2024-01-10 16:19:20 +00:00
|
|
|
// Copyright (c) HashiCorp, Inc.
|
|
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
|
|
|
|
package dns
|
|
|
|
|
|
|
|
import (
|
2024-01-17 03:36:02 +00:00
|
|
|
"encoding/hex"
|
|
|
|
"errors"
|
2024-01-10 16:19:20 +00:00
|
|
|
"fmt"
|
|
|
|
"net"
|
2024-01-29 22:33:45 +00:00
|
|
|
"regexp"
|
|
|
|
"strings"
|
2024-01-10 16:19:20 +00:00
|
|
|
"sync/atomic"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/armon/go-radix"
|
|
|
|
"github.com/miekg/dns"
|
|
|
|
|
2024-02-02 23:29:38 +00:00
|
|
|
"github.com/hashicorp/go-hclog"
|
|
|
|
|
2024-01-10 16:19:20 +00:00
|
|
|
"github.com/hashicorp/consul/agent/config"
|
|
|
|
"github.com/hashicorp/consul/agent/discovery"
|
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
2024-01-29 16:40:10 +00:00
|
|
|
"github.com/hashicorp/consul/internal/dnsutil"
|
2024-02-02 23:29:38 +00:00
|
|
|
"github.com/hashicorp/consul/internal/resource"
|
2024-01-17 03:36:02 +00:00
|
|
|
"github.com/hashicorp/consul/logging"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
addrLabel = "addr"
|
|
|
|
|
2024-01-29 16:40:10 +00:00
|
|
|
arpaDomain = "arpa."
|
|
|
|
arpaLabel = "arpa"
|
2024-01-17 03:36:02 +00:00
|
|
|
|
2024-01-29 22:33:45 +00:00
|
|
|
suffixFailover = "failover."
|
|
|
|
suffixNoFailover = "no-failover."
|
|
|
|
maxRecursionLevelDefault = 3 // This field comes from the V1 DNS server and affects V1 catalog lookups
|
|
|
|
maxRecurseRecords = 5
|
2024-01-17 03:36:02 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
errInvalidQuestion = fmt.Errorf("invalid question")
|
2024-01-18 23:30:04 +00:00
|
|
|
errNameNotFound = fmt.Errorf("name not found")
|
2024-02-02 23:29:38 +00:00
|
|
|
errNotImplemented = fmt.Errorf("not implemented")
|
2024-01-18 23:30:04 +00:00
|
|
|
errRecursionFailed = fmt.Errorf("recursion failed")
|
2024-01-29 22:33:45 +00:00
|
|
|
|
|
|
|
trailingSpacesRE = regexp.MustCompile(" +$")
|
2024-01-10 16:19:20 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// TODO (v2-dns): metrics
|
|
|
|
|
2024-02-02 23:29:38 +00:00
|
|
|
// Context is used augment a DNS message with Consul-specific metadata.
|
|
|
|
type Context struct {
|
|
|
|
Token string
|
|
|
|
DefaultPartition string
|
|
|
|
}
|
|
|
|
|
2024-01-10 16:19:20 +00:00
|
|
|
// RouterDynamicConfig is the dynamic configuration that can be hot-reloaded
|
|
|
|
type RouterDynamicConfig struct {
|
|
|
|
ARecordLimit int
|
|
|
|
DisableCompression bool
|
|
|
|
EnableDefaultFailover bool // TODO (v2-dns): plumbing required for this new V2 setting. This is the agent configured default
|
|
|
|
EnableTruncate bool
|
|
|
|
NodeMetaTXT bool
|
|
|
|
NodeTTL time.Duration
|
|
|
|
Recursors []string
|
|
|
|
RecursorTimeout time.Duration
|
|
|
|
RecursorStrategy structs.RecursorStrategy
|
|
|
|
SOAConfig SOAConfig
|
|
|
|
// TTLRadix sets service TTLs by prefix, eg: "database-*"
|
|
|
|
TTLRadix *radix.Tree
|
|
|
|
// TTLStrict sets TTLs to service by full name match. It Has higher priority than TTLRadix
|
|
|
|
TTLStrict map[string]time.Duration
|
|
|
|
UDPAnswerLimit int
|
|
|
|
}
|
|
|
|
|
|
|
|
type SOAConfig struct {
|
|
|
|
Refresh uint32 // 3600 by default
|
|
|
|
Retry uint32 // 600
|
|
|
|
Expire uint32 // 86400
|
|
|
|
Minttl uint32 // 0
|
|
|
|
}
|
|
|
|
|
|
|
|
// DiscoveryQueryProcessor is an interface that can be used by any consumer requesting Service Discovery results.
|
|
|
|
// This could be attached to a gRPC endpoint in the future in addition to DNS.
|
|
|
|
// Making this an interface means testing the router with a mock is trivial.
|
|
|
|
type DiscoveryQueryProcessor interface {
|
|
|
|
QueryByName(*discovery.Query, discovery.Context) ([]*discovery.Result, error)
|
|
|
|
QueryByIP(net.IP, discovery.Context) ([]*discovery.Result, error)
|
|
|
|
}
|
|
|
|
|
2024-01-18 23:30:04 +00:00
|
|
|
// dnsRecursor is an interface that can be used to mock calls to external DNS servers for unit testing.
|
|
|
|
//
|
|
|
|
//go:generate mockery --name dnsRecursor --inpackage
|
|
|
|
type dnsRecursor interface {
|
|
|
|
handle(req *dns.Msg, cfgCtx *RouterDynamicConfig, remoteAddr net.Addr) (*dns.Msg, error)
|
|
|
|
}
|
|
|
|
|
2024-01-10 16:19:20 +00:00
|
|
|
// Router replaces miekg/dns.ServeMux with a simpler router that only checks for the 2-3 valid domains
|
|
|
|
// that Consul supports and forwards to a single DiscoveryQueryProcessor handler. If there is no match, it will recurse.
|
|
|
|
type Router struct {
|
2024-01-17 23:46:18 +00:00
|
|
|
processor DiscoveryQueryProcessor
|
2024-01-18 23:30:04 +00:00
|
|
|
recursor dnsRecursor
|
2024-01-17 23:46:18 +00:00
|
|
|
domain string
|
|
|
|
altDomain string
|
|
|
|
datacenter string
|
|
|
|
logger hclog.Logger
|
2024-01-10 16:19:20 +00:00
|
|
|
|
|
|
|
tokenFunc func() string
|
|
|
|
|
|
|
|
// dynamicConfig stores the config as an atomic value (for hot-reloading).
|
|
|
|
// It is always of type *RouterDynamicConfig
|
|
|
|
dynamicConfig atomic.Value
|
|
|
|
}
|
|
|
|
|
|
|
|
var _ = dns.Handler(&Router{})
|
2024-01-22 15:10:03 +00:00
|
|
|
var _ = DNSRouter(&Router{})
|
2024-01-10 16:19:20 +00:00
|
|
|
|
|
|
|
func NewRouter(cfg Config) (*Router, error) {
|
2024-01-17 03:36:02 +00:00
|
|
|
// Make sure domains are FQDN, make them case-insensitive for DNSRequestRouter
|
|
|
|
domain := dns.CanonicalName(cfg.AgentConfig.DNSDomain)
|
|
|
|
altDomain := dns.CanonicalName(cfg.AgentConfig.DNSAltDomain)
|
|
|
|
|
|
|
|
// TODO (v2-dns): need to figure out tenancy information here in a way that work for V2 and V1
|
2024-01-18 23:30:04 +00:00
|
|
|
|
|
|
|
logger := cfg.Logger.Named(logging.DNS)
|
|
|
|
|
2024-01-10 16:19:20 +00:00
|
|
|
router := &Router{
|
2024-02-02 23:29:38 +00:00
|
|
|
processor: cfg.Processor,
|
|
|
|
recursor: newRecursor(logger),
|
|
|
|
domain: domain,
|
|
|
|
altDomain: altDomain,
|
|
|
|
logger: logger,
|
|
|
|
tokenFunc: cfg.TokenFunc,
|
2024-01-10 16:19:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if err := router.ReloadConfig(cfg.AgentConfig); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return router, nil
|
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// HandleRequest is used to process an individual DNS request. It returns a message in success or fail cases.
|
2024-02-02 23:29:38 +00:00
|
|
|
func (r *Router) HandleRequest(req *dns.Msg, reqCtx Context, remoteAddress net.Addr) *dns.Msg {
|
2024-01-29 22:33:45 +00:00
|
|
|
return r.handleRequestRecursively(req, reqCtx, remoteAddress, maxRecursionLevelDefault)
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleRequestRecursively is used to process an individual DNS request. It will recurse as needed
|
|
|
|
// a maximum number of times and returns a message in success or fail cases.
|
2024-02-02 23:29:38 +00:00
|
|
|
func (r *Router) handleRequestRecursively(req *dns.Msg, reqCtx Context,
|
2024-01-29 22:33:45 +00:00
|
|
|
remoteAddress net.Addr, maxRecursionLevel int) *dns.Msg {
|
2024-01-18 23:30:04 +00:00
|
|
|
configCtx := r.dynamicConfig.Load().(*RouterDynamicConfig)
|
2024-01-10 16:19:20 +00:00
|
|
|
|
2024-01-17 03:36:02 +00:00
|
|
|
err := validateAndNormalizeRequest(req)
|
|
|
|
if err != nil {
|
|
|
|
r.logger.Error("error parsing DNS query", "error", err)
|
|
|
|
if errors.Is(err, errInvalidQuestion) {
|
|
|
|
return createRefusedResponse(req)
|
|
|
|
}
|
2024-01-18 23:30:04 +00:00
|
|
|
return createServerFailureResponse(req, configCtx, false)
|
2024-01-17 03:36:02 +00:00
|
|
|
}
|
2024-01-10 16:19:20 +00:00
|
|
|
|
2024-01-24 20:32:42 +00:00
|
|
|
responseDomain, needRecurse := r.parseDomain(req)
|
2024-01-18 23:30:04 +00:00
|
|
|
if needRecurse && !canRecurse(configCtx) {
|
2024-01-24 20:32:42 +00:00
|
|
|
// This is the same error as an unmatched domain
|
|
|
|
return createRefusedResponse(req)
|
2024-01-18 23:30:04 +00:00
|
|
|
}
|
2024-01-10 16:19:20 +00:00
|
|
|
|
2024-01-18 23:30:04 +00:00
|
|
|
if needRecurse {
|
|
|
|
// This assumes `canRecurse(configCtx)` is true above
|
|
|
|
resp, err := r.recursor.handle(req, configCtx, remoteAddress)
|
|
|
|
if err != nil && !errors.Is(err, errRecursionFailed) {
|
|
|
|
r.logger.Error("unhandled error recursing DNS query", "error", err)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
return createServerFailureResponse(req, configCtx, true)
|
|
|
|
}
|
|
|
|
return resp
|
2024-01-17 03:36:02 +00:00
|
|
|
}
|
2024-01-10 16:19:20 +00:00
|
|
|
|
2024-01-30 22:34:35 +00:00
|
|
|
// Need to pass the question name to properly support recursion and the
|
|
|
|
// trimming of the domain suffixes.
|
|
|
|
qName := dns.CanonicalName(req.Question[0].Name)
|
|
|
|
if maxRecursionLevel < maxRecursionLevelDefault {
|
|
|
|
// Get the QName without the domain suffix
|
|
|
|
qName = r.trimDomain(qName)
|
|
|
|
}
|
|
|
|
|
2024-01-24 20:32:42 +00:00
|
|
|
reqType := parseRequestType(req)
|
2024-02-02 23:29:38 +00:00
|
|
|
results, query, err := r.getQueryResults(req, reqCtx, reqType, qName)
|
2024-01-24 20:32:42 +00:00
|
|
|
switch {
|
|
|
|
case errors.Is(err, errNameNotFound):
|
2024-01-30 22:34:35 +00:00
|
|
|
r.logger.Error("name not found", "name", qName)
|
2024-01-24 20:32:42 +00:00
|
|
|
|
|
|
|
ecsGlobal := !errors.Is(err, discovery.ErrECSNotGlobal)
|
|
|
|
return createAuthoritativeResponse(req, configCtx, responseDomain, dns.RcodeNameError, ecsGlobal)
|
2024-02-02 23:29:38 +00:00
|
|
|
case errors.Is(err, errNotImplemented):
|
|
|
|
r.logger.Error("query not implemented", "name", qName, "type", dns.Type(req.Question[0].Qtype).String())
|
|
|
|
|
|
|
|
ecsGlobal := !errors.Is(err, discovery.ErrECSNotGlobal)
|
|
|
|
return createAuthoritativeResponse(req, configCtx, responseDomain, dns.RcodeNotImplemented, ecsGlobal)
|
|
|
|
case errors.Is(err, discovery.ErrNotSupported):
|
|
|
|
r.logger.Debug("query name syntax not supported", "name", req.Question[0].Name)
|
|
|
|
|
|
|
|
ecsGlobal := !errors.Is(err, discovery.ErrECSNotGlobal)
|
|
|
|
return createAuthoritativeResponse(req, configCtx, responseDomain, dns.RcodeNameError, ecsGlobal)
|
|
|
|
case errors.Is(err, discovery.ErrNotFound):
|
|
|
|
r.logger.Debug("query name not found", "name", req.Question[0].Name)
|
|
|
|
|
|
|
|
ecsGlobal := !errors.Is(err, discovery.ErrECSNotGlobal)
|
|
|
|
return createAuthoritativeResponse(req, configCtx, responseDomain, dns.RcodeNameError, ecsGlobal)
|
2024-01-24 20:32:42 +00:00
|
|
|
case errors.Is(err, discovery.ErrNoData):
|
2024-01-30 22:34:35 +00:00
|
|
|
r.logger.Debug("no data available", "name", qName)
|
2024-01-24 20:32:42 +00:00
|
|
|
|
|
|
|
ecsGlobal := !errors.Is(err, discovery.ErrECSNotGlobal)
|
|
|
|
return createAuthoritativeResponse(req, configCtx, responseDomain, dns.RcodeSuccess, ecsGlobal)
|
|
|
|
case err != nil:
|
2024-01-17 03:36:02 +00:00
|
|
|
r.logger.Error("error processing discovery query", "error", err)
|
2024-01-24 20:32:42 +00:00
|
|
|
return createServerFailureResponse(req, configCtx, canRecurse(configCtx))
|
2024-01-17 03:36:02 +00:00
|
|
|
}
|
2024-01-10 16:19:20 +00:00
|
|
|
|
2024-01-17 03:36:02 +00:00
|
|
|
// This needs the question information because it affects the serialization format.
|
|
|
|
// e.g., the Consul service has the same "results" for both NS and A/AAAA queries, but the serialization differs.
|
2024-01-29 22:33:45 +00:00
|
|
|
resp, err := r.serializeQueryResults(req, reqCtx, query, results, configCtx, responseDomain, remoteAddress, maxRecursionLevel)
|
2024-01-17 03:36:02 +00:00
|
|
|
if err != nil {
|
|
|
|
r.logger.Error("error serializing DNS results", "error", err)
|
2024-01-18 23:30:04 +00:00
|
|
|
return createServerFailureResponse(req, configCtx, false)
|
2024-01-17 03:36:02 +00:00
|
|
|
}
|
|
|
|
return resp
|
2024-01-10 16:19:20 +00:00
|
|
|
}
|
|
|
|
|
2024-01-30 22:34:35 +00:00
|
|
|
// trimDomain trims the domain from the question name.
|
|
|
|
func (r *Router) trimDomain(questionName string) string {
|
|
|
|
longer := r.domain
|
|
|
|
shorter := r.altDomain
|
|
|
|
|
|
|
|
if len(shorter) > len(longer) {
|
|
|
|
longer, shorter = shorter, longer
|
|
|
|
}
|
|
|
|
|
|
|
|
if strings.HasSuffix(questionName, "."+strings.TrimLeft(longer, ".")) {
|
|
|
|
return strings.TrimSuffix(questionName, longer)
|
|
|
|
}
|
|
|
|
return strings.TrimSuffix(questionName, shorter)
|
|
|
|
}
|
|
|
|
|
2024-01-29 22:33:45 +00:00
|
|
|
// getTTLForResult returns the TTL for a given result.
|
|
|
|
func getTTLForResult(name string, query *discovery.Query, cfg *RouterDynamicConfig) uint32 {
|
2024-02-02 23:29:38 +00:00
|
|
|
// In the case we are not making a discovery query, such as addr. or arpa. lookups,
|
|
|
|
// use the node TTL by convention
|
|
|
|
if query == nil {
|
|
|
|
return uint32(cfg.NodeTTL / time.Second)
|
|
|
|
}
|
|
|
|
|
|
|
|
switch query.QueryType {
|
2024-01-29 22:33:45 +00:00
|
|
|
// TODO (v2-dns): currently have to do this related to the results type being changed to node whe
|
|
|
|
// the v1 data fetcher encounters a blank service address and uses the node address instead.
|
|
|
|
// we will revisiting this when look at modifying the discovery result struct to
|
|
|
|
// possibly include additional metadata like the node address.
|
2024-02-02 23:29:38 +00:00
|
|
|
case discovery.QueryTypeWorkload:
|
|
|
|
// TODO (v2-dns): we need to discuss what we want to do for workload TTLs
|
|
|
|
return 0
|
|
|
|
case discovery.QueryTypeService:
|
|
|
|
ttl, ok := cfg.getTTLForService(name)
|
2024-01-29 22:33:45 +00:00
|
|
|
if ok {
|
|
|
|
return uint32(ttl / time.Second)
|
|
|
|
}
|
|
|
|
fallthrough
|
|
|
|
default:
|
|
|
|
return uint32(cfg.NodeTTL / time.Second)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// getQueryResults returns a discovery.Result from a DNS message.
|
2024-02-02 23:29:38 +00:00
|
|
|
func (r *Router) getQueryResults(req *dns.Msg, reqCtx Context, reqType requestType, qName string) ([]*discovery.Result, *discovery.Query, error) {
|
2024-01-17 23:46:18 +00:00
|
|
|
switch reqType {
|
2024-01-24 20:32:42 +00:00
|
|
|
case requestTypeConsul:
|
|
|
|
// This is a special case of discovery.QueryByName where we know that we need to query the consul service
|
|
|
|
// regardless of the question name.
|
|
|
|
query := &discovery.Query{
|
|
|
|
QueryType: discovery.QueryTypeService,
|
|
|
|
QueryPayload: discovery.QueryPayload{
|
|
|
|
Name: structs.ConsulServiceName,
|
2024-02-02 23:29:38 +00:00
|
|
|
Tenancy: discovery.QueryTenancy{
|
|
|
|
// We specify the partition here so that in the case we are a client agent in a non-default partition.
|
|
|
|
// We don't want the query processors default partition to be used.
|
|
|
|
// This is a small hack because for V1 CE, this is not the correct default partition name, but we
|
|
|
|
// need to add something to disambiguate the empty field.
|
|
|
|
Partition: resource.DefaultPartitionName,
|
|
|
|
},
|
2024-01-24 20:32:42 +00:00
|
|
|
},
|
|
|
|
Limit: 3, // TODO (v2-dns): need to thread this through to the backend and make sure we shuffle the results
|
|
|
|
}
|
2024-01-29 22:33:45 +00:00
|
|
|
|
2024-02-02 23:29:38 +00:00
|
|
|
results, err := r.processor.QueryByName(query, discovery.Context{Token: reqCtx.Token})
|
2024-01-29 22:33:45 +00:00
|
|
|
return results, query, err
|
2024-01-17 23:46:18 +00:00
|
|
|
case requestTypeName:
|
2024-02-02 23:29:38 +00:00
|
|
|
query, err := buildQueryFromDNSMessage(req, reqCtx, r.domain, r.altDomain)
|
2024-01-17 23:46:18 +00:00
|
|
|
if err != nil {
|
|
|
|
r.logger.Error("error building discovery query from DNS request", "error", err)
|
2024-01-29 22:33:45 +00:00
|
|
|
return nil, query, err
|
|
|
|
}
|
2024-02-02 23:29:38 +00:00
|
|
|
results, err := r.processor.QueryByName(query, discovery.Context{Token: reqCtx.Token})
|
2024-01-29 22:33:45 +00:00
|
|
|
if err != nil {
|
|
|
|
r.logger.Error("error processing discovery query", "error", err)
|
|
|
|
return nil, query, err
|
2024-01-17 23:46:18 +00:00
|
|
|
}
|
2024-01-29 22:33:45 +00:00
|
|
|
return results, query, nil
|
2024-01-17 23:46:18 +00:00
|
|
|
case requestTypeIP:
|
2024-01-30 22:34:35 +00:00
|
|
|
ip := dnsutil.IPFromARPA(qName)
|
2024-01-29 16:40:10 +00:00
|
|
|
if ip == nil {
|
2024-01-30 22:34:35 +00:00
|
|
|
r.logger.Error("error building IP from DNS request", "name", qName)
|
2024-01-29 22:33:45 +00:00
|
|
|
return nil, nil, errNameNotFound
|
2024-01-29 16:40:10 +00:00
|
|
|
}
|
2024-02-02 23:29:38 +00:00
|
|
|
results, err := r.processor.QueryByIP(ip, discovery.Context{Token: reqCtx.Token})
|
|
|
|
return results, nil, err
|
2024-01-17 23:46:18 +00:00
|
|
|
case requestTypeAddress:
|
2024-01-29 22:33:45 +00:00
|
|
|
results, err := buildAddressResults(req)
|
|
|
|
if err != nil {
|
|
|
|
r.logger.Error("error processing discovery query", "error", err)
|
2024-02-02 23:29:38 +00:00
|
|
|
return nil, nil, err
|
2024-01-29 22:33:45 +00:00
|
|
|
}
|
2024-02-02 23:29:38 +00:00
|
|
|
return results, nil, nil
|
2024-01-17 23:46:18 +00:00
|
|
|
}
|
2024-02-02 23:29:38 +00:00
|
|
|
return nil, nil, errors.New("invalid request type")
|
2024-01-17 23:46:18 +00:00
|
|
|
}
|
|
|
|
|
2024-01-17 03:36:02 +00:00
|
|
|
// ServeDNS implements the miekg/dns.Handler interface.
|
|
|
|
// This is a standard DNS listener, so we inject a default request context based on the agent's config.
|
|
|
|
func (r *Router) ServeDNS(w dns.ResponseWriter, req *dns.Msg) {
|
2024-01-10 16:19:20 +00:00
|
|
|
reqCtx := r.defaultAgentDNSRequestContext()
|
|
|
|
out := r.HandleRequest(req, reqCtx, w.RemoteAddr())
|
|
|
|
w.WriteMsg(out)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReloadConfig hot-reloads the router config with new parameters
|
2024-01-17 03:36:02 +00:00
|
|
|
func (r *Router) ReloadConfig(newCfg *config.RuntimeConfig) error {
|
|
|
|
cfg, err := getDynamicRouterConfig(newCfg)
|
2024-01-10 16:19:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error loading DNS config: %w", err)
|
|
|
|
}
|
|
|
|
r.dynamicConfig.Store(cfg)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-02-02 23:29:38 +00:00
|
|
|
// getTTLForService Find the TTL for a given service.
|
|
|
|
// return ttl, true if found, 0, false otherwise
|
|
|
|
func (cfg *RouterDynamicConfig) getTTLForService(service string) (time.Duration, bool) {
|
|
|
|
if cfg.TTLStrict != nil {
|
|
|
|
ttl, ok := cfg.TTLStrict[service]
|
|
|
|
if ok {
|
|
|
|
return ttl, true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if cfg.TTLRadix != nil {
|
|
|
|
_, ttlRaw, ok := cfg.TTLRadix.LongestPrefix(service)
|
|
|
|
if ok {
|
|
|
|
return ttlRaw.(time.Duration), true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0, false
|
|
|
|
}
|
|
|
|
|
2024-01-17 03:36:02 +00:00
|
|
|
// Request type is similar to miekg/dns.Type, but correlates to the different query processors we might need to invoke.
|
|
|
|
type requestType string
|
|
|
|
|
|
|
|
const (
|
2024-01-24 20:32:42 +00:00
|
|
|
requestTypeName requestType = "NAME" // A/AAAA/CNAME/SRV
|
|
|
|
requestTypeIP requestType = "IP" // PTR
|
|
|
|
requestTypeAddress requestType = "ADDR" // Custom addr. A/AAAA lookups
|
|
|
|
requestTypeConsul requestType = "CONSUL" // SOA/NS
|
2024-01-17 03:36:02 +00:00
|
|
|
)
|
|
|
|
|
2024-01-24 20:32:42 +00:00
|
|
|
// parseDomain converts a DNS message into a generic discovery request.
|
2024-01-17 03:36:02 +00:00
|
|
|
// If the request domain does not match "consul." or the alternative domain,
|
|
|
|
// it will return true for needRecurse. The logic is based on miekg/dns.ServeDNS matcher.
|
|
|
|
// The implementation assumes that the only valid domains are "consul." and the alternative domain, and
|
|
|
|
// that DS query types are not supported.
|
2024-01-24 20:32:42 +00:00
|
|
|
func (r *Router) parseDomain(req *dns.Msg) (string, bool) {
|
2024-01-17 03:36:02 +00:00
|
|
|
target := dns.CanonicalName(req.Question[0].Name)
|
|
|
|
target, _ = stripSuffix(target)
|
|
|
|
|
|
|
|
for offset, overflow := 0, false; !overflow; offset, overflow = dns.NextLabel(target, offset) {
|
|
|
|
subdomain := target[offset:]
|
|
|
|
switch subdomain {
|
2024-01-24 20:32:42 +00:00
|
|
|
case ".":
|
|
|
|
// We don't support consul having a domain or altdomain attached to the root.
|
|
|
|
return "", true
|
2024-01-17 03:36:02 +00:00
|
|
|
case r.domain:
|
2024-01-24 20:32:42 +00:00
|
|
|
return r.domain, false
|
2024-01-17 03:36:02 +00:00
|
|
|
case r.altDomain:
|
2024-01-24 20:32:42 +00:00
|
|
|
return r.altDomain, false
|
2024-01-17 03:36:02 +00:00
|
|
|
case arpaDomain:
|
|
|
|
// PTR queries always respond with the primary domain.
|
2024-01-24 20:32:42 +00:00
|
|
|
return r.domain, false
|
2024-01-17 03:36:02 +00:00
|
|
|
// Default: fallthrough
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// No match found; recurse if possible
|
2024-01-24 20:32:42 +00:00
|
|
|
return "", true
|
|
|
|
}
|
|
|
|
|
|
|
|
// parseRequestType inspects the DNS message type and question name to determine the requestType of request.
|
|
|
|
// We assume by the time this is called, we are responding to a question with a domain we serve.
|
|
|
|
// This is used internally to determine which query processor method (if any) to invoke.
|
|
|
|
func parseRequestType(req *dns.Msg) requestType {
|
|
|
|
switch {
|
|
|
|
case req.Question[0].Qtype == dns.TypeSOA || req.Question[0].Qtype == dns.TypeNS:
|
|
|
|
// SOA and NS type supersede the domain
|
|
|
|
// NOTE!: In V1 of the DNS server it was possible to serve a PTR lookup using the arpa domain but a SOA question type.
|
|
|
|
// This also included the SOA record. This seemed inconsistent and unnecessary - it was removed for simplicity.
|
|
|
|
return requestTypeConsul
|
|
|
|
case isPTRSubdomain(req.Question[0].Name):
|
|
|
|
return requestTypeIP
|
|
|
|
case isAddrSubdomain(req.Question[0].Name):
|
|
|
|
return requestTypeAddress
|
|
|
|
default:
|
|
|
|
return requestTypeName
|
|
|
|
}
|
2024-01-17 03:36:02 +00:00
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// serializeQueryResults converts a discovery.Result into a DNS message.
|
2024-02-02 23:29:38 +00:00
|
|
|
func (r *Router) serializeQueryResults(req *dns.Msg, reqCtx Context,
|
2024-01-29 22:33:45 +00:00
|
|
|
query *discovery.Query, results []*discovery.Result, cfg *RouterDynamicConfig,
|
|
|
|
responseDomain string, remoteAddress net.Addr, maxRecursionLevel int) (*dns.Msg, error) {
|
2024-01-17 03:36:02 +00:00
|
|
|
resp := new(dns.Msg)
|
|
|
|
resp.SetReply(req)
|
|
|
|
resp.Compress = !cfg.DisableCompression
|
|
|
|
resp.Authoritative = true
|
|
|
|
resp.RecursionAvailable = canRecurse(cfg)
|
|
|
|
|
2024-01-29 22:33:45 +00:00
|
|
|
qType := req.Question[0].Qtype
|
|
|
|
reqType := parseRequestType(req)
|
|
|
|
|
|
|
|
// Always add the SOA record if requested.
|
|
|
|
switch {
|
|
|
|
case qType == dns.TypeSOA:
|
|
|
|
resp.Answer = append(resp.Answer, makeSOARecord(responseDomain, cfg))
|
|
|
|
for _, result := range results {
|
|
|
|
ans, ex, ns := r.getAnswerExtraAndNs(result, req, reqCtx, query, cfg, responseDomain, remoteAddress, maxRecursionLevel)
|
|
|
|
resp.Answer = append(resp.Answer, ans...)
|
|
|
|
resp.Extra = append(resp.Extra, ex...)
|
|
|
|
resp.Ns = append(resp.Ns, ns...)
|
|
|
|
}
|
|
|
|
case qType == dns.TypeSRV, reqType == requestTypeAddress:
|
|
|
|
for _, result := range results {
|
|
|
|
ans, ex, ns := r.getAnswerExtraAndNs(result, req, reqCtx, query, cfg, responseDomain, remoteAddress, maxRecursionLevel)
|
|
|
|
resp.Answer = append(resp.Answer, ans...)
|
|
|
|
resp.Extra = append(resp.Extra, ex...)
|
|
|
|
resp.Ns = append(resp.Ns, ns...)
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
// default will send it to where it does some de-duping while it calls getAnswerExtraAndNs and recurses.
|
|
|
|
r.appendResultsToDNSResponse(req, reqCtx, query, resp, results, cfg, responseDomain, remoteAddress, maxRecursionLevel)
|
|
|
|
}
|
|
|
|
|
|
|
|
return resp, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// appendResultsToDNSResponse builds dns message from the discovery results and
|
|
|
|
// appends them to the dns response.
|
2024-02-02 23:29:38 +00:00
|
|
|
func (r *Router) appendResultsToDNSResponse(req *dns.Msg, reqCtx Context,
|
2024-01-29 22:33:45 +00:00
|
|
|
query *discovery.Query, resp *dns.Msg, results []*discovery.Result, cfg *RouterDynamicConfig,
|
|
|
|
responseDomain string, remoteAddress net.Addr, maxRecursionLevel int) {
|
|
|
|
|
2024-01-24 20:32:42 +00:00
|
|
|
// Always add the SOA record if requested.
|
|
|
|
if req.Question[0].Qtype == dns.TypeSOA {
|
|
|
|
resp.Answer = append(resp.Answer, makeSOARecord(responseDomain, cfg))
|
|
|
|
}
|
2024-01-17 03:36:02 +00:00
|
|
|
|
2024-01-29 22:33:45 +00:00
|
|
|
handled := make(map[string]struct{})
|
|
|
|
var answerCNAME []dns.RR = nil
|
|
|
|
|
|
|
|
count := 0
|
2024-01-17 03:36:02 +00:00
|
|
|
for _, result := range results {
|
2024-01-29 22:33:45 +00:00
|
|
|
// Add the node record
|
|
|
|
had_answer := false
|
|
|
|
ans, extra, _ := r.getAnswerExtraAndNs(result, req, reqCtx, query, cfg, responseDomain, remoteAddress, maxRecursionLevel)
|
|
|
|
resp.Extra = append(resp.Extra, extra...)
|
|
|
|
|
|
|
|
if len(ans) == 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Avoid duplicate entries, possible if a node has
|
|
|
|
// the same service on multiple ports, etc.
|
|
|
|
if _, ok := handled[ans[0].String()]; ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
handled[ans[0].String()] = struct{}{}
|
|
|
|
|
|
|
|
switch ans[0].(type) {
|
|
|
|
case *dns.CNAME:
|
|
|
|
// keep track of the first CNAME + associated RRs but don't add to the resp.Answer yet
|
|
|
|
// this will only be added if no non-CNAME RRs are found
|
|
|
|
if len(answerCNAME) == 0 {
|
|
|
|
answerCNAME = ans
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
resp.Answer = append(resp.Answer, ans...)
|
|
|
|
had_answer = true
|
|
|
|
}
|
|
|
|
|
|
|
|
if had_answer {
|
|
|
|
count++
|
|
|
|
if count == cfg.ARecordLimit {
|
|
|
|
// We stop only if greater than 0 or we reached the limit
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2024-01-17 03:36:02 +00:00
|
|
|
}
|
|
|
|
|
2024-01-29 22:33:45 +00:00
|
|
|
if len(resp.Answer) == 0 && len(answerCNAME) > 0 {
|
|
|
|
resp.Answer = answerCNAME
|
|
|
|
}
|
2024-01-17 03:36:02 +00:00
|
|
|
}
|
|
|
|
|
2024-01-18 23:30:04 +00:00
|
|
|
// defaultAgentDNSRequestContext returns a default request context based on the agent's config.
|
2024-02-02 23:29:38 +00:00
|
|
|
func (r *Router) defaultAgentDNSRequestContext() Context {
|
|
|
|
return Context{
|
2024-01-18 23:30:04 +00:00
|
|
|
Token: r.tokenFunc(),
|
2024-02-02 23:29:38 +00:00
|
|
|
// We don't need to specify the agent's partition here because that will be handled further down the stack
|
|
|
|
// in the query processor.
|
2024-01-18 23:30:04 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-01-29 22:33:45 +00:00
|
|
|
// resolveCNAME is used to recursively resolve CNAME records
|
2024-02-02 23:29:38 +00:00
|
|
|
func (r *Router) resolveCNAME(cfg *RouterDynamicConfig, name string, reqCtx Context,
|
2024-01-29 22:33:45 +00:00
|
|
|
remoteAddress net.Addr, maxRecursionLevel int) []dns.RR {
|
|
|
|
// If the CNAME record points to a Consul address, resolve it internally
|
2024-02-02 23:29:38 +00:00
|
|
|
// Convert query to lowercase because DNS is case-insensitive; d.domain and
|
2024-01-29 22:33:45 +00:00
|
|
|
// d.altDomain are already converted
|
|
|
|
|
|
|
|
if ln := strings.ToLower(name); strings.HasSuffix(ln, "."+r.domain) || strings.HasSuffix(ln, "."+r.altDomain) {
|
|
|
|
if maxRecursionLevel < 1 {
|
|
|
|
//d.logger.Error("Infinite recursion detected for name, won't perform any CNAME resolution.", "name", name)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
req := &dns.Msg{}
|
|
|
|
|
|
|
|
req.SetQuestion(name, dns.TypeANY)
|
|
|
|
// TODO: handle error response
|
|
|
|
resp := r.handleRequestRecursively(req, reqCtx, nil, maxRecursionLevel-1)
|
|
|
|
|
|
|
|
return resp.Answer
|
|
|
|
}
|
|
|
|
|
|
|
|
// Do nothing if we don't have a recursor
|
|
|
|
if !canRecurse(cfg) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ask for any A records
|
|
|
|
m := new(dns.Msg)
|
|
|
|
m.SetQuestion(name, dns.TypeA)
|
|
|
|
|
|
|
|
// Make a DNS lookup request
|
|
|
|
recursorResponse, err := r.recursor.handle(m, cfg, remoteAddress)
|
|
|
|
if err == nil {
|
|
|
|
return recursorResponse.Answer
|
|
|
|
}
|
|
|
|
|
|
|
|
r.logger.Error("all resolvers failed for name", "name", name)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-01-18 23:30:04 +00:00
|
|
|
// validateAndNormalizeRequest validates the DNS request and normalizes the request name.
|
|
|
|
func validateAndNormalizeRequest(req *dns.Msg) error {
|
|
|
|
// like upstream miekg/dns, we require at least one question,
|
|
|
|
// but we will only answer the first.
|
|
|
|
if len(req.Question) == 0 {
|
|
|
|
return errInvalidQuestion
|
|
|
|
}
|
|
|
|
|
|
|
|
// We mutate the request name to respond with the canonical name.
|
|
|
|
// This is Consul convention.
|
|
|
|
req.Question[0].Name = dns.CanonicalName(req.Question[0].Name)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// stripSuffix strips off the suffixes that may have been added to the request name.
|
2024-01-17 03:36:02 +00:00
|
|
|
func stripSuffix(target string) (string, bool) {
|
|
|
|
enableFailover := false
|
|
|
|
|
|
|
|
// Strip off any suffixes that may have been added.
|
|
|
|
offset, underflow := dns.PrevLabel(target, 1)
|
|
|
|
if !underflow {
|
|
|
|
maybeSuffix := target[offset:]
|
|
|
|
switch maybeSuffix {
|
|
|
|
case suffixFailover:
|
|
|
|
target = target[:offset]
|
|
|
|
enableFailover = true
|
|
|
|
case suffixNoFailover:
|
|
|
|
target = target[:offset]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return target, enableFailover
|
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// isAddrSubdomain returns true if the domain is a valid addr subdomain.
|
2024-01-17 03:36:02 +00:00
|
|
|
func isAddrSubdomain(domain string) bool {
|
|
|
|
labels := dns.SplitDomainName(domain)
|
|
|
|
|
|
|
|
// Looking for <hexadecimal-encoded IP>.addr.<optional datacenter>.consul.
|
|
|
|
if len(labels) > 2 {
|
|
|
|
return labels[1] == addrLabel
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2024-01-24 20:32:42 +00:00
|
|
|
// isPTRSubdomain returns true if the domain ends in the PTR domain, "in-addr.arpa.".
|
|
|
|
func isPTRSubdomain(domain string) bool {
|
|
|
|
labels := dns.SplitDomainName(domain)
|
|
|
|
labelCount := len(labels)
|
|
|
|
|
2024-01-29 16:40:10 +00:00
|
|
|
// We keep this check brief so we can have more specific error handling later.
|
|
|
|
if labelCount < 1 {
|
2024-01-24 20:32:42 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2024-01-29 16:40:10 +00:00
|
|
|
return labels[labelCount-1] == arpaLabel
|
2024-01-24 20:32:42 +00:00
|
|
|
}
|
|
|
|
|
2024-01-17 03:36:02 +00:00
|
|
|
// getDynamicRouterConfig takes agent config and creates/resets the config used by DNS Router
|
|
|
|
func getDynamicRouterConfig(conf *config.RuntimeConfig) (*RouterDynamicConfig, error) {
|
|
|
|
cfg := &RouterDynamicConfig{
|
|
|
|
ARecordLimit: conf.DNSARecordLimit,
|
|
|
|
EnableTruncate: conf.DNSEnableTruncate,
|
|
|
|
NodeTTL: conf.DNSNodeTTL,
|
|
|
|
RecursorStrategy: conf.DNSRecursorStrategy,
|
|
|
|
RecursorTimeout: conf.DNSRecursorTimeout,
|
|
|
|
UDPAnswerLimit: conf.DNSUDPAnswerLimit,
|
|
|
|
NodeMetaTXT: conf.DNSNodeMetaTXT,
|
|
|
|
DisableCompression: conf.DNSDisableCompression,
|
|
|
|
SOAConfig: SOAConfig{
|
|
|
|
Expire: conf.DNSSOA.Expire,
|
|
|
|
Minttl: conf.DNSSOA.Minttl,
|
|
|
|
Refresh: conf.DNSSOA.Refresh,
|
|
|
|
Retry: conf.DNSSOA.Retry,
|
|
|
|
},
|
2024-01-10 16:19:20 +00:00
|
|
|
}
|
2024-01-17 03:36:02 +00:00
|
|
|
|
2024-01-29 22:33:45 +00:00
|
|
|
if conf.DNSServiceTTL != nil {
|
|
|
|
cfg.TTLRadix = radix.New()
|
|
|
|
cfg.TTLStrict = make(map[string]time.Duration)
|
|
|
|
|
|
|
|
for key, ttl := range conf.DNSServiceTTL {
|
|
|
|
// All suffix with '*' are put in radix
|
|
|
|
// This include '*' that will match anything
|
|
|
|
if strings.HasSuffix(key, "*") {
|
|
|
|
cfg.TTLRadix.Insert(key[:len(key)-1], ttl)
|
|
|
|
} else {
|
|
|
|
cfg.TTLStrict[key] = ttl
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
cfg.TTLRadix = nil
|
|
|
|
cfg.TTLStrict = nil
|
|
|
|
}
|
2024-01-17 03:36:02 +00:00
|
|
|
|
2024-01-18 23:30:04 +00:00
|
|
|
for _, r := range conf.DNSRecursors {
|
|
|
|
ra, err := formatRecursorAddress(r)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("invalid recursor address: %w", err)
|
|
|
|
}
|
|
|
|
cfg.Recursors = append(cfg.Recursors, ra)
|
|
|
|
}
|
|
|
|
|
2024-01-17 03:36:02 +00:00
|
|
|
return cfg, nil
|
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// canRecurse returns true if the router can recurse on the request.
|
2024-01-17 03:36:02 +00:00
|
|
|
func canRecurse(cfg *RouterDynamicConfig) bool {
|
|
|
|
return len(cfg.Recursors) > 0
|
2024-01-10 16:19:20 +00:00
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// createServerFailureResponse returns a SERVFAIL message.
|
2024-01-10 16:19:20 +00:00
|
|
|
func createServerFailureResponse(req *dns.Msg, cfg *RouterDynamicConfig, recursionAvailable bool) *dns.Msg {
|
|
|
|
// Return a SERVFAIL message
|
|
|
|
m := &dns.Msg{}
|
|
|
|
m.SetReply(req)
|
|
|
|
m.Compress = !cfg.DisableCompression
|
|
|
|
m.SetRcode(req, dns.RcodeServerFailure)
|
|
|
|
m.RecursionAvailable = recursionAvailable
|
2024-01-18 23:30:04 +00:00
|
|
|
if edns := req.IsEdns0(); edns != nil {
|
|
|
|
setEDNS(req, m, true)
|
|
|
|
}
|
2024-01-10 16:19:20 +00:00
|
|
|
return m
|
|
|
|
}
|
2024-01-17 03:36:02 +00:00
|
|
|
|
2024-01-18 23:30:04 +00:00
|
|
|
// setEDNS is used to set the responses EDNS size headers and
|
|
|
|
// possibly the ECS headers as well if they were present in the
|
|
|
|
// original request
|
|
|
|
func setEDNS(request *dns.Msg, response *dns.Msg, ecsGlobal bool) {
|
|
|
|
edns := request.IsEdns0()
|
|
|
|
if edns == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// cannot just use the SetEdns0 function as we need to embed
|
|
|
|
// the ECS option as well
|
|
|
|
ednsResp := new(dns.OPT)
|
|
|
|
ednsResp.Hdr.Name = "."
|
|
|
|
ednsResp.Hdr.Rrtype = dns.TypeOPT
|
|
|
|
ednsResp.SetUDPSize(edns.UDPSize())
|
|
|
|
|
2024-01-24 20:32:42 +00:00
|
|
|
// Set up the ECS option if present
|
2024-01-18 23:30:04 +00:00
|
|
|
if subnet := ednsSubnetForRequest(request); subnet != nil {
|
|
|
|
subOp := new(dns.EDNS0_SUBNET)
|
|
|
|
subOp.Code = dns.EDNS0SUBNET
|
|
|
|
subOp.Family = subnet.Family
|
|
|
|
subOp.Address = subnet.Address
|
|
|
|
subOp.SourceNetmask = subnet.SourceNetmask
|
|
|
|
if c := response.Rcode; ecsGlobal || c == dns.RcodeNameError || c == dns.RcodeServerFailure || c == dns.RcodeRefused || c == dns.RcodeNotImplemented {
|
|
|
|
// reply is globally valid and should be cached accordingly
|
|
|
|
subOp.SourceScope = 0
|
|
|
|
} else {
|
|
|
|
// reply is only valid for the subnet it was queried with
|
|
|
|
subOp.SourceScope = subnet.SourceNetmask
|
|
|
|
}
|
|
|
|
ednsResp.Option = append(ednsResp.Option, subOp)
|
|
|
|
}
|
|
|
|
|
|
|
|
response.Extra = append(response.Extra, ednsResp)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ednsSubnetForRequest looks through the request to find any EDS subnet options
|
|
|
|
func ednsSubnetForRequest(req *dns.Msg) *dns.EDNS0_SUBNET {
|
|
|
|
// IsEdns0 returns the EDNS RR if present or nil otherwise
|
|
|
|
edns := req.IsEdns0()
|
|
|
|
if edns == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, o := range edns.Option {
|
|
|
|
if subnet, ok := o.(*dns.EDNS0_SUBNET); ok {
|
|
|
|
return subnet
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2024-01-24 20:32:42 +00:00
|
|
|
// createRefusedResponse returns a REFUSED message. This is the default behavior for unmatched queries in
|
|
|
|
// upstream miekg/dns.
|
2024-01-17 03:36:02 +00:00
|
|
|
func createRefusedResponse(req *dns.Msg) *dns.Msg {
|
|
|
|
// Return a REFUSED message
|
|
|
|
m := &dns.Msg{}
|
|
|
|
m.SetRcode(req, dns.RcodeRefused)
|
|
|
|
return m
|
|
|
|
}
|
|
|
|
|
2024-01-24 20:32:42 +00:00
|
|
|
// createAuthoritativeResponse returns an authoritative message that contains the SOA in the event that data is
|
|
|
|
// not return for a query. There can be multiple reasons for not returning data, hence the rcode argument.
|
|
|
|
func createAuthoritativeResponse(req *dns.Msg, cfg *RouterDynamicConfig, domain string, rcode int, ecsGlobal bool) *dns.Msg {
|
2024-01-17 03:36:02 +00:00
|
|
|
m := &dns.Msg{}
|
2024-01-24 20:32:42 +00:00
|
|
|
m.SetRcode(req, rcode)
|
2024-01-17 03:36:02 +00:00
|
|
|
m.Compress = !cfg.DisableCompression
|
|
|
|
m.Authoritative = true
|
2024-01-24 20:32:42 +00:00
|
|
|
m.RecursionAvailable = canRecurse(cfg)
|
|
|
|
if edns := req.IsEdns0(); edns != nil {
|
|
|
|
setEDNS(req, m, ecsGlobal)
|
|
|
|
}
|
2024-01-17 03:36:02 +00:00
|
|
|
|
|
|
|
// We add the SOA on NameErrors
|
2024-01-24 20:32:42 +00:00
|
|
|
soa := makeSOARecord(domain, cfg)
|
2024-01-17 03:36:02 +00:00
|
|
|
m.Ns = append(m.Ns, soa)
|
|
|
|
|
|
|
|
return m
|
|
|
|
}
|
|
|
|
|
2024-01-17 23:46:18 +00:00
|
|
|
// buildAddressResults returns a discovery.Result from a DNS request for addr. records.
|
2024-01-17 03:36:02 +00:00
|
|
|
func buildAddressResults(req *dns.Msg) ([]*discovery.Result, error) {
|
|
|
|
domain := dns.CanonicalName(req.Question[0].Name)
|
|
|
|
labels := dns.SplitDomainName(domain)
|
|
|
|
hexadecimal := labels[0]
|
|
|
|
|
|
|
|
if len(hexadecimal)/2 != 4 && len(hexadecimal)/2 != 16 {
|
|
|
|
return nil, errNameNotFound
|
|
|
|
}
|
|
|
|
|
|
|
|
var ip net.IP
|
|
|
|
ip, err := hex.DecodeString(hexadecimal)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errNameNotFound
|
|
|
|
}
|
|
|
|
|
|
|
|
return []*discovery.Result{
|
|
|
|
{
|
|
|
|
Address: ip.String(),
|
|
|
|
Type: discovery.ResultTypeNode, // We choose node by convention since we do not know the origin of the IP
|
|
|
|
},
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2024-01-29 22:33:45 +00:00
|
|
|
// getAnswerAndExtra creates the dns answer and extra from discovery results.
|
2024-02-02 23:29:38 +00:00
|
|
|
func (r *Router) getAnswerExtraAndNs(result *discovery.Result, req *dns.Msg, reqCtx Context,
|
2024-01-30 22:34:35 +00:00
|
|
|
query *discovery.Query, cfg *RouterDynamicConfig, domain string, remoteAddress net.Addr,
|
|
|
|
maxRecursionLevel int) (answer []dns.RR, extra []dns.RR, ns []dns.RR) {
|
|
|
|
target := newDNSAddress(result.Target)
|
|
|
|
address := newDNSAddress(result.Address)
|
2024-01-29 22:33:45 +00:00
|
|
|
qName := req.Question[0].Name
|
|
|
|
ttlLookupName := qName
|
|
|
|
if query != nil {
|
|
|
|
ttlLookupName = query.QueryPayload.Name
|
2024-01-17 03:36:02 +00:00
|
|
|
}
|
2024-01-29 22:33:45 +00:00
|
|
|
ttl := getTTLForResult(ttlLookupName, query, cfg)
|
2024-01-17 03:36:02 +00:00
|
|
|
qType := req.Question[0].Qtype
|
|
|
|
|
2024-01-24 20:32:42 +00:00
|
|
|
// TODO (v2-dns): skip records that refer to a workload/node that don't have a valid DNS name.
|
|
|
|
|
|
|
|
// Special case responses
|
2024-01-29 16:40:10 +00:00
|
|
|
switch {
|
|
|
|
// PTR requests are first since they are a special case of domain overriding question type
|
|
|
|
case parseRequestType(req) == requestTypeIP:
|
|
|
|
ptr := &dns.PTR{
|
|
|
|
Hdr: dns.RR_Header{Name: qName, Rrtype: dns.TypePTR, Class: dns.ClassINET, Ttl: 0},
|
|
|
|
Ptr: canonicalNameForResult(result, domain),
|
|
|
|
}
|
2024-01-29 22:33:45 +00:00
|
|
|
answer = append(answer, ptr)
|
2024-01-29 16:40:10 +00:00
|
|
|
case qType == dns.TypeNS:
|
2024-01-24 20:32:42 +00:00
|
|
|
// TODO (v2-dns): fqdn in V1 has the datacenter included, this would need to be added to discovery.Result
|
2024-01-29 16:40:10 +00:00
|
|
|
fqdn := canonicalNameForResult(result, domain)
|
2024-01-29 22:33:45 +00:00
|
|
|
extraRecord := makeIPBasedRecord(fqdn, address, ttl) // TODO (v2-dns): this is not sufficient, because recursion and CNAMES are supported
|
2024-01-29 16:40:10 +00:00
|
|
|
|
2024-01-29 22:33:45 +00:00
|
|
|
answer = append(answer, makeNSRecord(domain, fqdn, ttl))
|
|
|
|
extra = append(extra, extraRecord)
|
2024-01-29 16:40:10 +00:00
|
|
|
case qType == dns.TypeSOA:
|
2024-01-24 20:32:42 +00:00
|
|
|
// TODO (v2-dns): fqdn in V1 has the datacenter included, this would need to be added to discovery.Result
|
2024-01-29 16:40:10 +00:00
|
|
|
// to be returned in the result.
|
|
|
|
fqdn := canonicalNameForResult(result, domain)
|
2024-01-29 22:33:45 +00:00
|
|
|
extraRecord := makeIPBasedRecord(fqdn, address, ttl) // TODO (v2-dns): this is not sufficient, because recursion and CNAMES are supported
|
2024-01-24 20:32:42 +00:00
|
|
|
|
2024-01-29 22:33:45 +00:00
|
|
|
ns = append(ns, makeNSRecord(domain, fqdn, ttl))
|
|
|
|
extra = append(extra, extraRecord)
|
2024-01-29 16:40:10 +00:00
|
|
|
case qType == dns.TypeSRV:
|
2024-01-17 03:36:02 +00:00
|
|
|
// We put A/AAAA/CNAME records in the additional section for SRV requests
|
2024-01-29 22:33:45 +00:00
|
|
|
a, e := r.getAnswerExtrasForAddressAndTarget(address, target, req, reqCtx,
|
2024-01-30 22:34:35 +00:00
|
|
|
result, ttl, remoteAddress, cfg, maxRecursionLevel)
|
2024-01-29 22:33:45 +00:00
|
|
|
answer = append(answer, a...)
|
|
|
|
extra = append(extra, e...)
|
|
|
|
|
|
|
|
if cfg.NodeMetaTXT {
|
2024-01-30 22:34:35 +00:00
|
|
|
name := target.FQDN()
|
|
|
|
if !target.IsInternalFQDN(r.domain) && !target.IsExternalFQDN(r.domain) {
|
|
|
|
name = canonicalNameForResult(result, r.domain)
|
|
|
|
}
|
|
|
|
extra = append(extra, makeTXTRecord(name, result, ttl)...)
|
2024-01-29 22:33:45 +00:00
|
|
|
}
|
|
|
|
default:
|
|
|
|
a, e := r.getAnswerExtrasForAddressAndTarget(address, target, req, reqCtx,
|
2024-01-30 22:34:35 +00:00
|
|
|
result, ttl, remoteAddress, cfg, maxRecursionLevel)
|
2024-01-29 22:33:45 +00:00
|
|
|
answer = append(answer, a...)
|
|
|
|
extra = append(extra, e...)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
2024-01-17 03:36:02 +00:00
|
|
|
|
2024-01-29 22:33:45 +00:00
|
|
|
// getAnswerExtrasForAddressAndTarget creates the dns answer and extra from address and target dnsAddress pairs.
|
|
|
|
func (r *Router) getAnswerExtrasForAddressAndTarget(address *dnsAddress, target *dnsAddress, req *dns.Msg,
|
2024-02-02 23:29:38 +00:00
|
|
|
reqCtx Context, result *discovery.Result, ttl uint32, remoteAddress net.Addr,
|
2024-01-30 22:34:35 +00:00
|
|
|
cfg *RouterDynamicConfig, maxRecursionLevel int) (answer []dns.RR, extra []dns.RR) {
|
2024-01-29 22:33:45 +00:00
|
|
|
qName := req.Question[0].Name
|
|
|
|
reqType := parseRequestType(req)
|
|
|
|
|
|
|
|
switch {
|
2024-01-30 22:34:35 +00:00
|
|
|
// Virtual IPs and Address requests
|
|
|
|
// both return IPs with empty targets
|
|
|
|
case (reqType == requestTypeAddress || result.Type == discovery.ResultTypeVirtual) &&
|
|
|
|
target.IsEmptyString() && address.IsIP():
|
|
|
|
a, e := getAnswerExtrasForIP(qName, address, req.Question[0], reqType,
|
|
|
|
result, ttl)
|
|
|
|
answer = append(a, answer...)
|
|
|
|
extra = append(e, extra...)
|
2024-01-29 22:33:45 +00:00
|
|
|
|
2024-01-30 22:34:35 +00:00
|
|
|
// Address is a FQDN and requires a CNAME lookup.
|
2024-01-29 22:33:45 +00:00
|
|
|
case address.IsFQDN():
|
|
|
|
a, e := r.makeRecordFromFQDN(address.FQDN(), result, req, reqCtx,
|
|
|
|
cfg, ttl, remoteAddress, maxRecursionLevel)
|
|
|
|
answer = append(a, answer...)
|
|
|
|
extra = append(e, extra...)
|
|
|
|
|
2024-01-30 22:34:35 +00:00
|
|
|
// Target is FQDN that point to IP
|
|
|
|
case target.IsFQDN() && address.IsIP():
|
|
|
|
var a, e []dns.RR
|
2024-02-02 23:29:38 +00:00
|
|
|
if result.Type == discovery.ResultTypeNode || result.Type == discovery.ResultTypeWorkload {
|
2024-01-30 22:34:35 +00:00
|
|
|
// if it is a node record it means the service address pointed to a node
|
|
|
|
// and the node address was used. So we create an A record for the node address,
|
|
|
|
// as well as a CNAME for the service to node mapping.
|
|
|
|
name := target.FQDN()
|
|
|
|
if !target.IsInternalFQDN(r.domain) && !target.IsExternalFQDN(r.domain) {
|
|
|
|
name = canonicalNameForResult(result, r.domain)
|
|
|
|
} else if target.IsInternalFQDN(r.domain) {
|
|
|
|
answer = append(answer, makeCNAMERecord(qName, canonicalNameForResult(result, r.domain), ttl))
|
|
|
|
}
|
|
|
|
a, e = getAnswerExtrasForIP(name, address, req.Question[0], reqType,
|
|
|
|
result, ttl)
|
|
|
|
} else {
|
|
|
|
// if it is a service record, it means that the service address had the IP directly
|
|
|
|
// and there was not a need for an intermediate CNAME.
|
|
|
|
a, e = getAnswerExtrasForIP(qName, address, req.Question[0], reqType,
|
|
|
|
result, ttl)
|
2024-01-29 22:33:45 +00:00
|
|
|
}
|
|
|
|
answer = append(answer, a...)
|
|
|
|
extra = append(extra, e...)
|
|
|
|
|
|
|
|
// The target is a FQDN (internal or external service name)
|
|
|
|
default:
|
2024-01-30 22:34:35 +00:00
|
|
|
a, e := r.makeRecordFromFQDN(target.FQDN(), result, req, reqCtx, cfg,
|
|
|
|
ttl, remoteAddress, maxRecursionLevel)
|
2024-01-29 22:33:45 +00:00
|
|
|
answer = append(a, answer...)
|
|
|
|
extra = append(e, extra...)
|
2024-01-17 03:36:02 +00:00
|
|
|
}
|
2024-01-29 22:33:45 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2024-01-30 22:34:35 +00:00
|
|
|
// getAnswerExtrasForIP creates the dns answer and extra from IP dnsAddress pairs.
|
|
|
|
func getAnswerExtrasForIP(name string, addr *dnsAddress, question dns.Question,
|
|
|
|
reqType requestType, result *discovery.Result, ttl uint32) (answer []dns.RR, extra []dns.RR) {
|
2024-01-29 22:33:45 +00:00
|
|
|
qType := question.Qtype
|
|
|
|
|
2024-01-30 22:34:35 +00:00
|
|
|
// Have to pass original question name here even if the system has recursed
|
|
|
|
// and stripped off the domain suffix.
|
|
|
|
recHdrName := question.Name
|
|
|
|
if qType == dns.TypeSRV {
|
|
|
|
recHdrName = name
|
|
|
|
}
|
|
|
|
record := makeIPBasedRecord(recHdrName, addr, ttl)
|
|
|
|
|
2024-01-29 22:33:45 +00:00
|
|
|
isARecordWhenNotExplicitlyQueried := record.Header().Rrtype == dns.TypeA && qType != dns.TypeA && qType != dns.TypeANY
|
|
|
|
isAAAARecordWhenNotExplicitlyQueried := record.Header().Rrtype == dns.TypeAAAA && qType != dns.TypeAAAA && qType != dns.TypeANY
|
2024-01-17 03:36:02 +00:00
|
|
|
|
|
|
|
// For explicit A/AAAA queries, we must only return those records in the answer section.
|
2024-01-29 22:33:45 +00:00
|
|
|
if isARecordWhenNotExplicitlyQueried ||
|
|
|
|
isAAAARecordWhenNotExplicitlyQueried {
|
|
|
|
extra = append(extra, record)
|
|
|
|
} else {
|
|
|
|
answer = append(answer, record)
|
2024-01-17 03:36:02 +00:00
|
|
|
}
|
|
|
|
|
2024-01-29 22:33:45 +00:00
|
|
|
if reqType != requestTypeAddress && qType == dns.TypeSRV {
|
|
|
|
srv := makeSRVRecord(name, name, result, ttl)
|
|
|
|
answer = append(answer, srv)
|
2024-01-17 03:36:02 +00:00
|
|
|
}
|
2024-01-29 22:33:45 +00:00
|
|
|
return
|
2024-01-17 03:36:02 +00:00
|
|
|
}
|
|
|
|
|
2024-01-24 20:32:42 +00:00
|
|
|
func makeSOARecord(domain string, cfg *RouterDynamicConfig) dns.RR {
|
|
|
|
return &dns.SOA{
|
|
|
|
Hdr: dns.RR_Header{
|
|
|
|
Name: domain,
|
|
|
|
Rrtype: dns.TypeSOA,
|
|
|
|
Class: dns.ClassINET,
|
|
|
|
// Has to be consistent with MinTTL to avoid invalidation
|
|
|
|
Ttl: cfg.SOAConfig.Minttl,
|
|
|
|
},
|
|
|
|
Ns: "ns." + domain,
|
|
|
|
Serial: uint32(time.Now().Unix()),
|
|
|
|
Mbox: "hostmaster." + domain,
|
|
|
|
Refresh: cfg.SOAConfig.Refresh,
|
|
|
|
Retry: cfg.SOAConfig.Retry,
|
|
|
|
Expire: cfg.SOAConfig.Expire,
|
|
|
|
Minttl: cfg.SOAConfig.Minttl,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func makeNSRecord(domain, fqdn string, ttl uint32) dns.RR {
|
|
|
|
return &dns.NS{
|
|
|
|
Hdr: dns.RR_Header{
|
|
|
|
Name: domain,
|
|
|
|
Rrtype: dns.TypeNS,
|
|
|
|
Class: dns.ClassINET,
|
|
|
|
Ttl: ttl,
|
|
|
|
},
|
|
|
|
Ns: fqdn,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-01-29 22:33:45 +00:00
|
|
|
// makeIPBasedRecord an A or AAAA record for the given name and IP.
|
2024-01-17 03:36:02 +00:00
|
|
|
// Note: we might want to pass in the Query Name here, which is used in addr. and virtual. queries
|
|
|
|
// since there is only ever one result. Right now choosing to leave it off for simplification.
|
2024-01-29 22:33:45 +00:00
|
|
|
func makeIPBasedRecord(name string, addr *dnsAddress, ttl uint32) dns.RR {
|
2024-01-17 03:36:02 +00:00
|
|
|
|
2024-01-29 22:33:45 +00:00
|
|
|
if addr.IsIPV4() {
|
2024-01-17 03:36:02 +00:00
|
|
|
// check if the query type is A for IPv4 or ANY
|
|
|
|
return &dns.A{
|
|
|
|
Hdr: dns.RR_Header{
|
|
|
|
Name: name,
|
|
|
|
Rrtype: dns.TypeA,
|
|
|
|
Class: dns.ClassINET,
|
|
|
|
Ttl: ttl,
|
|
|
|
},
|
2024-01-29 22:33:45 +00:00
|
|
|
A: addr.IP(),
|
|
|
|
}
|
2024-01-17 03:36:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return &dns.AAAA{
|
|
|
|
Hdr: dns.RR_Header{
|
|
|
|
Name: name,
|
|
|
|
Rrtype: dns.TypeAAAA,
|
|
|
|
Class: dns.ClassINET,
|
|
|
|
Ttl: ttl,
|
|
|
|
},
|
2024-01-29 22:33:45 +00:00
|
|
|
AAAA: addr.IP(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *Router) makeRecordFromFQDN(fqdn string, result *discovery.Result,
|
2024-02-02 23:29:38 +00:00
|
|
|
req *dns.Msg, reqCtx Context, cfg *RouterDynamicConfig, ttl uint32,
|
2024-01-29 22:33:45 +00:00
|
|
|
remoteAddress net.Addr, maxRecursionLevel int) ([]dns.RR, []dns.RR) {
|
|
|
|
edns := req.IsEdns0() != nil
|
|
|
|
q := req.Question[0]
|
|
|
|
|
|
|
|
more := r.resolveCNAME(cfg, dns.Fqdn(fqdn), reqCtx, remoteAddress, maxRecursionLevel)
|
|
|
|
var additional []dns.RR
|
|
|
|
extra := 0
|
|
|
|
MORE_REC:
|
|
|
|
for _, rr := range more {
|
|
|
|
switch rr.Header().Rrtype {
|
|
|
|
case dns.TypeCNAME, dns.TypeA, dns.TypeAAAA:
|
|
|
|
// set the TTL manually
|
|
|
|
rr.Header().Ttl = ttl
|
|
|
|
additional = append(additional, rr)
|
|
|
|
|
|
|
|
extra++
|
|
|
|
if extra == maxRecurseRecords && !edns {
|
|
|
|
break MORE_REC
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if q.Qtype == dns.TypeSRV {
|
|
|
|
answers := []dns.RR{
|
|
|
|
makeSRVRecord(q.Name, fqdn, result, ttl),
|
|
|
|
}
|
|
|
|
return answers, additional
|
|
|
|
}
|
|
|
|
|
|
|
|
answers := []dns.RR{
|
2024-01-30 22:34:35 +00:00
|
|
|
makeCNAMERecord(q.Name, result.Target, ttl),
|
2024-01-29 22:33:45 +00:00
|
|
|
}
|
|
|
|
answers = append(answers, additional...)
|
|
|
|
|
|
|
|
return answers, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// makeCNAMERecord returns a CNAME record for the given name and target.
|
2024-01-30 22:34:35 +00:00
|
|
|
func makeCNAMERecord(name string, target string, ttl uint32) *dns.CNAME {
|
2024-01-29 22:33:45 +00:00
|
|
|
return &dns.CNAME{
|
|
|
|
Hdr: dns.RR_Header{
|
2024-01-30 22:34:35 +00:00
|
|
|
Name: name,
|
2024-01-29 22:33:45 +00:00
|
|
|
Rrtype: dns.TypeCNAME,
|
|
|
|
Class: dns.ClassINET,
|
|
|
|
Ttl: ttl,
|
|
|
|
},
|
2024-01-30 22:34:35 +00:00
|
|
|
Target: dns.Fqdn(target),
|
2024-01-29 22:33:45 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// func makeSRVRecord returns an SRV record for the given name and target.
|
|
|
|
func makeSRVRecord(name, target string, result *discovery.Result, ttl uint32) *dns.SRV {
|
|
|
|
return &dns.SRV{
|
|
|
|
Hdr: dns.RR_Header{
|
|
|
|
Name: name,
|
|
|
|
Rrtype: dns.TypeSRV,
|
|
|
|
Class: dns.ClassINET,
|
|
|
|
Ttl: ttl,
|
|
|
|
},
|
|
|
|
Priority: 1,
|
|
|
|
Weight: uint16(result.Weight),
|
2024-02-02 23:29:38 +00:00
|
|
|
Port: uint16(result.PortNumber),
|
2024-01-29 22:33:45 +00:00
|
|
|
Target: target,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// encodeKVasRFC1464 encodes a key-value pair according to RFC1464
|
|
|
|
func encodeKVasRFC1464(key, value string) (txt string) {
|
|
|
|
// For details on these replacements c.f. https://www.ietf.org/rfc/rfc1464.txt
|
|
|
|
key = strings.Replace(key, "`", "``", -1)
|
|
|
|
key = strings.Replace(key, "=", "`=", -1)
|
|
|
|
|
|
|
|
// Backquote the leading spaces
|
|
|
|
leadingSpacesRE := regexp.MustCompile("^ +")
|
|
|
|
numLeadingSpaces := len(leadingSpacesRE.FindString(key))
|
|
|
|
key = leadingSpacesRE.ReplaceAllString(key, strings.Repeat("` ", numLeadingSpaces))
|
|
|
|
|
|
|
|
// Backquote the trailing spaces
|
|
|
|
numTrailingSpaces := len(trailingSpacesRE.FindString(key))
|
|
|
|
key = trailingSpacesRE.ReplaceAllString(key, strings.Repeat("` ", numTrailingSpaces))
|
|
|
|
|
|
|
|
value = strings.Replace(value, "`", "``", -1)
|
|
|
|
|
|
|
|
return key + "=" + value
|
|
|
|
}
|
|
|
|
|
|
|
|
// makeTXTRecord returns a TXT record for the given name and result metadata.
|
|
|
|
func makeTXTRecord(name string, result *discovery.Result, ttl uint32) []dns.RR {
|
|
|
|
extra := make([]dns.RR, 0, len(result.Metadata))
|
|
|
|
for key, value := range result.Metadata {
|
|
|
|
txt := value
|
|
|
|
if !strings.HasPrefix(strings.ToLower(key), "rfc1035-") {
|
|
|
|
txt = encodeKVasRFC1464(key, value)
|
|
|
|
}
|
|
|
|
|
|
|
|
extra = append(extra, &dns.TXT{
|
|
|
|
Hdr: dns.RR_Header{
|
|
|
|
Name: name,
|
|
|
|
Rrtype: dns.TypeTXT,
|
|
|
|
Class: dns.ClassINET,
|
|
|
|
Ttl: ttl,
|
|
|
|
},
|
|
|
|
Txt: []string{txt},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
return extra
|
|
|
|
}
|