mirror of
				https://github.com/coredns/coredns.git
				synced 2025-11-03 18:53:13 -05:00 
			
		
		
		
	
		
			
				
	
	
		
			171 lines
		
	
	
		
			5.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			171 lines
		
	
	
		
			5.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package route53
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"fmt"
 | 
						|
	"os"
 | 
						|
	"strconv"
 | 
						|
	"strings"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/coredns/caddy"
 | 
						|
	"github.com/coredns/coredns/core/dnsserver"
 | 
						|
	"github.com/coredns/coredns/plugin"
 | 
						|
	"github.com/coredns/coredns/plugin/pkg/fall"
 | 
						|
	clog "github.com/coredns/coredns/plugin/pkg/log"
 | 
						|
 | 
						|
	"github.com/aws/aws-sdk-go-v2/aws"
 | 
						|
	"github.com/aws/aws-sdk-go-v2/config"
 | 
						|
	"github.com/aws/aws-sdk-go-v2/credentials"
 | 
						|
	"github.com/aws/aws-sdk-go-v2/feature/ec2/imds"
 | 
						|
	"github.com/aws/aws-sdk-go-v2/service/route53"
 | 
						|
)
 | 
						|
 | 
						|
var log = clog.NewWithPlugin("route53")
 | 
						|
 | 
						|
func init() { plugin.Register("route53", setup) }
 | 
						|
 | 
						|
// exposed for testing
 | 
						|
type route53Client interface {
 | 
						|
	ActivateKeySigningKey(ctx context.Context, params *route53.ActivateKeySigningKeyInput, optFns ...func(*route53.Options)) (*route53.ActivateKeySigningKeyOutput, error)
 | 
						|
	ListHostedZonesByName(ctx context.Context, params *route53.ListHostedZonesByNameInput, optFns ...func(*route53.Options)) (*route53.ListHostedZonesByNameOutput, error)
 | 
						|
	ListResourceRecordSets(ctx context.Context, params *route53.ListResourceRecordSetsInput, optFns ...func(*route53.Options)) (*route53.ListResourceRecordSetsOutput, error)
 | 
						|
}
 | 
						|
 | 
						|
var f = func(ctx context.Context, cfgOpts []func(*config.LoadOptions) error, clientOpts []func(*route53.Options)) (route53Client, error) {
 | 
						|
	cfg, err := config.LoadDefaultConfig(ctx, cfgOpts...)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	// If no region is specified, retrieve one from IMDS (SDK v1 used the AWS global partition as a fallback, v2 doesn't)
 | 
						|
	if cfg.Region == "" {
 | 
						|
		imdsClient := imds.NewFromConfig(cfg)
 | 
						|
		region, err := imdsClient.GetRegion(ctx, &imds.GetRegionInput{})
 | 
						|
		if err != nil {
 | 
						|
			return nil, fmt.Errorf("failed to get region from IMDS: %w", err)
 | 
						|
		}
 | 
						|
		cfg.Region = region.Region
 | 
						|
	}
 | 
						|
	return route53.NewFromConfig(cfg, clientOpts...), nil
 | 
						|
}
 | 
						|
 | 
						|
func setup(c *caddy.Controller) error {
 | 
						|
	for c.Next() {
 | 
						|
		keyPairs := map[string]struct{}{}
 | 
						|
		keys := map[string][]string{}
 | 
						|
 | 
						|
		// Route53 plugin attempts to load AWS credentials following default SDK chaining.
 | 
						|
		// The order configuration is loaded in is:
 | 
						|
		// * Static AWS keys set in Corefile (deprecated)
 | 
						|
		// * Environment Variables
 | 
						|
		// * Shared Credentials file
 | 
						|
		// * Shared Configuration file (if AWS_SDK_LOAD_CONFIG is set to truthy value)
 | 
						|
		// * EC2 Instance Metadata (credentials only)
 | 
						|
		cfgOpts := []func(*config.LoadOptions) error{}
 | 
						|
		clientOpts := []func(*route53.Options){}
 | 
						|
		var fall fall.F
 | 
						|
 | 
						|
		refresh := time.Duration(1) * time.Minute // default update frequency to 1 minute
 | 
						|
 | 
						|
		args := c.RemainingArgs()
 | 
						|
 | 
						|
		for i := range args {
 | 
						|
			parts := strings.SplitN(args[i], ":", 2)
 | 
						|
			if len(parts) != 2 {
 | 
						|
				return plugin.Error("route53", c.Errf("invalid zone %q", args[i]))
 | 
						|
			}
 | 
						|
			dns, hostedZoneID := parts[0], parts[1]
 | 
						|
			if dns == "" || hostedZoneID == "" {
 | 
						|
				return plugin.Error("route53", c.Errf("invalid zone %q", args[i]))
 | 
						|
			}
 | 
						|
			if _, ok := keyPairs[args[i]]; ok {
 | 
						|
				return plugin.Error("route53", c.Errf("conflict zone %q", args[i]))
 | 
						|
			}
 | 
						|
 | 
						|
			keyPairs[args[i]] = struct{}{}
 | 
						|
			keys[dns] = append(keys[dns], hostedZoneID)
 | 
						|
		}
 | 
						|
 | 
						|
		for c.NextBlock() {
 | 
						|
			switch c.Val() {
 | 
						|
			case "aws_access_key":
 | 
						|
				v := c.RemainingArgs()
 | 
						|
				if len(v) < 2 {
 | 
						|
					return plugin.Error("route53", c.Errf("invalid access key: '%v'", v))
 | 
						|
				}
 | 
						|
				cfgOpts = append(cfgOpts, config.WithCredentialsProvider(credentials.NewStaticCredentialsProvider(v[0], v[1], "")))
 | 
						|
				log.Warningf("Save aws_access_key in Corefile has been deprecated, please use other authentication methods instead")
 | 
						|
			case "aws_endpoint":
 | 
						|
				if c.NextArg() {
 | 
						|
					clientOpts = append(clientOpts, func(o *route53.Options) {
 | 
						|
						o.BaseEndpoint = aws.String(c.Val())
 | 
						|
					})
 | 
						|
				} else {
 | 
						|
					return plugin.Error("route53", c.ArgErr())
 | 
						|
				}
 | 
						|
			case "upstream":
 | 
						|
				c.RemainingArgs() // eats args
 | 
						|
			case "credentials":
 | 
						|
				if c.NextArg() {
 | 
						|
					cfgOpts = append(cfgOpts, config.WithSharedConfigProfile(c.Val()))
 | 
						|
				} else {
 | 
						|
					return c.ArgErr()
 | 
						|
				}
 | 
						|
				if c.NextArg() {
 | 
						|
					sharedConfigFiles := []string{c.Val()}
 | 
						|
					// If AWS_SDK_LOAD_CONFIG is set also load ~/.aws/config to stay consistent
 | 
						|
					// with default SDK behavior.
 | 
						|
					if ok, _ := strconv.ParseBool(os.Getenv("AWS_SDK_LOAD_CONFIG")); ok {
 | 
						|
						sharedConfigFiles = append(sharedConfigFiles, config.DefaultSharedConfigFilename())
 | 
						|
					}
 | 
						|
					cfgOpts = append(cfgOpts, config.WithSharedConfigFiles(sharedConfigFiles))
 | 
						|
				}
 | 
						|
			case "fallthrough":
 | 
						|
				fall.SetZonesFromArgs(c.RemainingArgs())
 | 
						|
			case "refresh":
 | 
						|
				if c.NextArg() {
 | 
						|
					refreshStr := c.Val()
 | 
						|
					_, err := strconv.Atoi(refreshStr)
 | 
						|
					if err == nil {
 | 
						|
						refreshStr = fmt.Sprintf("%ss", c.Val())
 | 
						|
					}
 | 
						|
					refresh, err = time.ParseDuration(refreshStr)
 | 
						|
					if err != nil {
 | 
						|
						return plugin.Error("route53", c.Errf("Unable to parse duration: %v", err))
 | 
						|
					}
 | 
						|
					if refresh <= 0 {
 | 
						|
						return plugin.Error("route53", c.Errf("refresh interval must be greater than 0: %q", refreshStr))
 | 
						|
					}
 | 
						|
				} else {
 | 
						|
					return plugin.Error("route53", c.ArgErr())
 | 
						|
				}
 | 
						|
			default:
 | 
						|
				return plugin.Error("route53", c.Errf("unknown property %q", c.Val()))
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		ctx, cancel := context.WithCancel(context.Background())
 | 
						|
		client, err := f(ctx, cfgOpts, clientOpts)
 | 
						|
		if err != nil {
 | 
						|
			cancel()
 | 
						|
			return plugin.Error("route53", c.Errf("failed to create route53 client: %v", err))
 | 
						|
		}
 | 
						|
		h, err := New(ctx, client, keys, refresh)
 | 
						|
		if err != nil {
 | 
						|
			cancel()
 | 
						|
			return plugin.Error("route53", c.Errf("failed to create route53 plugin: %v", err))
 | 
						|
		}
 | 
						|
		h.Fall = fall
 | 
						|
		if err := h.Run(ctx); err != nil {
 | 
						|
			cancel()
 | 
						|
			return plugin.Error("route53", c.Errf("failed to initialize route53 plugin: %v", err))
 | 
						|
		}
 | 
						|
		dnsserver.GetConfig(c).AddPlugin(func(next plugin.Handler) plugin.Handler {
 | 
						|
			h.Next = next
 | 
						|
			return h
 | 
						|
		})
 | 
						|
		c.OnShutdown(func() error { cancel(); return nil })
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 |