mirror of
				https://github.com/coredns/coredns.git
				synced 2025-11-03 18:53:13 -05:00 
			
		
		
		
	
		
			
				
	
	
		
			344 lines
		
	
	
		
			7.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			344 lines
		
	
	
		
			7.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package forward
 | 
						|
 | 
						|
import (
 | 
						|
	"crypto/tls"
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"path/filepath"
 | 
						|
	"strconv"
 | 
						|
	"strings"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/coredns/caddy"
 | 
						|
	"github.com/coredns/coredns/core/dnsserver"
 | 
						|
	"github.com/coredns/coredns/plugin"
 | 
						|
	"github.com/coredns/coredns/plugin/dnstap"
 | 
						|
	"github.com/coredns/coredns/plugin/pkg/parse"
 | 
						|
	"github.com/coredns/coredns/plugin/pkg/proxy"
 | 
						|
	pkgtls "github.com/coredns/coredns/plugin/pkg/tls"
 | 
						|
	"github.com/coredns/coredns/plugin/pkg/transport"
 | 
						|
 | 
						|
	"github.com/miekg/dns"
 | 
						|
)
 | 
						|
 | 
						|
func init() {
 | 
						|
	plugin.Register("forward", setup)
 | 
						|
}
 | 
						|
 | 
						|
func setup(c *caddy.Controller) error {
 | 
						|
	fs, err := parseForward(c)
 | 
						|
	if err != nil {
 | 
						|
		return plugin.Error("forward", err)
 | 
						|
	}
 | 
						|
	for i := range fs {
 | 
						|
		f := fs[i]
 | 
						|
		if f.Len() > max {
 | 
						|
			return plugin.Error("forward", fmt.Errorf("more than %d TOs configured: %d", max, f.Len()))
 | 
						|
		}
 | 
						|
 | 
						|
		if i == len(fs)-1 {
 | 
						|
			// last forward: point next to next plugin
 | 
						|
			dnsserver.GetConfig(c).AddPlugin(func(next plugin.Handler) plugin.Handler {
 | 
						|
				f.Next = next
 | 
						|
				return f
 | 
						|
			})
 | 
						|
		} else {
 | 
						|
			// middle forward: point next to next forward
 | 
						|
			nextForward := fs[i+1]
 | 
						|
			dnsserver.GetConfig(c).AddPlugin(func(plugin.Handler) plugin.Handler {
 | 
						|
				f.Next = nextForward
 | 
						|
				return f
 | 
						|
			})
 | 
						|
		}
 | 
						|
 | 
						|
		c.OnStartup(func() error {
 | 
						|
			return f.OnStartup()
 | 
						|
		})
 | 
						|
		c.OnStartup(func() error {
 | 
						|
			if taph := dnsserver.GetConfig(c).Handler("dnstap"); taph != nil {
 | 
						|
				f.SetTapPlugin(taph.(*dnstap.Dnstap))
 | 
						|
			}
 | 
						|
			return nil
 | 
						|
		})
 | 
						|
 | 
						|
		c.OnShutdown(func() error {
 | 
						|
			return f.OnShutdown()
 | 
						|
		})
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// OnStartup starts a goroutines for all proxies.
 | 
						|
func (f *Forward) OnStartup() (err error) {
 | 
						|
	for _, p := range f.proxies {
 | 
						|
		p.Start(f.hcInterval)
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// OnShutdown stops all configured proxies.
 | 
						|
func (f *Forward) OnShutdown() error {
 | 
						|
	for _, p := range f.proxies {
 | 
						|
		p.Stop()
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func parseForward(c *caddy.Controller) ([]*Forward, error) {
 | 
						|
	var fs = []*Forward{}
 | 
						|
	for c.Next() {
 | 
						|
		f, err := parseStanza(c)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
		fs = append(fs, f)
 | 
						|
	}
 | 
						|
	return fs, nil
 | 
						|
}
 | 
						|
 | 
						|
func parseStanza(c *caddy.Controller) (*Forward, error) {
 | 
						|
	f := New()
 | 
						|
 | 
						|
	if !c.Args(&f.from) {
 | 
						|
		return f, c.ArgErr()
 | 
						|
	}
 | 
						|
	origFrom := f.from
 | 
						|
	zones := plugin.Host(f.from).NormalizeExact()
 | 
						|
	if len(zones) == 0 {
 | 
						|
		return f, fmt.Errorf("unable to normalize '%s'", f.from)
 | 
						|
	}
 | 
						|
	f.from = zones[0] // there can only be one here, won't work with non-octet reverse
 | 
						|
 | 
						|
	if len(zones) > 1 {
 | 
						|
		log.Warningf("Unsupported CIDR notation: '%s' expands to multiple zones. Using only '%s'.", origFrom, f.from)
 | 
						|
	}
 | 
						|
 | 
						|
	to := c.RemainingArgs()
 | 
						|
	if len(to) == 0 {
 | 
						|
		return f, c.ArgErr()
 | 
						|
	}
 | 
						|
 | 
						|
	toHosts, err := parse.HostPortOrFile(to...)
 | 
						|
	if err != nil {
 | 
						|
		return f, err
 | 
						|
	}
 | 
						|
 | 
						|
	transports := make([]string, len(toHosts))
 | 
						|
	allowedTrans := map[string]bool{"dns": true, "tls": true}
 | 
						|
	for i, host := range toHosts {
 | 
						|
		trans, h := parse.Transport(host)
 | 
						|
 | 
						|
		if !allowedTrans[trans] {
 | 
						|
			return f, fmt.Errorf("'%s' is not supported as a destination protocol in forward: %s", trans, host)
 | 
						|
		}
 | 
						|
		p := proxy.NewProxy("forward", h, trans)
 | 
						|
		f.proxies = append(f.proxies, p)
 | 
						|
		transports[i] = trans
 | 
						|
	}
 | 
						|
 | 
						|
	for c.NextBlock() {
 | 
						|
		if err := parseBlock(c, f); err != nil {
 | 
						|
			return f, err
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if f.tlsServerName != "" {
 | 
						|
		f.tlsConfig.ServerName = f.tlsServerName
 | 
						|
	}
 | 
						|
 | 
						|
	// Initialize ClientSessionCache in tls.Config. This may speed up a TLS handshake
 | 
						|
	// in upcoming connections to the same TLS server.
 | 
						|
	f.tlsConfig.ClientSessionCache = tls.NewLRUClientSessionCache(len(f.proxies))
 | 
						|
 | 
						|
	for i := range f.proxies {
 | 
						|
		// Only set this for proxies that need it.
 | 
						|
		if transports[i] == transport.TLS {
 | 
						|
			f.proxies[i].SetTLSConfig(f.tlsConfig)
 | 
						|
		}
 | 
						|
		f.proxies[i].SetExpire(f.expire)
 | 
						|
		f.proxies[i].GetHealthchecker().SetRecursionDesired(f.opts.HCRecursionDesired)
 | 
						|
		// when TLS is used, checks are set to tcp-tls
 | 
						|
		if f.opts.ForceTCP && transports[i] != transport.TLS {
 | 
						|
			f.proxies[i].GetHealthchecker().SetTCPTransport()
 | 
						|
		}
 | 
						|
		f.proxies[i].GetHealthchecker().SetDomain(f.opts.HCDomain)
 | 
						|
	}
 | 
						|
 | 
						|
	return f, nil
 | 
						|
}
 | 
						|
 | 
						|
func parseBlock(c *caddy.Controller, f *Forward) error {
 | 
						|
	config := dnsserver.GetConfig(c)
 | 
						|
	switch c.Val() {
 | 
						|
	case "except":
 | 
						|
		ignore := c.RemainingArgs()
 | 
						|
		if len(ignore) == 0 {
 | 
						|
			return c.ArgErr()
 | 
						|
		}
 | 
						|
		for i := range ignore {
 | 
						|
			f.ignored = append(f.ignored, plugin.Host(ignore[i]).NormalizeExact()...)
 | 
						|
		}
 | 
						|
	case "max_fails":
 | 
						|
		if !c.NextArg() {
 | 
						|
			return c.ArgErr()
 | 
						|
		}
 | 
						|
		n, err := strconv.ParseUint(c.Val(), 10, 32)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		f.maxfails = uint32(n)
 | 
						|
	case "health_check":
 | 
						|
		if !c.NextArg() {
 | 
						|
			return c.ArgErr()
 | 
						|
		}
 | 
						|
		dur, err := time.ParseDuration(c.Val())
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		if dur < 0 {
 | 
						|
			return fmt.Errorf("health_check can't be negative: %d", dur)
 | 
						|
		}
 | 
						|
		f.hcInterval = dur
 | 
						|
		f.opts.HCDomain = "."
 | 
						|
 | 
						|
		for c.NextArg() {
 | 
						|
			switch hcOpts := c.Val(); hcOpts {
 | 
						|
			case "no_rec":
 | 
						|
				f.opts.HCRecursionDesired = false
 | 
						|
			case "domain":
 | 
						|
				if !c.NextArg() {
 | 
						|
					return c.ArgErr()
 | 
						|
				}
 | 
						|
				hcDomain := c.Val()
 | 
						|
				if _, ok := dns.IsDomainName(hcDomain); !ok {
 | 
						|
					return fmt.Errorf("health_check: invalid domain name %s", hcDomain)
 | 
						|
				}
 | 
						|
				f.opts.HCDomain = plugin.Name(hcDomain).Normalize()
 | 
						|
			default:
 | 
						|
				return fmt.Errorf("health_check: unknown option %s", hcOpts)
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
	case "force_tcp":
 | 
						|
		if c.NextArg() {
 | 
						|
			return c.ArgErr()
 | 
						|
		}
 | 
						|
		f.opts.ForceTCP = true
 | 
						|
	case "prefer_udp":
 | 
						|
		if c.NextArg() {
 | 
						|
			return c.ArgErr()
 | 
						|
		}
 | 
						|
		f.opts.PreferUDP = true
 | 
						|
	case "tls":
 | 
						|
		args := c.RemainingArgs()
 | 
						|
		if len(args) > 3 {
 | 
						|
			return c.ArgErr()
 | 
						|
		}
 | 
						|
 | 
						|
		for i := range args {
 | 
						|
			if !filepath.IsAbs(args[i]) && config.Root != "" {
 | 
						|
				args[i] = filepath.Join(config.Root, args[i])
 | 
						|
			}
 | 
						|
		}
 | 
						|
		tlsConfig, err := pkgtls.NewTLSConfigFromArgs(args...)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		f.tlsConfig = tlsConfig
 | 
						|
	case "tls_servername":
 | 
						|
		if !c.NextArg() {
 | 
						|
			return c.ArgErr()
 | 
						|
		}
 | 
						|
		f.tlsServerName = c.Val()
 | 
						|
	case "expire":
 | 
						|
		if !c.NextArg() {
 | 
						|
			return c.ArgErr()
 | 
						|
		}
 | 
						|
		dur, err := time.ParseDuration(c.Val())
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		if dur < 0 {
 | 
						|
			return fmt.Errorf("expire can't be negative: %s", dur)
 | 
						|
		}
 | 
						|
		f.expire = dur
 | 
						|
	case "policy":
 | 
						|
		if !c.NextArg() {
 | 
						|
			return c.ArgErr()
 | 
						|
		}
 | 
						|
		switch x := c.Val(); x {
 | 
						|
		case "random":
 | 
						|
			f.p = &random{}
 | 
						|
		case "round_robin":
 | 
						|
			f.p = &roundRobin{}
 | 
						|
		case "sequential":
 | 
						|
			f.p = &sequential{}
 | 
						|
		default:
 | 
						|
			return c.Errf("unknown policy '%s'", x)
 | 
						|
		}
 | 
						|
	case "max_concurrent":
 | 
						|
		if !c.NextArg() {
 | 
						|
			return c.ArgErr()
 | 
						|
		}
 | 
						|
		n, err := strconv.Atoi(c.Val())
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		if n < 0 {
 | 
						|
			return fmt.Errorf("max_concurrent can't be negative: %d", n)
 | 
						|
		}
 | 
						|
		f.ErrLimitExceeded = errors.New("concurrent queries exceeded maximum " + c.Val())
 | 
						|
		f.maxConcurrent = int64(n)
 | 
						|
	case "next":
 | 
						|
		args := c.RemainingArgs()
 | 
						|
		if len(args) == 0 {
 | 
						|
			return c.ArgErr()
 | 
						|
		}
 | 
						|
 | 
						|
		for _, rcode := range args {
 | 
						|
			var rc int
 | 
						|
			var ok bool
 | 
						|
 | 
						|
			if rc, ok = dns.StringToRcode[strings.ToUpper(rcode)]; !ok {
 | 
						|
				return fmt.Errorf("%s is not a valid rcode", rcode)
 | 
						|
			}
 | 
						|
 | 
						|
			f.nextAlternateRcodes = append(f.nextAlternateRcodes, rc)
 | 
						|
		}
 | 
						|
	case "failfast_all_unhealthy_upstreams":
 | 
						|
		args := c.RemainingArgs()
 | 
						|
		if len(args) != 0 {
 | 
						|
			return c.ArgErr()
 | 
						|
		}
 | 
						|
		f.failfastUnhealthyUpstreams = true
 | 
						|
	case "failover":
 | 
						|
		args := c.RemainingArgs()
 | 
						|
		if len(args) == 0 {
 | 
						|
			return c.ArgErr()
 | 
						|
		}
 | 
						|
		toRcode := dns.StringToRcode
 | 
						|
 | 
						|
		for _, rcode := range args {
 | 
						|
			var rc int
 | 
						|
			var ok bool
 | 
						|
 | 
						|
			if rc, ok = toRcode[strings.ToUpper(rcode)]; !ok {
 | 
						|
				if rc == dns.RcodeSuccess {
 | 
						|
					return fmt.Errorf("NoError cannot be used in failover")
 | 
						|
				}
 | 
						|
 | 
						|
				return fmt.Errorf("%s is not a valid rcode", rcode)
 | 
						|
			}
 | 
						|
 | 
						|
			f.failoverRcodes = append(f.failoverRcodes, rc)
 | 
						|
		}
 | 
						|
	default:
 | 
						|
		return c.Errf("unknown property '%s'", c.Val())
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
const max = 15 // Maximum number of upstreams.
 |