]>
git.ipfire.org Git - thirdparty/pdns.git/log
Peter van Dijk [Wed, 6 Jan 2021 17:58:00 +0000 (18:58 +0100)]
geoipbackend: use const_iterator
==8618==ERROR: AddressSanitizer: stack-use-after-scope on address 0x7ffd8c5a1420 at pc 0x55bee0a5d899 bp 0x7ffd8c5a0710 sp 0x7ffd8c5a0708
READ of size 1 at 0x7ffd8c5a1420 thread T0
#0 0x55bee0a5d898 in YAML::Node::begin() const /usr/include/yaml-cpp/node/impl.h:284:8
#1 0x55bee0a3f2f0 in GeoIPBackend::initialize() /opt/project/modules/geoipbackend/geoipbackend.cc:163:27
#2 0x55bee0a3d0d3 in GeoIPBackend::GeoIPBackend(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /opt/project/modules/geoipbackend/geoipbackend.cc:86:5
#3 0x55bee0a784eb in GeoIPFactory::make(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /opt/project/modules/geoipbackend/geoipbackend.cc:1008:16
#4 0x55bedff6cb18 in BackendMakerClass::all(bool) /opt/project/pdns/dnsbackend.cc:200:46
#5 0x55bee07d3abe in UeberBackend::UeberBackend(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) /opt/project/pdns/ueberbackend.cc:479:28
#6 0x55bee060579c in PacketHandler::PacketHandler() /opt/project/pdns/packethandler.cc:65:32
#7 0x55bedfee1748 in std::unique_ptr<PacketHandler, std::default_delete<PacketHandler> > make_unique<PacketHandler>() /opt/project/pdns/./misc.hh:571:35
#8 0x55bee079376d in TCPNameserver::go() /opt/project/pdns/tcpreceiver.cc:85:9
#9 0x55bedfecf7b7 in mainthread() /opt/project/pdns/common_startup.cc:656:7
#10 0x55bee0655f67 in main /opt/project/pdns/receiver.cc:654:5
#11 0x7f374b4b809a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2409a)
#12 0x55bedfc9a989 in _start (/opt/pdns-auth/sbin/pdns_server+0x2736989)
Address 0x7ffd8c5a1420 is located in stack of thread T0 at offset 3040 in frame
#0 0x55bee0a3d5ef in GeoIPBackend::initialize() /opt/project/modules/geoipbackend/geoipbackend.cc:115
(cherry picked from commit
1a2d029efb4dd976f90e3c99b7fbc5a94e4fe197 )
Peter van Dijk [Wed, 6 Jan 2021 16:17:00 +0000 (17:17 +0100)]
lmdbbackend: avoid unaligned uint32_t reads by using memcpy
lmdbbackend.cc:942:27: runtime error: load of misaligned address 0x604000b827aa for type 'uint32_t' (aka 'unsigned int'), which requires 4 byte alignment
(cherry picked from commit
f061d15d3289070750d7213c04cbd93fe6c5ec5c +
d49406608a9d35144bd01de18f78989c3739d155 )
Peter van Dijk [Wed, 6 Jan 2021 16:09:52 +0000 (17:09 +0100)]
remotebackend: use 0 for denoting unknown serial which is uint32_t
remotebackend.cc:610:51: runtime error: -1 is outside the range of representable values of type 'unsigned int'
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior remotebackend.cc:610:51 in
(cherry picked from commit
79989810021b4f08b1365bca9b1fc16c6d9aad8e )
Peter van Dijk [Thu, 17 Dec 2020 08:12:40 +0000 (09:12 +0100)]
Merge pull request #9884 from RobinGeuze/clearLMDBState
auth-4.4.x: clear the LMDB set state when performing a new lookup or list to prevent corruption cases
Peter van Dijk [Thu, 17 Dec 2020 07:01:29 +0000 (08:01 +0100)]
Merge pull request #9878 from Habbie/backport-9844-to-auth-4.4.x
auth-4.4: SVCB: Correctly parse and print unknown params
Peter van Dijk [Thu, 17 Dec 2020 07:01:20 +0000 (08:01 +0100)]
Merge pull request #9882 from Habbie/backport-9752-to-auth-4.4.x
auth-4.4.x: two docker improvements
Robin Geuze [Wed, 16 Dec 2020 19:37:58 +0000 (20:37 +0100)]
Clear the LMDB set state when performing a new lookup or list to prevent corruption cases
Pieter Lexis [Thu, 19 Nov 2020 11:44:16 +0000 (12:44 +0100)]
docker: also strip backend modules
(cherry picked from commit
61f9a96fb05361d058fe68e96167e84046fcda88 )
Pieter Lexis [Thu, 19 Nov 2020 11:41:45 +0000 (12:41 +0100)]
Dump generated configs from templates to stdout
(cherry picked from commit
f51f65ebaf0755d5b780031ba55b00c0df3f0963 )
Pieter Lexis [Wed, 9 Dec 2020 16:03:53 +0000 (17:03 +0100)]
SVCB: Correctly parse and print unknown params
There were multiple issues. With this commit, we *always* store the
bytes that are represented by the option. To do this, we needed to
properly parse RFC 1035 character-strings. This is now done with a
conversion of the ABNF from draft-ietf-dnsop-svcb-https-02 to ragel.
The resulting function could be used as a starting point for a better
TXT storage format.
(cherry picked from commit
b1a048a9caa0d14f9e6665c45af004c041fe5c5e )
(cherry picked from commit
ca749ae109941ad0b5e96043b9f6a76305c4fcc7 )
Peter van Dijk [Tue, 15 Dec 2020 14:46:18 +0000 (15:46 +0100)]
Merge pull request #9873 from mind04/pdns-direct-dnskey-bp
auth-4.4.x: fix direct-dnskey in AXFR-out
Kees Monshouwer [Mon, 14 Dec 2020 22:32:12 +0000 (23:32 +0100)]
auth: test direct-dnskey in AXFR-out
Kees Monshouwer [Mon, 14 Dec 2020 22:20:50 +0000 (23:20 +0100)]
auth: fix direct-dnskey in AXFR-out
Peter van Dijk [Mon, 14 Dec 2020 19:41:40 +0000 (20:41 +0100)]
Merge pull request #9866 from mind04/pdns-bp-9847
auth-4.4.x: don't log trusted-notification-proxy notify at error level
Peter van Dijk [Mon, 14 Dec 2020 19:41:27 +0000 (20:41 +0100)]
Merge pull request #9864 from Habbie/backport-9858-to-auth-4.4.x
auth-4.4.x bind: call DynListener static functions correctly
Your Name [Fri, 11 Dec 2020 14:58:02 +0000 (15:58 +0100)]
auth bind: call DynListener static functions correctly
(cherry picked from commit
dc9a3a8ebbb43ceb7b770b1253e1c8b9852bf97d )
Peter van Dijk [Mon, 14 Dec 2020 08:05:12 +0000 (09:05 +0100)]
Merge pull request #9853 from omoerbeek/backport-9840-to-auth-4.4.x
auth: Backport 9840 to auth 4.4.x: Stop using incbin and use od & sed to generate constant string data.
Kees Monshouwer [Tue, 8 Dec 2020 21:56:10 +0000 (22:56 +0100)]
auth: don't log trusted-notification-proxy notify at error level
Otto Moerbeek [Fri, 11 Dec 2020 10:57:56 +0000 (11:57 +0100)]
force 1 byte reads for od
(cherry picked from commit
e1d66be3a14e28d446da3206f0f661d4ea990193 )
Otto Moerbeek [Fri, 11 Dec 2020 10:11:00 +0000 (11:11 +0100)]
Make the processing binary safe and zap the incbin include from ws-auth.cc
(cherry picked from commit
9c1f9f42a6f4a391e13446697fc9f68d53c9a3be )
Otto Moerbeek [Wed, 9 Dec 2020 14:33:58 +0000 (15:33 +0100)]
Stop using incbin and use od & sed to generate constant string data.
(cherry picked from commit
006c3bef8a172319a585fe8c1243ad375642be1e )
Peter van Dijk [Wed, 9 Dec 2020 10:44:21 +0000 (11:44 +0100)]
Merge pull request #9834 from Habbie/backport-9831-to-auth-4.4.x
auth-4.4.x: el8: PowerTools is now powertools
Your Name [Tue, 8 Dec 2020 14:23:13 +0000 (15:23 +0100)]
el8: PowerTools is now powertools
(cherry picked from commit
26fe12046566da83844f1163134ba722a603e911 )
Peter van Dijk [Thu, 3 Dec 2020 20:17:48 +0000 (21:17 +0100)]
Merge pull request #9816 from mind04/auth44x-9813
auth-4.4.x: geoip: set netmask on all string formatting types
Peter van Dijk [Thu, 3 Dec 2020 08:57:20 +0000 (09:57 +0100)]
auth geoip: set netmask on all string formatting types
(via Kees Monshouwer)
Peter van Dijk [Thu, 3 Dec 2020 08:43:42 +0000 (09:43 +0100)]
Merge pull request #9800 from Habbie/backport-9794-to-auth-4.4.x
auth 4.4.x api-swagger.json: do not depend on .venv target
Peter van Dijk [Wed, 2 Dec 2020 18:30:18 +0000 (19:30 +0100)]
Merge pull request #9798 from Habbie/backport-9574-to-auth-4.4.x
auth-4.4.x: Ensure socket-dir matches runtimedir on old systemd
Peter van Dijk [Wed, 2 Dec 2020 14:54:24 +0000 (15:54 +0100)]
Merge pull request #9797 from Habbie/backport-9796-to-auth-4.4.x
auth-4.4.x: geoipbackend: make local function static
Peter van Dijk [Tue, 1 Dec 2020 18:00:59 +0000 (19:00 +0100)]
auth api-swagger.json: do not depend on .venv target. Fixes #9792
(cherry picked from commit
fc7e2034559d4b20f487395aee88a0d8c0f56ece )
Pieter Lexis [Thu, 1 Oct 2020 18:36:51 +0000 (20:36 +0200)]
Ensure socket-dir matches runtimedir on old systemd
This is mostly a hack for systemd version <240 so using virtual hosting
on Ubuntu Bionic and EL7 does not lead to surprises.
This Commit explicitly adds the `--socket-dir` to the invocation of the
unit. Any users who want to use their own runtimedirs should use a
drop-in unit overriding ExecStart. I believe this does not validate the
principle of least surprise for those using the PowerDNS provided
packages and virtual hosting.
Fixes #9485
(cherry picked from commit
7bbaae110abb53f43d0bf60c81efe3bb8630a925 )
Peter van Dijk [Wed, 2 Dec 2020 08:39:57 +0000 (09:39 +0100)]
auth geoipbackend: make local function static. Fixes #9791
(cherry picked from commit
d73c73f9926ea784b5a443b70962b2bc7ebec435 )
Peter van Dijk [Tue, 1 Dec 2020 15:12:07 +0000 (16:12 +0100)]
Merge pull request #9778 from Habbie/backport-9775-to-auth-4.4.x
pdnsutil add-record: notice when backend does not support replaceRRSet. Fixes #9730
Peter van Dijk [Sun, 29 Nov 2020 11:56:04 +0000 (12:56 +0100)]
Merge pull request #9765 from mind04/pdns-log-bp
auth-4.4.x: add remote to default axfr logging
Peter van Dijk [Sun, 29 Nov 2020 11:51:40 +0000 (12:51 +0100)]
Merge pull request #9785 from mind04/pdns-latency-44x
auth-4.4.x: fix rounding inaccuracy in latency statistics
Kees Monshouwer [Tue, 24 Nov 2020 19:50:34 +0000 (20:50 +0100)]
auth: fix rounding inaccuracy in latency statistics
Kees Monshouwer [Fri, 27 Nov 2020 22:27:11 +0000 (23:27 +0100)]
auth: fix compiler errors with --enable-verbose-logging
Kees Monshouwer [Mon, 23 Nov 2020 13:03:59 +0000 (14:03 +0100)]
auth: add zone and primary to all axfr logging
Peter van Dijk [Thu, 26 Nov 2020 10:15:37 +0000 (11:15 +0100)]
Merge pull request #9773 from Habbie/backport-9766-to-auth-4.4.x
auth-4.4.x: APL records: fix endianness problem.
Peter van Dijk [Wed, 25 Nov 2020 12:07:12 +0000 (13:07 +0100)]
pdnsutil add-record: notice when backend does not support replaceRRSet. Fixes #9730
(cherry picked from commit
cd624e77d09e58228f5b54207f34496463193069 )
Peter van Dijk [Tue, 24 Nov 2020 14:13:49 +0000 (15:13 +0100)]
APL records: fix endianness problem. Closes #9763
(cherry picked from commit
a0d9f00d8d76bb07847abb2f837f7c629fb238b2 )
Peter van Dijk [Tue, 24 Nov 2020 14:37:40 +0000 (15:37 +0100)]
Merge pull request #9761 from Habbie/backport-9749-to-auth-4.4.x
auth-4.4.x: Fix the DNSName move assignment operator
Remi Gacogne [Thu, 19 Nov 2020 11:27:53 +0000 (12:27 +0100)]
auth: Don't steal resources from additional records
(cherry picked from commit
21f2345d40c96fac7aff4f1f9e02f67579038352 )
Remi Gacogne [Thu, 19 Nov 2020 09:53:06 +0000 (10:53 +0100)]
Fix the DNSName move assignement operator
A misplaced 'const' prevented it from being called, making every
move of a DNSName into a full copy.
Introduced in
d720eb8add5ebda11867e8b404125e0b68ed2911 .
(cherry picked from commit
8d1bb300460d5cc97b4599ea8eddeb7b6d35decf )
Peter van Dijk [Thu, 19 Nov 2020 09:47:49 +0000 (10:47 +0100)]
Merge pull request #9735 from Habbie/pdnsutil-dname
auth: pdnsutil check-zone: DNAME fixes
Peter van Dijk [Thu, 19 Nov 2020 09:46:20 +0000 (10:46 +0100)]
Merge pull request #9523 from kpfleming/builder-improvements
Package builder improvements
Remi Gacogne [Wed, 18 Nov 2020 20:47:37 +0000 (21:47 +0100)]
Merge pull request #9673 from rgacogne/rec-ede
rec: Add support for rfc8914: Extended DNS Errors
Peter van Dijk [Wed, 18 Nov 2020 13:14:42 +0000 (14:14 +0100)]
Merge pull request #9704 from mind04/pdns-performance
auth: nxdomain performance
Peter van Dijk [Wed, 18 Nov 2020 10:53:30 +0000 (11:53 +0100)]
auth: pdnsutil check-zone: DNAME fixes
* don't warn about occlusion of records with the same name as the DNAME record
* do warn about occlusion when the DNAME is at the apex
Peter van Dijk [Wed, 18 Nov 2020 12:33:14 +0000 (13:33 +0100)]
Merge pull request #9731 from Habbie/auth-quote-ips
auth: put quotes around some IPs to make messages easier to read
Kees Monshouwer [Wed, 11 Nov 2020 11:22:37 +0000 (12:22 +0100)]
auth: SOAData is now a member variable in PacketHandler
Kees Monshouwer [Tue, 10 Nov 2020 19:17:33 +0000 (20:17 +0100)]
auth: avoid the use of getSOAUncached() in single backend setups
Kees Monshouwer [Tue, 10 Nov 2020 19:12:06 +0000 (20:12 +0100)]
auth: #9496 was incomplete, ignore cryptokeys in emitNSEC() and emitNSEC3()
Peter van Dijk [Wed, 18 Nov 2020 10:55:16 +0000 (11:55 +0100)]
Merge pull request #9713 from pieterlexis/trusted-notification-proxy
Allow ip ranges as trusted-notification-proxy
Peter van Dijk [Wed, 18 Nov 2020 09:22:12 +0000 (10:22 +0100)]
Merge pull request #8707 from Habbie/lmdb-domaininfo-serial
lmdb: fill di.serial (code stolen straight from gsqlbackend)
Remi Gacogne [Wed, 18 Nov 2020 08:22:14 +0000 (09:22 +0100)]
rec: Remove trailing whitespaces
Remi Gacogne [Tue, 17 Nov 2020 10:21:14 +0000 (11:21 +0100)]
rec: Test that the "zero scope" option doesn't exceed the maximum payload size
When use-incoming-edns-subnet is enabled, the query has an ECS option,
and the answer was not variable, we do return a 0-scoped ECS answer,
to make it possible to the client (dnsdist for example) to cache the
response and serve it to all clients.
Still we need to make sure that adding the 0-scoped ECS option does not
exceed the client EDNS UDP payload size.
Remi Gacogne [Tue, 17 Nov 2020 08:28:14 +0000 (09:28 +0100)]
rec: Rename the EDE setting to 'extended-resolution-errors'
Also make RPZ and Lua EDE independent of that setting.
Remi Gacogne [Tue, 17 Nov 2020 08:15:46 +0000 (09:15 +0100)]
rec: PolicyOverridesGettag is the default for RPZ zones
Remi Gacogne [Mon, 16 Nov 2020 17:30:02 +0000 (18:30 +0100)]
rec: Use a struct to pass gettag_ffi parameters
Remi Gacogne [Mon, 16 Nov 2020 17:01:18 +0000 (18:01 +0100)]
rec: Better handling of max packet size for answers with a 0-scope
Remi Gacogne [Fri, 13 Nov 2020 08:00:49 +0000 (09:00 +0100)]
rec: Fix the parsing of RPZ's extendedErrorCode setting
Mixing uint16_t and uin32_t in the same boost::variant passed to Lua
does not work well.
Remi Gacogne [Thu, 12 Nov 2020 15:51:38 +0000 (16:51 +0100)]
rec: Implement Extended DNS Errors for RPZ hits
Remi Gacogne [Thu, 12 Nov 2020 13:53:47 +0000 (14:53 +0100)]
rec: Add Lua bindings, regression tests for Extended DNS Errors
Remi Gacogne [Tue, 10 Nov 2020 11:39:13 +0000 (12:39 +0100)]
rec: Add unit tests for Extended DNS Errors
Remi Gacogne [Fri, 6 Nov 2020 09:17:22 +0000 (10:17 +0100)]
rec: Fix formatting of the EDNS Extended Error codes
Remi Gacogne [Thu, 5 Nov 2020 10:38:55 +0000 (11:38 +0100)]
rec: Add support for rfc8914: Extended DNS Errors
Still needs:
- unit tests
- regression tests
Would be nice to have:
- ability to set an extended error from Lua (FFI or not)
- same for RPZ matches
Peter van Dijk [Wed, 15 Jan 2020 20:02:13 +0000 (21:02 +0100)]
lmdb: fill di.serial
Peter van Dijk [Tue, 17 Nov 2020 17:09:19 +0000 (18:09 +0100)]
Merge pull request #9745 from Habbie/auth-lua-intermittent
auth LUA tests: give healthchecker more time
Peter van Dijk [Tue, 17 Nov 2020 15:01:01 +0000 (16:01 +0100)]
auth LUA tests: give healthchecker more time
Peter van Dijk [Tue, 17 Nov 2020 13:07:19 +0000 (14:07 +0100)]
Merge pull request #9714 from Habbie/mysql-8
auth: disable mysql automatic charset detection
Peter van Dijk [Tue, 17 Nov 2020 12:57:21 +0000 (13:57 +0100)]
Merge pull request #9712 from kpfleming/use-python3
Use Python 3 in build system
Peter van Dijk [Tue, 17 Nov 2020 09:57:45 +0000 (10:57 +0100)]
auth-py tests: py3
Remi Gacogne [Tue, 17 Nov 2020 10:59:56 +0000 (11:59 +0100)]
Merge pull request #9737 from rgacogne/ddist-dump-cache-rcode
dnsdist: Add the response code in the packet cache dump
Kevin P. Fleming [Tue, 17 Nov 2020 02:45:37 +0000 (21:45 -0500)]
BaseHTTPServer is now http.server in Python 3
Kevin P. Fleming [Tue, 17 Nov 2020 01:58:01 +0000 (20:58 -0500)]
Suppress Python 3 parsing of Unicode literals
Peter van Dijk [Tue, 17 Nov 2020 00:59:35 +0000 (19:59 -0500)]
Additional fixes for Python 3 conversion
Remi Gacogne [Mon, 16 Nov 2020 16:27:54 +0000 (17:27 +0100)]
Merge pull request #9591 from omoerbeek/fstrm-table-driven-options
Long overdue table driven option setting for libfstrm
Remi Gacogne [Mon, 16 Nov 2020 11:09:20 +0000 (12:09 +0100)]
dnsdist: Add the response code in the packet cache dump
Otto Moerbeek [Mon, 16 Nov 2020 07:04:10 +0000 (08:04 +0100)]
Use string instead of char *
Co-authored-by: Remi Gacogne <rgacogne+github@valombre.net>
Peter van Dijk [Sat, 14 Nov 2020 20:47:06 +0000 (21:47 +0100)]
auth: put quotes around some IPs to make messages easier to read
Remi Gacogne [Sat, 14 Nov 2020 18:50:48 +0000 (19:50 +0100)]
Merge pull request #9729 from appliedprivacy/patch-3
fix a typo in prometheus metrics dnsdist_frontend_tlshandshakefailures #9728
appliedprivacy [Sat, 14 Nov 2020 17:28:44 +0000 (17:28 +0000)]
fix typo #9728
Peter van Dijk [Sat, 14 Nov 2020 08:30:54 +0000 (09:30 +0100)]
Merge pull request #9727 from georgeto/dnsdist-docs-typo
dnsdist: Fix typo in DNSNameSet documentation
georgeto [Sat, 14 Nov 2020 00:24:17 +0000 (01:24 +0100)]
dnsdist: Fix typo in DNSNameSet documentation
The newDNSNameSet() function has no name argument.
Peter van Dijk [Fri, 13 Nov 2020 18:43:35 +0000 (19:43 +0100)]
add venv to Dockerfile-auth for JSON API file
Peter van Dijk [Fri, 13 Nov 2020 16:03:17 +0000 (17:03 +0100)]
recursor DNSSEC regression tests: skip debug cachedump
Peter van Dijk [Fri, 13 Nov 2020 11:40:23 +0000 (12:40 +0100)]
recursor DNSSEC regression tests: migrate to Python 3
Kevin P. Fleming [Fri, 13 Nov 2020 22:35:34 +0000 (17:35 -0500)]
Use Python 3 in build system
The various tasks in the build system which use Python
will now use Python 3 (3.6 or later) and the 'venv' module,
instead of the 'virtualenv' tool which was primarily used
with Python 2.7.
Peter van Dijk [Fri, 13 Nov 2020 16:04:16 +0000 (17:04 +0100)]
Merge pull request #9708 from Habbie/auth-regress-docs-mysql
auth regression docs: more mysql variants
Remi Gacogne [Fri, 13 Nov 2020 16:03:15 +0000 (17:03 +0100)]
Merge pull request #9721 from georgeto/lua-binding-const-qualifier
dnsdist: Improve const-correctness of Lua bindings
georgeto [Fri, 13 Nov 2020 13:05:36 +0000 (14:05 +0100)]
dnsdist: Improve const-correctness of Lua bindings
Since LuaWrapper enforces const-correctness, a const (shared) pointer
to an object can only read members and call const methods.
Therefore we have to take care to use the const qualifier during
registration of constant lambda Lua function bindings.
An example where the absence of the const qualifier was problematic is
LuaRule, which invokes its user provided match function with a constant
DNSQuestion object. Because the functions of DNSQuestion lacked
the const qualifier (e.g. getTag()), it was not possible to call them
from within the LuaRule match function.
Remi Gacogne [Fri, 13 Nov 2020 11:24:39 +0000 (12:24 +0100)]
Merge pull request #9716 from rgacogne/webserver-accept-yaml
Fix initialization of WebServer::accept_yaml
Remi Gacogne [Fri, 13 Nov 2020 07:41:05 +0000 (08:41 +0100)]
Fix initialization of WebServer::accept_yaml
Otto Moerbeek [Thu, 12 Nov 2020 19:21:46 +0000 (20:21 +0100)]
Merge pull request #9633 from omoerbeek/rec-opensbd-udpsockets
rec: two OpenBSD improvemenst wrt UDP sockets: port randomization and EGAIN errors
Otto Moerbeek [Thu, 12 Nov 2020 19:20:53 +0000 (20:20 +0100)]
Merge pull request #9643 from omoerbeek/rec-add-some-deps
rec: add a few missing dependencies to README
Otto Moerbeek [Thu, 12 Nov 2020 19:20:14 +0000 (20:20 +0100)]
Merge pull request #9707 from omoerbeek/rec-chain-already-processing
rec: Do not add request to a wait chain that's already processed or being processed
Otto Moerbeek [Thu, 12 Nov 2020 19:17:13 +0000 (20:17 +0100)]
Improved wording of comments
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
Pieter Lexis [Thu, 12 Nov 2020 16:06:07 +0000 (17:06 +0100)]
Apply suggestions from code review
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
Peter van Dijk [Thu, 12 Nov 2020 13:55:22 +0000 (14:55 +0100)]
auth mysql: disable automatic charset detection
Peter van Dijk [Thu, 12 Nov 2020 13:43:46 +0000 (14:43 +0100)]
auth regress: allow per-backend test skipping