This project is mirrored from https://github.com/coredns/coredns.git.
The repository failed to update .
Repository mirroring has been paused due to too many failed attempts, and can be resumed by a project maintainer.
Last successful update .
Repository mirroring has been paused due to too many failed attempts, and can be resumed by a project maintainer.
Last successful update .
- 21 Jun, 2017 1 commit
-
-
Miek Gieben authored
We would silently ignore anything that we couldn't parse on the command line, this change make this an error. Fixes #743
-
- 20 Jun, 2017 1 commit
-
-
Roman Mazur authored
Cant' transfer zone from masters without populating `f`. This error prevents secondary zones recognized as "true" secondary, so secondary setting never worked.
-
- 19 Jun, 2017 1 commit
-
-
Miek Gieben authored
In grafana we miss the context of where this is called, make the name more descriptive. Also test the GH webhook.
-
- 18 Jun, 2017 1 commit
-
-
Athir Nuaimi authored
* update dockerfile to allow use of https_google to use TLS in a docker container (based on Alpine linux) you need to also include the CA certificate files * cleaned up version of Dockerfile that supports https_google
-
- 17 Jun, 2017 1 commit
-
-
Chris O'Haver authored
-
- 15 Jun, 2017 2 commits
-
-
John Belamaric authored
-
Miek Gieben authored
* cleanup: go vet and golint run Various cleanups trickered by go vet and golint. * Fix tests and lowercase all errors Lowercase all errors, some tests in kubernetes use errors from kubernetes which do start with a capital letter.
-
- 14 Jun, 2017 5 commits
-
-
Chris O'Haver authored
-
Chris O'Haver authored
* federation initial commit * UTs/bugfixes * federation bits * polish, cover UT gaps * add TODO * go fmt & todo note * remove unrelated change * pr changes * start node watcher * get real node name * remove unused case
-
Miek Gieben authored
* middleware/debug: add Add a debug "middleware" that disables the recover() and just lets CoreDNS crash; very useful for testing. Fixes ##563 * fix test * Feedback: check the value of Debug
-
Miek Gieben authored
Don't load a zone with a SOA record, barf with 'no SOA record' error.
-
Miek Gieben authored
* cache: add sharded cache implementation Add Cache impl and a few tests. This cache is 256-way sharded, mainly so each shard has it's own lock. The main cache structure is a readonly jump plane into the right shard. This should remove the single lock contention on the main lock and provide more concurrent throughput - Obviously this hasn't been tested or measured. The key into the cache was made a uint32 (hash.fnv) and the hashing op is not using strings.ToLower anymore remove any GC in that code path. * here too * Minimum shard size * typos * blurp * small cleanups no defer * typo * Add freq based on Johns idea * cherry-pick conflict resolv * typo * update from early code review from john * add prefetch to the cache * mw/cache: add prefetch * remove println * remove comment * Fix tests * Test prefetch in setup * Add start of cache * try add diff cache options * Add hacky testcase * not needed * allow the use of a percentage for prefetch If the TTL falls below xx% do a prefetch, if the record was popular. Some other fixes and correctly prefetch only popular records.
-
- 13 Jun, 2017 1 commit
-
-
Miek Gieben authored
A somewhat longer living PR to group documentation updates
-
- 10 Jun, 2017 1 commit
-
-
Miek Gieben authored
It's not used, remove it.
-
- 09 Jun, 2017 4 commits
-
-
Miek Gieben authored
* core: -log bolean flag to enable logging Change to -log flag to a boolean that defaults false and when true logs to stdout. * And bool here
-
Chris O'Haver authored
-
Pat Moroney authored
* add hosts middleware * forgot pointer receiver * add appropriately modified hostsfile tests from golang repo * remove test artifacts, separate hostsfile parsing from caching and opening, remove unused metrics references, move middleware up the chain * refactored the logic for creating records and filtering ip address versions. also got PTR lookups working * Add README.md. Modify config to be more concise. Add zones list to config. Filter PTR responses based on zones list. * add Fallthrough and return correct dns response code otherwise * Simplified Hostsfile to only store hosts in the zones we care about, and by ip version. Added handler tests and improved other tests. * oops, goimports loaded a package from a different repo
-
Miek Gieben authored
* middleware/file: don't reload zone when SOA isn't changed Give Parse an extra argument which is the SOA's serial, if > 0 we check against the just parsed SOA and then just return. Most notable use is in reload.go which is both used in the file and auto middleware. Fixes #415 * PR comments
-
- 08 Jun, 2017 1 commit
-
-
Miek Gieben authored
Singleinflight interferes with the health checking of upstream. If an upstream would fail, singleinflight would mirror that error to to other proxy *iff* multple identical queries would be inflight. This would lead to marking *all* upstreams as bad, essentially collapsing multiple upstreams into a SPOF. Clearly not what we want. Singleinflight does have some nice properties, but I've opted to rip it out entirely. Caching should almost (but not quite) as good. Added a test case in test that uses 3 CoreDNS instances to reflect the setup from #715. Found another bug as well, where (when the policy would be nil), we would always Spray even though we've found a healthy host.
-
- 05 Jun, 2017 1 commit
-
-
Miek Gieben authored
-
- 04 Jun, 2017 1 commit
-
-
Miek Gieben authored
Fixed in upstream, update miekg/dns to latest Fixes #598
-
- 03 Jun, 2017 7 commits
-
-
Miek Gieben authored
We already lowercase before comparing. Fixes #447
-
Miek Gieben authored
* Removed caddy * new stuff * Now need to go get caddy * Duh
-
Chris O'Haver authored
-
Miek Gieben authored
-
Chris O'Haver authored
-
Miek Gieben authored
* middleware/proxy: silence gprc errors Add discard logger * Silence glog crap * Revert "Silence glog crap" This reverts commit a15dafbca62b4e91d4c41543b4c06b8c39a5e500.
-
Miek Gieben authored
* middleware/file: add DNSSEC support Add tests for DNSSEC and check if everything is working. * add signatures * tweak * Add DNSSEC signing tests for DNAME * Just sign it all
-
- 02 Jun, 2017 6 commits
-
-
Chris O'Haver authored
-
Chris O'Haver authored
-
Chris O'Haver authored
-
Chris O'Haver authored
-
Yong Tang authored
This commit updates CONTRIBUTING.md to add a section for vendor management. Signed-off-by:Yong Tang <yong.tang.github@outlook.com>
-
Miek Gieben authored
-
- 01 Jun, 2017 2 commits
-
-
Miek Gieben authored
When CoreDNS starts up and can't get a zone transfer going the Apex is empty. This `nil` is then transformed into wireformat, which fails with a nil pointer dereference in Go DNS. In this case we should just return SERVFAIL, because we don't have any info (yet). Note the lookup code returned NXDOMAIN, which is correct from a lookup standpoint, but also invalidates every name in the future loaded zone. Anyway, look for an apex before doing the lookup and return SERVFAIL if nothing is found. Fixes #679
-
Miek Gieben authored
Limit the options in both errors and log middleware, just output to stdout and let someone else (journald,docker) care about where to route the logs. This removes syslog and logging to a file. Fixes #573 #602
-
- 30 May, 2017 2 commits
-
-
Jonas Östanbäck authored
-
Chris O'Haver authored
* Add external service cnames * remove cruft * update CI k8s version * change CI k8s version * min k8s ver for ext services * trying k8s 1.5 * k8s 1.5 requires ports spec * remove kruft * update dns schema version
-
- 26 May, 2017 2 commits
-
-
cricketliu authored
* Update README.md Minor cosmetic fixes, including one broken comment in a sample Corefile. * Fix verb tense
-
Eric Yan authored
* Test DNAME handling If the DNAME itself matches the QTYPE, and the owner name matches QNAME, the relevant DNAME RR should be included in the answer section. Other parts of RFC 6672 are not implemented yet and hence left untested. * Implement the DNAME substitution As specified in RFC 6672, a DNAME substitution is performed by replacing the suffix labels of the name being sought matching the owner name of the DNAME resource record with the string of labels in the RDATA field. The matching labels end with the root label in all cases. Only whole labels are replaced. * Handle DNAME redirection A CNAME RR is created on-the-fly for the DNAME redirection. Be aware that we do not have all the edge cases covered yet. * Test DNAME owner name matching the QNAME A DNAME RR redirects DNS names subordinate to its owner name; the owner name of a DNAME is NOT redirected itself. * Ignore names next to and below a DNAME record According to RFC 6672, resource records MUST NOT exist at any subdomain of the owner of a DNAME RR. When loading a zone, those names below the DNAME RR will be quietly ignored. * Streamline DNAME processing Instead of checking DNAMEs during lookup, we use a preloaded list of DNAME RRs to streamline the process without any runtime performance penalty: * When loading the zone, keep a record of any DNAME RRs. * If there aren't any DNAMEs in the zone, just do the lookup as usual. * Only when the zone has one or more DNAME records, we look for the matching DNAME and ignore confronting subdomain(s) in the process. * Make it easier to trace back through test errors * Make DNAME handling part of lookup routine DNAME processing is invoked only if the zone has at least one DNAME RR. * Put DNAME resolution inside the searching of a hit We can drop some of the other ideas; we don't need to track if we have DNAMEs in the zone it just follows naturally from the current lookup code. See also: #664
-