Bug 2218595

Summary: Support no-aaaa DNS option
Product: Red Hat Enterprise Linux 8 Reporter: Rich Megginson <rmeggins>
Component: rhel-system-rolesAssignee: Rich Megginson <rmeggins>
Status: CLOSED ERRATA QA Contact: David Jež <djez>
Severity: unspecified Docs Contact: Mayur Patil <maypatil>
Priority: unspecified    
Version: 8.9CC: bfubel, djez, jharuda, jklech, maypatil, rhel-cs-system-management-subsystem-qe, spetrosi, vdanek
Target Milestone: rcKeywords: Triaged
Target Release: 8.9Flags: pm-rhel: mirror+
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: role:network
Fixed In Version: rhel-system-roles-1.22.0-0.15.el8 Doc Type: Enhancement
Doc Text:
.The `network` RHEL system role supports the `no-aaaa` DNS option You can now use the `no-aaaa` option to configure DNS settings on managed nodes. Previously, there was no option to suppress AAAA queries generated by the stub resolver, including AAAA lookups triggered by NSS-based interfaces such as `getaddrinfo`; only DNS lookups were affected. With this enhancement, you can now suppress AAAA queries generated by the stub resolver.
Story Points: ---
Clone Of: 2218592 Environment:
Last Closed: 2023-11-14 15:31:19 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2218592    
Bug Blocks:    
Deadline: 2023-07-24   

Description Rich Megginson 2023-06-29 14:51:46 UTC
+++ This bug was initially created as a clone of Bug #2218592 +++



reason: The administrator wants to suppress the AAAA queries made by the stub resolver, including AAAA lookups triggered by NSS-based interfaces such as getaddrinfo. Only the DNS lookups are affected.

result: The administrator is able to suppress AAAA queries made by the stub resolver.


https://github.com/linux-system-roles/network/pull/619

Comment 14 errata-xmlrpc 2023-11-14 15:31:19 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (rhel-system-roles bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2023:6946