mw/kubernetes: remove federation and cidr (#916)
* mw/kubernetes: remove federation and cidr Remove both as we have a corefile syntax change that handles cidr and remove federation because that is going to be its own middleware. * backwards incompat changes This PR: * removes cidr from kubernetes (core Corefile feature now) * removes federation from kubernets (comes back as new middleware) * [remove autopath - which was already gone, so that already was backwards incompat] * adds `fallthrough` to the *etcd* middleware and makes you enable it. * Fail on unknown properties * documentation * Disable TestHealthCheck as it uses realtime and fails
This commit is contained in:
parent
818d2b10ad
commit
00f5c7797e
26 changed files with 197 additions and 815 deletions
|
@ -1,96 +0,0 @@
|
|||
package kubernetes
|
||||
|
||||
import (
|
||||
"net"
|
||||
"strings"
|
||||
|
||||
"github.com/coredns/coredns/middleware/etcd/msg"
|
||||
)
|
||||
|
||||
// Federation holds TODO(...).
|
||||
type Federation struct {
|
||||
name string
|
||||
zone string
|
||||
}
|
||||
|
||||
const (
|
||||
// TODO: Do not hardcode these labels. Pull them out of the API instead.
|
||||
//
|
||||
// We can get them via ....
|
||||
// import metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
// metav1.LabelZoneFailureDomain
|
||||
// metav1.LabelZoneRegion
|
||||
//
|
||||
// But importing above breaks coredns with flag collision of 'log_dir'
|
||||
|
||||
labelAvailabilityZone = "failure-domain.beta.kubernetes.io/zone"
|
||||
labelRegion = "failure-domain.beta.kubernetes.io/region"
|
||||
)
|
||||
|
||||
// stripFederation removes the federation segment from the segment list, if it
|
||||
// matches a configured federation name.
|
||||
func (k *Kubernetes) stripFederation(segs []string) (string, []string) {
|
||||
|
||||
if len(segs) < 3 {
|
||||
return "", segs
|
||||
}
|
||||
for _, f := range k.Federations {
|
||||
if f.name == segs[len(segs)-2] {
|
||||
fed := segs[len(segs)-2]
|
||||
segs[len(segs)-2] = segs[len(segs)-1]
|
||||
segs = segs[:len(segs)-1]
|
||||
return fed, segs
|
||||
}
|
||||
}
|
||||
return "", segs
|
||||
}
|
||||
|
||||
// federationCNAMERecord returns a service record for the requested federated service
|
||||
// with the target host in the federated CNAME format which the external DNS provider
|
||||
// should be able to resolve
|
||||
func (k *Kubernetes) federationCNAMERecord(r recordRequest) msg.Service {
|
||||
|
||||
myNodeName := k.localNodeName()
|
||||
node, err := k.APIConn.GetNodeByName(myNodeName)
|
||||
if err != nil {
|
||||
return msg.Service{}
|
||||
}
|
||||
|
||||
for _, f := range k.Federations {
|
||||
if f.name != r.federation {
|
||||
continue
|
||||
}
|
||||
if r.endpoint == "" {
|
||||
return msg.Service{
|
||||
Key: strings.Join([]string{msg.Path(r.zone, "coredns"), r.podOrSvc, r.federation, r.namespace, r.service}, "/"),
|
||||
Host: strings.Join([]string{r.service, r.namespace, r.federation, r.podOrSvc, node.Labels[labelAvailabilityZone], node.Labels[labelRegion], f.zone}, "."),
|
||||
}
|
||||
}
|
||||
return msg.Service{
|
||||
Key: strings.Join([]string{msg.Path(r.zone, "coredns"), r.podOrSvc, r.federation, r.namespace, r.service, r.endpoint}, "/"),
|
||||
Host: strings.Join([]string{r.endpoint, r.service, r.namespace, r.federation, r.podOrSvc, node.Labels[labelAvailabilityZone], node.Labels[labelRegion], f.zone}, "."),
|
||||
}
|
||||
}
|
||||
|
||||
return msg.Service{}
|
||||
}
|
||||
|
||||
func (k *Kubernetes) localNodeName() string {
|
||||
localIP := k.interfaceAddrsFunc()
|
||||
if localIP == nil {
|
||||
return ""
|
||||
}
|
||||
|
||||
// Find endpoint matching localIP
|
||||
endpointsList := k.APIConn.EndpointsList()
|
||||
for _, ep := range endpointsList.Items {
|
||||
for _, eps := range ep.Subsets {
|
||||
for _, addr := range eps.Addresses {
|
||||
if localIP.Equal(net.ParseIP(addr.IP)) {
|
||||
return *addr.NodeName
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
return ""
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue