Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Next/20200904/v7 #5361

Merged
merged 21 commits into from
Sep 4, 2020
Merged

Next/20200904/v7 #5361

merged 21 commits into from
Sep 4, 2020

Conversation

victorjulien
Copy link
Member

#5360 with adjustments to satisfy new formatting requirements.

#5277 #5357 #5331 #5332
minor other fixes

PRScript output (if applicable):
Passed

victorjulien and others added 21 commits September 4, 2020 13:04
Represent rdata as `DNSRData` enum variants instead of `Vec<u8>`.
This will allow parsing/logging of more complex formats like SOA.
Using nom's `rest` combinator eliminates the need to call the do_parse
macro for parsing a single element.
Added `dns_parse_rdata_soa` to parse SOA fields into an `DNSRDataSOA`
struct.

Added logging for answer and authority SOA records in both version
1 & 2, as well as grouped formats.
Documentation of additional fields for soa and sshfp. Also some minor
doc fixes and updates.
These changes are in response to feature request 3063. Geneve is
very similar to VXLAN, but uses a slightly different encapsulation
scheme.
This is just a slight refactor to make analagous decoding/encapsulation
schemes - Geneve, Teredo, and VXLAN - be implemented as similarly as
possible.
This is just a slight refactor to make analagous decoding/encapsulation
schemes - Geneve, Teredo, and VXLAN - be implemented as similarly as
possible.
Also enables -Wshadow and rust-strict to cover those cases
from Travis.

Redmine issue:
https://redmine.openinfosecfoundation.org/issues/3868
Adds a test that builds and tests Suricata without nss/nspr
to replace the similar test on Travis-CI.

Redmine issue:
https://redmine.openinfosecfoundation.org/issues/3869
To cover Travis-CI test that builds with -NDEBUG.

Redmine issue:
https://redmine.openinfosecfoundation.org/issues/3869
Choose Rust 1.39.0 as a known version of Rust that we build against
to see in CI if we build with this version, but fail with latest.

This is to cover a similar test from Travis CI.
This is to cover a test from Travis CI where we make sure
that ./configure fails if libjansson is not available.
This commit corrects a minor grammar issue in address/port error
messages.
@victorjulien victorjulien deleted the next/20200904/v7 branch October 9, 2020 08:05
jasonish added a commit to jasonish/suricata that referenced this pull request May 11, 2022
Rules that look like they should be IP-only but contain a negated rule
address are now marked with an LIKE_IPONLY flag. This is so they are
treated like IPONLY rules with respect to flow action, but don't
interfere with other IPONLY processing like using the radix tree.

Ticket: OISF#5361
jasonish added a commit to jasonish/suricata that referenced this pull request Jun 1, 2022
Rules that look like they should be IP-only but contain a negated rule
address are now marked with an LIKE_IPONLY flag. This is so they are
treated like IPONLY rules with respect to flow action, but don't
interfere with other IPONLY processing like using the radix tree.

Ticket: OISF#5361
jasonish added a commit to jasonish/suricata that referenced this pull request Jun 1, 2022
Rules that look like they should be IP-only but contain a negated rule
address are now marked with an LIKE_IPONLY flag. This is so they are
treated like IPONLY rules with respect to flow action, but don't
interfere with other IPONLY processing like using the radix tree.

Ticket: OISF#5361
victorjulien pushed a commit to victorjulien/suricata that referenced this pull request Jun 2, 2022
Rules that look like they should be IP-only but contain a negated rule
address are now marked with an LIKE_IPONLY flag. This is so they are
treated like IPONLY rules with respect to flow action, but don't
interfere with other IPONLY processing like using the radix tree.

Ticket: OISF#5361
victorjulien pushed a commit to victorjulien/suricata that referenced this pull request Jun 7, 2022
Rules that look like they should be IP-only but contain a negated rule
address are now marked with an LIKE_IPONLY flag. This is so they are
treated like IPONLY rules with respect to flow action, but don't
interfere with other IPONLY processing like using the radix tree.

Ticket: OISF#5361
(cherry picked from commit c8a5207)
jasonish added a commit to jasonish/suricata that referenced this pull request Oct 5, 2022
Rules that look like they should be IP-only but contain a negated rule
address are now marked with an LIKE_IPONLY flag. This is so they are
treated like IPONLY rules with respect to flow action, but don't
interfere with other IPONLY processing like using the radix tree.

Ticket: OISF#5361

(cherry picked from commit c8a5207)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

4 participants