Enum kubizone_common::Type
source · pub enum Type {
Show 47 variants
A,
AAAA,
AFSDB,
APL,
CAA,
CDNSKEY,
CDS,
CERT,
CNAME,
CSYNC,
DHCID,
DLV,
DNAME,
DNSKEY,
DS,
EUI48,
EUI64,
HINFO,
HIP,
HTTPS,
IPSECKEY,
KEY,
KX,
LOC,
MX,
NAPTR,
NS,
NSEC,
NSEC3,
NSEC3PARAM,
OPENPGPKEY,
PTR,
RRSIG,
RP,
SIG,
SMIMEA,
SOA,
SRV,
SSHFP,
SVCB,
TA,
TKEY,
TLSA,
TSIG,
TXT,
URI,
ZONEMD,
}Expand description
Domain Name System type.
Variants§
A
Address record
Returns a 32-bit IPv4 address, most commonly used to map hostnames to an IP address of the host, but it is also used for DNSBLs, storing subnet masks in RFC 1101, etc.
AAAA
IPv6 address record
Returns a 128-bit IPv6 address, most commonly used to map hostnames to an IP address of the host.
AFSDB
AFS database record
Location of database servers of an AFS cell. This record is commonly used by AFS clients to contact AFS cells outside their local domain. A subtype of this record is used by the obsolete DCE/DFS file system.
APL
Address Prefix List
Specify lists of address ranges, e.g. in CIDR format, for various address families. Experimental.
CAA
Certification Authority Authorization
DNS Certification Authority Authorization, constraining acceptable CAs for a host/domain
CDNSKEY
Child copy of DNSKEY record, for transfer to parent
CDS
CERT
CNAME
Canonical name record
Alias of one name to another: the DNS lookup will continue by retrying the lookup with the new name.
CSYNC
Child-to-Parent Synchronization
Specify a synchronization mechanism between a child and a parent DNS zone. Typical example is declaring the same NS records in the parent and the child zone
DHCID
DLV
DNSSEC Lookaside Validation record
For publishing DNSSEC trust anchors outside of the DNS delegation chain. Uses the same format as the DS record. RFC 5074 describes a way of using these records.
DNAME
Delegation name record
Alias for a name and all its subnames, unlike CNAME, which is an alias for only the exact name. Like a CNAME record, the DNS lookup will continue by retrying the lookup with the new name.
DNSKEY
DS
EUI48
EUI64
HINFO
HIP
Host Identity Protocol
Method of separating the end-point identifier and locator roles of IP addresses.
HTTPS
HTTPS Binding
RR that improves performance for clients that need to resolve many resources to access a domain.
IPSECKEY
KEY
Key record
Used only for SIG(0) (RFC 2931) and TKEY (RFC 2930).[5] RFC 3445 eliminated their use for application keys and limited their use to DNSSEC.[6] RFC 3755 designates DNSKEY as the replacement within DNSSEC.[7] RFC 4025 designates IPSECKEY as the replacement for use with IPsec.[8]
KX
Key Exchanger record
Used with some cryptographic systems (not including DNSSEC) to identify a key management agent for the associated domain-name. Note that this has nothing to do with DNS Security. It is Informational status, rather than being on the IETF standards-track. It has always had limited deployment, but is still in use.
LOC
MX
NAPTR
Naming Authority Pointer
Allows regular-expression-based rewriting of domain names which can then be used as URIs, further domain names to lookups, etc.
NS
NSEC
Next Secure record
Part of DNSSEC—used to prove a name does not exist. Uses the same format as the (obsolete) NXT record.
NSEC3
Next Secure record version 3
An extension to DNSSEC that allows proof of nonexistence for a name without permitting zonewalking
NSEC3PARAM
OPENPGPKEY
OpenPGP public key record
A DNS-based Authentication of Named Entities (DANE) method for publishing and locating OpenPGP public keys in DNS for a specific email address using an OPENPGPKEY DNS resource record.
PTR
PTR Resource Record
Pointer to a canonical name. Unlike a CNAME, DNS processing stops and just the name is returned. The most common use is for implementing reverse DNS lookups, but other uses include such things as DNS-SD.
RRSIG
DNSSEC signature
Signature for a DNSSEC-secured record set. Uses the same format as the SIG record.
RP
Responsible Person
Information about the responsible person(s) for the domain. Usually an email address with the @ replaced by a .
SIG
Signature
Signature record used in SIG(0) (RFC 2931) and TKEY (RFC 2930).[7] RFC 3755 designated RRSIG as the replacement for SIG for use within DNSSEC.[7]
SMIMEA
S/MIME cert association
Associates an S/MIME certificate with a domain name for sender authentication.
SOA
Start of [a zone of] authority record
Specifies authoritative information about a DNS zone, including the primary name server, the email of the domain administrator, the domain serial number, and several timers relating to refreshing the zone.
SRV
Service locator
Generalized service location record, used for newer protocols instead of creating protocol-specific records such as MX.
SSHFP
SSH Public Key Fingerprint
Resource record for publishing SSH public host key fingerprints in the DNS, in order to aid in verifying the authenticity of the host. RFC 6594 defines ECC SSH keys and SHA-256 hashes. See the IANA SSHFP RR parameters registry for details.
SVCB
Service Binding
RR that improves performance for clients that need to resolve many resources to access a domain.
TA
DNSSEC Trust Authorities
Part of a deployment proposal for DNSSEC without a signed DNS root. See the IANA database and Weiler Spec for details. Uses the same format as the DS record.
TKEY
Transaction Key record
A method of providing keying material to be used with TSIG that is encrypted under the public key in an accompanying KEY RR.[12]
TLSA
TLSA certificate association
A record for DANE. RFC 6698 defines “The TLSA DNS resource record is used to associate a TLS server certificate or public key with the domain name where the record is found, thus forming a ‘TLSA certificate association’”.
TSIG
Transaction Signature
Can be used to authenticate dynamic updates as coming from an approved client, or to authenticate responses as coming from an approved recursive name server[13] similar to DNSSEC.
TXT
Text record
Originally for arbitrary human-readable text in a DNS record. Since the early 1990s, however, this record more often carries machine-readable data, such as specified by RFC 1464, opportunistic encryption, Sender Policy Framework, DKIM, DMARC, DNS-SD, etc.
URI
ZONEMD
Message Digests for DNS Zones
Provides a cryptographic message digest over DNS zone data at rest.
Implementations§
source§impl Type
impl Type
pub fn is_a(&self) -> bool
pub fn is_aaaa(&self) -> bool
pub fn is_afsdb(&self) -> bool
pub fn is_apl(&self) -> bool
pub fn is_caa(&self) -> bool
pub fn is_cdnskey(&self) -> bool
pub fn is_cds(&self) -> bool
pub fn is_cert(&self) -> bool
pub fn is_cname(&self) -> bool
pub fn is_csync(&self) -> bool
pub fn is_dhcid(&self) -> bool
pub fn is_dlv(&self) -> bool
pub fn is_dname(&self) -> bool
pub fn is_dnskey(&self) -> bool
pub fn is_ds(&self) -> bool
pub fn is_eui48(&self) -> bool
pub fn is_eui64(&self) -> bool
pub fn is_hinfo(&self) -> bool
pub fn is_hip(&self) -> bool
pub fn is_https(&self) -> bool
pub fn is_ipseckey(&self) -> bool
pub fn is_key(&self) -> bool
pub fn is_kx(&self) -> bool
pub fn is_loc(&self) -> bool
pub fn is_mx(&self) -> bool
pub fn is_naptr(&self) -> bool
pub fn is_ns(&self) -> bool
pub fn is_nsec(&self) -> bool
pub fn is_nsec3(&self) -> bool
pub fn is_nsec3param(&self) -> bool
pub fn is_openpgpkey(&self) -> bool
pub fn is_ptr(&self) -> bool
pub fn is_rrsig(&self) -> bool
pub fn is_rp(&self) -> bool
pub fn is_sig(&self) -> bool
pub fn is_smimea(&self) -> bool
pub fn is_soa(&self) -> bool
pub fn is_srv(&self) -> bool
pub fn is_sshfp(&self) -> bool
pub fn is_svcb(&self) -> bool
pub fn is_ta(&self) -> bool
pub fn is_tkey(&self) -> bool
pub fn is_tlsa(&self) -> bool
pub fn is_tsig(&self) -> bool
pub fn is_txt(&self) -> bool
pub fn is_uri(&self) -> bool
pub fn is_zonemd(&self) -> bool
Trait Implementations§
source§impl<'de> Deserialize<'de> for Type
impl<'de> Deserialize<'de> for Type
source§fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
source§impl JsonSchema for Type
impl JsonSchema for Type
source§fn schema_name() -> String
fn schema_name() -> String
source§fn schema_id() -> Cow<'static, str>
fn schema_id() -> Cow<'static, str>
source§fn json_schema(gen: &mut SchemaGenerator) -> Schema
fn json_schema(gen: &mut SchemaGenerator) -> Schema
source§fn is_referenceable() -> bool
fn is_referenceable() -> bool
$ref keyword. Read moresource§impl Ord for Type
impl Ord for Type
source§impl PartialEq for Type
impl PartialEq for Type
source§impl PartialOrd for Type
impl PartialOrd for Type
1.0.0 · source§fn le(&self, other: &Rhs) -> bool
fn le(&self, other: &Rhs) -> bool
self and other) and is used by the <=
operator. Read moreimpl Copy for Type
impl Eq for Type
impl StructuralPartialEq for Type
Auto Trait Implementations§
impl Freeze for Type
impl RefUnwindSafe for Type
impl Send for Type
impl Sync for Type
impl Unpin for Type
impl UnwindSafe for Type
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<T> CloneToUninit for Twhere
T: Copy,
impl<T> CloneToUninit for Twhere
T: Copy,
source§unsafe fn clone_to_uninit(&self, dst: *mut T)
unsafe fn clone_to_uninit(&self, dst: *mut T)
clone_to_uninit)source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
source§default unsafe fn clone_to_uninit(&self, dst: *mut T)
default unsafe fn clone_to_uninit(&self, dst: *mut T)
clone_to_uninit)