::arg().set("soa-serial-offset","Make sure that no SOA serial is less than this number")="0";
::arg().set("retrieval-threads", "Number of AXFR-retrieval threads for slave operation")="2";
- ::arg().setSwitch("json-interface", "If the webserver should serve JSON data")="no";
+ ::arg().setSwitch("experimental-json-interface", "If the webserver should serve JSON data")="no";
::arg().setCmd("help","Provide a helpful message");
::arg().setCmd("version","Output version and compilation date");
::arg().set("max-tcp-connections","Maximum number of TCP connections")="10";
::arg().setSwitch("no-shuffle","Set this to prevent random shuffling of answers - for regression testing")="off";
- ::arg().set("logfile", "Filename of the log file for JSON parser" )= "/var/log/pdns.log";
+ ::arg().set("experimental-logfile", "Filename of the log file for JSON parser" )= "/var/log/pdns.log";
::arg().set("setuid","If set, change user id to this uid for more security")="";
::arg().set("setgid","If set, change group id to this gid for more security")="";
::arg().set("lua-prequery-script", "Lua script with prequery handler")="";
::arg().setSwitch("traceback-handler","Enable the traceback handler (Linux only)")="yes";
- ::arg().setSwitch("direct-dnskey","EXPERIMENTAL: fetch DNSKEY RRs from backend during DNSKEY synthesis")="no";
+ ::arg().setSwitch("experimental-direct-dnskey","EXPERIMENTAL: fetch DNSKEY RRs from backend during DNSKEY synthesis")="no";
}
void declareStats(void)
content += returnJSONObject(stats);
}
else if(varmap["command"]=="log-grep") {
- content += makeLogGrepJSON(varmap, ::arg()["logfile"], " pdns_recursor[");
+ content += makeLogGrepJSON(varmap, ::arg()["experimental-logfile"], " pdns_recursor[");
}
else { // if(varmap["command"] == "stats") {
stats = getAllStatsMap();
haveOne=true;
}
- if(::arg().mustDo("direct-dnskey")) {
+ if(::arg().mustDo("experimental-direct-dnskey")) {
B.lookup(QType(QType::DNSKEY), p->qdomain, p, sd.domain_id);
while(B.get(rr)) {
rr.ttl=sd.default_ttl;
}
// fix direct DNSKEY ttl
- if(::arg().mustDo("direct-dnskey") && rr.qtype.getCode() == QType::DNSKEY) {
+ if(::arg().mustDo("experimental-direct-dnskey") && rr.qtype.getCode() == QType::DNSKEY) {
rr.ttl = sd.default_ttl;
}
#
# default-ttl=3600
-#################################
-# direct-dnskey EXPERIMENTAL: fetch DNSKEY RRs from backend during DNSKEY synthesis
-#
-# direct-dnskey=no
-
#################################
# disable-axfr Disable zonetransfers but do allow TCP queries
#
#
# entropy-source=/dev/urandom
+#################################
+# experimental-direct-dnskey EXPERIMENTAL: fetch DNSKEY RRs from backend during DNSKEY synthesis
+#
+# experimental-direct-dnskey=no
+
+#################################
+# experimental-json-interface If the webserver should serve JSON data
+#
+# experimental-json-interface=no
+
+#################################
+# experimental-logfile Filename of the log file for JSON parser
+#
+# experimental-logfile=/var/log/pdns.log
+
#################################
# fancy-records Process URL and MBOXFW records
#
#
# guardian=no
-#################################
-# json-interface If the webserver should serve JSON data
-#
-# json-interface=no
-
#################################
# launch Which backends to launch and order to query them in
#
#
# log-failed-updates=
-#################################
-# logfile Filename of the log file for JSON parser
-#
-# logfile=/var/log/pdns.log
-
#################################
# logging-facility Log under a specific facility
#
t_fdm=getMultiplexer();
if(!t_id) {
- if(::arg().mustDo("json-interface")) {
+ if(::arg().mustDo("experimental-json-interface")) {
L<<Logger::Warning << "Enabling JSON interface" << endl;
new JWebserver(t_fdm);
}
::arg().setSwitch( "use-ntlog", "Use the NT logging facilities" )= "yes";
::arg().setSwitch( "use-logfile", "Use a log file" )= "no";
#else
- ::arg().set( "logfile", "Filename of the log file for JSON parser" )= "/var/log/pdns.log";
- ::arg().setSwitch( "json-interface", "If we should run a JSON webserver") = "no";
+ ::arg().set( "experimental-logfile", "Filename of the log file for JSON parser" )= "/var/log/pdns.log";
+ ::arg().setSwitch( "experimental-json-interface", "If we should run a JSON webserver") = "no";
::arg().set("quiet","Suppress logging of questions and answers")="";
::arg().set("logging-facility","Facility to log messages as. 0 corresponds to local0")="";
#endif
::arg().laxFile(configname.c_str());
::arg().set("max-ent-entries", "Maximum number of empty non-terminals in a zone")="100000";
::arg().set("module-dir","Default directory for modules")=LIBDIR;
- ::arg().setSwitch("direct-dnskey","EXPERIMENTAL: fetch DNSKEY RRs from backend during DNSKEY synthesis")="no";
+ ::arg().setSwitch("experimental-direct-dnskey","EXPERIMENTAL: fetch DNSKEY RRs from backend during DNSKEY synthesis")="no";
BackendMakers().launch(::arg()["launch"]); // vrooooom!
::arg().laxFile(configname.c_str());
{
if(!dk.isPresigned(zone))
{
- if(::arg().mustDo("direct-dnskey"))
+ if(::arg().mustDo("experimental-direct-dnskey"))
{
if(rr.ttl != sd.default_ttl)
{
csp.submit(rr);
}
- if(::arg().mustDo("direct-dnskey")) {
+ if(::arg().mustDo("experimental-direct-dnskey")) {
sd.db->lookup(QType(QType::DNSKEY), target, NULL, sd.domain_id);
while(sd.db->get(rr)) {
rr.ttl = sd.default_ttl;
// only skip the DNSKEY if direct-dnskey is enabled, to avoid changing behaviour
// when it is not enabled.
- if(::arg().mustDo("direct-dnskey") && rr.qtype.getCode() == QType::DNSKEY)
+ if(::arg().mustDo("experimental-direct-dnskey") && rr.qtype.getCode() == QType::DNSKEY)
continue;
records++;
}
}
if(command=="log-grep") {
- ret += makeLogGrepJSON(ourvarmap, ::arg()["logfile"], " pdns[");
+ ret += makeLogGrepJSON(ourvarmap, ::arg()["experimental-logfile"], " pdns[");
}
const char *kinds[]={"Master", "Slave", "Native"};
try {
d_ws->setCaller(this);
d_ws->registerHandler("",&indexfunction);
- if(::arg().mustDo("json-interface"))
+ if(::arg().mustDo("experimental-json-interface"))
d_ws->registerHandler("jsonstat", &jsonstat);
d_ws->go();
}