mirror of
				https://github.com/coredns/coredns.git
				synced 2025-10-31 10:13:14 -04:00 
			
		
		
		
	* core: add listening for other protocols
Allow CoreDNS to listen for TLS request coming over port 853. This can
be enabled with `tls://` in the config file.
Implement listening for grps:// as well.
a Corefile like:
~~~
. tls://.:1853 {
    whoami
    tls
}
~~~
Means we listen on 1853 for tls requests, the `tls` config item allows
configuration for TLS parameters. We *might* be tempted to use Caddy's
Let's Encrypt implementation here.
* Refactor coredns/grpc into CoreDNS
This makes gRPC a first class citizen in CoreDNS. Add defines as being
just another server.
* some cleanups
* unexport the servers
* Move protobuf dir
* Hook up TLS properly
* Fix test
* listen for TLS as well. README updates
* disable test, fix package
* fix test
* Fix tests
* Fix remaining test
* Some tests
* Make the test work
* Add grpc test from #580
* fix crash
* Fix tests
* Close conn
* README cleanups
* README
* link RFC
		
	
		
			
				
	
	
		
			68 lines
		
	
	
		
			1.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			68 lines
		
	
	
		
			1.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package dnsserver
 | |
| 
 | |
| import (
 | |
| 	"crypto/tls"
 | |
| 
 | |
| 	"github.com/coredns/coredns/middleware"
 | |
| 
 | |
| 	"github.com/mholt/caddy"
 | |
| )
 | |
| 
 | |
| // Config configuration for a single server.
 | |
| type Config struct {
 | |
| 	// The zone of the site.
 | |
| 	Zone string
 | |
| 
 | |
| 	// The hostname to bind listener to, defaults to the wildcard address
 | |
| 	ListenHost string
 | |
| 
 | |
| 	// The port to listen on.
 | |
| 	Port string
 | |
| 
 | |
| 	// Root points to a base directory we we find user defined "things".
 | |
| 	// First consumer is the file middleware to looks for zone files in this place.
 | |
| 	Root string
 | |
| 
 | |
| 	// The transport we implement, normally just "dns" over TCP/UDP, but could be
 | |
| 	// DNS-over-TLS or DNS-over-gRPC.
 | |
| 	Transport string
 | |
| 
 | |
| 	// TLSConfig when listening for encrypted connections (gRPC, DNS-over-TLS).
 | |
| 	TLSConfig *tls.Config
 | |
| 
 | |
| 	// Middleware stack.
 | |
| 	Middleware []middleware.Middleware
 | |
| 
 | |
| 	// Compiled middleware stack.
 | |
| 	middlewareChain middleware.Handler
 | |
| }
 | |
| 
 | |
| // GetConfig gets the Config that corresponds to c.
 | |
| // If none exist nil is returned.
 | |
| func GetConfig(c *caddy.Controller) *Config {
 | |
| 	ctx := c.Context().(*dnsContext)
 | |
| 	if cfg, ok := ctx.keysToConfigs[c.Key]; ok {
 | |
| 		return cfg
 | |
| 	}
 | |
| 	// we should only get here during tests because directive
 | |
| 	// actions typically skip the server blocks where we make
 | |
| 	// the configs.
 | |
| 	ctx.saveConfig(c.Key, &Config{})
 | |
| 	return GetConfig(c)
 | |
| }
 | |
| 
 | |
| // GetMiddleware returns the middleware handler that has been added to the config under name.
 | |
| // This is useful to inspect if a certain middleware is active in this server.
 | |
| // Note that this is order dependent and the order is defined in directives.go, i.e. if your middleware
 | |
| // comes before the middleware you are checking; it will not be there (yet).
 | |
| func GetMiddleware(c *caddy.Controller, name string) middleware.Handler {
 | |
| 	conf := GetConfig(c)
 | |
| 	for _, h := range conf.Middleware {
 | |
| 		x := h(nil)
 | |
| 		if name == x.Name() {
 | |
| 			return x
 | |
| 		}
 | |
| 	}
 | |
| 	return nil
 | |
| }
 |