This project is mirrored from https://github.com/coredns/coredns.git.
The repository failed to update .
Repository mirroring has been paused due to too many failed attempts, and can be resumed by a project maintainer.
Last successful update .
Repository mirroring has been paused due to too many failed attempts, and can be resumed by a project maintainer.
Last successful update .
- 22 Apr, 2018 4 commits
-
-
Miek Gieben authored
Got a bit messed up with stb lib "context" usage.
-
Miek Gieben authored
Add per plugin logging to make it explicit what is logging, if you include this package under the name clog (coredns log), you can do the following: log := clog.NewWithPlugin{whoami{}} // e.g. And then just log.Info(...); these will then include the plugin ala: [INFO] plugin/whoami: stuff So we only need to init the logger and then just use it. -
Miek Gieben authored
* brr; a sleep * Shouldnt need a query
-
Miek Gieben authored
* reload: use OnRestart Close the listener on OnRestart for health and metrics so the default setup function can setup the listener when the plugin is "starting up". Lightly test with some SIGUSR1-ing. Also checked the reload plugin with this, seems fine: .com.:1043 .:1043 2018/04/20 15:01:25 [INFO] CoreDNS-1.1.1 2018/04/20 15:01:25 [INFO] linux/amd64, go1.10, CoreDNS-1.1.1 linux/amd64, go1.10, 2018/04/20 15:01:25 [INFO] Running configuration MD5 = aa8b3f03946fb60546ca1f725d482714 2018/04/20 15:02:01 [INFO] Reloading 2018/04/20 15:02:01 [INFO] Running configuration MD5 = b34a96d99e01db4015a892212560155f 2018/04/20 15:02:01 [INFO] Reloading complete ^C2018/04/20 15:02:06 [INFO] SIGINT: Shutting down With this corefile: .com { proxy . 127.0.0.1:53 prometheus :9054 whoami reload } . { proxy . 127.0.0.1:53 prometheus :9054 whoami reload } The prometheus port was 9053, changed that to 54 so reload would pick it up. From a cursory look it seems this also fixes: Fixes #1604 #1618 #1686 #1492 * At least make it test * Use onfinalshutdown * reload: add reload test This test #1604 adn right now fails. * Address review comments * Add bug section explaining things a bit * compile tests * Fix tests * fixes * slightly less crazy * try to make prometheus setup less confusing * Use ephermal port for test * Don't use the listener * These are shared between goroutines, just use the boolean in the main structure. * Fix text in the reload README, * Set addr to TODO once stopping it * Morph fturb's comment into test, to test reload and scrape health and metric endpoint
-
- 20 Apr, 2018 5 commits
-
-
Ruslan Drozhdzh authored
* plugin/forward: gracefull stop - stop connection manager only when no queries in progress * minor improvement * prevent healthcheck on stopped proxy * revert closing channels * use standard context
-
Miek Gieben authored
Health overloaded metrics does not carry the server label. Explain why.
-
Miek Gieben authored
* global: move to context Move from golang.org/x/net/context to std lib's context. Change done with: for i in $(grep -l '/context' **/*.go); do sed -e 's|golang.org/x/net/context|context|' -i $i; echo $i; done for i in **/*.go; do goimports -w $i; done * drop from dns.pb.go as well
-
Miek Gieben authored
Remove trailing white space from proxy/README.md
-
Scott Donovan authored
* adding sequential policy to forward plugin * making sequential an alias to first in proxy plugin
-
- 19 Apr, 2018 4 commits
-
-
Miek Gieben authored
* Update all plugins to use plugin/pkg/log I wish this could have been done with sed. Alas manually changed all callers to use the new plugin/pkg/log package. * Error -> Info * Add docs to debug plugin as well
-
Moto Ishizawa authored
-
Miek Gieben authored
* pkg/log: ability for debug logs When the debug plugin is enabled all log.Debug calls will print to standard; if not there are a noop (almost). The log package wraps some standard log functions as well, so just replacing "log" with "plugin/pkg/log" should be enough to use this package. * docs * Add docs * lint * Test fallthrough to log pkg as well * simple package - up test coverage * add other log levels as well * update docs
-
Chris O'Haver authored
* check for bare zone query * check for bare type query
-
- 18 Apr, 2018 2 commits
-
-
Chris O'Haver authored
-
Miek Gieben authored
* plugin/metrics: add 'server' label This uses the new WithServer(ctx) to get the current server from the context. First in a larger refactor to make all plugins do this. * compile * compile * lala test * compile and test * typos * Dont duplicate the code
-
- 17 Apr, 2018 1 commit
-
-
Miek Gieben authored
* Move to readtimeout * lets compile * address comment * comment from pr * much smaller minimum
-
- 16 Apr, 2018 1 commit
-
-
Miek Gieben authored
if GOPATH is not set use $HOME/go which is the current default in Go. Fixes #1642
-
- 14 Apr, 2018 1 commit
-
-
Miek Gieben authored
-
- 13 Apr, 2018 2 commits
-
-
Miek Gieben authored
Stop all goroutines after we get the stop signal.
-
Tobias Schmidt authored
With this change the original truncated message returned by requested server is returned to the client, instead of returning an empty dummy message with only the truncation bit set.
-
- 12 Apr, 2018 2 commits
-
-
Miek Gieben authored
* plugin/forward: check TC correctly on reply. Add test for this. * Add proxy test as well
-
Maksim Paramonau authored
-
- 11 Apr, 2018 3 commits
-
-
Ruslan Drozhdzh authored
-
Maksim Paramonau authored
This allows to log responses of different classes, for example, denial and error.
-
Ruslan Drozhdzh authored
- each proxy stores average RTT (round trip time) of last rttCount queries. For now, I assigned the value 4 to rttCount - the read timeout is calculated as doubled average RTT, but it cannot exceed default timeout - initial avg RTT is set to a half of default timeout, so initial timeout is equal to default timeout - the RTT for failed read is considered equal to default timeout, so any failed read will lead to increasing average RTT (up to default timeout) - dynamic timeouts will let us react faster on lost UDP packets - in future, we may develop a low-latency forward policy based on collected RTT values of proxies
-
- 06 Apr, 2018 2 commits
-
-
Francois Tur authored
* - adding policy first in the policies description * - fix number of policies available
-
Ruslan Drozhdzh authored
* plugin/forward: retry on cached tcp connection closed by peer * fix linter warnings * fixed unit test * modify error message
-
- 01 Apr, 2018 7 commits
-
-
Miek Gieben authored
This double checking for 1.9 and 1.10 is nice, but doubles the travis test duration.
-
Miek Gieben authored
* plugin/forward: TCP conns can be closed Only when we read and get a io.EOF we know the conn is closed (for TCP). If this is the case Dial (again) and retry. Note that this new connection can also be closed by the upstream, we may want to add a DialForceNew or something to get a new TCP connection.. Simular to #1624, *but* this is by (TCP) design. We also don't have to wait for a timeout which makes it easier to reason about. * Move to forward.go * doesnt need changing
-
Miek Gieben authored
Tagged an new release; has some fixes.
-
Miek Gieben authored
Return the client error if there was one instead of the generic "no healthy upstream or error"
-
Miek Gieben authored
This registers the Collectors iff the metrics plugin has been loaded. Safes a bunch of code in each and every plugin's setup code.
-
Miek Gieben authored
* plugin/metrics: set server address in context Allow cross server block metrics to co-exist; for this we should label each metric with the server label. Put this information in the context and provide a helper function to get it out. Abstracting with entirely away with difficult as the release client_go (0.8.0) doesn't have the CurryWith functions yet. So current use is like so: define metric, with server label: RcodeCount = prometheus.NewCounterVec(prometheus.CounterOpts{ Namespace: plugin.Namespace, Subsystem: "forward", Name: "response_rcode_count_total", Help: "Counter of requests made per upstream.", }, []string{"server", "rcode", "to"}) And report ith with the helper function metrics.WithServer: RcodeCount.WithLabelValues(metrics.WithServer(ctx), rc, p.addr).Add(1) -
Miek Gieben authored
Drop the doTrue and doFalse and use a pointer to a bool to do a proper tri-bool.
-
- 31 Mar, 2018 1 commit
-
-
Miek Gieben authored
Check for trunacted in the lookup function as well and use the Match function here as well.
-
- 30 Mar, 2018 1 commit
-
-
Ruslan Drozhdzh authored
-
- 27 Mar, 2018 2 commits
-
-
Uladzimir Trehubenka authored
-
Miek Gieben authored
My routers acts funny when it sees it non RD query; make this HC as boring as possible
-
- 26 Mar, 2018 2 commits
-
-
Miek Gieben authored
-
Miek Gieben authored
-