diff options
author | 2017-06-08 16:06:14 +0100 | |
---|---|---|
committer | 2017-06-08 16:06:14 +0100 | |
commit | 1c45e262f5cf20aaa950f8e8d86248cbce6ae120 (patch) | |
tree | 5158206d338586a8780e5d4c4949f99e54da0f2b /middleware | |
parent | 36396e94ab738439aa9cfc0fe9ed5db2fca883d3 (diff) | |
download | coredns-1c45e262f5cf20aaa950f8e8d86248cbce6ae120.tar.gz coredns-1c45e262f5cf20aaa950f8e8d86248cbce6ae120.tar.zst coredns-1c45e262f5cf20aaa950f8e8d86248cbce6ae120.zip |
middleware/proxy: remove singleinflight from dns (#717)
Singleinflight interferes with the health checking of upstream. If an
upstream would fail, singleinflight would mirror that error to to other
proxy *iff* multple identical queries would be inflight. This would lead
to marking *all* upstreams as bad, essentially collapsing multiple
upstreams into a SPOF. Clearly not what we want.
Singleinflight does have some nice properties, but I've opted to rip it
out entirely. Caching should almost (but not quite) as good.
Added a test case in test that uses 3 CoreDNS instances to reflect the
setup from #715.
Found another bug as well, where (when the policy would be nil), we
would always Spray even though we've found a healthy host.
Diffstat (limited to 'middleware')
-rw-r--r-- | middleware/proxy/dns.go | 32 | ||||
-rw-r--r-- | middleware/proxy/upstream.go | 3 |
2 files changed, 10 insertions, 25 deletions
diff --git a/middleware/proxy/dns.go b/middleware/proxy/dns.go index 78a8c3bfe..157d97992 100644 --- a/middleware/proxy/dns.go +++ b/middleware/proxy/dns.go @@ -5,7 +5,6 @@ import ( "net" "time" - "github.com/coredns/coredns/middleware/pkg/singleflight" "github.com/coredns/coredns/request" "github.com/miekg/dns" @@ -13,7 +12,6 @@ import ( type dnsEx struct { Timeout time.Duration - group *singleflight.Group Options } @@ -26,7 +24,7 @@ func newDNSEx() *dnsEx { } func newDNSExWithOption(opt Options) *dnsEx { - return &dnsEx{group: new(singleflight.Group), Timeout: defaultTimeout * time.Second, Options: opt} + return &dnsEx{Timeout: defaultTimeout * time.Second, Options: opt} } func (d *dnsEx) Protocol() string { return "dns" } @@ -65,30 +63,14 @@ func (d *dnsEx) Exchange(ctx context.Context, addr string, state request.Request } func (d *dnsEx) ExchangeConn(m *dns.Msg, co net.Conn) (*dns.Msg, time.Duration, error) { - t := "nop" - if t1, ok := dns.TypeToString[m.Question[0].Qtype]; ok { - t = t1 - } - cl := "nop" - if cl1, ok := dns.ClassToString[m.Question[0].Qclass]; ok { - cl = cl1 - } - start := time.Now() - - // Name needs to be normalized! Bug in go dns. - r, err := d.group.Do(m.Question[0].Name+t+cl, func() (interface{}, error) { - return exchange(m, co) - }) - - r1 := r.(dns.Msg) + r, err := exchange(m, co) rtt := time.Since(start) - return &r1, rtt, err + + return r, rtt, err } -// exchange does *not* return a pointer to dns.Msg because that leads to buffer reuse when -// group.Do is used in Exchange. -func exchange(m *dns.Msg, co net.Conn) (dns.Msg, error) { +func exchange(m *dns.Msg, co net.Conn) (*dns.Msg, error) { opt := m.IsEdns0() udpsize := uint16(dns.MinMsgSize) @@ -109,7 +91,7 @@ func exchange(m *dns.Msg, co net.Conn) (dns.Msg, error) { dnsco.Close() if r == nil { - return dns.Msg{}, err + return nil, err } - return *r, err + return r, err } diff --git a/middleware/proxy/upstream.go b/middleware/proxy/upstream.go index 8bc3e5306..76dd70348 100644 --- a/middleware/proxy/upstream.go +++ b/middleware/proxy/upstream.go @@ -328,6 +328,9 @@ func (u *staticUpstream) Select() *UpstreamHost { if u.Policy == nil { h := (&Random{}).Select(pool) + if h != nil { + return h + } if h == nil && u.Spray == nil { return nil } |