]>
git.ipfire.org Git - thirdparty/pdns.git/log
Kees Monshouwer [Tue, 15 Dec 2020 13:16:39 +0000 (14:16 +0100)]
auth: some cleanup in the AXFR-out code
Kees Monshouwer [Mon, 14 Dec 2020 22:32:12 +0000 (23:32 +0100)]
auth: test direct-dnskey in AXFR-out
Kees Monshouwer [Mon, 14 Dec 2020 22:20:50 +0000 (23:20 +0100)]
auth: fix direct-dnskey in AXFR-out
Peter van Dijk [Thu, 7 Jan 2021 18:56:41 +0000 (19:56 +0100)]
Merge pull request #9836 from Habbie/circleci-extend-2
circleci: extend coverage some more and disable travis
Peter van Dijk [Thu, 7 Jan 2021 13:35:36 +0000 (14:35 +0100)]
stop using travis
Peter van Dijk [Thu, 7 Jan 2021 11:02:29 +0000 (12:02 +0100)]
configure: set --enable-option-checking=fatal
Peter van Dijk [Wed, 6 Jan 2021 17:58:00 +0000 (18:58 +0100)]
geoipbackend: use const_iterator
==8618==ERROR: AddressSanitizer: stack-use-after-scope on address 0x7ffd8c5a1420 at pc 0x55bee0a5d899 bp 0x7ffd8c5a0710 sp 0x7ffd8c5a0708
READ of size 1 at 0x7ffd8c5a1420 thread T0
#0 0x55bee0a5d898 in YAML::Node::begin() const /usr/include/yaml-cpp/node/impl.h:284:8
#1 0x55bee0a3f2f0 in GeoIPBackend::initialize() /opt/project/modules/geoipbackend/geoipbackend.cc:163:27
#2 0x55bee0a3d0d3 in GeoIPBackend::GeoIPBackend(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /opt/project/modules/geoipbackend/geoipbackend.cc:86:5
#3 0x55bee0a784eb in GeoIPFactory::make(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /opt/project/modules/geoipbackend/geoipbackend.cc:1008:16
#4 0x55bedff6cb18 in BackendMakerClass::all(bool) /opt/project/pdns/dnsbackend.cc:200:46
#5 0x55bee07d3abe in UeberBackend::UeberBackend(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /opt/project/pdns/ueberbackend.cc:479:28
#6 0x55bee060579c in PacketHandler::PacketHandler() /opt/project/pdns/packethandler.cc:65:32
#7 0x55bedfee1748 in std::unique_ptr<PacketHandler, std::default_delete<PacketHandler> > make_unique<PacketHandler>() /opt/project/pdns/./misc.hh:571:35
#8 0x55bee079376d in TCPNameserver::go() /opt/project/pdns/tcpreceiver.cc:85:9
#9 0x55bedfecf7b7 in mainthread() /opt/project/pdns/common_startup.cc:656:7
#10 0x55bee0655f67 in main /opt/project/pdns/receiver.cc:654:5
#11 0x7f374b4b809a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2409a)
#12 0x55bedfc9a989 in _start (/opt/pdns-auth/sbin/pdns_server+0x2736989)
Address 0x7ffd8c5a1420 is located in stack of thread T0 at offset 3040 in frame
#0 0x55bee0a3d5ef in GeoIPBackend::initialize() /opt/project/modules/geoipbackend/geoipbackend.cc:115
Peter van Dijk [Wed, 6 Jan 2021 16:17:00 +0000 (17:17 +0100)]
lmdbbackend: avoid unaligned uint32_t reads by using memcpy
lmdbbackend.cc:942:27: runtime error: load of misaligned address 0x604000b827aa for type 'uint32_t' (aka 'unsigned int'), which requires 4 byte alignment
Peter van Dijk [Wed, 6 Jan 2021 16:09:52 +0000 (17:09 +0100)]
remotebackend: use 0 for denoting unknown serial which is uint32_t
remotebackend.cc:610:51: runtime error: -1 is outside the range of representable values of type 'unsigned int'
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior remotebackend.cc:610:51 in
Peter van Dijk [Wed, 6 Jan 2021 16:06:45 +0000 (17:06 +0100)]
add symbolizer to auth tests
Peter van Dijk [Wed, 6 Jan 2021 15:40:37 +0000 (16:40 +0100)]
disable asan leak sanitizer
Peter van Dijk [Wed, 6 Jan 2021 14:56:26 +0000 (15:56 +0100)]
auth: asan+ubsan; rec: ubsan
Peter van Dijk [Wed, 6 Jan 2021 11:45:08 +0000 (12:45 +0100)]
install LLVM symbolizer
Otto Moerbeek [Wed, 16 Dec 2020 09:54:44 +0000 (10:54 +0100)]
Two bulk test steps were named identically, rename
Otto Moerbeek [Wed, 16 Dec 2020 09:12:39 +0000 (09:12 +0000)]
Test on HAVE_FIBER_SANITIZER for stack enlargement, __SANITIZE_ADDRESS__
is not defined everywhere.
Otto Moerbeek [Wed, 16 Dec 2020 09:12:08 +0000 (09:12 +0000)]
Reomve tmp debug code and fix two nits in the bulk script
Otto Moerbeek [Wed, 16 Dec 2020 08:06:54 +0000 (09:06 +0100)]
Crash happens earlier than I thought
Otto Moerbeek [Wed, 16 Dec 2020 07:38:43 +0000 (08:38 +0100)]
cat recursor.log before trying to kill rec, if the kill fails
(because rec died) we at least have the log.
Peter van Dijk [Mon, 14 Dec 2020 09:40:52 +0000 (10:40 +0100)]
Revert "disable recursor asan"
This reverts commit
2799109d800a368a4aebdf1fb1841602ad4ff3b4 .
Your Name [Wed, 9 Dec 2020 11:09:27 +0000 (12:09 +0100)]
disable recursor asan
Your Name [Tue, 8 Dec 2020 09:18:02 +0000 (10:18 +0100)]
circleci: extend coverage some more
* switch to clang-8
* test Recursor SNMP, DNSTAP, Protobuf
* enable asan for Recursor
Peter van Dijk [Thu, 7 Jan 2021 11:47:20 +0000 (12:47 +0100)]
Merge pull request #9917 from rgacogne/rec-pb-zero-length
rec: Set the Protocol Buffer 'inBytes' field for zero-length messages
Remi Gacogne [Thu, 7 Jan 2021 09:32:44 +0000 (10:32 +0100)]
rec: Set the Protocol Buffer 'inBytes' field for zero-length messages
Th existing Protocol Buffer code used to do that, so existing receivers
might expect that field to be present.
Peter van Dijk [Wed, 6 Jan 2021 18:32:54 +0000 (19:32 +0100)]
Merge pull request #9914 from Habbie/pthread-symbols
autoconf: correctly detect pthread symbols
Otto Moerbeek [Wed, 6 Jan 2021 15:32:54 +0000 (16:32 +0100)]
Merge pull request #9911 from omoerbeek/dnsname-macos-openbsd
MacOS (both Intel and arm64) and OpenBSD have no issues any more with boost::containter::string
Peter van Dijk [Wed, 6 Jan 2021 12:05:56 +0000 (13:05 +0100)]
autoconf: correctly detect pthread symbols
Remi Gacogne [Wed, 6 Jan 2021 10:29:25 +0000 (11:29 +0100)]
Merge pull request #9843 from rgacogne/dnsdist-protozero
Use protozero for Protocol Buffer operations in dnsdist, and dnstap/outgoing for the rec
Remi Gacogne [Wed, 6 Jan 2021 09:30:22 +0000 (10:30 +0100)]
Merge pull request #9782 from rgacogne/ddist-dynblocks-metrics-ebpf
dnsdist: Use an eBPF filter for Dynamic blocks when available
Remi Gacogne [Wed, 6 Jan 2021 09:12:56 +0000 (10:12 +0100)]
Merge pull request #9883 from rgacogne/rec-ds-cname-cache
rec: Lookup DS entries before CNAME entries
Peter van Dijk [Wed, 6 Jan 2021 07:50:14 +0000 (08:50 +0100)]
Merge pull request #9906 from Habbie/rec-doc-la
rec docs: correct local-address default
Peter van Dijk [Tue, 5 Jan 2021 13:36:41 +0000 (14:36 +0100)]
Merge pull request #9826 from Habbie/edit-zone-zpt-exc
pdnsutil edit-zone: do not exit on ZoneParser exception
Peter van Dijk [Tue, 5 Jan 2021 13:15:15 +0000 (14:15 +0100)]
Merge pull request #9910 from nzlosh/zone_xfr_rewording
Reword zone xfr log message to remove ordinal number naming errors.
Otto Moerbeek [Tue, 5 Jan 2021 13:07:22 +0000 (14:07 +0100)]
MacOS (both Intel and arm64) and OpenBSD have no issues any more
with boost::containter::string
Otto Moerbeek [Tue, 5 Jan 2021 12:34:36 +0000 (13:34 +0100)]
Merge pull request #9909 from omoerbeek/macos-sanitizer
Enable address sanitizer on MacOS
Otto Moerbeek [Tue, 5 Jan 2021 11:01:02 +0000 (12:01 +0100)]
Merge pull request #9908 from omoerbeek/auth-build-testrunner
auth: If unit tests are enabled, build testrunner from the main target
Otto Moerbeek [Tue, 5 Jan 2021 10:46:57 +0000 (11:46 +0100)]
If unit tests are enabled, build testrunner from the main dir
Carlos [Tue, 5 Jan 2021 10:29:27 +0000 (11:29 +0100)]
Reword zone xfr log message to remove ordinal number naming errors.
Peter van Dijk [Tue, 5 Jan 2021 10:20:10 +0000 (11:20 +0100)]
rec docs: correct local-address default
Otto Moerbeek [Tue, 5 Jan 2021 10:10:08 +0000 (11:10 +0100)]
Enable address sanitizer on MacOS
Remi Gacogne [Tue, 5 Jan 2021 09:46:43 +0000 (10:46 +0100)]
Merge pull request #9900 from rgacogne/ddist-rmserver-lock
dnsdist: Fix a hang when removing a server with more than one socket
Remi Gacogne [Mon, 14 Dec 2020 15:33:17 +0000 (16:33 +0100)]
protozero: Declares names instead of using numerical values for fields
Remi Gacogne [Mon, 14 Dec 2020 14:02:56 +0000 (15:02 +0100)]
dnstap: Declares names instead of using numerical values for fields
Remi Gacogne [Fri, 11 Dec 2020 16:04:20 +0000 (17:04 +0100)]
rec: Apply formatting again
Remi Gacogne [Fri, 11 Dec 2020 08:26:25 +0000 (09:26 +0100)]
rec: Apply formatting, as 'already formatted to perfection' is relative
Remi Gacogne [Thu, 10 Dec 2020 16:17:42 +0000 (17:17 +0100)]
We still need the protobuf compiler in a few places for our tests
Remi Gacogne [Thu, 10 Dec 2020 16:11:44 +0000 (17:11 +0100)]
rec: Apply formatting
Remi Gacogne [Thu, 10 Dec 2020 16:10:59 +0000 (17:10 +0100)]
RemoteLogger: Fix astring-plus-int issue
Remi Gacogne [Wed, 9 Dec 2020 10:48:30 +0000 (11:48 +0100)]
Remove left-over protobuf from build files, CI, documentation
Remi Gacogne [Wed, 9 Dec 2020 10:42:49 +0000 (11:42 +0100)]
dnsdist: Use the generic dnstap m4 again
Remi Gacogne [Tue, 8 Dec 2020 18:32:22 +0000 (19:32 +0100)]
rec: Use protozero for outgoing queries Protocol Buffer operations
Remi Gacogne [Tue, 8 Dec 2020 15:35:42 +0000 (16:35 +0100)]
RemoteLogger: Use the simpler lock_guard instead of unique_lock
Remi Gacogne [Tue, 8 Dec 2020 14:40:38 +0000 (15:40 +0100)]
dnspcap2protobuf: Use protozero for Protocol Buffer operations
Remi Gacogne [Wed, 9 Dec 2020 10:26:37 +0000 (11:26 +0100)]
dnsdist: Use protozero for Protocol Buffer operations
Remi Gacogne [Tue, 5 Jan 2021 08:54:18 +0000 (09:54 +0100)]
rec: Remove unneeded 'static'
Remi Gacogne [Tue, 5 Jan 2021 08:44:39 +0000 (09:44 +0100)]
dnsdist: Remove unused fields when eBPF is not available
Remi Gacogne [Mon, 4 Jan 2021 12:55:31 +0000 (13:55 +0100)]
Merge pull request #9857 from rgacogne/crypto-engine-unique-ptr
Return a unique_ptr instead of a shared one for DNSCryptoKeyEngine
Otto Moerbeek [Mon, 4 Jan 2021 10:58:12 +0000 (11:58 +0100)]
Merge pull request #9905 from omoerbeek/copyright-2021
It's 2021
Otto Moerbeek [Mon, 4 Jan 2021 10:56:25 +0000 (11:56 +0100)]
It's 2021
Otto Moerbeek [Mon, 4 Jan 2021 10:45:46 +0000 (11:45 +0100)]
It's 2021
Remi Gacogne [Mon, 4 Jan 2021 10:43:34 +0000 (11:43 +0100)]
Merge pull request #9904 from yantarou/dnsdist_typo
dnsdist: Fix typo in tuning documentation
Jan Hilberath [Mon, 4 Jan 2021 10:40:37 +0000 (19:40 +0900)]
dnsdist: Fix typo in tuning documentation
Peter van Dijk [Mon, 4 Jan 2021 08:40:35 +0000 (09:40 +0100)]
Merge pull request #9894 from omoerbeek/zap-incbin
Remove incbin from ext and references to it
Remi Gacogne [Thu, 24 Dec 2020 10:38:26 +0000 (11:38 +0100)]
dnsdist: Fix a hang when removing a server with more than one socket
There was a lock starvation issue when removing a server with more
than one socket in use (`sockets` greater than 1 on the corresponding
`newServer` directive), because the mutex protecting the sockets array
would never be released long enough by the responder thread to allow
the thread stopping the server to acquire it.
This commit fixes that by marking the server as stopped right away,
before acquiring the lock, and also making sure that the responder
thread is woken up regularly (every second, even without any query
to process) and that it checks whether the server has been stopped
just after that.
The issue was introduced in
be55a20ce9bb7140071279d70bcb460f1f2b7b7d ,
and backported to 1.5.1 in
f0d48318cce0dd80ae73c529362bdb2921d8c5c9 .
Remi Gacogne [Tue, 22 Dec 2020 09:28:57 +0000 (10:28 +0100)]
Merge pull request #9841 from rgacogne/pb-logger-short-read
ProtobufLogger: Better handling of short-reads, errors
Remi Gacogne [Tue, 22 Dec 2020 09:17:12 +0000 (10:17 +0100)]
Merge pull request #9895 from mortenstevens/patch-4
Fix missing #include for gcc-11
Pieter Lexis [Tue, 22 Dec 2020 08:28:57 +0000 (09:28 +0100)]
Merge pull request #9896 from jacobbunk/max-signature-cache-entries-doc
Document the behavior of the max-signature-cache-entries setting.
Jacob Bunk Nielsen [Tue, 22 Dec 2020 07:22:22 +0000 (08:22 +0100)]
Document the behavior of the max-signature-cache-entries setting.
Update documentation with a few things I learned during a debugging
session with great help on IRC.
If you use NSEC narrow mode and handle queries that generates a lot of
signatures, e.g. because of random subdomain queries this can cause
the cache to grow very large.
Also document the surprising cache eviction policy of dropping all
cache entries when the maximum cache size is hit.
Morten Stevens [Mon, 21 Dec 2020 11:11:01 +0000 (12:11 +0100)]
Fix missing #include for gcc-11
Pieter Lexis [Fri, 18 Dec 2020 15:34:00 +0000 (16:34 +0100)]
Merge pull request #9715 from pieterlexis/4.1-docs
Remove all documentation irrelevant after 4.4.0
Pieter Lexis [Fri, 18 Dec 2020 15:33:08 +0000 (16:33 +0100)]
Merge pull request #9844 from pieterlexis/SVCB-correctly-parse-unknown
SVCB: Correctly parse and print unknown params
Peter van Dijk [Fri, 18 Dec 2020 10:49:43 +0000 (11:49 +0100)]
Merge pull request #9887 from Habbie/auth-4.4.0-docs
changelog+secpoll for auth-4.4.0
Otto Moerbeek [Fri, 18 Dec 2020 08:08:52 +0000 (09:08 +0100)]
Remove incbin from ext and referencs to it
Otto Moerbeek [Fri, 18 Dec 2020 07:22:37 +0000 (08:22 +0100)]
Kill dead link, replace by more descriptive text
Peter van Dijk [Thu, 17 Dec 2020 18:57:06 +0000 (19:57 +0100)]
Merge pull request #9848 from pieterlexis/stub-logging
stub: improve logging
Peter van Dijk [Thu, 17 Dec 2020 18:54:11 +0000 (19:54 +0100)]
Merge pull request #9880 from Habbie/auth-upgrade-docs-confusion
auth docs: unconfuse upgrade text about unknown types
Peter van Dijk [Thu, 17 Dec 2020 18:38:39 +0000 (19:38 +0100)]
Merge pull request #9881 from Habbie/el6-ipv6
el6 docker builds: prefer v4 resolution
Peter van Dijk [Thu, 17 Dec 2020 17:33:09 +0000 (18:33 +0100)]
Merge pull request #9879 from rgacogne/rec-ubsan-fixes
rec: A few UBSAN-related fixes
Remi Gacogne [Thu, 17 Dec 2020 14:21:44 +0000 (15:21 +0100)]
rec: Delete a trailing whitespace
Remi Gacogne [Thu, 17 Dec 2020 13:45:59 +0000 (14:45 +0100)]
rec: Store the zone and remote server IP in the records cache
Peter van Dijk [Thu, 17 Dec 2020 09:16:48 +0000 (10:16 +0100)]
changelog+secpoll+EOL update for auth-4.4.0
Remi Gacogne [Wed, 16 Dec 2020 16:40:15 +0000 (17:40 +0100)]
rec: Add a unit test for the 'DS entry expired but CNAME is here' issue
Remi Gacogne [Wed, 16 Dec 2020 14:51:19 +0000 (15:51 +0100)]
rec: Lookup DS entries before CNAME entries
When we are looking for a DS, we want to do the non-CNAME cache check first
because we can actually have a DS (from the parent zone) AND a CNAME (from
the child zone), and what we really want is the DS.
Peter van Dijk [Wed, 16 Dec 2020 14:02:38 +0000 (15:02 +0100)]
el6 docker builds: prefer v4 resolution
Peter van Dijk [Wed, 16 Dec 2020 12:52:20 +0000 (13:52 +0100)]
auth docs: unconfuse upgrade text about unknown types
Remi Gacogne [Wed, 16 Dec 2020 11:31:19 +0000 (12:31 +0100)]
rec: Preload libasan, when defined, before running regression tests
Remi Gacogne [Thu, 27 Feb 2020 15:29:49 +0000 (16:29 +0100)]
rec: Fix building our unit tests with Undefined Behavior Sanitizer
(cherry picked from commit
063a03a75e508d8937fbad67202f97e27a16f078 )
Remi Gacogne [Fri, 28 Feb 2020 12:46:03 +0000 (13:46 +0100)]
rec: Avoid overflow when computing latency
Reported by UBSan:
[2020-02-28 12:21:21] pdns_recursor.cc:1841:31: runtime error: -276679 is outside the range of representable values of type 'unsigned long'
[2020-02-28 12:21:21] #0 0x5610bb76af48 in startDoResolve(void*) /home/travis/build/rgacogne/pdns/pdns/recursordist/pdns-recursor-0.0.0.0.HEAD.g5d6e6b9f95.dirty/pdns_recursor.cc:1841:31
[2020-02-28 12:21:21] #1 0x5610bb7d60ac in MTasker<PacketID, std::string>::makeThread(void (*)(void*), void*)::{lambda()#1}::operator()() const /home/travis/build/rgacogne/pdns/pdns/recursordist/pdns-recursor-0.0.0.0.HEAD.g5d6e6b9f95.dirty/./mtasker.cc:284:7
[2020-02-28 12:21:21] #2 0x5610bb6bae9d in boost::function0<void>::operator()() const /usr/include/boost/function/function_template.hpp:766:14
[2020-02-28 12:21:21] #3 0x5610bb6ba21b in threadWrapper(long) /home/travis/build/rgacogne/pdns/pdns/recursordist/pdns-recursor-0.0.0.0.HEAD.g5d6e6b9f95.dirty/./mtasker_fcontext.cc:144:9
[2020-02-28 12:21:21] #4 0x7f29cb06d70d in make_fcontext (/usr/lib/x86_64-linux-gnu/libboost_context.so.1.54.0+0x70d)
(cherry picked from commit
b7d61cb18a9bc99d2c759f24e1340efc7a1c7725 )
Remi Gacogne [Fri, 28 Feb 2020 10:51:51 +0000 (11:51 +0100)]
Prevent signed integer overflow in LOC record conversion
Reported by UBSan:
sillyrecords.cc:301:42: runtime error: signed integer overflow:
2031844648 - -
2147483648 cannot be represented in type 'int'
#0 0x55ab56ff5fbd in LOCRecordContent::getZoneRepresentation(bool) const /home/travis/build/rgacogne/pdns/pdns/recursordist/pdns-recursor-0.0.0.0.HEAD.ge217873f32.dirty/sillyrecords.cc:301:42
#1 0x55ab571da021 in test_dnsrecords_cc::test_record_types::test_method() /home/travis/build/rgacogne/pdns/pdns/recursordist/pdns-recursor-0.0.0.0.HEAD.ge217873f32.dirty/test-dnsrecords_cc.cc:232:11
#2 0x55ab571c9a4a in test_dnsrecords_cc::test_record_types_invoker() /home/travis/build/rgacogne/pdns/pdns/recursordist/pdns-recursor-0.0.0.0.HEAD.ge217873f32.dirty/test-dnsrecords_cc.cc:42:1
#3 0x55ab57136125 in boost::unit_test::ut_detail::callback0_impl_t<boost::unit_test::ut_detail::unused, void (*)()>::invoke() /usr/include/boost/test/utils/callback.hpp:89:46
#4 0x2b0b90cfa1f0 (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x681f0)
#5 0x2b0b90cd5545 in boost::execution_monitor::catch_signals(boost::unit_test::callback0<int> const&) (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x43545)
#6 0x2b0b90cd5d82 in boost::execution_monitor::execute(boost::unit_test::callback0<int> const&) (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x43d82)
#7 0x2b0b90cfa2f1 in boost::unit_test::unit_test_monitor_t::execute_and_translate(boost::unit_test::test_case const&) (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x682f1)
#8 0x2b0b90ce3f93 in boost::unit_test::framework_impl::visit(boost::unit_test::test_case const&) (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x51f93)
#9 0x2b0b90d12d22 in boost::unit_test::traverse_test_tree(boost::unit_test::test_suite const&, boost::unit_test::test_tree_visitor&) (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x80d22)
#10 0x2b0b90d12d22 in boost::unit_test::traverse_test_tree(boost::unit_test::test_suite const&, boost::unit_test::test_tree_visitor&) (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x80d22)
#11 0x2b0b90cdf4b9 in boost::unit_test::framework::run(unsigned long, bool) (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x4d4b9)
#12 0x2b0b90cf7ed3 in boost::unit_test::unit_test_main(bool (*)(), int, char**) (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x65ed3)
#13 0x2b0b92d59f44 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21f44)
#14 0x55ab56b37961 in _start (/home/travis/build/rgacogne/pdns/pdns/recursordist/pdns-recursor-0.0.0.0.HEAD.ge217873f32.dirty/testrunner+0x1bc3961)
(cherry picked from commit
98576e13197e200a9e1be4a3e00f4cf9488dafc2 )
Otto Moerbeek [Wed, 16 Dec 2020 10:41:41 +0000 (11:41 +0100)]
Merge pull request #9876 from omoerbeek/boost-more-toolsets
More toolsets in boost m4 code
Pieter Lexis [Wed, 16 Dec 2020 10:38:06 +0000 (11:38 +0100)]
Merge pull request #9788 from kpfleming/clarify-putZone-description
Clarify description of putZone API operation.
Remi Gacogne [Wed, 16 Dec 2020 10:04:49 +0000 (11:04 +0100)]
Merge pull request #9860 from rgacogne/rec-warnings-boost-174
rec: Get rid of warnings when compiling with Boost 1.74
Otto Moerbeek [Wed, 16 Dec 2020 09:50:46 +0000 (10:50 +0100)]
More toolsets in boost m4 code
Peter van Dijk [Wed, 16 Dec 2020 09:15:27 +0000 (10:15 +0100)]
remove +1
Remi Gacogne [Wed, 16 Dec 2020 08:36:01 +0000 (09:36 +0100)]
Merge pull request #9738 from rgacogne/ddist-doh-conn-stats
dnsdist: Add per connection queries count and duration stats for DoH
Remi Gacogne [Wed, 16 Dec 2020 08:33:44 +0000 (09:33 +0100)]
Merge pull request #9856 from rgacogne/rec-nsec3-hashes-cache
rec: Use a short-lived NSEC3 hashes cache for denial validation
Remi Gacogne [Wed, 16 Dec 2020 08:33:25 +0000 (09:33 +0100)]
Merge pull request #9874 from rgacogne/ddist-fix-doc-typos
dnsdist: Fix typos in the documentation
Remi Gacogne [Tue, 15 Dec 2020 11:47:07 +0000 (12:47 +0100)]
dnsdist: Fix typos in the documentation
Remi Gacogne [Mon, 14 Dec 2020 16:10:33 +0000 (17:10 +0100)]
Merge pull request #9862 from rgacogne/ddist-lua-bindings-server-drops
dnsdist: Add a Lua binding for the number of queries dropped by a server
Remi Gacogne [Mon, 14 Dec 2020 16:10:23 +0000 (17:10 +0100)]
Fix a c/p error in the documentation
Co-authored-by: Otto Moerbeek <otto.moerbeek@open-xchange.com>
Remi Gacogne [Fri, 11 Dec 2020 16:01:00 +0000 (17:01 +0100)]
rec: Get rid of warnings when compiling with Boost 1.74