Skip to content

Commit 7a70673

Browse files
authored
Version 1.12.0 (#316)
* sync documentation Signed-off-by: Viktor Rodionov <[email protected]> * fix release notes Signed-off-by: Viktor Rodionov <[email protected]> --------- Signed-off-by: Viktor Rodionov <[email protected]>
1 parent e39a7e1 commit 7a70673

File tree

15 files changed

+466
-30
lines changed

15 files changed

+466
-30
lines changed

content/blog/coredns-1.11.2.md

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
+++
2+
title = "CoreDNS-1.11.2 Release"
3+
description = "CoreDNS-1.11.2 Release Notes."
4+
tags = ["Release", "1.11.2", "Notes"]
5+
release = "1.11.2"
6+
date = "2024-01-26T00:00:00+00:00"
7+
author = "coredns"
8+
+++
9+
10+
This release contains some new features, bug fixes, and package updates.
11+
New features include:
12+
* When the _forward_ plugin receives a malformed upstream response that overflows,
13+
it will now send an empty response to the client with the truncated (TC) bit set to prompt the client
14+
to retry over TCP.
15+
* The _rewrite_ plugin can now rewrite response codes.
16+
* The _dnstap_ plugin now supports adding metadata to the dnstap `extra` field.
17+
18+
## Brought to You By
19+
20+
Amila Senadheera,
21+
Ben Kochie,
22+
Benjamin,
23+
Chris O'Haver,
24+
Grant Spence,
25+
John Belamaric,
26+
Keita Kitamura,
27+
Marius Kimmina,
28+
Michael Grosser,
29+
Ondřej Benkovský,
30+
P. Radha Krishna,
31+
Rahil Bhimjiani,
32+
Sri Harsha,
33+
Tom Thorogood,
34+
Willow (GHOST),
35+
Yong Tang,
36+
Yuheng,
37+
Zhizhen He,
38+
guangwu,
39+
journey-c,
40+
pschou
41+
42+
## Noteworthy Changes
43+
44+
* plugin/tls: respect the path specified by root plugin (https://github.com/coredns/coredns/pull/6138)
45+
* plugin/auto: warn when auto is unable to read elements of the directory tree (https://github.com/coredns/coredns/pull/6333)
46+
* plugin/etcd: the etcd client adds the DialKeepAliveTime parameter (https://github.com/coredns/coredns/pull/6351)
47+
* plugin/cache: key cache on Checking Disabled (CD) bit (https://github.com/coredns/coredns/pull/6354)
48+
* plugin/forward: Use the correct root domain name in the forward plugin's health checks (https://github.com/coredns/coredns/pull/6395)
49+
* plugin/forward: Handle UDP responses that overflow with TC bit (https://github.com/coredns/coredns/pull/6277)
50+
* plugin/rewrite: fix multi request concurrency issue in cname rewrite (https://github.com/coredns/coredns/pull/6407)
51+
* plugin/rewrite: add rcode as a rewrite option (https://github.com/coredns/coredns/pull/6204)
52+
* plugin/dnstap: add support for "extra" field in payload (https://github.com/coredns/coredns/pull/6226)
53+
* plugin/cache: fix keepttl parsing (https://github.com/coredns/coredns/pull/6250)

content/blog/coredns-1.11.3.md

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
+++
2+
title = "CoreDNS-1.11.3 Release"
3+
description = "CoreDNS-1.11.3 Release Notes."
4+
tags = ["Release", "1.11.3", "Notes"]
5+
release = "1.11.3"
6+
date = "2024-04-24T16:57:00-04:00"
7+
author = "coredns"
8+
+++
9+
10+
This release contains some new features, bug fixes, and package updates. Because of the deployment issues with the previous release, all changed features from 1.11.2 have been included in this release.
11+
New features include:
12+
* When the _forward_ plugin receives a malformed upstream response that overflows,
13+
it will now send an empty response to the client with the truncated (TC) bit set to prompt the client
14+
to retry over TCP.
15+
* The _rewrite_ plugin can now rewrite response codes.
16+
* The _dnstap_ plugin now supports adding metadata to the dnstap `extra` field.
17+
18+
## Brought to You By
19+
20+
Amila Senadheera,
21+
Ben Kochie,
22+
Benjamin,
23+
Chris O'Haver,
24+
Grant Spence,
25+
John Belamaric,
26+
Keita Kitamura,
27+
Marius Kimmina,
28+
Michael Grosser,
29+
Ondřej Benkovský,
30+
P. Radha Krishna,
31+
Rahil Bhimjiani,
32+
Sri Harsha,
33+
Tom Thorogood,
34+
Willow (GHOST),
35+
Yong Tang,
36+
Yuheng,
37+
Zhizhen He,
38+
guangwu,
39+
journey-c,
40+
pschou
41+
Ted Ford
42+
43+
## Noteworthy Changes
44+
45+
* plugin/tls: respect the path specified by root plugin (https://github.com/coredns/coredns/pull/6138)
46+
* plugin/auto: warn when auto is unable to read elements of the directory tree (https://github.com/coredns/coredns/pull/6333)
47+
* plugin/etcd: the etcd client adds the DialKeepAliveTime parameter (https://github.com/coredns/coredns/pull/6351)
48+
* plugin/cache: key cache on Checking Disabled (CD) bit (https://github.com/coredns/coredns/pull/6354)
49+
* plugin/forward: Use the correct root domain name in the forward plugin's health checks (https://github.com/coredns/coredns/pull/6395)
50+
* plugin/forward: Handle UDP responses that overflow with TC bit (https://github.com/coredns/coredns/pull/6277)
51+
* plugin/rewrite: fix multi request concurrency issue in cname rewrite (https://github.com/coredns/coredns/pull/6407)
52+
* plugin/rewrite: add rcode as a rewrite option (https://github.com/coredns/coredns/pull/6204)
53+
* plugin/dnstap: add support for "extra" field in payload (https://github.com/coredns/coredns/pull/6226)
54+
* plugin/cache: fix keepttl parsing (https://github.com/coredns/coredns/pull/6250)
55+
* Return RcodeServerFailure when DNS64 has no next plugin (https://github.com/coredns/coredns/pull/6590)
56+
* Change the log flags to be a variable that can be set (https://github.com/coredns/coredns/pull/6546)
57+
* Bump go version to 1.21 (https://github.com/coredns/coredns/pull/6533)
58+
* replace the mutex locks in logging with atomic bool for the "on" flag (https://github.com/coredns/coredns/pull/6525)
59+
* Enable Prometheus native histograms (https://github.com/coredns/coredns/pull/6524)

content/blog/coredns-1.11.4.md

Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
+++
2+
title = "CoreDNS-1.11.4 Release"
3+
description = "CoreDNS-1.11.4 Release Notes."
4+
tags = ["Release", "1.11.4", "Notes"]
5+
release = "1.11.4"
6+
date = "2024-11-13T00:00:00+00:00"
7+
author = "coredns"
8+
+++
9+
10+
This release adds some new features and fixes some bugs. New features of note:
11+
* forward plugin: new option `next`, to try alternate upstreams when receiving specified response codes upstreams on (functions like the external plugin _alternate_)
12+
* dnssec plugin: new option to load keys from AWS Secrets Manager
13+
* rewrite plugin: new option to revert EDNS0 option rewrites in responses
14+
15+
## Brought to You By
16+
17+
AdamKorcz,
18+
Anifalak,
19+
Ben Kochie,
20+
Chris O'Haver,
21+
Frederic Hemery,
22+
Grant Spence,
23+
Harshita Sao,
24+
Jason Joo,
25+
Jasper Bernhardt,
26+
Johnny Bergström,
27+
Keith Coleman,
28+
Kevin Lyda,
29+
Lan,
30+
Lin-1997,
31+
Manuel Rüger,
32+
Nathan Currier,
33+
Nicolai Søborg,
34+
Nikita Usatov,
35+
Paco Xu,
36+
Reinhard Nägele,
37+
Robbie Ostrow,
38+
TAKAHASHI Shuuji,
39+
Till Riedel,
40+
Tobias Klauser,
41+
YASH JAIN,
42+
cedar-gao,
43+
chenylh,
44+
wmkuipers,
45+
xinbenlv,
46+
zhangguanzhang
47+
48+
## Noteworthy Changes
49+
50+
* core: set cache-control max-age as integer, not float (https://github.com/coredns/coredns/pull/6764)
51+
* plugin/metadata: evaluate metadata in plugin order (https://github.com/coredns/coredns/pull/6729)
52+
* plugin/dnssec: dnssec load keys from AWS Secrets Manager (https://github.com/coredns/coredns/pull/6618)
53+
* plugin/rewrite: Add "revert" parameter for EDNS0 options (https://github.com/coredns/coredns/pull/6893)
54+
* container: Restored backwards compatibility of Current Workdir (https://github.com/coredns/coredns/pull/6731)
55+
* plugin/auto: call OnShutdown() for each zone at its own OnShutdown() (https://github.com/coredns/coredns/pull/6705)
56+
* plugin/dnstap: log queue and buffer memory size configuration (https://github.com/coredns/coredns/pull/6591)
57+
* plugin/bind: add zone for link-local IPv6 instead of skipping (https://github.com/coredns/coredns/pull/6547)
58+
* plugin/kubernetes: only create PTR records for endpoints with hostname defined (https://github.com/coredns/coredns/pull/6898)
59+
* plugin/rewrite: execute the reversion in reversed order (https://github.com/coredns/coredns/pull/6872)
60+
* plugin/etcd: fix etcd connection leakage during reload (https://github.com/coredns/coredns/pull/6646)
61+
* plugin/kubernetes: Add useragent (https://github.com/coredns/coredns/pull/6484)
62+
* plugin/hosts: add hostsfile as label for coredns_hosts_entries (https://github.com/coredns/coredns/pull/6801)
63+
* plugin/file: Fix zone parser error handling (https://github.com/coredns/coredns/pull/6680)
64+
* plugin/forward: Add alternate option to forward plugin (https://github.com/coredns/coredns/pull/6681)
65+
* plugin/file: return error when parsing the file fails (https://github.com/coredns/coredns/pull/6699)
66+
* build: Generate zplugin.go correctly with third-party plugins (https://github.com/coredns/coredns/pull/6692)

content/blog/coredns-1.12.0.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
+++
2+
title = "CoreDNS-1.12.0 Release"
3+
description = "CoreDNS-1.12.0 Release Notes."
4+
tags = ["Release", "1.12.0", "Notes"]
5+
release = "1.12.0"
6+
date = "2024-11-21T00:00:00+00:00"
7+
author = "coredns"
8+
+++
9+
10+
This release adds some new features. Of note:
11+
* New multisocket plugin - allows CoreDNS to listen on multiple sockets
12+
* New automaxprocs plugin - automatically sets GOMAXPROCS to the number of CPUs
13+
14+
## Brought to You By
15+
16+
Ben Kochie,
17+
Chris O'Haver,
18+
Emmanuel Ferdman,
19+
Viktor
20+
21+
22+
## Noteworthy Changes
23+
24+
* plugin/multisocket (https://github.com/coredns/coredns/pull/6882)
25+
* plugin/automaxprocs (https://github.com/coredns/coredns/pull/6948)

content/plugins/autopath.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description = "*autopath* allows for server-side search path completion."
44
weight = 4
55
tags = ["plugin", "autopath"]
66
categories = ["plugin"]
7-
date = "2020-10-16T12:42:25.87725810"
7+
date = "2024-11-22T08:09:54.87754811"
88
+++
99

1010
## Description
@@ -60,7 +60,7 @@ path) in the following case. To properly build the search path of a client *auto
6060
the namespace of the a Pod making a DNS request. To do this, it relies on the *kubernetes* plugin's
6161
Pod cache to resolve the client's IP address to a Pod. The Pod cache is maintained by an API watch
6262
on Pods. When Pod IP assignments change, the Kubernetes API notifies CoreDNS via the API watch.
63-
However, that notification is not instantaneous. In the case that a Pod is deleted, and it's IP is
63+
However, that notification is not instantaneous. In the case that a Pod is deleted, and its IP is
6464
immediately provisioned to a Pod in another namespace, and that new Pod make a DNS lookup *before*
6565
the API watch can notify CoreDNS of the change, *autopath* will resolve the IP to the previous Pod's
6666
namespace.

content/plugins/bind.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description = "*bind* overrides the host to which the server should bind."
44
weight = 6
55
tags = ["plugin", "bind"]
66
categories = ["plugin"]
7-
date = "2023-08-15T20:06:20.8772088"
7+
date = "2024-11-22T08:09:54.87754811"
88
+++
99

1010
## Description
@@ -16,7 +16,7 @@ If several addresses are provided, a listener will be open on each of the IP pro
1616

1717
Each address has to be an IP or name of one of the interfaces of the host. Bind by interface name, binds to the IPs on that interface at the time of startup or reload (reload will happen with a SIGHUP or if the config file changes).
1818

19-
If the given argument is an interface name, and that interface has several IP addresses, CoreDNS will listen on all of the interface IP addresses (including IPv4 and IPv6), except for IPv6 link-local addresses on that interface.
19+
If the given argument is an interface name, and that interface has several IP addresses, CoreDNS will listen on all of the interface IP addresses (including IPv4 and IPv6).
2020

2121
## Syntax
2222

content/plugins/dnssec.md

Lines changed: 34 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description = "*dnssec* enables on-the-fly DNSSEC signing of served data."
44
weight = 14
55
tags = ["plugin", "dnssec"]
66
categories = ["plugin"]
7-
date = "2021-04-05T13:49:45.8774584"
7+
date = "2024-11-22T08:09:54.87754811"
88
+++
99

1010
## Description
@@ -19,7 +19,7 @@ This plugin can only be used once per Server Block.
1919

2020
~~~
2121
dnssec [ZONES... ] {
22-
key file KEY...
22+
key file|aws_secretsmanager KEY...
2323
cache_capacity CAPACITY
2424
}
2525
~~~
@@ -52,6 +52,26 @@ used.
5252
* generated public key `Kexample.org+013+45330.key`
5353
* generated private key `Kexample.org+013+45330.private`
5454

55+
* `key aws_secretsmanager` indicates that **KEY** secret(s) should be read from AWS Secrets Manager. Secret
56+
names or ARNs may be used. After generating the keys as described in the `key file` section, you can
57+
store them in AWS Secrets Manager using the following AWS CLI v2 command:
58+
59+
```sh
60+
aws secretsmanager create-secret --name "Kexample.org.+013+45330" \
61+
--description "DNSSEC keys for example.org" \
62+
--secret-string "$(jq -n --arg key "$(cat Kexample.org.+013+45330.key)" \
63+
--arg private "$(cat Kexample.org.+013+45330.private)" \
64+
'{key: $key, private: $private}')"
65+
```
66+
67+
This command reads the contents of the `.key` and `.private` files, constructs a JSON object, and stores it
68+
as a new secret in AWS Secrets Manager with the specified name and description. CoreDNS will then fetch
69+
the key data from AWS Secrets Manager when using the `key aws_secretsmanager` directive.
70+
71+
[AWS SDK for Go V2](https://aws.github.io/aws-sdk-go-v2/docs/configuring-sdk/#specifying-credentials) is used
72+
for authentication with AWS Secrets Manager. Make sure the provided AWS credentials have the necessary
73+
permissions (e.g., `secretsmanager:GetSecretValue`) to access the specified secrets in AWS Secrets Manager.
74+
5575
* `cache_capacity` indicates the capacity of the cache. The dnssec plugin uses a cache to store
5676
RRSIGs. The default for **CAPACITY** is 10000.
5777

@@ -78,6 +98,18 @@ example.org {
7898
}
7999
~~~
80100

101+
Sign responses for `example.org` with the key stored in AWS Secrets Manager under the secret name
102+
"Kexample.org.+013+45330".
103+
104+
~~~
105+
example.org {
106+
dnssec {
107+
key aws_secretsmanager Kexample.org.+013+45330
108+
}
109+
whoami
110+
}
111+
~~~
112+
81113
Sign responses for a kubernetes zone with the key "Kcluster.local+013+45129.key".
82114

83115
~~~

content/plugins/dnstap.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description = "*dnstap* enables logging to dnstap."
44
weight = 15
55
tags = ["plugin", "dnstap"]
66
categories = ["plugin"]
7-
date = "2023-08-15T20:06:20.8772088"
7+
date = "2024-11-22T08:09:54.87754811"
88
+++
99

1010
## Description
@@ -18,7 +18,7 @@ Every message is sent to the socket as soon as it comes in, the *dnstap* plugin
1818
## Syntax
1919

2020
~~~ txt
21-
dnstap SOCKET [full] {
21+
dnstap SOCKET [full] [writebuffer] [queue] {
2222
[identity IDENTITY]
2323
[version VERSION]
2424
[extra EXTRA]
@@ -41,6 +41,12 @@ Log information about client requests and responses to */tmp/dnstap.sock*.
4141
dnstap /tmp/dnstap.sock
4242
~~~
4343

44+
Log information about client requests and responses and tcp write buffer is 1024*Mb and queue is 2048*10000.
45+
46+
~~~ txt
47+
dnstap /tmp/dnstap.sock full 1024 2048
48+
~~~
49+
4450
Log information including the wire-format DNS message about client requests and responses to */tmp/dnstap.sock*.
4551

4652
~~~ txt
@@ -98,7 +104,7 @@ dnstap tcp://example.com:6000
98104
## Command Line Tool
99105

100106
Dnstap has a command line tool that can be used to inspect the logging. The tool can be found
101-
at Github: <https://github.com/dnstap/golang-dnstap>. It's written in Go.
107+
at GitHub: <https://github.com/dnstap/golang-dnstap>. It's written in Go.
102108

103109
The following command listens on the given socket and decodes messages to stdout.
104110

content/plugins/forward.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description = "*forward* facilitates proxying DNS messages to upstream resolvers
44
weight = 20
55
tags = ["plugin", "forward"]
66
categories = ["plugin"]
7-
date = "2023-08-15T20:06:20.8772088"
7+
date = "2024-11-22T08:09:54.87754811"
88
+++
99

1010
## Description
@@ -53,6 +53,7 @@ forward FROM TO... {
5353
policy random|round_robin|sequential
5454
health_check DURATION [no_rec] [domain FQDN]
5555
max_concurrent MAX
56+
next RCODE_1 [RCODE_2] [RCODE_3...]
5657
}
5758
~~~
5859

@@ -98,6 +99,7 @@ forward FROM TO... {
9899
response does not count as a health failure. When choosing a value for **MAX**, pick a number
99100
at least greater than the expected *upstream query rate* * *latency* of the upstream servers.
100101
As an upper bound for **MAX**, consider that each concurrent query will use about 2kb of memory.
102+
* `next` If the `RCODE` (i.e. `NXDOMAIN`) is returned by the remote then execute the next plugin. If no next plugin is defined, or the next plugin is not a `forward` plugin, this setting is ignored
101103

102104
Also note the TLS config is "global" for the whole forwarding proxy if you need a different
103105
`tls_servername` for different upstreams you're out of luck.
@@ -271,6 +273,21 @@ Or when you have multiple DoT upstreams with different `tls_servername`s, you ca
271273
}
272274
~~~
273275

276+
The following would try 1.2.3.4 first. If the response is `NXDOMAIN`, try 5.6.7.8. If the response from 5.6.7.8 is `NXDOMAIN`, try 9.0.1.2.
277+
278+
~~~ corefile
279+
. {
280+
forward . 1.2.3.4 {
281+
next NXDOMAIN
282+
}
283+
forward . 5.6.7.8 {
284+
next NXDOMAIN
285+
}
286+
forward . 9.0.1.2 {
287+
}
288+
}
289+
~~~
290+
274291
## See Also
275292

276293
[RFC 7858](https://tools.ietf.org/html/rfc7858) for DNS over TLS.

0 commit comments

Comments
 (0)