]> git.ipfire.org Git - thirdparty/pdns.git/log
thirdparty/pdns.git
4 years agodnsdist: prioritize ChaCha20-Poly1305 when client does 9510/head
Sukhbir Singh [Tue, 22 Sep 2020 14:52:00 +0000 (10:52 -0400)] 
dnsdist: prioritize ChaCha20-Poly1305 when client does

The OpenSSL option SSL_OP_PRIORITIZE_CHACHA prioritizes
ChaCha20-Poly1305 if the client does by temporarily re-prioritizing it
to the top of the server cipher list. Since dnsdist already sets
SSL_OP_CIPHER_SERVER_PREFERENCE by default (preferServerCiphers is set
to true), setting this option enables clients that prefer ChaCha20 due
to a lack of AES-NI (such as mobile devices) to override the server
specified list. This option requires SSL_OP_CIPHER_SERVER_PREFERENCE to
be set and was introduced in OpenSSL 1.1.1.

Note that this change neither affects clients that prefer AES or other
ciphers, nor dnsdist's default options, unless the client explicitly
prioritizes ChaCha20.

4 years agoMerge pull request #9509 from franklouwers/master
Remi Gacogne [Wed, 23 Sep 2020 07:05:55 +0000 (09:05 +0200)] 
Merge pull request #9509 from franklouwers/master

Point to reserved values for setProxyProtocolValues() + funky quotes replacements

4 years agoMerge pull request #9512 from Habbie/repofiles-ubuntu-focal
aerique [Tue, 22 Sep 2020 21:32:08 +0000 (23:32 +0200)] 
Merge pull request #9512 from Habbie/repofiles-ubuntu-focal

generate-repo-files: various updates

4 years agoMerge pull request #9488 from rgacogne/lmdb-safe-views
Peter van Dijk [Tue, 22 Sep 2020 20:26:32 +0000 (22:26 +0200)] 
Merge pull request #9488 from rgacogne/lmdb-safe-views

Sync string_view definition in lmdb-safe

4 years agogenerate-repo-files: remove all ubuntu trusty 9512/head
Peter van Dijk [Tue, 22 Sep 2020 19:30:45 +0000 (21:30 +0200)] 
generate-repo-files: remove all ubuntu trusty

4 years agogenerate-repo-files: remove all debian jessie
Peter van Dijk [Tue, 22 Sep 2020 19:28:48 +0000 (21:28 +0200)] 
generate-repo-files: remove all debian jessie

4 years agogenerate-repo-files: add auth-43 and dnsdist-15 ubuntu focal
Peter van Dijk [Tue, 22 Sep 2020 19:09:32 +0000 (21:09 +0200)] 
generate-repo-files: add auth-43 and dnsdist-15 ubuntu focal

4 years agodoc typo, thanks @jsoref
Peter van Dijk [Tue, 22 Sep 2020 18:55:07 +0000 (20:55 +0200)] 
doc typo, thanks @jsoref

4 years agoMerge pull request #9511 from Habbie/auth-advisories-2020
Peter van Dijk [Tue, 22 Sep 2020 18:44:40 +0000 (20:44 +0200)] 
Merge pull request #9511 from Habbie/auth-advisories-2020

auth 22 sept 2020: advisories, changelogs, docs

4 years agoauth 22 sept 2020: advisories, changelogs, docs 9511/head
Peter van Dijk [Thu, 3 Sep 2020 13:46:51 +0000 (15:46 +0200)] 
auth 22 sept 2020: advisories, changelogs, docs

4 years agoMerge pull request #9490 from omoerbeek/rec-coverity-check-fd
Otto Moerbeek [Tue, 22 Sep 2020 16:16:49 +0000 (18:16 +0200)] 
Merge pull request #9490 from omoerbeek/rec-coverity-check-fd

rec: Check return value of dup(2) as noted by coverity.

4 years agoPoint to reserved values for setProxyProtocolValues() + funky quotes 9509/head
Frank Louwers [Tue, 22 Sep 2020 15:18:41 +0000 (17:18 +0200)] 
Point to reserved values for setProxyProtocolValues() + funky quotes
replacements

4 years agoMerge pull request #9494 from omoerbeek/rec-incomplete-ifdef
Otto Moerbeek [Tue, 22 Sep 2020 12:17:41 +0000 (14:17 +0200)] 
Merge pull request #9494 from omoerbeek/rec-incomplete-ifdef

rec: incomplete ifdef

4 years agoCheck return value of dup(2) as noted by coverity. 9490/head
Otto Moerbeek [Mon, 21 Sep 2020 08:22:55 +0000 (10:22 +0200)] 
Check return value of dup(2) as noted by coverity.

4 years agoMerge pull request #9497 from Habbie/unknown-record-invalid-hex
Peter van Dijk [Tue, 22 Sep 2020 08:39:57 +0000 (10:39 +0200)] 
Merge pull request #9497 from Habbie/unknown-record-invalid-hex

auth: raise an exception on invalid content in unknown records

4 years agoMerge pull request #9493 from omoerbeek/rec-log-rec_control
Otto Moerbeek [Mon, 21 Sep 2020 16:01:59 +0000 (18:01 +0200)] 
Merge pull request #9493 from omoerbeek/rec-log-rec_control

Log the line received fomr rec_control

4 years agoMerge pull request #9492 from omoerbeek/rec-detach-snmp-thread
Otto Moerbeek [Mon, 21 Sep 2020 15:01:50 +0000 (17:01 +0200)] 
Merge pull request #9492 from omoerbeek/rec-detach-snmp-thread

rec: Detach snmp thread to avoid trouble when trying to quit nicely.

4 years agoMerge pull request #9491 from omoerbeek/rec-fix-wipe-cache-typed
Otto Moerbeek [Mon, 21 Sep 2020 14:32:57 +0000 (16:32 +0200)] 
Merge pull request #9491 from omoerbeek/rec-fix-wipe-cache-typed

rec: Fix rec_control wipe-cache-typed

4 years agoIncomplete ifdef 9494/head
Otto Moerbeek [Mon, 21 Sep 2020 13:34:12 +0000 (15:34 +0200)] 
Incomplete ifdef

4 years agoDetach snmp thread to avoid trouble when trying to quit nicely. 9492/head
Otto Moerbeek [Mon, 21 Sep 2020 13:22:08 +0000 (15:22 +0200)] 
Detach snmp thread to avoid trouble when trying to quit nicely.

This avoids a case where the thread object and the RecursorSNMPAgent
object get destroyed in the wrong order.

4 years agoLog the line received fomr rec_control 9493/head
Otto Moerbeek [Mon, 21 Sep 2020 13:20:35 +0000 (15:20 +0200)] 
Log the line received fomr rec_control

This can be handy to see what commands were issued to the recursor
when reviewing logs.

4 years agoMerge pull request #9481 from omoerbeek/rec-prep-4.4.0-rc1
aerique [Mon, 21 Sep 2020 12:41:11 +0000 (14:41 +0200)] 
Merge pull request #9481 from omoerbeek/rec-prep-4.4.0-rc1

rec: prep for rec-4.4.0-rc1

4 years agoFix rec_control wipe-cache-typed (likely a merge error) 9491/head
Otto Moerbeek [Mon, 21 Sep 2020 12:37:36 +0000 (14:37 +0200)] 
Fix rec_control wipe-cache-typed (likely a merge error)

4 years agoMerge pull request #9478 from mind04/pdns-fixme400
Peter van Dijk [Mon, 21 Sep 2020 11:31:05 +0000 (13:31 +0200)] 
Merge pull request #9478 from mind04/pdns-fixme400

Auth: remove a '// HACK FIXME400' and fix the bugs it was hiding

4 years agoWe don't use string_view::at() in lmdb-safe 9488/head
Remi Gacogne [Mon, 21 Sep 2020 08:50:43 +0000 (10:50 +0200)] 
We don't use string_view::at() in lmdb-safe

4 years agoSwitch to the pdns_string_view alias to prevent collisions
Remi Gacogne [Mon, 21 Sep 2020 08:49:16 +0000 (10:49 +0200)] 
Switch to the pdns_string_view alias to prevent collisions

4 years agoSync string_view definition in lmdb-safe
Remi Gacogne [Mon, 21 Sep 2020 07:11:07 +0000 (09:11 +0200)] 
Sync string_view definition in lmdb-safe

While we do not actually care about string_view::at() in lmdb-safe,
we need to keep the two in sync so the type aliases do not collide.
Perhaps we should consider using pdns_string_view as an alias instead?

4 years agoMerge pull request #9487 from PowerDNS/pdnsutil-ipdecrypt-typo
bert hubert [Sun, 20 Sep 2020 19:31:43 +0000 (21:31 +0200)] 
Merge pull request #9487 from PowerDNS/pdnsutil-ipdecrypt-typo

Update pdnsutil.cc ipencrypt/ipdecrypt typo

4 years agoUpdate pdnsutil.cc 9487/head
bert hubert [Sun, 20 Sep 2020 17:41:09 +0000 (19:41 +0200)] 
Update pdnsutil.cc

4 years agoMerge pull request #9486 from phonedph1/patch-25
Peter van Dijk [Sat, 19 Sep 2020 17:07:21 +0000 (19:07 +0200)] 
Merge pull request #9486 from phonedph1/patch-25

Update dnsdist-console.cc

4 years agoUpdate dnsdist-console.cc 9486/head
phonedph1 [Sat, 19 Sep 2020 16:13:21 +0000 (10:13 -0600)] 
Update dnsdist-console.cc

4 years agoMerge pull request #9482 from omoerbeek/rec-docs-rst-warnings
Otto Moerbeek [Fri, 18 Sep 2020 11:19:43 +0000 (13:19 +0200)] 
Merge pull request #9482 from omoerbeek/rec-docs-rst-warnings

rec: Fix a few .rst warnings

4 years agoMerge pull request #9479 from rgacogne/fix-views
Otto Moerbeek [Fri, 18 Sep 2020 11:19:24 +0000 (13:19 +0200)] 
Merge pull request #9479 from rgacogne/fix-views

Fix our string_view usage on older distributions

4 years agoMerge pull request #9475 from omoerbeek/rec-shared-negcache rec-4.5.0-alpha0
Otto Moerbeek [Fri, 18 Sep 2020 10:51:44 +0000 (12:51 +0200)] 
Merge pull request #9475 from omoerbeek/rec-shared-negcache

Rec: shared and sharded negcache

4 years agoMerge pull request #9477 from pieterlexis/dnstap-needs-protobuf
Otto Moerbeek [Fri, 18 Sep 2020 10:51:16 +0000 (12:51 +0200)] 
Merge pull request #9477 from pieterlexis/dnstap-needs-protobuf

dnsdist, rec: dnstap requires protobuf

4 years agoPrep for rec-4.4.0-rc1 9481/head
Otto Moerbeek [Fri, 18 Sep 2020 09:14:57 +0000 (11:14 +0200)] 
Prep for rec-4.4.0-rc1

4 years agoFix a few .rst warnings 9482/head
Otto Moerbeek [Fri, 18 Sep 2020 09:21:55 +0000 (11:21 +0200)] 
Fix a few .rst warnings

4 years agorename s_RC and s_negcache to g_recCache and g_negCache to make 9475/head
Otto Moerbeek [Fri, 18 Sep 2020 08:45:50 +0000 (10:45 +0200)] 
rename s_RC and s_negcache to g_recCache and g_negCache to make
clear they are global

4 years agodnsdist: views.hh should be a symbolic link to one in the pdns/ directory 9479/head
Remi Gacogne [Fri, 18 Sep 2020 08:30:54 +0000 (10:30 +0200)] 
dnsdist: views.hh should be a symbolic link to one in the pdns/ directory

4 years agoApply suggestions from code review
Otto Moerbeek [Fri, 18 Sep 2020 08:04:22 +0000 (10:04 +0200)] 
Apply suggestions from code review

Co-authored-by: Remi Gacogne <rgacogne+github@valombre.net>
4 years agoFix our string_view usage on older distributions
Remi Gacogne [Fri, 18 Sep 2020 07:42:04 +0000 (09:42 +0200)] 
Fix our string_view usage on older distributions

- boost::string_ref requires Boost >= 1.53.0, which we don't have
  in EL6, fall back to a plain std::string (alloc + copy) there ;
- boost::string_view::at() is broken for modern compilers before
  1.64.0, so let's use boost::string_ref instead in that case.

4 years agoMerge pull request #9385 from rgacogne/rip-out-gss
Peter van Dijk [Thu, 17 Sep 2020 13:50:56 +0000 (15:50 +0200)] 
Merge pull request #9385 from rgacogne/rip-out-gss

auth: Remove GSS/TSIG support

4 years agoMerge pull request #8993 from rgacogne/packetcache-cookies
Remi Gacogne [Thu, 17 Sep 2020 12:22:21 +0000 (14:22 +0200)] 
Merge pull request #8993 from rgacogne/packetcache-cookies

Skip EDNS Cookies in the packet cache

4 years agodocs: GSS/TSIG will be removed in 4.4.0, not 4.3.1 9385/head
Remi Gacogne [Thu, 17 Sep 2020 12:21:39 +0000 (14:21 +0200)] 
docs: GSS/TSIG will be removed in 4.4.0, not 4.3.1

Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
4 years agodocs: GSS/TSIG will be removed in 4.4.0, not 4.3.1
Remi Gacogne [Thu, 17 Sep 2020 12:21:32 +0000 (14:21 +0200)] 
docs: GSS/TSIG will be removed in 4.4.0, not 4.3.1

Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
4 years agoMerge pull request #8969 from rgacogne/systemd-more-sandboxing
Remi Gacogne [Thu, 17 Sep 2020 12:20:14 +0000 (14:20 +0200)] 
Merge pull request #8969 from rgacogne/systemd-more-sandboxing

Use more of systemd's sandboxing options when available

4 years agoUpdate m4/pdns_check_dnstap.m4 9477/head
Pieter Lexis [Thu, 17 Sep 2020 08:05:53 +0000 (10:05 +0200)] 
Update m4/pdns_check_dnstap.m4

Co-authored-by: Remi Gacogne <rgacogne+github@valombre.net>
4 years agodnsdist, rec: dnstap requires protobuf
Pieter Lexis [Thu, 17 Sep 2020 07:53:33 +0000 (09:53 +0200)] 
dnsdist, rec: dnstap requires protobuf

Fail the configure when protobuf is disabled or not found but dnstap was
enabled.

4 years agoAuth: remove a '// HACK FIXME400' and fix the bugs it was hiding 9478/head
Kees Monshouwer [Mon, 14 Sep 2020 21:56:44 +0000 (23:56 +0200)] 
Auth: remove a '// HACK FIXME400' and fix the bugs it was hiding

- LMDB backend was not handling out of zone additionals well.
- doAdditionalProcessingAndDropAA() was wasting backend queries for out of zone records.
- Remove the 'do-ipv6-additional-processing' setting, processing is now always on.
- Some cleanup in zone2sql.

4 years agoIntroduce an invalidate() method instead of assigning directly
Otto Moerbeek [Wed, 16 Sep 2020 09:44:59 +0000 (11:44 +0200)] 
Introduce an invalidate() method instead of assigning directly

4 years agoMerge pull request #9471 from rgacogne/rec-log-missing-negindic
Remi Gacogne [Wed, 16 Sep 2020 09:01:33 +0000 (11:01 +0200)] 
Merge pull request #9471 from rgacogne/rec-log-missing-negindic

rec: Log when going Bogus because of a missing SOA in authority

4 years agoNasty interaction between security-poll and shared negcache:
Otto Moerbeek [Tue, 15 Sep 2020 14:29:35 +0000 (16:29 +0200)] 
Nasty interaction between security-poll and shared negcache:
if security pool is run, in the RPZ test we have a neg entry for .com
which makes the TTL of the NXDOMAIN unexpected.

4 years agorec: Log when going Bogus because of a missing SOA in authority 9471/head
Remi Gacogne [Tue, 15 Sep 2020 13:03:34 +0000 (15:03 +0200)] 
rec: Log when going Bogus because of a missing SOA in authority

A missing SOA in the authority section of negative (NXDOMAIN, NODATA)
answers in a DNSSEC-secure zone currently leads to a Bogus result,
because the needed NSEC/NSEC3 could not be validated.

4 years agoReformat
Otto Moerbeek [Tue, 15 Sep 2020 11:23:51 +0000 (13:23 +0200)] 
Reformat

4 years agoInclude <mutex>; constify a few methods
Otto Moerbeek [Tue, 15 Sep 2020 11:21:09 +0000 (13:21 +0200)] 
Include <mutex>; constify a few methods

4 years agoShared & sharded NegCache
Otto Moerbeek [Tue, 15 Sep 2020 10:17:49 +0000 (12:17 +0200)] 
Shared & sharded NegCache

4 years agoMerge pull request #9403 from jsoref/gemfile-ruby-crash
Peter van Dijk [Mon, 14 Sep 2020 18:59:46 +0000 (20:59 +0200)] 
Merge pull request #9403 from jsoref/gemfile-ruby-crash

xenial: fix ruby crash

4 years agoMerge pull request #9437 from jsoref/issue-9436
Peter van Dijk [Mon, 14 Sep 2020 18:58:34 +0000 (20:58 +0200)] 
Merge pull request #9437 from jsoref/issue-9436

Add pdnsutil to see also for pdns_control

4 years agoMerge pull request #9466 from Habbie/dnsdist-dnsname-toraw
Peter van Dijk [Mon, 14 Sep 2020 18:58:01 +0000 (20:58 +0200)] 
Merge pull request #9466 from Habbie/dnsdist-dnsname-toraw

dnsdist dnsname: add toDNSString convenience function

4 years agoMerge pull request #9469 from rgacogne/dnsbulk-rnd
Peter van Dijk [Mon, 14 Sep 2020 18:57:51 +0000 (20:57 +0200)] 
Merge pull request #9469 from rgacogne/dnsbulk-rnd

dnsbulktest: Initialize the 'rng' and 'entropy-source' arguments

4 years agodnsbulktest: Initialize the 'rng' and 'entropy-source' arguments 9469/head
Remi Gacogne [Mon, 14 Sep 2020 14:56:58 +0000 (16:56 +0200)] 
dnsbulktest: Initialize the 'rng' and 'entropy-source' arguments

They are required to use dns_random(), which is used by our DNS
packet generation code.

4 years agoMerge pull request #9461 from franklouwers/master
Peter van Dijk [Mon, 14 Sep 2020 14:03:42 +0000 (16:03 +0200)] 
Merge pull request #9461 from franklouwers/master

Add youtube and duckduckgo

4 years agodnsdist dnsname: add toDNSString convenience function 9466/head
Peter van Dijk [Mon, 14 Sep 2020 12:24:14 +0000 (14:24 +0200)] 
dnsdist dnsname: add toDNSString convenience function

4 years agoMerge pull request #9448 from omoerbeek/qname-min-vs-forward
Otto Moerbeek [Mon, 14 Sep 2020 12:09:10 +0000 (14:09 +0200)] 
Merge pull request #9448 from omoerbeek/qname-min-vs-forward

rec: We only want to do QName Minimization for the names in a forwarded domain.

4 years agoMerge pull request #9463 from spirillen/patch-1
Peter van Dijk [Mon, 14 Sep 2020 10:43:35 +0000 (12:43 +0200)] 
Merge pull request #9463 from spirillen/patch-1

Small rewrite of `addMasks(dofile`

4 years agoUpdate pdns/recursordist/docs/lua-scripting/netmask.rst 9463/head
spirillen [Mon, 14 Sep 2020 09:45:26 +0000 (11:45 +0200)] 
Update pdns/recursordist/docs/lua-scripting/netmask.rst

Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
4 years agoSmall rewrite of `addMasks(dofile`
spirillen [Mon, 14 Sep 2020 09:41:10 +0000 (11:41 +0200)] 
Small rewrite of `addMasks(dofile`

I have made this little rewrite to avoid other from pit falling into the same mistake I made myself, and read the existent code as a list of IP's inside `bad.ips`, and not a script returning pre-formatted IPs.

4 years agoUse boost::optional to pass optional cutoff point. This way the 9448/head
Otto Moerbeek [Mon, 14 Sep 2020 09:30:42 +0000 (11:30 +0200)] 
Use boost::optional to pass optional cutoff point. This way the
proper cutoff point can be specified for forwarded zones only,
making it possible to change it meaning witjout regular nameserver
lookups.

4 years agoMake code more clear by eliminating the "ancestor" as suggested by @rgacogne
Otto Moerbeek [Mon, 14 Sep 2020 08:56:40 +0000 (10:56 +0200)] 
Make code more clear by eliminating the "ancestor" as suggested by @rgacogne

4 years agoIf we're looking in the cache for NS for a forwarded name, we
Otto Moerbeek [Fri, 11 Sep 2020 08:06:24 +0000 (10:06 +0200)] 
If we're looking in the cache for NS for a forwarded name, we
can cut off the search at the forwarding domain.

I'm not sure if I like the added complexity...

4 years agoMerge pull request #9462 from phonedph1/patch-24
Otto Moerbeek [Fri, 11 Sep 2020 06:32:55 +0000 (08:32 +0200)] 
Merge pull request #9462 from phonedph1/patch-24

Update comboaddress.rst

4 years agoUpdate comboaddress.rst 9462/head
phonedph1 [Fri, 11 Sep 2020 02:33:55 +0000 (20:33 -0600)] 
Update comboaddress.rst

4 years agoadd www.duckduckgo 9461/head
Frank Louwers [Thu, 10 Sep 2020 12:10:59 +0000 (14:10 +0200)] 
add www.duckduckgo

4 years agoAdd youtube and duckduckgo
Frank Louwers [Thu, 10 Sep 2020 11:31:04 +0000 (13:31 +0200)] 
Add youtube and duckduckgo

4 years agoMerge pull request #9454 from omoerbeek/rec-clear-parts
Otto Moerbeek [Wed, 9 Sep 2020 13:13:39 +0000 (15:13 +0200)] 
Merge pull request #9454 from omoerbeek/rec-clear-parts

Parts is reused, so clear the names it might contain.

4 years agoParts is reused, so clear the names it might contain. 9454/head
Otto Moerbeek [Wed, 9 Sep 2020 13:11:26 +0000 (15:11 +0200)] 
Parts is reused, so clear the names it might contain.

4 years agoTake into account a potentially more specific NS we might
Otto Moerbeek [Tue, 8 Sep 2020 09:59:32 +0000 (11:59 +0200)] 
Take into account a potentially more specific NS we might
have in cache.

Also, do the forward lookup only once before the loop.

4 years agoMerge pull request #9447 from omoerbeek/rec-prep-4.3.4
Otto Moerbeek [Tue, 8 Sep 2020 08:13:23 +0000 (10:13 +0200)] 
Merge pull request #9447 from omoerbeek/rec-prep-4.3.4

rec: Changelog and secpoll rec-4.3.4

4 years agoWe only want to do QName Minimization for the names in a forwarded
Otto Moerbeek [Mon, 7 Sep 2020 10:17:30 +0000 (12:17 +0200)] 
We only want to do QName Minimization for the names in a forwarded
domain.

E.g. if foo.bar.com is forwarded and the qname is x.foo.bar.com,
start the QM process with ancestor foo.bar.com, so the query is
directed to the forwarder.  But if the qname is baz.bar.com, we do
regular QM, starting with the regular ancestor.

Should fix #9438 without breaking having forward for .

4 years agoPrep rec-4.3.4 9447/head
Otto Moerbeek [Mon, 7 Sep 2020 07:39:10 +0000 (09:39 +0200)] 
Prep rec-4.3.4

4 years agoMerge pull request #9446 from pieterlexis/gcc10-fix
Remi Gacogne [Mon, 7 Sep 2020 07:19:55 +0000 (09:19 +0200)] 
Merge pull request #9446 from pieterlexis/gcc10-fix

Fix building remote backend on GCC 10

4 years agoFix building remote backend on GCC 10 9446/head
Pieter Lexis [Fri, 4 Sep 2020 15:20:15 +0000 (17:20 +0200)] 
Fix building remote backend on GCC 10

4 years agoMerge pull request #9434 from omoerbeek/rec-forward-who-is-auth-for-ds
Otto Moerbeek [Fri, 4 Sep 2020 09:53:07 +0000 (11:53 +0200)] 
Merge pull request #9434 from omoerbeek/rec-forward-who-is-auth-for-ds

rec: When deciding if we are auth in the local auth or forwarding case, DS is special

4 years agoMerge pull request #9445 from Habbie/docs-tcprule
Remi Gacogne [Fri, 4 Sep 2020 09:35:24 +0000 (11:35 +0200)] 
Merge pull request #9445 from Habbie/docs-tcprule

dnsdist docs: TCPRule argument is not optional

4 years agodnsdist docs: TCPRule argument is not optional 9445/head
Peter van Dijk [Fri, 4 Sep 2020 09:31:59 +0000 (11:31 +0200)] 
dnsdist docs: TCPRule argument is not optional

4 years agoFix test 9434/head
Otto Moerbeek [Fri, 4 Sep 2020 09:13:17 +0000 (11:13 +0200)] 
Fix test

4 years agoMerge pull request #9387 from zeha/notify-level
Peter van Dijk [Fri, 4 Sep 2020 08:07:52 +0000 (10:07 +0200)] 
Merge pull request #9387 from zeha/notify-level

auth slave: log successful NOTIFY

4 years agoMerge pull request #9442 from zeha/doxyconfig
Peter van Dijk [Fri, 4 Sep 2020 08:01:52 +0000 (10:01 +0200)] 
Merge pull request #9442 from zeha/doxyconfig

Update doxygen config

4 years agoMerge pull request #9439 from rgacogne/auth-fix-geoip-sample-config
Remi Gacogne [Fri, 4 Sep 2020 06:09:37 +0000 (08:09 +0200)] 
Merge pull request #9439 from rgacogne/auth-fix-geoip-sample-config

auth: Fix the sample 'geoip.conf' for Debian-based packages

4 years agoauth: Use https://doc.powerdns.com instead of https://docs.powerdns.com 9439/head
Remi Gacogne [Fri, 4 Sep 2020 06:08:06 +0000 (08:08 +0200)] 
auth: Use https://doc.powerdns.com instead of https://docs.powerdns.com

4 years agoMerge pull request #9441 from Habbie/rec-docs-dns64-multiprefix
Remi Gacogne [Fri, 4 Sep 2020 06:05:07 +0000 (08:05 +0200)] 
Merge pull request #9441 from Habbie/rec-docs-dns64-multiprefix

rec docs: link to multi-prefix dns64 example on our wiki

4 years agoUpdate doxygen config 9442/head
Chris Hofstaedtler [Thu, 3 Sep 2020 16:19:00 +0000 (18:19 +0200)] 
Update doxygen config

4 years agorec docs: link to multi-prefix dns64 example on our wiki 9441/head
Peter van Dijk [Thu, 3 Sep 2020 12:19:37 +0000 (14:19 +0200)] 
rec docs: link to multi-prefix dns64 example on our wiki

4 years agoauth: Fix the sample 'geoip.conf' for Debian-based packages
Remi Gacogne [Thu, 3 Sep 2020 08:27:01 +0000 (10:27 +0200)] 
auth: Fix the sample 'geoip.conf' for Debian-based packages

- The documentation of the backend has moved to a new URL ;
- 'geoip-database-file' has been renamed to 'geoip-database-files' ;
- 'geoip-database-file6' does not exist anymore.

4 years agoAdd pdnsutil to see also for pdns_control 9437/head
Josh Soref [Thu, 3 Sep 2020 04:50:19 +0000 (00:50 -0400)] 
Add pdnsutil to see also for pdns_control

4 years agoTest for the reported issue wrt doing an spurious DS queries
Otto Moerbeek [Wed, 2 Sep 2020 13:57:40 +0000 (15:57 +0200)] 
Test for the reported issue wrt doing an spurious DS queries

I'm trying to setup a valid a.test and b.test, using a non-recursive forward
but somehow my DNSSEC setup is not right. Cannot spot the issue atm.

4 years agoWhen deciding if we are auth in the local auth or forwarding case,
Otto Moerbeek [Wed, 2 Sep 2020 12:03:44 +0000 (14:03 +0200)] 
When deciding if we are auth in the local auth or forwarding case,
for DS records we need to look at the parent of the particular name.

Seems to fix #9433

4 years agoMerge pull request #9175 from rgacogne/ddist-per-thread-lb-pol
Remi Gacogne [Wed, 2 Sep 2020 08:09:52 +0000 (10:09 +0200)] 
Merge pull request #9175 from rgacogne/ddist-per-thread-lb-pol

dnsdist: Add per-thread Lua FFI load-balancing policies

4 years agoauth slave: log successful NOTIFY 9387/head
Chris Hofstaedtler [Mon, 17 Aug 2020 13:14:24 +0000 (15:14 +0200)] 
auth slave: log successful NOTIFY

4 years agodnsdist: Whitelist "luaffiroundrobin" 9175/head
Remi Gacogne [Mon, 10 Aug 2020 09:37:37 +0000 (11:37 +0200)] 
dnsdist: Whitelist "luaffiroundrobin"