1. 30 Apr, 2014 1 commit
  2. 29 Apr, 2014 1 commit
  3. 24 Apr, 2014 2 commits
  4. 16 Apr, 2014 1 commit
  5. 04 Apr, 2014 1 commit
    • Jan Kadlec's avatar
      new_node: Do not reuse old pointers in zone copy. · 63384e60
      Jan Kadlec authored
       - node->new_node is thus obosolete.
       - since hattrie_dup made almost a full copy anyway, it's feasible to
         let the zone contents recreate the zone anew, with proper pointers.
      (new node was used to set only parent pointer, others were reset anyway
      in adjusting, all this will die in the new zone API, but at least like
      this it's easier to maintain.)
      63384e60
  6. 02 Apr, 2014 1 commit
    • Marek Vavruša's avatar
      zone: signing and diff sort of works · 36e76aff
      Marek Vavruša authored
      removed most of cruft from zones.c
      moved relevant stuff to appropriate files
      
      problems:
      - still a lot of duplicated code with changesets (ddns, signing, ixfr..)
      - can't store changesets after application (zone.c:186)
      - ddns and transfers are unsafe until made into serialized zone events
      36e76aff
  7. 01 Apr, 2014 2 commits
  8. 31 Mar, 2014 2 commits
  9. 27 Mar, 2014 1 commit
  10. 26 Mar, 2014 1 commit
  11. 20 Mar, 2014 1 commit
    • Marek Vavruša's avatar
      xfr_handler: packet parsing code unified, axfr fallback bugfix · a7f538f4
      Marek Vavruša authored
      The problem with previous code was that the packet stripped the TSIG
      section when it parsed the first IXFR packet from wire. If the code
      failed though, the wire was parsed again but this time the TSIG was
      already stripped on the wire so the result was garbled data.
      I've thrown in some minor cleanup as well.
      a7f538f4
  12. 05 Mar, 2014 1 commit
    • Jan Kadlec's avatar
      Removed chain fix code for both NSEC and NSEC3. · 8dcef6ca
      Jan Kadlec authored
      - A lot of bugs were uncovered with new tests and fixes got out of hand - the code was no longer readable (not that it was readable before)
      - Totally unfeasible to fix before new zone API is done. I've fixed the code, but the result was too complex, unmaintable.
      8dcef6ca
  13. 14 Feb, 2014 1 commit
    • Lubos Slovak's avatar
      Rewritten zone signing after reload. · 20bda92b
      Lubos Slovak authored
      Also simplified the operation a lot. First the newly loaded zone
      is signed and then the diff is generated (signed zone vs old zone
      in memory). Thus we do not need to do changeset merging and other
      such magic. The old code was wrong, as it may have lead to a
      situation when user makes some changes to DNSSEC records, those are
      overwritten by signing the zone, but the changeset contains both
      changes resulting in non-consistent zone.
      20bda92b
  14. 11 Feb, 2014 1 commit
  15. 06 Feb, 2014 1 commit
    • Marek Vavrusa's avatar
      nameserver: Merged nameserver_t -> server_t · 92a1c068
      Marek Vavrusa authored
      * removed redundant attributes
      * removed unused parameter occurences
      * moved related functions to appropriate files
      * evsched has now context (server)
      * zone does not point to server
      * zone event planning is still in the zone loading and requires server #209
      92a1c068
  16. 03 Feb, 2014 1 commit
  17. 30 Jan, 2014 1 commit
  18. 28 Jan, 2014 3 commits
  19. 21 Jan, 2014 1 commit
  20. 17 Jan, 2014 2 commits
  21. 15 Jan, 2014 3 commits
  22. 19 Dec, 2013 1 commit
    • Jan Kadlec's avatar
      Do not needlessly create NSEC3 hashes when signing DDNS. · 1e0d21a6
      Jan Kadlec authored
      - They are still created two times, but that's being resolved in the 'chain-fix' branch, stuff for 1.4.1
      - zone finalization got new parameter - to differentiate whether one wants to link nodes to their nsec3 nodes or not
      1e0d21a6
  23. 21 Nov, 2013 1 commit
  24. 11 Oct, 2013 1 commit
  25. 10 Oct, 2013 1 commit
  26. 20 Sep, 2013 1 commit
  27. 27 Aug, 2013 1 commit
    • Jan Kadlec's avatar
      DNSSEC: signature checking, forced signing, merged diff's and DNSSEC's changesets · 8ab216e1
      Jan Kadlec authored
      - Zones are now automatically (re)signed when server starts/reloads
      - Signature validity check now calculates the signature as well - this is used to detect changes to RRs themselves
      - 'knotc signzone' issues a force signing of zone - all RRSIGs are dropped and recreated
      - Some leaks and bugs still present, but the code is commitable now
      
      Refs #4
      8ab216e1
  28. 26 Jul, 2013 1 commit
    • Jan Kadlec's avatar
      Fixes in changesets initialization. · 30c43a0c
      Jan Kadlec authored
      - the 'knot_changes_t' structure used to be created in an extra function, removed, as it is now created together with 'knot_changesets_t' structure.
      
      Refs #89
      30c43a0c
  29. 24 Jul, 2013 1 commit
    • Jan Kadlec's avatar
      Changed out-of-zone processing in XFR. · 045b87b8
      Jan Kadlec authored
           - Inserting DNAMEs from out-of-zone RRs into tmp DNAME table messed
      things up when we free'd the RRSet, it's better to check before
      inserting into table (one could rollback the table, but there are some
      corner cases not worth solving)
      
      Refs #102
      045b87b8
  30. 20 Jul, 2013 1 commit
  31. 15 Jul, 2013 1 commit
  32. 11 Jul, 2013 1 commit
    • Jan Kadlec's avatar
      Partial commit. · ac8efd41
      Jan Kadlec authored
       - Still not compilable
       - Will need a check - 'rdata' are removed from 'changes' altogether, be sure that it is not needed somewhere (probably not though)
      ac8efd41