Update Godeps for github.com/skynetservices/skydns and github.com/miekg/dns
This commit is contained in:
2
vendor/github.com/skynetservices/skydns/server/config.go
generated
vendored
2
vendor/github.com/skynetservices/skydns/server/config.go
generated
vendored
@@ -39,7 +39,7 @@ type Config struct {
|
||||
RoundRobin bool `json:"round_robin,omitempty"`
|
||||
// Round robin selection of nameservers from among those listed, rather than have all forwarded requests try the first listed server first every time.
|
||||
NSRotate bool `json:"ns_rotate,omitempty"`
|
||||
// List of ip:port, seperated by commas of recursive nameservers to forward queries to.
|
||||
// List of ip:port, separated by commas of recursive nameservers to forward queries to.
|
||||
Nameservers []string `json:"nameservers,omitempty"`
|
||||
// Never provide a recursive service.
|
||||
NoRec bool `json:"no_rec,omitempty"`
|
||||
|
||||
2
vendor/github.com/skynetservices/skydns/server/forwarding.go
generated
vendored
2
vendor/github.com/skynetservices/skydns/server/forwarding.go
generated
vendored
@@ -102,7 +102,7 @@ Redo:
|
||||
r, err := exchangeWithRetry(s.dnsUDPclient, m, s.config.Nameservers[nsid])
|
||||
if err == nil {
|
||||
if r.Rcode != dns.RcodeSuccess {
|
||||
return nil, fmt.Errorf("rcode is not equal to success")
|
||||
return nil, fmt.Errorf("rcode %d is not equal to success", r.Rcode)
|
||||
}
|
||||
// Reset TTLs to rcache TTL to make some of the other code
|
||||
// and the tests not care about TTLs
|
||||
|
||||
7
vendor/github.com/skynetservices/skydns/server/server.go
generated
vendored
7
vendor/github.com/skynetservices/skydns/server/server.go
generated
vendored
@@ -200,7 +200,7 @@ func (s *server) ServeDNS(w dns.ResponseWriter, req *dns.Msg) {
|
||||
}
|
||||
|
||||
for zone, ns := range *s.config.stub {
|
||||
if strings.HasSuffix(name, zone) {
|
||||
if strings.HasSuffix(name, "." + zone) || name == zone {
|
||||
metrics.ReportRequestCount(req, metrics.Stub)
|
||||
|
||||
resp := s.ServeDNSStubForward(w, req, ns)
|
||||
@@ -232,7 +232,7 @@ func (s *server) ServeDNS(w dns.ResponseWriter, req *dns.Msg) {
|
||||
return
|
||||
}
|
||||
|
||||
if q.Qclass != dns.ClassCHAOS && !strings.HasSuffix(name, s.config.Domain) {
|
||||
if q.Qclass != dns.ClassCHAOS && !strings.HasSuffix(name, "." +s.config.Domain) && name != s.config.Domain {
|
||||
metrics.ReportRequestCount(req, metrics.Rec)
|
||||
|
||||
resp := s.ServeDNSForward(w, req)
|
||||
@@ -431,6 +431,7 @@ func (s *server) AddressRecords(q dns.Question, name string, previousRecords []d
|
||||
case ip == nil:
|
||||
// Try to resolve as CNAME if it's not an IP, but only if we don't create loops.
|
||||
if q.Name == dns.Fqdn(serv.Host) {
|
||||
logf("CNAME loop detected: %q -> %q", q.Name, q.Name)
|
||||
// x CNAME x is a direct loop, don't add those
|
||||
continue
|
||||
}
|
||||
@@ -464,7 +465,7 @@ func (s *server) AddressRecords(q dns.Question, name string, previousRecords []d
|
||||
}
|
||||
m1, e1 := s.Lookup(target, q.Qtype, bufsize, dnssec)
|
||||
if e1 != nil {
|
||||
logf("incomplete CNAME chain: %s", e1)
|
||||
logf("incomplete CNAME chain from %q: %s", target, e1)
|
||||
continue
|
||||
}
|
||||
// Len(m1.Answer) > 0 here is well?
|
||||
|
||||
Reference in New Issue
Block a user