mirror of
				https://github.com/coredns/coredns.git
				synced 2025-11-03 02:33:21 -05:00 
			
		
		
		
	This commit uses a cancelable context to spawn goroutines that refresh records from a cloud DNS provider. The Caddy shutdown routine uses the returned cancel function to terminate existing goroutines when a USR1 reload signal is received. Signed-off-by: Matt Kulka <mkulka@parchment.com>
		
			
				
	
	
		
			141 lines
		
	
	
		
			4.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			141 lines
		
	
	
		
			4.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package azure
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"github.com/coredns/caddy"
 | 
						|
	"github.com/coredns/coredns/core/dnsserver"
 | 
						|
	"github.com/coredns/coredns/plugin"
 | 
						|
	"github.com/coredns/coredns/plugin/pkg/fall"
 | 
						|
	clog "github.com/coredns/coredns/plugin/pkg/log"
 | 
						|
 | 
						|
	publicAzureDNS "github.com/Azure/azure-sdk-for-go/profiles/latest/dns/mgmt/dns"
 | 
						|
	privateAzureDNS "github.com/Azure/azure-sdk-for-go/profiles/latest/privatedns/mgmt/privatedns"
 | 
						|
	azurerest "github.com/Azure/go-autorest/autorest/azure"
 | 
						|
	"github.com/Azure/go-autorest/autorest/azure/auth"
 | 
						|
)
 | 
						|
 | 
						|
var log = clog.NewWithPlugin("azure")
 | 
						|
 | 
						|
func init() { plugin.Register("azure", setup) }
 | 
						|
 | 
						|
func setup(c *caddy.Controller) error {
 | 
						|
	env, keys, accessMap, fall, err := parse(c)
 | 
						|
	if err != nil {
 | 
						|
		return plugin.Error("azure", err)
 | 
						|
	}
 | 
						|
	ctx, cancel := context.WithCancel(context.Background())
 | 
						|
 | 
						|
	publicDNSClient := publicAzureDNS.NewRecordSetsClient(env.Values[auth.SubscriptionID])
 | 
						|
	if publicDNSClient.Authorizer, err = env.GetAuthorizer(); err != nil {
 | 
						|
		return plugin.Error("azure", err)
 | 
						|
	}
 | 
						|
 | 
						|
	privateDNSClient := privateAzureDNS.NewRecordSetsClient(env.Values[auth.SubscriptionID])
 | 
						|
	if privateDNSClient.Authorizer, err = env.GetAuthorizer(); err != nil {
 | 
						|
		return plugin.Error("azure", err)
 | 
						|
	}
 | 
						|
 | 
						|
	h, err := New(ctx, publicDNSClient, privateDNSClient, keys, accessMap)
 | 
						|
	if err != nil {
 | 
						|
		return plugin.Error("azure", err)
 | 
						|
	}
 | 
						|
	h.Fall = fall
 | 
						|
	if err := h.Run(ctx); err != nil {
 | 
						|
		return plugin.Error("azure", err)
 | 
						|
	}
 | 
						|
 | 
						|
	dnsserver.GetConfig(c).AddPlugin(func(next plugin.Handler) plugin.Handler {
 | 
						|
		h.Next = next
 | 
						|
		return h
 | 
						|
	})
 | 
						|
	c.OnShutdown(func() error { cancel(); return nil })
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func parse(c *caddy.Controller) (auth.EnvironmentSettings, map[string][]string, map[string]string, fall.F, error) {
 | 
						|
	resourceGroupMapping := map[string][]string{}
 | 
						|
	accessMap := map[string]string{}
 | 
						|
	resourceGroupSet := map[string]struct{}{}
 | 
						|
	azureEnv := azurerest.PublicCloud
 | 
						|
	env := auth.EnvironmentSettings{Values: map[string]string{}}
 | 
						|
 | 
						|
	var fall fall.F
 | 
						|
	var access string
 | 
						|
	var resourceGroup string
 | 
						|
	var zoneName string
 | 
						|
 | 
						|
	for c.Next() {
 | 
						|
		args := c.RemainingArgs()
 | 
						|
 | 
						|
		for i := 0; i < len(args); i++ {
 | 
						|
			parts := strings.SplitN(args[i], ":", 2)
 | 
						|
			if len(parts) != 2 {
 | 
						|
				return env, resourceGroupMapping, accessMap, fall, c.Errf("invalid resource group/zone: %q", args[i])
 | 
						|
			}
 | 
						|
			resourceGroup, zoneName = parts[0], parts[1]
 | 
						|
			if resourceGroup == "" || zoneName == "" {
 | 
						|
				return env, resourceGroupMapping, accessMap, fall, c.Errf("invalid resource group/zone: %q", args[i])
 | 
						|
			}
 | 
						|
			if _, ok := resourceGroupSet[resourceGroup+zoneName]; ok {
 | 
						|
				return env, resourceGroupMapping, accessMap, fall, c.Errf("conflicting zone: %q", args[i])
 | 
						|
			}
 | 
						|
 | 
						|
			resourceGroupSet[resourceGroup+zoneName] = struct{}{}
 | 
						|
			accessMap[resourceGroup+zoneName] = "public"
 | 
						|
			resourceGroupMapping[resourceGroup] = append(resourceGroupMapping[resourceGroup], zoneName)
 | 
						|
		}
 | 
						|
 | 
						|
		for c.NextBlock() {
 | 
						|
			switch c.Val() {
 | 
						|
			case "subscription":
 | 
						|
				if !c.NextArg() {
 | 
						|
					return env, resourceGroupMapping, accessMap, fall, c.ArgErr()
 | 
						|
				}
 | 
						|
				env.Values[auth.SubscriptionID] = c.Val()
 | 
						|
			case "tenant":
 | 
						|
				if !c.NextArg() {
 | 
						|
					return env, resourceGroupMapping, accessMap, fall, c.ArgErr()
 | 
						|
				}
 | 
						|
				env.Values[auth.TenantID] = c.Val()
 | 
						|
			case "client":
 | 
						|
				if !c.NextArg() {
 | 
						|
					return env, resourceGroupMapping, accessMap, fall, c.ArgErr()
 | 
						|
				}
 | 
						|
				env.Values[auth.ClientID] = c.Val()
 | 
						|
			case "secret":
 | 
						|
				if !c.NextArg() {
 | 
						|
					return env, resourceGroupMapping, accessMap, fall, c.ArgErr()
 | 
						|
				}
 | 
						|
				env.Values[auth.ClientSecret] = c.Val()
 | 
						|
			case "environment":
 | 
						|
				if !c.NextArg() {
 | 
						|
					return env, resourceGroupMapping, accessMap, fall, c.ArgErr()
 | 
						|
				}
 | 
						|
				var err error
 | 
						|
				if azureEnv, err = azurerest.EnvironmentFromName(c.Val()); err != nil {
 | 
						|
					return env, resourceGroupMapping, accessMap, fall, c.Errf("cannot set azure environment: %q", err.Error())
 | 
						|
				}
 | 
						|
			case "fallthrough":
 | 
						|
				fall.SetZonesFromArgs(c.RemainingArgs())
 | 
						|
			case "access":
 | 
						|
				if !c.NextArg() {
 | 
						|
					return env, resourceGroupMapping, accessMap, fall, c.ArgErr()
 | 
						|
				}
 | 
						|
				access = c.Val()
 | 
						|
				if access != "public" && access != "private" {
 | 
						|
					return env, resourceGroupMapping, accessMap, fall, c.Errf("invalid access value: can be public/private, found: %s", access)
 | 
						|
				}
 | 
						|
				accessMap[resourceGroup+zoneName] = access
 | 
						|
			default:
 | 
						|
				return env, resourceGroupMapping, accessMap, fall, c.Errf("unknown property: %q", c.Val())
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	env.Values[auth.Resource] = azureEnv.ResourceManagerEndpoint
 | 
						|
	env.Environment = azureEnv
 | 
						|
	return env, resourceGroupMapping, accessMap, fall, nil
 | 
						|
}
 |