plugin/k8s_external/kubernetes: handle NS records (#3160)
* fix external ns records * use k8s service name for ns record * update test, add func comment * expand nsAddrs() test cases * support local ipv6 ip * use less confusing pod ip in test
This commit is contained in:
parent
84988ce2c2
commit
338d148c78
6 changed files with 180 additions and 70 deletions
|
@ -85,8 +85,10 @@ func (k *Kubernetes) External(state request.Request) ([]msg.Service, int) {
|
||||||
|
|
||||||
// ExternalAddress returns the external service address(es) for the CoreDNS service.
|
// ExternalAddress returns the external service address(es) for the CoreDNS service.
|
||||||
func (k *Kubernetes) ExternalAddress(state request.Request) []dns.RR {
|
func (k *Kubernetes) ExternalAddress(state request.Request) []dns.RR {
|
||||||
// This is probably wrong, because of all the fallback behavior of k.nsAddr, i.e. can get
|
// If CoreDNS is running inside the Kubernetes cluster: k.nsAddrs() will return the external IPs of the services
|
||||||
// an address that isn't reachable from outside the cluster.
|
// targeting the CoreDNS Pod.
|
||||||
rrs := []dns.RR{k.nsAddr()}
|
// If CoreDNS is running outside of the Kubernetes cluster: k.nsAddrs() will return the first non-loopback IP
|
||||||
return rrs
|
// address seen on the local system it is running on. This could be the wrong answer if coredns is using the *bind*
|
||||||
|
// plugin to bind to a different IP address.
|
||||||
|
return k.nsAddrs(true, state.Zone)
|
||||||
}
|
}
|
||||||
|
|
|
@ -107,25 +107,33 @@ func (k *Kubernetes) Services(ctx context.Context, state request.Request, exact
|
||||||
|
|
||||||
case dns.TypeNS:
|
case dns.TypeNS:
|
||||||
// We can only get here if the qname equals the zone, see ServeDNS in handler.go.
|
// We can only get here if the qname equals the zone, see ServeDNS in handler.go.
|
||||||
ns := k.nsAddr()
|
nss := k.nsAddrs(false, state.Zone)
|
||||||
svc := msg.Service{Host: ns.A.String(), Key: msg.Path(state.QName(), coredns), TTL: k.ttl}
|
var svcs []msg.Service
|
||||||
return []msg.Service{svc}, nil
|
for _, ns := range nss {
|
||||||
|
if ns.Header().Rrtype == dns.TypeA {
|
||||||
|
svcs = append(svcs, msg.Service{Host: ns.(*dns.A).A.String(), Key: msg.Path(ns.Header().Name, coredns), TTL: k.ttl})
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if ns.Header().Rrtype == dns.TypeAAAA {
|
||||||
|
svcs = append(svcs, msg.Service{Host: ns.(*dns.AAAA).AAAA.String(), Key: msg.Path(ns.Header().Name, coredns), TTL: k.ttl})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return svcs, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
if isDefaultNS(state.Name(), state.Zone) {
|
if isDefaultNS(state.Name(), state.Zone) {
|
||||||
ns := k.nsAddr()
|
nss := k.nsAddrs(false, state.Zone)
|
||||||
|
var svcs []msg.Service
|
||||||
isIPv4 := ns.A.To4() != nil
|
for _, ns := range nss {
|
||||||
|
if ns.Header().Rrtype == dns.TypeA && state.QType() == dns.TypeA {
|
||||||
if !((state.QType() == dns.TypeA && isIPv4) || (state.QType() == dns.TypeAAAA && !isIPv4)) {
|
svcs = append(svcs, msg.Service{Host: ns.(*dns.A).A.String(), Key: msg.Path(state.QName(), coredns), TTL: k.ttl})
|
||||||
// NODATA
|
continue
|
||||||
return nil, nil
|
}
|
||||||
|
if ns.Header().Rrtype == dns.TypeAAAA && state.QType() == dns.TypeAAAA {
|
||||||
|
svcs = append(svcs, msg.Service{Host: ns.(*dns.AAAA).AAAA.String(), Key: msg.Path(state.QName(), coredns), TTL: k.ttl})
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
return svcs, nil
|
||||||
// If this is an A request for "ns.dns", respond with a "fake" record for coredns.
|
|
||||||
// SOA records always use this hardcoded name
|
|
||||||
svc := msg.Service{Host: ns.A.String(), Key: msg.Path(state.QName(), coredns), TTL: k.ttl}
|
|
||||||
return []msg.Service{svc}, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
s, e := k.Records(ctx, state, false)
|
s, e := k.Records(ctx, state, false)
|
||||||
|
|
|
@ -327,7 +327,7 @@ func TestServicesAuthority(t *testing.T) {
|
||||||
|
|
||||||
state := request.Request{
|
state := request.Request{
|
||||||
Req: &dns.Msg{Question: []dns.Question{{Name: test.qname, Qtype: test.qtype}}},
|
Req: &dns.Msg{Question: []dns.Question{{Name: test.qname, Qtype: test.qtype}}},
|
||||||
Zone: "interwebs.test.", // must match from k.Zones[0]
|
Zone: k.Zones[0],
|
||||||
}
|
}
|
||||||
svcs, e := k.Services(context.TODO(), state, false, plugin.Options{})
|
svcs, e := k.Services(context.TODO(), state, false, plugin.Options{})
|
||||||
if e != nil {
|
if e != nil {
|
||||||
|
|
|
@ -12,11 +12,14 @@ func localPodIP() net.IP {
|
||||||
|
|
||||||
for _, addr := range addrs {
|
for _, addr := range addrs {
|
||||||
ip, _, _ := net.ParseCIDR(addr.String())
|
ip, _, _ := net.ParseCIDR(addr.String())
|
||||||
ip = ip.To4()
|
ip4 := ip.To4()
|
||||||
if ip == nil || ip.IsLoopback() {
|
if ip4 != nil && !ip4.IsLoopback() {
|
||||||
continue
|
return ip4
|
||||||
|
}
|
||||||
|
ip6 := ip.To16()
|
||||||
|
if ip6 != nil && !ip6.IsLoopback() {
|
||||||
|
return ip6
|
||||||
}
|
}
|
||||||
return ip
|
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -4,6 +4,7 @@ import (
|
||||||
"net"
|
"net"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
"github.com/coredns/coredns/plugin/kubernetes/object"
|
||||||
"github.com/miekg/dns"
|
"github.com/miekg/dns"
|
||||||
api "k8s.io/api/core/v1"
|
api "k8s.io/api/core/v1"
|
||||||
)
|
)
|
||||||
|
@ -12,54 +13,74 @@ func isDefaultNS(name, zone string) bool {
|
||||||
return strings.Index(name, defaultNSName) == 0 && strings.Index(name, zone) == len(defaultNSName)
|
return strings.Index(name, defaultNSName) == 0 && strings.Index(name, zone) == len(defaultNSName)
|
||||||
}
|
}
|
||||||
|
|
||||||
// nsAddr return the A record for the CoreDNS service in the cluster. If it fails that it fallsback
|
// nsAddrs returns the A or AAAA records for the CoreDNS service in the cluster. If the service cannot be found,
|
||||||
// on the local address of the machine we're running on.
|
// it returns a record for the the local address of the machine we're running on.
|
||||||
//
|
func (k *Kubernetes) nsAddrs(external bool, zone string) []dns.RR {
|
||||||
// This function is rather expensive to run.
|
|
||||||
func (k *Kubernetes) nsAddr() *dns.A {
|
|
||||||
var (
|
var (
|
||||||
svcName string
|
svcNames []string
|
||||||
svcNamespace string
|
svcIPs []net.IP
|
||||||
)
|
)
|
||||||
|
|
||||||
rr := new(dns.A)
|
// Find the CoreDNS Endpoint
|
||||||
localIP := k.interfaceAddrsFunc()
|
localIP := k.interfaceAddrsFunc()
|
||||||
rr.A = localIP
|
endpoints := k.APIConn.EpIndexReverse(localIP.String())
|
||||||
|
|
||||||
FindEndpoint:
|
// If the CoreDNS Endpoint is not found, use the locally bound IP address
|
||||||
for _, ep := range k.APIConn.EpIndexReverse(localIP.String()) {
|
if len(endpoints) == 0 {
|
||||||
for _, eps := range ep.Subsets {
|
svcNames = []string{defaultNSName + zone}
|
||||||
for _, addr := range eps.Addresses {
|
svcIPs = []net.IP{localIP}
|
||||||
if localIP.Equal(net.ParseIP(addr.IP)) {
|
} else {
|
||||||
svcNamespace = ep.Namespace
|
// Collect IPs for all Services of the Endpoints
|
||||||
svcName = ep.Name
|
for _, endpoint := range endpoints {
|
||||||
break FindEndpoint
|
svcs := k.APIConn.SvcIndex(object.ServiceKey(endpoint.Name, endpoint.Namespace))
|
||||||
|
for _, svc := range svcs {
|
||||||
|
if external {
|
||||||
|
svcName := strings.Join([]string{svc.Name, svc.Namespace, zone}, ".")
|
||||||
|
for _, exIP := range svc.ExternalIPs {
|
||||||
|
svcNames = append(svcNames, svcName)
|
||||||
|
svcIPs = append(svcIPs, net.ParseIP(exIP))
|
||||||
|
}
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
svcName := strings.Join([]string{svc.Name, svc.Namespace, Svc, zone}, ".")
|
||||||
|
if svc.ClusterIP == api.ClusterIPNone {
|
||||||
|
// For a headless service, use the endpoints IPs
|
||||||
|
for _, s := range endpoint.Subsets {
|
||||||
|
for _, a := range s.Addresses {
|
||||||
|
svcNames = append(svcNames, endpointHostname(a, k.endpointNameMode)+"."+svcName)
|
||||||
|
svcIPs = append(svcIPs, net.ParseIP(a.IP))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
svcNames = append(svcNames, svcName)
|
||||||
|
svcIPs = append(svcIPs, net.ParseIP(svc.ClusterIP))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(svcName) == 0 {
|
// Create an RR slice of collected IPs
|
||||||
rr.Hdr.Name = defaultNSName
|
var rrs []dns.RR
|
||||||
rr.A = localIP
|
rrs = make([]dns.RR, len(svcIPs))
|
||||||
return rr
|
for i, ip := range svcIPs {
|
||||||
}
|
if ip.To4() == nil {
|
||||||
|
rr := new(dns.AAAA)
|
||||||
FindService:
|
rr.Hdr.Class = dns.ClassINET
|
||||||
for _, svc := range k.APIConn.ServiceList() {
|
rr.Hdr.Rrtype = dns.TypeAAAA
|
||||||
if svcName == svc.Name && svcNamespace == svc.Namespace {
|
rr.Hdr.Name = svcNames[i]
|
||||||
if svc.ClusterIP == api.ClusterIPNone {
|
rr.AAAA = ip
|
||||||
rr.A = localIP
|
rrs[i] = rr
|
||||||
} else {
|
continue
|
||||||
rr.A = net.ParseIP(svc.ClusterIP)
|
|
||||||
}
|
|
||||||
break FindService
|
|
||||||
}
|
}
|
||||||
|
rr := new(dns.A)
|
||||||
|
rr.Hdr.Class = dns.ClassINET
|
||||||
|
rr.Hdr.Rrtype = dns.TypeA
|
||||||
|
rr.Hdr.Name = svcNames[i]
|
||||||
|
rr.A = ip
|
||||||
|
rrs[i] = rr
|
||||||
}
|
}
|
||||||
|
|
||||||
rr.Hdr.Name = strings.Join([]string{svcName, svcNamespace, "svc."}, ".")
|
return rrs
|
||||||
|
|
||||||
return rr
|
|
||||||
}
|
}
|
||||||
|
|
||||||
const defaultNSName = "ns.dns."
|
const defaultNSName = "ns.dns."
|
||||||
|
|
|
@ -1,9 +1,11 @@
|
||||||
package kubernetes
|
package kubernetes
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"net"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/coredns/coredns/plugin/kubernetes/object"
|
"github.com/coredns/coredns/plugin/kubernetes/object"
|
||||||
|
"github.com/miekg/dns"
|
||||||
|
|
||||||
api "k8s.io/api/core/v1"
|
api "k8s.io/api/core/v1"
|
||||||
)
|
)
|
||||||
|
@ -14,12 +16,23 @@ func (APIConnTest) HasSynced() bool { return true }
|
||||||
func (APIConnTest) Run() { return }
|
func (APIConnTest) Run() { return }
|
||||||
func (APIConnTest) Stop() error { return nil }
|
func (APIConnTest) Stop() error { return nil }
|
||||||
func (APIConnTest) PodIndex(string) []*object.Pod { return nil }
|
func (APIConnTest) PodIndex(string) []*object.Pod { return nil }
|
||||||
func (APIConnTest) SvcIndex(string) []*object.Service { return nil }
|
|
||||||
func (APIConnTest) SvcIndexReverse(string) []*object.Service { return nil }
|
func (APIConnTest) SvcIndexReverse(string) []*object.Service { return nil }
|
||||||
func (APIConnTest) EpIndex(string) []*object.Endpoints { return nil }
|
func (APIConnTest) EpIndex(string) []*object.Endpoints { return nil }
|
||||||
func (APIConnTest) EndpointsList() []*object.Endpoints { return nil }
|
func (APIConnTest) EndpointsList() []*object.Endpoints { return nil }
|
||||||
func (APIConnTest) Modified() int64 { return 0 }
|
func (APIConnTest) Modified() int64 { return 0 }
|
||||||
|
|
||||||
|
func (a APIConnTest) SvcIndex(s string) []*object.Service {
|
||||||
|
switch s {
|
||||||
|
case "dns-service.kube-system":
|
||||||
|
return []*object.Service{a.ServiceList()[0]}
|
||||||
|
case "hdls-dns-service.kube-system":
|
||||||
|
return []*object.Service{a.ServiceList()[1]}
|
||||||
|
case "dns6-service.kube-system":
|
||||||
|
return []*object.Service{a.ServiceList()[2]}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
func (APIConnTest) ServiceList() []*object.Service {
|
func (APIConnTest) ServiceList() []*object.Service {
|
||||||
svcs := []*object.Service{
|
svcs := []*object.Service{
|
||||||
{
|
{
|
||||||
|
@ -27,18 +40,31 @@ func (APIConnTest) ServiceList() []*object.Service {
|
||||||
Namespace: "kube-system",
|
Namespace: "kube-system",
|
||||||
ClusterIP: "10.0.0.111",
|
ClusterIP: "10.0.0.111",
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
Name: "hdls-dns-service",
|
||||||
|
Namespace: "kube-system",
|
||||||
|
ClusterIP: api.ClusterIPNone,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Name: "dns6-service",
|
||||||
|
Namespace: "kube-system",
|
||||||
|
ClusterIP: "10::111",
|
||||||
|
},
|
||||||
}
|
}
|
||||||
return svcs
|
return svcs
|
||||||
}
|
}
|
||||||
|
|
||||||
func (APIConnTest) EpIndexReverse(string) []*object.Endpoints {
|
func (APIConnTest) EpIndexReverse(ip string) []*object.Endpoints {
|
||||||
|
if ip != "10.244.0.20" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
eps := []*object.Endpoints{
|
eps := []*object.Endpoints{
|
||||||
{
|
{
|
||||||
Subsets: []object.EndpointSubset{
|
Subsets: []object.EndpointSubset{
|
||||||
{
|
{
|
||||||
Addresses: []object.EndpointAddress{
|
Addresses: []object.EndpointAddress{
|
||||||
{
|
{
|
||||||
IP: "127.0.0.1",
|
IP: "10.244.0.20",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
@ -46,6 +72,32 @@ func (APIConnTest) EpIndexReverse(string) []*object.Endpoints {
|
||||||
Name: "dns-service",
|
Name: "dns-service",
|
||||||
Namespace: "kube-system",
|
Namespace: "kube-system",
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
Subsets: []object.EndpointSubset{
|
||||||
|
{
|
||||||
|
Addresses: []object.EndpointAddress{
|
||||||
|
{
|
||||||
|
IP: "10.244.0.20",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Name: "hdls-dns-service",
|
||||||
|
Namespace: "kube-system",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Subsets: []object.EndpointSubset{
|
||||||
|
{
|
||||||
|
Addresses: []object.EndpointAddress{
|
||||||
|
{
|
||||||
|
IP: "10.244.0.20",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Name: "dns6-service",
|
||||||
|
Namespace: "kube-system",
|
||||||
|
},
|
||||||
}
|
}
|
||||||
return eps
|
return eps
|
||||||
}
|
}
|
||||||
|
@ -55,19 +107,43 @@ func (APIConnTest) GetNamespaceByName(name string) (*api.Namespace, error) {
|
||||||
return &api.Namespace{}, nil
|
return &api.Namespace{}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestNsAddr(t *testing.T) {
|
func TestNsAddrs(t *testing.T) {
|
||||||
|
|
||||||
k := New([]string{"inter.webs.test."})
|
k := New([]string{"inter.webs.test."})
|
||||||
k.APIConn = &APIConnTest{}
|
k.APIConn = &APIConnTest{}
|
||||||
|
k.interfaceAddrsFunc = func() net.IP { return net.ParseIP("10.244.0.20") }
|
||||||
|
|
||||||
cdr := k.nsAddr()
|
cdrs := k.nsAddrs(false, k.Zones[0])
|
||||||
expected := "10.0.0.111"
|
|
||||||
|
if len(cdrs) != 3 {
|
||||||
|
t.Fatalf("Expected 3 results, got %v", len(cdrs))
|
||||||
|
|
||||||
if cdr.A.String() != expected {
|
|
||||||
t.Errorf("Expected A to be %q, got %q", expected, cdr.A.String())
|
|
||||||
}
|
}
|
||||||
expected = "dns-service.kube-system.svc."
|
cdr := cdrs[0]
|
||||||
if cdr.Hdr.Name != expected {
|
expected := "10.0.0.111"
|
||||||
t.Errorf("Expected Hdr.Name to be %q, got %q", expected, cdr.Hdr.Name)
|
if cdr.(*dns.A).A.String() != expected {
|
||||||
|
t.Errorf("Expected 1st A to be %q, got %q", expected, cdr.(*dns.A).A.String())
|
||||||
|
}
|
||||||
|
expected = "dns-service.kube-system.svc.inter.webs.test."
|
||||||
|
if cdr.Header().Name != expected {
|
||||||
|
t.Errorf("Expected 1st Header Name to be %q, got %q", expected, cdr.Header().Name)
|
||||||
|
}
|
||||||
|
cdr = cdrs[1]
|
||||||
|
expected = "10.244.0.20"
|
||||||
|
if cdr.(*dns.A).A.String() != expected {
|
||||||
|
t.Errorf("Expected 2nd A to be %q, got %q", expected, cdr.(*dns.A).A.String())
|
||||||
|
}
|
||||||
|
expected = "10-244-0-20.hdls-dns-service.kube-system.svc.inter.webs.test."
|
||||||
|
if cdr.Header().Name != expected {
|
||||||
|
t.Errorf("Expected 2nd Header Name to be %q, got %q", expected, cdr.Header().Name)
|
||||||
|
}
|
||||||
|
cdr = cdrs[2]
|
||||||
|
expected = "10::111"
|
||||||
|
if cdr.(*dns.AAAA).AAAA.String() != expected {
|
||||||
|
t.Errorf("Expected AAAA to be %q, got %q", expected, cdr.(*dns.A).A.String())
|
||||||
|
}
|
||||||
|
expected = "dns6-service.kube-system.svc.inter.webs.test."
|
||||||
|
if cdr.Header().Name != expected {
|
||||||
|
t.Errorf("Expected AAAA Header Name to be %q, got %q", expected, cdr.Header().Name)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue