]> git.ipfire.org Git - thirdparty/knot-resolver.git/log
thirdparty/knot-resolver.git
7 years agoMerge branch 'dockerfile-add-flake8' into 'master'
Petr Špaček [Fri, 19 Jan 2018 09:18:44 +0000 (10:18 +0100)] 
Merge branch 'dockerfile-add-flake8' into 'master'

ci: add flake8 to Dockerfile

See merge request knot/knot-resolver!449

7 years agoci: docker - add flake8, remove infer
Tomas Krizek [Thu, 18 Jan 2018 16:16:58 +0000 (17:16 +0100)] 
ci: docker - add flake8, remove infer

We do not use Infer after all (see MR !435) so it does not make sense to
have it in the image.

7 years agoMerge branch 'assert-cleanup' into 'master'
Petr Špaček [Fri, 19 Jan 2018 09:03:48 +0000 (10:03 +0100)] 
Merge branch 'assert-cleanup' into 'master'

daemon/worker: clean up some unnecessary asserts

See merge request knot/knot-resolver!450

7 years agodaemon/worker: clean up some unnecessary asserts
Grigorii Demidov [Fri, 19 Jan 2018 08:26:00 +0000 (09:26 +0100)] 
daemon/worker: clean up some unnecessary asserts

7 years agoMerge branch 'tls_polish' into 'master'
Petr Špaček [Thu, 18 Jan 2018 15:40:12 +0000 (16:40 +0100)] 
Merge branch 'tls_polish' into 'master'

TLS polish

See merge request knot/knot-resolver!447

7 years agoTLS: make GnuTLS priorities compatible with CentOS 7 and Debian 9
Petr Špaček [Thu, 18 Jan 2018 15:22:56 +0000 (16:22 +0100)] 
TLS: make GnuTLS priorities compatible with CentOS 7 and Debian 9

gnutls-3.3.26-9.el7.x86_64 and libgnutls30-3.5.8-5+deb9u3 do not support
@SYSTEM keyword and CentOS 7 has problem with -VERS-DTLS-ALL.

We do not configure DTLS sockets so it should be harmless to delete
the DTLS keyword.

@SYSTEM is replaced by NORMAL, oh well.

fixup! TLS client: enforce minimal TLS version and no compression

7 years agoTLS client: enforce minimal TLS version and no compression
Petr Špaček [Thu, 18 Jan 2018 14:47:15 +0000 (15:47 +0100)] 
TLS client: enforce minimal TLS version and no compression

Same change as in a625a0ea1ce03b0707fd421633f21c0aacb786da but for
client.

7 years agoTLS server: enforce minimal TLS version and no compression
Petr Špaček [Thu, 18 Jan 2018 13:12:45 +0000 (14:12 +0100)] 
TLS server: enforce minimal TLS version and no compression

Server side now enforces security requirements from
draft-ietf-dprive-dtls-and-tls-profiles-11 section 9

7 years agoTLS: use constants for GnuTLS return codes
Petr Špaček [Thu, 18 Jan 2018 13:11:26 +0000 (14:11 +0100)] 
TLS: use constants for GnuTLS return codes

GnuTLS manual for some functions do not declare that error return code
must be negative, so we should use constants to avoid potential
problems.

7 years agoTLS client: fix certificate loading from file
Petr Špaček [Thu, 18 Jan 2018 13:11:16 +0000 (14:11 +0100)] 
TLS client: fix certificate loading from file

gnutls_certificate_set_x509_trust_file could theoretically return 0
to indicate nothing was read, so we need to check for this as well.

7 years agoMerge !448: daemon: tls forwarding; fix IO error processing
Vladimír Čunát [Thu, 18 Jan 2018 15:24:13 +0000 (16:24 +0100)] 
Merge !448: daemon: tls forwarding; fix IO error processing

7 years agodaemon: tls forwarding; fix erroneus task processing when io errors occur
Grigorii Demidov [Thu, 18 Jan 2018 14:37:30 +0000 (15:37 +0100)] 
daemon: tls forwarding; fix erroneus task processing when io errors occur

7 years agoMerge branch 'tmpfiles-create-cache' into 'master'
Tomas Krizek [Thu, 18 Jan 2018 14:08:29 +0000 (15:08 +0100)] 
Merge branch 'tmpfiles-create-cache' into 'master'

tmpfiles: create cache and use proper tmpfiles name

See merge request knot/knot-resolver!440

7 years agotmpfiles: create cache and use proper tmpfiles name
Tomas Krizek [Fri, 12 Jan 2018 09:32:42 +0000 (10:32 +0100)] 
tmpfiles: create cache and use proper tmpfiles name

7 years agoMerge branch 'tls_tests' into 'master'
Petr Špaček [Thu, 18 Jan 2018 12:48:06 +0000 (13:48 +0100)] 
Merge branch 'tls_tests' into 'master'

policy TLS_FORWARD: add checks and documentation

See merge request knot/knot-resolver!445

7 years agopolicy TLS_FORWARDING: rename pin to pin_sha256
Petr Špaček [Thu, 18 Jan 2018 12:39:24 +0000 (13:39 +0100)] 
policy TLS_FORWARDING: rename pin to pin_sha256

The pin parameter contains SHA-256 encoded using Base64, but this is not
the only option. Explicit name allows us to add alternative formats
later on, and is consistent with GnuTLS naming.

7 years agopolicy TLS_FORWARD: documentation improvements
Tomas Krizek [Thu, 18 Jan 2018 11:19:55 +0000 (12:19 +0100)] 
policy TLS_FORWARD: documentation improvements

7 years agopolicy TLS_FORWARD: add documentation
Petr Špaček [Wed, 17 Jan 2018 18:08:53 +0000 (19:08 +0100)] 
policy TLS_FORWARD: add documentation

7 years agopolicy TLS_FORWARD: unify logging format
Petr Špaček [Wed, 17 Jan 2018 13:58:57 +0000 (14:58 +0100)] 
policy TLS_FORWARD: unify logging format

7 years agopolicy TLS_FORWARD: fix error reporting from net.tls_client()
Petr Špaček [Wed, 17 Jan 2018 13:37:16 +0000 (14:37 +0100)] 
policy TLS_FORWARD: fix error reporting from net.tls_client()

7 years agopolicy TLS_FORWARD: check parameters from user
Petr Špaček [Fri, 12 Jan 2018 15:57:03 +0000 (16:57 +0100)] 
policy TLS_FORWARD: check parameters from user

Policy handling was split into smaller functions to allow easier
checking. The code needs further refactoring, it seems that
net_tls_client is just a thin wrapper around tls_client_params_set in C,
which is unnecessary and error prone.

7 years agopolicy TLS_FORWARD: improve error reporting for invalid parameters
Petr Špaček [Fri, 12 Jan 2018 13:59:59 +0000 (14:59 +0100)] 
policy TLS_FORWARD: improve error reporting for invalid parameters

7 years agotests: add config tests for TLS_FORWARD
Petr Špaček [Fri, 12 Jan 2018 13:37:51 +0000 (14:37 +0100)] 
tests: add config tests for TLS_FORWARD

Apparently some corner cases are not handled properly.
We need to fix these in follow-up patches.

7 years agoMerge branch 'cleanup-errors' into 'master'
Petr Špaček [Thu, 18 Jan 2018 11:28:27 +0000 (12:28 +0100)] 
Merge branch 'cleanup-errors' into 'master'

fix some errors found by static analyzer

See merge request knot/knot-resolver!446

7 years agoCI: tweak scan-build configuration
Petr Špaček [Thu, 18 Jan 2018 09:43:54 +0000 (10:43 +0100)] 
CI: tweak scan-build configuration

Clang right now does not support cleanup attribute which is causing
false positives, so the check is now disabled.
https://bugs.llvm.org/show_bug.cgi?id=3888

At the same time I've enabled all other checkers to see what happens. We
need to go though them and disable them one-by-one if necessary.

7 years agodaemon/main: refactored keyfile initialization from main()
Marek Vavruša [Thu, 18 Jan 2018 00:55:52 +0000 (16:55 -0800)] 
daemon/main: refactored keyfile initialization from main()

this helps avoid false positive leaks caused by combination of
cleanup functions and goto

refs #291

7 years agolib/dnssec: variable declaration close to intended to avoid dead stores
Marek Vavruša [Thu, 18 Jan 2018 00:57:49 +0000 (16:57 -0800)] 
lib/dnssec: variable declaration close to intended to avoid dead stores

7 years agodaemon/worker: fixed missing return value check
Marek Vavruša [Thu, 18 Jan 2018 00:57:00 +0000 (16:57 -0800)] 
daemon/worker: fixed missing return value check

7 years agodaemon/engine: fixed missing ret
Marek Vavruša [Thu, 18 Jan 2018 00:54:55 +0000 (16:54 -0800)] 
daemon/engine: fixed missing ret

7 years agodaemon: fixed potential leak - cleanup not being called on longjmp
Marek Vavruša [Thu, 18 Jan 2018 00:39:37 +0000 (16:39 -0800)] 
daemon: fixed potential leak - cleanup not being called on longjmp

attribute cleanup (auto_free) gets called when variable goes out of
scope, not on longjmp (in lua_error), so the variable never gets freed

7 years agoMerge branch 'dockerfile-add-static-analysis-tools' into 'master'
Petr Špaček [Wed, 17 Jan 2018 16:08:49 +0000 (17:08 +0100)] 
Merge branch 'dockerfile-add-static-analysis-tools' into 'master'

Dockerfile: add static analysis tools

See merge request knot/knot-resolver!444

7 years agoDockerfile: add static analysis tools
Tomas Krizek [Tue, 16 Jan 2018 16:25:51 +0000 (17:25 +0100)] 
Dockerfile: add static analysis tools

7 years agoMerge branch 'tls-hs-timeout' into 'master'
Petr Špaček [Fri, 12 Jan 2018 13:36:04 +0000 (14:36 +0100)] 
Merge branch 'tls-hs-timeout' into 'master'

daemon: TLS-handshake timeout timer was not properly activated; fix

See merge request knot/knot-resolver!441

7 years agodaemon: TLS-handshake timeout timer was not properly activated; fix
Grigorii Demidov [Fri, 12 Jan 2018 12:54:37 +0000 (13:54 +0100)] 
daemon: TLS-handshake timeout timer was not properly activated; fix

7 years agoMerge branch 'stricter-ci-build' into 'master'
Petr Špaček [Fri, 12 Jan 2018 10:24:22 +0000 (11:24 +0100)] 
Merge branch 'stricter-ci-build' into 'master'

ci: add -Werror to CFLAGS, added clang build target

See merge request knot/knot-resolver!432

7 years agolint: enabled several readability linters and fixed issues
Marek Vavruša [Fri, 12 Jan 2018 07:11:08 +0000 (23:11 -0800)] 
lint: enabled several readability linters and fixed issues

this checks things such as inconsistent declarations and definitions

7 years agodaemon: fixed garbage read when getsockname fails
Marek Vavruša [Fri, 12 Jan 2018 06:37:20 +0000 (22:37 -0800)] 
daemon: fixed garbage read when getsockname fails

7 years agolib: fixed possible null pointers passed to nonnull arguments
Marek Vavruša [Fri, 12 Jan 2018 06:29:24 +0000 (22:29 -0800)] 
lib: fixed possible null pointers passed to nonnull arguments

7 years agodaemon: fixed minor linter problems
Marek Vavruša [Fri, 12 Jan 2018 06:15:16 +0000 (22:15 -0800)] 
daemon: fixed minor linter problems

7 years agoclient: fixed minor linter problems
Marek Vavruša [Fri, 12 Jan 2018 06:16:01 +0000 (22:16 -0800)] 
client: fixed minor linter problems

7 years agolib: fixed minor linter issues in lib
Marek Vavruša [Fri, 12 Jan 2018 06:07:30 +0000 (22:07 -0800)] 
lib: fixed minor linter issues in lib

7 years agolib/defines: analyzable implementation for kr_error()
Marek Vavruša [Fri, 12 Jan 2018 06:01:34 +0000 (22:01 -0800)] 
lib/defines: analyzable implementation for kr_error()

7 years agobuild: support `make lint-c` with clang-tidy
Marek Vavruša [Thu, 11 Jan 2018 01:09:04 +0000 (17:09 -0800)] 
build: support `make lint-c` with clang-tidy

This supports linting of C code using clang-tidy to fix common
security and code quality issues early in the development workflow.
The benefit is that less time has to be spent in code reviews to
point out obvious problems, and ideally when the outstanding issues
are fixed, clang-tidy (and clang-format) can also be used to to
automatically fix basic problems and enforce common code style,
similarly to `go vet && go fmt` workflow.

7 years agoci: add -Werror to CFLAGS, added clang build target
Marek Vavruša [Tue, 9 Jan 2018 17:38:10 +0000 (09:38 -0800)] 
ci: add -Werror to CFLAGS, added clang build target

7 years agoMerge branch 'clang' into 'master'
Petr Špaček [Thu, 11 Jan 2018 18:39:48 +0000 (19:39 +0100)] 
Merge branch 'clang' into 'master'

fixup! CI: add Clang scan-build to the pipeline

See merge request knot/knot-resolver!438

7 years agofixup! CI: add Clang scan-build to the pipeline
Petr Špaček [Thu, 11 Jan 2018 18:31:34 +0000 (19:31 +0100)] 
fixup! CI: add Clang scan-build to the pipeline

Forgot to `git add` Dockerfile with Clang tools.

7 years agoMerge branch 'systemd-modifications' into 'master'
Petr Špaček [Thu, 11 Jan 2018 18:26:58 +0000 (19:26 +0100)] 
Merge branch 'systemd-modifications' into 'master'

Systemd modifications

See merge request knot/knot-resolver!436

7 years agosystemd: add knot-resolver alias
Tomas Krizek [Thu, 11 Jan 2018 15:13:01 +0000 (16:13 +0100)] 
systemd: add knot-resolver alias

The `knot-resolver` name is used for paths and user name. Creating a
systemd alias with the same name is user-friendly to end users who won't
have to remember another name (`kresd`).

Note: Systemd Alias is only created after service is enabled. Packagers
are thus advised to create symlinks for unit files during package installation
so users can use `knot-resolver` name right from the start.

7 years agosystemd: use persistent cache by default
Tomas Krizek [Thu, 11 Jan 2018 12:50:52 +0000 (13:50 +0100)] 
systemd: use persistent cache by default

The /run directory is non-persistent. Use /var/cache/knot-resolver
as a persistent cache.

7 years agoREADME: remove trailing whitespace
Tomas Krizek [Thu, 11 Jan 2018 12:55:08 +0000 (13:55 +0100)] 
README: remove trailing whitespace

7 years agoMerge branch 'clan-scan-build' into 'master'
Petr Špaček [Thu, 11 Jan 2018 17:48:53 +0000 (18:48 +0100)] 
Merge branch 'clan-scan-build' into 'master'

CI: add Clan scan build to pipeline

See merge request knot/knot-resolver!437

7 years agoCI: add Clang scan-build to the pipeline
Petr Špaček [Thu, 11 Jan 2018 17:12:30 +0000 (18:12 +0100)] 
CI: add Clang scan-build to the pipeline

For now error produced by scan-build are not fatal.
We need to fix these first.

7 years agoCI: use images from local registry
Petr Špaček [Thu, 11 Jan 2018 17:12:06 +0000 (18:12 +0100)] 
CI: use images from local registry

7 years agoMerge branch 'fix-systemd-service' into 'master'
Petr Špaček [Thu, 11 Jan 2018 07:07:21 +0000 (08:07 +0100)] 
Merge branch 'fix-systemd-service' into 'master'

systemd: drop WantedBy directive from kresd.service

See merge request knot/knot-resolver!433

7 years agosystemd: drop WantedBy directive from kresd.service
Daniel Kahn Gillmor [Tue, 9 Jan 2018 21:06:45 +0000 (16:06 -0500)] 
systemd: drop WantedBy directive from kresd.service

This directive is unnecessary in the .service file, and it also causes
a dependency cycle that systemd is obliged to break.

Since kresd is socket-activated, there is no need for the WantedBy
directive in the .service file itself.  As long as the .socket files
are installed, the service will run when it is used.

7 years agoMerge branch 'systemd-enable-manual-activation' into 'master'
Petr Špaček [Wed, 10 Jan 2018 14:46:26 +0000 (15:46 +0100)] 
Merge branch 'systemd-enable-manual-activation' into 'master'

systemd: enable manual activation of kresd.service as non-root user

See merge request knot/knot-resolver!434

7 years agosystemd: enable manual activation of kresd.service as non-root user
Tomas Krizek [Wed, 10 Jan 2018 13:05:53 +0000 (14:05 +0100)] 
systemd: enable manual activation of kresd.service as non-root user

To be able to bind to a well known port as a non-root user, the CAP_NET_BIND_SERVICE
capability is required.

7 years agoMerge !431: daemon: fix clang warnings
Vladimír Čunát [Tue, 9 Jan 2018 09:54:20 +0000 (10:54 +0100)] 
Merge !431: daemon: fix clang warnings

7 years agodaemon: fix clang warnings
Grigorii Demidov [Tue, 9 Jan 2018 09:35:26 +0000 (10:35 +0100)] 
daemon: fix clang warnings

7 years agoMerge branch 'sim_qry' into 'master'
Petr Špaček [Mon, 8 Jan 2018 11:40:07 +0000 (12:40 +0100)] 
Merge branch 'sim_qry' into 'master'

outbound TCP connections sharing; TLS over outbound TCP connections

Closes #104

See merge request knot/knot-resolver!379

7 years agodaemon: avoid memory leaks under heavy load when using tls over outgoing tcp connection
Grigorii Demidov [Mon, 8 Jan 2018 09:12:17 +0000 (10:12 +0100)] 
daemon: avoid memory leaks under heavy load when using tls over outgoing tcp connection

7 years agodaemon: kresd fall into endless loop in some circumstances when tls is used; fix
Grigorii Demidov [Fri, 5 Jan 2018 09:03:23 +0000 (10:03 +0100)] 
daemon: kresd fall into endless loop in some circumstances when tls is used; fix

7 years agodaemon/tls_ephemeral_credentials: avoid some memory leaks
Grigorii Demidov [Fri, 5 Jan 2018 07:15:39 +0000 (08:15 +0100)] 
daemon/tls_ephemeral_credentials: avoid some memory leaks

7 years agodaemon: explicit processing of UV_EOF within stream read callback function
grid [Wed, 3 Jan 2018 10:39:03 +0000 (11:39 +0100)] 
daemon: explicit processing of UV_EOF within stream read callback function

7 years agoTLS: only print [tls] messages if --verbose
Vladimír Čunát [Thu, 14 Dec 2017 12:24:35 +0000 (13:24 +0100)] 
TLS: only print [tls] messages if --verbose

7 years agomodules/policy: TLS defaults to port 853
Petr Špaček [Wed, 13 Dec 2017 16:05:33 +0000 (17:05 +0100)] 
modules/policy: TLS defaults to port 853

7 years agomodules/policy: local variable declarations were fixed; cleanup
grid [Wed, 13 Dec 2017 13:50:54 +0000 (14:50 +0100)] 
modules/policy: local variable declarations were fixed; cleanup

7 years agomodules/policy: local variable declarations were fixed
grid [Wed, 13 Dec 2017 13:46:43 +0000 (14:46 +0100)] 
modules/policy: local variable declarations were fixed

7 years agodaemon/tls: tls client bugfix; correct processing of tcp connection closure
grid [Wed, 13 Dec 2017 13:25:39 +0000 (14:25 +0100)] 
daemon/tls: tls client bugfix; correct processing of tcp connection closure

7 years agodaemon/tls: tls_push() can fall into endless loop in some circumstances; prevent it
grid [Wed, 13 Dec 2017 09:20:53 +0000 (10:20 +0100)] 
daemon/tls: tls_push() can fall into endless loop in some circumstances; prevent it

7 years agodaemon: outbound TLS: penalise NS if authentication fails
grid [Wed, 6 Dec 2017 10:45:43 +0000 (11:45 +0100)] 
daemon: outbound TLS: penalise NS if authentication fails

7 years agodaemon: cleanup - free the memory allocated for hostnames
grid [Wed, 6 Dec 2017 09:46:15 +0000 (10:46 +0100)] 
daemon: cleanup - free the memory allocated for hostnames

7 years agopolicy.TLS_FORWARD: reduce net.tls_client() calls
Vladimír Čunát [Tue, 5 Dec 2017 17:34:56 +0000 (18:34 +0100)] 
policy.TLS_FORWARD: reduce net.tls_client() calls

It should be enough to update the table once per TLS_FORWARD rule,
without re-doing that every time the policy is triggered.

7 years agoprint_tls_client_params: print all address#port pairs
Vladimír Čunát [Tue, 5 Dec 2017 17:02:57 +0000 (18:02 +0100)] 
print_tls_client_params: print all address#port pairs

nitpick: pre-allocate table sizes

7 years agodaemon: TLS over outbound TCP connection - use hostname authentication
grid [Tue, 5 Dec 2017 14:15:44 +0000 (15:15 +0100)] 
daemon: TLS over outbound TCP connection - use hostname authentication

7 years agodaemon: bugfixes
grid [Mon, 27 Nov 2017 23:04:32 +0000 (00:04 +0100)] 
daemon: bugfixes

7 years agodaemon: bugfix; resolver fails on assertion if TLS over outbound connection is used...
Grigorii Demidov [Fri, 24 Nov 2017 10:59:50 +0000 (11:59 +0100)] 
daemon: bugfix; resolver fails on assertion if TLS over outbound connection is used  and upstream closes connection after each query

7 years agodaemon: retry waiting tasks when outbound TCP connection has problems
Grigorii Demidov [Mon, 20 Nov 2017 19:26:23 +0000 (20:26 +0100)] 
daemon: retry waiting tasks when outbound TCP connection has problems

7 years agodaemon/worker: clear query TCP flags when retrying
Grigorii Demidov [Thu, 16 Nov 2017 13:28:16 +0000 (14:28 +0100)] 
daemon/worker: clear query TCP flags when retrying

7 years agodaemon/worker: bugfix, avoid access to deallocated task
Grigorii Demidov [Thu, 16 Nov 2017 12:10:31 +0000 (13:10 +0100)] 
daemon/worker: bugfix, avoid access to deallocated task

7 years agodaemon/worker: retry all waiting tasks if upstream drops TCP connection
Grigorii Demidov [Thu, 16 Nov 2017 11:27:46 +0000 (12:27 +0100)] 
daemon/worker: retry all waiting tasks if upstream drops TCP connection

7 years agodaemon/worker: don't SERVFAIL immediately when TCP connection to upstream fails
Grigorii Demidov [Thu, 16 Nov 2017 09:52:46 +0000 (10:52 +0100)] 
daemon/worker: don't SERVFAIL immediately when TCP connection to upstream fails

7 years agoCI: try increasing the number of allowed filedescriptors
Vladimír Čunát [Wed, 15 Nov 2017 10:30:03 +0000 (11:30 +0100)] 
CI: try increasing the number of allowed filedescriptors

(cherry picked from commit a4a6169c3cdf2293ea0637b9af4526fb2cbbb94d)
Testing what happens on our CI.

7 years agodaemon: TCP - for now session source address is queried at tcp_accept(). AF_UNSPEC...
Grigorii Demidov [Wed, 15 Nov 2017 09:56:09 +0000 (10:56 +0100)] 
daemon: TCP - for now session source address is queried at tcp_accept(). AF_UNSPEC is treated as error for both of udp&tcp.

7 years agodaemon: improved reliability under heavy load; bugfixing & minor refactoring
Grigorii Demidov [Tue, 14 Nov 2017 12:03:06 +0000 (13:03 +0100)] 
daemon: improved reliability under heavy load; bugfixing & minor refactoring

7 years agodaemon: reuse outbound TCP connections if possible; TLS over outbound TCP connection
Grigorii Demidov [Tue, 12 Sep 2017 11:52:10 +0000 (13:52 +0200)] 
daemon: reuse outbound TCP connections if possible; TLS over outbound TCP connection

7 years agoMerge !430: Travis fixes and dependency updates
Vladimír Čunát [Thu, 4 Jan 2018 13:39:53 +0000 (14:39 +0100)] 
Merge !430: Travis fixes and dependency updates

7 years agotravis: skip Deckard tests
Vladimír Čunát [Thu, 4 Jan 2018 13:26:32 +0000 (14:26 +0100)] 
travis: skip Deckard tests

7 years agotravis: try to fix python modules
Vladimír Čunát [Thu, 4 Jan 2018 10:45:38 +0000 (11:45 +0100)] 
travis: try to fix python modules

7 years agobootstrap-depends: update dependencies
Vladimír Čunát [Thu, 4 Jan 2018 10:35:34 +0000 (11:35 +0100)] 
bootstrap-depends: update dependencies

7 years agoMerge branch 'travis_fixes' into 'master'
Petr Špaček [Thu, 4 Jan 2018 13:16:30 +0000 (14:16 +0100)] 
Merge branch 'travis_fixes' into 'master'

Do not point to Travis from README

See merge request knot/knot-resolver!429

7 years agoREADME: use badges from Gitlab instead of Travis/Coveralls
Petr Špaček [Thu, 4 Jan 2018 13:09:28 +0000 (14:09 +0100)] 
README: use badges from Gitlab instead of Travis/Coveralls

7 years agoMakefile: suppress misleadning warning about missing coverage.stats dir
Petr Špaček [Thu, 4 Jan 2018 10:45:32 +0000 (11:45 +0100)] 
Makefile: suppress misleadning warning about missing coverage.stats dir

7 years agoMakefile: remove unused check-config-clean
Petr Špaček [Thu, 4 Jan 2018 10:45:05 +0000 (11:45 +0100)] 
Makefile: remove unused check-config-clean

7 years agoMerge branch 'vendemiat/extend_kres_lua' into 'master'
Petr Špaček [Thu, 4 Jan 2018 10:19:55 +0000 (11:19 +0100)] 
Merge branch 'vendemiat/extend_kres_lua' into 'master'

Add useful lua functions to handle knot types

See merge request knot/knot-resolver!425

7 years agoallow access to cache object through context
Marek Vavruša [Thu, 4 Jan 2018 00:07:35 +0000 (16:07 -0800)] 
allow access to cache object through context

this surfaces the struct kr_cache through context variable,
it doesn't implement any API or documented interface for it,
so I just added a tests for the struct presence and introspection

7 years agoadded basic tests for cache interface
Marek Vavruša [Wed, 3 Jan 2018 23:24:23 +0000 (15:24 -0800)] 
added basic tests for cache interface

7 years agorenamed pkt:clear() to pkt:recycle() and added tests
Marek Vavruša [Wed, 3 Jan 2018 20:00:49 +0000 (12:00 -0800)] 
renamed pkt:clear() to pkt:recycle() and added tests

7 years agosupport text conversion of unknown RR types
Marek Vavruša [Tue, 2 Jan 2018 23:03:22 +0000 (15:03 -0800)] 
support text conversion of unknown RR types

7 years agoadded more functions to packet, added tests
Marek Vavruša [Fri, 29 Dec 2017 21:01:56 +0000 (13:01 -0800)] 
added more functions to packet, added tests