mirror of
				https://github.com/coredns/coredns.git
				synced 2025-10-30 17:53:21 -04:00 
			
		
		
		
	* plugin/forward: on demand healtchecking Only start doing health checks when we encouner an error (any error). This uses the new pluing/pkg/up package to abstract away the actual checking. This reduces the LOC quite a bit; does need more testing, unit testing and tcpdumping a bit. * fix tests * Fix readme * Use pkg/up for healthchecks * remove unused channel * more cleanups * update readme * * Again do go generate and go build; still referencing the wrong forward repo? Anyway fixed. * Use pkg/up for doing the healtchecks to cut back on unwanted queries * Change up.Func to return an error instead of a boolean. * Drop the string target argument as it doesn't make sense. * Add healthcheck test on failing to get an upstream answer. TODO(miek): double check Forward and Lookup and how they interact with HC, and if we correctly call close() on those * actual test * Tests here * more tests * try getting rid of host * Get rid of the host indirection * Finish removing hosts * moar testing * import fmt * field is not used * docs * move some stuff * bring back health_check * maxfails=0 test * git and merging, bah * review
		
			
				
	
	
		
			64 lines
		
	
	
		
			1.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			64 lines
		
	
	
		
			1.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Package forward implements a forwarding proxy. It caches an upstream net.Conn for some time, so if the same
 | |
| // client returns the upstream's Conn will be precached. Depending on how you benchmark this looks to be
 | |
| // 50% faster than just openening a new connection for every client. It works with UDP and TCP and uses
 | |
| // inband healthchecking.
 | |
| package forward
 | |
| 
 | |
| import (
 | |
| 	"strconv"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/coredns/coredns/request"
 | |
| 
 | |
| 	"github.com/miekg/dns"
 | |
| 	"golang.org/x/net/context"
 | |
| )
 | |
| 
 | |
| func (p *Proxy) connect(ctx context.Context, state request.Request, forceTCP, metric bool) (*dns.Msg, error) {
 | |
| 	start := time.Now()
 | |
| 
 | |
| 	proto := state.Proto()
 | |
| 	if forceTCP {
 | |
| 		proto = "tcp"
 | |
| 	}
 | |
| 
 | |
| 	conn, err := p.Dial(proto)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	// Set buffer size correctly for this client.
 | |
| 	conn.UDPSize = uint16(state.Size())
 | |
| 	if conn.UDPSize < 512 {
 | |
| 		conn.UDPSize = 512
 | |
| 	}
 | |
| 
 | |
| 	conn.SetWriteDeadline(time.Now().Add(timeout))
 | |
| 	if err := conn.WriteMsg(state.Req); err != nil {
 | |
| 		conn.Close() // not giving it back
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	conn.SetReadDeadline(time.Now().Add(timeout))
 | |
| 	ret, err := conn.ReadMsg()
 | |
| 	if err != nil {
 | |
| 		conn.Close() // not giving it back
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	p.Yield(conn)
 | |
| 
 | |
| 	if metric {
 | |
| 		rc, ok := dns.RcodeToString[ret.Rcode]
 | |
| 		if !ok {
 | |
| 			rc = strconv.Itoa(ret.Rcode)
 | |
| 		}
 | |
| 
 | |
| 		RequestCount.WithLabelValues(p.addr).Add(1)
 | |
| 		RcodeCount.WithLabelValues(rc, p.addr).Add(1)
 | |
| 		RequestDuration.WithLabelValues(p.addr).Observe(time.Since(start).Seconds())
 | |
| 	}
 | |
| 
 | |
| 	return ret, nil
 | |
| }
 |