* Test DNAME handling If the DNAME itself matches the QTYPE, and the owner name matches QNAME, the relevant DNAME RR should be included in the answer section. Other parts of RFC 6672 are not implemented yet and hence left untested. * Implement the DNAME substitution As specified in RFC 6672, a DNAME substitution is performed by replacing the suffix labels of the name being sought matching the owner name of the DNAME resource record with the string of labels in the RDATA field. The matching labels end with the root label in all cases. Only whole labels are replaced. * Handle DNAME redirection A CNAME RR is created on-the-fly for the DNAME redirection. Be aware that we do not have all the edge cases covered yet. * Test DNAME owner name matching the QNAME A DNAME RR redirects DNS names subordinate to its owner name; the owner name of a DNAME is NOT redirected itself. * Ignore names next to and below a DNAME record According to RFC 6672, resource records MUST NOT exist at any subdomain of the owner of a DNAME RR. When loading a zone, those names below the DNAME RR will be quietly ignored. * Streamline DNAME processing Instead of checking DNAMEs during lookup, we use a preloaded list of DNAME RRs to streamline the process without any runtime performance penalty: * When loading the zone, keep a record of any DNAME RRs. * If there aren't any DNAMEs in the zone, just do the lookup as usual. * Only when the zone has one or more DNAME records, we look for the matching DNAME and ignore confronting subdomain(s) in the process. * Make it easier to trace back through test errors * Make DNAME handling part of lookup routine DNAME processing is invoked only if the zone has at least one DNAME RR. * Put DNAME resolution inside the searching of a hit We can drop some of the other ideas; we don't need to track if we have DNAMEs in the zone it just follows naturally from the current lookup code. See also: #664 |
||
---|---|---|
.. | ||
tree | ||
closest.go | ||
closest_test.go | ||
cname_test.go | ||
delegation_test.go | ||
dname.go | ||
dname_test.go | ||
dnssec_test.go | ||
dnssex_test.go | ||
ds_test.go | ||
ent_test.go | ||
example_org.go | ||
file.go | ||
file_test.go | ||
glue_test.go | ||
lookup.go | ||
lookup_test.go | ||
notify.go | ||
nsec3_test.go | ||
README.md | ||
reload_test.go | ||
secondary.go | ||
secondary_test.go | ||
setup.go | ||
setup_test.go | ||
wildcard.go | ||
wildcard_test.go | ||
xfr.go | ||
xfr_test.go | ||
zone.go | ||
zone_test.go |
file
file enables serving zone data from an RFC 1035-style master file.
The file middleware is used for an "old-style" DNS server. It serves from a preloaded file that exists on disk. If the zone file contains signatures (i.e. is signed, i.e. DNSSEC) correct DNSSEC answers are returned. Only NSEC is supported! If you use this setup you are responsible for resigning the zonefile.
Syntax
file DBFILE [ZONES...]
- DBFILE the database file to read and parse. If the path is relative the path from the root directive will be prepended to it.
- ZONES zones it should be authoritative for. If empty, the zones from the configuration block are used.
If you want to round robin A and AAAA responses look at the loadbalance middleware.
TSIG key configuration is TODO; directive format for transfer will probably be extended with
TSIG key information, something like transfer out [ADDRESS...] key [NAME[:ALG]] [BASE64]
file DBFILE [ZONES... ] {
transfer to ADDRESS...
no_reload
upstream ADDRESS...
}
transfer
enables zone transfers. It may be specified multiples times.To
orfrom
signals the direction. ADDRESS must be denoted in CIDR notation (127.0.0.1/32 etc.) or just as plain addresses. The special wildcard*
means: the entire internet (only valid for 'transfer to'). When an address is specified a notify message will be send whenever the zone is reloaded.no_reload
by default CoreDNS will reload a zone from disk whenever it detects a change to the file. This option disables that behavior.upstream
defines upstream resolvers to be used resolve external names found (think CNAMEs) pointing to external names.
Examples
Load the example.org
zone from example.org.signed
and allow transfers to the internet, but send
notifies to 10.240.1.1
file example.org.signed example.org {
transfer to *
transfer to 10.240.1.1
}