aboutsummaryrefslogtreecommitdiff
path: root/middleware
diff options
context:
space:
mode:
authorGravatar Miek Gieben <miek@miek.nl> 2017-06-08 16:06:14 +0100
committerGravatar GitHub <noreply@github.com> 2017-06-08 16:06:14 +0100
commit1c45e262f5cf20aaa950f8e8d86248cbce6ae120 (patch)
tree5158206d338586a8780e5d4c4949f99e54da0f2b /middleware
parent36396e94ab738439aa9cfc0fe9ed5db2fca883d3 (diff)
downloadcoredns-1c45e262f5cf20aaa950f8e8d86248cbce6ae120.tar.gz
coredns-1c45e262f5cf20aaa950f8e8d86248cbce6ae120.tar.zst
coredns-1c45e262f5cf20aaa950f8e8d86248cbce6ae120.zip
middleware/proxy: remove singleinflight from dns (#717)
Singleinflight interferes with the health checking of upstream. If an upstream would fail, singleinflight would mirror that error to to other proxy *iff* multple identical queries would be inflight. This would lead to marking *all* upstreams as bad, essentially collapsing multiple upstreams into a SPOF. Clearly not what we want. Singleinflight does have some nice properties, but I've opted to rip it out entirely. Caching should almost (but not quite) as good. Added a test case in test that uses 3 CoreDNS instances to reflect the setup from #715. Found another bug as well, where (when the policy would be nil), we would always Spray even though we've found a healthy host.
Diffstat (limited to 'middleware')
-rw-r--r--middleware/proxy/dns.go32
-rw-r--r--middleware/proxy/upstream.go3
2 files changed, 10 insertions, 25 deletions
diff --git a/middleware/proxy/dns.go b/middleware/proxy/dns.go
index 78a8c3bfe..157d97992 100644
--- a/middleware/proxy/dns.go
+++ b/middleware/proxy/dns.go
@@ -5,7 +5,6 @@ import (
"net"
"time"
- "github.com/coredns/coredns/middleware/pkg/singleflight"
"github.com/coredns/coredns/request"
"github.com/miekg/dns"
@@ -13,7 +12,6 @@ import (
type dnsEx struct {
Timeout time.Duration
- group *singleflight.Group
Options
}
@@ -26,7 +24,7 @@ func newDNSEx() *dnsEx {
}
func newDNSExWithOption(opt Options) *dnsEx {
- return &dnsEx{group: new(singleflight.Group), Timeout: defaultTimeout * time.Second, Options: opt}
+ return &dnsEx{Timeout: defaultTimeout * time.Second, Options: opt}
}
func (d *dnsEx) Protocol() string { return "dns" }
@@ -65,30 +63,14 @@ func (d *dnsEx) Exchange(ctx context.Context, addr string, state request.Request
}
func (d *dnsEx) ExchangeConn(m *dns.Msg, co net.Conn) (*dns.Msg, time.Duration, error) {
- t := "nop"
- if t1, ok := dns.TypeToString[m.Question[0].Qtype]; ok {
- t = t1
- }
- cl := "nop"
- if cl1, ok := dns.ClassToString[m.Question[0].Qclass]; ok {
- cl = cl1
- }
-
start := time.Now()
-
- // Name needs to be normalized! Bug in go dns.
- r, err := d.group.Do(m.Question[0].Name+t+cl, func() (interface{}, error) {
- return exchange(m, co)
- })
-
- r1 := r.(dns.Msg)
+ r, err := exchange(m, co)
rtt := time.Since(start)
- return &r1, rtt, err
+
+ return r, rtt, err
}
-// exchange does *not* return a pointer to dns.Msg because that leads to buffer reuse when
-// group.Do is used in Exchange.
-func exchange(m *dns.Msg, co net.Conn) (dns.Msg, error) {
+func exchange(m *dns.Msg, co net.Conn) (*dns.Msg, error) {
opt := m.IsEdns0()
udpsize := uint16(dns.MinMsgSize)
@@ -109,7 +91,7 @@ func exchange(m *dns.Msg, co net.Conn) (dns.Msg, error) {
dnsco.Close()
if r == nil {
- return dns.Msg{}, err
+ return nil, err
}
- return *r, err
+ return r, err
}
diff --git a/middleware/proxy/upstream.go b/middleware/proxy/upstream.go
index 8bc3e5306..76dd70348 100644
--- a/middleware/proxy/upstream.go
+++ b/middleware/proxy/upstream.go
@@ -328,6 +328,9 @@ func (u *staticUpstream) Select() *UpstreamHost {
if u.Policy == nil {
h := (&Random{}).Select(pool)
+ if h != nil {
+ return h
+ }
if h == nil && u.Spray == nil {
return nil
}