This project is mirrored from https://github.com/coredns/coredns.git. The repository failed to update .
Repository mirroring has been paused due to too many failed attempts, and can be resumed by a project maintainer.
Last successful update .
  1. 27 Jan, 2018 1 commit
    • Miek Gieben's avatar
      release improvements (#1439) · ed02f5f2
      Miek Gieben authored
      Last release I forgot steps, put them in Makefile.release. Generating
      the manual files will be skipped if 'ronn' can't be found.
      ed02f5f2
  2. 26 Jan, 2018 7 commits
  3. 25 Jan, 2018 3 commits
  4. 24 Jan, 2018 3 commits
    • Tobias Schmidt's avatar
      plugin/etcd: Remove unnecessary test cases (#1421) · a0ad2ff0
      Tobias Schmidt authored
      These test cases became invalid with the fix of message truncation and
      don't validate anything.
      a0ad2ff0
    • Tobias Schmidt's avatar
      Fix truncation of messages longer than permitted by the client (#1417) · 697e2b4b
      Tobias Schmidt authored
      * Fix truncation of messages longer than permitted by the client
      
      CoreDNS currently doesn't respect the maximum response size advertised
      by the client and returns the full answer on a message with the TC bit
      set. This breaks client implementations which rely on DNS servers
      respecting the advertised size limit, for example the Ruby stdlib
      client. It also has negative network performance implications, as large
      messages will be split up into multiple UDP packets, even though the
      client will discard the truncated response anyway.
      
      While RFC 2181 permits the response of partial RRSets, finding the
      correct number of records fitting into the advertised response size is
      non-trivial. As clients should ignore truncated messages, this change
      simply removes the full RRSet on truncated messages.
      
      * Remove incorrect etcd test assertion
      
      If a client requests a TXT record larger than its advertised buffer
      size, a DNS server should _not_ respond with the answer, but truncate
      the message and set the TC bit, so that the client can retry using TCP.
      697e2b4b
    • Tobias Schmidt's avatar
      Add coredns_build_info metric (#1418) · b7074385
      Tobias Schmidt authored
      In order to track the rollout status of CoreDNS versions, add the common
      build_info metric.
      b7074385
  5. 23 Jan, 2018 4 commits
  6. 22 Jan, 2018 2 commits
  7. 19 Jan, 2018 2 commits
  8. 18 Jan, 2018 4 commits
    • Paul Greenberg's avatar
      feature: plugin/rewrite: rewrite ANSWER SECTION (#1318) · 258c163b
      Paul Greenberg authored
      Resolves: #1313
      258c163b
    • Miek Gieben's avatar
      plugin/dnssec: fix blacklies for NXDOMAIN (#1399) · cb3190ba
      Miek Gieben authored
      * plugin/dnssec: filter bitmap also for NXDOMAIN responses
      
      We change nxdomain to nodata, so at the point when we receive the
      reply it can be nxdomain or nodata. In both cases we should filter the
      nsec bitmap.
      
      Change the code and add explicit tests for this.
      
      * More tests
      cb3190ba
    • Miek Gieben's avatar
      plugin/health: add lameduck mode (#1379) · c39e5cd0
      Miek Gieben authored
      * plugin/health: add lameduck mode
      
      Add a way to configure lameduck more, i.e. set health to false, stop
      polling plugins. Then wait for a duration before shutting down. As the
      health middleware is configured early on in the plugin list, it will
      hold up all other shutdown, meaning we still answer queries.
      
      * Add New
      
      * More tests
      
      * golint
      
      * remove confusing text
      c39e5cd0
    • Miek Gieben's avatar
      plugin/dnssec: check validityperiod of RRSIGs (#1385) · 318bab77
      Miek Gieben authored
      * plugin/dnssec: check validityperiod of RRSIGs
      
      Somehow we missed implementing this. If a sig a retrieved from the
      cache, but not valid anymore, regenerate it instead of server invalid
      signatures.
      
      Fixes #1378
      
      * drop from cache after 3/4 validity
      
      * six days means 6 days
      318bab77
  9. 17 Jan, 2018 1 commit
    • Tobias Schmidt's avatar
      plugin/cache: Fix prefetching issues (#1363) · dd9fc896
      Tobias Schmidt authored
      * Improve plugin/cache metrics
      
      * Add coredns_cache_prefetch_total metric to track number of prefetches.
      * Remove unnecessary Cache.get() call which would incorrectly increment
        cache counters.
      * Initialize all counters and gauges at zero.
      
      * Allow prefetching of a single request per ttl
      
      The original implementation didn't allow prefetching queries which are
      only requested once during the duration of a TTL. The minimum amount of
      queries which had to be seen was therefore capped at 2.
      
      This change also implements a real prefetch test. The existing test was
      a noop and always passed regardless of any prefetch implementation.
      
      * Fix prefetching for items with a short TTL
      
      The default prefetch threshold (percentage) is 10% of the lifetime of a
      cache item. With the previous implementation, this disabled prefetching
      for all items with a TTL < 10s (the resulting percentage would be 0, at
      which point a cached item is already discarded).
      
      This change uses a time based threshold calculation and ensures that
      a prefetch is triggered at a TTL of 1 at the latest.
      
      * Fix wrong duration reporting of cached responses
      
      The logging and metrics plugins (among others) included the duration of
      a cache prefetch in the request latency of client request. This change
      fixes this wrong reporting and executes the prefetch request in a
      goroutine in the background.
      dd9fc896
  10. 16 Jan, 2018 3 commits
    • Yong Tang's avatar
      Fix several typos (#1395) · fe076798
      Yong Tang authored
      Signed-off-by: default avatarYong Tang <yong.tang.github@outlook.com>
      fe076798
    • Yong Tang's avatar
      Enhancement of external plugin enabling (#1392) · 9d87b953
      Yong Tang authored
      This fix is an enhancement of external plugin enabling.
      Previously, it was already able to build a customerized
      coredns with plugins enabled selectively, without changing
      coredns source code. However, all default plugins are
      actually bundled because of the import rule:
      ```
      "github.com/coredns/coredns/coremain"
      ```
      
      The issue is best described with the following:
      ```
      root@localhost:/go/src/github.com/coredns/coredns/sample# cat sample.go
      package main
      
      import (
              _ "github.com/coredns/forward"
      
              "github.com/coredns/coredns/coremain"
              "github.com/coredns/coredns/core/dnsserver"
      )
      
      var directives = []string{
              "forward",
              "startup",
              "shutdown",
      }
      
      func init() {
              dnsserver.Directives = directives
      }
      
      func main() {
              coremain.Run()
      }
      root@localhost:/go/src/github.com/coredns/coredns/sample#
      root@localhost:/go/src/github.com/coredns/coredns/sample# go build -v sample.go
      root@localhost:/go/src/github.com/coredns/coredns/sample# ./sample -plugins
      root@localhost:/go/src/github.com/coredns/coredns/sample# ./sample -plugins
      Server types:
        dns
      
      Caddyfile loaders:
        flag
        default
      
      Other plugins:
        dns.auto
        dns.autopath
        dns.bind
        dns.cache
        dns.chaos
        dns.debug
        dns.dnssec
        dns.dnstap
        dns.erratic
        dns.errors
        dns.etcd
        dns.federation
        dns.file
        dns.forward
        dns.health
        dns.hosts
        dns.kubernetes
        dns.loadbalance
        dns.log
        dns.nsid
        dns.pprof
        dns.prometheus
        dns.proxy
        dns.reverse
        dns.rewrite
        dns.root
        dns.route53
        dns.secondary
        dns.template
      ....
      ```
      
      This fix moves zplugins.go to a different package/directory so that
      it is possible to "only import plugins as needed".
      
      The following is the new output after this fix:
      ```
      root@localhost:/go/src/github.com/coredns/coredns/sample# ./sample -plugins
      Server types:
        dns
      
      Caddyfile loaders:
        flag
        default
      
      Other plugins:
        dns.forward
        dns.prometheus
        shutdown
        startup
      
      root@localhost:/go/src/github.com/coredns/coredns/sample#
      ```
      Signed-off-by: default avatarYong Tang <yong.tang.github@outlook.com>
      9d87b953
    • Yong Tang's avatar
      Add route53 plugin (#1390) · 584dd87c
      Yong Tang authored
      * Update vendor
      Signed-off-by: default avatarYong Tang <yong.tang.github@outlook.com>
      
      * Add route53 plugin
      
      This fix adds route53 plugin so that it is possible to
      query route53 record through CoreDNS.
      Signed-off-by: default avatarYong Tang <yong.tang.github@outlook.com>
      584dd87c
  11. 15 Jan, 2018 1 commit
  12. 14 Jan, 2018 2 commits
  13. 13 Jan, 2018 1 commit
  14. 12 Jan, 2018 3 commits
  15. 11 Jan, 2018 3 commits