plugin/k8s_external/kubernetes: handle NS records (#3160)

* fix external ns records

* use k8s service name for ns record

* update test, add func comment

* expand nsAddrs() test cases

* support local ipv6 ip

* use less confusing pod ip in test
This commit is contained in:
Chris O'Haver 2019-08-23 12:54:06 -04:00 committed by Miek Gieben
parent 84988ce2c2
commit 338d148c78
6 changed files with 180 additions and 70 deletions

View file

@ -85,8 +85,10 @@ func (k *Kubernetes) External(state request.Request) ([]msg.Service, int) {
// ExternalAddress returns the external service address(es) for the CoreDNS service. // ExternalAddress returns the external service address(es) for the CoreDNS service.
func (k *Kubernetes) ExternalAddress(state request.Request) []dns.RR { func (k *Kubernetes) ExternalAddress(state request.Request) []dns.RR {
// This is probably wrong, because of all the fallback behavior of k.nsAddr, i.e. can get // If CoreDNS is running inside the Kubernetes cluster: k.nsAddrs() will return the external IPs of the services
// an address that isn't reachable from outside the cluster. // targeting the CoreDNS Pod.
rrs := []dns.RR{k.nsAddr()} // If CoreDNS is running outside of the Kubernetes cluster: k.nsAddrs() will return the first non-loopback IP
return rrs // address seen on the local system it is running on. This could be the wrong answer if coredns is using the *bind*
// plugin to bind to a different IP address.
return k.nsAddrs(true, state.Zone)
} }

View file

@ -107,25 +107,33 @@ func (k *Kubernetes) Services(ctx context.Context, state request.Request, exact
case dns.TypeNS: case dns.TypeNS:
// We can only get here if the qname equals the zone, see ServeDNS in handler.go. // We can only get here if the qname equals the zone, see ServeDNS in handler.go.
ns := k.nsAddr() nss := k.nsAddrs(false, state.Zone)
svc := msg.Service{Host: ns.A.String(), Key: msg.Path(state.QName(), coredns), TTL: k.ttl} var svcs []msg.Service
return []msg.Service{svc}, nil for _, ns := range nss {
if ns.Header().Rrtype == dns.TypeA {
svcs = append(svcs, msg.Service{Host: ns.(*dns.A).A.String(), Key: msg.Path(ns.Header().Name, coredns), TTL: k.ttl})
continue
}
if ns.Header().Rrtype == dns.TypeAAAA {
svcs = append(svcs, msg.Service{Host: ns.(*dns.AAAA).AAAA.String(), Key: msg.Path(ns.Header().Name, coredns), TTL: k.ttl})
}
}
return svcs, nil
} }
if isDefaultNS(state.Name(), state.Zone) { if isDefaultNS(state.Name(), state.Zone) {
ns := k.nsAddr() nss := k.nsAddrs(false, state.Zone)
var svcs []msg.Service
isIPv4 := ns.A.To4() != nil for _, ns := range nss {
if ns.Header().Rrtype == dns.TypeA && state.QType() == dns.TypeA {
if !((state.QType() == dns.TypeA && isIPv4) || (state.QType() == dns.TypeAAAA && !isIPv4)) { svcs = append(svcs, msg.Service{Host: ns.(*dns.A).A.String(), Key: msg.Path(state.QName(), coredns), TTL: k.ttl})
// NODATA continue
return nil, nil }
if ns.Header().Rrtype == dns.TypeAAAA && state.QType() == dns.TypeAAAA {
svcs = append(svcs, msg.Service{Host: ns.(*dns.AAAA).AAAA.String(), Key: msg.Path(state.QName(), coredns), TTL: k.ttl})
}
} }
return svcs, nil
// If this is an A request for "ns.dns", respond with a "fake" record for coredns.
// SOA records always use this hardcoded name
svc := msg.Service{Host: ns.A.String(), Key: msg.Path(state.QName(), coredns), TTL: k.ttl}
return []msg.Service{svc}, nil
} }
s, e := k.Records(ctx, state, false) s, e := k.Records(ctx, state, false)

View file

@ -327,7 +327,7 @@ func TestServicesAuthority(t *testing.T) {
state := request.Request{ state := request.Request{
Req: &dns.Msg{Question: []dns.Question{{Name: test.qname, Qtype: test.qtype}}}, Req: &dns.Msg{Question: []dns.Question{{Name: test.qname, Qtype: test.qtype}}},
Zone: "interwebs.test.", // must match from k.Zones[0] Zone: k.Zones[0],
} }
svcs, e := k.Services(context.TODO(), state, false, plugin.Options{}) svcs, e := k.Services(context.TODO(), state, false, plugin.Options{})
if e != nil { if e != nil {

View file

@ -12,11 +12,14 @@ func localPodIP() net.IP {
for _, addr := range addrs { for _, addr := range addrs {
ip, _, _ := net.ParseCIDR(addr.String()) ip, _, _ := net.ParseCIDR(addr.String())
ip = ip.To4() ip4 := ip.To4()
if ip == nil || ip.IsLoopback() { if ip4 != nil && !ip4.IsLoopback() {
continue return ip4
}
ip6 := ip.To16()
if ip6 != nil && !ip6.IsLoopback() {
return ip6
} }
return ip
} }
return nil return nil
} }

View file

@ -4,6 +4,7 @@ import (
"net" "net"
"strings" "strings"
"github.com/coredns/coredns/plugin/kubernetes/object"
"github.com/miekg/dns" "github.com/miekg/dns"
api "k8s.io/api/core/v1" api "k8s.io/api/core/v1"
) )
@ -12,54 +13,74 @@ func isDefaultNS(name, zone string) bool {
return strings.Index(name, defaultNSName) == 0 && strings.Index(name, zone) == len(defaultNSName) return strings.Index(name, defaultNSName) == 0 && strings.Index(name, zone) == len(defaultNSName)
} }
// nsAddr return the A record for the CoreDNS service in the cluster. If it fails that it fallsback // nsAddrs returns the A or AAAA records for the CoreDNS service in the cluster. If the service cannot be found,
// on the local address of the machine we're running on. // it returns a record for the the local address of the machine we're running on.
// func (k *Kubernetes) nsAddrs(external bool, zone string) []dns.RR {
// This function is rather expensive to run.
func (k *Kubernetes) nsAddr() *dns.A {
var ( var (
svcName string svcNames []string
svcNamespace string svcIPs []net.IP
) )
rr := new(dns.A) // Find the CoreDNS Endpoint
localIP := k.interfaceAddrsFunc() localIP := k.interfaceAddrsFunc()
rr.A = localIP endpoints := k.APIConn.EpIndexReverse(localIP.String())
FindEndpoint: // If the CoreDNS Endpoint is not found, use the locally bound IP address
for _, ep := range k.APIConn.EpIndexReverse(localIP.String()) { if len(endpoints) == 0 {
for _, eps := range ep.Subsets { svcNames = []string{defaultNSName + zone}
for _, addr := range eps.Addresses { svcIPs = []net.IP{localIP}
if localIP.Equal(net.ParseIP(addr.IP)) { } else {
svcNamespace = ep.Namespace // Collect IPs for all Services of the Endpoints
svcName = ep.Name for _, endpoint := range endpoints {
break FindEndpoint svcs := k.APIConn.SvcIndex(object.ServiceKey(endpoint.Name, endpoint.Namespace))
for _, svc := range svcs {
if external {
svcName := strings.Join([]string{svc.Name, svc.Namespace, zone}, ".")
for _, exIP := range svc.ExternalIPs {
svcNames = append(svcNames, svcName)
svcIPs = append(svcIPs, net.ParseIP(exIP))
}
continue
}
svcName := strings.Join([]string{svc.Name, svc.Namespace, Svc, zone}, ".")
if svc.ClusterIP == api.ClusterIPNone {
// For a headless service, use the endpoints IPs
for _, s := range endpoint.Subsets {
for _, a := range s.Addresses {
svcNames = append(svcNames, endpointHostname(a, k.endpointNameMode)+"."+svcName)
svcIPs = append(svcIPs, net.ParseIP(a.IP))
}
}
} else {
svcNames = append(svcNames, svcName)
svcIPs = append(svcIPs, net.ParseIP(svc.ClusterIP))
} }
} }
} }
} }
if len(svcName) == 0 { // Create an RR slice of collected IPs
rr.Hdr.Name = defaultNSName var rrs []dns.RR
rr.A = localIP rrs = make([]dns.RR, len(svcIPs))
return rr for i, ip := range svcIPs {
} if ip.To4() == nil {
rr := new(dns.AAAA)
FindService: rr.Hdr.Class = dns.ClassINET
for _, svc := range k.APIConn.ServiceList() { rr.Hdr.Rrtype = dns.TypeAAAA
if svcName == svc.Name && svcNamespace == svc.Namespace { rr.Hdr.Name = svcNames[i]
if svc.ClusterIP == api.ClusterIPNone { rr.AAAA = ip
rr.A = localIP rrs[i] = rr
} else { continue
rr.A = net.ParseIP(svc.ClusterIP)
}
break FindService
} }
rr := new(dns.A)
rr.Hdr.Class = dns.ClassINET
rr.Hdr.Rrtype = dns.TypeA
rr.Hdr.Name = svcNames[i]
rr.A = ip
rrs[i] = rr
} }
rr.Hdr.Name = strings.Join([]string{svcName, svcNamespace, "svc."}, ".") return rrs
return rr
} }
const defaultNSName = "ns.dns." const defaultNSName = "ns.dns."

View file

@ -1,9 +1,11 @@
package kubernetes package kubernetes
import ( import (
"net"
"testing" "testing"
"github.com/coredns/coredns/plugin/kubernetes/object" "github.com/coredns/coredns/plugin/kubernetes/object"
"github.com/miekg/dns"
api "k8s.io/api/core/v1" api "k8s.io/api/core/v1"
) )
@ -14,12 +16,23 @@ func (APIConnTest) HasSynced() bool { return true }
func (APIConnTest) Run() { return } func (APIConnTest) Run() { return }
func (APIConnTest) Stop() error { return nil } func (APIConnTest) Stop() error { return nil }
func (APIConnTest) PodIndex(string) []*object.Pod { return nil } func (APIConnTest) PodIndex(string) []*object.Pod { return nil }
func (APIConnTest) SvcIndex(string) []*object.Service { return nil }
func (APIConnTest) SvcIndexReverse(string) []*object.Service { return nil } func (APIConnTest) SvcIndexReverse(string) []*object.Service { return nil }
func (APIConnTest) EpIndex(string) []*object.Endpoints { return nil } func (APIConnTest) EpIndex(string) []*object.Endpoints { return nil }
func (APIConnTest) EndpointsList() []*object.Endpoints { return nil } func (APIConnTest) EndpointsList() []*object.Endpoints { return nil }
func (APIConnTest) Modified() int64 { return 0 } func (APIConnTest) Modified() int64 { return 0 }
func (a APIConnTest) SvcIndex(s string) []*object.Service {
switch s {
case "dns-service.kube-system":
return []*object.Service{a.ServiceList()[0]}
case "hdls-dns-service.kube-system":
return []*object.Service{a.ServiceList()[1]}
case "dns6-service.kube-system":
return []*object.Service{a.ServiceList()[2]}
}
return nil
}
func (APIConnTest) ServiceList() []*object.Service { func (APIConnTest) ServiceList() []*object.Service {
svcs := []*object.Service{ svcs := []*object.Service{
{ {
@ -27,18 +40,31 @@ func (APIConnTest) ServiceList() []*object.Service {
Namespace: "kube-system", Namespace: "kube-system",
ClusterIP: "10.0.0.111", ClusterIP: "10.0.0.111",
}, },
{
Name: "hdls-dns-service",
Namespace: "kube-system",
ClusterIP: api.ClusterIPNone,
},
{
Name: "dns6-service",
Namespace: "kube-system",
ClusterIP: "10::111",
},
} }
return svcs return svcs
} }
func (APIConnTest) EpIndexReverse(string) []*object.Endpoints { func (APIConnTest) EpIndexReverse(ip string) []*object.Endpoints {
if ip != "10.244.0.20" {
return nil
}
eps := []*object.Endpoints{ eps := []*object.Endpoints{
{ {
Subsets: []object.EndpointSubset{ Subsets: []object.EndpointSubset{
{ {
Addresses: []object.EndpointAddress{ Addresses: []object.EndpointAddress{
{ {
IP: "127.0.0.1", IP: "10.244.0.20",
}, },
}, },
}, },
@ -46,6 +72,32 @@ func (APIConnTest) EpIndexReverse(string) []*object.Endpoints {
Name: "dns-service", Name: "dns-service",
Namespace: "kube-system", Namespace: "kube-system",
}, },
{
Subsets: []object.EndpointSubset{
{
Addresses: []object.EndpointAddress{
{
IP: "10.244.0.20",
},
},
},
},
Name: "hdls-dns-service",
Namespace: "kube-system",
},
{
Subsets: []object.EndpointSubset{
{
Addresses: []object.EndpointAddress{
{
IP: "10.244.0.20",
},
},
},
},
Name: "dns6-service",
Namespace: "kube-system",
},
} }
return eps return eps
} }
@ -55,19 +107,43 @@ func (APIConnTest) GetNamespaceByName(name string) (*api.Namespace, error) {
return &api.Namespace{}, nil return &api.Namespace{}, nil
} }
func TestNsAddr(t *testing.T) { func TestNsAddrs(t *testing.T) {
k := New([]string{"inter.webs.test."}) k := New([]string{"inter.webs.test."})
k.APIConn = &APIConnTest{} k.APIConn = &APIConnTest{}
k.interfaceAddrsFunc = func() net.IP { return net.ParseIP("10.244.0.20") }
cdr := k.nsAddr() cdrs := k.nsAddrs(false, k.Zones[0])
expected := "10.0.0.111"
if len(cdrs) != 3 {
t.Fatalf("Expected 3 results, got %v", len(cdrs))
if cdr.A.String() != expected {
t.Errorf("Expected A to be %q, got %q", expected, cdr.A.String())
} }
expected = "dns-service.kube-system.svc." cdr := cdrs[0]
if cdr.Hdr.Name != expected { expected := "10.0.0.111"
t.Errorf("Expected Hdr.Name to be %q, got %q", expected, cdr.Hdr.Name) if cdr.(*dns.A).A.String() != expected {
t.Errorf("Expected 1st A to be %q, got %q", expected, cdr.(*dns.A).A.String())
}
expected = "dns-service.kube-system.svc.inter.webs.test."
if cdr.Header().Name != expected {
t.Errorf("Expected 1st Header Name to be %q, got %q", expected, cdr.Header().Name)
}
cdr = cdrs[1]
expected = "10.244.0.20"
if cdr.(*dns.A).A.String() != expected {
t.Errorf("Expected 2nd A to be %q, got %q", expected, cdr.(*dns.A).A.String())
}
expected = "10-244-0-20.hdls-dns-service.kube-system.svc.inter.webs.test."
if cdr.Header().Name != expected {
t.Errorf("Expected 2nd Header Name to be %q, got %q", expected, cdr.Header().Name)
}
cdr = cdrs[2]
expected = "10::111"
if cdr.(*dns.AAAA).AAAA.String() != expected {
t.Errorf("Expected AAAA to be %q, got %q", expected, cdr.(*dns.A).A.String())
}
expected = "dns6-service.kube-system.svc.inter.webs.test."
if cdr.Header().Name != expected {
t.Errorf("Expected AAAA Header Name to be %q, got %q", expected, cdr.Header().Name)
} }
} }