mirror of
https://github.com/coredns/coredns.git
synced 2025-10-27 00:04:15 -04:00
* perf: avoid string concatenation in loops Apply perfpsrint linter Signed-off-by: Philippe Antoine <contact@catenacyber.fr> * ci: enable perfsprint Signed-off-by: Philippe Antoine <contact@catenacyber.fr> --------- Signed-off-by: Philippe Antoine <contact@catenacyber.fr>
171 lines
5.7 KiB
Go
171 lines
5.7 KiB
Go
package route53
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"os"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/coredns/caddy"
|
|
"github.com/coredns/coredns/core/dnsserver"
|
|
"github.com/coredns/coredns/plugin"
|
|
"github.com/coredns/coredns/plugin/pkg/fall"
|
|
clog "github.com/coredns/coredns/plugin/pkg/log"
|
|
|
|
"github.com/aws/aws-sdk-go-v2/aws"
|
|
"github.com/aws/aws-sdk-go-v2/config"
|
|
"github.com/aws/aws-sdk-go-v2/credentials"
|
|
"github.com/aws/aws-sdk-go-v2/feature/ec2/imds"
|
|
"github.com/aws/aws-sdk-go-v2/service/route53"
|
|
)
|
|
|
|
var log = clog.NewWithPlugin("route53")
|
|
|
|
func init() { plugin.Register("route53", setup) }
|
|
|
|
// exposed for testing
|
|
type route53Client interface {
|
|
ActivateKeySigningKey(ctx context.Context, params *route53.ActivateKeySigningKeyInput, optFns ...func(*route53.Options)) (*route53.ActivateKeySigningKeyOutput, error)
|
|
ListHostedZonesByName(ctx context.Context, params *route53.ListHostedZonesByNameInput, optFns ...func(*route53.Options)) (*route53.ListHostedZonesByNameOutput, error)
|
|
ListResourceRecordSets(ctx context.Context, params *route53.ListResourceRecordSetsInput, optFns ...func(*route53.Options)) (*route53.ListResourceRecordSetsOutput, error)
|
|
}
|
|
|
|
var f = func(ctx context.Context, cfgOpts []func(*config.LoadOptions) error, clientOpts []func(*route53.Options)) (route53Client, error) {
|
|
cfg, err := config.LoadDefaultConfig(ctx, cfgOpts...)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
// If no region is specified, retrieve one from IMDS (SDK v1 used the AWS global partition as a fallback, v2 doesn't)
|
|
if cfg.Region == "" {
|
|
imdsClient := imds.NewFromConfig(cfg)
|
|
region, err := imdsClient.GetRegion(ctx, &imds.GetRegionInput{})
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to get region from IMDS: %w", err)
|
|
}
|
|
cfg.Region = region.Region
|
|
}
|
|
return route53.NewFromConfig(cfg, clientOpts...), nil
|
|
}
|
|
|
|
func setup(c *caddy.Controller) error {
|
|
for c.Next() {
|
|
keyPairs := map[string]struct{}{}
|
|
keys := map[string][]string{}
|
|
|
|
// Route53 plugin attempts to load AWS credentials following default SDK chaining.
|
|
// The order configuration is loaded in is:
|
|
// * Static AWS keys set in Corefile (deprecated)
|
|
// * Environment Variables
|
|
// * Shared Credentials file
|
|
// * Shared Configuration file (if AWS_SDK_LOAD_CONFIG is set to truthy value)
|
|
// * EC2 Instance Metadata (credentials only)
|
|
cfgOpts := []func(*config.LoadOptions) error{}
|
|
clientOpts := []func(*route53.Options){}
|
|
var fall fall.F
|
|
|
|
refresh := time.Duration(1) * time.Minute // default update frequency to 1 minute
|
|
|
|
args := c.RemainingArgs()
|
|
|
|
for i := range args {
|
|
parts := strings.SplitN(args[i], ":", 2)
|
|
if len(parts) != 2 {
|
|
return plugin.Error("route53", c.Errf("invalid zone %q", args[i]))
|
|
}
|
|
dns, hostedZoneID := parts[0], parts[1]
|
|
if dns == "" || hostedZoneID == "" {
|
|
return plugin.Error("route53", c.Errf("invalid zone %q", args[i]))
|
|
}
|
|
if _, ok := keyPairs[args[i]]; ok {
|
|
return plugin.Error("route53", c.Errf("conflict zone %q", args[i]))
|
|
}
|
|
|
|
keyPairs[args[i]] = struct{}{}
|
|
keys[dns] = append(keys[dns], hostedZoneID)
|
|
}
|
|
|
|
for c.NextBlock() {
|
|
switch c.Val() {
|
|
case "aws_access_key":
|
|
v := c.RemainingArgs()
|
|
if len(v) < 2 {
|
|
return plugin.Error("route53", c.Errf("invalid access key: '%v'", v))
|
|
}
|
|
cfgOpts = append(cfgOpts, config.WithCredentialsProvider(credentials.NewStaticCredentialsProvider(v[0], v[1], "")))
|
|
log.Warningf("Save aws_access_key in Corefile has been deprecated, please use other authentication methods instead")
|
|
case "aws_endpoint":
|
|
if c.NextArg() {
|
|
clientOpts = append(clientOpts, func(o *route53.Options) {
|
|
o.BaseEndpoint = aws.String(c.Val())
|
|
})
|
|
} else {
|
|
return plugin.Error("route53", c.ArgErr())
|
|
}
|
|
case "upstream":
|
|
c.RemainingArgs() // eats args
|
|
case "credentials":
|
|
if c.NextArg() {
|
|
cfgOpts = append(cfgOpts, config.WithSharedConfigProfile(c.Val()))
|
|
} else {
|
|
return c.ArgErr()
|
|
}
|
|
if c.NextArg() {
|
|
sharedConfigFiles := []string{c.Val()}
|
|
// If AWS_SDK_LOAD_CONFIG is set also load ~/.aws/config to stay consistent
|
|
// with default SDK behavior.
|
|
if ok, _ := strconv.ParseBool(os.Getenv("AWS_SDK_LOAD_CONFIG")); ok {
|
|
sharedConfigFiles = append(sharedConfigFiles, config.DefaultSharedConfigFilename())
|
|
}
|
|
cfgOpts = append(cfgOpts, config.WithSharedConfigFiles(sharedConfigFiles))
|
|
}
|
|
case "fallthrough":
|
|
fall.SetZonesFromArgs(c.RemainingArgs())
|
|
case "refresh":
|
|
if c.NextArg() {
|
|
refreshStr := c.Val()
|
|
_, err := strconv.Atoi(refreshStr)
|
|
if err == nil {
|
|
refreshStr = c.Val() + "s"
|
|
}
|
|
refresh, err = time.ParseDuration(refreshStr)
|
|
if err != nil {
|
|
return plugin.Error("route53", c.Errf("Unable to parse duration: %v", err))
|
|
}
|
|
if refresh <= 0 {
|
|
return plugin.Error("route53", c.Errf("refresh interval must be greater than 0: %q", refreshStr))
|
|
}
|
|
} else {
|
|
return plugin.Error("route53", c.ArgErr())
|
|
}
|
|
default:
|
|
return plugin.Error("route53", c.Errf("unknown property %q", c.Val()))
|
|
}
|
|
}
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
client, err := f(ctx, cfgOpts, clientOpts)
|
|
if err != nil {
|
|
cancel()
|
|
return plugin.Error("route53", c.Errf("failed to create route53 client: %v", err))
|
|
}
|
|
h, err := New(ctx, client, keys, refresh)
|
|
if err != nil {
|
|
cancel()
|
|
return plugin.Error("route53", c.Errf("failed to create route53 plugin: %v", err))
|
|
}
|
|
h.Fall = fall
|
|
if err := h.Run(ctx); err != nil {
|
|
cancel()
|
|
return plugin.Error("route53", c.Errf("failed to initialize route53 plugin: %v", err))
|
|
}
|
|
dnsserver.GetConfig(c).AddPlugin(func(next plugin.Handler) plugin.Handler {
|
|
h.Next = next
|
|
return h
|
|
})
|
|
c.OnShutdown(func() error { cancel(); return nil })
|
|
}
|
|
return nil
|
|
}
|