reverse zone: fix Normalize (#4621)
Make normalize return multiple "hosts" (= reverse zones) when a non-octet boundary cidr is given. Added pkg/cidr package that holds the cidr calculation routines; felt they didn't really fit dnsutil. This change means the IPNet return parameter isn't needed, the hosts are all correct. The tests that tests this is also removed: TestSplitHostPortReverse The fallout was that zoneAddr _also_ doesn't need the IPNet member, that in turn make it visible that zoneAddr in address.go duplicated a bunch of stuff from register.go; removed/refactored that too. Created a plugin.OriginsFromArgsOrServerBlock to help plugins do the right things, by consuming ZONE arguments; this now expands reverse zones correctly. This is mostly mechanical. Remove the reverse test in plugin/kubernetes which is a copy-paste from a core test (which has since been fixed). Remove MustNormalize as it has no plugin users. This change is not backwards compatible to plugins that have a ZONE argument that they parse in the setup util. All in-tree plugins have been updated. Signed-off-by: Miek Gieben <miek@miek.nl>
This commit is contained in:
parent
5409379648
commit
5f41d8eb1f
32 changed files with 259 additions and 510 deletions
|
@ -4,20 +4,13 @@ import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"net"
|
"net"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/coredns/coredns/plugin"
|
|
||||||
"github.com/coredns/coredns/plugin/pkg/parse"
|
|
||||||
"github.com/coredns/coredns/plugin/pkg/transport"
|
|
||||||
|
|
||||||
"github.com/miekg/dns"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type zoneAddr struct {
|
type zoneAddr struct {
|
||||||
Zone string
|
Zone string
|
||||||
Port string
|
Port string
|
||||||
Transport string // dns, tls or grpc
|
Transport string // dns, tls or grpc
|
||||||
IPNet *net.IPNet // if reverse zone this hold the IPNet
|
Address string // used for bound zoneAddr - validation of overlapping
|
||||||
Address string // used for bound zoneAddr - validation of overlapping
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// String returns the string representation of z.
|
// String returns the string representation of z.
|
||||||
|
@ -29,32 +22,6 @@ func (z zoneAddr) String() string {
|
||||||
return s
|
return s
|
||||||
}
|
}
|
||||||
|
|
||||||
// normalizeZone parses a zone string into a structured format with separate
|
|
||||||
// host, and port portions, as well as the original input string.
|
|
||||||
func normalizeZone(str string) (zoneAddr, error) {
|
|
||||||
trans, str := parse.Transport(str)
|
|
||||||
|
|
||||||
host, port, ipnet, err := plugin.SplitHostPort(str)
|
|
||||||
if err != nil {
|
|
||||||
return zoneAddr{}, err
|
|
||||||
}
|
|
||||||
|
|
||||||
if port == "" {
|
|
||||||
switch trans {
|
|
||||||
case transport.DNS:
|
|
||||||
port = Port
|
|
||||||
case transport.TLS:
|
|
||||||
port = transport.TLSPort
|
|
||||||
case transport.GRPC:
|
|
||||||
port = transport.GRPCPort
|
|
||||||
case transport.HTTPS:
|
|
||||||
port = transport.HTTPSPort
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return zoneAddr{Zone: dns.Fqdn(host), Port: port, Transport: trans, IPNet: ipnet}, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// SplitProtocolHostPort splits a full formed address like "dns://[::1]:53" into parts.
|
// SplitProtocolHostPort splits a full formed address like "dns://[::1]:53" into parts.
|
||||||
func SplitProtocolHostPort(address string) (protocol string, ip string, port string, err error) {
|
func SplitProtocolHostPort(address string) (protocol string, ip string, port string, err error) {
|
||||||
parts := strings.Split(address, "://")
|
parts := strings.Split(address, "://")
|
||||||
|
|
|
@ -2,83 +2,6 @@ package dnsserver
|
||||||
|
|
||||||
import "testing"
|
import "testing"
|
||||||
|
|
||||||
func TestNormalizeZone(t *testing.T) {
|
|
||||||
for i, test := range []struct {
|
|
||||||
input string
|
|
||||||
expected string
|
|
||||||
shouldErr bool
|
|
||||||
}{
|
|
||||||
{".", "dns://.:53", false},
|
|
||||||
{".:54", "dns://.:54", false},
|
|
||||||
{"..", "://:", true},
|
|
||||||
{".:", "://:", true},
|
|
||||||
{"dns://.", "dns://.:53", false},
|
|
||||||
{"dns://.:5353", "dns://.:5353", false},
|
|
||||||
{"dns://..", "://:", true},
|
|
||||||
{"dns://.:", "://:", true},
|
|
||||||
{"tls://.", "tls://.:853", false},
|
|
||||||
{"tls://.:8953", "tls://.:8953", false},
|
|
||||||
{"tls://..", "://:", true},
|
|
||||||
{"tls://.:", "://:", true},
|
|
||||||
{"grpc://.", "grpc://.:443", false},
|
|
||||||
{"grpc://.:8443", "grpc://.:8443", false},
|
|
||||||
{"grpc://..", "://:", true},
|
|
||||||
{"grpc://.:", "://:", true},
|
|
||||||
{"https://.", "https://.:443", false},
|
|
||||||
{"https://.:8443", "https://.:8443", false},
|
|
||||||
{"https://..", "://:", true},
|
|
||||||
{"https://.:", "://:", true},
|
|
||||||
} {
|
|
||||||
addr, err := normalizeZone(test.input)
|
|
||||||
actual := addr.String()
|
|
||||||
if test.shouldErr && err == nil {
|
|
||||||
t.Errorf("Test %d: Expected error, but there wasn't any", i)
|
|
||||||
}
|
|
||||||
if !test.shouldErr && err != nil {
|
|
||||||
t.Errorf("Test %d: Expected no error, but there was one: %v", i, err)
|
|
||||||
}
|
|
||||||
if actual != test.expected {
|
|
||||||
t.Errorf("Test %d: Expected %s but got %s", i, test.expected, actual)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestNormalizeZoneReverse(t *testing.T) {
|
|
||||||
for i, test := range []struct {
|
|
||||||
input string
|
|
||||||
expected string
|
|
||||||
shouldErr bool
|
|
||||||
}{
|
|
||||||
{"2003::1/64", "dns://0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.2.ip6.arpa.:53", false},
|
|
||||||
{"2003::1/64.", "dns://2003::1/64.:53", false}, // OK, with closing dot the parse will fail.
|
|
||||||
{"2003::1/64:53", "dns://0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.2.ip6.arpa.:53", false},
|
|
||||||
{"2003::1/64.:53", "dns://2003::1/64.:53", false},
|
|
||||||
|
|
||||||
{"10.0.0.0/24", "dns://0.0.10.in-addr.arpa.:53", false},
|
|
||||||
{"10.0.0.0/24.", "dns://10.0.0.0/24.:53", false},
|
|
||||||
{"10.0.0.0/24:53", "dns://0.0.10.in-addr.arpa.:53", false},
|
|
||||||
{"10.0.0.0/24.:53", "dns://10.0.0.0/24.:53", false},
|
|
||||||
|
|
||||||
// non %8==0 netmasks
|
|
||||||
{"2003::53/67", "dns://0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.2.ip6.arpa.:53", false},
|
|
||||||
{"10.0.0.0/25.", "dns://10.0.0.0/25.:53", false}, // has dot
|
|
||||||
{"10.0.0.0/25", "dns://0.0.10.in-addr.arpa.:53", false},
|
|
||||||
{"fd00:77:30::0/110", "dns://0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.7.7.0.0.0.0.d.f.ip6.arpa.:53", false},
|
|
||||||
} {
|
|
||||||
addr, err := normalizeZone(test.input)
|
|
||||||
actual := addr.String()
|
|
||||||
if test.shouldErr && err == nil {
|
|
||||||
t.Errorf("Test %d: Expected error, but there wasn't any", i)
|
|
||||||
}
|
|
||||||
if !test.shouldErr && err != nil {
|
|
||||||
t.Errorf("Test %d: Expected no error, but there was one: %v", i, err)
|
|
||||||
}
|
|
||||||
if actual != test.expected {
|
|
||||||
t.Errorf("Test %d: Expected %s but got %s", i, test.expected, actual)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestSplitProtocolHostPort(t *testing.T) {
|
func TestSplitProtocolHostPort(t *testing.T) {
|
||||||
for i, test := range []struct {
|
for i, test := range []struct {
|
||||||
input string
|
input string
|
||||||
|
|
|
@ -11,6 +11,8 @@ import (
|
||||||
"github.com/coredns/coredns/plugin"
|
"github.com/coredns/coredns/plugin"
|
||||||
"github.com/coredns/coredns/plugin/pkg/parse"
|
"github.com/coredns/coredns/plugin/pkg/parse"
|
||||||
"github.com/coredns/coredns/plugin/pkg/transport"
|
"github.com/coredns/coredns/plugin/pkg/transport"
|
||||||
|
|
||||||
|
"github.com/miekg/dns"
|
||||||
)
|
)
|
||||||
|
|
||||||
const serverType = "dns"
|
const serverType = "dns"
|
||||||
|
@ -60,31 +62,42 @@ func (h *dnsContext) InspectServerBlocks(sourceFile string, serverBlocks []caddy
|
||||||
for ib, s := range serverBlocks {
|
for ib, s := range serverBlocks {
|
||||||
// Walk the s.Keys and expand any reverse address in their proper DNS in-addr zones. If the expansions leads for
|
// Walk the s.Keys and expand any reverse address in their proper DNS in-addr zones. If the expansions leads for
|
||||||
// more than one reverse zone, replace the current value and add the rest to s.Keys.
|
// more than one reverse zone, replace the current value and add the rest to s.Keys.
|
||||||
|
zoneAddrs := []zoneAddr{}
|
||||||
for ik, k := range s.Keys {
|
for ik, k := range s.Keys {
|
||||||
_, k1 := parse.Transport(k) // get rid of any dns:// or other scheme.
|
trans, k1 := parse.Transport(k) // get rid of any dns:// or other scheme.
|
||||||
_, port, ipnet, err := plugin.SplitHostPort(k1)
|
hosts, port, err := plugin.SplitHostPort(k1)
|
||||||
if ipnet == nil || err != nil { // err will be caught below
|
if err != nil {
|
||||||
continue
|
return nil, err
|
||||||
}
|
}
|
||||||
if port != "" {
|
|
||||||
port = ":" + port
|
if port == "" {
|
||||||
}
|
switch trans {
|
||||||
nets := classFromCIDR(ipnet)
|
case transport.DNS:
|
||||||
if len(nets) > 1 {
|
port = Port
|
||||||
s.Keys[ik] = nets[0] + port // replace for the first
|
case transport.TLS:
|
||||||
for _, n := range nets[1:] { // add the rest
|
port = transport.TLSPort
|
||||||
s.Keys = append(s.Keys, n+port)
|
case transport.GRPC:
|
||||||
|
port = transport.GRPCPort
|
||||||
|
case transport.HTTPS:
|
||||||
|
port = transport.HTTPSPort
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if len(hosts) > 1 {
|
||||||
|
s.Keys[ik] = hosts[0] + ":" + port // replace for the first
|
||||||
|
for _, h := range hosts[1:] { // add the rest
|
||||||
|
s.Keys = append(s.Keys, h+":"+port)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for i := range hosts {
|
||||||
|
zoneAddrs = append(zoneAddrs, zoneAddr{Zone: dns.Fqdn(hosts[i]), Port: port, Transport: trans})
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
serverBlocks[ib].Keys = s.Keys // important to save back the new keys that are potentially created here.
|
serverBlocks[ib].Keys = s.Keys // important to save back the new keys that are potentially created here.
|
||||||
|
|
||||||
for ik, k := range s.Keys {
|
for ik := range s.Keys {
|
||||||
za, err := normalizeZone(k)
|
za := zoneAddrs[ik]
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
s.Keys[ik] = za.String()
|
s.Keys[ik] = za.String()
|
||||||
// Save the config to our master list, and key it for lookups.
|
// Save the config to our master list, and key it for lookups.
|
||||||
cfg := &Config{
|
cfg := &Config{
|
||||||
|
|
|
@ -1,38 +0,0 @@
|
||||||
package dnsserver
|
|
||||||
|
|
||||||
import (
|
|
||||||
"math"
|
|
||||||
"net"
|
|
||||||
|
|
||||||
"github.com/apparentlymart/go-cidr/cidr"
|
|
||||||
)
|
|
||||||
|
|
||||||
// classFromCIDR return slice of "classful" (/8, /16, /24 or /32 only) CIDR's from the CIDR in net.
|
|
||||||
func classFromCIDR(n *net.IPNet) []string {
|
|
||||||
ones, _ := n.Mask.Size()
|
|
||||||
if ones%8 == 0 {
|
|
||||||
return []string{n.String()}
|
|
||||||
}
|
|
||||||
|
|
||||||
mask := int(math.Ceil(float64(ones)/8)) * 8
|
|
||||||
networks := subnets(n, mask)
|
|
||||||
cidrs := make([]string, len(networks))
|
|
||||||
for i := range networks {
|
|
||||||
cidrs[i] = networks[i].String()
|
|
||||||
}
|
|
||||||
return cidrs
|
|
||||||
}
|
|
||||||
|
|
||||||
// subnets return a slice of prefixes with the desired mask subnetted from original network.
|
|
||||||
func subnets(network *net.IPNet, newPrefixLen int) []*net.IPNet {
|
|
||||||
prefixLen, _ := network.Mask.Size()
|
|
||||||
maxSubnets := int(math.Exp2(float64(newPrefixLen)) / math.Exp2(float64(prefixLen)))
|
|
||||||
nets := []*net.IPNet{{network.IP, net.CIDRMask(newPrefixLen, 8*len(network.IP))}}
|
|
||||||
|
|
||||||
for i := 1; i < maxSubnets; i++ {
|
|
||||||
next, _ := cidr.NextSubnet(nets[len(nets)-1], newPrefixLen)
|
|
||||||
nets = append(nets, next)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nets
|
|
||||||
}
|
|
|
@ -1,31 +0,0 @@
|
||||||
package dnsserver
|
|
||||||
|
|
||||||
import (
|
|
||||||
"net"
|
|
||||||
"testing"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestClassFromCIDR(t *testing.T) {
|
|
||||||
tests := []struct {
|
|
||||||
in string
|
|
||||||
expected []string
|
|
||||||
}{
|
|
||||||
{"10.0.0.0/15", []string{"10.0.0.0/16", "10.1.0.0/16"}},
|
|
||||||
{"10.0.0.0/16", []string{"10.0.0.0/16"}},
|
|
||||||
{"192.168.1.1/23", []string{"192.168.0.0/24", "192.168.1.0/24"}},
|
|
||||||
{"10.129.60.0/22", []string{"10.129.60.0/24", "10.129.61.0/24", "10.129.62.0/24", "10.129.63.0/24"}},
|
|
||||||
}
|
|
||||||
for i, tc := range tests {
|
|
||||||
_, n, _ := net.ParseCIDR(tc.in)
|
|
||||||
nets := classFromCIDR(n)
|
|
||||||
if len(nets) != len(tc.expected) {
|
|
||||||
t.Errorf("Test %d, expected %d subnets, got %d", i, len(tc.expected), len(nets))
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
for j := range nets {
|
|
||||||
if nets[j] != tc.expected[j] {
|
|
||||||
t.Errorf("Test %d, expected %s, got %s", i, tc.expected[j], nets[j])
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -233,7 +233,7 @@ func TestACLServeDNS(t *testing.T) {
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"Fine-Grained 2 REFUSED",
|
"Fine-Grained 2 REFUSED",
|
||||||
`acl {
|
`acl example.org {
|
||||||
block net 192.168.1.0/24
|
block net 192.168.1.0/24
|
||||||
}`,
|
}`,
|
||||||
[]string{"example.org"},
|
[]string{"example.org"},
|
||||||
|
|
|
@ -43,15 +43,8 @@ func parse(c *caddy.Controller) (ACL, error) {
|
||||||
a := ACL{}
|
a := ACL{}
|
||||||
for c.Next() {
|
for c.Next() {
|
||||||
r := rule{}
|
r := rule{}
|
||||||
r.zones = c.RemainingArgs()
|
args := c.RemainingArgs()
|
||||||
if len(r.zones) == 0 {
|
r.zones = plugin.OriginsFromArgsOrServerBlock(args, c.ServerBlockKeys)
|
||||||
// if empty, the zones from the configuration block are used.
|
|
||||||
r.zones = make([]string, len(c.ServerBlockKeys))
|
|
||||||
copy(r.zones, c.ServerBlockKeys)
|
|
||||||
}
|
|
||||||
for i := range r.zones {
|
|
||||||
r.zones[i] = plugin.Host(r.zones[i]).Normalize()
|
|
||||||
}
|
|
||||||
|
|
||||||
for c.NextBlock() {
|
for c.NextBlock() {
|
||||||
p := policy{}
|
p := policy{}
|
||||||
|
|
|
@ -87,16 +87,8 @@ func autoParse(c *caddy.Controller) (Auto, error) {
|
||||||
|
|
||||||
for c.Next() {
|
for c.Next() {
|
||||||
// auto [ZONES...]
|
// auto [ZONES...]
|
||||||
a.Zones.origins = make([]string, len(c.ServerBlockKeys))
|
|
||||||
copy(a.Zones.origins, c.ServerBlockKeys)
|
|
||||||
|
|
||||||
args := c.RemainingArgs()
|
args := c.RemainingArgs()
|
||||||
if len(args) > 0 {
|
a.Zones.origins = plugin.OriginsFromArgsOrServerBlock(args, c.ServerBlockKeys)
|
||||||
a.Zones.origins = args
|
|
||||||
}
|
|
||||||
for i := range a.Zones.origins {
|
|
||||||
a.Zones.origins[i] = plugin.Host(a.Zones.origins[i]).Normalize()
|
|
||||||
}
|
|
||||||
a.loader.upstream = upstream.New()
|
a.loader.upstream = upstream.New()
|
||||||
|
|
||||||
for c.NextBlock() {
|
for c.NextBlock() {
|
||||||
|
|
|
@ -62,14 +62,8 @@ func autoPathParse(c *caddy.Controller) (*AutoPath, string, error) {
|
||||||
plugin.Zones(ap.search).Normalize()
|
plugin.Zones(ap.search).Normalize()
|
||||||
ap.search = append(ap.search, "") // sentinel value as demanded.
|
ap.search = append(ap.search, "") // sentinel value as demanded.
|
||||||
}
|
}
|
||||||
ap.Zones = zoneAndresolv[:len(zoneAndresolv)-1]
|
zones := zoneAndresolv[:len(zoneAndresolv)-1]
|
||||||
if len(ap.Zones) == 0 {
|
ap.Zones = plugin.OriginsFromArgsOrServerBlock(zones, c.ServerBlockKeys)
|
||||||
ap.Zones = make([]string, len(c.ServerBlockKeys))
|
|
||||||
copy(ap.Zones, c.ServerBlockKeys)
|
|
||||||
}
|
|
||||||
for i, str := range ap.Zones {
|
|
||||||
ap.Zones[i] = plugin.Host(str).Normalize()
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
return ap, mw, nil
|
return ap, mw, nil
|
||||||
}
|
}
|
||||||
|
|
11
plugin/cache/setup.go
vendored
11
plugin/cache/setup.go
vendored
|
@ -41,10 +41,7 @@ func cacheParse(c *caddy.Controller) (*Cache, error) {
|
||||||
j++
|
j++
|
||||||
|
|
||||||
// cache [ttl] [zones..]
|
// cache [ttl] [zones..]
|
||||||
origins := make([]string, len(c.ServerBlockKeys))
|
|
||||||
copy(origins, c.ServerBlockKeys)
|
|
||||||
args := c.RemainingArgs()
|
args := c.RemainingArgs()
|
||||||
|
|
||||||
if len(args) > 0 {
|
if len(args) > 0 {
|
||||||
// first args may be just a number, then it is the ttl, if not it is a zone
|
// first args may be just a number, then it is the ttl, if not it is a zone
|
||||||
ttl, err := strconv.Atoi(args[0])
|
ttl, err := strconv.Atoi(args[0])
|
||||||
|
@ -57,10 +54,8 @@ func cacheParse(c *caddy.Controller) (*Cache, error) {
|
||||||
ca.nttl = time.Duration(ttl) * time.Second
|
ca.nttl = time.Duration(ttl) * time.Second
|
||||||
args = args[1:]
|
args = args[1:]
|
||||||
}
|
}
|
||||||
if len(args) > 0 {
|
|
||||||
copy(origins, args)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
origins := plugin.OriginsFromArgsOrServerBlock(args, c.ServerBlockKeys)
|
||||||
|
|
||||||
// Refinements? In an extra block.
|
// Refinements? In an extra block.
|
||||||
for c.NextBlock() {
|
for c.NextBlock() {
|
||||||
|
@ -189,11 +184,7 @@ func cacheParse(c *caddy.Controller) (*Cache, error) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
for i := range origins {
|
|
||||||
origins[i] = plugin.Host(origins[i]).Normalize()
|
|
||||||
}
|
|
||||||
ca.Zones = origins
|
ca.Zones = origins
|
||||||
|
|
||||||
ca.pcache = cache.New(ca.pcap)
|
ca.pcache = cache.New(ca.pcap)
|
||||||
ca.ncache = cache.New(ca.ncap)
|
ca.ncache = cache.New(ca.ncap)
|
||||||
}
|
}
|
||||||
|
|
|
@ -44,9 +44,7 @@ func setup(c *caddy.Controller) error {
|
||||||
|
|
||||||
func dnssecParse(c *caddy.Controller) ([]string, []*DNSKEY, int, bool, error) {
|
func dnssecParse(c *caddy.Controller) ([]string, []*DNSKEY, int, bool, error) {
|
||||||
zones := []string{}
|
zones := []string{}
|
||||||
|
|
||||||
keys := []*DNSKEY{}
|
keys := []*DNSKEY{}
|
||||||
|
|
||||||
capacity := defaultCap
|
capacity := defaultCap
|
||||||
|
|
||||||
i := 0
|
i := 0
|
||||||
|
@ -57,12 +55,7 @@ func dnssecParse(c *caddy.Controller) ([]string, []*DNSKEY, int, bool, error) {
|
||||||
i++
|
i++
|
||||||
|
|
||||||
// dnssec [zones...]
|
// dnssec [zones...]
|
||||||
zones = make([]string, len(c.ServerBlockKeys))
|
zones = plugin.OriginsFromArgsOrServerBlock(c.RemainingArgs(), c.ServerBlockKeys)
|
||||||
copy(zones, c.ServerBlockKeys)
|
|
||||||
args := c.RemainingArgs()
|
|
||||||
if len(args) > 0 {
|
|
||||||
zones = args
|
|
||||||
}
|
|
||||||
|
|
||||||
for c.NextBlock() {
|
for c.NextBlock() {
|
||||||
|
|
||||||
|
@ -89,10 +82,6 @@ func dnssecParse(c *caddy.Controller) ([]string, []*DNSKEY, int, bool, error) {
|
||||||
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
for i := range zones {
|
|
||||||
zones[i] = plugin.Host(zones[i]).Normalize()
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if we have both KSKs and ZSKs.
|
// Check if we have both KSKs and ZSKs.
|
||||||
zsk, ksk := 0, 0
|
zsk, ksk := 0, 0
|
||||||
for _, k := range keys {
|
for _, k := range keys {
|
||||||
|
|
|
@ -41,15 +41,7 @@ func etcdParse(c *caddy.Controller) (*Etcd, error) {
|
||||||
etc.Upstream = upstream.New()
|
etc.Upstream = upstream.New()
|
||||||
|
|
||||||
for c.Next() {
|
for c.Next() {
|
||||||
etc.Zones = c.RemainingArgs()
|
etc.Zones = plugin.OriginsFromArgsOrServerBlock(c.RemainingArgs(), c.ServerBlockKeys)
|
||||||
if len(etc.Zones) == 0 {
|
|
||||||
etc.Zones = make([]string, len(c.ServerBlockKeys))
|
|
||||||
copy(etc.Zones, c.ServerBlockKeys)
|
|
||||||
}
|
|
||||||
for i, str := range etc.Zones {
|
|
||||||
etc.Zones[i] = plugin.Host(str).Normalize()
|
|
||||||
}
|
|
||||||
|
|
||||||
for c.NextBlock() {
|
for c.NextBlock() {
|
||||||
switch c.Val() {
|
switch c.Val() {
|
||||||
case "stubzones":
|
case "stubzones":
|
||||||
|
|
|
@ -82,13 +82,7 @@ func fileParse(c *caddy.Controller) (Zones, error) {
|
||||||
}
|
}
|
||||||
fileName := c.Val()
|
fileName := c.Val()
|
||||||
|
|
||||||
origins := make([]string, len(c.ServerBlockKeys))
|
origins := plugin.OriginsFromArgsOrServerBlock(c.RemainingArgs(), c.ServerBlockKeys)
|
||||||
copy(origins, c.ServerBlockKeys)
|
|
||||||
args := c.RemainingArgs()
|
|
||||||
if len(args) > 0 {
|
|
||||||
origins = args
|
|
||||||
}
|
|
||||||
|
|
||||||
if !filepath.IsAbs(fileName) && config.Root != "" {
|
if !filepath.IsAbs(fileName) && config.Root != "" {
|
||||||
fileName = filepath.Join(config.Root, fileName)
|
fileName = filepath.Join(config.Root, fileName)
|
||||||
}
|
}
|
||||||
|
@ -99,16 +93,14 @@ func fileParse(c *caddy.Controller) (Zones, error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
for i := range origins {
|
for i := range origins {
|
||||||
origins[i] = plugin.Host(origins[i]).Normalize()
|
|
||||||
z[origins[i]] = NewZone(origins[i], fileName)
|
z[origins[i]] = NewZone(origins[i], fileName)
|
||||||
if openErr == nil {
|
if openErr == nil {
|
||||||
reader.Seek(0, 0)
|
reader.Seek(0, 0)
|
||||||
zone, err := Parse(reader, origins[i], fileName, 0)
|
zone, err := Parse(reader, origins[i], fileName, 0)
|
||||||
if err == nil {
|
if err != nil {
|
||||||
z[origins[i]] = zone
|
|
||||||
} else {
|
|
||||||
return Zones{}, err
|
return Zones{}, err
|
||||||
}
|
}
|
||||||
|
z[origins[i]] = zone
|
||||||
}
|
}
|
||||||
names = append(names, origins[i])
|
names = append(names, origins[i])
|
||||||
}
|
}
|
||||||
|
|
|
@ -92,7 +92,7 @@ func parseStanza(c *caddy.Controller) (*Forward, error) {
|
||||||
if !c.Args(&f.from) {
|
if !c.Args(&f.from) {
|
||||||
return f, c.ArgErr()
|
return f, c.ArgErr()
|
||||||
}
|
}
|
||||||
f.from = plugin.Host(f.from).Normalize()
|
f.from = plugin.Host(f.from).Normalize()[0] // there can only be one here, won't work with non-octet reverse
|
||||||
|
|
||||||
to := c.RemainingArgs()
|
to := c.RemainingArgs()
|
||||||
if len(to) == 0 {
|
if len(to) == 0 {
|
||||||
|
@ -151,9 +151,8 @@ func parseBlock(c *caddy.Controller, f *Forward) error {
|
||||||
return c.ArgErr()
|
return c.ArgErr()
|
||||||
}
|
}
|
||||||
for i := 0; i < len(ignore); i++ {
|
for i := 0; i < len(ignore); i++ {
|
||||||
ignore[i] = plugin.Host(ignore[i]).Normalize()
|
f.ignored = append(f.ignored, plugin.Host(ignore[i]).Normalize()...)
|
||||||
}
|
}
|
||||||
f.ignored = ignore
|
|
||||||
case "max_fails":
|
case "max_fails":
|
||||||
if !c.NextArg() {
|
if !c.NextArg() {
|
||||||
return c.ArgErr()
|
return c.ArgErr()
|
||||||
|
|
|
@ -56,7 +56,7 @@ func parseStanza(c *caddy.Controller) (*GRPC, error) {
|
||||||
if !c.Args(&g.from) {
|
if !c.Args(&g.from) {
|
||||||
return g, c.ArgErr()
|
return g, c.ArgErr()
|
||||||
}
|
}
|
||||||
g.from = plugin.Host(g.from).Normalize()
|
g.from = plugin.Host(g.from).Normalize()[0] // only the first is used.
|
||||||
|
|
||||||
to := c.RemainingArgs()
|
to := c.RemainingArgs()
|
||||||
if len(to) == 0 {
|
if len(to) == 0 {
|
||||||
|
@ -100,9 +100,8 @@ func parseBlock(c *caddy.Controller, g *GRPC) error {
|
||||||
return c.ArgErr()
|
return c.ArgErr()
|
||||||
}
|
}
|
||||||
for i := 0; i < len(ignore); i++ {
|
for i := 0; i < len(ignore); i++ {
|
||||||
ignore[i] = plugin.Host(ignore[i]).Normalize()
|
g.ignored = append(g.ignored, plugin.Host(ignore[i]).Normalize()...)
|
||||||
}
|
}
|
||||||
g.ignored = ignore
|
|
||||||
case "tls":
|
case "tls":
|
||||||
args := c.RemainingArgs()
|
args := c.RemainingArgs()
|
||||||
if len(args) > 3 {
|
if len(args) > 3 {
|
||||||
|
|
|
@ -106,16 +106,7 @@ func hostsParse(c *caddy.Controller) (Hosts, error) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
origins := make([]string, len(c.ServerBlockKeys))
|
h.Origins = plugin.OriginsFromArgsOrServerBlock(args, c.ServerBlockKeys)
|
||||||
copy(origins, c.ServerBlockKeys)
|
|
||||||
if len(args) > 0 {
|
|
||||||
origins = args
|
|
||||||
}
|
|
||||||
|
|
||||||
for i := range origins {
|
|
||||||
origins[i] = plugin.Host(origins[i]).Normalize()
|
|
||||||
}
|
|
||||||
h.Origins = origins
|
|
||||||
|
|
||||||
for c.NextBlock() {
|
for c.NextBlock() {
|
||||||
switch c.Val() {
|
switch c.Val() {
|
||||||
|
|
|
@ -44,15 +44,7 @@ func parse(c *caddy.Controller) (*External, error) {
|
||||||
e := New()
|
e := New()
|
||||||
|
|
||||||
for c.Next() { // external
|
for c.Next() { // external
|
||||||
zones := c.RemainingArgs()
|
e.Zones = plugin.OriginsFromArgsOrServerBlock(c.RemainingArgs(), c.ServerBlockKeys)
|
||||||
e.Zones = zones
|
|
||||||
if len(zones) == 0 {
|
|
||||||
e.Zones = make([]string, len(c.ServerBlockKeys))
|
|
||||||
copy(e.Zones, c.ServerBlockKeys)
|
|
||||||
}
|
|
||||||
for i, str := range e.Zones {
|
|
||||||
e.Zones[i] = plugin.Host(str).Normalize()
|
|
||||||
}
|
|
||||||
for c.NextBlock() {
|
for c.NextBlock() {
|
||||||
switch c.Val() {
|
switch c.Val() {
|
||||||
case "ttl":
|
case "ttl":
|
||||||
|
|
|
@ -96,19 +96,7 @@ func ParseStanza(c *caddy.Controller) (*Kubernetes, error) {
|
||||||
}
|
}
|
||||||
k8s.opts = opts
|
k8s.opts = opts
|
||||||
|
|
||||||
zones := c.RemainingArgs()
|
k8s.Zones = plugin.OriginsFromArgsOrServerBlock(c.RemainingArgs(), c.ServerBlockKeys)
|
||||||
|
|
||||||
if len(zones) != 0 {
|
|
||||||
k8s.Zones = zones
|
|
||||||
for i := 0; i < len(k8s.Zones); i++ {
|
|
||||||
k8s.Zones[i] = plugin.Host(k8s.Zones[i]).Normalize()
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
k8s.Zones = make([]string, len(c.ServerBlockKeys))
|
|
||||||
for i := 0; i < len(c.ServerBlockKeys); i++ {
|
|
||||||
k8s.Zones[i] = plugin.Host(c.ServerBlockKeys[i]).Normalize()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
k8s.primaryZoneIndex = -1
|
k8s.primaryZoneIndex = -1
|
||||||
for i, z := range k8s.Zones {
|
for i, z := range k8s.Zones {
|
||||||
|
|
|
@ -1,36 +0,0 @@
|
||||||
package kubernetes
|
|
||||||
|
|
||||||
import (
|
|
||||||
"testing"
|
|
||||||
|
|
||||||
"github.com/coredns/caddy"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestKubernetesParseReverseZone(t *testing.T) {
|
|
||||||
tests := []struct {
|
|
||||||
input string // Corefile data as string
|
|
||||||
expectedZones []string // expected count of defined zones.
|
|
||||||
}{
|
|
||||||
{`kubernetes coredns.local 10.0.0.0/16`, []string{"coredns.local.", "0.10.in-addr.arpa."}},
|
|
||||||
{`kubernetes coredns.local 10.0.0.0/17`, []string{"coredns.local.", "0.10.in-addr.arpa."}},
|
|
||||||
{`kubernetes coredns.local fd00:77:30::0/110`, []string{"coredns.local.", "0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.7.7.0.0.0.0.d.f.ip6.arpa."}},
|
|
||||||
}
|
|
||||||
|
|
||||||
for i, tc := range tests {
|
|
||||||
c := caddy.NewTestController("dns", tc.input)
|
|
||||||
k, err := kubernetesParse(c)
|
|
||||||
if err != nil {
|
|
||||||
t.Fatalf("Test %d: Expected no error, got %q", i, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
zl := len(k.Zones)
|
|
||||||
if zl != len(tc.expectedZones) {
|
|
||||||
t.Errorf("Test %d: Expected kubernetes to be initialized with %d zones, found %d zones", i, len(tc.expectedZones), zl)
|
|
||||||
}
|
|
||||||
for i, z := range tc.expectedZones {
|
|
||||||
if k.Zones[i] != z {
|
|
||||||
t.Errorf("Test %d: Expected zones to be %q, got %q", i, z, k.Zones[i])
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -13,6 +13,8 @@ The plugin will try to send the query for up to 30 seconds. This is done to give
|
||||||
to start up. Once a query has been successfully sent, *loop* disables itself to prevent a query of
|
to start up. Once a query has been successfully sent, *loop* disables itself to prevent a query of
|
||||||
death.
|
death.
|
||||||
|
|
||||||
|
Note that *loop* will _only_ send "looping queries" for the first zone given in the Server Block.
|
||||||
|
|
||||||
The query sent is `<random number>.<random number>.zone` with type set to HINFO.
|
The query sent is `<random number>.<random number>.zone` with type set to HINFO.
|
||||||
|
|
||||||
## Syntax
|
## Syntax
|
||||||
|
|
|
@ -59,7 +59,7 @@ func setup(c *caddy.Controller) error {
|
||||||
|
|
||||||
func parse(c *caddy.Controller) (*Loop, error) {
|
func parse(c *caddy.Controller) (*Loop, error) {
|
||||||
i := 0
|
i := 0
|
||||||
zone := "."
|
zones := []string{"."}
|
||||||
for c.Next() {
|
for c.Next() {
|
||||||
if i > 0 {
|
if i > 0 {
|
||||||
return nil, plugin.ErrOnce
|
return nil, plugin.ErrOnce
|
||||||
|
@ -70,10 +70,10 @@ func parse(c *caddy.Controller) (*Loop, error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(c.ServerBlockKeys) > 0 {
|
if len(c.ServerBlockKeys) > 0 {
|
||||||
zone = plugin.Host(c.ServerBlockKeys[0]).Normalize()
|
zones = plugin.Host(c.ServerBlockKeys[0]).Normalize()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return New(zone), nil
|
return New(zones[0]), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// qname returns a random name. <rand.Int()>.<rand.Int().<zone>.
|
// qname returns a random name. <rand.Int()>.<rand.Int().<zone>.
|
||||||
|
|
|
@ -34,19 +34,8 @@ func setup(c *caddy.Controller) error {
|
||||||
func metadataParse(c *caddy.Controller) (*Metadata, error) {
|
func metadataParse(c *caddy.Controller) (*Metadata, error) {
|
||||||
m := &Metadata{}
|
m := &Metadata{}
|
||||||
c.Next()
|
c.Next()
|
||||||
zones := c.RemainingArgs()
|
|
||||||
|
|
||||||
if len(zones) != 0 {
|
m.Zones = plugin.OriginsFromArgsOrServerBlock(c.RemainingArgs(), c.ServerBlockKeys)
|
||||||
m.Zones = zones
|
|
||||||
for i := 0; i < len(m.Zones); i++ {
|
|
||||||
m.Zones[i] = plugin.Host(m.Zones[i]).Normalize()
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
m.Zones = make([]string, len(c.ServerBlockKeys))
|
|
||||||
for i := 0; i < len(c.ServerBlockKeys); i++ {
|
|
||||||
m.Zones[i] = plugin.Host(c.ServerBlockKeys[i]).Normalize()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if c.NextBlock() || c.Next() {
|
if c.NextBlock() || c.Next() {
|
||||||
return nil, plugin.Error("metadata", c.ArgErr())
|
return nil, plugin.Error("metadata", c.ArgErr())
|
||||||
|
|
|
@ -80,8 +80,9 @@ func parse(c *caddy.Controller) (*Metrics, error) {
|
||||||
}
|
}
|
||||||
i++
|
i++
|
||||||
|
|
||||||
for _, z := range c.ServerBlockKeys {
|
zones := plugin.OriginsFromArgsOrServerBlock(nil /* args */, c.ServerBlockKeys)
|
||||||
met.AddZone(plugin.Host(z).Normalize())
|
for _, z := range zones {
|
||||||
|
met.AddZone(z)
|
||||||
}
|
}
|
||||||
args := c.RemainingArgs()
|
args := c.RemainingArgs()
|
||||||
|
|
||||||
|
|
|
@ -6,6 +6,7 @@ import (
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
"github.com/coredns/coredns/plugin/pkg/cidr"
|
||||||
"github.com/coredns/coredns/plugin/pkg/parse"
|
"github.com/coredns/coredns/plugin/pkg/parse"
|
||||||
|
|
||||||
"github.com/miekg/dns"
|
"github.com/miekg/dns"
|
||||||
|
@ -62,82 +63,77 @@ type (
|
||||||
|
|
||||||
// Normalize will return the host portion of host, stripping
|
// Normalize will return the host portion of host, stripping
|
||||||
// of any port or transport. The host will also be fully qualified and lowercased.
|
// of any port or transport. The host will also be fully qualified and lowercased.
|
||||||
// An empty string is returned on failure
|
// An empty slice is returned on failure
|
||||||
func (h Host) Normalize() string {
|
func (h Host) Normalize() []string {
|
||||||
// The error can be ignored here, because this function should only be called after the corefile has already been vetted.
|
// The error can be ignored here, because this function should only be called after the corefile has already been vetted.
|
||||||
host, _ := h.MustNormalize()
|
|
||||||
return host
|
|
||||||
}
|
|
||||||
|
|
||||||
// MustNormalize will return the host portion of host, stripping
|
|
||||||
// of any port or transport. The host will also be fully qualified and lowercased.
|
|
||||||
// An error is returned on error
|
|
||||||
func (h Host) MustNormalize() (string, error) {
|
|
||||||
s := string(h)
|
s := string(h)
|
||||||
_, s = parse.Transport(s)
|
_, s = parse.Transport(s)
|
||||||
|
|
||||||
// The error can be ignored here, because this function is called after the corefile has already been vetted.
|
hosts, _, err := SplitHostPort(s)
|
||||||
host, _, _, err := SplitHostPort(s)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return nil
|
||||||
}
|
}
|
||||||
return Name(host).Normalize(), nil
|
for i := range hosts {
|
||||||
|
hosts[i] = Name(hosts[i]).Normalize()
|
||||||
|
|
||||||
|
}
|
||||||
|
return hosts
|
||||||
}
|
}
|
||||||
|
|
||||||
// SplitHostPort splits s up in a host and port portion, taking reverse address notation into account.
|
// SplitHostPort splits s up in a host(s) and port portion, taking reverse address notation into account.
|
||||||
// String the string s should *not* be prefixed with any protocols, i.e. dns://. The returned ipnet is the
|
// String the string s should *not* be prefixed with any protocols, i.e. dns://. SplitHostPort can return
|
||||||
// *net.IPNet that is used when the zone is a reverse and a netmask is given.
|
// multiple hosts when a reverse notation on a non-octet boundary is given.
|
||||||
func SplitHostPort(s string) (host, port string, ipnet *net.IPNet, err error) {
|
func SplitHostPort(s string) (hosts []string, port string, err error) {
|
||||||
// If there is: :[0-9]+ on the end we assume this is the port. This works for (ascii) domain
|
// If there is: :[0-9]+ on the end we assume this is the port. This works for (ascii) domain
|
||||||
// names and our reverse syntax, which always needs a /mask *before* the port.
|
// names and our reverse syntax, which always needs a /mask *before* the port.
|
||||||
// So from the back, find first colon, and then check if it's a number.
|
// So from the back, find first colon, and then check if it's a number.
|
||||||
host = s
|
|
||||||
|
|
||||||
colon := strings.LastIndex(s, ":")
|
colon := strings.LastIndex(s, ":")
|
||||||
if colon == len(s)-1 {
|
if colon == len(s)-1 {
|
||||||
return "", "", nil, fmt.Errorf("expecting data after last colon: %q", s)
|
return nil, "", fmt.Errorf("expecting data after last colon: %q", s)
|
||||||
}
|
}
|
||||||
if colon != -1 {
|
if colon != -1 {
|
||||||
if p, err := strconv.Atoi(s[colon+1:]); err == nil {
|
if p, err := strconv.Atoi(s[colon+1:]); err == nil {
|
||||||
port = strconv.Itoa(p)
|
port = strconv.Itoa(p)
|
||||||
host = s[:colon]
|
s = s[:colon]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO(miek): this should take escaping into account.
|
// TODO(miek): this should take escaping into account.
|
||||||
if len(host) > 255 {
|
if len(s) > 255 {
|
||||||
return "", "", nil, fmt.Errorf("specified zone is too long: %d > 255", len(host))
|
return nil, "", fmt.Errorf("specified zone is too long: %d > 255", len(s))
|
||||||
}
|
}
|
||||||
|
|
||||||
_, d := dns.IsDomainName(host)
|
if _, ok := dns.IsDomainName(s); !ok {
|
||||||
if !d {
|
return nil, "", fmt.Errorf("zone is not a valid domain name: %s", s)
|
||||||
return "", "", nil, fmt.Errorf("zone is not a valid domain name: %s", host)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check if it parses as a reverse zone, if so we use that. Must be fully specified IP and mask.
|
// Check if it parses as a reverse zone, if so we use that. Must be fully specified IP and mask.
|
||||||
ip, n, err := net.ParseCIDR(host)
|
_, n, err := net.ParseCIDR(s)
|
||||||
ones, bits := 0, 0
|
if err != nil {
|
||||||
if err == nil {
|
return []string{s}, port, nil
|
||||||
if rev, e := dns.ReverseAddr(ip.String()); e == nil {
|
|
||||||
ones, bits = n.Mask.Size()
|
|
||||||
// get the size, in bits, of each portion of hostname defined in the reverse address. (8 for IPv4, 4 for IPv6)
|
|
||||||
sizeDigit := 8
|
|
||||||
if len(n.IP) == net.IPv6len {
|
|
||||||
sizeDigit = 4
|
|
||||||
}
|
|
||||||
// Get the first lower octet boundary to see what encompassing zone we should be authoritative for.
|
|
||||||
mod := (bits - ones) % sizeDigit
|
|
||||||
nearest := (bits - ones) + mod
|
|
||||||
offset := 0
|
|
||||||
var end bool
|
|
||||||
for i := 0; i < nearest/sizeDigit; i++ {
|
|
||||||
offset, end = dns.NextLabel(rev, offset)
|
|
||||||
if end {
|
|
||||||
break
|
|
||||||
}
|
|
||||||
}
|
|
||||||
host = rev[offset:]
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
return host, port, n, nil
|
|
||||||
|
// now check if multiple hosts must be returned.
|
||||||
|
nets := cidr.Class(n)
|
||||||
|
hosts = cidr.Reverse(nets)
|
||||||
|
return hosts, port, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// OriginsFromArgsOrServerBlock returns the normalized args if that slice
|
||||||
|
// is not empty, otherwise the serverblock slice is returned (in a newly copied slice).
|
||||||
|
func OriginsFromArgsOrServerBlock(args, serverblock []string) []string {
|
||||||
|
if len(args) == 0 {
|
||||||
|
s := make([]string, len(serverblock))
|
||||||
|
copy(s, serverblock)
|
||||||
|
for i := range s {
|
||||||
|
s[i] = Host(s[i]).Normalize()[0] // expansion of these already happened in dnsserver/registrer.go
|
||||||
|
}
|
||||||
|
return s
|
||||||
|
}
|
||||||
|
s := []string{}
|
||||||
|
for i := range args {
|
||||||
|
s = append(s, Host(args[i]).Normalize()...)
|
||||||
|
}
|
||||||
|
|
||||||
|
return s
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,6 +1,9 @@
|
||||||
package plugin
|
package plugin
|
||||||
|
|
||||||
import "testing"
|
import (
|
||||||
|
"sort"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
func TestZoneMatches(t *testing.T) {
|
func TestZoneMatches(t *testing.T) {
|
||||||
child := "example.org."
|
child := "example.org."
|
||||||
|
@ -69,55 +72,26 @@ func TestNameNormalize(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestHostNormalize(t *testing.T) {
|
func TestHostNormalize(t *testing.T) {
|
||||||
hosts := []string{".:53", ".", "example.org:53", "example.org.", "example.org.:53", "example.org.",
|
tests := []struct {
|
||||||
"10.0.0.0/8:53", "10.in-addr.arpa.", "10.0.0.0/9", "10.in-addr.arpa.",
|
in string
|
||||||
"dns://example.org", "example.org."}
|
out []string
|
||||||
|
}{
|
||||||
|
{".:53", []string{"."}},
|
||||||
|
{"example.org:53", []string{"example.org."}},
|
||||||
|
{"example.org.:53", []string{"example.org."}},
|
||||||
|
{"10.0.0.0/8:53", []string{"10.in-addr.arpa."}},
|
||||||
|
{"10.0.0.0/15", []string{"0.10.in-addr.arpa.", "1.10.in-addr.arpa."}},
|
||||||
|
{"dns://example.org", []string{"example.org."}},
|
||||||
|
}
|
||||||
|
|
||||||
for i := 0; i < len(hosts); i += 2 {
|
for i := range tests {
|
||||||
ts := hosts[i]
|
actual := Host(tests[i].in).Normalize()
|
||||||
expected := hosts[i+1]
|
expected := tests[i].out
|
||||||
actual := Host(ts).Normalize()
|
sort.Strings(expected)
|
||||||
if expected != actual {
|
for j := range expected {
|
||||||
t.Errorf("Expected %v, got %v", expected, actual)
|
if expected[j] != actual[j] {
|
||||||
}
|
t.Errorf("Test %d, expected %v, got %v", i, expected, actual)
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
func TestHostMustNormalizeFail(t *testing.T) {
|
|
||||||
hosts := []string{"..:53", "::", ""}
|
|
||||||
for i := 0; i < len(hosts); i++ {
|
|
||||||
ts := hosts[i]
|
|
||||||
h, err := Host(ts).MustNormalize()
|
|
||||||
if err == nil {
|
|
||||||
t.Errorf("Expected error, got %v", h)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestSplitHostPortReverse(t *testing.T) {
|
|
||||||
tests := map[string]int{
|
|
||||||
"example.org.": 0,
|
|
||||||
"10.0.0.0/9": 32 - 9,
|
|
||||||
"10.0.0.0/8": 32 - 8,
|
|
||||||
"10.0.0.0/17": 32 - 17,
|
|
||||||
"10.0.0.0/0": 32 - 0,
|
|
||||||
"10.0.0.0/64": 0,
|
|
||||||
"10.0.0.0": 0,
|
|
||||||
"10.0.0": 0,
|
|
||||||
"2003::1/65": 128 - 65,
|
|
||||||
}
|
|
||||||
for in, expect := range tests {
|
|
||||||
_, _, n, err := SplitHostPort(in)
|
|
||||||
if err != nil {
|
|
||||||
t.Errorf("Expected no error, got %q for %s", in, err)
|
|
||||||
}
|
|
||||||
if n == nil {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
ones, bits := n.Mask.Size()
|
|
||||||
got := bits - ones
|
|
||||||
if got != expect {
|
|
||||||
t.Errorf("Expected %d, got %d for %s", expect, got, in)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
74
plugin/pkg/cidr/cidr.go
Normal file
74
plugin/pkg/cidr/cidr.go
Normal file
|
@ -0,0 +1,74 @@
|
||||||
|
// Package cidr contains functions that deal with classless reverse zones in the DNS.
|
||||||
|
package cidr
|
||||||
|
|
||||||
|
import (
|
||||||
|
"math"
|
||||||
|
"net"
|
||||||
|
|
||||||
|
"github.com/apparentlymart/go-cidr/cidr"
|
||||||
|
"github.com/miekg/dns"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Class return slice of "classful" (/8, /16, /24 or /32 only) CIDR's from the CIDR in net.
|
||||||
|
func Class(n *net.IPNet) []string {
|
||||||
|
ones, _ := n.Mask.Size()
|
||||||
|
if ones%8 == 0 {
|
||||||
|
return []string{n.String()}
|
||||||
|
}
|
||||||
|
|
||||||
|
mask := int(math.Ceil(float64(ones)/8)) * 8
|
||||||
|
networks := nets(n, mask)
|
||||||
|
cidrs := make([]string, len(networks))
|
||||||
|
for i := range networks {
|
||||||
|
cidrs[i] = networks[i].String()
|
||||||
|
}
|
||||||
|
return cidrs
|
||||||
|
}
|
||||||
|
|
||||||
|
// nets return a slice of prefixes with the desired mask subnetted from original network.
|
||||||
|
func nets(network *net.IPNet, newPrefixLen int) []*net.IPNet {
|
||||||
|
prefixLen, _ := network.Mask.Size()
|
||||||
|
maxSubnets := int(math.Exp2(float64(newPrefixLen)) / math.Exp2(float64(prefixLen)))
|
||||||
|
nets := []*net.IPNet{{network.IP, net.CIDRMask(newPrefixLen, 8*len(network.IP))}}
|
||||||
|
|
||||||
|
for i := 1; i < maxSubnets; i++ {
|
||||||
|
next, exceeds := cidr.NextSubnet(nets[len(nets)-1], newPrefixLen)
|
||||||
|
nets = append(nets, next)
|
||||||
|
if exceeds {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nets
|
||||||
|
}
|
||||||
|
|
||||||
|
// Reverse return the reverse zones that are authoritative for each net in ns.
|
||||||
|
func Reverse(nets []string) []string {
|
||||||
|
rev := make([]string, len(nets))
|
||||||
|
for i := range nets {
|
||||||
|
ip, n, _ := net.ParseCIDR(nets[i])
|
||||||
|
r, err1 := dns.ReverseAddr(ip.String())
|
||||||
|
if err1 != nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
ones, bits := n.Mask.Size()
|
||||||
|
// get the size, in bits, of each portion of hostname defined in the reverse address. (8 for IPv4, 4 for IPv6)
|
||||||
|
sizeDigit := 8
|
||||||
|
if len(n.IP) == net.IPv6len {
|
||||||
|
sizeDigit = 4
|
||||||
|
}
|
||||||
|
// Get the first lower octet boundary to see what encompassing zone we should be authoritative for.
|
||||||
|
mod := (bits - ones) % sizeDigit
|
||||||
|
nearest := (bits - ones) + mod
|
||||||
|
offset := 0
|
||||||
|
var end bool
|
||||||
|
for i := 0; i < nearest/sizeDigit; i++ {
|
||||||
|
offset, end = dns.NextLabel(r, offset)
|
||||||
|
if end {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
rev[i] = r[offset:]
|
||||||
|
}
|
||||||
|
return rev
|
||||||
|
}
|
46
plugin/pkg/cidr/cidr_test.go
Normal file
46
plugin/pkg/cidr/cidr_test.go
Normal file
|
@ -0,0 +1,46 @@
|
||||||
|
package cidr
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
var tests = []struct {
|
||||||
|
in string
|
||||||
|
expected []string
|
||||||
|
zones []string
|
||||||
|
}{
|
||||||
|
{"10.0.0.0/15", []string{"10.0.0.0/16", "10.1.0.0/16"}, []string{"0.10.in-addr.arpa.", "1.10.in-addr.arpa."}},
|
||||||
|
{"10.0.0.0/16", []string{"10.0.0.0/16"}, []string{"0.10.in-addr.arpa."}},
|
||||||
|
{"192.168.1.1/23", []string{"192.168.0.0/24", "192.168.1.0/24"}, []string{"0.168.192.in-addr.arpa.", "1.168.192.in-addr.arpa."}},
|
||||||
|
{"10.129.60.0/22", []string{"10.129.60.0/24", "10.129.61.0/24", "10.129.62.0/24", "10.129.63.0/24"}, []string{"60.129.10.in-addr.arpa.", "61.129.10.in-addr.arpa.", "62.129.10.in-addr.arpa.", "63.129.10.in-addr.arpa."}},
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestClass(t *testing.T) {
|
||||||
|
for i, tc := range tests {
|
||||||
|
_, n, _ := net.ParseCIDR(tc.in)
|
||||||
|
nets := Class(n)
|
||||||
|
if len(nets) != len(tc.expected) {
|
||||||
|
t.Errorf("Test %d, expected %d subnets, got %d", i, len(tc.expected), len(nets))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
for j := range nets {
|
||||||
|
if nets[j] != tc.expected[j] {
|
||||||
|
t.Errorf("Test %d, expected %s, got %s", i, tc.expected[j], nets[j])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestReverse(t *testing.T) {
|
||||||
|
for i, tc := range tests {
|
||||||
|
_, n, _ := net.ParseCIDR(tc.in)
|
||||||
|
nets := Class(n)
|
||||||
|
reverse := Reverse(nets)
|
||||||
|
for j := range reverse {
|
||||||
|
if reverse[j] != tc.zones[j] {
|
||||||
|
t.Errorf("Test %d, expected %s, got %s", i, tc.zones[j], reverse[j])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -31,10 +31,11 @@ func (f F) Through(qname string) bool {
|
||||||
|
|
||||||
// setZones will set zones in f.
|
// setZones will set zones in f.
|
||||||
func (f *F) setZones(zones []string) {
|
func (f *F) setZones(zones []string) {
|
||||||
|
z := []string{}
|
||||||
for i := range zones {
|
for i := range zones {
|
||||||
zones[i] = plugin.Host(zones[i]).Normalize()
|
z = append(z, plugin.Host(zones[i]).Normalize()...)
|
||||||
}
|
}
|
||||||
f.Zones = zones
|
f.Zones = z
|
||||||
}
|
}
|
||||||
|
|
||||||
// SetZonesFromArgs sets zones in f to the passed value or to "." if the slice is empty.
|
// SetZonesFromArgs sets zones in f to the passed value or to "." if the slice is empty.
|
||||||
|
@ -47,7 +48,7 @@ func (f *F) SetZonesFromArgs(zones []string) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Equal returns true if f and g are equal.
|
// Equal returns true if f and g are equal.
|
||||||
func (f F) Equal(g F) bool {
|
func (f *F) Equal(g F) bool {
|
||||||
if len(f.Zones) != len(g.Zones) {
|
if len(f.Zones) != len(g.Zones) {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
|
@ -47,14 +47,8 @@ func secondaryParse(c *caddy.Controller) (file.Zones, error) {
|
||||||
|
|
||||||
if c.Val() == "secondary" {
|
if c.Val() == "secondary" {
|
||||||
// secondary [origin]
|
// secondary [origin]
|
||||||
origins := make([]string, len(c.ServerBlockKeys))
|
origins := plugin.OriginsFromArgsOrServerBlock(c.RemainingArgs(), c.ServerBlockKeys)
|
||||||
copy(origins, c.ServerBlockKeys)
|
|
||||||
args := c.RemainingArgs()
|
|
||||||
if len(args) > 0 {
|
|
||||||
origins = args
|
|
||||||
}
|
|
||||||
for i := range origins {
|
for i := range origins {
|
||||||
origins[i] = plugin.Host(origins[i]).Normalize()
|
|
||||||
z[origins[i]] = file.NewZone(origins[i], "stdin")
|
z[origins[i]] = file.NewZone(origins[i], "stdin")
|
||||||
names = append(names, origins[i])
|
names = append(names, origins[i])
|
||||||
}
|
}
|
||||||
|
|
|
@ -50,21 +50,12 @@ func parse(c *caddy.Controller) (*Sign, error) {
|
||||||
dbfile = filepath.Join(config.Root, dbfile)
|
dbfile = filepath.Join(config.Root, dbfile)
|
||||||
}
|
}
|
||||||
|
|
||||||
origins := make([]string, len(c.ServerBlockKeys))
|
origins := plugin.OriginsFromArgsOrServerBlock(c.RemainingArgs(), c.ServerBlockKeys)
|
||||||
copy(origins, c.ServerBlockKeys)
|
|
||||||
args := c.RemainingArgs()
|
|
||||||
if len(args) > 0 {
|
|
||||||
origins = args
|
|
||||||
}
|
|
||||||
for i := range origins {
|
|
||||||
origins[i] = plugin.Host(origins[i]).Normalize()
|
|
||||||
}
|
|
||||||
|
|
||||||
signers := make([]*Signer, len(origins))
|
signers := make([]*Signer, len(origins))
|
||||||
for i := range origins {
|
for i := range origins {
|
||||||
signers[i] = &Signer{
|
signers[i] = &Signer{
|
||||||
dbfile: dbfile,
|
dbfile: dbfile,
|
||||||
origin: plugin.Host(origins[i]).Normalize(),
|
origin: origins[i],
|
||||||
jitterIncep: time.Duration(float32(durationInceptionJitter) * rand.Float32()),
|
jitterIncep: time.Duration(float32(durationInceptionJitter) * rand.Float32()),
|
||||||
jitterExpir: time.Duration(float32(durationExpirationDayJitter) * rand.Float32()),
|
jitterExpir: time.Duration(float32(durationExpirationDayJitter) * rand.Float32()),
|
||||||
directory: "/var/lib/coredns",
|
directory: "/var/lib/coredns",
|
||||||
|
|
|
@ -49,16 +49,8 @@ func templateParse(c *caddy.Controller) (handler Handler, err error) {
|
||||||
return handler, c.Errf("invalid RR class %s", c.Val())
|
return handler, c.Errf("invalid RR class %s", c.Val())
|
||||||
}
|
}
|
||||||
|
|
||||||
zones := c.RemainingArgs()
|
zones := plugin.OriginsFromArgsOrServerBlock(c.RemainingArgs(), c.ServerBlockKeys)
|
||||||
if len(zones) == 0 {
|
|
||||||
zones = make([]string, len(c.ServerBlockKeys))
|
|
||||||
copy(zones, c.ServerBlockKeys)
|
|
||||||
}
|
|
||||||
for i, str := range zones {
|
|
||||||
zones[i] = plugin.Host(str).Normalize()
|
|
||||||
}
|
|
||||||
handler.Zones = append(handler.Zones, zones...)
|
handler.Zones = append(handler.Zones, zones...)
|
||||||
|
|
||||||
t := template{qclass: class, qtype: qtype, zones: zones}
|
t := template{qclass: class, qtype: qtype, zones: zones}
|
||||||
|
|
||||||
t.regex = make([]*regexp.Regexp, 0)
|
t.regex = make([]*regexp.Regexp, 0)
|
||||||
|
|
|
@ -47,28 +47,7 @@ func parseTransfer(c *caddy.Controller) (*Transfer, error) {
|
||||||
t := &Transfer{}
|
t := &Transfer{}
|
||||||
for c.Next() {
|
for c.Next() {
|
||||||
x := &xfr{}
|
x := &xfr{}
|
||||||
zones := c.RemainingArgs()
|
x.Zones = plugin.OriginsFromArgsOrServerBlock(c.RemainingArgs(), c.ServerBlockKeys)
|
||||||
|
|
||||||
if len(zones) != 0 {
|
|
||||||
x.Zones = zones
|
|
||||||
for i := 0; i < len(x.Zones); i++ {
|
|
||||||
nzone, err := plugin.Host(x.Zones[i]).MustNormalize()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
x.Zones[i] = nzone
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
x.Zones = make([]string, len(c.ServerBlockKeys))
|
|
||||||
for i := 0; i < len(c.ServerBlockKeys); i++ {
|
|
||||||
nzone, err := plugin.Host(c.ServerBlockKeys[i]).MustNormalize()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
x.Zones[i] = nzone
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
for c.NextBlock() {
|
for c.NextBlock() {
|
||||||
switch c.Val() {
|
switch c.Val() {
|
||||||
case "to":
|
case "to":
|
||||||
|
|
Loading…
Add table
Reference in a new issue