disable ra flag for several plugins (#2408)

* disable ra flag for several plugins

* removed unnecessary assignment

* removed more unnecessary assignments
This commit is contained in:
Isolus 2018-12-30 17:05:08 +01:00 committed by Miek Gieben
parent 38790c7222
commit 7642995558
11 changed files with 11 additions and 12 deletions

View file

@ -70,7 +70,7 @@ func (a Auto) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (i
m := new(dns.Msg)
m.SetReply(r)
m.Authoritative, m.RecursionAvailable = true, true
m.Authoritative = true
m.Answer, m.Ns, m.Extra = answer, ns, extra
switch result {

View file

@ -422,7 +422,7 @@ func SOA(b ServiceBackend, zone string, state request.Request, opt Options) ([]d
func BackendError(b ServiceBackend, zone string, rcode int, state request.Request, err error, opt Options) (int, error) {
m := new(dns.Msg)
m.SetRcode(state.Req, rcode)
m.Authoritative, m.RecursionAvailable = true, true
m.Authoritative = true
m.Ns, _ = SOA(b, zone, state, opt)
state.W.WriteMsg(m)

View file

@ -82,7 +82,7 @@ func (e *Etcd) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (
m := new(dns.Msg)
m.SetReply(r)
m.Authoritative, m.RecursionAvailable = true, true
m.Authoritative = true
m.Answer = append(m.Answer, records...)
m.Extra = append(m.Extra, extra...)

View file

@ -32,7 +32,6 @@ func (s Stub) ServeDNS(ctx context.Context, w dns.ResponseWriter, req *dns.Msg)
if e != nil {
return dns.RcodeServerFailure, e
}
m.RecursionAvailable = true
w.WriteMsg(m)
return dns.RcodeSuccess, nil
}

View file

@ -104,7 +104,7 @@ func (f *Federation) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.
m := new(dns.Msg)
m.SetReply(r)
m.Authoritative, m.RecursionAvailable = true, true
m.Authoritative = true
m.Answer = []dns.RR{service.NewCNAME(state.QName(), service.Host)}

View file

@ -50,7 +50,7 @@ func (f File) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (i
if z.isNotify(state) {
m := new(dns.Msg)
m.SetReply(r)
m.Authoritative, m.RecursionAvailable = true, true
m.Authoritative = true
w.WriteMsg(m)
log.Infof("Notify from %s for %s: checking transfer", state.IP(), zone)
@ -83,7 +83,7 @@ func (f File) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (i
m := new(dns.Msg)
m.SetReply(r)
m.Authoritative, m.RecursionAvailable = true, true
m.Authoritative = true
m.Answer, m.Ns, m.Extra = answer, ns, extra
switch result {

View file

@ -63,7 +63,7 @@ func (h Hosts) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (
m := new(dns.Msg)
m.SetReply(r)
m.Authoritative, m.RecursionAvailable = true, true
m.Authoritative = true
m.Answer = answers
w.WriteMsg(m)

View file

@ -16,7 +16,7 @@ func (k Kubernetes) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.M
m := new(dns.Msg)
m.SetReply(r)
m.Authoritative, m.RecursionAvailable = true, true
m.Authoritative = true
zone := plugin.Zones(k.Zones).Matches(state.Name())
if zone == "" {

View file

@ -110,7 +110,7 @@ func (h *Route53) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg
m := new(dns.Msg)
m.SetReply(r)
m.Authoritative, m.RecursionAvailable = true, true
m.Authoritative = true
var result file.Result
for _, hostedZone := range z {
h.zMu.RLock()

View file

@ -101,7 +101,7 @@ func TestRoute53(t *testing.T) {
}
m.Answer = []dns.RR{rr}
m.Authoritative, m.RecursionAvailable = true, true
m.Authoritative = true
rcode = dns.RcodeSuccess
}

View file

@ -75,7 +75,7 @@ func (h Handler) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg)
msg := new(dns.Msg)
msg.SetReply(r)
msg.Authoritative, msg.RecursionAvailable = true, true
msg.Authoritative = true
msg.Rcode = template.rcode
for _, answer := range template.answer {