How much effort is it worth to polish unpeer?
Hal Murray
hmurray at megapathdsl.net
Fri May 26 07:43:29 UTC 2017
Eric said:
> I don't think this needs to be pre-1.0, and there's a KISS case for simply
> documenting it as a known bug. Opinions?
I agree that it doesn't need to be fixed anytime soon and/or for 1.0.
The reason I sent that message is that it's a good example of what I expect
for "the list". More on that in another message.
I think that actually fixing it is reasonably simple and low risk. The hard
part would probably be writing the test harness.
The code to add the hole is:
restrict_mask = restrictions(rmtadr);
if (RES_FLAGS & restrict_mask) {
msyslog(LOG_INFO, "Server poking hole in restrictions for:
%s",
socktoa(rmtadr));
restrict_source(rmtadr, false, 0);
}
The code to remove it should be as simple. We'll need a new flag for
add-hole to set and unpeer to test.
---------
The other part of my message was that maybe we don't want to poke holes in
restrictions. Suppose I decide I don't want to use any servers run by
Dilbert but he has a server in the pool. I'd like to be able to add a
restrict line with a flag that says don't poke holes in me. Then the pool
code that processes DNS lookups could skip that slot rather than poke a hole
and add it.
----------
Those could be two items on the list or one item that covers them both.
--
These are my opinions. I hate spam.
More information about the devel
mailing list