aboutsummaryrefslogtreecommitdiff
path: root/plugin
diff options
context:
space:
mode:
Diffstat (limited to 'plugin')
-rw-r--r--plugin/backend.go3
-rw-r--r--plugin/etcd/README.md7
-rw-r--r--plugin/etcd/etcd.go5
-rw-r--r--plugin/etcd/handler.go2
-rw-r--r--plugin/etcd/lookup_test.go4
-rw-r--r--plugin/etcd/setup.go10
-rw-r--r--plugin/kubernetes/README.md42
-rw-r--r--plugin/kubernetes/handler.go27
-rw-r--r--plugin/kubernetes/kubernetes.go7
-rw-r--r--plugin/kubernetes/setup.go10
-rw-r--r--plugin/kubernetes/setup_test.go6
-rw-r--r--plugin/pkg/upstream/upstream.go55
12 files changed, 124 insertions, 54 deletions
diff --git a/plugin/backend.go b/plugin/backend.go
index 9abb277f7..289b08856 100644
--- a/plugin/backend.go
+++ b/plugin/backend.go
@@ -3,9 +3,10 @@ package plugin
import (
"github.com/coredns/coredns/plugin/etcd/msg"
"github.com/coredns/coredns/request"
- "golang.org/x/net/context"
"github.com/miekg/dns"
+
+ "golang.org/x/net/context"
)
// ServiceBackend defines a (dynamic) backend that returns a slice of service definitions.
diff --git a/plugin/etcd/README.md b/plugin/etcd/README.md
index fcc99a93d..085173981 100644
--- a/plugin/etcd/README.md
+++ b/plugin/etcd/README.md
@@ -32,7 +32,7 @@ etcd [ZONES...] {
fallthrough [ZONES...]
path PATH
endpoint ENDPOINT...
- upstream ADDRESS...
+ upstream [ADDRESS...]
tls CERT KEY CACERT
}
~~~
@@ -47,8 +47,9 @@ etcd [ZONES...] {
* **ENDPOINT** the etcd endpoints. Defaults to "http://localhost:2379".
* `upstream` upstream resolvers to be used resolve external names found in etcd (think CNAMEs)
pointing to external names. If you want CoreDNS to act as a proxy for clients, you'll need to add
- the proxy plugin. **ADDRESS** can be an IP address, and IP:port or a string pointing to a file
- that is structured as /etc/resolv.conf.
+ the proxy plugin. If no **ADDRESS** is given, CoreDNS will resolve CNAMEs against itself.
+ **ADDRESS** can be an IP address, and IP:port or a string pointing to a file that is structured
+ as /etc/resolv.conf.
* `tls` followed by:
* no arguments, if the server certificate is signed by a system-installed CA and no client cert is needed
diff --git a/plugin/etcd/etcd.go b/plugin/etcd/etcd.go
index fc0b60774..5fa66b90a 100644
--- a/plugin/etcd/etcd.go
+++ b/plugin/etcd/etcd.go
@@ -13,6 +13,7 @@ import (
"github.com/coredns/coredns/plugin/proxy"
"github.com/coredns/coredns/request"
+ "github.com/coredns/coredns/plugin/pkg/upstream"
etcdc "github.com/coreos/etcd/client"
"github.com/miekg/dns"
"golang.org/x/net/context"
@@ -24,7 +25,7 @@ type Etcd struct {
Fall fall.F
Zones []string
PathPrefix string
- Proxy proxy.Proxy // Proxy for looking up names during the resolution process
+ Upstream upstream.Upstream // Proxy for looking up names during the resolution process
Client etcdc.KeysAPI
Ctx context.Context
Stubmap *map[string]proxy.Proxy // list of proxies for stub resolving.
@@ -50,7 +51,7 @@ func (e *Etcd) Reverse(state request.Request, exact bool, opt plugin.Options) (s
// Lookup implements the ServiceBackend interface.
func (e *Etcd) Lookup(state request.Request, name string, typ uint16) (*dns.Msg, error) {
- return e.Proxy.Lookup(state, name, typ)
+ return e.Upstream.Lookup(state, name, typ)
}
// IsNameError implements the ServiceBackend interface.
diff --git a/plugin/etcd/handler.go b/plugin/etcd/handler.go
index 6d2a7a2bf..a2f7fb7b9 100644
--- a/plugin/etcd/handler.go
+++ b/plugin/etcd/handler.go
@@ -12,7 +12,7 @@ import (
// ServeDNS implements the plugin.Handler interface.
func (e *Etcd) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (int, error) {
opt := plugin.Options{}
- state := request.Request{W: w, Req: r}
+ state := request.Request{W: w, Req: r, Context: ctx}
name := state.Name()
diff --git a/plugin/etcd/lookup_test.go b/plugin/etcd/lookup_test.go
index a44f0dcd7..b25637fd8 100644
--- a/plugin/etcd/lookup_test.go
+++ b/plugin/etcd/lookup_test.go
@@ -10,6 +10,7 @@ import (
"github.com/coredns/coredns/plugin/etcd/msg"
"github.com/coredns/coredns/plugin/pkg/dnstest"
"github.com/coredns/coredns/plugin/pkg/tls"
+ "github.com/coredns/coredns/plugin/pkg/upstream"
"github.com/coredns/coredns/plugin/proxy"
"github.com/coredns/coredns/plugin/test"
@@ -227,8 +228,9 @@ func newEtcdPlugin() *Etcd {
tlsc, _ := tls.NewTLSConfigFromArgs()
client, _ := newEtcdClient(endpoints, tlsc)
+ p := proxy.NewLookup([]string{"8.8.8.8:53"})
return &Etcd{
- Proxy: proxy.NewLookup([]string{"8.8.8.8:53"}),
+ Upstream: upstream.Upstream{Forward: &p},
PathPrefix: "skydns",
Ctx: context.Background(),
Zones: []string{"skydns.test.", "skydns_extra.test.", "in-addr.arpa."},
diff --git a/plugin/etcd/setup.go b/plugin/etcd/setup.go
index 7d34c43f6..e9a1e013e 100644
--- a/plugin/etcd/setup.go
+++ b/plugin/etcd/setup.go
@@ -5,8 +5,8 @@ import (
"github.com/coredns/coredns/core/dnsserver"
"github.com/coredns/coredns/plugin"
- "github.com/coredns/coredns/plugin/pkg/dnsutil"
mwtls "github.com/coredns/coredns/plugin/pkg/tls"
+ "github.com/coredns/coredns/plugin/pkg/upstream"
"github.com/coredns/coredns/plugin/proxy"
etcdc "github.com/coreos/etcd/client"
@@ -90,13 +90,13 @@ func etcdParse(c *caddy.Controller) (*Etcd, bool, error) {
case "upstream":
args := c.RemainingArgs()
if len(args) == 0 {
- return &Etcd{}, false, c.ArgErr()
+ return nil, false, c.ArgErr()
}
- ups, err := dnsutil.ParseHostPortOrFile(args...)
+ u, err := upstream.NewUpstream(args)
if err != nil {
- return &Etcd{}, false, err
+ return nil, false, err
}
- etc.Proxy = proxy.NewLookup(ups)
+ etc.Upstream = u
case "tls": // cert key cacertfile
args := c.RemainingArgs()
tlsConfig, err = mwtls.NewTLSConfigFromArgs(args...)
diff --git a/plugin/kubernetes/README.md b/plugin/kubernetes/README.md
index 1e3af89b6..0b375e0f8 100644
--- a/plugin/kubernetes/README.md
+++ b/plugin/kubernetes/README.md
@@ -13,8 +13,8 @@ CoreDNS running the kubernetes plugin can be used as a replacement of kube-dns i
cluster. See the [deployment](https://github.com/coredns/deployment) repository for details on [how
to deploy CoreDNS in Kubernetes](https://github.com/coredns/deployment/tree/master/kubernetes).
-[stubDomains](http://blog.kubernetes.io/2017/04/configuring-private-dns-zones-upstream-nameservers-kubernetes.html)
-are implemented via the *proxy* plugin.
+[stubDomains and upstreamNameservers](http://blog.kubernetes.io/2017/04/configuring-private-dns-zones-upstream-nameservers-kubernetes.html)
+are implemented via the *proxy* plugin and kubernetes *upstream*. See example below.
## Syntax
@@ -36,7 +36,7 @@ kubernetes [ZONES...] {
labels EXPRESSION
pods POD-MODE
endpoint_pod_names
- upstream ADDRESS...
+ upstream [ADDRESS...]
ttl TTL
fallthrough [ZONES...]
}
@@ -80,8 +80,9 @@ kubernetes [ZONES...] {
follows: Use the hostname of the endpoint, or if hostname is not set, use the
pod name of the pod targeted by the endpoint. If there is no pod targeted by
the endpoint, use the dashed IP address form.
-* `upstream` **ADDRESS [ADDRESS...]** defines the upstream resolvers used for resolving services
- that point to external hosts (External Services). **ADDRESS** can be an IP, an IP:port, or a path
+* `upstream` [**ADDRESS**...] defines the upstream resolvers used for resolving services
+ that point to external hosts (aka External Services aka CNAMEs). If no **ADDRESS** is given, CoreDNS
+ will resolve External Services against itself. **ADDRESS** can be an IP, an IP:port, or a path
to a file structured like resolv.conf.
* `ttl` allows you to set a custom TTL for responses. The default (and allowed minimum) is to use
5 seconds, the maximum is capped at 3600 seconds.
@@ -129,24 +130,33 @@ kubernetes cluster.local {
}
~~~
-Here we use the *proxy* plugin to implement stubDomains that forwards `example.org` and
-`example.com` to another nameserver.
+
+## stubDomains and upstreamNameservers
+
+Here we use the *proxy* plugin to implement a stubDomain that forwards `example.local` to the nameserver `10.100.0.10:53`.
+The *upstream* option in kubernetes means that ExternalName services (CNAMEs) will be resolved using the respective proxy.
+Also configured is an upstreamNameserver `8.8.8.8:53` that will be used for resolving names that do not fall in `cluster.local`
+or `example.local`.
~~~ txt
-cluster.local {
- kubernetes {
- endpoint https://k8s-endpoint:8443
- tls cert key cacert
+.:53 {
+ kubernetes cluster.local {
+ upstream
}
-}
-example.org {
- proxy . 8.8.8.8:53
-}
-example.com {
+ proxy example.local 10.100.0.10:53
proxy . 8.8.8.8:53
}
~~~
+The configuration above represents the following Kube-DNS stubDomains and upstreamNameservers configuration.
+
+~~~ txt
+ stubDomains: |
+ {“example.local”: [“10.100.0.10:53”]}
+ upstreamNameservers: |
+ [“8.8.8.8:53”]
+~~~
+
## AutoPath
The *kubernetes* plugin can be used in conjunction with the *autopath* plugin. Using this
diff --git a/plugin/kubernetes/handler.go b/plugin/kubernetes/handler.go
index 5c9ccba34..6793b334d 100644
--- a/plugin/kubernetes/handler.go
+++ b/plugin/kubernetes/handler.go
@@ -11,7 +11,8 @@ import (
// ServeDNS implements the plugin.Handler interface.
func (k Kubernetes) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (int, error) {
- state := request.Request{W: w, Req: r}
+ opt := plugin.Options{}
+ state := request.Request{W: w, Req: r, Context: ctx}
m := new(dns.Msg)
m.SetReply(r)
@@ -32,24 +33,24 @@ func (k Kubernetes) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.M
switch state.QType() {
case dns.TypeA:
- records, err = plugin.A(&k, zone, state, nil, plugin.Options{})
+ records, err = plugin.A(&k, zone, state, nil, opt)
case dns.TypeAAAA:
- records, err = plugin.AAAA(&k, zone, state, nil, plugin.Options{})
+ records, err = plugin.AAAA(&k, zone, state, nil, opt)
case dns.TypeTXT:
- records, err = plugin.TXT(&k, zone, state, plugin.Options{})
+ records, err = plugin.TXT(&k, zone, state, opt)
case dns.TypeCNAME:
- records, err = plugin.CNAME(&k, zone, state, plugin.Options{})
+ records, err = plugin.CNAME(&k, zone, state, opt)
case dns.TypePTR:
- records, err = plugin.PTR(&k, zone, state, plugin.Options{})
+ records, err = plugin.PTR(&k, zone, state, opt)
case dns.TypeMX:
- records, extra, err = plugin.MX(&k, zone, state, plugin.Options{})
+ records, extra, err = plugin.MX(&k, zone, state, opt)
case dns.TypeSRV:
- records, extra, err = plugin.SRV(&k, zone, state, plugin.Options{})
+ records, extra, err = plugin.SRV(&k, zone, state, opt)
case dns.TypeSOA:
- records, err = plugin.SOA(&k, zone, state, plugin.Options{})
+ records, err = plugin.SOA(&k, zone, state, opt)
case dns.TypeNS:
if state.Name() == zone {
- records, extra, err = plugin.NS(&k, zone, state, plugin.Options{})
+ records, extra, err = plugin.NS(&k, zone, state, opt)
break
}
fallthrough
@@ -57,21 +58,21 @@ func (k Kubernetes) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.M
k.Transfer(ctx, state)
default:
// Do a fake A lookup, so we can distinguish between NODATA and NXDOMAIN
- _, err = plugin.A(&k, zone, state, nil, plugin.Options{})
+ _, err = plugin.A(&k, zone, state, nil, opt)
}
if k.IsNameError(err) {
if k.Fall.Through(state.Name()) {
return plugin.NextOrFailure(k.Name(), k.Next, ctx, w, r)
}
- return plugin.BackendError(&k, zone, dns.RcodeNameError, state, nil /* err */, plugin.Options{})
+ return plugin.BackendError(&k, zone, dns.RcodeNameError, state, nil /* err */, opt)
}
if err != nil {
return dns.RcodeServerFailure, err
}
if len(records) == 0 {
- return plugin.BackendError(&k, zone, dns.RcodeSuccess, state, nil, plugin.Options{})
+ return plugin.BackendError(&k, zone, dns.RcodeSuccess, state, nil, opt)
}
m.Answer = append(m.Answer, records...)
diff --git a/plugin/kubernetes/kubernetes.go b/plugin/kubernetes/kubernetes.go
index fc648208d..60111b7b9 100644
--- a/plugin/kubernetes/kubernetes.go
+++ b/plugin/kubernetes/kubernetes.go
@@ -14,7 +14,7 @@ import (
"github.com/coredns/coredns/plugin/pkg/dnsutil"
"github.com/coredns/coredns/plugin/pkg/fall"
"github.com/coredns/coredns/plugin/pkg/healthcheck"
- "github.com/coredns/coredns/plugin/proxy"
+ "github.com/coredns/coredns/plugin/pkg/upstream"
"github.com/coredns/coredns/request"
"github.com/miekg/dns"
@@ -31,7 +31,7 @@ import (
type Kubernetes struct {
Next plugin.Handler
Zones []string
- Proxy proxy.Proxy // Proxy for looking up names during the resolution process
+ Upstream upstream.Upstream
APIServerList []string
APIProxy *apiProxy
APICertAuth string
@@ -59,7 +59,6 @@ func New(zones []string) *Kubernetes {
k.Namespaces = make(map[string]bool)
k.interfaceAddrsFunc = func() net.IP { return net.ParseIP("127.0.0.1") }
k.podMode = podModeDisabled
- k.Proxy = proxy.Proxy{}
k.ttl = defaultTTL
return k
@@ -146,7 +145,7 @@ func (k *Kubernetes) primaryZone() string { return k.Zones[k.primaryZoneIndex] }
// Lookup implements the ServiceBackend interface.
func (k *Kubernetes) Lookup(state request.Request, name string, typ uint16) (*dns.Msg, error) {
- return k.Proxy.Lookup(state, name, typ)
+ return k.Upstream.Lookup(state, name, typ)
}
// IsNameError implements the ServiceBackend interface.
diff --git a/plugin/kubernetes/setup.go b/plugin/kubernetes/setup.go
index fda3e1701..fc48d6e3b 100644
--- a/plugin/kubernetes/setup.go
+++ b/plugin/kubernetes/setup.go
@@ -9,10 +9,9 @@ import (
"github.com/coredns/coredns/core/dnsserver"
"github.com/coredns/coredns/plugin"
- "github.com/coredns/coredns/plugin/pkg/dnsutil"
"github.com/coredns/coredns/plugin/pkg/parse"
- "github.com/coredns/coredns/plugin/proxy"
+ "github.com/coredns/coredns/plugin/pkg/upstream"
"github.com/mholt/caddy"
"github.com/miekg/dns"
meta "k8s.io/apimachinery/pkg/apis/meta/v1"
@@ -195,14 +194,11 @@ func ParseStanza(c *caddy.Controller) (*Kubernetes, error) {
k8s.Fall.SetZonesFromArgs(c.RemainingArgs())
case "upstream":
args := c.RemainingArgs()
- if len(args) == 0 {
- return nil, c.ArgErr()
- }
- ups, err := dnsutil.ParseHostPortOrFile(args...)
+ u, err := upstream.NewUpstream(args)
if err != nil {
return nil, err
}
- k8s.Proxy = proxy.NewLookup(ups)
+ k8s.Upstream = u
case "ttl":
args := c.RemainingArgs()
if len(args) == 0 {
diff --git a/plugin/kubernetes/setup_test.go b/plugin/kubernetes/setup_test.go
index 4d9124332..0b4347ff7 100644
--- a/plugin/kubernetes/setup_test.go
+++ b/plugin/kubernetes/setup_test.go
@@ -7,6 +7,7 @@ import (
"github.com/coredns/coredns/plugin/pkg/fall"
+ "github.com/coredns/coredns/plugin/proxy"
"github.com/mholt/caddy"
meta "k8s.io/apimachinery/pkg/apis/meta/v1"
)
@@ -463,7 +464,10 @@ kubernetes cluster.local`,
t.Errorf("Test %d: Expected kubernetes controller to be initialized with fallthrough '%v'. Instead found fallthrough '%v' for input '%s'", i, test.expectedFallthrough, k8sController.Fall, test.input)
}
// upstream
- foundUpstreams := k8sController.Proxy.Upstreams
+ var foundUpstreams *[]proxy.Upstream
+ if k8sController.Upstream.Forward != nil {
+ foundUpstreams = k8sController.Upstream.Forward.Upstreams
+ }
if test.expectedUpstreams == nil {
if foundUpstreams != nil {
t.Errorf("Test %d: Expected kubernetes controller to not be initialized with upstreams for input '%s'", i, test.input)
diff --git a/plugin/pkg/upstream/upstream.go b/plugin/pkg/upstream/upstream.go
new file mode 100644
index 000000000..fc85d3f5c
--- /dev/null
+++ b/plugin/pkg/upstream/upstream.go
@@ -0,0 +1,55 @@
+// Package upstream abstracts a upstream lookups so that plugins
+// can handle them in an unified way.
+package upstream
+
+import (
+ "github.com/miekg/dns"
+
+ "github.com/coredns/coredns/core/dnsserver"
+ "github.com/coredns/coredns/plugin/pkg/dnsutil"
+ "github.com/coredns/coredns/plugin/pkg/nonwriter"
+ "github.com/coredns/coredns/plugin/proxy"
+ "github.com/coredns/coredns/request"
+)
+
+// Upstream is used to resolve CNAME targets
+type Upstream struct {
+ self bool
+ Forward *proxy.Proxy
+}
+
+// NewUpstream creates a new Upstream for given destination(s)
+func NewUpstream(dests []string) (Upstream, error) {
+ u := Upstream{}
+ if len(dests) == 0 {
+ u.self = true
+ return u, nil
+ }
+ u.self = false
+ ups, err := dnsutil.ParseHostPortOrFile(dests...)
+ if err != nil {
+ return u, err
+ }
+ p := proxy.NewLookup(ups)
+ u.Forward = &p
+ return u, nil
+}
+
+// Lookup routes lookups to Self or Forward
+func (u Upstream) Lookup(state request.Request, name string, typ uint16) (*dns.Msg, error) {
+ if u.self {
+ // lookup via self
+ req := new(dns.Msg)
+ req.SetQuestion(name, typ)
+ state.SizeAndDo(req)
+ nw := nonwriter.New(state.W)
+ state2 := request.Request{W: nw, Req: req}
+ server := state.Context.Value(dnsserver.Key{}).(*dnsserver.Server)
+ server.ServeDNS(state.Context, state2.W, req)
+ return nw.Msg, nil
+ }
+ if u.Forward != nil {
+ return u.Forward.Lookup(state, name, typ)
+ }
+ return &dns.Msg{}, nil
+}