mirror of
				https://github.com/coredns/coredns.git
				synced 2025-10-27 00:04:15 -04:00 
			
		
		
		
	* readme: add text on backward incompat changes Document the process of releasing backwards incompatible changes. Signed-off-by: Miek Gieben <miek@miek.nl> * slightly better Signed-off-by: Miek Gieben <miek@miek.nl> * Add an example Signed-off-by: Miek Gieben <miek@miek.nl> * Be more explicit in naming the segments increased Signed-off-by: Miek Gieben <miek@miek.nl>
		
			
				
	
	
		
			223 lines
		
	
	
		
			7.8 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			223 lines
		
	
	
		
			7.8 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
| [](https://coredns.io)
 | |
| 
 | |
| [](https://godoc.org/github.com/coredns/coredns)
 | |
| [](https://travis-ci.org/coredns/coredns)
 | |
| [](https://codecov.io/github/coredns/coredns?branch=master)
 | |
| [](https://hub.docker.com/r/coredns/coredns)
 | |
| [](https://goreportcard.com/report/coredns/coredns)
 | |
| [](https://bestpractices.coreinfrastructure.org/projects/1250)
 | |
| 
 | |
| CoreDNS (written in Go) chains [plugins](https://coredns.io/plugins). Each plugin performs a DNS
 | |
| function.
 | |
| 
 | |
| CoreDNS is a [Cloud Native Computing Foundation](https://cncf.io) graduated project.
 | |
| 
 | |
| CoreDNS is a fast and flexible DNS server. The keyword here is *flexible*: with CoreDNS you
 | |
| are able to do what you want with your DNS data by utilizing plugins. If some functionality is not
 | |
| provided out of the box you can add it by [writing a plugin](https://coredns.io/explugins).
 | |
| 
 | |
| CoreDNS can listen for DNS request coming in over UDP/TCP (go'old DNS), TLS ([RFC
 | |
| 7858](https://tools.ietf.org/html/rfc7858)) and [gRPC](https://grpc.io) (not a standard).
 | |
| 
 | |
| Currently CoreDNS is able to:
 | |
| 
 | |
| * Serve zone data from a file; both DNSSEC (NSEC only) and DNS are supported (*file* and *auto*).
 | |
| * Retrieve zone data from primaries, i.e., act as a secondary server (AXFR only) (*secondary*).
 | |
| * Sign zone data on-the-fly (*dnssec*).
 | |
| * Load balancing of responses (*loadbalance*).
 | |
| * Allow for zone transfers, i.e., act as a primary server (*file*).
 | |
| * Automatically load zone files from disk (*auto*).
 | |
| * Caching (*cache*).
 | |
| * Use etcd as a backend (replace [SkyDNS](https://github.com/skynetservices/skydns)) (*etcd*).
 | |
| * Use k8s (kubernetes) as a backend (*kubernetes*).
 | |
| * Serve as a proxy to forward queries to some other (recursive) nameserver (*forward*).
 | |
| * Provide metrics (by using Prometheus) (*metrics*).
 | |
| * Provide query (*log*) and error (*errors*) logging.
 | |
| * Support the CH class: `version.bind` and friends (*chaos*).
 | |
| * Support the RFC 5001 DNS name server identifier (NSID) option (*nsid*).
 | |
| * Profiling support (*pprof*).
 | |
| * Rewrite queries (qtype, qclass and qname) (*rewrite* and *template*).
 | |
| 
 | |
| And more. Each of the plugins is documented. See [coredns.io/plugins](https://coredns.io/plugins)
 | |
| for all in-tree plugins, and [coredns.io/explugins](https://coredns.io/explugins) for all
 | |
| out-of-tree plugins.
 | |
| 
 | |
| ## Compilation from Source
 | |
| 
 | |
| Check out the project:
 | |
| 
 | |
| ~~~
 | |
| % git clone https://github.com/coredns/coredns
 | |
| ~~~
 | |
| 
 | |
| We vendor most (not all!) packages. This is mostly because vendoring isn't a perfect solution (in
 | |
| Go). We don't vendor `mholt/caddy` and `miekg/dns` for instance. Using `make` will pull down these
 | |
| dependencies and checks out the correct version as well.
 | |
| 
 | |
| Next just run `make`:
 | |
| 
 | |
| ~~~
 | |
| % make
 | |
| ~~~
 | |
| 
 | |
| This should yield a `coredns` binary.
 | |
| 
 | |
| ## Compilation with Docker
 | |
| 
 | |
| CoreDNS requires Go to compile. However, if you already have docker installed and prefer not to setup
 | |
| a Go environment, you could build CoreDNS easily:
 | |
| 
 | |
| ```
 | |
| $ docker run --rm -i -t -v $PWD:/go/src/github.com/coredns/coredns \
 | |
|       -w /go/src/github.com/coredns/coredns golang:1.11 make
 | |
| ```
 | |
| 
 | |
| The above command alone will have `coredns` binary generated.
 | |
| 
 | |
| ## Examples
 | |
| 
 | |
| When starting CoreDNS without any configuration, it loads the
 | |
| [*whoami*](https://coredns.io/plugins/whoami) plugin and starts listening on port 53 (override with
 | |
| `-dns.port`), it should show the following:
 | |
| 
 | |
| ~~~ txt
 | |
| .:53
 | |
| 2016/09/18 09:20:50 [INFO] CoreDNS-001
 | |
| CoreDNS-001
 | |
| ~~~
 | |
| 
 | |
| Any query send to port 53 should return some information; your sending address, port and protocol
 | |
| used.
 | |
| 
 | |
| If you have a Corefile without a port number specified it will, by default, use port 53, but you
 | |
| can override the port with the `-dns.port` flag:
 | |
| 
 | |
| `./coredns -dns.port 1053`, runs the server on port 1053.
 | |
| 
 | |
| Start a simple proxy, you'll need to be root to start listening on port 53.
 | |
| 
 | |
| `Corefile` contains:
 | |
| 
 | |
| ~~~ corefile
 | |
| .:53 {
 | |
|     forward . 8.8.8.8:53
 | |
|     log
 | |
| }
 | |
| ~~~
 | |
| 
 | |
| Just start CoreDNS: `./coredns`. Then just query on that port (53). The query should be forwarded to
 | |
| 8.8.8.8 and the response will be returned. Each query should also show up in the log which is
 | |
| printed on standard output.
 | |
| 
 | |
| Serve the (NSEC) DNSSEC-signed `example.org` on port 1053, with errors and logging sent to standard
 | |
| output. Allow zone transfers to everybody, but specifically mention 1 IP address so that CoreDNS can
 | |
| send notifies to it.
 | |
| 
 | |
| ~~~ txt
 | |
| example.org:1053 {
 | |
|     file /var/lib/coredns/example.org.signed {
 | |
|         transfer to *
 | |
|         transfer to 2001:500:8f::53
 | |
|     }
 | |
|     errors
 | |
|     log
 | |
| }
 | |
| ~~~
 | |
| 
 | |
| Serve `example.org` on port 1053, but forward everything that does *not* match `example.org` to a recursive
 | |
| nameserver *and* rewrite ANY queries to HINFO.
 | |
| 
 | |
| ~~~ txt
 | |
| .:1053 {
 | |
|     rewrite ANY HINFO
 | |
|     forward . 8.8.8.8:53
 | |
| 
 | |
|     file /var/lib/coredns/example.org.signed example.org {
 | |
|         transfer to *
 | |
|         transfer to 2001:500:8f::53
 | |
|     }
 | |
|     errors
 | |
|     log
 | |
| }
 | |
| ~~~
 | |
| 
 | |
| IP addresses are also allowed. They are automatically converted to reverse zones:
 | |
| 
 | |
| ~~~ corefile
 | |
| 10.0.0.0/24 {
 | |
|     whoami
 | |
| }
 | |
| ~~~
 | |
| Means you are authoritative for `0.0.10.in-addr.arpa.`.
 | |
| 
 | |
| This also works for IPv6 addresses. If for some reason you want to serve a zone named `10.0.0.0/24`
 | |
| add the closing dot: `10.0.0.0/24.` as this also stops the conversion.
 | |
| 
 | |
| This even works for CIDR (See RFC 1518 and 1519) addressing, i.e. `10.0.0.0/25`, CoreDNS will then
 | |
| check if the `in-addr` request falls in the correct range.
 | |
| 
 | |
| Listening on TLS and for gRPC? Use:
 | |
| 
 | |
| ~~~ corefile
 | |
| tls://example.org grpc://example.org {
 | |
|     whoami
 | |
| }
 | |
| ~~~
 | |
| 
 | |
| Specifying ports works in the same way:
 | |
| 
 | |
| ~~~ txt
 | |
| grpc://example.org:1443 {
 | |
|     # ...
 | |
| }
 | |
| ~~~
 | |
| 
 | |
| When no transport protocol is specified the default `dns://` is assumed.
 | |
| 
 | |
| ## Community
 | |
| 
 | |
| We're most active on Github (and Slack):
 | |
| 
 | |
| - Github: <https://github.com/coredns/coredns>
 | |
| - Slack: #coredns on <https://slack.cncf.io>
 | |
| 
 | |
| More resources can be found:
 | |
| 
 | |
| - Website: <https://coredns.io>
 | |
| - Blog: <https://blog.coredns.io>
 | |
| - Twitter: [@corednsio](https://twitter.com/corednsio)
 | |
| - Mailing list/group: <coredns-discuss@googlegroups.com> (not very active)
 | |
| 
 | |
| ## Deployment
 | |
| 
 | |
| Examples for deployment via systemd and other use cases can be found in the [deployment
 | |
| repository](https://github.com/coredns/deployment).
 | |
| 
 | |
| ## Deprecation Policy
 | |
| 
 | |
| When there is a backwards incompatible change in CoreDNS the following process is followed:
 | |
| 
 | |
| *  Release x.y.z: Announce that in the next release we will make backward incompatible changes.
 | |
| *  Release x.y+1.0: Increase the minor version and set the patch version to 0. Make the changes,
 | |
|    but allow the old configuration to be parsed. I.e. CoreDNS will start from an unchanged
 | |
|    Corefile.
 | |
| *  Release x.y+1.1: Increase the patch version to 1. Remove the lenient parsing, so CoreDNS will
 | |
|    not start if those features are still used.
 | |
| 
 | |
| E.g. 1.3.1 announce a change. 1.4.0 a new release with the change but backward compatible config.
 | |
| And finally 1.4.1 that removes the config workarounds.
 | |
| 
 | |
| ## Security
 | |
| 
 | |
| ### Security Audit
 | |
| 
 | |
| A third party security audit was performed by Cure53, you can see the full report [here](https://coredns.io/assets/DNS-01-report.pdf).
 | |
| 
 | |
| ### Reporting security vulnerabilities
 | |
| 
 | |
| If you find a security vulnerability or any security related issues, please DO NOT file a public
 | |
| issue, instead send your report privately to `security@coredns.io`. Security reports are greatly
 | |
| appreciated and we will publicly thank you for it.
 | |
| 
 | |
| Please consult [security vulnerability disclosures and security fix and release process document](https://github.com/coredns/coredns/SECURITY-RELEASE-PROCESS.md)
 |