mirror of
				https://github.com/coredns/coredns.git
				synced 2025-11-03 18:53:13 -05:00 
			
		
		
		
	* Make the RD-flag in health-checks in the Forward-plugin configurable Introduces a new configuration flag; `health_check_non_recursive`. This flag makes the health-checker do non-recursive requests when checking the health of upstream servers. Signed-off-by: Geir Haugom <ghagit@haugom.org> Signed-off-by: Christian Tryti <ctryti@gmail.com> * Changes after feedback from reviewer * Better tests of health-checks with and without recursion * Removed the health_check_non_recursive configuration in favor of extending the existing health_check configuration. Now supports an optional `no_rec` argument. Signed-off-by: Christian Tryti <ctryti@gmail.com> * Add new test that checks setup of health_check. Signed-off-by: Christian Tryti <ctryti@gmail.com>
		
			
				
	
	
		
			87 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			87 lines
		
	
	
		
			2.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package forward
 | 
						|
 | 
						|
import (
 | 
						|
	"crypto/tls"
 | 
						|
	"sync/atomic"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/coredns/coredns/plugin/pkg/transport"
 | 
						|
 | 
						|
	"github.com/miekg/dns"
 | 
						|
)
 | 
						|
 | 
						|
// HealthChecker checks the upstream health.
 | 
						|
type HealthChecker interface {
 | 
						|
	Check(*Proxy) error
 | 
						|
	SetTLSConfig(*tls.Config)
 | 
						|
	SetRecursionDesired(bool)
 | 
						|
	GetRecursionDesired() bool
 | 
						|
}
 | 
						|
 | 
						|
// dnsHc is a health checker for a DNS endpoint (DNS, and DoT).
 | 
						|
type dnsHc struct {
 | 
						|
	c                *dns.Client
 | 
						|
	recursionDesired bool
 | 
						|
}
 | 
						|
 | 
						|
// NewHealthChecker returns a new HealthChecker based on transport.
 | 
						|
func NewHealthChecker(trans string, recursionDesired bool) HealthChecker {
 | 
						|
	switch trans {
 | 
						|
	case transport.DNS, transport.TLS:
 | 
						|
		c := new(dns.Client)
 | 
						|
		c.Net = "udp"
 | 
						|
		c.ReadTimeout = 1 * time.Second
 | 
						|
		c.WriteTimeout = 1 * time.Second
 | 
						|
 | 
						|
		return &dnsHc{c: c, recursionDesired: recursionDesired}
 | 
						|
	}
 | 
						|
 | 
						|
	log.Warningf("No healthchecker for transport %q", trans)
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func (h *dnsHc) SetTLSConfig(cfg *tls.Config) {
 | 
						|
	h.c.Net = "tcp-tls"
 | 
						|
	h.c.TLSConfig = cfg
 | 
						|
}
 | 
						|
 | 
						|
func (h *dnsHc) SetRecursionDesired(recursionDesired bool) {
 | 
						|
	h.recursionDesired = recursionDesired
 | 
						|
}
 | 
						|
func (h *dnsHc) GetRecursionDesired() bool {
 | 
						|
	return h.recursionDesired
 | 
						|
}
 | 
						|
 | 
						|
// For HC we send to . IN NS +[no]rec message to the upstream. Dial timeouts and empty
 | 
						|
// replies are considered fails, basically anything else constitutes a healthy upstream.
 | 
						|
 | 
						|
// Check is used as the up.Func in the up.Probe.
 | 
						|
func (h *dnsHc) Check(p *Proxy) error {
 | 
						|
	err := h.send(p.addr)
 | 
						|
	if err != nil {
 | 
						|
		HealthcheckFailureCount.WithLabelValues(p.addr).Add(1)
 | 
						|
		atomic.AddUint32(&p.fails, 1)
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	atomic.StoreUint32(&p.fails, 0)
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func (h *dnsHc) send(addr string) error {
 | 
						|
	ping := new(dns.Msg)
 | 
						|
	ping.SetQuestion(".", dns.TypeNS)
 | 
						|
	ping.MsgHdr.RecursionDesired = h.recursionDesired
 | 
						|
 | 
						|
	m, _, err := h.c.Exchange(ping, addr)
 | 
						|
	// If we got a header, we're alright, basically only care about I/O errors 'n stuff.
 | 
						|
	if err != nil && m != nil {
 | 
						|
		// Silly check, something sane came back.
 | 
						|
		if m.Response || m.Opcode == dns.OpcodeQuery {
 | 
						|
			err = nil
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return err
 | 
						|
}
 |