Existing implementations:
if we can port the reliable python (nsec, not nsec3!) algorithm to go (or maybe JS), we can create a function that could nsec walk (in background or refresh on demand?) a zone and potentially hand back the front end apps a list of entire existing name space under the keys in their keystore as well as the existing DNS RR types existing at each name, together with together with any/all subdomains that contain RRs beneath it. Perhaps best useful in JSON form. Front end apps (such as playground) can then perform an ANY query for particular FQDN and get all existing RR types at that point.
Could also be a very cool go CMD line option!
Existing implementations:
if we can port the reliable python (nsec, not nsec3!) algorithm to go (or maybe JS), we can create a function that could nsec walk (in background or refresh on demand?) a zone and potentially hand back the front end apps a list of entire existing name space under the keys in their keystore as well as the existing DNS RR types existing at each name, together with together with any/all subdomains that contain RRs beneath it. Perhaps best useful in JSON form. Front end apps (such as playground) can then perform an ANY query for particular FQDN and get all existing RR types at that point.
Could also be a very cool go CMD line option!