* Remove context.Context from request.Request This removes the context from request.Request and makes all the changes in the code to make it compile again. It's all mechanical. It did unearth some weirdness in that the context was kept in handler structs which may cause havoc with concurrently handling of requests. Fixes #2721 Signed-off-by: Miek Gieben <miek@miek.nl> * Make test compile Signed-off-by: Miek Gieben <miek@miek.nl>
187 lines
4.8 KiB
Go
187 lines
4.8 KiB
Go
package template
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"regexp"
|
|
"strconv"
|
|
gotmpl "text/template"
|
|
|
|
"github.com/coredns/coredns/plugin"
|
|
"github.com/coredns/coredns/plugin/metrics"
|
|
"github.com/coredns/coredns/plugin/pkg/fall"
|
|
"github.com/coredns/coredns/plugin/pkg/upstream"
|
|
"github.com/coredns/coredns/request"
|
|
|
|
"github.com/miekg/dns"
|
|
)
|
|
|
|
// Handler is a plugin handler that takes a query and templates a response.
|
|
type Handler struct {
|
|
Zones []string
|
|
|
|
Next plugin.Handler
|
|
Templates []template
|
|
}
|
|
|
|
type template struct {
|
|
zones []string
|
|
rcode int
|
|
regex []*regexp.Regexp
|
|
answer []*gotmpl.Template
|
|
additional []*gotmpl.Template
|
|
authority []*gotmpl.Template
|
|
qclass uint16
|
|
qtype uint16
|
|
fall fall.F
|
|
upstream *upstream.Upstream
|
|
}
|
|
|
|
type templateData struct {
|
|
Zone string
|
|
Name string
|
|
Regex string
|
|
Match []string
|
|
Group map[string]string
|
|
Class string
|
|
Type string
|
|
Message *dns.Msg
|
|
Question *dns.Question
|
|
}
|
|
|
|
// ServeDNS implements the plugin.Handler interface.
|
|
func (h Handler) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (int, error) {
|
|
state := request.Request{W: w, Req: r}
|
|
|
|
zone := plugin.Zones(h.Zones).Matches(state.Name())
|
|
if zone == "" {
|
|
return plugin.NextOrFailure(h.Name(), h.Next, ctx, w, r)
|
|
}
|
|
|
|
for _, template := range h.Templates {
|
|
data, match, fthrough := template.match(state, zone)
|
|
if !match {
|
|
if !fthrough {
|
|
return dns.RcodeNameError, nil
|
|
}
|
|
continue
|
|
}
|
|
|
|
templateMatchesCount.WithLabelValues(metrics.WithServer(ctx), data.Zone, data.Class, data.Type).Inc()
|
|
|
|
if template.rcode == dns.RcodeServerFailure {
|
|
return template.rcode, nil
|
|
}
|
|
|
|
msg := new(dns.Msg)
|
|
msg.SetReply(r)
|
|
msg.Authoritative = true
|
|
msg.Rcode = template.rcode
|
|
|
|
for _, answer := range template.answer {
|
|
rr, err := executeRRTemplate(metrics.WithServer(ctx), "answer", answer, data)
|
|
if err != nil {
|
|
return dns.RcodeServerFailure, err
|
|
}
|
|
msg.Answer = append(msg.Answer, rr)
|
|
if template.upstream != nil && (state.QType() == dns.TypeA || state.QType() == dns.TypeAAAA) && rr.Header().Rrtype == dns.TypeCNAME {
|
|
up, _ := template.upstream.Lookup(ctx, state, rr.(*dns.CNAME).Target, state.QType())
|
|
msg.Answer = append(msg.Answer, up.Answer...)
|
|
}
|
|
}
|
|
for _, additional := range template.additional {
|
|
rr, err := executeRRTemplate(metrics.WithServer(ctx), "additional", additional, data)
|
|
if err != nil {
|
|
return dns.RcodeServerFailure, err
|
|
}
|
|
msg.Extra = append(msg.Extra, rr)
|
|
}
|
|
for _, authority := range template.authority {
|
|
rr, err := executeRRTemplate(metrics.WithServer(ctx), "authority", authority, data)
|
|
if err != nil {
|
|
return dns.RcodeServerFailure, err
|
|
}
|
|
msg.Ns = append(msg.Ns, rr)
|
|
}
|
|
|
|
w.WriteMsg(msg)
|
|
return template.rcode, nil
|
|
}
|
|
|
|
return h.Next.ServeDNS(ctx, w, r)
|
|
}
|
|
|
|
// Name implements the plugin.Handler interface.
|
|
func (h Handler) Name() string { return "template" }
|
|
|
|
func executeRRTemplate(server, section string, template *gotmpl.Template, data templateData) (dns.RR, error) {
|
|
buffer := &bytes.Buffer{}
|
|
err := template.Execute(buffer, data)
|
|
if err != nil {
|
|
templateFailureCount.WithLabelValues(server, data.Zone, data.Class, data.Type, section, template.Tree.Root.String()).Inc()
|
|
return nil, err
|
|
}
|
|
rr, err := dns.NewRR(buffer.String())
|
|
if err != nil {
|
|
templateRRFailureCount.WithLabelValues(server, data.Zone, data.Class, data.Type, section, template.Tree.Root.String()).Inc()
|
|
return rr, err
|
|
}
|
|
return rr, nil
|
|
}
|
|
|
|
func (t template) match(state request.Request, zone string) (templateData, bool, bool) {
|
|
q := state.Req.Question[0]
|
|
data := templateData{}
|
|
|
|
zone = plugin.Zones(t.zones).Matches(state.Name())
|
|
if zone == "" {
|
|
return data, false, true
|
|
}
|
|
|
|
if t.qclass != dns.ClassANY && q.Qclass != dns.ClassANY && q.Qclass != t.qclass {
|
|
return data, false, true
|
|
}
|
|
if t.qtype != dns.TypeANY && q.Qtype != dns.TypeANY && q.Qtype != t.qtype {
|
|
return data, false, true
|
|
}
|
|
|
|
for _, regex := range t.regex {
|
|
if !regex.MatchString(state.Name()) {
|
|
continue
|
|
}
|
|
|
|
data.Zone = zone
|
|
data.Regex = regex.String()
|
|
data.Name = state.Name()
|
|
data.Question = &q
|
|
data.Message = state.Req
|
|
if q.Qclass != dns.ClassANY {
|
|
data.Class = dns.ClassToString[q.Qclass]
|
|
} else {
|
|
data.Class = dns.ClassToString[t.qclass]
|
|
}
|
|
if q.Qtype != dns.TypeANY {
|
|
data.Type = dns.TypeToString[q.Qtype]
|
|
} else {
|
|
data.Type = dns.TypeToString[t.qtype]
|
|
}
|
|
|
|
matches := regex.FindStringSubmatch(state.Name())
|
|
data.Match = make([]string, len(matches))
|
|
data.Group = make(map[string]string)
|
|
groupNames := regex.SubexpNames()
|
|
for i, m := range matches {
|
|
data.Match[i] = m
|
|
data.Group[strconv.Itoa(i)] = m
|
|
}
|
|
for i, m := range matches {
|
|
if len(groupNames[i]) > 0 {
|
|
data.Group[groupNames[i]] = m
|
|
}
|
|
}
|
|
|
|
return data, true, false
|
|
}
|
|
|
|
return data, false, t.fall.Through(state.Name())
|
|
}
|