This project is mirrored from https://github.com/coredns/coredns.git. The repository failed to update .
Repository mirroring has been paused due to too many failed attempts, and can be resumed by a project maintainer.
Last successful update .
  1. 25 Apr, 2018 5 commits
    • Miek Gieben's avatar
      core: remove HostAddresses() (#1728) · d3f2d4a2
      Miek Gieben authored
      * core: remove HostAddresses()
      
      config.HostAddresses() is a weird function that gathers
      some data from the server and returns a string.
      
      It is *only* used the trace plugin, to figure out what
      server starts the trace.
      
      Looks to be better to fit in the with metrics.WithServer label
      on the trace itself to show which server handled the trace.
      
      Remove HostAddresses() and cleanup trace a small bit.:w
      
      * lint
      d3f2d4a2
    • Miek Gieben's avatar
      deprecate some stuff (#1732) · 7a507e34
      Miek Gieben authored
      https_google and reverse will be removed in 2 releases. Add warnings.
      
      We will move reverse to coredns/reverse and list it as external after
      this switch.
      
      See #1713
      7a507e34
    • Miek Gieben's avatar
      plugin/pkg/uniq: add (#1733) · 5e6114b7
      Miek Gieben authored
      Spin this out the metrics package so we can use it in the health
      one of well to fix some reload bugs.
      5e6114b7
    • Miek Gieben's avatar
      plugin/forward: fix TLS setup (#1714) · ce084012
      Miek Gieben authored
      * plugin/forward: fix TLS setup
      
      Way smaller PR than #1679. Fixes same thing.
      
      * remove println
      
      * put overwritten test back
      
      * context
      
      * update tests
      ce084012
    • Miek Gieben's avatar
      plugin/forward: close channels when connManager returns (#1727) · f529a277
      Miek Gieben authored
      Close a bunch of channels, also change the test to just use a for loop
      with a counter.
      f529a277
  2. 24 Apr, 2018 2 commits
  3. 23 Apr, 2018 4 commits
    • Miek Gieben's avatar
      Presubmit (#1719) · c9b5cedb
      Miek Gieben authored
      * build: add presubmits
      
      We didn't have a way to encode presubmit; with this hack we can just
      run a bunch of script on the build; this allows us to automatically
      capture things like using the wrong context and maybe other fluff.
      
      This allows us to cut down on code reviews and just have the build fail.
      
      * hook it up
      
      * put presubmit in checks; so we do it for tests as well
      
      * Add explicit exit 1 if things fails
      c9b5cedb
    • Miek Gieben's avatar
      Release 1.1.2 · 582f91f3
      Miek Gieben authored
      582f91f3
    • Miek Gieben's avatar
      Build manual docs (#1721) · eb7c3ad1
      Miek Gieben authored
      Slight tweak in the forward readme, as sublist don't work well to
      generate these.
      eb7c3ad1
    • Miek Gieben's avatar
      Use logging (#1718) · 12b2ff97
      Miek Gieben authored
      * update docs
      
      * plugins: use plugin specific logging
      
      Hooking up pkg/log also changed NewWithPlugin to just take a string
      instead of a plugin.Handler as that is more flexible and for instance
      the Root "plugin" doesn't implement it fully.
      
      Same logging from the reload plugin:
      
      .:1043
      2018/04/22 08:56:37 [INFO] CoreDNS-1.1.1
      2018/04/22 08:56:37 [INFO] linux/amd64, go1.10.1,
      CoreDNS-1.1.1
      linux/amd64, go1.10.1,
      2018/04/22 08:56:37 [INFO] plugin/reload: Running configuration MD5 = ec4c9c55cd19759ea1c46b8c45742b06
      2018/04/22 08:56:54 [INFO] Reloading
      2018/04/22 08:56:54 [INFO] plugin/reload: Running configuration MD5 = 9e2bfdd85bdc9cceb740ba9c80f34c1a
      2018/04/22 08:56:54 [INFO] Reloading complete
      
      * update docs
      
      * better doc
      12b2ff97
  4. 22 Apr, 2018 4 commits
    • Miek Gieben's avatar
      all: fix plugin import ordering (#1717) · 0930eb8b
      Miek Gieben authored
      Got a bit messed up with stb lib "context" usage.
      0930eb8b
    • Miek Gieben's avatar
      plugin/pkg/log: add plugin logging (#1716) · 69a956f0
      Miek Gieben authored
      Add per plugin logging to make it explicit what is logging, if you
      include this package under the name clog (coredns log), you can do the
      following:
      
      log := clog.NewWithPlugin{whoami{}} // e.g.
      
      And then just log.Info(...); these will then include the plugin ala:
      [INFO] plugin/whoami: stuff
      
      So we only need to init the logger and then just use it.
      69a956f0
    • Miek Gieben's avatar
      Export metrics in setup; so it also works after reload (#1715) · a466bb6f
      Miek Gieben authored
      * brr; a sleep
      
      * Shouldnt need a query
      a466bb6f
    • Miek Gieben's avatar
      reload: use OnRestart (#1709) · acbcad7b
      Miek Gieben authored
      * reload: use OnRestart
      
      Close the listener on OnRestart for health and metrics so the default
      setup function can setup the listener when the plugin is "starting up".
      
      Lightly test with some SIGUSR1-ing. Also checked the reload plugin with
      this, seems fine:
      
      .com.:1043
      .:1043
      2018/04/20 15:01:25 [INFO] CoreDNS-1.1.1
      2018/04/20 15:01:25 [INFO] linux/amd64, go1.10,
      CoreDNS-1.1.1
      linux/amd64, go1.10,
      2018/04/20 15:01:25 [INFO] Running configuration MD5 = aa8b3f03946fb60546ca1f725d482714
      2018/04/20 15:02:01 [INFO] Reloading
      2018/04/20 15:02:01 [INFO] Running configuration MD5 = b34a96d99e01db4015a892212560155f
      2018/04/20 15:02:01 [INFO] Reloading complete
      ^C2018/04/20 15:02:06 [INFO] SIGINT: Shutting down
      
      With this corefile:
      .com {
        proxy . 127.0.0.1:53
        prometheus :9054
        whoami
        reload
      }
      
      . {
        proxy . 127.0.0.1:53
        prometheus :9054
        whoami
        reload
      }
      
      The prometheus port was 9053, changed that to 54 so reload would pick it
      up.
      
      From a cursory look it seems this also fixes:
      Fixes #1604 #1618 #1686 #1492
      
      * At least make it test
      
      * Use onfinalshutdown
      
      * reload: add reload test
      
      This test #1604 adn right now fails.
      
      * Address review comments
      
      * Add bug section explaining things a bit
      
      * compile tests
      
      * Fix tests
      
      * fixes
      
      * slightly less crazy
      
      * try to make prometheus setup less confusing
      
      * Use ephermal port for test
      
      * Don't use the listener
      
      * These are shared between goroutines, just use the boolean in the main
        structure.
      * Fix text in the reload README,
      * Set addr to TODO once stopping it
      * Morph fturb's comment into test, to test reload and scrape health and
        metric endpoint
      acbcad7b
  5. 20 Apr, 2018 5 commits
  6. 19 Apr, 2018 4 commits
  7. 18 Apr, 2018 2 commits
  8. 17 Apr, 2018 1 commit
  9. 16 Apr, 2018 1 commit
  10. 14 Apr, 2018 1 commit
  11. 13 Apr, 2018 2 commits
  12. 12 Apr, 2018 2 commits
  13. 11 Apr, 2018 3 commits
    • Ruslan Drozhdzh's avatar
      a0f294e5
    • Maksim Paramonau's avatar
      plugin/log: allow various combinations of classes of responses (#1664) · ccfe691b
      Maksim Paramonau authored
      This allows to log responses of different classes, for example, denial and error.
      ccfe691b
    • Ruslan Drozhdzh's avatar
      plugin/forward: use dynamic read timeout (#1659) · a20b4fe2
      Ruslan Drozhdzh authored
      - each proxy stores average RTT (round trip time) of last rttCount queries.
         For now, I assigned the value 4 to rttCount
       - the read timeout is calculated as doubled average RTT, but it cannot
         exceed default timeout
       - initial avg RTT is set to a half of default timeout, so initial timeout
         is equal to default timeout
       - the RTT for failed read is considered equal to default timeout, so any
         failed read will lead to increasing average RTT (up to default timeout)
       - dynamic timeouts will let us react faster on lost UDP packets
       - in future, we may develop a low-latency forward policy based on
         collected RTT values of proxies
      a20b4fe2
  14. 06 Apr, 2018 2 commits
  15. 01 Apr, 2018 2 commits
    • Miek Gieben's avatar
      Only check 1.10 again (#1652) · 848a5d7c
      Miek Gieben authored
      This double checking for 1.9 and 1.10 is nice, but doubles the
      travis test duration.
      848a5d7c
    • Miek Gieben's avatar
      plugin/forward: TCP conns can be closed (#1651) · 81348b42
      Miek Gieben authored
      * plugin/forward: TCP conns can be closed
      
      Only when we read and get a io.EOF we know the conn is closed (for TCP).
      If this is the case Dial (again) and retry. Note that this new
      connection can also be closed by the upstream, we may want to add a
      DialForceNew or something to get a new TCP connection..
      
      Simular to #1624, *but* this is by (TCP) design. We also don't have to
      wait for a timeout which makes it easier to reason about.
      
      * Move to forward.go
      
      * doesnt need changing
      81348b42