* middleware/metrics: add more metrics middleware/cache: Add metrics for number of elements in the cache. Also export the total size. Update README to detail the new metrics. middleware/metrics Move metrics into subpackage called "vars". This breaks the import cycle and is cleaner. This allows vars.Report to be used in the the dnsserver to log refused queries. middleware/metrics: tests Add tests to the metrics framework. The metrics/test subpackage allows scraping of the local server. Do a few test scrape of the metrics that are defined in the metrics middleware. This also allows metrics integration tests to check if the caching and dnssec middleware export their metrics correctly. * update README * typos * fix tests
114 lines
2.9 KiB
Go
114 lines
2.9 KiB
Go
package kubernetes
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/miekg/coredns/middleware"
|
|
"github.com/miekg/coredns/middleware/pkg/dnsutil"
|
|
"github.com/miekg/coredns/request"
|
|
|
|
"github.com/miekg/dns"
|
|
"golang.org/x/net/context"
|
|
)
|
|
|
|
// ServeDNS implements the middleware.Handler interface.
|
|
func (k Kubernetes) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (int, error) {
|
|
state := request.Request{W: w, Req: r}
|
|
if state.QClass() != dns.ClassINET {
|
|
return dns.RcodeServerFailure, fmt.Errorf("can only deal with ClassINET")
|
|
}
|
|
|
|
m := new(dns.Msg)
|
|
m.SetReply(r)
|
|
m.Authoritative, m.RecursionAvailable, m.Compress = true, true, true
|
|
|
|
// TODO: find an alternative to this block
|
|
ip := dnsutil.ExtractAddressFromReverse(state.Name())
|
|
if ip != "" {
|
|
records := k.getServiceRecordForIP(ip, state.Name())
|
|
if len(records) > 0 {
|
|
srvPTR := &records[0]
|
|
m.Answer = append(m.Answer, srvPTR.NewPTR(state.QName(), ip))
|
|
|
|
m = dnsutil.Dedup(m)
|
|
state.SizeAndDo(m)
|
|
m, _ = state.Scrub(m)
|
|
w.WriteMsg(m)
|
|
return dns.RcodeSuccess, nil
|
|
}
|
|
}
|
|
|
|
// Check that query matches one of the zones served by this middleware,
|
|
// otherwise delegate to the next in the pipeline.
|
|
zone := middleware.Zones(k.Zones).Matches(state.Name())
|
|
if zone == "" {
|
|
if k.Next == nil {
|
|
return dns.RcodeServerFailure, nil
|
|
}
|
|
return k.Next.ServeDNS(ctx, w, r)
|
|
}
|
|
|
|
var (
|
|
records, extra []dns.RR
|
|
err error
|
|
)
|
|
switch state.Type() {
|
|
case "A":
|
|
records, err = k.A(zone, state, nil)
|
|
case "AAAA":
|
|
records, err = k.AAAA(zone, state, nil)
|
|
case "TXT":
|
|
records, err = k.TXT(zone, state)
|
|
// TODO: change lookup to return appropriate error. Then add code below
|
|
// this switch to check for the error and return not implemented.
|
|
//return dns.RcodeNotImplemented, nil
|
|
case "CNAME":
|
|
records, err = k.CNAME(zone, state)
|
|
case "MX":
|
|
records, extra, err = k.MX(zone, state)
|
|
case "SRV":
|
|
records, extra, err = k.SRV(zone, state)
|
|
case "SOA":
|
|
records = []dns.RR{k.SOA(zone, state)}
|
|
case "NS":
|
|
if state.Name() == zone {
|
|
records, extra, err = k.NS(zone, state)
|
|
break
|
|
}
|
|
fallthrough
|
|
default:
|
|
// Do a fake A lookup, so we can distinguish between NODATA and NXDOMAIN
|
|
_, err = k.A(zone, state, nil)
|
|
}
|
|
if isKubernetesNameError(err) {
|
|
return k.Err(zone, dns.RcodeNameError, state)
|
|
}
|
|
if err != nil {
|
|
return dns.RcodeServerFailure, err
|
|
}
|
|
|
|
if len(records) == 0 {
|
|
return k.Err(zone, dns.RcodeSuccess, state)
|
|
}
|
|
|
|
m.Answer = append(m.Answer, records...)
|
|
m.Extra = append(m.Extra, extra...)
|
|
|
|
m = dnsutil.Dedup(m)
|
|
state.SizeAndDo(m)
|
|
m, _ = state.Scrub(m)
|
|
w.WriteMsg(m)
|
|
return dns.RcodeSuccess, nil
|
|
}
|
|
|
|
func (k Kubernetes) Name() string { return "kubernetes" }
|
|
|
|
// Err writes an error response back to the client.
|
|
func (k Kubernetes) Err(zone string, rcode int, state request.Request) (int, error) {
|
|
m := new(dns.Msg)
|
|
m.SetRcode(state.Req, rcode)
|
|
m.Ns = []dns.RR{k.SOA(zone, state)}
|
|
state.SizeAndDo(m)
|
|
state.W.WriteMsg(m)
|
|
return rcode, nil
|
|
}
|