mirror of
				https://github.com/coredns/coredns.git
				synced 2025-10-31 02:03:20 -04:00 
			
		
		
		
	* Add part 1 watch functionality. (squashed) * add funcs for service/endpoint fqdns * add endpoints watch * document exposed funcs * only send subset deltas * locking for watch map * tests and docs * add pod watch * remove debugs prints * feedback part 1 * add error reporting to proto * inform clients of server stop+errors * add grpc options param * use proper context * Review feedback: * Removed client (will move to another repo) * Use new log functions * Change watchChan to be for string not []string * Rework how k8s plugin stores watch tracking info to simplify * Normalize the qname on watch request * Add blank line back * Revert another spurious change * Fix tests * Add stop channel. Fix tests. Better docs for plugin interface. * fmt.Printf -> log.Warningf * Move from dnsserver to plugin/pkg/watch * gofmt * remove dead client watches * sate linter * linter omg
		
			
				
	
	
		
			182 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			182 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package dnsserver
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"crypto/tls"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"net"
 | |
| 
 | |
| 	"github.com/coredns/coredns/pb"
 | |
| 	"github.com/coredns/coredns/plugin/pkg/watch"
 | |
| 
 | |
| 	"github.com/grpc-ecosystem/grpc-opentracing/go/otgrpc"
 | |
| 	"github.com/miekg/dns"
 | |
| 	"github.com/opentracing/opentracing-go"
 | |
| 	"google.golang.org/grpc"
 | |
| 	"google.golang.org/grpc/peer"
 | |
| )
 | |
| 
 | |
| // ServergRPC represents an instance of a DNS-over-gRPC server.
 | |
| type ServergRPC struct {
 | |
| 	*Server
 | |
| 	grpcServer *grpc.Server
 | |
| 	listenAddr net.Addr
 | |
| 	tlsConfig  *tls.Config
 | |
| 	watch      watch.Watcher
 | |
| }
 | |
| 
 | |
| // NewServergRPC returns a new CoreDNS GRPC server and compiles all plugin in to it.
 | |
| func NewServergRPC(addr string, group []*Config) (*ServergRPC, error) {
 | |
| 	s, err := NewServer(addr, group)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	// The *tls* plugin must make sure that multiple conflicting
 | |
| 	// TLS configuration return an error: it can only be specified once.
 | |
| 	var tlsConfig *tls.Config
 | |
| 	for _, conf := range s.zones {
 | |
| 		// Should we error if some configs *don't* have TLS?
 | |
| 		tlsConfig = conf.TLSConfig
 | |
| 	}
 | |
| 
 | |
| 	return &ServergRPC{Server: s, tlsConfig: tlsConfig, watch: watch.NewWatcher(watchables(s.zones))}, nil
 | |
| }
 | |
| 
 | |
| // Serve implements caddy.TCPServer interface.
 | |
| func (s *ServergRPC) Serve(l net.Listener) error {
 | |
| 	s.m.Lock()
 | |
| 	s.listenAddr = l.Addr()
 | |
| 	s.m.Unlock()
 | |
| 
 | |
| 	if s.Tracer() != nil {
 | |
| 		onlyIfParent := func(parentSpanCtx opentracing.SpanContext, method string, req, resp interface{}) bool {
 | |
| 			return parentSpanCtx != nil
 | |
| 		}
 | |
| 		intercept := otgrpc.OpenTracingServerInterceptor(s.Tracer(), otgrpc.IncludingSpans(onlyIfParent))
 | |
| 		s.grpcServer = grpc.NewServer(grpc.UnaryInterceptor(intercept))
 | |
| 	} else {
 | |
| 		s.grpcServer = grpc.NewServer()
 | |
| 	}
 | |
| 
 | |
| 	pb.RegisterDnsServiceServer(s.grpcServer, s)
 | |
| 
 | |
| 	if s.tlsConfig != nil {
 | |
| 		l = tls.NewListener(l, s.tlsConfig)
 | |
| 	}
 | |
| 	return s.grpcServer.Serve(l)
 | |
| }
 | |
| 
 | |
| // ServePacket implements caddy.UDPServer interface.
 | |
| func (s *ServergRPC) ServePacket(p net.PacketConn) error { return nil }
 | |
| 
 | |
| // Listen implements caddy.TCPServer interface.
 | |
| func (s *ServergRPC) Listen() (net.Listener, error) {
 | |
| 
 | |
| 	l, err := net.Listen("tcp", s.Addr[len(TransportGRPC+"://"):])
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return l, nil
 | |
| }
 | |
| 
 | |
| // ListenPacket implements caddy.UDPServer interface.
 | |
| func (s *ServergRPC) ListenPacket() (net.PacketConn, error) { return nil, nil }
 | |
| 
 | |
| // OnStartupComplete lists the sites served by this server
 | |
| // and any relevant information, assuming Quiet is false.
 | |
| func (s *ServergRPC) OnStartupComplete() {
 | |
| 	if Quiet {
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	out := startUpZones(TransportGRPC+"://", s.Addr, s.zones)
 | |
| 	if out != "" {
 | |
| 		fmt.Print(out)
 | |
| 	}
 | |
| 	return
 | |
| }
 | |
| 
 | |
| // Stop stops the server. It blocks until the server is
 | |
| // totally stopped.
 | |
| func (s *ServergRPC) Stop() (err error) {
 | |
| 	s.m.Lock()
 | |
| 	defer s.m.Unlock()
 | |
| 	if s.watch != nil {
 | |
| 		s.watch.Stop()
 | |
| 	}
 | |
| 	if s.grpcServer != nil {
 | |
| 		s.grpcServer.GracefulStop()
 | |
| 	}
 | |
| 	return
 | |
| }
 | |
| 
 | |
| // Query is the main entry-point into the gRPC server. From here we call ServeDNS like
 | |
| // any normal server. We use a custom responseWriter to pick up the bytes we need to write
 | |
| // back to the client as a protobuf.
 | |
| func (s *ServergRPC) Query(ctx context.Context, in *pb.DnsPacket) (*pb.DnsPacket, error) {
 | |
| 	msg := new(dns.Msg)
 | |
| 	err := msg.Unpack(in.Msg)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	p, ok := peer.FromContext(ctx)
 | |
| 	if !ok {
 | |
| 		return nil, errors.New("no peer in gRPC context")
 | |
| 	}
 | |
| 
 | |
| 	a, ok := p.Addr.(*net.TCPAddr)
 | |
| 	if !ok {
 | |
| 		return nil, fmt.Errorf("no TCP peer in gRPC context: %v", p.Addr)
 | |
| 	}
 | |
| 
 | |
| 	w := &gRPCresponse{localAddr: s.listenAddr, remoteAddr: a, Msg: msg}
 | |
| 
 | |
| 	s.ServeDNS(ctx, w, msg)
 | |
| 
 | |
| 	packed, err := w.Msg.Pack()
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	return &pb.DnsPacket{Msg: packed}, nil
 | |
| }
 | |
| 
 | |
| // Watch is the entrypoint called by the gRPC layer when the user asks
 | |
| // to watch a query.
 | |
| func (s *ServergRPC) Watch(stream pb.DnsService_WatchServer) error {
 | |
| 	return s.watch.Watch(stream)
 | |
| }
 | |
| 
 | |
| // Shutdown stops the server (non gracefully).
 | |
| func (s *ServergRPC) Shutdown() error {
 | |
| 	if s.grpcServer != nil {
 | |
| 		s.grpcServer.Stop()
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| type gRPCresponse struct {
 | |
| 	localAddr  net.Addr
 | |
| 	remoteAddr net.Addr
 | |
| 	Msg        *dns.Msg
 | |
| }
 | |
| 
 | |
| // Write is the hack that makes this work. It does not actually write the message
 | |
| // but returns the bytes we need to to write in r. We can then pick this up in Query
 | |
| // and write a proper protobuf back to the client.
 | |
| func (r *gRPCresponse) Write(b []byte) (int, error) {
 | |
| 	r.Msg = new(dns.Msg)
 | |
| 	return len(b), r.Msg.Unpack(b)
 | |
| }
 | |
| 
 | |
| // These methods implement the dns.ResponseWriter interface from Go DNS.
 | |
| func (r *gRPCresponse) Close() error              { return nil }
 | |
| func (r *gRPCresponse) TsigStatus() error         { return nil }
 | |
| func (r *gRPCresponse) TsigTimersOnly(b bool)     { return }
 | |
| func (r *gRPCresponse) Hijack()                   { return }
 | |
| func (r *gRPCresponse) LocalAddr() net.Addr       { return r.localAddr }
 | |
| func (r *gRPCresponse) RemoteAddr() net.Addr      { return r.remoteAddr }
 | |
| func (r *gRPCresponse) WriteMsg(m *dns.Msg) error { r.Msg = m; return nil }
 |