mirror of
				https://github.com/coredns/coredns.git
				synced 2025-11-03 18:53:13 -05:00 
			
		
		
		
	Clean up some golint related issues. Signed-off-by: Yong Tang <yong.tang.github@outlook.com>
		
			
				
	
	
		
			692 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			692 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Package kubernetes provides the kubernetes backend.
 | 
						|
package kubernetes
 | 
						|
 | 
						|
import (
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"log"
 | 
						|
	"net"
 | 
						|
	"strings"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/coredns/coredns/middleware"
 | 
						|
	"github.com/coredns/coredns/middleware/etcd/msg"
 | 
						|
	"github.com/coredns/coredns/middleware/pkg/dnsutil"
 | 
						|
	dnsstrings "github.com/coredns/coredns/middleware/pkg/strings"
 | 
						|
	"github.com/coredns/coredns/middleware/proxy"
 | 
						|
	"github.com/coredns/coredns/request"
 | 
						|
 | 
						|
	"github.com/miekg/dns"
 | 
						|
	"k8s.io/client-go/1.5/kubernetes"
 | 
						|
	"k8s.io/client-go/1.5/pkg/api"
 | 
						|
	unversionedapi "k8s.io/client-go/1.5/pkg/api/unversioned"
 | 
						|
	"k8s.io/client-go/1.5/pkg/labels"
 | 
						|
	"k8s.io/client-go/1.5/rest"
 | 
						|
	"k8s.io/client-go/1.5/tools/clientcmd"
 | 
						|
	clientcmdapi "k8s.io/client-go/1.5/tools/clientcmd/api"
 | 
						|
)
 | 
						|
 | 
						|
// Kubernetes implements a middleware that connects to a Kubernetes cluster.
 | 
						|
type Kubernetes struct {
 | 
						|
	Next          middleware.Handler
 | 
						|
	Zones         []string
 | 
						|
	primaryZone   int
 | 
						|
	Proxy         proxy.Proxy // Proxy for looking up names during the resolution process
 | 
						|
	APIEndpoint   string
 | 
						|
	APICertAuth   string
 | 
						|
	APIClientCert string
 | 
						|
	APIClientKey  string
 | 
						|
	APIConn       dnsController
 | 
						|
	ResyncPeriod  time.Duration
 | 
						|
	Namespaces    []string
 | 
						|
	Federations   []Federation
 | 
						|
	LabelSelector *unversionedapi.LabelSelector
 | 
						|
	Selector      *labels.Selector
 | 
						|
	PodMode       string
 | 
						|
	ReverseCidrs  []net.IPNet
 | 
						|
	Fallthrough   bool
 | 
						|
	AutoPath
 | 
						|
	interfaceAddrsFunc func() net.IP
 | 
						|
}
 | 
						|
 | 
						|
// AutoPath enables server side search path lookups for pods
 | 
						|
type AutoPath struct {
 | 
						|
	Enabled        bool
 | 
						|
	NDots          int
 | 
						|
	ResolvConfFile string
 | 
						|
	HostSearchPath []string
 | 
						|
	OnNXDOMAIN     int
 | 
						|
}
 | 
						|
 | 
						|
const (
 | 
						|
	// PodModeDisabled is the default value where pod requests are ignored
 | 
						|
	PodModeDisabled = "disabled"
 | 
						|
	// PodModeVerified is where Pod requests are answered only if they exist
 | 
						|
	PodModeVerified = "verified"
 | 
						|
	// PodModeInsecure is where pod requests are answered without verfying they exist
 | 
						|
	PodModeInsecure = "insecure"
 | 
						|
	// DNSSchemaVersion is the schema version: https://github.com/kubernetes/dns/blob/master/docs/specification.md
 | 
						|
	DNSSchemaVersion = "1.0.1"
 | 
						|
)
 | 
						|
 | 
						|
type endpoint struct {
 | 
						|
	addr api.EndpointAddress
 | 
						|
	port api.EndpointPort
 | 
						|
}
 | 
						|
 | 
						|
type service struct {
 | 
						|
	name      string
 | 
						|
	namespace string
 | 
						|
	addr      string
 | 
						|
	ports     []api.ServicePort
 | 
						|
	endpoints []endpoint
 | 
						|
}
 | 
						|
 | 
						|
type pod struct {
 | 
						|
	name      string
 | 
						|
	namespace string
 | 
						|
	addr      string
 | 
						|
}
 | 
						|
 | 
						|
type recordRequest struct {
 | 
						|
	port       string
 | 
						|
	protocol   string
 | 
						|
	endpoint   string
 | 
						|
	service    string
 | 
						|
	namespace  string
 | 
						|
	typeName   string
 | 
						|
	zone       string
 | 
						|
	federation string
 | 
						|
}
 | 
						|
 | 
						|
var (
 | 
						|
	errNoItems           = errors.New("no items found")
 | 
						|
	errNsNotExposed      = errors.New("namespace is not exposed")
 | 
						|
	errInvalidRequest    = errors.New("invalid query name")
 | 
						|
	errZoneNotFound      = errors.New("zone not found")
 | 
						|
	errAPIBadPodType     = errors.New("expected type *api.Pod")
 | 
						|
	errPodsDisabled      = errors.New("pod records disabled")
 | 
						|
	errResolvConfReadErr = errors.New("resolv.conf read error")
 | 
						|
)
 | 
						|
 | 
						|
// Services implements the ServiceBackend interface.
 | 
						|
func (k *Kubernetes) Services(state request.Request, exact bool, opt middleware.Options) (svcs []msg.Service, debug []msg.Service, err error) {
 | 
						|
	r, e := k.parseRequest(state.Name(), state.QType())
 | 
						|
	if e != nil {
 | 
						|
		return nil, nil, e
 | 
						|
	}
 | 
						|
	switch state.Type() {
 | 
						|
	case "A", "AAAA", "CNAME":
 | 
						|
		if state.Type() == "A" && isDefaultNS(state.Name(), r) {
 | 
						|
			// If this is an A request for "ns.dns", respond with a "fake" record for coredns.
 | 
						|
			// SOA records always use this hardcoded name
 | 
						|
			svcs = append(svcs, k.defaultNSMsg(r))
 | 
						|
			return svcs, nil, nil
 | 
						|
		}
 | 
						|
		s, e := k.Entries(r)
 | 
						|
		if state.QType() == dns.TypeAAAA {
 | 
						|
			// AAAA not implemented
 | 
						|
			return nil, nil, e
 | 
						|
		}
 | 
						|
		return s, nil, e // Haven't implemented debug queries yet.
 | 
						|
	case "SRV":
 | 
						|
		s, e := k.Entries(r)
 | 
						|
		// SRV for external services is not yet implemented, so remove those records
 | 
						|
		noext := []msg.Service{}
 | 
						|
		for _, svc := range s {
 | 
						|
			if t, _ := svc.HostType(); t != dns.TypeCNAME {
 | 
						|
				noext = append(noext, svc)
 | 
						|
			}
 | 
						|
		}
 | 
						|
		return noext, nil, e
 | 
						|
	case "TXT":
 | 
						|
		if r.typeName == "dns-version" {
 | 
						|
			srv := k.recordsForTXT(r)
 | 
						|
			svcs = append(svcs, srv)
 | 
						|
		}
 | 
						|
		return svcs, nil, err
 | 
						|
	case "NS":
 | 
						|
		srv := k.recordsForNS(r)
 | 
						|
		svcs = append(svcs, srv)
 | 
						|
		return svcs, nil, err
 | 
						|
	}
 | 
						|
	return nil, nil, nil
 | 
						|
}
 | 
						|
 | 
						|
func (k *Kubernetes) recordsForTXT(r recordRequest) msg.Service {
 | 
						|
	return msg.Service{Text: DNSSchemaVersion, TTL: 28800,
 | 
						|
		Key: msg.Path(strings.Join([]string{r.typeName, r.zone}, "."), "coredns")}
 | 
						|
}
 | 
						|
 | 
						|
func (k *Kubernetes) recordsForNS(r recordRequest) msg.Service {
 | 
						|
	ns := k.coreDNSRecord()
 | 
						|
	return msg.Service{Host: ns.A.String(),
 | 
						|
		Key: msg.Path(strings.Join([]string{ns.Hdr.Name, r.zone}, "."), "coredns")}
 | 
						|
}
 | 
						|
 | 
						|
// PrimaryZone will return the first non-reverse zone being handled by this middleware
 | 
						|
func (k *Kubernetes) PrimaryZone() string {
 | 
						|
	return k.Zones[k.primaryZone]
 | 
						|
}
 | 
						|
 | 
						|
// Reverse implements the ServiceBackend interface.
 | 
						|
func (k *Kubernetes) Reverse(state request.Request, exact bool, opt middleware.Options) ([]msg.Service, []msg.Service, error) {
 | 
						|
 | 
						|
	ip := dnsutil.ExtractAddressFromReverse(state.Name())
 | 
						|
	if ip == "" {
 | 
						|
		return nil, nil, nil
 | 
						|
	}
 | 
						|
 | 
						|
	records := k.getServiceRecordForIP(ip, state.Name())
 | 
						|
	return records, nil, nil
 | 
						|
}
 | 
						|
 | 
						|
func (k *Kubernetes) isRequestInReverseRange(name string) bool {
 | 
						|
	ip := dnsutil.ExtractAddressFromReverse(name)
 | 
						|
	for _, c := range k.ReverseCidrs {
 | 
						|
		if c.Contains(net.ParseIP(ip)) {
 | 
						|
			return true
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return false
 | 
						|
}
 | 
						|
 | 
						|
// Lookup implements the ServiceBackend interface.
 | 
						|
func (k *Kubernetes) Lookup(state request.Request, name string, typ uint16) (*dns.Msg, error) {
 | 
						|
	return k.Proxy.Lookup(state, name, typ)
 | 
						|
}
 | 
						|
 | 
						|
// IsNameError implements the ServiceBackend interface.
 | 
						|
func (k *Kubernetes) IsNameError(err error) bool {
 | 
						|
	return err == errNoItems || err == errNsNotExposed || err == errInvalidRequest || err == errZoneNotFound
 | 
						|
}
 | 
						|
 | 
						|
// Debug implements the ServiceBackend interface.
 | 
						|
func (k *Kubernetes) Debug() string { return "debug" }
 | 
						|
 | 
						|
func (k *Kubernetes) getClientConfig() (*rest.Config, error) {
 | 
						|
	loadingRules := &clientcmd.ClientConfigLoadingRules{}
 | 
						|
	overrides := &clientcmd.ConfigOverrides{}
 | 
						|
	clusterinfo := clientcmdapi.Cluster{}
 | 
						|
	authinfo := clientcmdapi.AuthInfo{}
 | 
						|
	if len(k.APIEndpoint) > 0 {
 | 
						|
		clusterinfo.Server = k.APIEndpoint
 | 
						|
	} else {
 | 
						|
		cc, err := rest.InClusterConfig()
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
		return cc, err
 | 
						|
	}
 | 
						|
	if len(k.APICertAuth) > 0 {
 | 
						|
		clusterinfo.CertificateAuthority = k.APICertAuth
 | 
						|
	}
 | 
						|
	if len(k.APIClientCert) > 0 {
 | 
						|
		authinfo.ClientCertificate = k.APIClientCert
 | 
						|
	}
 | 
						|
	if len(k.APIClientKey) > 0 {
 | 
						|
		authinfo.ClientKey = k.APIClientKey
 | 
						|
	}
 | 
						|
	overrides.ClusterInfo = clusterinfo
 | 
						|
	overrides.AuthInfo = authinfo
 | 
						|
	clientConfig := clientcmd.NewNonInteractiveDeferredLoadingClientConfig(loadingRules, overrides)
 | 
						|
	return clientConfig.ClientConfig()
 | 
						|
}
 | 
						|
 | 
						|
// InitKubeCache initializes a new Kubernetes cache.
 | 
						|
func (k *Kubernetes) InitKubeCache() (err error) {
 | 
						|
 | 
						|
	config, err := k.getClientConfig()
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	kubeClient, err := kubernetes.NewForConfig(config)
 | 
						|
	if err != nil {
 | 
						|
		return fmt.Errorf("failed to create kubernetes notification controller: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	if k.LabelSelector != nil {
 | 
						|
		var selector labels.Selector
 | 
						|
		selector, err = unversionedapi.LabelSelectorAsSelector(k.LabelSelector)
 | 
						|
		k.Selector = &selector
 | 
						|
		if err != nil {
 | 
						|
			return fmt.Errorf("unable to create Selector for LabelSelector '%s'.Error was: %s", k.LabelSelector, err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if k.LabelSelector != nil {
 | 
						|
		log.Printf("[INFO] Kubernetes middleware configured with the label selector '%s'. Only kubernetes objects matching this label selector will be exposed.", unversionedapi.FormatLabelSelector(k.LabelSelector))
 | 
						|
	}
 | 
						|
 | 
						|
	opts := dnsControlOpts{
 | 
						|
		initPodCache: (k.PodMode == PodModeVerified || k.AutoPath.Enabled),
 | 
						|
	}
 | 
						|
	k.APIConn = newdnsController(kubeClient, k.ResyncPeriod, k.Selector, opts)
 | 
						|
 | 
						|
	return err
 | 
						|
}
 | 
						|
 | 
						|
func (k *Kubernetes) parseRequest(lowerCasedName string, qtype uint16) (r recordRequest, err error) {
 | 
						|
	// 3 Possible cases
 | 
						|
	//   SRV Request: _port._protocol.service.namespace.[federation.]type.zone
 | 
						|
	//   A Request (endpoint): endpoint.service.namespace.[federation.]type.zone
 | 
						|
	//   A Request (service): service.namespace.[federation.]type.zone
 | 
						|
 | 
						|
	// separate zone from rest of lowerCasedName
 | 
						|
	var segs []string
 | 
						|
	for _, z := range k.Zones {
 | 
						|
		if dns.IsSubDomain(z, lowerCasedName) {
 | 
						|
			r.zone = z
 | 
						|
 | 
						|
			segs = dns.SplitDomainName(lowerCasedName)
 | 
						|
			segs = segs[:len(segs)-dns.CountLabel(r.zone)]
 | 
						|
			break
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if r.zone == "" {
 | 
						|
		return r, errZoneNotFound
 | 
						|
	}
 | 
						|
 | 
						|
	r.federation, segs = k.stripFederation(segs)
 | 
						|
 | 
						|
	if qtype == dns.TypeNS {
 | 
						|
		return r, nil
 | 
						|
	}
 | 
						|
 | 
						|
	if qtype == dns.TypeA && isDefaultNS(lowerCasedName, r) {
 | 
						|
		return r, nil
 | 
						|
	}
 | 
						|
 | 
						|
	offset := 0
 | 
						|
	if qtype == dns.TypeSRV {
 | 
						|
		// The kubernetes peer-finder expects queries with empty port and service to resolve
 | 
						|
		// If neither is specified, treat it as a wildcard
 | 
						|
		if len(segs) == 3 {
 | 
						|
			r.port = "*"
 | 
						|
			r.service = "*"
 | 
						|
			offset = 0
 | 
						|
		} else {
 | 
						|
			if len(segs) != 5 {
 | 
						|
				return r, errInvalidRequest
 | 
						|
			}
 | 
						|
			// This is a SRV style request, get first two elements as port and
 | 
						|
			// protocol, stripping leading underscores if present.
 | 
						|
			if segs[0][0] == '_' {
 | 
						|
				r.port = segs[0][1:]
 | 
						|
			} else {
 | 
						|
				r.port = segs[0]
 | 
						|
				if !symbolContainsWildcard(r.port) {
 | 
						|
					return r, errInvalidRequest
 | 
						|
				}
 | 
						|
			}
 | 
						|
			if segs[1][0] == '_' {
 | 
						|
				r.protocol = segs[1][1:]
 | 
						|
				if r.protocol != "tcp" && r.protocol != "udp" {
 | 
						|
					return r, errInvalidRequest
 | 
						|
				}
 | 
						|
			} else {
 | 
						|
				r.protocol = segs[1]
 | 
						|
				if !symbolContainsWildcard(r.protocol) {
 | 
						|
					return r, errInvalidRequest
 | 
						|
				}
 | 
						|
			}
 | 
						|
			if r.port == "" || r.protocol == "" {
 | 
						|
				return r, errInvalidRequest
 | 
						|
			}
 | 
						|
			offset = 2
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if (qtype == dns.TypeA || qtype == dns.TypeAAAA) && len(segs) == 4 {
 | 
						|
		// This is an endpoint A/AAAA record request. Get first element as endpoint.
 | 
						|
		r.endpoint = segs[0]
 | 
						|
		offset = 1
 | 
						|
	}
 | 
						|
 | 
						|
	if len(segs) == (offset + 3) {
 | 
						|
		r.service = segs[offset]
 | 
						|
		r.namespace = segs[offset+1]
 | 
						|
		r.typeName = segs[offset+2]
 | 
						|
 | 
						|
		return r, nil
 | 
						|
	}
 | 
						|
 | 
						|
	if len(segs) == 1 && qtype == dns.TypeTXT {
 | 
						|
		r.typeName = segs[0]
 | 
						|
		return r, nil
 | 
						|
	}
 | 
						|
 | 
						|
	return r, errInvalidRequest
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
// Records not implemented, see Entries().
 | 
						|
func (k *Kubernetes) Records(name string, exact bool) ([]msg.Service, error) {
 | 
						|
	return nil, fmt.Errorf("NOOP")
 | 
						|
}
 | 
						|
 | 
						|
// Entries looks up services in kubernetes. If exact is true, it will lookup
 | 
						|
// just this name. This is used when find matches when completing SRV lookups
 | 
						|
// for instance.
 | 
						|
func (k *Kubernetes) Entries(r recordRequest) ([]msg.Service, error) {
 | 
						|
 | 
						|
	// Abort if the namespace does not contain a wildcard, and namespace is not published per CoreFile
 | 
						|
	// Case where namespace contains a wildcard is handled in Get(...) method.
 | 
						|
	if (!symbolContainsWildcard(r.namespace)) && (len(k.Namespaces) > 0) && (!dnsstrings.StringInSlice(r.namespace, k.Namespaces)) {
 | 
						|
		return nil, errNsNotExposed
 | 
						|
	}
 | 
						|
	services, pods, err := k.get(r)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	if len(services) == 0 && len(pods) == 0 {
 | 
						|
		// Did not find item in k8s, try federated
 | 
						|
		if r.federation != "" {
 | 
						|
			fedCNAME := k.federationCNAMERecord(r)
 | 
						|
			if fedCNAME.Key != "" {
 | 
						|
				return []msg.Service{fedCNAME}, nil
 | 
						|
			}
 | 
						|
		}
 | 
						|
		return nil, errNoItems
 | 
						|
	}
 | 
						|
 | 
						|
	records := k.getRecordsForK8sItems(services, pods, r)
 | 
						|
 | 
						|
	return records, nil
 | 
						|
}
 | 
						|
 | 
						|
func endpointHostname(addr api.EndpointAddress) string {
 | 
						|
	if addr.Hostname != "" {
 | 
						|
		return strings.ToLower(addr.Hostname)
 | 
						|
	}
 | 
						|
	if strings.Contains(addr.IP, ".") {
 | 
						|
		return strings.Replace(addr.IP, ".", "-", -1)
 | 
						|
	}
 | 
						|
	if strings.Contains(addr.IP, ":") {
 | 
						|
		return strings.ToLower(strings.Replace(addr.IP, ":", "-", -1))
 | 
						|
	}
 | 
						|
	return ""
 | 
						|
}
 | 
						|
 | 
						|
func (k *Kubernetes) getRecordsForK8sItems(services []service, pods []pod, r recordRequest) (records []msg.Service) {
 | 
						|
	zonePath := msg.Path(r.zone, "coredns")
 | 
						|
 | 
						|
	for _, svc := range services {
 | 
						|
		if svc.addr == api.ClusterIPNone || len(svc.endpoints) > 0 {
 | 
						|
			// This is a headless service or endpoints are present, create records for each endpoint
 | 
						|
			for _, ep := range svc.endpoints {
 | 
						|
				s := msg.Service{
 | 
						|
					Host: ep.addr.IP,
 | 
						|
					Port: int(ep.port.Port),
 | 
						|
				}
 | 
						|
				if r.federation != "" {
 | 
						|
					s.Key = strings.Join([]string{zonePath, Svc, r.federation, svc.namespace, svc.name, endpointHostname(ep.addr)}, "/")
 | 
						|
				} else {
 | 
						|
					s.Key = strings.Join([]string{zonePath, Svc, svc.namespace, svc.name, endpointHostname(ep.addr)}, "/")
 | 
						|
				}
 | 
						|
				records = append(records, s)
 | 
						|
			}
 | 
						|
		} else {
 | 
						|
			// Create records for each exposed port...
 | 
						|
			for _, p := range svc.ports {
 | 
						|
				s := msg.Service{
 | 
						|
					Host: svc.addr,
 | 
						|
					Port: int(p.Port)}
 | 
						|
 | 
						|
				if r.federation != "" {
 | 
						|
					s.Key = strings.Join([]string{zonePath, Svc, r.federation, svc.namespace, svc.name}, "/")
 | 
						|
				} else {
 | 
						|
					s.Key = strings.Join([]string{zonePath, Svc, svc.namespace, svc.name}, "/")
 | 
						|
				}
 | 
						|
 | 
						|
				records = append(records, s)
 | 
						|
			}
 | 
						|
			// If the addr is not an IP (i.e. an external service), add the record ...
 | 
						|
			s := msg.Service{
 | 
						|
				Key:  strings.Join([]string{zonePath, Svc, svc.namespace, svc.name}, "/"),
 | 
						|
				Host: svc.addr}
 | 
						|
			if t, _ := s.HostType(); t == dns.TypeCNAME {
 | 
						|
				if r.federation != "" {
 | 
						|
					s.Key = strings.Join([]string{zonePath, Svc, r.federation, svc.namespace, svc.name}, "/")
 | 
						|
				} else {
 | 
						|
					s.Key = strings.Join([]string{zonePath, Svc, svc.namespace, svc.name}, "/")
 | 
						|
				}
 | 
						|
				records = append(records, s)
 | 
						|
			}
 | 
						|
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	for _, p := range pods {
 | 
						|
		s := msg.Service{
 | 
						|
			Key:  strings.Join([]string{zonePath, Pod, p.namespace, p.name}, "/"),
 | 
						|
			Host: p.addr,
 | 
						|
		}
 | 
						|
		records = append(records, s)
 | 
						|
	}
 | 
						|
 | 
						|
	return records
 | 
						|
}
 | 
						|
 | 
						|
func ipFromPodName(podname string) string {
 | 
						|
	if strings.Count(podname, "-") == 3 && !strings.Contains(podname, "--") {
 | 
						|
		return strings.Replace(podname, "-", ".", -1)
 | 
						|
	}
 | 
						|
	return strings.Replace(podname, "-", ":", -1)
 | 
						|
}
 | 
						|
 | 
						|
func (k *Kubernetes) findPodWithIP(ip string) (p *api.Pod) {
 | 
						|
	if !k.AutoPath.Enabled {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
	objList := k.APIConn.PodIndex(ip)
 | 
						|
	for _, o := range objList {
 | 
						|
		p, ok := o.(*api.Pod)
 | 
						|
		if !ok {
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
		return p
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func (k *Kubernetes) findPods(namespace, podname string) (pods []pod, err error) {
 | 
						|
	if k.PodMode == PodModeDisabled {
 | 
						|
		return pods, errPodsDisabled
 | 
						|
	}
 | 
						|
 | 
						|
	var ip string
 | 
						|
	if strings.Count(podname, "-") == 3 && !strings.Contains(podname, "--") {
 | 
						|
		ip = strings.Replace(podname, "-", ".", -1)
 | 
						|
	} else {
 | 
						|
		ip = strings.Replace(podname, "-", ":", -1)
 | 
						|
	}
 | 
						|
 | 
						|
	if k.PodMode == PodModeInsecure {
 | 
						|
		s := pod{name: podname, namespace: namespace, addr: ip}
 | 
						|
		pods = append(pods, s)
 | 
						|
		return pods, nil
 | 
						|
	}
 | 
						|
 | 
						|
	// PodModeVerified
 | 
						|
	objList := k.APIConn.PodIndex(ip)
 | 
						|
 | 
						|
	nsWildcard := symbolContainsWildcard(namespace)
 | 
						|
	for _, o := range objList {
 | 
						|
		p, ok := o.(*api.Pod)
 | 
						|
		if !ok {
 | 
						|
			return nil, errAPIBadPodType
 | 
						|
		}
 | 
						|
		// If namespace has a wildcard, filter results against Corefile namespace list.
 | 
						|
		if nsWildcard && (len(k.Namespaces) > 0) && (!dnsstrings.StringInSlice(p.Namespace, k.Namespaces)) {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		// check for matching ip and namespace
 | 
						|
		if ip == p.Status.PodIP && symbolMatches(namespace, p.Namespace, nsWildcard) {
 | 
						|
			s := pod{name: podname, namespace: namespace, addr: ip}
 | 
						|
			pods = append(pods, s)
 | 
						|
			return pods, nil
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return pods, nil
 | 
						|
}
 | 
						|
 | 
						|
// get retrieves matching data from the cache.
 | 
						|
func (k *Kubernetes) get(r recordRequest) (services []service, pods []pod, err error) {
 | 
						|
	switch {
 | 
						|
	case r.typeName == Pod:
 | 
						|
		pods, err = k.findPods(r.namespace, r.service)
 | 
						|
		return nil, pods, err
 | 
						|
	default:
 | 
						|
		services, err = k.findServices(r)
 | 
						|
		return services, nil, err
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func (k *Kubernetes) findServices(r recordRequest) ([]service, error) {
 | 
						|
	serviceList := k.APIConn.ServiceList()
 | 
						|
	var resultItems []service
 | 
						|
 | 
						|
	nsWildcard := symbolContainsWildcard(r.namespace)
 | 
						|
	serviceWildcard := symbolContainsWildcard(r.service)
 | 
						|
	portWildcard := symbolContainsWildcard(r.port) || r.port == ""
 | 
						|
	protocolWildcard := symbolContainsWildcard(r.protocol) || r.protocol == ""
 | 
						|
 | 
						|
	for _, svc := range serviceList {
 | 
						|
		if !(symbolMatches(r.namespace, svc.Namespace, nsWildcard) && symbolMatches(r.service, svc.Name, serviceWildcard)) {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		// If namespace has a wildcard, filter results against Corefile namespace list.
 | 
						|
		// (Namespaces without a wildcard were filtered before the call to this function.)
 | 
						|
		if nsWildcard && (len(k.Namespaces) > 0) && (!dnsstrings.StringInSlice(svc.Namespace, k.Namespaces)) {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		s := service{name: svc.Name, namespace: svc.Namespace}
 | 
						|
 | 
						|
		// Endpoint query or headless service
 | 
						|
		if svc.Spec.ClusterIP == api.ClusterIPNone || r.endpoint != "" {
 | 
						|
			s.addr = svc.Spec.ClusterIP
 | 
						|
			endpointsList := k.APIConn.EndpointsList()
 | 
						|
			for _, ep := range endpointsList.Items {
 | 
						|
				if ep.ObjectMeta.Name != svc.Name || ep.ObjectMeta.Namespace != svc.Namespace {
 | 
						|
					continue
 | 
						|
				}
 | 
						|
				for _, eps := range ep.Subsets {
 | 
						|
					for _, addr := range eps.Addresses {
 | 
						|
						for _, p := range eps.Ports {
 | 
						|
							ephostname := endpointHostname(addr)
 | 
						|
							if r.endpoint != "" && r.endpoint != ephostname {
 | 
						|
								continue
 | 
						|
							}
 | 
						|
							if !(symbolMatches(r.port, strings.ToLower(p.Name), portWildcard) && symbolMatches(r.protocol, strings.ToLower(string(p.Protocol)), protocolWildcard)) {
 | 
						|
								continue
 | 
						|
							}
 | 
						|
							s.endpoints = append(s.endpoints, endpoint{addr: addr, port: p})
 | 
						|
						}
 | 
						|
					}
 | 
						|
				}
 | 
						|
			}
 | 
						|
			if len(s.endpoints) > 0 {
 | 
						|
				resultItems = append(resultItems, s)
 | 
						|
			}
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		// External service
 | 
						|
		if svc.Spec.ExternalName != "" {
 | 
						|
			s.addr = svc.Spec.ExternalName
 | 
						|
			resultItems = append(resultItems, s)
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		// ClusterIP service
 | 
						|
		s.addr = svc.Spec.ClusterIP
 | 
						|
		for _, p := range svc.Spec.Ports {
 | 
						|
			if !(symbolMatches(r.port, strings.ToLower(p.Name), portWildcard) && symbolMatches(r.protocol, strings.ToLower(string(p.Protocol)), protocolWildcard)) {
 | 
						|
				continue
 | 
						|
			}
 | 
						|
			s.ports = append(s.ports, p)
 | 
						|
		}
 | 
						|
 | 
						|
		resultItems = append(resultItems, s)
 | 
						|
	}
 | 
						|
	return resultItems, nil
 | 
						|
}
 | 
						|
 | 
						|
func symbolMatches(queryString, candidateString string, wildcard bool) bool {
 | 
						|
	if wildcard {
 | 
						|
		return true
 | 
						|
	}
 | 
						|
	return queryString == candidateString
 | 
						|
}
 | 
						|
 | 
						|
// getServiceRecordForIP: Gets a service record with a cluster ip matching the ip argument
 | 
						|
// If a service cluster ip does not match, it checks all endpoints
 | 
						|
func (k *Kubernetes) getServiceRecordForIP(ip, name string) []msg.Service {
 | 
						|
	// First check services with cluster ips
 | 
						|
	svcList := k.APIConn.ServiceList()
 | 
						|
 | 
						|
	for _, service := range svcList {
 | 
						|
		if (len(k.Namespaces) > 0) && !dnsstrings.StringInSlice(service.Namespace, k.Namespaces) {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		if service.Spec.ClusterIP == ip {
 | 
						|
			domain := strings.Join([]string{service.Name, service.Namespace, Svc, k.PrimaryZone()}, ".")
 | 
						|
			return []msg.Service{{Host: domain}}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	// If no cluster ips match, search endpoints
 | 
						|
	epList := k.APIConn.EndpointsList()
 | 
						|
	for _, ep := range epList.Items {
 | 
						|
		if (len(k.Namespaces) > 0) && !dnsstrings.StringInSlice(ep.ObjectMeta.Namespace, k.Namespaces) {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		for _, eps := range ep.Subsets {
 | 
						|
			for _, addr := range eps.Addresses {
 | 
						|
				if addr.IP == ip {
 | 
						|
					domain := strings.Join([]string{endpointHostname(addr), ep.ObjectMeta.Name, ep.ObjectMeta.Namespace, Svc, k.PrimaryZone()}, ".")
 | 
						|
					return []msg.Service{{Host: domain}}
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// symbolContainsWildcard checks whether symbol contains a wildcard value
 | 
						|
func symbolContainsWildcard(symbol string) bool {
 | 
						|
	return (symbol == "*" || symbol == "any")
 | 
						|
}
 | 
						|
 | 
						|
func localPodIP() net.IP {
 | 
						|
	addrs, err := net.InterfaceAddrs()
 | 
						|
	if err != nil {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	for _, addr := range addrs {
 | 
						|
		ip, _, _ := net.ParseCIDR(addr.String())
 | 
						|
		ip = ip.To4()
 | 
						|
		if ip == nil || ip.IsLoopback() {
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		return ip
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func splitSearch(zone, question, namespace string) (name, search string, ok bool) {
 | 
						|
	search = strings.Join([]string{namespace, Svc, zone}, ".")
 | 
						|
	if dns.IsSubDomain(search, question) {
 | 
						|
		return question[:len(question)-len(search)-1], search, true
 | 
						|
	}
 | 
						|
	return "", "", false
 | 
						|
}
 | 
						|
 | 
						|
const (
 | 
						|
	// Svc is the DNS schema for kubernetes services
 | 
						|
	Svc = "svc"
 | 
						|
	// Pod is the DNS schema for kubernetes pods
 | 
						|
	Pod = "pod"
 | 
						|
)
 |