coredns/middleware/file
Michael Grosser ece3cf8ecf Fix various issues with formatting and typos (#424)
* Fix typos

* Simplify code

* Fix error usage
2016-11-13 14:03:12 +00:00
..
tree Fix various issues with formatting and typos (#424) 2016-11-13 14:03:12 +00:00
closest.go middleware/file: add nsec for wildcard expansion (#382) 2016-11-06 08:32:07 +00:00
closest_test.go middleware/file: fix delegations (#376) 2016-11-05 14:39:49 +00:00
cname_test.go middleware/file: Add CNAME chain support (#400) 2016-11-09 10:02:26 +00:00
delegation_test.go middleware/file: fix delegations (#376) 2016-11-05 14:39:49 +00:00
dnssec_test.go middleware/file: Add CNAME chain support (#400) 2016-11-09 10:02:26 +00:00
dnssex_test.go middleware/file: proper support for wildcard (#323) 2016-10-08 15:22:31 +01:00
ds_test.go middleware/file: Add CNAME chain support (#400) 2016-11-09 10:02:26 +00:00
ent_test.go middleware/file: fix delegations (#376) 2016-11-05 14:39:49 +00:00
example_org.go middleware/file: fix delegations (#376) 2016-11-05 14:39:49 +00:00
file.go Issue 388 (#389) 2016-11-07 11:12:20 +00:00
file_test.go middleware/file: fix delegations (#376) 2016-11-05 14:39:49 +00:00
lookup.go middleware/file: Add CNAME chain support (#400) 2016-11-09 10:02:26 +00:00
lookup_test.go Cleanup: put middleware helper functions in pkgs (#245) 2016-09-07 11:10:16 +01:00
notify.go middleware/file: notify better error reporting 2016-11-08 21:45:27 +00:00
nsec3_test.go tests: clean up output 2016-10-08 16:44:43 +01:00
README.md middleware/root: add it (#330) 2016-10-11 20:42:28 +01:00
reload_test.go middleware/auto: add (#333) 2016-10-17 18:37:56 +01:00
secondary.go Nil SOA causes panic if we compare it to incoming SOA (#291) 2016-09-24 15:51:20 +01:00
secondary_test.go tests: clean up output 2016-10-08 16:44:43 +01:00
setup.go Fix various issues with formatting and typos (#424) 2016-11-13 14:03:12 +00:00
setup_test.go middleware/root: add it (#330) 2016-10-11 20:42:28 +01:00
wildcard.go middleware/file: fix delegations (#376) 2016-11-05 14:39:49 +00:00
wildcard_test.go middleware/file: add nsec for wildcard expansion (#382) 2016-11-06 08:32:07 +00:00
xfr.go Golint2 (#280) 2016-09-23 09:14:12 +01:00
xfr_test.go Support outgoing zone transfers 2016-03-28 18:23:17 +01:00
zone.go middleware/file: also react to rename events. (#406) 2016-11-09 10:02:52 +00:00
zone_test.go middleware/file: fix delegations (#376) 2016-11-05 14:39:49 +00:00

file

file enables serving zone data from an RFC 1035-style master file.

The file middleware is used for an "old-style" DNS server. It serves from a preloaded file that exists on disk. If the zone file contains signatures (i.e. is signed, i.e. DNSSEC) correct DNSSEC answers are returned. Only NSEC is supported! If you use this setup you are responsible for resigning the zonefile.

Syntax

file DBFILE [ZONES...]
  • DBFILE the database file to read and parse. If the path is relative the path from the root directive will be prepended to it.
  • ZONES zones it should be authoritative for. If empty, the zones from the configuration block are used.

If you want to round robin A and AAAA responses look at the loadbalance middleware.

TSIG key configuration is TODO; directive format for transfer will probably be extended with TSIG key information, something like transfer out [ADDRESS...] key [NAME[:ALG]] [BASE64]

file DBFILE [ZONES... ] {
    transfer to ADDRESS...
    no_reload
}
  • transfer enables zone transfers. It may be specified multiples times. To or from signals the direction. ADDRESS must be denoted in CIDR notation (127.0.0.1/32 etc.) or just as plain addresses. The special wildcard * means: the entire internet (only valid for 'transfer to'). When an address is specified a notify message will be send whenever the zone is reloaded.
  • no_reload by default CoreDNS will reload a zone from disk whenever it detects a change to the file. This option disables that behavior.

Examples

Load the example.org zone from example.org.signed and allow transfers to the internet, but send notifies to 10.240.1.1

file example.org.signed example.org {
    transfer to *
    transfer to 10.240.1.1
}