mirror of
https://github.com/hickory-dns/hickory-dns.git
synced 2026-04-25 11:15:54 +03:00
[GH-ISSUE #2932] fqdn vs non-fqdn name comparison difference between 0.24 vs 0.25 #1092
Labels
No labels
blocked
breaking-change
bug
bug:critical
bug:tests
cleanup
compliance
compliance
compliance
crate:all
crate:client
crate:native-tls
crate:proto
crate:recursor
crate:resolver
crate:resolver
crate:rustls
crate:server
crate:util
dependencies
docs
duplicate
easy
easy
enhance
enhance
enhance
feature:dns-over-https
feature:dns-over-quic
feature:dns-over-tls
feature:dnsssec
feature:global_lb
feature:mdns
feature:tsig
features:edns
has workaround
ops
perf
platform:WASM
platform:android
platform:fuchsia
platform:linux
platform:macos
platform:windows
pull-request
question
test
tools
tools
trust
unclear
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/hickory-dns#1092
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @pronebird on GitHub (Apr 15, 2025).
Original GitHub issue: https://github.com/hickory-dns/hickory-dns/issues/2932
Hi,
Consider the following piece of code:
The difference between v0.24 and v0.25 is that
my_domains.contains(query.name())now returnsfalsebecause fully qualified name no longer matches non-fully qualified I presume.Issues like these are nightmare to resolve, I wish we had some tools in place to warn developers of such changes.
What's the best way to handle this?
p.s: I suppose it's safer for me to stick to checking against the fully-qualified domain names since
Requestare likely carrying them at all times? For the context I am crafting my own responses for certain domains and therefore handling requests manually.@djc commented on GitHub (Apr 15, 2025):
It is indeed painful and there is no straightforward way to find out where this is an issue. This is why we highlighted it in the release notes. If you can describe at a high-level what your application is like, we might be able to give you some guidance.
It is indeed true that messages always contain fully-qualified names so if you're comparing to a name from a message you should take that into account.
@pronebird commented on GitHub (Apr 15, 2025):
Oh I must have missed that in the notes. My bad.
I am capturing dns and crafting custom responses with static IPs for certain domains. The check that verifies whether the request should be overriden stopped matching against non-fqnd names. So I just made sure those all always fully qualified and then everything is back in order.
Thanks for guidance.