]>
git.ipfire.org Git - thirdparty/knot-resolver.git/log
Tomas Krizek [Fri, 19 Nov 2021 16:37:22 +0000 (17:37 +0100)]
Merge branch 'policy-domain' into 'master'
modules/policy: add 'domain' filter for equality matching
See merge request knot/knot-resolver!1228
Oto Šťáva [Fri, 19 Nov 2021 13:44:44 +0000 (14:44 +0100)]
modules/policy: deduplicate doc
Vladimír Čunát [Fri, 19 Nov 2021 13:03:50 +0000 (14:03 +0100)]
modules/policy docs: tweak an example
Overriding records makes more sense on a particular name
than in a whole sub-tree.
Oto Šťáva [Fri, 19 Nov 2021 12:57:43 +0000 (13:57 +0100)]
modules/policy: fix doc
Oto Šťáva [Fri, 19 Nov 2021 12:27:16 +0000 (13:27 +0100)]
modules/policy: fix unused variable (luacheck)
Oto Šťáva [Fri, 19 Nov 2021 12:18:25 +0000 (13:18 +0100)]
modules/policy: add integration test for 'domains' function
Oto Šťáva [Fri, 19 Nov 2021 11:07:36 +0000 (12:07 +0100)]
modules/policy: use a list of domains, instead of a single domain
Oto Šťáva [Fri, 19 Nov 2021 09:11:18 +0000 (10:11 +0100)]
modules/policy: add 'domain' filter for equality matching
Tomas Krizek [Fri, 19 Nov 2021 14:52:50 +0000 (15:52 +0100)]
Merge branch 'spelling' into 'master'
spelling & edns_keepalive fix
See merge request knot/knot-resolver!1229
Tomas Krizek [Fri, 19 Nov 2021 13:50:29 +0000 (14:50 +0100)]
.gitlab-ci: omit unused variable
Josh Soref [Wed, 17 Nov 2021 07:47:11 +0000 (02:47 -0500)]
edns_keepalive: fix loading of module
Due to the typo in the EDNS keepalive init funcion name, the module
wouldn't be properly initialized after loading and wouldn't be
functional.
Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
Josh Soref [Wed, 17 Nov 2021 07:06:13 +0000 (02:06 -0500)]
spelling
Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
Tomas Krizek [Mon, 8 Nov 2021 17:44:57 +0000 (18:44 +0100)]
Merge branch 'nitpicks' into 'master'
nitpicks
See merge request knot/knot-resolver!1220
Tomas Krizek [Mon, 8 Nov 2021 15:07:26 +0000 (16:07 +0100)]
ci/distrotests: add fedora35, ubuntu2110
Tomas Krizek [Wed, 3 Nov 2021 15:08:55 +0000 (16:08 +0100)]
ci: allow extra sync time for macos GH action
Vladimír Čunát [Tue, 2 Nov 2021 12:30:10 +0000 (13:30 +0100)]
doc logging: add a simple example
The brackets notation and string quotation are not obvious to everyone.
Vladimír Čunát [Tue, 2 Nov 2021 12:17:23 +0000 (13:17 +0100)]
ci build:macOS: more delay
Today it was often failing due to starting too soon.
Nothing depends on this job, so it's cheap to start its check later.
Tomas Krizek [Mon, 1 Nov 2021 12:15:08 +0000 (13:15 +0100)]
doc: remove outdated note about survery
Tomas Krizek [Fri, 29 Oct 2021 10:45:27 +0000 (12:45 +0200)]
lib/resolve: clarify why debug level is checked
Tomas Krizek [Tue, 26 Oct 2021 10:17:34 +0000 (12:17 +0200)]
modules/nsid: improve sanity check
Tomas Krizek [Thu, 4 Nov 2021 10:03:42 +0000 (11:03 +0100)]
Merge branch 'lua-log-fix' into 'master'
lua log(): make it work again
See merge request knot/knot-resolver!1223
Vladimír Čunát [Wed, 3 Nov 2021 16:44:36 +0000 (17:44 +0100)]
lua log(): make it work again
sandbox.lua:72: attempt to call global 'log_notice' (a nil value)
Broken by commit
39dd89db (MR !1208)
Tomas Krizek [Wed, 3 Nov 2021 14:45:41 +0000 (15:45 +0100)]
Merge branch 'zonemd-misc' into 'master'
various refactoring
See merge request knot/knot-resolver!1221
Vladimír Čunát [Tue, 2 Nov 2021 16:06:50 +0000 (17:06 +0100)]
lib/cache: improve internal docs
Vladimír Čunát [Mon, 4 Oct 2021 07:47:59 +0000 (09:47 +0200)]
lib/cache kr_cache_insert_rr(): add another parameter
NSEC* params were not being stashed by this function. For prefilling
it's useful, but doing it on *every* NSEC* record would be quite a waste,
so we introduce a parameter to select this.
Implementation: there were good reasons not to implement this until
needed - it wasn't straightforward at all.
Vladimír Čunát [Mon, 4 Oct 2021 07:53:34 +0000 (09:53 +0200)]
contrib/mempattern: add mm_ctx_delete()
It was a bit weird that the API had mempool creation but no deletion.
Vladimír Čunát [Mon, 27 Sep 2021 08:35:04 +0000 (10:35 +0200)]
lib/utils: factor out kr_timer_* from GC code
Also be more careful about rounding, overflows and assertions in there.
The implicit internal timer was unused and didn't seem worth keeping.
Vladimír Čunát [Mon, 27 Sep 2021 07:36:30 +0000 (09:36 +0200)]
lib/util: remove unused function
The POSIX APIs using `struct timeval` are deprecated anyway
in favor of clock_gettime() + `struct timespec`.
The function didn't seem well designed anyway, as `long` is just
32-bit on usual 32-bit platforms, which certainly isn't safe.
(roughly one month, on a quick glance)
Tomas Krizek [Wed, 3 Nov 2021 14:40:50 +0000 (15:40 +0100)]
Merge branch 'ipvx_priming_fix' into 'master'
modules/priming: don't query A/AAAA when IPv4/IPv6 is disabled
See merge request knot/knot-resolver!1222
Štěpán Balážik [Tue, 2 Nov 2021 16:22:45 +0000 (17:22 +0100)]
modules/priming: don't query A/AAAA when IPv4/IPv6 is disabled
Previously we primed for A/AAAA addresses of root servers even when
the respective IP version was disabled from configuration.
Tomas Krizek [Wed, 3 Nov 2021 14:39:37 +0000 (15:39 +0100)]
Merge branch 'zonemd-validator' into 'master'
lib/dnssec: refactor some parts
See merge request knot/knot-resolver!1213
Vladimír Čunát [Tue, 2 Nov 2021 09:19:02 +0000 (10:19 +0100)]
lib/dnssec.h: improve API docs
Vladimír Čunát [Mon, 4 Oct 2021 10:50:31 +0000 (12:50 +0200)]
lib/dnssec/signature nit: improve API docs
Vladimír Čunát [Fri, 24 Sep 2021 10:00:15 +0000 (12:00 +0200)]
lib/dnssec: add a simple validator API
Vladimír Čunát [Tue, 14 Sep 2021 15:46:19 +0000 (17:46 +0200)]
lib/dnssec: make kr_dnskeys_trusted() cleaner
This way it will be easier to re-use (and more efficient).
I really disliked those searches for RRSIGs embedded deep inside.
Uh, I tried to keep the new function as clean as possible,
moving hacks to outside.
Vladimír Čunát [Tue, 14 Sep 2021 15:35:24 +0000 (17:35 +0200)]
lib/dnssec: add a simpler version of kr_rrset_validate_with_key()
Vladimír Čunát [Fri, 3 Sep 2021 08:40:15 +0000 (10:40 +0200)]
lib/dnssec: factor out trim_ttl()
That `pkt` check was useless.
Vladimír Čunát [Sat, 28 Aug 2021 09:36:03 +0000 (11:36 +0200)]
lib/dnssec refactor: struct dseckey -> struct dnssec_key
I can't see motivation to add another abstraction layer here,
and it caused ugly type juggling. Let's use the libdnssec's type.
Vladimír Čunát [Sat, 28 Aug 2021 09:11:35 +0000 (11:11 +0200)]
lib/dnssec.c: refactor validate_rrsig_rr()
Vladimír Čunát [Wed, 3 Nov 2021 10:10:50 +0000 (11:10 +0100)]
Merge !1218: doc: lua-basexx dependency, clarify unit tests
Oto Šťáva [Mon, 25 Oct 2021 13:53:57 +0000 (15:53 +0200)]
doc: Add missing lua-basexx dependency, clarify default unit tests
Tomas Krizek [Wed, 27 Oct 2021 13:55:59 +0000 (15:55 +0200)]
Merge branch 'docker-debug-mode-log' into 'master'
Dockerfile: polish request tracing in debug_mode
See merge request knot/knot-resolver!1217
Tomas Krizek [Fri, 22 Oct 2021 13:26:42 +0000 (15:26 +0200)]
Dockerfile: polish request tracing in debug_mode
Since v5.4.0, using both debug level log and request tracing duplicates
lines in the log output. This makes the log more readable while
hopefully keeping all the relevant information there.
Tomas Krizek [Wed, 27 Oct 2021 12:27:10 +0000 (14:27 +0200)]
Merge branch 'ci-knot-3.1' into 'master'
ci: use knot 3.1
See merge request knot/knot-resolver!1219
Tomas Krizek [Wed, 27 Oct 2021 11:29:11 +0000 (13:29 +0200)]
ci: fix pylint issues
Tomas Krizek [Tue, 26 Oct 2021 14:02:25 +0000 (16:02 +0200)]
ci: use Knot 3.1
Tomas Krizek [Thu, 21 Oct 2021 11:34:00 +0000 (13:34 +0200)]
Merge branch 'policy-rpz-origin' into 'master'
policy.rpz: fix origin detection in files without $ORIGIN
See merge request knot/knot-resolver!1215
Tomas Krizek [Wed, 20 Oct 2021 14:50:22 +0000 (16:50 +0200)]
policy.rpz: nitpick - format zone file
Tomas Krizek [Wed, 20 Oct 2021 14:49:48 +0000 (16:49 +0200)]
policy.rpz: test coverage for SOA-defined origin
Vladimír Čunát [Mon, 18 Oct 2021 12:29:13 +0000 (14:29 +0200)]
policy.rpz: increase log severity
Issues affecting functionality of the RPZ should NOT be hidden
by default.
Vladimír Čunát [Mon, 18 Oct 2021 11:31:58 +0000 (13:31 +0200)]
policy.rpz: fix origin detection in files without $ORIGIN
Tomas Krizek [Wed, 20 Oct 2021 12:42:56 +0000 (14:42 +0200)]
Merge branch 'systemd_nss-lookup' into 'master'
systemd: add interaction with nss-lookup.target
See merge request knot/knot-resolver!1216
Vladimír Čunát [Wed, 20 Oct 2021 09:10:47 +0000 (11:10 +0200)]
systemd: add interaction with nss-lookup.target
The point is to allow other services wait for DNS availability.
Of course, kresd may not be the DNS provider for this machine,
but it seems reasonable to still do this by default.
Tomas Krizek [Wed, 13 Oct 2021 11:13:09 +0000 (13:13 +0200)]
Merge branch 'release-5-4-2' into 'master'
release 5.4.2
See merge request knot/knot-resolver!1212
Tomas Krizek [Wed, 13 Oct 2021 10:04:40 +0000 (12:04 +0200)]
release 5.4.2
Tomas Krizek [Wed, 13 Oct 2021 10:04:14 +0000 (12:04 +0200)]
scripts: remove ljezek from PGP keyblock
Tomas Krizek [Wed, 13 Oct 2021 10:00:35 +0000 (12:00 +0200)]
Merge branch 'nitpicks' into 'master'
nitpicks
See merge request knot/knot-resolver!1206
Vladimír Čunát [Tue, 12 Oct 2021 07:52:16 +0000 (09:52 +0200)]
daemon/worker: work around a rare crash
So far we have no idea how it can happen, but in this (rare) case
it seems fine to keep the process running.
Tomas Krizek [Mon, 11 Oct 2021 09:45:45 +0000 (11:45 +0200)]
distro/test: turn off OBS packaging tests for CentOS7
Builds are still checked by the other pkftest suite. However, OBS
mirrors for CentOS 7 are just problematic. We've already tried to
contact them once, they fixed the issue but mentioned it will probably
come back. No point in wasting any more time with this test then.
Tomas Krizek [Mon, 11 Oct 2021 08:45:39 +0000 (10:45 +0200)]
etc/config: fix typo in privacy example
Tomas Krizek [Wed, 6 Oct 2021 13:32:12 +0000 (15:32 +0200)]
doc: update install instructions
Tomas Krizek [Thu, 26 Aug 2021 15:26:46 +0000 (17:26 +0200)]
distro/tests: update to leap 15.3
Vladimír Čunát [Wed, 25 Aug 2021 11:20:17 +0000 (13:20 +0200)]
NEWS 5.3.2: add CVE-2021-40083 reference
Vladimír Čunát [Thu, 12 Aug 2021 13:47:08 +0000 (15:47 +0200)]
CI: improve README.md
Our "debian-buster" CI image was clearly not a buster
(based on versions in logs). I suspect this change can help.
Tomas Krizek [Thu, 19 Aug 2021 14:59:05 +0000 (16:59 +0200)]
trie_del: use KNOT_EOK instead of kr_ok()
Tomas Krizek [Mon, 11 Oct 2021 11:55:06 +0000 (13:55 +0200)]
Merge branch 'knot-headers' into 'master'
build: fix when knot-dns headers are on non-standard location
See merge request knot/knot-resolver!1210
Tomas Krizek [Mon, 11 Oct 2021 08:57:47 +0000 (10:57 +0200)]
distro/tests: fix leap15 test
knot-utils package is needed for kdig. However, if downstream package is
used, that tool is part of knot pkg instead - thus the missing package
would be non-critical. It is still needed if upstream packages are used.
Vladimír Čunát [Thu, 7 Oct 2021 11:58:01 +0000 (13:58 +0200)]
build: fix when knot-dns headers are on non-standard location
Tomas Krizek [Fri, 8 Oct 2021 09:27:13 +0000 (11:27 +0200)]
Merge branch 'detect_time_skew-nits' into 'master'
modules/detect_time_skew: minor fixes
See merge request knot/knot-resolver!1211
Vladimír Čunát [Fri, 8 Oct 2021 07:40:26 +0000 (09:40 +0200)]
modules/detect_time_skew: avoid cached `NS .`
Cache is persistent (in principle) and it might not have accurate data
for whatever reason. Let's not bring caching complications into this.
It's cheap: just a single query to root server(s) on resolver start.
Vladimír Čunát [Fri, 8 Oct 2021 07:36:28 +0000 (09:36 +0200)]
modules/detect_time_skew: fix wording of the message
Local time appears in future == the signatures appear not valid
*anymore*, and vice versa.
Vladimír Čunát [Thu, 7 Oct 2021 11:55:20 +0000 (13:55 +0200)]
Merge !1207: lib/selection: improve the NO6 behavior
Vladimír Čunát [Fri, 3 Sep 2021 16:41:11 +0000 (18:41 +0200)]
lib/selection: improve the NO6 behavior
With broken IPv6 and no knowledge of IP addresses, we were quite often
chosing to resolve a NS's AAAA and then using it... which wasn't good.
Let's give preference to A here as well.
Tomas Krizek [Mon, 4 Oct 2021 12:25:16 +0000 (14:25 +0200)]
Merge branch 'distrotest-centos-ca-certs' into 'master'
distro/test: update CA certificates for CentOS
See merge request knot/knot-resolver!1209
Tomas Krizek [Mon, 4 Oct 2021 11:40:05 +0000 (13:40 +0200)]
distro/test: update CA certificates for CentOS
On CentOS 7, the base image has an outdated LetsEncrypt certificate.
Vladimír Čunát [Mon, 20 Sep 2021 08:37:32 +0000 (10:37 +0200)]
Merge !1208: lua: use notice level for log()
Tomas Krizek [Wed, 15 Sep 2021 14:48:42 +0000 (16:48 +0200)]
lib/log: check the *last* log group number
Tomas Krizek [Wed, 15 Sep 2021 14:43:53 +0000 (16:43 +0200)]
lua: use notice level for log()
By default, notice level is set. Thus, if users want to use log() in the
same way as pre-5.4, they'd have to increase the log level. This bumps
the log level of log() function to keep the same behavior.
Vladimír Čunát [Mon, 30 Aug 2021 16:03:35 +0000 (18:03 +0200)]
Merge !1205: distro/tests: add debian11
Tomas Krizek [Mon, 30 Aug 2021 13:00:12 +0000 (15:00 +0200)]
ci: fix lint:pendantic
Tomas Krizek [Mon, 30 Aug 2021 12:50:26 +0000 (14:50 +0200)]
scripts: fix scanbuild on debian 11
Tomas Krizek [Mon, 30 Aug 2021 13:00:44 +0000 (15:00 +0200)]
tests/pytests: configure pylint to ignore consider-using-with
Tomas Krizek [Mon, 30 Aug 2021 11:05:57 +0000 (13:05 +0200)]
tests/pytests: remove dead code
Tomas Krizek [Mon, 30 Aug 2021 13:09:33 +0000 (15:09 +0200)]
ci: migrate jobs to debian 11
Tomas Krizek [Mon, 30 Aug 2021 13:09:19 +0000 (15:09 +0200)]
doc: fix build on debian 11
Tomas Krizek [Thu, 19 Aug 2021 11:33:09 +0000 (13:33 +0200)]
distro/tests: add debian11
Tomas Krizek [Wed, 25 Aug 2021 11:32:53 +0000 (11:32 +0000)]
Merge branch 'dns64-features' into 'master'
modules/dns64: new features
Closes #478 and #368
See merge request knot/knot-resolver!1201
Tomas Krizek [Mon, 23 Aug 2021 16:03:36 +0000 (18:03 +0200)]
modules/dns64: improve code readability
Vladimír Čunát [Tue, 10 Aug 2021 18:28:28 +0000 (20:28 +0200)]
modules/dns64: document the new features
Vladimír Čunát [Tue, 10 Aug 2021 17:42:28 +0000 (19:42 +0200)]
modules/dns64: implement "exclusion prefixes"
The RFC says we MUST do it, though this implementation is lazy and
avoids a SHOULD in the RFC.
Vladimír Čunát [Tue, 10 Aug 2021 17:34:40 +0000 (19:34 +0200)]
lib/utils kr_straddr_subnet() nit
For example, absolute path meant for AF_UNIX could confuse this.
Vladimír Čunát [Tue, 10 Aug 2021 08:42:54 +0000 (10:42 +0200)]
modules/dns64: add kr_query::flags.DNS64_DISABLE
It's not a perfect solution and with the future policy engine it will
hopefully be better, but it's really trivial to add this already.
(should've done that years ago)
Vladimír Čunát [Mon, 9 Aug 2021 18:28:58 +0000 (20:28 +0200)]
modules/dns64: also map the reverse (PTR) subtree
Vladimír Čunát [Tue, 10 Aug 2021 09:21:13 +0000 (11:21 +0200)]
modules/dns64: allow configuring by a table
Backward compatible. It will be useful when adding further features.
Also improve config error traces.
Tomas Krizek [Thu, 19 Aug 2021 12:31:38 +0000 (12:31 +0000)]
Merge branch 'release-5-4-1' into 'master'
release 5.4.1
See merge request knot/knot-resolver!1204
Tomas Krizek [Thu, 19 Aug 2021 11:33:27 +0000 (13:33 +0200)]
release 5.4.1
Tomas Krizek [Thu, 19 Aug 2021 12:26:41 +0000 (12:26 +0000)]
Merge branch 'doh2-free-unsent-streams' into 'master'
doh2: ensure memory from unsent streams is freed
See merge request knot/knot-resolver!1202
Tomas Krizek [Wed, 18 Aug 2021 14:22:17 +0000 (16:22 +0200)]
doh2: use stream_write_data instead of stream user_data
Tomas Krizek [Wed, 18 Aug 2021 14:09:33 +0000 (16:09 +0200)]
doh2: handle OOM when allocating callbacks
Tomas Krizek [Wed, 18 Aug 2021 13:18:27 +0000 (15:18 +0200)]
doh2: ensure memory from unsent streams is freed
The nghttp2 on_stream_close callback is only called for streams that are
properly closed. If we need to tear down the HTTP connection due to any
reason (e.g. IO error in underlying layer), some streams may not be
propely closed.
Due to HTTP/2 flow control, we may also wait indefinitely for the data
to be written. This can also cause the stream to never be properly
closed.
To handle these cases, a reference of allocated data is kept and we
ensure everything is freed once we're closing the http session.