This project is mirrored from https://github.com/coredns/coredns.git. The repository failed to update .
Repository mirroring has been paused due to too many failed attempts, and can be resumed by a project maintainer.
Last successful update .
  1. 02 Jun, 2017 2 commits
  2. 01 Jun, 2017 2 commits
    • Miek Gieben's avatar
      middleware/secondary: fix crash with no zone (#680) · 30ecb83d
      Miek Gieben authored
      When CoreDNS starts up and can't get a zone transfer going the Apex is
      empty. This `nil` is then transformed into wireformat, which fails with
      a nil pointer dereference in Go DNS.
      
      In this case we should just return SERVFAIL, because we don't have any
      info (yet). Note the lookup code returned NXDOMAIN, which is correct
      from a lookup standpoint, but also invalidates every name in the future
      loaded zone.
      
      Anyway, look for an apex before doing the lookup and return SERVFAIL if
      nothing is found.
      
      Fixes #679
      30ecb83d
    • Miek Gieben's avatar
      middleware/{log,errors}: output everything to stdout (#684) · e261ac1a
      Miek Gieben authored
      Limit the options in both errors and log middleware, just output to
      stdout and let someone else (journald,docker) care about where to route
      the logs. This removes syslog and logging to a file.
      
      Fixes #573 #602
      e261ac1a
  3. 30 May, 2017 2 commits
  4. 26 May, 2017 4 commits
    • cricketliu's avatar
      Update README.md (#668) · 2f2c90f3
      cricketliu authored
      * Update README.md
      
      Minor cosmetic fixes, including one broken comment in a sample Corefile.
      
      * Fix verb tense
      2f2c90f3
    • Eric Yan's avatar
      middleware/file: add DNAME support (#651) · d2268d30
      Eric Yan authored
      * Test DNAME handling
      
      If the DNAME itself matches the QTYPE, and the owner name matches QNAME,
      the relevant DNAME RR should be included in the answer section.
      
      Other parts of RFC 6672 are not implemented yet and hence left untested.
      
      * Implement the DNAME substitution
      
      As specified in RFC 6672, a DNAME substitution is performed by replacing
      the suffix labels of the name being sought matching the owner name of
      the DNAME resource record with the string of labels in the RDATA field.
      The matching labels end with the root label in all cases. Only whole
      labels are replaced.
      
      * Handle DNAME redirection
      
      A CNAME RR is created on-the-fly for the DNAME redirection. Be aware
      that we do not have all the edge cases covered yet.
      
      * Test DNAME owner name matching the QNAME
      
      A DNAME RR redirects DNS names subordinate to its owner name; the owner
      name of a DNAME is NOT redirected itself.
      
      * Ignore names next to and below a DNAME record
      
      According to RFC 6672, resource records MUST NOT exist at any subdomain
      of the owner of a DNAME RR. When loading a zone, those names below the
      DNAME RR will be quietly ignored.
      
      * Streamline DNAME processing
      
      Instead of checking DNAMEs during lookup, we use a preloaded list of
      DNAME RRs to streamline the process without any runtime performance
      penalty:
      
       * When loading the zone, keep a record of any DNAME RRs.
       * If there aren't any DNAMEs in the zone, just do the lookup as usual.
       * Only when the zone has one or more DNAME records, we look for the
         matching DNAME and ignore confronting subdomain(s) in the process.
      
      * Make it easier to trace back through test errors
      
      * Make DNAME handling part of lookup routine
      
      DNAME processing is invoked only if the zone has at least one DNAME RR.
      
      * Put DNAME resolution inside the searching of a hit
      
      We can drop some of the other ideas; we don't need to track if we
      have DNAMEs in the zone it just follows naturally from the current
      lookup code.
      
      See also: #664
      d2268d30
    • Manuel Alejandro de Brito Fontes's avatar
    • Yong Tang's avatar
      Some golint cleanup (#674) · 37050dc2
      Yong Tang authored
      This commit fixes some golint issues in `core/dnsserver`
      and `middleware/kubernetes`.
      Signed-off-by: default avatarYong Tang <yong.tang.github@outlook.com>
      37050dc2
  5. 25 May, 2017 1 commit
  6. 24 May, 2017 1 commit
  7. 23 May, 2017 1 commit
    • Chris O'Haver's avatar
      Handle K8s middleware NS record (#662) · 7f950e49
      Chris O'Haver authored
      * commit for testing in cluster
      
      * commit for testing in cluster
      
      * refactor and add ns.dns record
      
      * Release 007
      
      * reduce heap allocations
      
      * gofmt
      
      * revert accidental Makefile commits
      
      * restore prior rcode for disabled pod mode
      
      * revert Makefile deltas
      
      * add unit tests
      
      * more unit tests
      
      * make isRequestInReverseRange easier to test
      
      * more unit tests
      
      * addressing review feedback
      
      * commit setup.go
      7f950e49
  8. 22 May, 2017 1 commit
    • Miek Gieben's avatar
      middleware/chaos: fix version (#669) · 024f5668
      Miek Gieben authored
      * middleware/chaos: fix version
      
      Move the version setting into a init function so it is done early. Then
      tweak the setup code for chaos a bit to correctly pick this version up.
      Add an integration test to pick this up in the toplevel test/ directory.
      
      Fixes #667
      
      * Update tests
      024f5668
  9. 12 May, 2017 1 commit
    • Miek Gieben's avatar
      Makefile.release: bogus all target (#666) · 7e6f5c77
      Miek Gieben authored
      Make the default target do nothing and put the actual release under a
      'release' target. Prevent accidentally committing unwanted commits to
      the repo.
      
      Tested with `make -f Makefile.release -n`.
      7e6f5c77
  10. 08 May, 2017 1 commit
  11. 06 May, 2017 1 commit
  12. 04 May, 2017 3 commits
  13. 03 May, 2017 1 commit
    • Miek Gieben's avatar
      middleware/file: correctly parse the stanza (#658) · 8eda6c7b
      Miek Gieben authored
      * middleware/file: correctly parse the stanza
      
      Parsing the file stanza would give precedence to 'transfer' and ignore
      other bits if it wasn't specified.
      
      This change fixes the parsing. The actually external CNAME retrieval is
      working fine (once the upstream is correctly parsed).
      
      This wasn't caught in tests, because we lack a parsing test for this.
      
      Fixes #657
      
      * Add tests
      8eda6c7b
  14. 30 Apr, 2017 2 commits
  15. 29 Apr, 2017 4 commits
  16. 27 Apr, 2017 1 commit
  17. 26 Apr, 2017 1 commit
  18. 25 Apr, 2017 1 commit
    • Miek Gieben's avatar
      Fix health race (#645) · 003b1bf6
      Miek Gieben authored
      * Revert "middleware/proxy: Make Unhealthy a pointer (#615)"
      
      This reverts commit acbf522c.
      
      * middleware/proxy: add proper locking
      
      This add the proper locking around `Unhealthy`.
      003b1bf6
  19. 24 Apr, 2017 2 commits
  20. 22 Apr, 2017 2 commits
    • Miek Gieben's avatar
      msg.Service: add HostType() method (#627) · 4c9351b0
      Miek Gieben authored
      This method parses the Host field in the service. It returns 1 or 3
      things 1) it is a host 2) an IPv4 address or an 3) IPv6 address.
      This simplifies some code a bit and allows for 1 way of parsing the Host
      field.
      
      This *only* parse the Host field, Mail and/or Text values should be
      checked separately.
      
      We reuse the dns.TypeXXX values for this as to not invent anything new.
      4c9351b0
    • Chris O'Haver's avatar
      Fix go pprof lib link (#638) · 320cf978
      Chris O'Haver authored
      320cf978
  21. 21 Apr, 2017 1 commit
  22. 20 Apr, 2017 5 commits