libvirt/docs/schemas
Laine Stump 4f595ba61c network: permit upstream forwarding of unqualified DNS names
This resolves the issue that prompted the filing of

  https://bugzilla.redhat.com/show_bug.cgi?id=928638

(although the request there is for something much larger and more
general than this patch).

commit f3868259ca disabled the
forwarding to upstream DNS servers of unresolved DNS requests for
names that had no domain, but were just simple host names (no "."
character anywhere in the name). While this behavior is frowned upon
by DNS root servers (that's why it was changed in libvirt), it is
convenient in some cases, and since dnsmasq can be configured to allow
it, it must not be strictly forbidden.

This patch restores the old behavior, but since it is usually
undesirable, restoring it requires specification of a new option in
the network config. Adding the attribute "forwardPlainNames='yes'" to
the <dns> elemnt does the trick - when that attribute is added to a
network config, any simple hostnames that can't be resolved by the
network's dnsmasq instance will be forwarded to the DNS servers listed
in the host's /etc/resolv.conf for an attempt at resolution (just as
any FQDN would be forwarded).

When that attribute *isn't* specified, unresolved simple names will
*not* be forwarded to the upstream DNS server - this is the default
behavior.
2013-08-14 09:46:22 -04:00
..
basictypes.rng
capability.rng qemu: Implement CPUs check against machine type's cpu-max 2013-07-01 14:30:42 +02:00
domain.rng
domaincommon.rng conf: add startupPolicy attribute for harddisk 2013-08-07 14:31:34 +08:00
domainsnapshot.rng
interface.rng
Makefile.am
network.rng network: permit upstream forwarding of unqualified DNS names 2013-08-14 09:46:22 -04:00
networkcommon.rng
nodedev.rng nodedev: add iommuGroup to node device object 2013-06-26 14:10:56 -04:00
nwfilter.rng
secret.rng
storageencryption.rng
storagefilefeatures.rng
storagepool.rng Make logical pools independent on target path 2013-07-16 12:16:37 +02:00
storagevol.rng