package route53 import ( "context" "fmt" "os" "strconv" "strings" "time" "github.com/coredns/caddy" "github.com/coredns/coredns/core/dnsserver" "github.com/coredns/coredns/plugin" "github.com/coredns/coredns/plugin/pkg/fall" clog "github.com/coredns/coredns/plugin/pkg/log" "github.com/aws/aws-sdk-go-v2/aws" "github.com/aws/aws-sdk-go-v2/config" "github.com/aws/aws-sdk-go-v2/credentials" "github.com/aws/aws-sdk-go-v2/feature/ec2/imds" "github.com/aws/aws-sdk-go-v2/service/route53" ) var log = clog.NewWithPlugin("route53") func init() { plugin.Register("route53", setup) } // exposed for testing type route53Client interface { ActivateKeySigningKey(ctx context.Context, params *route53.ActivateKeySigningKeyInput, optFns ...func(*route53.Options)) (*route53.ActivateKeySigningKeyOutput, error) ListHostedZonesByName(ctx context.Context, params *route53.ListHostedZonesByNameInput, optFns ...func(*route53.Options)) (*route53.ListHostedZonesByNameOutput, error) ListResourceRecordSets(ctx context.Context, params *route53.ListResourceRecordSetsInput, optFns ...func(*route53.Options)) (*route53.ListResourceRecordSetsOutput, error) } var f = func(ctx context.Context, cfgOpts []func(*config.LoadOptions) error, clientOpts []func(*route53.Options)) (route53Client, error) { cfg, err := config.LoadDefaultConfig(ctx, cfgOpts...) if err != nil { return nil, err } // If no region is specified, retrieve one from IMDS (SDK v1 used the AWS global partition as a fallback, v2 doesn't) if cfg.Region == "" { imdsClient := imds.NewFromConfig(cfg) region, err := imdsClient.GetRegion(ctx, &imds.GetRegionInput{}) if err != nil { return nil, fmt.Errorf("failed to get region from IMDS: %w", err) } cfg.Region = region.Region } return route53.NewFromConfig(cfg, clientOpts...), nil } func setup(c *caddy.Controller) error { for c.Next() { keyPairs := map[string]struct{}{} keys := map[string][]string{} // Route53 plugin attempts to load AWS credentials following default SDK chaining. // The order configuration is loaded in is: // * Static AWS keys set in Corefile (deprecated) // * Environment Variables // * Shared Credentials file // * Shared Configuration file (if AWS_SDK_LOAD_CONFIG is set to truthy value) // * EC2 Instance Metadata (credentials only) cfgOpts := []func(*config.LoadOptions) error{} clientOpts := []func(*route53.Options){} var fall fall.F refresh := time.Duration(1) * time.Minute // default update frequency to 1 minute args := c.RemainingArgs() for i := range args { parts := strings.SplitN(args[i], ":", 2) if len(parts) != 2 { return plugin.Error("route53", c.Errf("invalid zone %q", args[i])) } dns, hostedZoneID := parts[0], parts[1] if dns == "" || hostedZoneID == "" { return plugin.Error("route53", c.Errf("invalid zone %q", args[i])) } if _, ok := keyPairs[args[i]]; ok { return plugin.Error("route53", c.Errf("conflict zone %q", args[i])) } keyPairs[args[i]] = struct{}{} keys[dns] = append(keys[dns], hostedZoneID) } for c.NextBlock() { switch c.Val() { case "aws_access_key": v := c.RemainingArgs() if len(v) < 2 { return plugin.Error("route53", c.Errf("invalid access key: '%v'", v)) } cfgOpts = append(cfgOpts, config.WithCredentialsProvider(credentials.NewStaticCredentialsProvider(v[0], v[1], ""))) log.Warningf("Save aws_access_key in Corefile has been deprecated, please use other authentication methods instead") case "aws_endpoint": if c.NextArg() { clientOpts = append(clientOpts, func(o *route53.Options) { o.BaseEndpoint = aws.String(c.Val()) }) } else { return plugin.Error("route53", c.ArgErr()) } case "upstream": c.RemainingArgs() // eats args case "credentials": if c.NextArg() { cfgOpts = append(cfgOpts, config.WithSharedConfigProfile(c.Val())) } else { return c.ArgErr() } if c.NextArg() { sharedConfigFiles := []string{c.Val()} // If AWS_SDK_LOAD_CONFIG is set also load ~/.aws/config to stay consistent // with default SDK behavior. if ok, _ := strconv.ParseBool(os.Getenv("AWS_SDK_LOAD_CONFIG")); ok { sharedConfigFiles = append(sharedConfigFiles, config.DefaultSharedConfigFilename()) } cfgOpts = append(cfgOpts, config.WithSharedConfigFiles(sharedConfigFiles)) } case "fallthrough": fall.SetZonesFromArgs(c.RemainingArgs()) case "refresh": if c.NextArg() { refreshStr := c.Val() _, err := strconv.Atoi(refreshStr) if err == nil { refreshStr = c.Val() + "s" } refresh, err = time.ParseDuration(refreshStr) if err != nil { return plugin.Error("route53", c.Errf("Unable to parse duration: %v", err)) } if refresh <= 0 { return plugin.Error("route53", c.Errf("refresh interval must be greater than 0: %q", refreshStr)) } } else { return plugin.Error("route53", c.ArgErr()) } default: return plugin.Error("route53", c.Errf("unknown property %q", c.Val())) } } ctx, cancel := context.WithCancel(context.Background()) client, err := f(ctx, cfgOpts, clientOpts) if err != nil { cancel() return plugin.Error("route53", c.Errf("failed to create route53 client: %v", err)) } h, err := New(ctx, client, keys, refresh) if err != nil { cancel() return plugin.Error("route53", c.Errf("failed to create route53 plugin: %v", err)) } h.Fall = fall if err := h.Run(ctx); err != nil { cancel() return plugin.Error("route53", c.Errf("failed to initialize route53 plugin: %v", err)) } dnsserver.GetConfig(c).AddPlugin(func(next plugin.Handler) plugin.Handler { h.Next = next return h }) c.OnShutdown(func() error { cancel(); return nil }) } return nil }