* core: allow all CIDR ranges in zone specifications Allow (e.g.) a v4 reverse on a /17. If a zone is specified in such a way a FilterFunc is set in the config. This filter is checked against incoming queries. For all other queries this adds a 'x != nil' check which will not impact performace too much. Benchmark function is added as well to check for this as wel. Add multiple tests in tests/server_reverse_test.go. Benchmark shows in the non-reverse case this hardly impact the speed: ~~~ classless: pkg: github.com/coredns/coredns/core/dnsserver BenchmarkCoreServeDNS-4 1000000 1431 ns/op 16 B/op 1 allocs/op pkg: github.com/coredns/coredns/core/dnsserver BenchmarkCoreServeDNS-4 1000000 1429 ns/op 16 B/op 1 allocs/op master: pkg: github.com/coredns/coredns/core/dnsserver BenchmarkCoreServeDNS-4 1000000 1412 ns/op 16 B/op 1 allocs/op pkg: github.com/coredns/coredns/core/dnsserver BenchmarkCoreServeDNS-4 1000000 1429 ns/op 16 B/op 1 allocs/op ~~~ * README.md updates
65 lines
1.8 KiB
Go
65 lines
1.8 KiB
Go
package dnsserver
|
|
|
|
import (
|
|
"crypto/tls"
|
|
|
|
"github.com/coredns/coredns/plugin"
|
|
|
|
"github.com/mholt/caddy"
|
|
)
|
|
|
|
// Config configuration for a single server.
|
|
type Config struct {
|
|
// The zone of the site.
|
|
Zone string
|
|
|
|
// The hostname to bind listener to, defaults to the wildcard address
|
|
ListenHost string
|
|
|
|
// The port to listen on.
|
|
Port string
|
|
|
|
// Root points to a base directory we we find user defined "things".
|
|
// First consumer is the file plugin to looks for zone files in this place.
|
|
Root string
|
|
|
|
// Debug controls the panic/recover mechanism that is enabled by default.
|
|
Debug bool
|
|
|
|
// The transport we implement, normally just "dns" over TCP/UDP, but could be
|
|
// DNS-over-TLS or DNS-over-gRPC.
|
|
Transport string
|
|
|
|
// If this function is not nil it will be used to further filter access
|
|
// to this handler. The primary use is to limit access to a reverse zone
|
|
// on a non-octet boundary, i.e. /17
|
|
FilterFunc func(string) bool
|
|
|
|
// TLSConfig when listening for encrypted connections (gRPC, DNS-over-TLS).
|
|
TLSConfig *tls.Config
|
|
|
|
// Plugin stack.
|
|
Plugin []plugin.Plugin
|
|
|
|
// Compiled plugin stack.
|
|
pluginChain plugin.Handler
|
|
|
|
// Plugin interested in announcing that they exist, so other plugin can call methods
|
|
// on them should register themselves here. The name should be the name as return by the
|
|
// Handler's Name method.
|
|
registry map[string]plugin.Handler
|
|
}
|
|
|
|
// GetConfig gets the Config that corresponds to c.
|
|
// If none exist nil is returned.
|
|
func GetConfig(c *caddy.Controller) *Config {
|
|
ctx := c.Context().(*dnsContext)
|
|
if cfg, ok := ctx.keysToConfigs[c.Key]; ok {
|
|
return cfg
|
|
}
|
|
// we should only get here during tests because directive
|
|
// actions typically skip the server blocks where we make
|
|
// the configs.
|
|
ctx.saveConfig(c.Key, &Config{})
|
|
return GetConfig(c)
|
|
}
|