coredns/middleware/file
Miek Gieben c4ab98c6e3 Add middleware.NextOrFailure (#462)
This checks if the next middleware to be called is nil, and if so returns
ServerFailure and an error. This makes the next calling more robust and
saves some lines of code.

Also prefix the error with the name of the middleware to aid in
debugging.
2016-12-20 18:58:05 +00:00
..
tree Fix various issues with formatting and typos (#424) 2016-11-13 14:03:12 +00:00
closest.go middleware/file: add nsec for wildcard expansion (#382) 2016-11-06 08:32:07 +00:00
closest_test.go middleware/file: fix delegations (#376) 2016-11-05 14:39:49 +00:00
cname_test.go Compile fixes and make it work 2016-11-10 12:58:40 +00:00
delegation_test.go middleware/file: include nsset in replies 2016-12-09 11:59:14 +00:00
dnssec_test.go middleware/file: include nsset in replies 2016-12-09 11:59:14 +00:00
dnssex_test.go middleware/file: proper support for wildcard (#323) 2016-10-08 15:22:31 +01:00
ds_test.go middleware/file: Add CNAME chain support (#400) 2016-11-09 10:02:26 +00:00
ent_test.go middleware/file: fix delegations (#376) 2016-11-05 14:39:49 +00:00
example_org.go middleware/file: fix delegations (#376) 2016-11-05 14:39:49 +00:00
file.go Add middleware.NextOrFailure (#462) 2016-12-20 18:58:05 +00:00
file_test.go middleware/file: fix delegations (#376) 2016-11-05 14:39:49 +00:00
glue_test.go middleware/file: include sigs in additional (#456) 2016-12-14 12:50:00 +00:00
lookup.go middleware/file: include sigs in additional (#456) 2016-12-14 12:50:00 +00:00
lookup_test.go middleware/file: include nsset in replies 2016-12-09 11:59:14 +00:00
notify.go middleware/file: better notify error reporting 2016-11-24 15:04:27 +00:00
nsec3_test.go tests: clean up output 2016-10-08 16:44:43 +01:00
README.md middleware/{file, auto}: resolve external CNAMEs 2016-11-09 21:26:49 +00:00
reload_test.go Implement external lookups for CNAMEs 2016-11-10 07:48:47 +00:00
secondary.go Nil SOA causes panic if we compare it to incoming SOA (#291) 2016-09-24 15:51:20 +01:00
secondary_test.go tests: clean up output 2016-10-08 16:44:43 +01:00
setup.go Use upstream parsing from master branch (#438) 2016-11-24 22:31:42 +01:00
setup_test.go middleware/root: add it (#330) 2016-10-11 20:42:28 +01:00
wildcard.go middleware/file: fix delegations (#376) 2016-11-05 14:39:49 +00:00
wildcard_test.go middleware/file: include nsset in replies 2016-12-09 11:59:14 +00:00
xfr.go Add middleware.NextOrFailure (#462) 2016-12-20 18:58:05 +00:00
xfr_test.go Support outgoing zone transfers 2016-03-28 18:23:17 +01:00
zone.go middleware/{file, auto}: resolve external CNAMEs 2016-11-09 21:26:49 +00:00
zone_test.go middleware/file: fix delegations (#376) 2016-11-05 14:39:49 +00:00

file

file enables serving zone data from an RFC 1035-style master file.

The file middleware is used for an "old-style" DNS server. It serves from a preloaded file that exists on disk. If the zone file contains signatures (i.e. is signed, i.e. DNSSEC) correct DNSSEC answers are returned. Only NSEC is supported! If you use this setup you are responsible for resigning the zonefile.

Syntax

file DBFILE [ZONES...]
  • DBFILE the database file to read and parse. If the path is relative the path from the root directive will be prepended to it.
  • ZONES zones it should be authoritative for. If empty, the zones from the configuration block are used.

If you want to round robin A and AAAA responses look at the loadbalance middleware.

TSIG key configuration is TODO; directive format for transfer will probably be extended with TSIG key information, something like transfer out [ADDRESS...] key [NAME[:ALG]] [BASE64]

file DBFILE [ZONES... ] {
    transfer to ADDRESS...
    no_reload
    upstream ADDRESS...
}
  • transfer enables zone transfers. It may be specified multiples times. To or from signals the direction. ADDRESS must be denoted in CIDR notation (127.0.0.1/32 etc.) or just as plain addresses. The special wildcard * means: the entire internet (only valid for 'transfer to'). When an address is specified a notify message will be send whenever the zone is reloaded.
  • no_reload by default CoreDNS will reload a zone from disk whenever it detects a change to the file. This option disables that behavior.
  • upstream defines upstream resolvers to be used resolve external names found (think CNAMEs) pointing to external names.

Examples

Load the example.org zone from example.org.signed and allow transfers to the internet, but send notifies to 10.240.1.1

file example.org.signed example.org {
    transfer to *
    transfer to 10.240.1.1
}