@@ -1,3 +1,5 @@
|
||||
#![allow(unused_features)] // 1.96.0-nightly 2026-03-07 bug
|
||||
|
||||
use std::{
|
||||
borrow::Borrow,
|
||||
collections::HashMap,
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
#![recursion_limit = "256"]
|
||||
#![type_length_limit = "98304"]
|
||||
#![expect(refining_impl_trait)]
|
||||
#![expect(clippy::duration_suboptimal_units)] // remove after MSRV 1.91
|
||||
#![allow(unused_features)] // 1.96.0-nightly 2026-03-07 bug
|
||||
|
||||
mod manager;
|
||||
mod migrations;
|
||||
|
||||
@@ -112,8 +112,8 @@ impl Resolver {
|
||||
fn configure_opts(server: &Arc<Server>, mut opts: ResolverOpts) -> ResolverOpts {
|
||||
let config = &server.config;
|
||||
|
||||
opts.negative_max_ttl = Some(Duration::from_secs(60 * 60 * 24 * 30));
|
||||
opts.positive_max_ttl = Some(Duration::from_secs(60 * 60 * 24 * 7));
|
||||
opts.negative_max_ttl = Some(Duration::from_hours(720));
|
||||
opts.positive_max_ttl = Some(Duration::from_hours(168));
|
||||
opts.timeout = Duration::from_secs(config.dns_timeout);
|
||||
opts.attempts = config.dns_attempts as usize;
|
||||
opts.try_tcp_on_error = config.dns_tcp_fallback;
|
||||
|
||||
@@ -66,8 +66,8 @@ where
|
||||
.stream()
|
||||
.ready_filter(|(next_id, _)| {
|
||||
let backed_off = self.is_backed_off(next_id, Range {
|
||||
start: Duration::from_secs(5 * 60),
|
||||
end: Duration::from_secs(60 * 60 * 24),
|
||||
start: Duration::from_mins(5),
|
||||
end: Duration::from_hours(24),
|
||||
});
|
||||
|
||||
!backed_off
|
||||
@@ -135,8 +135,8 @@ async fn fetch_auth_chain(
|
||||
}
|
||||
|
||||
if self.is_backed_off(&next_id, Range {
|
||||
start: Duration::from_secs(2 * 60),
|
||||
end: Duration::from_secs(60 * 60 * 8),
|
||||
start: Duration::from_mins(2),
|
||||
end: Duration::from_hours(8),
|
||||
}) {
|
||||
debug_warn!("Backed off from {next_id}");
|
||||
continue;
|
||||
|
||||
@@ -50,8 +50,8 @@ pub(super) async fn handle_prev_pdu(
|
||||
}
|
||||
|
||||
if self.is_backed_off(prev_id, Range {
|
||||
start: Duration::from_secs(5 * 60),
|
||||
end: Duration::from_secs(60 * 60 * 24),
|
||||
start: Duration::from_mins(5),
|
||||
end: Duration::from_hours(24),
|
||||
}) {
|
||||
debug!(?prev_id, "Backing off from prev_event");
|
||||
return Ok(None);
|
||||
|
||||
@@ -59,7 +59,7 @@ impl crate::Service for Service {
|
||||
}
|
||||
|
||||
tokio::select! {
|
||||
() = tokio::time::sleep(Duration::from_secs(60 * 60)) => {},
|
||||
() = tokio::time::sleep(Duration::from_hours(1)) => {},
|
||||
() = self.services.server.until_shutdown() => return Ok(())
|
||||
};
|
||||
}
|
||||
|
||||
@@ -41,7 +41,7 @@ pub type PubKeys = PublicKeySet;
|
||||
|
||||
impl crate::Service for Service {
|
||||
fn build(args: &crate::Args<'_>) -> Result<Arc<Self>> {
|
||||
let minimum_valid = Duration::from_secs(3600);
|
||||
let minimum_valid = Duration::from_hours(1);
|
||||
|
||||
let (keypair, verify_keys) = keypair::init(args.db)?;
|
||||
debug_assert!(verify_keys.len() == 1, "only one active verify_key supported");
|
||||
|
||||
@@ -1,3 +1,5 @@
|
||||
//! Integration tests entrypoint.
|
||||
|
||||
#![allow(unused_features)] // 1.96.0-nightly 2026-03-07 bug
|
||||
|
||||
mod resolve;
|
||||
|
||||
Reference in New Issue
Block a user