Put the autopath stuff in a separate sub package. Tests are still included in the main kubernetes directory. Next steps (after this is merged), is pulling the autopath handling into the subpackage and fixing the tests.
676 lines
19 KiB
Go
676 lines
19 KiB
Go
// Package kubernetes provides the kubernetes backend.
|
|
package kubernetes
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"log"
|
|
"net"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/coredns/coredns/middleware"
|
|
"github.com/coredns/coredns/middleware/etcd/msg"
|
|
"github.com/coredns/coredns/middleware/kubernetes/autopath"
|
|
"github.com/coredns/coredns/middleware/pkg/dnsutil"
|
|
dnsstrings "github.com/coredns/coredns/middleware/pkg/strings"
|
|
"github.com/coredns/coredns/middleware/proxy"
|
|
"github.com/coredns/coredns/request"
|
|
|
|
"github.com/miekg/dns"
|
|
"k8s.io/client-go/1.5/kubernetes"
|
|
"k8s.io/client-go/1.5/pkg/api"
|
|
unversionedapi "k8s.io/client-go/1.5/pkg/api/unversioned"
|
|
"k8s.io/client-go/1.5/pkg/labels"
|
|
"k8s.io/client-go/1.5/rest"
|
|
"k8s.io/client-go/1.5/tools/clientcmd"
|
|
clientcmdapi "k8s.io/client-go/1.5/tools/clientcmd/api"
|
|
)
|
|
|
|
// Kubernetes implements a middleware that connects to a Kubernetes cluster.
|
|
type Kubernetes struct {
|
|
Next middleware.Handler
|
|
Zones []string
|
|
primaryZone int
|
|
Proxy proxy.Proxy // Proxy for looking up names during the resolution process
|
|
APIEndpoint string
|
|
APICertAuth string
|
|
APIClientCert string
|
|
APIClientKey string
|
|
APIConn dnsController
|
|
ResyncPeriod time.Duration
|
|
Namespaces []string
|
|
Federations []Federation
|
|
LabelSelector *unversionedapi.LabelSelector
|
|
Selector *labels.Selector
|
|
PodMode string
|
|
ReverseCidrs []net.IPNet
|
|
Fallthrough bool
|
|
|
|
autoPath *autopath.AutoPath
|
|
interfaceAddrsFunc func() net.IP
|
|
}
|
|
|
|
const (
|
|
// PodModeDisabled is the default value where pod requests are ignored
|
|
PodModeDisabled = "disabled"
|
|
// PodModeVerified is where Pod requests are answered only if they exist
|
|
PodModeVerified = "verified"
|
|
// PodModeInsecure is where pod requests are answered without verfying they exist
|
|
PodModeInsecure = "insecure"
|
|
// DNSSchemaVersion is the schema version: https://github.com/kubernetes/dns/blob/master/docs/specification.md
|
|
DNSSchemaVersion = "1.0.1"
|
|
)
|
|
|
|
type endpoint struct {
|
|
addr api.EndpointAddress
|
|
port api.EndpointPort
|
|
}
|
|
|
|
type service struct {
|
|
name string
|
|
namespace string
|
|
addr string
|
|
ports []api.ServicePort
|
|
endpoints []endpoint
|
|
}
|
|
|
|
type pod struct {
|
|
name string
|
|
namespace string
|
|
addr string
|
|
}
|
|
|
|
type recordRequest struct {
|
|
port string
|
|
protocol string
|
|
endpoint string
|
|
service string
|
|
namespace string
|
|
typeName string
|
|
zone string
|
|
federation string
|
|
}
|
|
|
|
var (
|
|
errNoItems = errors.New("no items found")
|
|
errNsNotExposed = errors.New("namespace is not exposed")
|
|
errInvalidRequest = errors.New("invalid query name")
|
|
errZoneNotFound = errors.New("zone not found")
|
|
errAPIBadPodType = errors.New("expected type *api.Pod")
|
|
errPodsDisabled = errors.New("pod records disabled")
|
|
)
|
|
|
|
// Services implements the ServiceBackend interface.
|
|
func (k *Kubernetes) Services(state request.Request, exact bool, opt middleware.Options) (svcs []msg.Service, debug []msg.Service, err error) {
|
|
r, e := k.parseRequest(state.Name(), state.QType())
|
|
if e != nil {
|
|
return nil, nil, e
|
|
}
|
|
switch state.Type() {
|
|
case "A", "AAAA", "CNAME":
|
|
if state.Type() == "A" && isDefaultNS(state.Name(), r) {
|
|
// If this is an A request for "ns.dns", respond with a "fake" record for coredns.
|
|
// SOA records always use this hardcoded name
|
|
svcs = append(svcs, k.defaultNSMsg(r))
|
|
return svcs, nil, nil
|
|
}
|
|
s, e := k.Entries(r)
|
|
if state.QType() == dns.TypeAAAA {
|
|
// AAAA not implemented
|
|
return nil, nil, e
|
|
}
|
|
return s, nil, e // Haven't implemented debug queries yet.
|
|
case "SRV":
|
|
s, e := k.Entries(r)
|
|
// SRV for external services is not yet implemented, so remove those records
|
|
noext := []msg.Service{}
|
|
for _, svc := range s {
|
|
if t, _ := svc.HostType(); t != dns.TypeCNAME {
|
|
noext = append(noext, svc)
|
|
}
|
|
}
|
|
return noext, nil, e
|
|
case "TXT":
|
|
if r.typeName == "dns-version" {
|
|
srv := k.recordsForTXT(r)
|
|
svcs = append(svcs, srv)
|
|
}
|
|
return svcs, nil, err
|
|
case "NS":
|
|
srv := k.recordsForNS(r)
|
|
svcs = append(svcs, srv)
|
|
return svcs, nil, err
|
|
}
|
|
return nil, nil, nil
|
|
}
|
|
|
|
func (k *Kubernetes) recordsForTXT(r recordRequest) msg.Service {
|
|
return msg.Service{Text: DNSSchemaVersion, TTL: 28800,
|
|
Key: msg.Path(strings.Join([]string{r.typeName, r.zone}, "."), "coredns")}
|
|
}
|
|
|
|
func (k *Kubernetes) recordsForNS(r recordRequest) msg.Service {
|
|
ns := k.coreDNSRecord()
|
|
return msg.Service{Host: ns.A.String(),
|
|
Key: msg.Path(strings.Join([]string{ns.Hdr.Name, r.zone}, "."), "coredns")}
|
|
}
|
|
|
|
// PrimaryZone will return the first non-reverse zone being handled by this middleware
|
|
func (k *Kubernetes) PrimaryZone() string {
|
|
return k.Zones[k.primaryZone]
|
|
}
|
|
|
|
// Reverse implements the ServiceBackend interface.
|
|
func (k *Kubernetes) Reverse(state request.Request, exact bool, opt middleware.Options) ([]msg.Service, []msg.Service, error) {
|
|
|
|
ip := dnsutil.ExtractAddressFromReverse(state.Name())
|
|
if ip == "" {
|
|
return nil, nil, nil
|
|
}
|
|
|
|
records := k.getServiceRecordForIP(ip, state.Name())
|
|
return records, nil, nil
|
|
}
|
|
|
|
func (k *Kubernetes) isRequestInReverseRange(name string) bool {
|
|
ip := dnsutil.ExtractAddressFromReverse(name)
|
|
for _, c := range k.ReverseCidrs {
|
|
if c.Contains(net.ParseIP(ip)) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// Lookup implements the ServiceBackend interface.
|
|
func (k *Kubernetes) Lookup(state request.Request, name string, typ uint16) (*dns.Msg, error) {
|
|
return k.Proxy.Lookup(state, name, typ)
|
|
}
|
|
|
|
// IsNameError implements the ServiceBackend interface.
|
|
func (k *Kubernetes) IsNameError(err error) bool {
|
|
return err == errNoItems || err == errNsNotExposed || err == errInvalidRequest || err == errZoneNotFound
|
|
}
|
|
|
|
// Debug implements the ServiceBackend interface.
|
|
func (k *Kubernetes) Debug() string { return "debug" }
|
|
|
|
func (k *Kubernetes) getClientConfig() (*rest.Config, error) {
|
|
loadingRules := &clientcmd.ClientConfigLoadingRules{}
|
|
overrides := &clientcmd.ConfigOverrides{}
|
|
clusterinfo := clientcmdapi.Cluster{}
|
|
authinfo := clientcmdapi.AuthInfo{}
|
|
if len(k.APIEndpoint) > 0 {
|
|
clusterinfo.Server = k.APIEndpoint
|
|
} else {
|
|
cc, err := rest.InClusterConfig()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return cc, err
|
|
}
|
|
if len(k.APICertAuth) > 0 {
|
|
clusterinfo.CertificateAuthority = k.APICertAuth
|
|
}
|
|
if len(k.APIClientCert) > 0 {
|
|
authinfo.ClientCertificate = k.APIClientCert
|
|
}
|
|
if len(k.APIClientKey) > 0 {
|
|
authinfo.ClientKey = k.APIClientKey
|
|
}
|
|
overrides.ClusterInfo = clusterinfo
|
|
overrides.AuthInfo = authinfo
|
|
clientConfig := clientcmd.NewNonInteractiveDeferredLoadingClientConfig(loadingRules, overrides)
|
|
return clientConfig.ClientConfig()
|
|
}
|
|
|
|
// InitKubeCache initializes a new Kubernetes cache.
|
|
func (k *Kubernetes) InitKubeCache() (err error) {
|
|
|
|
config, err := k.getClientConfig()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
kubeClient, err := kubernetes.NewForConfig(config)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to create kubernetes notification controller: %v", err)
|
|
}
|
|
|
|
if k.LabelSelector != nil {
|
|
var selector labels.Selector
|
|
selector, err = unversionedapi.LabelSelectorAsSelector(k.LabelSelector)
|
|
k.Selector = &selector
|
|
if err != nil {
|
|
return fmt.Errorf("unable to create Selector for LabelSelector '%s'.Error was: %s", k.LabelSelector, err)
|
|
}
|
|
}
|
|
|
|
if k.LabelSelector != nil {
|
|
log.Printf("[INFO] Kubernetes middleware configured with the label selector '%s'. Only kubernetes objects matching this label selector will be exposed.", unversionedapi.FormatLabelSelector(k.LabelSelector))
|
|
}
|
|
|
|
opts := dnsControlOpts{
|
|
initPodCache: (k.PodMode == PodModeVerified || (k.autoPath != nil)),
|
|
}
|
|
k.APIConn = newdnsController(kubeClient, k.ResyncPeriod, k.Selector, opts)
|
|
|
|
return err
|
|
}
|
|
|
|
func (k *Kubernetes) parseRequest(lowerCasedName string, qtype uint16) (r recordRequest, err error) {
|
|
// 3 Possible cases
|
|
// SRV Request: _port._protocol.service.namespace.[federation.]type.zone
|
|
// A Request (endpoint): endpoint.service.namespace.[federation.]type.zone
|
|
// A Request (service): service.namespace.[federation.]type.zone
|
|
|
|
// separate zone from rest of lowerCasedName
|
|
var segs []string
|
|
for _, z := range k.Zones {
|
|
if dns.IsSubDomain(z, lowerCasedName) {
|
|
r.zone = z
|
|
|
|
segs = dns.SplitDomainName(lowerCasedName)
|
|
segs = segs[:len(segs)-dns.CountLabel(r.zone)]
|
|
break
|
|
}
|
|
}
|
|
if r.zone == "" {
|
|
return r, errZoneNotFound
|
|
}
|
|
|
|
r.federation, segs = k.stripFederation(segs)
|
|
|
|
if qtype == dns.TypeNS {
|
|
return r, nil
|
|
}
|
|
|
|
if qtype == dns.TypeA && isDefaultNS(lowerCasedName, r) {
|
|
return r, nil
|
|
}
|
|
|
|
offset := 0
|
|
if qtype == dns.TypeSRV {
|
|
// The kubernetes peer-finder expects queries with empty port and service to resolve
|
|
// If neither is specified, treat it as a wildcard
|
|
if len(segs) == 3 {
|
|
r.port = "*"
|
|
r.service = "*"
|
|
offset = 0
|
|
} else {
|
|
if len(segs) != 5 {
|
|
return r, errInvalidRequest
|
|
}
|
|
// This is a SRV style request, get first two elements as port and
|
|
// protocol, stripping leading underscores if present.
|
|
if segs[0][0] == '_' {
|
|
r.port = segs[0][1:]
|
|
} else {
|
|
r.port = segs[0]
|
|
if !wildcard(r.port) {
|
|
return r, errInvalidRequest
|
|
}
|
|
}
|
|
if segs[1][0] == '_' {
|
|
r.protocol = segs[1][1:]
|
|
if r.protocol != "tcp" && r.protocol != "udp" {
|
|
return r, errInvalidRequest
|
|
}
|
|
} else {
|
|
r.protocol = segs[1]
|
|
if !wildcard(r.protocol) {
|
|
return r, errInvalidRequest
|
|
}
|
|
}
|
|
if r.port == "" || r.protocol == "" {
|
|
return r, errInvalidRequest
|
|
}
|
|
offset = 2
|
|
}
|
|
}
|
|
if (qtype == dns.TypeA || qtype == dns.TypeAAAA) && len(segs) == 4 {
|
|
// This is an endpoint A/AAAA record request. Get first element as endpoint.
|
|
r.endpoint = segs[0]
|
|
offset = 1
|
|
}
|
|
|
|
if len(segs) == (offset + 3) {
|
|
r.service = segs[offset]
|
|
r.namespace = segs[offset+1]
|
|
r.typeName = segs[offset+2]
|
|
|
|
return r, nil
|
|
}
|
|
|
|
if len(segs) == 1 && qtype == dns.TypeTXT {
|
|
r.typeName = segs[0]
|
|
return r, nil
|
|
}
|
|
|
|
return r, errInvalidRequest
|
|
|
|
}
|
|
|
|
// Records not implemented, see Entries().
|
|
func (k *Kubernetes) Records(name string, exact bool) ([]msg.Service, error) {
|
|
return nil, fmt.Errorf("NOOP")
|
|
}
|
|
|
|
// Entries looks up services in kubernetes. If exact is true, it will lookup
|
|
// just this name. This is used when find matches when completing SRV lookups
|
|
// for instance.
|
|
func (k *Kubernetes) Entries(r recordRequest) ([]msg.Service, error) {
|
|
|
|
// Abort if the namespace does not contain a wildcard, and namespace is not published per CoreFile
|
|
// Case where namespace contains a wildcard is handled in Get(...) method.
|
|
if (!wildcard(r.namespace)) && (len(k.Namespaces) > 0) && (!dnsstrings.StringInSlice(r.namespace, k.Namespaces)) {
|
|
return nil, errNsNotExposed
|
|
}
|
|
services, pods, err := k.get(r)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if len(services) == 0 && len(pods) == 0 {
|
|
// Did not find item in k8s, try federated
|
|
if r.federation != "" {
|
|
fedCNAME := k.federationCNAMERecord(r)
|
|
if fedCNAME.Key != "" {
|
|
return []msg.Service{fedCNAME}, nil
|
|
}
|
|
}
|
|
return nil, errNoItems
|
|
}
|
|
|
|
records := k.getRecordsForK8sItems(services, pods, r)
|
|
|
|
return records, nil
|
|
}
|
|
|
|
func endpointHostname(addr api.EndpointAddress) string {
|
|
if addr.Hostname != "" {
|
|
return strings.ToLower(addr.Hostname)
|
|
}
|
|
if strings.Contains(addr.IP, ".") {
|
|
return strings.Replace(addr.IP, ".", "-", -1)
|
|
}
|
|
if strings.Contains(addr.IP, ":") {
|
|
return strings.ToLower(strings.Replace(addr.IP, ":", "-", -1))
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func (k *Kubernetes) getRecordsForK8sItems(services []service, pods []pod, r recordRequest) (records []msg.Service) {
|
|
zonePath := msg.Path(r.zone, "coredns")
|
|
|
|
for _, svc := range services {
|
|
if svc.addr == api.ClusterIPNone || len(svc.endpoints) > 0 {
|
|
// This is a headless service or endpoints are present, create records for each endpoint
|
|
for _, ep := range svc.endpoints {
|
|
s := msg.Service{
|
|
Host: ep.addr.IP,
|
|
Port: int(ep.port.Port),
|
|
}
|
|
if r.federation != "" {
|
|
s.Key = strings.Join([]string{zonePath, Svc, r.federation, svc.namespace, svc.name, endpointHostname(ep.addr)}, "/")
|
|
} else {
|
|
s.Key = strings.Join([]string{zonePath, Svc, svc.namespace, svc.name, endpointHostname(ep.addr)}, "/")
|
|
}
|
|
records = append(records, s)
|
|
}
|
|
continue
|
|
}
|
|
|
|
// Create records for each exposed port...
|
|
for _, p := range svc.ports {
|
|
s := msg.Service{
|
|
Host: svc.addr,
|
|
Port: int(p.Port)}
|
|
|
|
if r.federation != "" {
|
|
s.Key = strings.Join([]string{zonePath, Svc, r.federation, svc.namespace, svc.name}, "/")
|
|
} else {
|
|
s.Key = strings.Join([]string{zonePath, Svc, svc.namespace, svc.name}, "/")
|
|
}
|
|
|
|
records = append(records, s)
|
|
}
|
|
// If the addr is not an IP (i.e. an external service), add the record ...
|
|
s := msg.Service{
|
|
Key: strings.Join([]string{zonePath, Svc, svc.namespace, svc.name}, "/"),
|
|
Host: svc.addr}
|
|
if t, _ := s.HostType(); t == dns.TypeCNAME {
|
|
if r.federation != "" {
|
|
s.Key = strings.Join([]string{zonePath, Svc, r.federation, svc.namespace, svc.name}, "/")
|
|
} else {
|
|
s.Key = strings.Join([]string{zonePath, Svc, svc.namespace, svc.name}, "/")
|
|
}
|
|
records = append(records, s)
|
|
}
|
|
}
|
|
|
|
for _, p := range pods {
|
|
s := msg.Service{
|
|
Key: strings.Join([]string{zonePath, Pod, p.namespace, p.name}, "/"),
|
|
Host: p.addr,
|
|
}
|
|
records = append(records, s)
|
|
}
|
|
|
|
return records
|
|
}
|
|
|
|
func (k *Kubernetes) findPodWithIP(ip string) (p *api.Pod) {
|
|
if k.autoPath == nil {
|
|
return nil
|
|
}
|
|
objList := k.APIConn.PodIndex(ip)
|
|
for _, o := range objList {
|
|
p, ok := o.(*api.Pod)
|
|
if !ok {
|
|
return nil
|
|
}
|
|
return p
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (k *Kubernetes) findPods(namespace, podname string) (pods []pod, err error) {
|
|
if k.PodMode == PodModeDisabled {
|
|
return pods, errPodsDisabled
|
|
}
|
|
|
|
var ip string
|
|
if strings.Count(podname, "-") == 3 && !strings.Contains(podname, "--") {
|
|
ip = strings.Replace(podname, "-", ".", -1)
|
|
} else {
|
|
ip = strings.Replace(podname, "-", ":", -1)
|
|
}
|
|
|
|
if k.PodMode == PodModeInsecure {
|
|
s := pod{name: podname, namespace: namespace, addr: ip}
|
|
pods = append(pods, s)
|
|
return pods, nil
|
|
}
|
|
|
|
// PodModeVerified
|
|
objList := k.APIConn.PodIndex(ip)
|
|
|
|
nsWildcard := wildcard(namespace)
|
|
for _, o := range objList {
|
|
p, ok := o.(*api.Pod)
|
|
if !ok {
|
|
return nil, errAPIBadPodType
|
|
}
|
|
// If namespace has a wildcard, filter results against Corefile namespace list.
|
|
if nsWildcard && (len(k.Namespaces) > 0) && (!dnsstrings.StringInSlice(p.Namespace, k.Namespaces)) {
|
|
continue
|
|
}
|
|
// check for matching ip and namespace
|
|
if ip == p.Status.PodIP && match(namespace, p.Namespace, nsWildcard) {
|
|
s := pod{name: podname, namespace: namespace, addr: ip}
|
|
pods = append(pods, s)
|
|
return pods, nil
|
|
}
|
|
}
|
|
return pods, nil
|
|
}
|
|
|
|
// get retrieves matching data from the cache.
|
|
func (k *Kubernetes) get(r recordRequest) (services []service, pods []pod, err error) {
|
|
switch {
|
|
case r.typeName == Pod:
|
|
pods, err = k.findPods(r.namespace, r.service)
|
|
return nil, pods, err
|
|
default:
|
|
services, err = k.findServices(r)
|
|
return services, nil, err
|
|
}
|
|
}
|
|
|
|
func (k *Kubernetes) findServices(r recordRequest) ([]service, error) {
|
|
serviceList := k.APIConn.ServiceList()
|
|
var resultItems []service
|
|
|
|
nsWildcard := wildcard(r.namespace)
|
|
serviceWildcard := wildcard(r.service)
|
|
portWildcard := wildcard(r.port) || r.port == ""
|
|
protocolWildcard := wildcard(r.protocol) || r.protocol == ""
|
|
|
|
for _, svc := range serviceList {
|
|
if !(match(r.namespace, svc.Namespace, nsWildcard) && match(r.service, svc.Name, serviceWildcard)) {
|
|
continue
|
|
}
|
|
// If namespace has a wildcard, filter results against Corefile namespace list.
|
|
// (Namespaces without a wildcard were filtered before the call to this function.)
|
|
if nsWildcard && (len(k.Namespaces) > 0) && (!dnsstrings.StringInSlice(svc.Namespace, k.Namespaces)) {
|
|
continue
|
|
}
|
|
s := service{name: svc.Name, namespace: svc.Namespace}
|
|
|
|
// Endpoint query or headless service
|
|
if svc.Spec.ClusterIP == api.ClusterIPNone || r.endpoint != "" {
|
|
s.addr = svc.Spec.ClusterIP
|
|
endpointsList := k.APIConn.EndpointsList()
|
|
for _, ep := range endpointsList.Items {
|
|
if ep.ObjectMeta.Name != svc.Name || ep.ObjectMeta.Namespace != svc.Namespace {
|
|
continue
|
|
}
|
|
for _, eps := range ep.Subsets {
|
|
for _, addr := range eps.Addresses {
|
|
for _, p := range eps.Ports {
|
|
ephostname := endpointHostname(addr)
|
|
if r.endpoint != "" && r.endpoint != ephostname {
|
|
continue
|
|
}
|
|
if !(match(r.port, p.Name, portWildcard) && match(r.protocol, string(p.Protocol), protocolWildcard)) {
|
|
continue
|
|
}
|
|
s.endpoints = append(s.endpoints, endpoint{addr: addr, port: p})
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if len(s.endpoints) > 0 {
|
|
resultItems = append(resultItems, s)
|
|
}
|
|
continue
|
|
}
|
|
|
|
// External service
|
|
if svc.Spec.ExternalName != "" {
|
|
s.addr = svc.Spec.ExternalName
|
|
resultItems = append(resultItems, s)
|
|
continue
|
|
}
|
|
|
|
// ClusterIP service
|
|
s.addr = svc.Spec.ClusterIP
|
|
for _, p := range svc.Spec.Ports {
|
|
if !(match(r.port, p.Name, portWildcard) && match(r.protocol, string(p.Protocol), protocolWildcard)) {
|
|
continue
|
|
}
|
|
s.ports = append(s.ports, p)
|
|
}
|
|
|
|
resultItems = append(resultItems, s)
|
|
}
|
|
return resultItems, nil
|
|
}
|
|
|
|
func match(a, b string, wildcard bool) bool {
|
|
if wildcard {
|
|
return true
|
|
}
|
|
return strings.EqualFold(a, b)
|
|
}
|
|
|
|
// getServiceRecordForIP: Gets a service record with a cluster ip matching the ip argument
|
|
// If a service cluster ip does not match, it checks all endpoints
|
|
func (k *Kubernetes) getServiceRecordForIP(ip, name string) []msg.Service {
|
|
// First check services with cluster ips
|
|
svcList := k.APIConn.ServiceList()
|
|
|
|
for _, service := range svcList {
|
|
if (len(k.Namespaces) > 0) && !dnsstrings.StringInSlice(service.Namespace, k.Namespaces) {
|
|
continue
|
|
}
|
|
if service.Spec.ClusterIP == ip {
|
|
domain := strings.Join([]string{service.Name, service.Namespace, Svc, k.PrimaryZone()}, ".")
|
|
return []msg.Service{{Host: domain}}
|
|
}
|
|
}
|
|
// If no cluster ips match, search endpoints
|
|
epList := k.APIConn.EndpointsList()
|
|
for _, ep := range epList.Items {
|
|
if (len(k.Namespaces) > 0) && !dnsstrings.StringInSlice(ep.ObjectMeta.Namespace, k.Namespaces) {
|
|
continue
|
|
}
|
|
for _, eps := range ep.Subsets {
|
|
for _, addr := range eps.Addresses {
|
|
if addr.IP == ip {
|
|
domain := strings.Join([]string{endpointHostname(addr), ep.ObjectMeta.Name, ep.ObjectMeta.Namespace, Svc, k.PrimaryZone()}, ".")
|
|
return []msg.Service{{Host: domain}}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// wildcard checks whether s contains a wildcard value
|
|
func wildcard(s string) bool {
|
|
return (s == "*" || s == "any")
|
|
}
|
|
|
|
func localPodIP() net.IP {
|
|
addrs, err := net.InterfaceAddrs()
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
|
|
for _, addr := range addrs {
|
|
ip, _, _ := net.ParseCIDR(addr.String())
|
|
ip = ip.To4()
|
|
if ip == nil || ip.IsLoopback() {
|
|
continue
|
|
}
|
|
return ip
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func splitSearch(zone, question, namespace string) (name, search string, ok bool) {
|
|
search = strings.Join([]string{namespace, Svc, zone}, ".")
|
|
if dns.IsSubDomain(search, question) {
|
|
return question[:len(question)-len(search)-1], search, true
|
|
}
|
|
return "", "", false
|
|
}
|
|
|
|
const (
|
|
// Svc is the DNS schema for kubernetes services
|
|
Svc = "svc"
|
|
// Pod is the DNS schema for kubernetes pods
|
|
Pod = "pod"
|
|
)
|