]>
git.ipfire.org Git - thirdparty/pdns.git/log
romeroalx [Fri, 5 Apr 2024 10:02:55 +0000 (12:02 +0200)]
gh actions - replace yq snap in collect job build-and-test-all
Remi Gacogne [Thu, 25 Apr 2024 09:31:21 +0000 (11:31 +0200)]
Merge pull request #14087 from rgacogne/ddist19-backport-13983
dnsdist-1.9.x: Backport 13983 - Generate Software Bill Of Materials (SBOMs) for our RPM packages
Remi Gacogne [Thu, 25 Apr 2024 09:04:18 +0000 (11:04 +0200)]
Merge pull request #14105 from rgacogne/ddist19-backport-14104
dnsdist-1.9.x: Backport 14104 - Fix a crash in incoming DoH with nghttp2
Remi Gacogne [Thu, 18 Apr 2024 08:49:10 +0000 (10:49 +0200)]
dnsdist: Fix a crash in incoming DoH with nghttp2
This fixes an issue in the code dealing with incoming DNS over HTTPS
queries with the nghttp2 provider. In some rare cases, if the incoming
query is forwarded to the backend over TCP and the response comes back
immediately (the `read()` call done just after the `write()` call sending
the query must succeed and yield a complete response), the processing
of the response might end up calling `IncomingHTTP2Connection::readHTTPData()`
down the line, via the `nghttp2` callbacks, while we were already
inside this function. This does not actually work because
`nghttp2_session_mem_recv` is not reentrant, so the internal state of
the `nghttp2_session` object might become inconsistent and trigger
an assertion, for example:
```
nghttp2_session.c:6854: nghttp2_session_mem_recv2: Assertion `iframe->state == NGHTTP2_IB_IGN_ALL' failed.
```
This results in a call to `abort()` and very unlikely to be exploitable,
because there is no memory corruption occurring. It would also be quite
difficult for an attacker to trigger the conditions leading to this event
remotely.
Reported by Daniel Stirnimann from Switch and Stephane Bortzmeyer, many thanks to them.
(cherry picked from commit
a4d82c53f714211462ae4da2e16fb13dec51ba05 )
Remi Gacogne [Tue, 23 Apr 2024 08:57:11 +0000 (10:57 +0200)]
Merge pull request #14082 from rgacogne/ddist19-backport-14037
dnsdist-1.9.x: Backport 14037 - Fix "C++ One Definition Rule" warnings in XSK
Remi Gacogne [Tue, 23 Apr 2024 08:39:52 +0000 (10:39 +0200)]
Merge pull request #14080 from rgacogne/ddist19-backport-13972
dnsdist-1.9.x: Backport 13972 - Move the version (and hashes) of external dependencies to JSON files
Remi Gacogne [Tue, 23 Apr 2024 08:39:05 +0000 (10:39 +0200)]
Merge pull request #14081 from rgacogne/ddist19-backport-14070
dnsdist-1.9.x: Backport 14070 - Fix DNS over plain HTTP broken by `reloadAllCertificates()`
Remi Gacogne [Fri, 5 Apr 2024 08:20:49 +0000 (10:20 +0200)]
dnsdist: Fix "C++ One Definition Rule" warnings in XSK
It turns out we need to include the linux specific headers AFTER the
regular ones, because it then detects that some types have already been
defined (`sockaddr_in6` for example) and does not attempt to re-define
them, which otherwise breaks the C++ One Definition Rule
(cherry picked from commit
679360ad842c60e38f4009cecac6e1422c747889 )
Remi Gacogne [Mon, 15 Apr 2024 14:58:44 +0000 (16:58 +0200)]
dnsdist: Fix DNS over plain HTTP broken by `reloadAllCertificates()`
This was introduced in 1.9.0, with the use of the `nghttp2` library
for incoming DNS over HTTP(S).
(cherry picked from commit
e07785a477d8a65d4f3eb4d110395519cf95a4db )
Remi Gacogne [Tue, 26 Mar 2024 14:36:07 +0000 (15:36 +0100)]
SBOM: Dynamically generate the list of auth-related packages
(cherry picked from commit
94b262b9709077f7c3a4e8cd74108e2c6991a63e )
Remi Gacogne [Tue, 26 Mar 2024 10:25:14 +0000 (11:25 +0100)]
SBOM: Fix the builder target variable
(cherry picked from commit
b17412c732f8ec98ae47926254828cb45ff825df )
Remi Gacogne [Tue, 26 Mar 2024 09:47:11 +0000 (10:47 +0100)]
Fix syntax errors
(cherry picked from commit
fef1b1c63e150b34a391bc836596657ec068de81 )
Remi Gacogne [Tue, 26 Mar 2024 09:18:40 +0000 (10:18 +0100)]
Disable SBOM generation on el-7 (almost EOL), fix it on el-8
(cherry picked from commit
4b54c7db6822c31d70a5661258b4ed70c58ee163 )
Remi Gacogne [Mon, 25 Mar 2024 19:04:13 +0000 (20:04 +0100)]
Hopefully fix SBOM generation
(cherry picked from commit
5efa3cdfbcf590068006030da64cd5673e11bf8d )
Remi Gacogne [Mon, 25 Mar 2024 13:51:05 +0000 (14:51 +0100)]
Attempt to generate SBOMs after building packages
(cherry picked from commit
44503ded5e8e6f088d009177f5f951d408467b58 )
Remi Gacogne [Mon, 25 Mar 2024 10:57:11 +0000 (11:57 +0100)]
Add license, publisher information to the external deps data
(cherry picked from commit
cb7e7db7990d4a6ea7a873e3ff4d0c63cd2f1291 )
Remi Gacogne [Fri, 22 Mar 2024 14:38:08 +0000 (15:38 +0100)]
Move the version (and hashes) of external dependencies to JSON files
(cherry picked from commit
4ccb0f786bab6e752ce8f6bc8223d428754c0081 )
Remi Gacogne [Fri, 5 Apr 2024 10:49:59 +0000 (12:49 +0200)]
Merge pull request #14040 from rgacogne/ddist19-revert-14004
dnsdist-1.9.x: Revert "dnsdist: Release failed TCP backend connections more quickly"
Remi Gacogne [Fri, 5 Apr 2024 09:29:23 +0000 (11:29 +0200)]
Revert "dnsdist: Release failed TCP backend connections more quickly"
This reverts commit
7b5f590ee72fecf54c0c40b24e98ba03a406af53 .
(cherry picked from commit
b3d13db2b0ddf5c5bea4c080330ac1e72475c918 )
Remi Gacogne [Thu, 4 Apr 2024 09:02:29 +0000 (11:02 +0200)]
Merge pull request #14017 from rgacogne/ddist19-backport-14004
dnsdist-1.9.x: Backport 14004 - Release failed TCP backend connections more quickly
Remi Gacogne [Thu, 4 Apr 2024 08:58:39 +0000 (10:58 +0200)]
Merge pull request #14016 from rgacogne/ddist19-backport-14005
dnsdist-1.9.x: Backport 14005 - Release incoming TCP connection right away on backend failure
Remi Gacogne [Thu, 4 Apr 2024 08:58:17 +0000 (10:58 +0200)]
Merge pull request #14012 from rgacogne/ddist19-backport-14003
dnsdist-1.9.x: Backport 14003 - Fix a null-deref in incoming DoH w/ nghttp2
Remi Gacogne [Thu, 4 Apr 2024 07:58:18 +0000 (09:58 +0200)]
Merge pull request #14013 from rgacogne/ddist19-backport-14001
dnsdist-1.9.x: Backport 14001 - Support "no server available" result from Lua FFI LB policies
Remi Gacogne [Wed, 3 Apr 2024 13:34:34 +0000 (15:34 +0200)]
Merge pull request #14014 from rgacogne/ddist19-backport-13999
dnsdist-1.9.x: Backport 13999 - Fix DNS over HTTP connections/queries counters with `nghttp2`
Remi Gacogne [Wed, 3 Apr 2024 09:40:00 +0000 (11:40 +0200)]
Merge pull request #14015 from rgacogne/ddist19-backport-14006
dnsdist-1.9-x: Backport 14006 - FDWrapper: Do not try to close negative file descriptors
Remi Gacogne [Fri, 29 Mar 2024 14:08:29 +0000 (15:08 +0100)]
dnsdist: Release failed TCP backend connections more quickly
After a timeout we cannot reuse the TCP connection to the backend
anyway, so let's release it immediately.
(cherry picked from commit
7b5f590ee72fecf54c0c40b24e98ba03a406af53 )
Remi Gacogne [Fri, 29 Mar 2024 13:22:40 +0000 (14:22 +0100)]
dnsdist: Release incoming TCP connection right away on backend failure
We used to keep a shared pointer to the incoming TCP connection around
in `TCPConnectionToBackend::d_currentQuery.d_sender` even after all queries
sent to the backend failed, which prevented the incoming TCP connection
from being closed as soon as it should have.
(cherry picked from commit
5e8f7194934857b1fd579c2ad68c56523d0e5941 )
Remi Gacogne [Tue, 2 Apr 2024 07:54:15 +0000 (09:54 +0200)]
FDWrapper: Always reset the internal descriptor to -1
Even if it was a different negative value, which happens for example
with the bpf helper functions which return `-errno`.
(cherry picked from commit
eefbe57feca72af4a088e8e872e864dc36e9284e )
Remi Gacogne [Fri, 29 Mar 2024 14:14:55 +0000 (15:14 +0100)]
FDWrapper: Do not try to close negative file descriptors
It turns out that some of the BPF helper functions return
a negative `errno` value in case of failure, and since we
wrap the return value into a `FDWrapper` right away this
led to a warning from Valgrind about trying to close an
invalid file descriptor.
(cherry picked from commit
ef1e068d55f2247ff416204cebbbb96063a175c2 )
Remi Gacogne [Thu, 28 Mar 2024 10:37:35 +0000 (11:37 +0100)]
dnsdist: Fix formatting in dnsdist-nghttp2-in.cc
(cherry picked from commit
7f4b2ec776c888f61eb9934363fa41edfaa1ba5e )
Remi Gacogne [Thu, 28 Mar 2024 10:25:34 +0000 (11:25 +0100)]
dnsdist: Add a regression test for DoH connection counters
(cherry picked from commit
82dc167be78195ebf38dd9f1e64b1ba652c2a4c8 )
Remi Gacogne [Thu, 28 Mar 2024 10:24:44 +0000 (11:24 +0100)]
dnsdist: Properly increase the HTTP connections counter w/ nghttp2
(cherry picked from commit
5fea1763bc6e0e19412e40f029b11ae4d3d8a800 )
Remi Gacogne [Thu, 28 Mar 2024 09:30:10 +0000 (10:30 +0100)]
dnsdist: Remove commented out include directive
(cherry picked from commit
79608ac498be158c8f5a94fde85d90a700963152 )
Remi Gacogne [Thu, 28 Mar 2024 09:27:15 +0000 (10:27 +0100)]
dnsdist: Increase the HTTP/1.1 query counter when DoH with 1.1 ALPN
This way we can keep track of how many HTTP/1.1 connections attempt
we see. We will not actually process the DNS over HTTP/1.1 payload
anyway when the `nghttp2` provider is used.
(cherry picked from commit
3bd0eadc3ae285266c781cbc4bfe53c78723587f )
Remi Gacogne [Fri, 29 Mar 2024 15:54:22 +0000 (16:54 +0100)]
dnsdist: Delint test-dnsdistlbpolicies_cc.cc
(cherry picked from commit
467380e1287097b26cf47193912c050bca5c77fb )
Remi Gacogne [Fri, 29 Mar 2024 15:35:55 +0000 (16:35 +0100)]
dnsdist: Fix clang-tidy warnings
(cherry picked from commit
6a2478eaf4652e89b3d40d7af182ecb3832b2e24 )
Remi Gacogne [Fri, 29 Mar 2024 14:57:19 +0000 (15:57 +0100)]
dnsdist: Clarify how to return 'no server available' from the FFI policies
(cherry picked from commit
faa96abfe2b025d2322bebb60882e6c775855c11 )
Remi Gacogne [Thu, 28 Mar 2024 16:12:48 +0000 (17:12 +0100)]
dnsdist: Support "no server available" result from Lua FFI LB policies
(cherry picked from commit
08fb08ce087af355c37dfa0bad21efca89c9ee55 )
Remi Gacogne [Fri, 29 Mar 2024 13:12:29 +0000 (14:12 +0100)]
dnsdist: Fix a null-deref in incoming DoH w/ nghttp2
When an incoming DoH connection using the `nghttp2` provider is waiting
for a response from a backend that results in a I/O error or timeout,
and the incoming connection also fails due to a I/O error or timeout,
dnsdist could in some cases try to dereference a null pointer, leading
to a crash.
(cherry picked from commit
0e809f7ec9796cae0e3cc0b6e7407083a22cc157 )
Remi Gacogne [Mon, 25 Mar 2024 14:21:42 +0000 (15:21 +0100)]
Merge pull request #13976 from rgacogne/ddist19-13946
dnsdist-1.9.x: Backport #13946 - Also handle EHOSTUNREACH as a case for reconnecting the socket
Remi Gacogne [Mon, 25 Mar 2024 09:14:59 +0000 (10:14 +0100)]
dnsdist: also handle EHOSTUNREACH as a case for reconnecting the socket
Manual backport of
c42df46af74f9af4158eebb51bfba3d1d8fb1a42 to
rel/dnsdist-1.9.x
Remi Gacogne [Mon, 25 Mar 2024 09:02:10 +0000 (10:02 +0100)]
Merge pull request #13944 from rgacogne/ddist19-13914
dnsdist-1.9.x: Backport of 13914 - Fix XSK-enabled check when reconnecting a backend
Remi Gacogne [Tue, 19 Mar 2024 13:09:32 +0000 (14:09 +0100)]
Merge pull request #13943 from rgacogne/ddist19-13927
dnsdist-1.9.x: Backport of 13927 - Fix annoying compiler warnings by introducing and switching to `pdns::UniqueFilePtr`
Remi Gacogne [Tue, 19 Mar 2024 13:09:04 +0000 (14:09 +0100)]
Merge pull request #13940 from rgacogne/ddist19-13851
dnsdist-1.9.x: Backport of #13851 - tcpiohandler: Use server preference algoritm for ALPN selection
Remi Gacogne [Tue, 19 Mar 2024 13:06:21 +0000 (14:06 +0100)]
Merge pull request #13945 from rgacogne/ddist19-13834
dnsdist-1.9.x: Backport of 13834 - dnsdist: Properly handle a failure of the first lazy health-check
Remi Gacogne [Tue, 19 Mar 2024 13:05:22 +0000 (14:05 +0100)]
Merge pull request #13942 from rgacogne/ddist19-13920
dnsdist-1.9.x: Backport of #13920 - Shrink InternalQueryState's size by reordering its fields
Remi Gacogne [Tue, 19 Mar 2024 13:05:12 +0000 (14:05 +0100)]
Merge pull request #13941 from rgacogne/ddist19-13906
dnsdist-1.9.x: Backport of #13906 - Fix first IPv6 console connection being rejected
Remi Gacogne [Tue, 19 Mar 2024 13:04:53 +0000 (14:04 +0100)]
Merge pull request #13939 from rgacogne/ddist19-13849
dnsdist-1.9.x: Backport of #13849 - Docker: Only print config if debug flag is set
Remi Gacogne [Tue, 19 Mar 2024 13:04:43 +0000 (14:04 +0100)]
Merge pull request #13938 from rgacogne/ddist19-13805
dnsdist-1.9.x: Backport of #13805 - Fix compilation warnings
Remi Gacogne [Tue, 19 Mar 2024 10:31:52 +0000 (11:31 +0100)]
dnsdist: Fix clang-tidy warning
Remi Gacogne [Tue, 19 Mar 2024 10:30:33 +0000 (11:30 +0100)]
dnsdist: Fix clang-tidy warnings
Remi Gacogne [Tue, 19 Mar 2024 09:44:16 +0000 (10:44 +0100)]
dnsdist: Properly account the failure to forward a query to a backend
Manually backported from
b0b3480b98d41db821f681183f45d5d08db02f93
Remi Gacogne [Mon, 26 Feb 2024 16:07:22 +0000 (17:07 +0100)]
dnsdist: Fix exponential backoff computation in edge cases
(cherry picked from commit
a8856ce717f439832515440af5550ca9d51f4b7d )
Remi Gacogne [Tue, 19 Mar 2024 09:40:46 +0000 (10:40 +0100)]
dnsdist: Properly handle a failure of the first lazy health-check
Manually backported from
2cd1a8d65bd8bc45458115f5827126aa537906b3
Remi Gacogne [Thu, 14 Mar 2024 09:20:08 +0000 (10:20 +0100)]
dnsdist: Fix XSK-enabled check when reconnecting a backend
The check was reverted, meaning that we did not properly remove an address:port from the XSK map when reconnecting a backend, and actually tried to remove an entry from a non-existing map when XSK is compiled in but not enabled, triggering a:
```
Error getting the XSK destination addresses map path '/sys/fs/bpf/dnsdist/xsk-destinations-v4'
```
message.
(cherry picked from commit
bb218803ee8348a4ce9cd11b97681d6eba4082cf )
Remi Gacogne [Mon, 18 Mar 2024 12:29:02 +0000 (13:29 +0100)]
Fix clang-tidy warnings, again
(cherry picked from commit
6e58535e4cf4b5d139e66cc3c6f18f7b2e62e64a )
Remi Gacogne [Mon, 18 Mar 2024 11:38:33 +0000 (12:38 +0100)]
Add `pdns::openFileForWriting()` to control permissions when creating a file
(cherry picked from commit
b1564d45616abcd65bf606fa5816449bde41af3e )
Remi Gacogne [Mon, 18 Mar 2024 10:55:16 +0000 (11:55 +0100)]
Fix clang-tidy warnings
(cherry picked from commit
114b879665a529a093e66a44347e924a3e2ab984 )
Remi Gacogne [Mon, 18 Mar 2024 10:34:09 +0000 (11:34 +0100)]
Mark the `pdns::UniqueFilePtr` deleter `const noexcept`
(cherry picked from commit
07d4785d49eb93a51818dae5fdbe04e7ff4e128c )
Remi Gacogne [Mon, 18 Mar 2024 09:22:12 +0000 (10:22 +0100)]
auth: Switch to `pdns::UniqueFilePtr`
(cherry picked from commit
46c4985c721840c7d34c9199dc72beab89264836 )
Remi Gacogne [Mon, 18 Mar 2024 09:21:26 +0000 (10:21 +0100)]
rec: Switch to `pdns::UniqueFilePtr`
(cherry picked from commit
01807c646de1af252681794c48a71d7b95f58df8 )
Remi Gacogne [Tue, 19 Mar 2024 09:30:18 +0000 (10:30 +0100)]
dnsdist: Switch to `pdns::UniqueFilePtr`
Manually backported from
931536a53367efbf9be3884b8970498aa92be774
Remi Gacogne [Mon, 18 Mar 2024 09:19:06 +0000 (10:19 +0100)]
misc: Implement pdns::UniqueFilePtr
Using a deleter instead of `decltype(&fclose)` has two big advantages:
- the deleter is included in the type and does not have to be passed
when creating a new object (easier to use, less memory usage, in theory
better inlining)
- we avoid the annoying `ignoring attributes on template argument ‘int (*)(FILE*)’`
warning from the compiler, which is there because `fclose` is tagged as `__nonnull((1))`
(cherry picked from commit
20b2f2041a04a2e16f6bf4781c177a6aa3adec2b )
Remi Gacogne [Tue, 19 Mar 2024 09:19:38 +0000 (10:19 +0100)]
dnsdist: Shrink InternalQueryState's size by reordering its fields
Manually backported from
1731b908b4e77b5294aad64a2c2aec750e4a03be
Remi Gacogne [Tue, 12 Mar 2024 14:16:19 +0000 (15:16 +0100)]
dnsdist: Add a regression test for IPv6 console connections
(cherry picked from commit
8be2b867e08b49cdc11a0452476229ceaa1ce6f6 )
Remi Gacogne [Tue, 19 Mar 2024 09:14:00 +0000 (10:14 +0100)]
dnsdist: Fix first IPv6 console connection being rejected
Manually backported from
1a9b7f5a97e97e371bd4b6043c14d9faccb9013c .
Remi Gacogne [Mon, 4 Mar 2024 10:02:56 +0000 (11:02 +0100)]
dnsname: Fix formatting issue
(cherry picked from commit
981c43ec9b61a942b0f539084fed1a24ed3ad301 )
Remi Gacogne [Mon, 4 Mar 2024 09:24:53 +0000 (10:24 +0100)]
Add missing views.hh reference in the Makefiles
(cherry picked from commit
d4cd065a24fea7fd0270a2eb102f40a06309703a )
Remi Gacogne [Mon, 4 Mar 2024 09:13:36 +0000 (10:13 +0100)]
dnsdist: Use a view for parsing ALPN data, add a regression test
(cherry picked from commit
2a3c2b444812369cae285e6b67e2a72a5b8fed08 )
Doug Freed [Sun, 3 Mar 2024 09:24:34 +0000 (09:24 +0000)]
tcpiohandler: Use server preference algoritm for ALPN selection
This complies with RFC 7301 section 3.2
(cherry picked from commit
b599f69b2090a1269cdce49a53297201772c454c )
Peter van Dijk [Tue, 5 Mar 2024 13:53:46 +0000 (14:53 +0100)]
Carolin Dohmen [Fri, 1 Mar 2024 15:19:04 +0000 (16:19 +0100)]
Only print config if debug flag is set
Signed-off-by: Carolin Dohmen <carodohmen@gmail.com>
(cherry picked from commit
d773b7bb99418026c3907ebd4b4e994a61fccecd )
Remi Gacogne [Fri, 16 Feb 2024 09:32:37 +0000 (10:32 +0100)]
dnsdist: Move `linux/*.h` headers to xsk.cc to fix warnings
(cherry picked from commit
e3044aca1c21335d3d35d8e2d5cfa830efb04541 )
Remi Gacogne [Fri, 16 Feb 2024 09:32:04 +0000 (10:32 +0100)]
dnsdist: Fix outdated definition for `addMaintenanceCallback()`
(cherry picked from commit
be05f14384735756b52756c9160a2ce168da1902 )
Remi Gacogne [Wed, 13 Mar 2024 09:36:45 +0000 (10:36 +0100)]
Merge pull request #13912 from omoerbeek/backport-13909-to-dnsdist-1.9.x
dnsdist: Backport 13909 to dnsdist 1.9.x: update to quiche 0.20.1
Otto Moerbeek [Wed, 13 Mar 2024 06:59:54 +0000 (07:59 +0100)]
dnsdist: update to quiche 0.20.1
(cherry picked from commit
7d5a2792c199611ab26e8821a31a2cd0912f34d9 )
Otto Moerbeek [Wed, 13 Mar 2024 09:04:11 +0000 (10:04 +0100)]
Merge pull request #13911 from omoerbeek/dnsdist-branch-build
dnsdist 1.9.x: remove irrelevant targets from branch build
Otto Moerbeek [Wed, 13 Mar 2024 08:31:09 +0000 (09:31 +0100)]
dnsdist 1.9.x: remove irrelevant targets from branch build
Otto Moerbeek [Wed, 13 Mar 2024 08:24:42 +0000 (09:24 +0100)]
Merge pull request #13910 from omoerbeek/backport-13907-to-dnsdist-1.9.x
dnsdist: backport 13907 to 1.9.x: gh actions: wo issue 9491 - actions/runner-images
romeroalx [Tue, 12 Mar 2024 16:24:31 +0000 (17:24 +0100)]
gh actions: wo issue 9491 - actions/runner-images
(cherry picked from commit
e0bf314e472d0c1d4bc1ff82d97cabf87be1e929 )
Remi Gacogne [Tue, 13 Feb 2024 10:44:35 +0000 (11:44 +0100)]
Merge pull request #13760 from rgacogne/ddist-doc-rules-mgmt
dnsdist: Refactor the rules (selectors and actions) documentation
Remi Gacogne [Tue, 13 Feb 2024 10:44:27 +0000 (11:44 +0100)]
Merge pull request #13780 from rgacogne/ddist-better-wording-setSuffixMatchRule
dnsdist: Clarify that setSuffixMatchRule blocks per suffix, not labels
Remi Gacogne [Tue, 13 Feb 2024 09:04:08 +0000 (10:04 +0100)]
dnsdist: Clarify that setSuffixMatchRule blocks per suffix, not labels
Remi Gacogne [Mon, 12 Feb 2024 09:54:21 +0000 (10:54 +0100)]
Merge pull request #13779 from rgacogne/ddist-coverity-
20240212
dnsdist: Fix performance inefficiencies reported by Coverity
Remi Gacogne [Mon, 12 Feb 2024 09:08:56 +0000 (10:08 +0100)]
dnsdist: Fix performance inefficiencies reported by Coverity
Reported by Coverity as 414759 and 414760:
> Performance inefficiencies (COPY_INSTEAD_OF_MOVE)
Otto Moerbeek [Sun, 11 Feb 2024 18:40:36 +0000 (19:40 +0100)]
Merge pull request #13778 from M0NsTeRRR/master
fix(doc): incorrect setting `query_local_address`
Ludovic Ortega [Sun, 11 Feb 2024 18:38:48 +0000 (19:38 +0100)]
fix: replace missing query_local_address
Ludovic Ortega [Sun, 11 Feb 2024 18:29:57 +0000 (19:29 +0100)]
fix(doc): incorrect setting `query_local_address`
Remi Gacogne [Fri, 9 Feb 2024 15:09:29 +0000 (16:09 +0100)]
Merge pull request #13774 from rgacogne/ddist-quiche-config-atomic-load
dnsdist: Fix a missing explicit atomic load of the Quiche configuration
Remi Gacogne [Fri, 9 Feb 2024 15:00:56 +0000 (16:00 +0100)]
Merge pull request #13771 from omoerbeek/dnsdist-lua-align
dnsdist: do not allocate 16-byte aligned objects through lua(jit)
Remi Gacogne [Fri, 9 Feb 2024 14:28:57 +0000 (15:28 +0100)]
dnsdist: Fix a missing explicit atomic load of the Quiche configuration
Reported by TSAN.
Remi Gacogne [Fri, 9 Feb 2024 10:59:07 +0000 (11:59 +0100)]
Merge pull request #13759 from rgacogne/ddist-doc-tls-certificates
dnsdist: Improve the documentation around TLS certificates and keys
Remi Gacogne [Fri, 9 Feb 2024 10:28:12 +0000 (11:28 +0100)]
dnsdist: Prevent useless allocation+copy in `setPoolServerPolicy`
Remi Gacogne [Fri, 9 Feb 2024 10:16:12 +0000 (11:16 +0100)]
dnsdist: Fix newServerPolicy, add regression tests for custom policies
Peter van Dijk [Fri, 9 Feb 2024 10:15:33 +0000 (11:15 +0100)]
Merge pull request #13391 from devicenull/master
Add Lua function to pick records via name hash
Otto Moerbeek [Thu, 8 Feb 2024 15:36:09 +0000 (16:36 +0100)]
Experiment
Remi Gacogne [Thu, 8 Feb 2024 14:58:38 +0000 (15:58 +0100)]
dnsdist: Fix an issue spotted by TSAN: we need to use atomic_load_explicit along with atomic_store_explicit
Remi Gacogne [Thu, 8 Feb 2024 14:36:55 +0000 (15:36 +0100)]
Merge pull request #13756 from rgacogne/ddist-xsk-doc-typos
dnsdist: Fix typos in the AF_XDP documentation
Remi Gacogne [Thu, 8 Feb 2024 14:31:55 +0000 (15:31 +0100)]
Merge pull request #13768 from rgacogne/ddist-maintenance-hook
dnsdist: Add a Lua maintenance hook
Remi Gacogne [Thu, 8 Feb 2024 14:31:09 +0000 (15:31 +0100)]
Merge pull request #13757 from rgacogne/ddist-coverty-warning-
20240201
dnsdist: Fix a warning reported by Coverity