mirror of
				https://github.com/coredns/coredns.git
				synced 2025-10-31 02:03:20 -04:00 
			
		
		
		
	
		
			
	
	
		
			167 lines
		
	
	
		
			4.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
		
		
			
		
	
	
			167 lines
		
	
	
		
			4.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
|  | // +build !windows
 | ||
|  | 
 | ||
|  | package core
 | ||
|  | 
 | ||
|  | import (
 | ||
|  | 	"bytes"
 | ||
|  | 	"encoding/gob"
 | ||
|  | 	"errors"
 | ||
|  | 	"io/ioutil"
 | ||
|  | 	"log"
 | ||
|  | 	"net"
 | ||
|  | 	"os"
 | ||
|  | 	"os/exec"
 | ||
|  | 	"path"
 | ||
|  | 	"sync/atomic"
 | ||
|  | 
 | ||
|  | 	"github.com/miekg/coredns/core/https"
 | ||
|  | )
 | ||
|  | 
 | ||
|  | func init() {
 | ||
|  | 	gob.Register(CaddyfileInput{})
 | ||
|  | }
 | ||
|  | 
 | ||
|  | // Restart restarts the entire application; gracefully with zero
 | ||
|  | // downtime if on a POSIX-compatible system, or forcefully if on
 | ||
|  | // Windows but with imperceptibly-short downtime.
 | ||
|  | //
 | ||
|  | // The restarted application will use newCaddyfile as its input
 | ||
|  | // configuration. If newCaddyfile is nil, the current (existing)
 | ||
|  | // Caddyfile configuration will be used.
 | ||
|  | //
 | ||
|  | // Note: The process must exist in the same place on the disk in
 | ||
|  | // order for this to work. Thus, multiple graceful restarts don't
 | ||
|  | // work if executing with `go run`, since the binary is cleaned up
 | ||
|  | // when `go run` sees the initial parent process exit.
 | ||
|  | func Restart(newCaddyfile Input) error {
 | ||
|  | 	log.Println("[INFO] Restarting")
 | ||
|  | 
 | ||
|  | 	if newCaddyfile == nil {
 | ||
|  | 		caddyfileMu.Lock()
 | ||
|  | 		newCaddyfile = caddyfile
 | ||
|  | 		caddyfileMu.Unlock()
 | ||
|  | 	}
 | ||
|  | 
 | ||
|  | 	// Get certificates for any new hosts in the new Caddyfile without causing downtime
 | ||
|  | 	err := getCertsForNewCaddyfile(newCaddyfile)
 | ||
|  | 	if err != nil {
 | ||
|  | 		return errors.New("TLS preload: " + err.Error())
 | ||
|  | 	}
 | ||
|  | 
 | ||
|  | 	if len(os.Args) == 0 { // this should never happen, but...
 | ||
|  | 		os.Args = []string{""}
 | ||
|  | 	}
 | ||
|  | 
 | ||
|  | 	// Tell the child that it's a restart
 | ||
|  | 	os.Setenv("CADDY_RESTART", "true")
 | ||
|  | 
 | ||
|  | 	// Prepare our payload to the child process
 | ||
|  | 	cdyfileGob := caddyfileGob{
 | ||
|  | 		ListenerFds:            make(map[string]uintptr),
 | ||
|  | 		Caddyfile:              newCaddyfile,
 | ||
|  | 		OnDemandTLSCertsIssued: atomic.LoadInt32(https.OnDemandIssuedCount),
 | ||
|  | 	}
 | ||
|  | 
 | ||
|  | 	// Prepare a pipe to the fork's stdin so it can get the Caddyfile
 | ||
|  | 	rpipe, wpipe, err := os.Pipe()
 | ||
|  | 	if err != nil {
 | ||
|  | 		return err
 | ||
|  | 	}
 | ||
|  | 
 | ||
|  | 	// Prepare a pipe that the child process will use to communicate
 | ||
|  | 	// its success with us by sending > 0 bytes
 | ||
|  | 	sigrpipe, sigwpipe, err := os.Pipe()
 | ||
|  | 	if err != nil {
 | ||
|  | 		return err
 | ||
|  | 	}
 | ||
|  | 
 | ||
|  | 	// Pass along relevant file descriptors to child process; ordering
 | ||
|  | 	// is very important since we rely on these being in certain positions.
 | ||
|  | 	extraFiles := []*os.File{sigwpipe} // fd 3
 | ||
|  | 
 | ||
|  | 	// Add file descriptors of all the sockets
 | ||
|  | 	serversMu.Lock()
 | ||
|  | 	for i, s := range servers {
 | ||
|  | 		extraFiles = append(extraFiles, s.ListenerFd())
 | ||
|  | 		cdyfileGob.ListenerFds[s.Addr] = uintptr(4 + i) // 4 fds come before any of the listeners
 | ||
|  | 	}
 | ||
|  | 	serversMu.Unlock()
 | ||
|  | 
 | ||
|  | 	// Set up the command
 | ||
|  | 	cmd := exec.Command(os.Args[0], os.Args[1:]...)
 | ||
|  | 	cmd.Stdin = rpipe      // fd 0
 | ||
|  | 	cmd.Stdout = os.Stdout // fd 1
 | ||
|  | 	cmd.Stderr = os.Stderr // fd 2
 | ||
|  | 	cmd.ExtraFiles = extraFiles
 | ||
|  | 
 | ||
|  | 	// Spawn the child process
 | ||
|  | 	err = cmd.Start()
 | ||
|  | 	if err != nil {
 | ||
|  | 		return err
 | ||
|  | 	}
 | ||
|  | 
 | ||
|  | 	// Immediately close our dup'ed fds and the write end of our signal pipe
 | ||
|  | 	for _, f := range extraFiles {
 | ||
|  | 		f.Close()
 | ||
|  | 	}
 | ||
|  | 
 | ||
|  | 	// Feed Caddyfile to the child
 | ||
|  | 	err = gob.NewEncoder(wpipe).Encode(cdyfileGob)
 | ||
|  | 	if err != nil {
 | ||
|  | 		return err
 | ||
|  | 	}
 | ||
|  | 	wpipe.Close()
 | ||
|  | 
 | ||
|  | 	// Determine whether child startup succeeded
 | ||
|  | 	answer, readErr := ioutil.ReadAll(sigrpipe)
 | ||
|  | 	if answer == nil || len(answer) == 0 {
 | ||
|  | 		cmdErr := cmd.Wait() // get exit status
 | ||
|  | 		log.Printf("[ERROR] Restart: child failed to initialize (%v) - changes not applied", cmdErr)
 | ||
|  | 		if readErr != nil {
 | ||
|  | 			log.Printf("[ERROR] Restart: additionally, error communicating with child process: %v", readErr)
 | ||
|  | 		}
 | ||
|  | 		return errIncompleteRestart
 | ||
|  | 	}
 | ||
|  | 
 | ||
|  | 	// Looks like child is successful; we can exit gracefully.
 | ||
|  | 	return Stop()
 | ||
|  | }
 | ||
|  | 
 | ||
|  | func getCertsForNewCaddyfile(newCaddyfile Input) error {
 | ||
|  | 	// parse the new caddyfile only up to (and including) TLS
 | ||
|  | 	// so we can know what we need to get certs for.
 | ||
|  | 	configs, _, _, err := loadConfigsUpToIncludingTLS(path.Base(newCaddyfile.Path()), bytes.NewReader(newCaddyfile.Body()))
 | ||
|  | 	if err != nil {
 | ||
|  | 		return errors.New("loading Caddyfile: " + err.Error())
 | ||
|  | 	}
 | ||
|  | 
 | ||
|  | 	// first mark the configs that are qualified for managed TLS
 | ||
|  | 	https.MarkQualified(configs)
 | ||
|  | 
 | ||
|  | 	// since we group by bind address to obtain certs, we must call
 | ||
|  | 	// EnableTLS to make sure the port is set properly first
 | ||
|  | 	// (can ignore error since we aren't actually using the certs)
 | ||
|  | 	https.EnableTLS(configs, false)
 | ||
|  | 
 | ||
|  | 	// find out if we can let the acme package start its own challenge listener
 | ||
|  | 	// on port 80
 | ||
|  | 	var proxyACME bool
 | ||
|  | 	serversMu.Lock()
 | ||
|  | 	for _, s := range servers {
 | ||
|  | 		_, port, _ := net.SplitHostPort(s.Addr)
 | ||
|  | 		if port == "80" {
 | ||
|  | 			proxyACME = true
 | ||
|  | 			break
 | ||
|  | 		}
 | ||
|  | 	}
 | ||
|  | 	serversMu.Unlock()
 | ||
|  | 
 | ||
|  | 	// place certs on the disk
 | ||
|  | 	err = https.ObtainCerts(configs, false, proxyACME)
 | ||
|  | 	if err != nil {
 | ||
|  | 		return errors.New("obtaining certs: " + err.Error())
 | ||
|  | 	}
 | ||
|  | 
 | ||
|  | 	return nil
 | ||
|  | }
 |