From: Vladimír Čunát Date: Fri, 23 Feb 2024 08:13:54 +0000 (+0100) Subject: document limitation of forwarding to authoritative servers X-Git-Tag: v6.0.7~18^2~1 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=23655f3711227c58526ff2d023736e86a1c527a7;p=thirdparty%2Fknot-resolver.git document limitation of forwarding to authoritative servers --- diff --git a/doc/config-forward.rst b/doc/config-forward.rst index 2fe656162..523a3308d 100644 --- a/doc/config-forward.rst +++ b/doc/config-forward.rst @@ -40,6 +40,8 @@ The :option:`forward >` list of rules overrides which servers ge :default: false The forwarding target is an authoritative server. + For those we only support specifying the address, i.e. TLS, ports and IPv6 + scope IDs (``%interface``) are **not** supported. .. option:: dnssec: true|false diff --git a/lib/rules/api.h b/lib/rules/api.h index 6ae1d8b15..bf51e4d52 100644 --- a/lib/rules/api.h +++ b/lib/rules/api.h @@ -229,7 +229,10 @@ typedef struct kr_rule_fwd_flags kr_rule_fwd_flags_t; /** Insert/overwrite a forwarding rule. * * Into the default rule-set ATM. - * \param targets NULL-terminated array. */ + * \param targets NULL-terminated array. + * + * For is_auth == true we only support address, e.g. not specifying port or %interface. + */ KR_EXPORT int kr_rule_forward(const knot_dname_t *apex, kr_rule_fwd_flags_t flags, const struct sockaddr * targets[]);