]>
git.ipfire.org Git - thirdparty/pdns.git/log
Remi Gacogne [Thu, 24 Dec 2020 10:38:26 +0000 (11:38 +0100)]
dnsdist: Fix a hang when removing a server with more than one socket
There was a lock starvation issue when removing a server with more
than one socket in use (`sockets` greater than 1 on the corresponding
`newServer` directive), because the mutex protecting the sockets array
would never be released long enough by the responder thread to allow
the thread stopping the server to acquire it.
This commit fixes that by marking the server as stopped right away,
before acquiring the lock, and also making sure that the responder
thread is woken up regularly (every second, even without any query
to process) and that it checks whether the server has been stopped
just after that.
The issue was introduced in
be55a20ce9bb7140071279d70bcb460f1f2b7b7d ,
and backported to 1.5.1 in
f0d48318cce0dd80ae73c529362bdb2921d8c5c9 .
Remi Gacogne [Tue, 22 Dec 2020 09:28:57 +0000 (10:28 +0100)]
Merge pull request #9841 from rgacogne/pb-logger-short-read
ProtobufLogger: Better handling of short-reads, errors
Remi Gacogne [Tue, 22 Dec 2020 09:17:12 +0000 (10:17 +0100)]
Merge pull request #9895 from mortenstevens/patch-4
Fix missing #include for gcc-11
Pieter Lexis [Tue, 22 Dec 2020 08:28:57 +0000 (09:28 +0100)]
Merge pull request #9896 from jacobbunk/max-signature-cache-entries-doc
Document the behavior of the max-signature-cache-entries setting.
Jacob Bunk Nielsen [Tue, 22 Dec 2020 07:22:22 +0000 (08:22 +0100)]
Document the behavior of the max-signature-cache-entries setting.
Update documentation with a few things I learned during a debugging
session with great help on IRC.
If you use NSEC narrow mode and handle queries that generates a lot of
signatures, e.g. because of random subdomain queries this can cause
the cache to grow very large.
Also document the surprising cache eviction policy of dropping all
cache entries when the maximum cache size is hit.
Morten Stevens [Mon, 21 Dec 2020 11:11:01 +0000 (12:11 +0100)]
Fix missing #include for gcc-11
Pieter Lexis [Fri, 18 Dec 2020 15:34:00 +0000 (16:34 +0100)]
Merge pull request #9715 from pieterlexis/4.1-docs
Remove all documentation irrelevant after 4.4.0
Pieter Lexis [Fri, 18 Dec 2020 15:33:08 +0000 (16:33 +0100)]
Merge pull request #9844 from pieterlexis/SVCB-correctly-parse-unknown
SVCB: Correctly parse and print unknown params
Peter van Dijk [Fri, 18 Dec 2020 10:49:43 +0000 (11:49 +0100)]
Merge pull request #9887 from Habbie/auth-4.4.0-docs
changelog+secpoll for auth-4.4.0
Otto Moerbeek [Fri, 18 Dec 2020 07:22:37 +0000 (08:22 +0100)]
Kill dead link, replace by more descriptive text
Peter van Dijk [Thu, 17 Dec 2020 18:57:06 +0000 (19:57 +0100)]
Merge pull request #9848 from pieterlexis/stub-logging
stub: improve logging
Peter van Dijk [Thu, 17 Dec 2020 18:54:11 +0000 (19:54 +0100)]
Merge pull request #9880 from Habbie/auth-upgrade-docs-confusion
auth docs: unconfuse upgrade text about unknown types
Peter van Dijk [Thu, 17 Dec 2020 18:38:39 +0000 (19:38 +0100)]
Merge pull request #9881 from Habbie/el6-ipv6
el6 docker builds: prefer v4 resolution
Peter van Dijk [Thu, 17 Dec 2020 17:33:09 +0000 (18:33 +0100)]
Merge pull request #9879 from rgacogne/rec-ubsan-fixes
rec: A few UBSAN-related fixes
Peter van Dijk [Thu, 17 Dec 2020 09:16:48 +0000 (10:16 +0100)]
changelog+secpoll+EOL update for auth-4.4.0
Peter van Dijk [Wed, 16 Dec 2020 14:02:38 +0000 (15:02 +0100)]
el6 docker builds: prefer v4 resolution
Peter van Dijk [Wed, 16 Dec 2020 12:52:20 +0000 (13:52 +0100)]
auth docs: unconfuse upgrade text about unknown types
Remi Gacogne [Wed, 16 Dec 2020 11:31:19 +0000 (12:31 +0100)]
rec: Preload libasan, when defined, before running regression tests
Remi Gacogne [Thu, 27 Feb 2020 15:29:49 +0000 (16:29 +0100)]
rec: Fix building our unit tests with Undefined Behavior Sanitizer
(cherry picked from commit
063a03a75e508d8937fbad67202f97e27a16f078 )
Remi Gacogne [Fri, 28 Feb 2020 12:46:03 +0000 (13:46 +0100)]
rec: Avoid overflow when computing latency
Reported by UBSan:
[2020-02-28 12:21:21] pdns_recursor.cc:1841:31: runtime error: -276679 is outside the range of representable values of type 'unsigned long'
[2020-02-28 12:21:21] #0 0x5610bb76af48 in startDoResolve(void*) /home/travis/build/rgacogne/pdns/pdns/recursordist/pdns-recursor-0.0.0.0.HEAD.g5d6e6b9f95.dirty/pdns_recursor.cc:1841:31
[2020-02-28 12:21:21] #1 0x5610bb7d60ac in MTasker<PacketID, std::string>::makeThread(void (*)(void*), void*)::{lambda()#1}::operator()() const /home/travis/build/rgacogne/pdns/pdns/recursordist/pdns-recursor-0.0.0.0.HEAD.g5d6e6b9f95.dirty/./mtasker.cc:284:7
[2020-02-28 12:21:21] #2 0x5610bb6bae9d in boost::function0<void>::operator()() const /usr/include/boost/function/function_template.hpp:766:14
[2020-02-28 12:21:21] #3 0x5610bb6ba21b in threadWrapper(long) /home/travis/build/rgacogne/pdns/pdns/recursordist/pdns-recursor-0.0.0.0.HEAD.g5d6e6b9f95.dirty/./mtasker_fcontext.cc:144:9
[2020-02-28 12:21:21] #4 0x7f29cb06d70d in make_fcontext (/usr/lib/x86_64-linux-gnu/libboost_context.so.1.54.0+0x70d)
(cherry picked from commit
b7d61cb18a9bc99d2c759f24e1340efc7a1c7725 )
Remi Gacogne [Fri, 28 Feb 2020 10:51:51 +0000 (11:51 +0100)]
Prevent signed integer overflow in LOC record conversion
Reported by UBSan:
sillyrecords.cc:301:42: runtime error: signed integer overflow:
2031844648 - -
2147483648 cannot be represented in type 'int'
#0 0x55ab56ff5fbd in LOCRecordContent::getZoneRepresentation(bool) const /home/travis/build/rgacogne/pdns/pdns/recursordist/pdns-recursor-0.0.0.0.HEAD.ge217873f32.dirty/sillyrecords.cc:301:42
#1 0x55ab571da021 in test_dnsrecords_cc::test_record_types::test_method() /home/travis/build/rgacogne/pdns/pdns/recursordist/pdns-recursor-0.0.0.0.HEAD.ge217873f32.dirty/test-dnsrecords_cc.cc:232:11
#2 0x55ab571c9a4a in test_dnsrecords_cc::test_record_types_invoker() /home/travis/build/rgacogne/pdns/pdns/recursordist/pdns-recursor-0.0.0.0.HEAD.ge217873f32.dirty/test-dnsrecords_cc.cc:42:1
#3 0x55ab57136125 in boost::unit_test::ut_detail::callback0_impl_t<boost::unit_test::ut_detail::unused, void (*)()>::invoke() /usr/include/boost/test/utils/callback.hpp:89:46
#4 0x2b0b90cfa1f0 (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x681f0)
#5 0x2b0b90cd5545 in boost::execution_monitor::catch_signals(boost::unit_test::callback0<int> const&) (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x43545)
#6 0x2b0b90cd5d82 in boost::execution_monitor::execute(boost::unit_test::callback0<int> const&) (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x43d82)
#7 0x2b0b90cfa2f1 in boost::unit_test::unit_test_monitor_t::execute_and_translate(boost::unit_test::test_case const&) (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x682f1)
#8 0x2b0b90ce3f93 in boost::unit_test::framework_impl::visit(boost::unit_test::test_case const&) (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x51f93)
#9 0x2b0b90d12d22 in boost::unit_test::traverse_test_tree(boost::unit_test::test_suite const&, boost::unit_test::test_tree_visitor&) (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x80d22)
#10 0x2b0b90d12d22 in boost::unit_test::traverse_test_tree(boost::unit_test::test_suite const&, boost::unit_test::test_tree_visitor&) (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x80d22)
#11 0x2b0b90cdf4b9 in boost::unit_test::framework::run(unsigned long, bool) (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x4d4b9)
#12 0x2b0b90cf7ed3 in boost::unit_test::unit_test_main(bool (*)(), int, char**) (/usr/lib/x86_64-linux-gnu/libboost_unit_test_framework.so.1.54.0+0x65ed3)
#13 0x2b0b92d59f44 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21f44)
#14 0x55ab56b37961 in _start (/home/travis/build/rgacogne/pdns/pdns/recursordist/pdns-recursor-0.0.0.0.HEAD.ge217873f32.dirty/testrunner+0x1bc3961)
(cherry picked from commit
98576e13197e200a9e1be4a3e00f4cf9488dafc2 )
Otto Moerbeek [Wed, 16 Dec 2020 10:41:41 +0000 (11:41 +0100)]
Merge pull request #9876 from omoerbeek/boost-more-toolsets
More toolsets in boost m4 code
Pieter Lexis [Wed, 16 Dec 2020 10:38:06 +0000 (11:38 +0100)]
Merge pull request #9788 from kpfleming/clarify-putZone-description
Clarify description of putZone API operation.
Remi Gacogne [Wed, 16 Dec 2020 10:04:49 +0000 (11:04 +0100)]
Merge pull request #9860 from rgacogne/rec-warnings-boost-174
rec: Get rid of warnings when compiling with Boost 1.74
Otto Moerbeek [Wed, 16 Dec 2020 09:50:46 +0000 (10:50 +0100)]
More toolsets in boost m4 code
Peter van Dijk [Wed, 16 Dec 2020 09:15:27 +0000 (10:15 +0100)]
remove +1
Remi Gacogne [Wed, 16 Dec 2020 08:36:01 +0000 (09:36 +0100)]
Merge pull request #9738 from rgacogne/ddist-doh-conn-stats
dnsdist: Add per connection queries count and duration stats for DoH
Remi Gacogne [Wed, 16 Dec 2020 08:33:44 +0000 (09:33 +0100)]
Merge pull request #9856 from rgacogne/rec-nsec3-hashes-cache
rec: Use a short-lived NSEC3 hashes cache for denial validation
Remi Gacogne [Wed, 16 Dec 2020 08:33:25 +0000 (09:33 +0100)]
Merge pull request #9874 from rgacogne/ddist-fix-doc-typos
dnsdist: Fix typos in the documentation
Remi Gacogne [Tue, 15 Dec 2020 11:47:07 +0000 (12:47 +0100)]
dnsdist: Fix typos in the documentation
Remi Gacogne [Mon, 14 Dec 2020 16:10:33 +0000 (17:10 +0100)]
Merge pull request #9862 from rgacogne/ddist-lua-bindings-server-drops
dnsdist: Add a Lua binding for the number of queries dropped by a server
Remi Gacogne [Mon, 14 Dec 2020 16:10:23 +0000 (17:10 +0100)]
Fix a c/p error in the documentation
Co-authored-by: Otto Moerbeek <otto.moerbeek@open-xchange.com>
Remi Gacogne [Fri, 11 Dec 2020 16:01:00 +0000 (17:01 +0100)]
rec: Get rid of warnings when compiling with Boost 1.74
Otto Moerbeek [Mon, 14 Dec 2020 10:45:14 +0000 (11:45 +0100)]
Merge pull request #9855 from omoerbeek/rec-prep-4.4.2
rec: Prep for rec 4.4.2 release
Remi Gacogne [Mon, 14 Dec 2020 10:44:41 +0000 (11:44 +0100)]
rec: Fix the NSEC3 hashes cache on older systems
By explicitely constructing the tuple.
Peter van Dijk [Mon, 14 Dec 2020 09:50:05 +0000 (10:50 +0100)]
Merge pull request #9847 from mind04/pdns-trusted-notify
auth: don't log trusted-notification-proxy notify at error level
Peter van Dijk [Mon, 14 Dec 2020 09:39:06 +0000 (10:39 +0100)]
Merge pull request #9840 from omoerbeek/auth-no-incbin
Stop using incbin and use od & sed to generate constant string data
Peter van Dijk [Mon, 14 Dec 2020 09:22:34 +0000 (10:22 +0100)]
Merge pull request #9858 from Habbie/bind-dl-static
auth bind: call DynListener static functions correctly
Remi Gacogne [Fri, 11 Dec 2020 16:34:39 +0000 (17:34 +0100)]
dnsdist: Add a Lua binding for the number of queries dropped by a server
Remi Gacogne [Fri, 11 Dec 2020 16:07:29 +0000 (17:07 +0100)]
Merge pull request #9832 from rgacogne/faster-unique-ids
UUID: Use the non-cryptographic variant of the boost::uuid
Remi Gacogne [Fri, 11 Dec 2020 15:37:49 +0000 (16:37 +0100)]
rec: Copy the salt into the cache instead of taking a reference
At the moment the salt does live longer than the cache, but that
might hold true forever.
Otto Moerbeek [Fri, 11 Dec 2020 13:30:42 +0000 (14:30 +0100)]
Prep for rec 4.4.2 release
Otto Moerbeek [Fri, 11 Dec 2020 15:10:48 +0000 (16:10 +0100)]
Merge pull request #9854 from omoerbeek/rec-more-stack-for-asan
More stack when asan is used
Your Name [Fri, 11 Dec 2020 14:58:02 +0000 (15:58 +0100)]
auth bind: call DynListener static functions correctly
Remi Gacogne [Fri, 11 Dec 2020 10:12:06 +0000 (11:12 +0100)]
rec: Use a short-lived NSEC3 hashes cache for denial validation
It turns out that computing those SHA1 hashes is far from cheap,
and in almost all cases the salt and iterations are identical
so no need to compute them several times.
Otto Moerbeek [Fri, 11 Dec 2020 13:46:49 +0000 (14:46 +0100)]
Avoid out of bounds access on empty path and do not send a body on 404
Otto Moerbeek [Fri, 11 Dec 2020 12:15:47 +0000 (13:15 +0100)]
More stack when asan is used
Otto Moerbeek [Fri, 11 Dec 2020 11:18:12 +0000 (12:18 +0100)]
Also use the new incbin for rec and dnsdist
Otto Moerbeek [Fri, 11 Dec 2020 10:57:56 +0000 (11:57 +0100)]
force 1 byte reads for od
Otto Moerbeek [Fri, 11 Dec 2020 10:11:00 +0000 (11:11 +0100)]
Make the processing binary safe and zap the incbin include from ws-auth.cc
Remi Gacogne [Fri, 11 Dec 2020 08:22:17 +0000 (09:22 +0100)]
Merge pull request #9850 from rgacogne/ddist-no-policy-copy
dnsdist: Don't copy the policy for every query
Remi Gacogne [Thu, 10 Dec 2020 14:01:14 +0000 (15:01 +0100)]
dnsdist: Don't copy the policy for every query
It used to be a cheap object to copy but it now hold two strings.
Kees Monshouwer [Tue, 8 Dec 2020 21:56:10 +0000 (22:56 +0100)]
auth: don't log trusted-notification-proxy notify at error level
Pieter Lexis [Wed, 9 Dec 2020 16:03:53 +0000 (17:03 +0100)]
SVCB: Correctly parse and print unknown params
There were multiple issues. With this commit, we *always* store the
bytes that are represented by the option. To do this, we needed to
properly parse RFC 1035 character-strings. This is now done with a
conversion of the ABNF from draft-ietf-dnsop-svcb-https-02 to ragel.
The resulting function could be used as a starting point for a better
TXT storage format.
Fixes #9829
Remi Gacogne [Wed, 9 Dec 2020 14:59:56 +0000 (15:59 +0100)]
ProtobufLogger: Better handling of short-reads, errors
Otto Moerbeek [Wed, 9 Dec 2020 14:33:58 +0000 (15:33 +0100)]
Stop using incbin and use od & sed to generate constant string data.
Remi Gacogne [Wed, 9 Dec 2020 12:39:17 +0000 (13:39 +0100)]
Merge pull request #9828 from rgacogne/rec-bogus-states-compat-and-docs
rec: Add a compatibility layer for 'Bogus', document changes and the new metrics
Remi Gacogne [Wed, 9 Dec 2020 08:49:37 +0000 (09:49 +0100)]
Merge pull request #9822 from qvr/feature/dnsdist-acl-from-file
dnsdist: add ability to set ACL from a file
Otto Moerbeek [Wed, 9 Dec 2020 07:37:38 +0000 (08:37 +0100)]
Add a speedtest for uuid generation
Otto Moerbeek [Tue, 8 Dec 2020 18:45:30 +0000 (19:45 +0100)]
Merge pull request #9670 from omoerbeek/rec-offensive-language
Rec: offensive language
Peter van Dijk [Tue, 8 Dec 2020 16:42:16 +0000 (17:42 +0100)]
Merge pull request #9831 from Habbie/el8-powertools
el8: PowerTools is now powertools
Remi Gacogne [Tue, 8 Dec 2020 15:54:14 +0000 (16:54 +0100)]
UUID: Use the non-cryptographic variant of the boost::uuid
Since Boost 1.67.0 the default UUID generator is cryptographically
strong, which is neat but quite slower. Since we don't need that,
just use the fastest version.
Your Name [Tue, 8 Dec 2020 14:23:13 +0000 (15:23 +0100)]
el8: PowerTools is now powertools
Pieter Lexis [Tue, 8 Dec 2020 14:09:03 +0000 (15:09 +0100)]
stub: improve logging
Otto Moerbeek [Mon, 7 Dec 2020 12:26:02 +0000 (13:26 +0100)]
Apply suggestions from code review
Co-authored-by: Remi Gacogne <rgacogne+github@valombre.net>
Otto Moerbeek [Wed, 2 Dec 2020 14:53:59 +0000 (15:53 +0100)]
rpzMaster -> rpzPrimary
Otto Moerbeek [Wed, 4 Nov 2020 13:37:18 +0000 (14:37 +0100)]
Deprecate more black- or whitelists
Otto Moerbeek [Wed, 4 Nov 2020 09:35:18 +0000 (10:35 +0100)]
snmp-master-socket -> snmp-daemon-socket
Matti Hiljanen [Mon, 7 Dec 2020 11:53:25 +0000 (13:53 +0200)]
dnsdist: document setACLFromFile()
Matti Hiljanen [Mon, 7 Dec 2020 11:37:25 +0000 (13:37 +0200)]
dnsdist: add setACLFromFile()
Peter van Dijk [Mon, 7 Dec 2020 21:40:31 +0000 (22:40 +0100)]
Merge pull request #9787 from Habbie/circleci-extend
extend CircleCI coverage
Remi Gacogne [Mon, 7 Dec 2020 16:47:41 +0000 (17:47 +0100)]
rec: Add regression tests for the DNSSEC states
Remi Gacogne [Mon, 7 Dec 2020 16:46:47 +0000 (17:46 +0100)]
rec: Document the new DNSSEC states and helpers
Remi Gacogne [Mon, 7 Dec 2020 16:41:11 +0000 (17:41 +0100)]
rec: Add the Lua 'isValidationStateBogus' convenience function
Remi Gacogne [Mon, 7 Dec 2020 12:32:17 +0000 (13:32 +0100)]
rec: Preserve compatibility with Lua scripts using the 'Bogus' state
Remi Gacogne [Mon, 7 Dec 2020 09:22:36 +0000 (10:22 +0100)]
rec: Export a 'Bogus' metric as the sum of all other Bogus metrics
Otto Moerbeek [Mon, 7 Dec 2020 14:10:37 +0000 (15:10 +0100)]
Merge pull request #9807 from rgacogne/rec-untangle-resolving-validating-names-types
rec: Untangle the validation/resolving qnames and qtypes
Peter van Dijk [Thu, 26 Nov 2020 12:50:20 +0000 (13:50 +0100)]
circleci auth: build and test more backends
Otto Moerbeek [Mon, 7 Dec 2020 12:27:28 +0000 (13:27 +0100)]
Merge pull request #9817 from rgacogne/rec-keep-valid-cached-over-bogus
rec: Keep a cached, valid entry over a fresher Bogus one
Peter van Dijk [Mon, 7 Dec 2020 10:11:10 +0000 (11:11 +0100)]
Merge pull request #9820 from Habbie/auth-4.4.0-rc1-docs
auth-4.4.0-rc1: docs and secpoll
Your Name [Mon, 7 Dec 2020 08:16:09 +0000 (09:16 +0100)]
auth-4.4.0-rc1: docs and secpoll
Remi Gacogne [Fri, 4 Dec 2020 16:17:24 +0000 (17:17 +0100)]
rec: Fix a comment, as suggested by Otto
Remi Gacogne [Fri, 4 Dec 2020 16:16:34 +0000 (17:16 +0100)]
rec: Fix unit test formatting
Remi Gacogne [Thu, 3 Dec 2020 14:21:48 +0000 (15:21 +0100)]
rec: Keep a cached, valid entry over a fresher Bogus one
It turns out to be quite difficult to make us accept a record that
we already have in cache, thanks to sanitization, but let's make
sure that we will not replace a valid entry with a Bogus one if that
happens.
It might happen for SOA records, and for DS records when the TTL of
the corresponding NS records is shorter than the TTL of the DS.
Peter van Dijk [Fri, 4 Dec 2020 10:45:08 +0000 (11:45 +0100)]
Merge pull request #9815 from Habbie/el6-eol-vault
el6 builds: use vault.centos.org
Otto Moerbeek [Fri, 4 Dec 2020 10:30:07 +0000 (11:30 +0100)]
Merge pull request #9812 from rgacogne/rec-webserver-error
rec: Handle failure to start the web server more gracefully
Otto Moerbeek [Fri, 4 Dec 2020 10:22:26 +0000 (11:22 +0100)]
Merge pull request #9720 from omoerbeek/rec-min-ttl-override-default
Switch default TTL override to 1.
Otto Moerbeek [Fri, 4 Dec 2020 10:22:15 +0000 (11:22 +0100)]
each -> every
Co-authored-by: Remi Gacogne <rgacogne+github@valombre.net>
Your Name [Thu, 3 Dec 2020 11:30:15 +0000 (12:30 +0100)]
el6 builds: use vault.centos.org
Peter van Dijk [Thu, 3 Dec 2020 18:46:35 +0000 (19:46 +0100)]
Merge pull request #9813 from Habbie/geoip-scope-latlonloc
auth geoip: set netmask on all string formatting types
Peter van Dijk [Thu, 3 Dec 2020 13:50:40 +0000 (14:50 +0100)]
Merge pull request #9779 from Habbie/gh-action-builder
gh actions: build centos6 packages
Peter van Dijk [Thu, 3 Dec 2020 12:42:59 +0000 (13:42 +0100)]
Merge pull request #9803 from Habbie/docker-pdns-version
dockerfiles: do not claim equivs-dummy is sourced from pdns
Peter van Dijk [Thu, 3 Dec 2020 08:57:20 +0000 (09:57 +0100)]
auth geoip: set netmask on all string formatting types
(via Kees Monshouwer)
Remi Gacogne [Thu, 3 Dec 2020 08:41:53 +0000 (09:41 +0100)]
Merge pull request #9801 from rgacogne/ddist-noqueue-for-trailing-data-queries
dnsdist: Clean up the internal queues use for self-answered and trailing test responses
Remi Gacogne [Thu, 3 Dec 2020 08:41:20 +0000 (09:41 +0100)]
Merge pull request #9756 from rgacogne/ddist-dynblocks-metrics
dnsdist: Add prometheus metrics for top Dynamic Blocks entries
Remi Gacogne [Thu, 3 Dec 2020 08:41:03 +0000 (09:41 +0100)]
Merge pull request #9806 from rgacogne/rec-report-exact-bogus-state
rec: Log the exact Bogus state when 'dnssec-log-bogus' is enabled
Remi Gacogne [Thu, 3 Dec 2020 08:34:08 +0000 (09:34 +0100)]
rec: Handle failure to start the web server more gracefully
At this point we already have several threads so calling exit()
will cause problem by trying to destruct objects that are in use
by other threads, so call _exit() instead.
Also mention the web server in the error message so that the root
cause is easier to identify.
Peter van Dijk [Wed, 2 Dec 2020 18:30:03 +0000 (19:30 +0100)]
Merge pull request #9768 from mind04/pdns-latency
auth: fix rounding inaccuracy in latency statistics
Remi Gacogne [Wed, 2 Dec 2020 16:23:21 +0000 (17:23 +0100)]
Merge pull request #9793 from rgacogne/rec-gather-denial-for-wildcard
rec: Fix the gathering of denial proof for wildcard-expanded answers
Otto Moerbeek [Fri, 20 Nov 2020 10:39:13 +0000 (11:39 +0100)]
Say something about the consequences of using minimum-ttl-override of zero.