This project is mirrored from https://github.com/coredns/coredns.git.
The repository failed to update .
Repository mirroring has been paused due to too many failed attempts, and can be resumed by a project maintainer.
Last successful update .
Repository mirroring has been paused due to too many failed attempts, and can be resumed by a project maintainer.
Last successful update .
- 29 Apr, 2017 4 commits
-
-
Miek Gieben authored
Check message for expired sig and don't cache those. Aside: This hack of caching entire messages is probably something we should stop doing at some point in the future and do this on a per RRset basis. Fixes #367 #635
-
Yong Tang authored
Add vendor with `go dep`
-
Yong Tang authored
This fix updates vendor with `go dep` Signed-off-by:Yong Tang <yong.tang.github@outlook.com>
-
Yong Tang authored
This fix adds vendor setup with `go dep` Signed-off-by:Yong Tang <yong.tang.github@outlook.com>
-
- 27 Apr, 2017 1 commit
-
-
Miek Gieben authored
* update readme * Add slack Also add the slack channel.
-
- 26 Apr, 2017 1 commit
-
-
Miek Gieben authored
* middleware/proxy: Kill goroutines on stop Ports caddy's https://github.com/mholt/caddy/commit/59bf71c2932c3b814a6a1211c492a1aa9f71d4a1 Excludes the proxy_test.go test part though. Fixes #644 * Add tests
-
- 25 Apr, 2017 1 commit
-
-
Miek Gieben authored
* Revert "middleware/proxy: Make Unhealthy a pointer (#615)" This reverts commit acbf522c. * middleware/proxy: add proper locking This add the proper locking around `Unhealthy`.
-
- 24 Apr, 2017 2 commits
-
-
John Belamaric authored
-
Chris O'Haver authored
* add listen addr option * Add listen address option to pprof * There is configuration * code styling
-
- 22 Apr, 2017 2 commits
-
-
Miek Gieben authored
This method parses the Host field in the service. It returns 1 or 3 things 1) it is a host 2) an IPv4 address or an 3) IPv6 address. This simplifies some code a bit and allows for 1 way of parsing the Host field. This *only* parse the Host field, Mail and/or Text values should be checked separately. We reuse the dns.TypeXXX values for this as to not invent anything new.
-
Chris O'Haver authored
-
- 21 Apr, 2017 1 commit
-
-
Dominic authored
Url was wrong
-
- 20 Apr, 2017 5 commits
-
-
Yue Ko authored
Print corresponding error message when TLS initialization fails.
-
Miek Gieben authored
Add a MAINTAINERS file. It's not generated and not as elaborate (i.e. no focus areas) as the one prometheus uses. But it's a start. Generated with `git shortlog -s -n`, everyone with more than 5 commits. Docs are put in `Makefile.release`. Fixes #566
-
John Belamaric authored
-
John Belamaric authored
-
John Belamaric authored
* Add fallthrough support for Kubernetes This enables registering other services in the same zone as Kubernetes services. This also re-orders the middleware chain so that Kubernetes comes before other types, in order to make this work out-of-the-box. * Remove extra line
-
- 18 Apr, 2017 2 commits
-
-
John Belamaric authored
* Implements tracing in the native gRPC server * Undo some unnecessary changes * Properly revert trace/setup.go this time * Some very very basic tests * Remove warning for non-Trace middleware
-
Miek Gieben authored
This adds a simple reload test for the UDP socket.
-
- 16 Apr, 2017 1 commit
-
-
Miek Gieben authored
* middleware/erratic: allow TC bit to be set Add `truncate` as an option. Fixes #593
-
- 13 Apr, 2017 4 commits
-
-
Miek Gieben authored
* middleware/erratic: add delying queries * Dont println
-
Miek Gieben authored
Pointer updates are atomic so drop the sync.RWMutex as it is not needed anymore. This also fixes the race introduced with dfc71df0 (although I believe this is the first time we properly tested that code path).
-
Miek Gieben authored
Add test for checking the additional section after a SRV query. Though this wasn't fixed, but it is. Fixes #609
-
John Belamaric authored
middleware/metrics: allow multiple listeners
-
- 12 Apr, 2017 1 commit
-
-
Miek Gieben authored
There was no inherent reason *not* to allow multiple listeners for the monitoring data. Actually enforcing only one listener lead to more code then just allowing multiple. It's probably not what you want; but CoreDNS is happy to oblige.
-
- 06 Apr, 2017 1 commit
-
-
Christoph Görn authored
-
- 29 Mar, 2017 1 commit
-
-
Michael authored
-
- 19 Mar, 2017 2 commits
-
-
Miek Gieben authored
-
Miek Gieben authored
-
- 18 Mar, 2017 1 commit
-
-
Miek Gieben authored
Add middleware by directly linking it from caddy, i.e. without any code changes. To be fair: this does not added a ServeHTTP, but does give some nice features in the Corefile.
-
- 17 Mar, 2017 2 commits
-
-
Michael S. Fischer authored
* Fix race on backend health status update * Ensure test case is compatible on Go 1.7
-
Michael S. Fischer authored
Allow HTTP health check to be performed against a regular DNS upstream server. TODO: Add tests.
-
- 16 Mar, 2017 1 commit
-
-
Miek Gieben authored
Also don't default to a default proxy; keep it empty. Normalize the zones, so that is the server block ones are used, it will actually work.
-
- 15 Mar, 2017 1 commit
-
-
Miek Gieben authored
* add proxy tcp * add truncated for tcp to udp response * move truncation to scrubbing * add test that executes upstream over tcp * middleware/proxy: some tweaks rename force-tcp to force_tcp to be inline with the rest and use a dnsOptions struct to put the options in to allow it to be extended. Add some parse tests as well. * Fix test and rename dnsOptions Options
-
- 14 Mar, 2017 2 commits
-
-
Michael S. Fischer authored
According to the code, the default health check interval is 30 seconds, not 10 as stated in the documentation. (The alternative would be to adjust the interval in the code.)
-
Miek Gieben authored
* core: add listening for other protocols Allow CoreDNS to listen for TLS request coming over port 853. This can be enabled with `tls://` in the config file. Implement listening for grps:// as well. a Corefile like: ~~~ . tls://.:1853 { whoami tls } ~~~ Means we listen on 1853 for tls requests, the `tls` config item allows configuration for TLS parameters. We *might* be tempted to use Caddy's Let's Encrypt implementation here. * Refactor coredns/grpc into CoreDNS This makes gRPC a first class citizen in CoreDNS. Add defines as being just another server. * some cleanups * unexport the servers * Move protobuf dir * Hook up TLS properly * Fix test * listen for TLS as well. README updates * disable test, fix package * fix test * Fix tests * Fix remaining test * Some tests * Make the test work * Add grpc test from #580 * fix crash * Fix tests * Close conn * README cleanups * README * link RFC
-
- 13 Mar, 2017 1 commit
-
-
John Belamaric authored
The deps target needs to be dependent on the generated middleware code, or you end up having to do make twice.
-
- 09 Mar, 2017 2 commits
-
-
Miek Gieben authored
We don't need to use the muxer in Go DNS s we only have one entry point per server - and mux ourselves in ServeDNS. Also make ServeDNS take a context, and make that the canonical way to call all middleware.
-
John Belamaric authored
-
- 07 Mar, 2017 1 commit
-
-
John Belamaric authored
* Add edns0 code rewrite * check arg count * change `new`; set EDNS0 if request doesn't have it set * change set to replace_or_append * change to append_or_replace * return error in new * update documents * fixt UT * return error * go fmt * Rework for more general EDNS0 use Also changed how rules are created and validated. Implements EDNS0 NSID in addition to local. * go fmt * README updates, NSID tests and fixes * gofmt -s -w * Fix tests for rewrite syntax change * Add tests, fix error message * Review nits * Missed on nit * More tests, integration test, fix edns0 parse issue * Fix README, use RewriteIgnored * go fmt
-