]
Merge pull request #11652 from Y7n05h/xsk
dnsdist: add AF_XDP support for UDP
Remi Gacogne [Tue, 30 Jan 2024 09:58:21 +0000 (10:58 +0100)]
dnsdist: Apply Charles-Henri's suggestions (thanks!)
Remi Gacogne [Tue, 30 Jan 2024 09:38:10 +0000 (10:38 +0100)]
Merge pull request #13749 from rgacogne/ci-binary-check-exclude-fuzzing-corpus
ci: Exclude the fuzzing/corpus dir from the 'no binary files' check
Remi Gacogne [Mon, 29 Jan 2024 13:18:14 +0000 (14:18 +0100)]
dnsdist: The 1.9.0-rc1 release has been moved to the 30th
Remi Gacogne [Mon, 29 Jan 2024 10:28:08 +0000 (11:28 +0100)]
ci: Exclude the fuzzing/corpus dir from the 'no binary files' check
Remi Gacogne [Mon, 29 Jan 2024 10:15:16 +0000 (11:15 +0100)]
dnsdist: Fix formatting of fuzz_xsk.cc
Remi Gacogne [Mon, 29 Jan 2024 10:12:27 +0000 (11:12 +0100)]
dnsdist: Add a fuzzing target for the XSK code
Remi Gacogne [Mon, 29 Jan 2024 08:38:40 +0000 (09:38 +0100)]
Merge pull request #13724 from rgacogne/dnsname-parse-packet-optim
dnsname: Optimize parsing of uncompressed labels
Otto Moerbeek [Fri, 26 Jan 2024 16:42:44 +0000 (17:42 +0100)]
Merge pull request #13742 from omoerbeek/rec-update-rust-and-crates
rec: update to cargo 1.75 and updated Cargo dependencies
Otto Moerbeek [Fri, 26 Jan 2024 16:42:11 +0000 (17:42 +0100)]
Merge pull request #13741 from omoerbeek/rec-coverity-
20240124
rec: fix Coverity issues in new RPZ code
Remi Gacogne [Fri, 26 Jan 2024 15:43:26 +0000 (16:43 +0100)]
Merge pull request #13747 from jacobbunk/document-dnsnameset
Link to existing documentation for DNSNameSet.
Jacob Bunk Nielsen [Fri, 26 Jan 2024 15:03:16 +0000 (16:03 +0100)]
Link to existing documentation for DNSNameSet.
Otto Moerbeek [Fri, 26 Jan 2024 11:27:35 +0000 (12:27 +0100)]
Fix async callbacks in unit tests now that ResolverContext is no longer an optional
Note that C++ does not really care, as the implicit conversion rules cover
this already.
Peter van Dijk [Thu, 25 Jan 2024 12:54:22 +0000 (13:54 +0100)]
auth API: reject priority element in record, closes #12657
Otto Moerbeek [Fri, 26 Jan 2024 11:07:53 +0000 (12:07 +0100)]
Actually, ResolveContext is not optional
Peter van Dijk [Fri, 26 Jan 2024 10:59:03 +0000 (11:59 +0100)]
Merge pull request #13745 from omoerbeek/auth-fix-gss-test
auth: fix gss regression test
Otto Moerbeek [Fri, 26 Jan 2024 10:46:05 +0000 (11:46 +0100)]
rec: tidy ResolveContext
Plus some changes to const& for ResolveContext arguments