mirror of https://github.com/status-im/consul.git
DNS V2 - Revise discovery result to have service and node name and address fields. (#20468)
* DNS V2 - Revise discovery result to have service and node name and address fields. * NET-7488 - dns v2 add support for prepared queries in catalog v1 data model (#20470) NET-7488 - dns v2 add support for prepared queries in catalog v1 data model.
This commit is contained in:
parent
9602b43183
commit
602e3c4fd5
|
@ -79,11 +79,11 @@ type QueryTenancy struct {
|
||||||
// QueryPayload represents all information needed by the data backend
|
// QueryPayload represents all information needed by the data backend
|
||||||
// to decide which records to include.
|
// to decide which records to include.
|
||||||
type QueryPayload struct {
|
type QueryPayload struct {
|
||||||
Name string
|
Name string
|
||||||
PortName string // v1 - this could optionally be "connect" or "ingress"; v2 - this is the service port name
|
PortName string // v1 - this could optionally be "connect" or "ingress"; v2 - this is the service port name
|
||||||
Tag string // deprecated: use for V1 only
|
Tag string // deprecated: use for V1 only
|
||||||
RemoteAddr net.Addr // deprecated: used for prepared queries
|
SourceIP net.IP // deprecated: used for prepared queries
|
||||||
Tenancy QueryTenancy // tenancy includes any additional labels specified before the domain
|
Tenancy QueryTenancy // tenancy includes any additional labels specified before the domain
|
||||||
|
|
||||||
// v2 fields only
|
// v2 fields only
|
||||||
EnableFailover bool
|
EnableFailover bool
|
||||||
|
@ -104,19 +104,23 @@ const (
|
||||||
// It is the responsibility of the DNS encoder to know what to do with
|
// It is the responsibility of the DNS encoder to know what to do with
|
||||||
// each Result, based on the query type.
|
// each Result, based on the query type.
|
||||||
type Result struct {
|
type Result struct {
|
||||||
Address string // A/AAAA/CNAME records - could be used in the Extra section. CNAME is required to handle hostname addresses in workloads & nodes.
|
Service *Location // The name and address of the service.
|
||||||
|
Node *Location // The name and address of the node.
|
||||||
Weight uint32 // SRV queries
|
Weight uint32 // SRV queries
|
||||||
PortName string // Used to generate a fgdn when a specifc port was queried
|
PortName string // Used to generate a fgdn when a specifc port was queried
|
||||||
PortNumber uint32 // SRV queries
|
PortNumber uint32 // SRV queries
|
||||||
Metadata map[string]string // Used to collect metadata into TXT Records
|
Metadata map[string]string // Used to collect metadata into TXT Records
|
||||||
Type ResultType // Used to reconstruct the fqdn name of the resource
|
Type ResultType // Used to reconstruct the fqdn name of the resource
|
||||||
|
|
||||||
// Used in SRV & PTR queries to point at an A/AAAA Record.
|
|
||||||
Target string
|
|
||||||
|
|
||||||
Tenancy ResultTenancy
|
Tenancy ResultTenancy
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Location is used to represent a service, node, or workload.
|
||||||
|
type Location struct {
|
||||||
|
Name string
|
||||||
|
Address string
|
||||||
|
}
|
||||||
|
|
||||||
// ResultTenancy is used to reconstruct the fqdn name of the resource.
|
// ResultTenancy is used to reconstruct the fqdn name of the resource.
|
||||||
type ResultTenancy struct {
|
type ResultTenancy struct {
|
||||||
Namespace string
|
Namespace string
|
||||||
|
|
|
@ -26,9 +26,9 @@ var (
|
||||||
}
|
}
|
||||||
|
|
||||||
testResult = &Result{
|
testResult = &Result{
|
||||||
Address: "1.2.3.4",
|
Node: &Location{Address: "1.2.3.4"},
|
||||||
Type: ResultTypeNode, // This isn't correct for some test cases, but we are only asserting the right data fetcher functions are called
|
Type: ResultTypeNode, // This isn't correct for some test cases, but we are only asserting the right data fetcher functions are called
|
||||||
Target: "foo",
|
Service: &Location{Name: "foo"},
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
|
@ -33,6 +33,10 @@ type v1DataFetcherDynamicConfig struct {
|
||||||
// Default request tenancy
|
// Default request tenancy
|
||||||
datacenter string
|
datacenter string
|
||||||
|
|
||||||
|
segmentName string
|
||||||
|
nodeName string
|
||||||
|
nodePartition string
|
||||||
|
|
||||||
// Catalog configuration
|
// Catalog configuration
|
||||||
allowStale bool
|
allowStale bool
|
||||||
maxStale time.Duration
|
maxStale time.Duration
|
||||||
|
@ -115,17 +119,19 @@ func (f *V1DataFetcher) FetchNodes(ctx Context, req *QueryPayload) ([]*Result, e
|
||||||
}
|
}
|
||||||
|
|
||||||
results := make([]*Result, 0, 1)
|
results := make([]*Result, 0, 1)
|
||||||
node := out.NodeServices.Node
|
n := out.NodeServices.Node
|
||||||
|
|
||||||
results = append(results, &Result{
|
results = append(results, &Result{
|
||||||
Address: node.Address,
|
Node: &Location{
|
||||||
|
Name: n.Node,
|
||||||
|
Address: n.Address,
|
||||||
|
},
|
||||||
Type: ResultTypeNode,
|
Type: ResultTypeNode,
|
||||||
Metadata: node.Meta,
|
Metadata: n.Meta,
|
||||||
Target: node.Node,
|
|
||||||
Tenancy: ResultTenancy{
|
Tenancy: ResultTenancy{
|
||||||
// Namespace is not required because nodes are not namespaced
|
// Namespace is not required because nodes are not namespaced
|
||||||
Partition: node.GetEnterpriseMeta().PartitionOrDefault(),
|
Partition: n.GetEnterpriseMeta().PartitionOrDefault(),
|
||||||
Datacenter: node.Datacenter,
|
Datacenter: n.Datacenter,
|
||||||
},
|
},
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -163,8 +169,11 @@ func (f *V1DataFetcher) FetchVirtualIP(ctx Context, req *QueryPayload) (*Result,
|
||||||
}
|
}
|
||||||
|
|
||||||
result := &Result{
|
result := &Result{
|
||||||
Address: out,
|
Service: &Location{
|
||||||
Type: ResultTypeVirtual,
|
Name: req.Name,
|
||||||
|
Address: out,
|
||||||
|
},
|
||||||
|
Type: ResultTypeVirtual,
|
||||||
}
|
}
|
||||||
return result, nil
|
return result, nil
|
||||||
}
|
}
|
||||||
|
@ -196,9 +205,11 @@ func (f *V1DataFetcher) FetchRecordsByIp(reqCtx Context, ip net.IP) ([]*Result,
|
||||||
for _, n := range out.Nodes {
|
for _, n := range out.Nodes {
|
||||||
if targetIP == n.Address {
|
if targetIP == n.Address {
|
||||||
results = append(results, &Result{
|
results = append(results, &Result{
|
||||||
Address: n.Address,
|
Node: &Location{
|
||||||
Type: ResultTypeNode,
|
Name: n.Node,
|
||||||
Target: n.Node,
|
Address: n.Address,
|
||||||
|
},
|
||||||
|
Type: ResultTypeNode,
|
||||||
Tenancy: ResultTenancy{
|
Tenancy: ResultTenancy{
|
||||||
Namespace: f.defaultEnterpriseMeta.NamespaceOrDefault(),
|
Namespace: f.defaultEnterpriseMeta.NamespaceOrDefault(),
|
||||||
Partition: f.defaultEnterpriseMeta.PartitionOrDefault(),
|
Partition: f.defaultEnterpriseMeta.PartitionOrDefault(),
|
||||||
|
@ -226,13 +237,19 @@ func (f *V1DataFetcher) FetchRecordsByIp(reqCtx Context, ip net.IP) ([]*Result,
|
||||||
for _, n := range sout.ServiceNodes {
|
for _, n := range sout.ServiceNodes {
|
||||||
if n.ServiceAddress == targetIP {
|
if n.ServiceAddress == targetIP {
|
||||||
results = append(results, &Result{
|
results = append(results, &Result{
|
||||||
Address: n.ServiceAddress,
|
Service: &Location{
|
||||||
Type: ResultTypeService,
|
Name: n.ServiceName,
|
||||||
Target: n.ServiceName,
|
Address: n.ServiceAddress,
|
||||||
|
},
|
||||||
|
Type: ResultTypeService,
|
||||||
|
Node: &Location{
|
||||||
|
Name: n.Node,
|
||||||
|
Address: n.Address,
|
||||||
|
},
|
||||||
Tenancy: ResultTenancy{
|
Tenancy: ResultTenancy{
|
||||||
Namespace: f.defaultEnterpriseMeta.NamespaceOrDefault(),
|
Namespace: n.NamespaceOrEmpty(),
|
||||||
Partition: f.defaultEnterpriseMeta.PartitionOrDefault(),
|
Partition: n.PartitionOrEmpty(),
|
||||||
Datacenter: configCtx.datacenter,
|
Datacenter: n.Datacenter,
|
||||||
},
|
},
|
||||||
})
|
})
|
||||||
return results, nil
|
return results, nil
|
||||||
|
@ -256,7 +273,119 @@ func (f *V1DataFetcher) FetchWorkload(ctx Context, req *QueryPayload) (*Result,
|
||||||
// FetchPreparedQuery evaluates the results of a prepared query.
|
// FetchPreparedQuery evaluates the results of a prepared query.
|
||||||
// deprecated in V2
|
// deprecated in V2
|
||||||
func (f *V1DataFetcher) FetchPreparedQuery(ctx Context, req *QueryPayload) ([]*Result, error) {
|
func (f *V1DataFetcher) FetchPreparedQuery(ctx Context, req *QueryPayload) ([]*Result, error) {
|
||||||
return nil, nil
|
cfg := f.dynamicConfig.Load().(*v1DataFetcherDynamicConfig)
|
||||||
|
|
||||||
|
// Execute the prepared query.
|
||||||
|
args := structs.PreparedQueryExecuteRequest{
|
||||||
|
Datacenter: req.Tenancy.Datacenter,
|
||||||
|
QueryIDOrName: req.Name,
|
||||||
|
QueryOptions: structs.QueryOptions{
|
||||||
|
Token: ctx.Token,
|
||||||
|
AllowStale: cfg.allowStale,
|
||||||
|
MaxAge: cfg.cacheMaxAge,
|
||||||
|
},
|
||||||
|
|
||||||
|
// Always pass the local agent through. In the DNS interface, there
|
||||||
|
// is no provision for passing additional query parameters, so we
|
||||||
|
// send the local agent's data through to allow distance sorting
|
||||||
|
// relative to ourself on the server side.
|
||||||
|
Agent: structs.QuerySource{
|
||||||
|
Datacenter: cfg.datacenter,
|
||||||
|
Segment: cfg.segmentName,
|
||||||
|
Node: cfg.nodeName,
|
||||||
|
NodePartition: cfg.nodePartition,
|
||||||
|
},
|
||||||
|
Source: structs.QuerySource{
|
||||||
|
Ip: req.SourceIP.String(),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
out, err := f.executePreparedQuery(cfg, args)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// (v2-dns) TODO: (v2-dns) get TTLS working. They come from the database so not having
|
||||||
|
// TTL on the discovery result poses challenges.
|
||||||
|
|
||||||
|
/*
|
||||||
|
// TODO (slackpad) - What's a safe limit we can set here? It seems like
|
||||||
|
// with dup filtering done at this level we need to get everything to
|
||||||
|
// match the previous behavior. We can optimize by pushing more filtering
|
||||||
|
// into the query execution, but for now I think we need to get the full
|
||||||
|
// response. We could also choose a large arbitrary number that will
|
||||||
|
// likely work in practice, like 10*maxUDPAnswerLimit which should help
|
||||||
|
// reduce bandwidth if there are thousands of nodes available.
|
||||||
|
// Determine the TTL. The parse should never fail since we vet it when
|
||||||
|
// the query is created, but we check anyway. If the query didn't
|
||||||
|
// specify a TTL then we will try to use the agent's service-specific
|
||||||
|
// TTL configs.
|
||||||
|
var ttl time.Duration
|
||||||
|
if out.DNS.TTL != "" {
|
||||||
|
var err error
|
||||||
|
ttl, err = time.ParseDuration(out.DNS.TTL)
|
||||||
|
if err != nil {
|
||||||
|
f.logger.Warn("Failed to parse TTL for prepared query , ignoring",
|
||||||
|
"ttl", out.DNS.TTL,
|
||||||
|
"prepared_query", req.Name,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
ttl, _ = cfg.GetTTLForService(out.Service)
|
||||||
|
}
|
||||||
|
*/
|
||||||
|
|
||||||
|
// If we have no nodes, return not found!
|
||||||
|
if len(out.Nodes) == 0 {
|
||||||
|
return nil, ErrNoData
|
||||||
|
}
|
||||||
|
|
||||||
|
// Perform a random shuffle
|
||||||
|
out.Nodes.Shuffle()
|
||||||
|
return f.buildResultsFromServiceNodes(out.Nodes), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// executePreparedQuery is used to execute a PreparedQuery against the Consul catalog.
|
||||||
|
// If the config is set to UseCache, it will use agent cache.
|
||||||
|
func (f *V1DataFetcher) executePreparedQuery(cfg *v1DataFetcherDynamicConfig, args structs.PreparedQueryExecuteRequest) (*structs.PreparedQueryExecuteResponse, error) {
|
||||||
|
var out structs.PreparedQueryExecuteResponse
|
||||||
|
|
||||||
|
RPC:
|
||||||
|
if cfg.useCache {
|
||||||
|
raw, m, err := f.getFromCacheFunc(context.TODO(), cachetype.PreparedQueryName, &args)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
reply, ok := raw.(*structs.PreparedQueryExecuteResponse)
|
||||||
|
if !ok {
|
||||||
|
// This should never happen, but we want to protect against panics
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
f.logger.Trace("cache results for prepared query",
|
||||||
|
"cache_hit", m.Hit,
|
||||||
|
"prepared_query", args.QueryIDOrName,
|
||||||
|
)
|
||||||
|
|
||||||
|
out = *reply
|
||||||
|
} else {
|
||||||
|
if err := f.rpcFunc(context.Background(), "PreparedQuery.Execute", &args, &out); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Verify that request is not too stale, redo the request.
|
||||||
|
if args.AllowStale {
|
||||||
|
if out.LastContact > cfg.maxStale {
|
||||||
|
args.AllowStale = false
|
||||||
|
f.logger.Warn("Query results too stale, re-requesting")
|
||||||
|
goto RPC
|
||||||
|
} else if out.LastContact > staleCounterThreshold {
|
||||||
|
metrics.IncrCounter([]string{"dns", "stale_queries"}, 1)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return &out, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *V1DataFetcher) ValidateRequest(_ Context, req *QueryPayload) error {
|
func (f *V1DataFetcher) ValidateRequest(_ Context, req *QueryPayload) error {
|
||||||
|
@ -269,6 +398,34 @@ func (f *V1DataFetcher) ValidateRequest(_ Context, req *QueryPayload) error {
|
||||||
return validateEnterpriseTenancy(req.Tenancy)
|
return validateEnterpriseTenancy(req.Tenancy)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// buildResultsFromServiceNodes builds a list of results from a list of nodes.
|
||||||
|
func (f *V1DataFetcher) buildResultsFromServiceNodes(nodes []structs.CheckServiceNode) []*Result {
|
||||||
|
results := make([]*Result, 0)
|
||||||
|
for _, n := range nodes {
|
||||||
|
|
||||||
|
results = append(results, &Result{
|
||||||
|
Service: &Location{
|
||||||
|
Name: n.Service.Service,
|
||||||
|
Address: n.Service.Address,
|
||||||
|
},
|
||||||
|
Node: &Location{
|
||||||
|
Name: n.Node.Node,
|
||||||
|
Address: n.Node.Address,
|
||||||
|
},
|
||||||
|
Type: ResultTypeService,
|
||||||
|
Weight: uint32(findWeight(n)),
|
||||||
|
PortNumber: uint32(f.translateServicePortFunc(n.Node.Datacenter, n.Service.Port, n.Service.TaggedAddresses)),
|
||||||
|
Metadata: n.Node.Meta,
|
||||||
|
Tenancy: ResultTenancy{
|
||||||
|
Namespace: n.Service.NamespaceOrEmpty(),
|
||||||
|
Partition: n.Service.PartitionOrEmpty(),
|
||||||
|
Datacenter: n.Node.Datacenter,
|
||||||
|
},
|
||||||
|
})
|
||||||
|
}
|
||||||
|
return results
|
||||||
|
}
|
||||||
|
|
||||||
// fetchNode is used to look up a node in the Consul catalog within NodeServices.
|
// fetchNode is used to look up a node in the Consul catalog within NodeServices.
|
||||||
// If the config is set to UseCache, it will get the record from the agent cache.
|
// If the config is set to UseCache, it will get the record from the agent cache.
|
||||||
func (f *V1DataFetcher) fetchNode(cfg *v1DataFetcherDynamicConfig, args *structs.NodeSpecificRequest) (*structs.IndexedNodeServices, error) {
|
func (f *V1DataFetcher) fetchNode(cfg *v1DataFetcherDynamicConfig, args *structs.NodeSpecificRequest) (*structs.IndexedNodeServices, error) {
|
||||||
|
@ -353,7 +510,12 @@ func (f *V1DataFetcher) fetchServiceBasedOnTenancy(ctx Context, req *QueryPayloa
|
||||||
|
|
||||||
out, _, err := f.rpcFuncForServiceNodes(context.TODO(), args)
|
out, _, err := f.rpcFuncForServiceNodes(context.TODO(), args)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, fmt.Errorf("rpc request failed: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// If we have no nodes, return not found!
|
||||||
|
if len(out.Nodes) == 0 {
|
||||||
|
return nil, ErrNoData
|
||||||
}
|
}
|
||||||
|
|
||||||
// Filter out any service nodes due to health checks
|
// Filter out any service nodes due to health checks
|
||||||
|
@ -372,57 +534,7 @@ func (f *V1DataFetcher) fetchServiceBasedOnTenancy(ctx Context, req *QueryPayloa
|
||||||
|
|
||||||
// Perform a random shuffle
|
// Perform a random shuffle
|
||||||
out.Nodes.Shuffle()
|
out.Nodes.Shuffle()
|
||||||
results := make([]*Result, 0, len(out.Nodes))
|
return f.buildResultsFromServiceNodes(out.Nodes), nil
|
||||||
for _, node := range out.Nodes {
|
|
||||||
address, target, resultType := getAddressTargetAndResultType(node)
|
|
||||||
|
|
||||||
results = append(results, &Result{
|
|
||||||
Address: address,
|
|
||||||
Type: resultType,
|
|
||||||
Target: target,
|
|
||||||
Weight: uint32(findWeight(node)),
|
|
||||||
PortNumber: uint32(f.translateServicePortFunc(node.Node.Datacenter, node.Service.Port, node.Service.TaggedAddresses)),
|
|
||||||
Metadata: node.Node.Meta,
|
|
||||||
Tenancy: ResultTenancy{
|
|
||||||
Namespace: node.Service.NamespaceOrEmpty(),
|
|
||||||
Partition: node.Service.PartitionOrEmpty(),
|
|
||||||
Datacenter: node.Node.Datacenter,
|
|
||||||
},
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
return results, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// getAddressTargetAndResultType returns the address, target and result type for a check service node.
|
|
||||||
func getAddressTargetAndResultType(node structs.CheckServiceNode) (string, string, ResultType) {
|
|
||||||
// Set address and target
|
|
||||||
// if service address is present, set target and address based on service.
|
|
||||||
// otherwise get it from the node.
|
|
||||||
address := node.Service.Address
|
|
||||||
target := node.Service.Service
|
|
||||||
resultType := ResultTypeService
|
|
||||||
|
|
||||||
addressIP := net.ParseIP(address)
|
|
||||||
if addressIP == nil {
|
|
||||||
resultType = ResultTypeNode
|
|
||||||
if node.Service.Address != "" {
|
|
||||||
// cases where service address is foo or foo.node.consul
|
|
||||||
// For usage in DNS, these discovery results necessitate a CNAME record.
|
|
||||||
// These cases can be inferred from the discovery result when Type is Node and
|
|
||||||
// target is not an IP.
|
|
||||||
target = node.Service.Address
|
|
||||||
} else {
|
|
||||||
// cases where service address is empty and the service is bound to
|
|
||||||
// node with an address. These do not require a CNAME record in.
|
|
||||||
// For usage in DNS, these discovery results do not require a CNAME record.
|
|
||||||
// These cases can be inferred from the discovery result when Type is Node and
|
|
||||||
// target is not an IP.
|
|
||||||
target = node.Node.Node
|
|
||||||
}
|
|
||||||
address = node.Node.Address
|
|
||||||
}
|
|
||||||
return address, target, resultType
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// findWeight returns the weight of a service node.
|
// findWeight returns the weight of a service node.
|
||||||
|
|
|
@ -51,8 +51,11 @@ func Test_FetchVirtualIP(t *testing.T) {
|
||||||
Token: "test-token",
|
Token: "test-token",
|
||||||
},
|
},
|
||||||
expectedResult: &Result{
|
expectedResult: &Result{
|
||||||
Address: "192.168.10.10",
|
Service: &Location{
|
||||||
Type: ResultTypeVirtual,
|
Name: "db",
|
||||||
|
Address: "192.168.10.10",
|
||||||
|
},
|
||||||
|
Type: ResultTypeVirtual,
|
||||||
},
|
},
|
||||||
expectedErr: nil,
|
expectedErr: nil,
|
||||||
},
|
},
|
||||||
|
@ -97,7 +100,7 @@ func Test_FetchVirtualIP(t *testing.T) {
|
||||||
if tc.expectedErr == nil {
|
if tc.expectedErr == nil {
|
||||||
// set the out parameter to ensure that it is used to formulate the result.Address
|
// set the out parameter to ensure that it is used to formulate the result.Address
|
||||||
reply := args.Get(3).(*string)
|
reply := args.Get(3).(*string)
|
||||||
*reply = tc.expectedResult.Address
|
*reply = tc.expectedResult.Service.Address
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
// TODO (v2-dns): mock these properly
|
// TODO (v2-dns): mock these properly
|
||||||
|
@ -131,210 +134,62 @@ func Test_FetchEndpoints(t *testing.T) {
|
||||||
DNSUseCache: true,
|
DNSUseCache: true,
|
||||||
DNSCacheMaxAge: 100,
|
DNSCacheMaxAge: 100,
|
||||||
}
|
}
|
||||||
tests := []struct {
|
ctx := Context{
|
||||||
name string
|
Token: "test-token",
|
||||||
queryPayload *QueryPayload
|
}
|
||||||
context Context
|
expectedResults := []*Result{
|
||||||
rpcFuncForServiceNodes func(ctx context.Context, req structs.ServiceSpecificRequest) (structs.IndexedCheckServiceNodes, cache.ResultMeta, error)
|
|
||||||
expectedResults []*Result
|
|
||||||
expectedErr error
|
|
||||||
}{
|
|
||||||
{
|
{
|
||||||
name: "when service address is IPv4, result type is service, address is service address and target is service name",
|
Node: &Location{
|
||||||
queryPayload: &QueryPayload{
|
Name: "node-name",
|
||||||
Name: "service-name",
|
Address: "node-address",
|
||||||
Tenancy: QueryTenancy{
|
|
||||||
Namespace: defaultTestNamespace,
|
|
||||||
Partition: defaultTestPartition,
|
|
||||||
},
|
|
||||||
},
|
},
|
||||||
rpcFuncForServiceNodes: func(ctx context.Context, req structs.ServiceSpecificRequest) (structs.IndexedCheckServiceNodes, cache.ResultMeta, error) {
|
Service: &Location{
|
||||||
return structs.IndexedCheckServiceNodes{
|
Name: "service-name",
|
||||||
Nodes: []structs.CheckServiceNode{
|
Address: "service-address",
|
||||||
{
|
|
||||||
Node: &structs.Node{
|
|
||||||
Address: "node-address",
|
|
||||||
Node: "node-name",
|
|
||||||
Partition: defaultTestPartition,
|
|
||||||
},
|
|
||||||
Service: &structs.NodeService{
|
|
||||||
Address: "127.0.0.1",
|
|
||||||
Service: "service-name",
|
|
||||||
EnterpriseMeta: acl.NewEnterpriseMetaWithPartition(defaultTestPartition, defaultTestNamespace),
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
}, cache.ResultMeta{}, nil
|
|
||||||
},
|
},
|
||||||
context: Context{
|
Type: ResultTypeService,
|
||||||
Token: "test-token",
|
Weight: 1,
|
||||||
},
|
|
||||||
expectedResults: []*Result{
|
|
||||||
{
|
|
||||||
Address: "127.0.0.1",
|
|
||||||
Target: "service-name",
|
|
||||||
Type: ResultTypeService,
|
|
||||||
Weight: 1,
|
|
||||||
Tenancy: ResultTenancy{
|
|
||||||
Namespace: defaultTestNamespace,
|
|
||||||
Partition: defaultTestPartition,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedErr: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "when service address is IPv6, result type is service, address is service address and target is service name",
|
|
||||||
queryPayload: &QueryPayload{
|
|
||||||
Name: "service-name",
|
|
||||||
Tenancy: QueryTenancy{
|
|
||||||
Namespace: defaultTestNamespace,
|
|
||||||
Partition: defaultTestPartition,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
rpcFuncForServiceNodes: func(ctx context.Context, req structs.ServiceSpecificRequest) (structs.IndexedCheckServiceNodes, cache.ResultMeta, error) {
|
|
||||||
return structs.IndexedCheckServiceNodes{
|
|
||||||
Nodes: []structs.CheckServiceNode{
|
|
||||||
{
|
|
||||||
Node: &structs.Node{
|
|
||||||
Address: "node-address",
|
|
||||||
Node: "node-name",
|
|
||||||
Partition: defaultTestPartition,
|
|
||||||
},
|
|
||||||
Service: &structs.NodeService{
|
|
||||||
Address: "2001:db8:1:2:cafe::1337",
|
|
||||||
Service: "service-name",
|
|
||||||
EnterpriseMeta: acl.NewEnterpriseMetaWithPartition(defaultTestPartition, defaultTestNamespace),
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
}, cache.ResultMeta{}, nil
|
|
||||||
},
|
|
||||||
context: Context{
|
|
||||||
Token: "test-token",
|
|
||||||
},
|
|
||||||
expectedResults: []*Result{
|
|
||||||
{
|
|
||||||
Address: "2001:db8:1:2:cafe::1337",
|
|
||||||
Target: "service-name",
|
|
||||||
Type: ResultTypeService,
|
|
||||||
Weight: 1,
|
|
||||||
Tenancy: ResultTenancy{
|
|
||||||
Namespace: defaultTestNamespace,
|
|
||||||
Partition: defaultTestPartition,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedErr: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "when service address is not IP but is not empty, result type is node, address is node address, and target is service address",
|
|
||||||
queryPayload: &QueryPayload{
|
|
||||||
Name: "service-name",
|
|
||||||
Tenancy: QueryTenancy{
|
|
||||||
Namespace: defaultTestNamespace,
|
|
||||||
Partition: defaultTestPartition,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
rpcFuncForServiceNodes: func(ctx context.Context, req structs.ServiceSpecificRequest) (structs.IndexedCheckServiceNodes, cache.ResultMeta, error) {
|
|
||||||
return structs.IndexedCheckServiceNodes{
|
|
||||||
Nodes: []structs.CheckServiceNode{
|
|
||||||
{
|
|
||||||
Node: &structs.Node{
|
|
||||||
Address: "node-address",
|
|
||||||
Node: "node-name",
|
|
||||||
Partition: defaultTestPartition,
|
|
||||||
},
|
|
||||||
Service: &structs.NodeService{
|
|
||||||
Address: "foo",
|
|
||||||
Service: "service-name",
|
|
||||||
EnterpriseMeta: acl.NewEnterpriseMetaWithPartition(defaultTestPartition, defaultTestNamespace),
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
}, cache.ResultMeta{}, nil
|
|
||||||
},
|
|
||||||
context: Context{
|
|
||||||
Token: "test-token",
|
|
||||||
},
|
|
||||||
expectedResults: []*Result{
|
|
||||||
{
|
|
||||||
Address: "node-address",
|
|
||||||
Target: "foo",
|
|
||||||
Type: ResultTypeNode,
|
|
||||||
Weight: 1,
|
|
||||||
Tenancy: ResultTenancy{
|
|
||||||
Namespace: defaultTestNamespace,
|
|
||||||
Partition: defaultTestPartition,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedErr: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
name: "when service address is empty, result type is node, address is node address, and target is node name",
|
|
||||||
queryPayload: &QueryPayload{
|
|
||||||
Name: "service-name",
|
|
||||||
Tenancy: QueryTenancy{
|
|
||||||
Namespace: defaultTestNamespace,
|
|
||||||
Partition: defaultTestPartition,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
rpcFuncForServiceNodes: func(ctx context.Context, req structs.ServiceSpecificRequest) (structs.IndexedCheckServiceNodes, cache.ResultMeta, error) {
|
|
||||||
return structs.IndexedCheckServiceNodes{
|
|
||||||
Nodes: []structs.CheckServiceNode{
|
|
||||||
{
|
|
||||||
Node: &structs.Node{
|
|
||||||
Address: "node-address",
|
|
||||||
Node: "node-name",
|
|
||||||
Partition: defaultTestPartition,
|
|
||||||
},
|
|
||||||
Service: &structs.NodeService{
|
|
||||||
Address: "",
|
|
||||||
Service: "service-name",
|
|
||||||
EnterpriseMeta: acl.NewEnterpriseMetaWithPartition(defaultTestPartition, defaultTestNamespace),
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
}, cache.ResultMeta{}, nil
|
|
||||||
},
|
|
||||||
context: Context{
|
|
||||||
Token: "test-token",
|
|
||||||
},
|
|
||||||
expectedResults: []*Result{
|
|
||||||
{
|
|
||||||
Address: "node-address",
|
|
||||||
Target: "node-name",
|
|
||||||
Type: ResultTypeNode,
|
|
||||||
Weight: 1,
|
|
||||||
Tenancy: ResultTenancy{
|
|
||||||
Namespace: defaultTestNamespace,
|
|
||||||
Partition: defaultTestPartition,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedErr: nil,
|
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, tc := range tests {
|
logger := testutil.Logger(t)
|
||||||
t.Run(tc.name, func(t *testing.T) {
|
mockRPC := cachetype.NewMockRPC(t)
|
||||||
logger := testutil.Logger(t)
|
// TODO (v2-dns): mock these properly
|
||||||
mockRPC := cachetype.NewMockRPC(t)
|
translateServicePortFunc := func(dc string, port int, taggedAddresses map[string]structs.ServiceAddress) int { return 0 }
|
||||||
// TODO (v2-dns): mock these properly
|
rpcFuncForSamenessGroup := func(ctx context.Context, req *structs.ConfigEntryQuery) (structs.SamenessGroupConfigEntry, cache.ResultMeta, error) {
|
||||||
translateServicePortFunc := func(dc string, port int, taggedAddresses map[string]structs.ServiceAddress) int { return 0 }
|
return structs.SamenessGroupConfigEntry{}, cache.ResultMeta{}, nil
|
||||||
rpcFuncForSamenessGroup := func(ctx context.Context, req *structs.ConfigEntryQuery) (structs.SamenessGroupConfigEntry, cache.ResultMeta, error) {
|
|
||||||
return structs.SamenessGroupConfigEntry{}, cache.ResultMeta{}, nil
|
|
||||||
}
|
|
||||||
getFromCacheFunc := func(ctx context.Context, t string, r cache.Request) (interface{}, cache.ResultMeta, error) {
|
|
||||||
return nil, cache.ResultMeta{}, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
df := NewV1DataFetcher(rc, acl.DefaultEnterpriseMeta(), getFromCacheFunc, mockRPC.RPC, tc.rpcFuncForServiceNodes, rpcFuncForSamenessGroup, translateServicePortFunc, logger)
|
|
||||||
|
|
||||||
results, err := df.FetchEndpoints(tc.context, tc.queryPayload, LookupTypeService)
|
|
||||||
require.Equal(t, tc.expectedErr, err)
|
|
||||||
require.Equal(t, tc.expectedResults, results)
|
|
||||||
})
|
|
||||||
}
|
}
|
||||||
|
getFromCacheFunc := func(ctx context.Context, t string, r cache.Request) (interface{}, cache.ResultMeta, error) {
|
||||||
|
return nil, cache.ResultMeta{}, nil
|
||||||
|
}
|
||||||
|
rpcFuncForServiceNodes := func(ctx context.Context, req structs.ServiceSpecificRequest) (structs.IndexedCheckServiceNodes, cache.ResultMeta, error) {
|
||||||
|
return structs.IndexedCheckServiceNodes{
|
||||||
|
Nodes: []structs.CheckServiceNode{
|
||||||
|
{
|
||||||
|
Node: &structs.Node{
|
||||||
|
Address: "node-address",
|
||||||
|
Node: "node-name",
|
||||||
|
},
|
||||||
|
Service: &structs.NodeService{
|
||||||
|
Address: "service-address",
|
||||||
|
Service: "service-name",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}, cache.ResultMeta{}, nil
|
||||||
|
}
|
||||||
|
queryPayload := &QueryPayload{
|
||||||
|
Name: "service-name",
|
||||||
|
Tenancy: QueryTenancy{
|
||||||
|
Peer: "test-peer",
|
||||||
|
Namespace: defaultTestNamespace,
|
||||||
|
Partition: defaultTestPartition,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
df := NewV1DataFetcher(rc, acl.DefaultEnterpriseMeta(), getFromCacheFunc, mockRPC.RPC, rpcFuncForServiceNodes, rpcFuncForSamenessGroup, translateServicePortFunc, logger)
|
||||||
|
|
||||||
|
results, err := df.FetchEndpoints(ctx, queryPayload, LookupTypeService)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, expectedResults, results)
|
||||||
}
|
}
|
||||||
|
|
|
@ -124,13 +124,15 @@ func (f *V2DataFetcher) FetchWorkload(reqContext Context, req *QueryPayload) (*R
|
||||||
|
|
||||||
tenancy := response.GetResource().GetId().GetTenancy()
|
tenancy := response.GetResource().GetId().GetTenancy()
|
||||||
result := &Result{
|
result := &Result{
|
||||||
Address: address,
|
Node: &Location{
|
||||||
Type: ResultTypeWorkload,
|
Address: address,
|
||||||
|
Name: response.GetResource().GetId().GetName(),
|
||||||
|
},
|
||||||
|
Type: ResultTypeWorkload,
|
||||||
Tenancy: ResultTenancy{
|
Tenancy: ResultTenancy{
|
||||||
Namespace: tenancy.GetNamespace(),
|
Namespace: tenancy.GetNamespace(),
|
||||||
Partition: tenancy.GetPartition(),
|
Partition: tenancy.GetPartition(),
|
||||||
},
|
},
|
||||||
Target: response.GetResource().GetId().GetName(),
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if req.PortName == "" {
|
if req.PortName == "" {
|
||||||
|
@ -169,7 +171,7 @@ func (f *V2DataFetcher) ValidateRequest(_ Context, req *QueryPayload) error {
|
||||||
if req.Tag != "" {
|
if req.Tag != "" {
|
||||||
return ErrNotSupported
|
return ErrNotSupported
|
||||||
}
|
}
|
||||||
if req.RemoteAddr != nil {
|
if req.SourceIP != nil {
|
||||||
return ErrNotSupported
|
return ErrNotSupported
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
|
|
|
@ -58,13 +58,12 @@ func Test_FetchWorkload(t *testing.T) {
|
||||||
})
|
})
|
||||||
},
|
},
|
||||||
expectedResult: &Result{
|
expectedResult: &Result{
|
||||||
Address: "1.2.3.4",
|
Node: &Location{Name: "foo-1234", Address: "1.2.3.4"},
|
||||||
Type: ResultTypeWorkload,
|
Type: ResultTypeWorkload,
|
||||||
Tenancy: ResultTenancy{
|
Tenancy: ResultTenancy{
|
||||||
Namespace: resource.DefaultNamespaceName,
|
Namespace: resource.DefaultNamespaceName,
|
||||||
Partition: resource.DefaultPartitionName,
|
Partition: resource.DefaultPartitionName,
|
||||||
},
|
},
|
||||||
Target: "foo-1234",
|
|
||||||
},
|
},
|
||||||
expectedErr: nil,
|
expectedErr: nil,
|
||||||
},
|
},
|
||||||
|
@ -130,7 +129,7 @@ func Test_FetchWorkload(t *testing.T) {
|
||||||
})
|
})
|
||||||
},
|
},
|
||||||
expectedResult: &Result{
|
expectedResult: &Result{
|
||||||
Address: "1.2.3.4",
|
Node: &Location{Name: "foo-1234", Address: "1.2.3.4"},
|
||||||
Type: ResultTypeWorkload,
|
Type: ResultTypeWorkload,
|
||||||
PortName: "api",
|
PortName: "api",
|
||||||
PortNumber: 5678,
|
PortNumber: 5678,
|
||||||
|
@ -138,7 +137,6 @@ func Test_FetchWorkload(t *testing.T) {
|
||||||
Namespace: resource.DefaultNamespaceName,
|
Namespace: resource.DefaultNamespaceName,
|
||||||
Partition: resource.DefaultPartitionName,
|
Partition: resource.DefaultPartitionName,
|
||||||
},
|
},
|
||||||
Target: "foo-1234",
|
|
||||||
},
|
},
|
||||||
expectedErr: nil,
|
expectedErr: nil,
|
||||||
},
|
},
|
||||||
|
@ -189,13 +187,12 @@ func Test_FetchWorkload(t *testing.T) {
|
||||||
})
|
})
|
||||||
},
|
},
|
||||||
expectedResult: &Result{
|
expectedResult: &Result{
|
||||||
Address: "1.2.3.4",
|
Node: &Location{Name: "foo-1234", Address: "1.2.3.4"},
|
||||||
Type: ResultTypeWorkload,
|
Type: ResultTypeWorkload,
|
||||||
Tenancy: ResultTenancy{
|
Tenancy: ResultTenancy{
|
||||||
Namespace: "test-namespace",
|
Namespace: "test-namespace",
|
||||||
Partition: "test-partition",
|
Partition: "test-partition",
|
||||||
},
|
},
|
||||||
Target: "foo-1234",
|
|
||||||
},
|
},
|
||||||
expectedErr: nil,
|
expectedErr: nil,
|
||||||
},
|
},
|
||||||
|
|
|
@ -42,6 +42,7 @@ var (
|
||||||
errInvalidQuestion = fmt.Errorf("invalid question")
|
errInvalidQuestion = fmt.Errorf("invalid question")
|
||||||
errNameNotFound = fmt.Errorf("name not found")
|
errNameNotFound = fmt.Errorf("name not found")
|
||||||
errNotImplemented = fmt.Errorf("not implemented")
|
errNotImplemented = fmt.Errorf("not implemented")
|
||||||
|
errQueryNotFound = fmt.Errorf("query not found")
|
||||||
errRecursionFailed = fmt.Errorf("recursion failed")
|
errRecursionFailed = fmt.Errorf("recursion failed")
|
||||||
|
|
||||||
trailingSpacesRE = regexp.MustCompile(" +$")
|
trailingSpacesRE = regexp.MustCompile(" +$")
|
||||||
|
@ -93,7 +94,7 @@ type DiscoveryQueryProcessor interface {
|
||||||
//
|
//
|
||||||
//go:generate mockery --name dnsRecursor --inpackage
|
//go:generate mockery --name dnsRecursor --inpackage
|
||||||
type dnsRecursor interface {
|
type dnsRecursor interface {
|
||||||
handle(req *dns.Msg, cfgCtx *RouterDynamicConfig, remoteAddr net.Addr) (*dns.Msg, error)
|
handle(req *dns.Msg, cfgCtx *RouterDynamicConfig, remoteAddress net.Addr) (*dns.Msg, error)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Router replaces miekg/dns.ServeMux with a simpler router that only checks for the 2-3 valid domains
|
// Router replaces miekg/dns.ServeMux with a simpler router that only checks for the 2-3 valid domains
|
||||||
|
@ -126,12 +127,13 @@ func NewRouter(cfg Config) (*Router, error) {
|
||||||
logger := cfg.Logger.Named(logging.DNS)
|
logger := cfg.Logger.Named(logging.DNS)
|
||||||
|
|
||||||
router := &Router{
|
router := &Router{
|
||||||
processor: cfg.Processor,
|
processor: cfg.Processor,
|
||||||
recursor: newRecursor(logger),
|
recursor: newRecursor(logger),
|
||||||
domain: domain,
|
domain: domain,
|
||||||
altDomain: altDomain,
|
altDomain: altDomain,
|
||||||
logger: logger,
|
datacenter: cfg.AgentConfig.Datacenter,
|
||||||
tokenFunc: cfg.TokenFunc,
|
logger: logger,
|
||||||
|
tokenFunc: cfg.TokenFunc,
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := router.ReloadConfig(cfg.AgentConfig); err != nil {
|
if err := router.ReloadConfig(cfg.AgentConfig); err != nil {
|
||||||
|
@ -160,7 +162,7 @@ func (r *Router) handleRequestRecursively(req *dns.Msg, reqCtx Context,
|
||||||
return createServerFailureResponse(req, configCtx, false)
|
return createServerFailureResponse(req, configCtx, false)
|
||||||
}
|
}
|
||||||
|
|
||||||
responseDomain, needRecurse := r.parseDomain(req)
|
responseDomain, needRecurse := r.parseDomain(req.Question[0].Name)
|
||||||
if needRecurse && !canRecurse(configCtx) {
|
if needRecurse && !canRecurse(configCtx) {
|
||||||
// This is the same error as an unmatched domain
|
// This is the same error as an unmatched domain
|
||||||
return createRefusedResponse(req)
|
return createRefusedResponse(req)
|
||||||
|
@ -187,7 +189,7 @@ func (r *Router) handleRequestRecursively(req *dns.Msg, reqCtx Context,
|
||||||
}
|
}
|
||||||
|
|
||||||
reqType := parseRequestType(req)
|
reqType := parseRequestType(req)
|
||||||
results, query, err := r.getQueryResults(req, reqCtx, reqType, qName)
|
results, query, err := r.getQueryResults(req, reqCtx, reqType, qName, remoteAddress)
|
||||||
switch {
|
switch {
|
||||||
case errors.Is(err, errNameNotFound):
|
case errors.Is(err, errNameNotFound):
|
||||||
r.logger.Error("name not found", "name", qName)
|
r.logger.Error("name not found", "name", qName)
|
||||||
|
@ -272,7 +274,8 @@ func getTTLForResult(name string, query *discovery.Query, cfg *RouterDynamicConf
|
||||||
}
|
}
|
||||||
|
|
||||||
// getQueryResults returns a discovery.Result from a DNS message.
|
// getQueryResults returns a discovery.Result from a DNS message.
|
||||||
func (r *Router) getQueryResults(req *dns.Msg, reqCtx Context, reqType requestType, qName string) ([]*discovery.Result, *discovery.Query, error) {
|
func (r *Router) getQueryResults(req *dns.Msg, reqCtx Context, reqType requestType,
|
||||||
|
qName string, remoteAddress net.Addr) ([]*discovery.Result, *discovery.Query, error) {
|
||||||
switch reqType {
|
switch reqType {
|
||||||
case requestTypeConsul:
|
case requestTypeConsul:
|
||||||
// This is a special case of discovery.QueryByName where we know that we need to query the consul service
|
// This is a special case of discovery.QueryByName where we know that we need to query the consul service
|
||||||
|
@ -295,7 +298,7 @@ func (r *Router) getQueryResults(req *dns.Msg, reqCtx Context, reqType requestTy
|
||||||
results, err := r.processor.QueryByName(query, discovery.Context{Token: reqCtx.Token})
|
results, err := r.processor.QueryByName(query, discovery.Context{Token: reqCtx.Token})
|
||||||
return results, query, err
|
return results, query, err
|
||||||
case requestTypeName:
|
case requestTypeName:
|
||||||
query, err := buildQueryFromDNSMessage(req, reqCtx, r.domain, r.altDomain)
|
query, err := buildQueryFromDNSMessage(req, reqCtx, r.domain, r.altDomain, remoteAddress)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
r.logger.Error("error building discovery query from DNS request", "error", err)
|
r.logger.Error("error building discovery query from DNS request", "error", err)
|
||||||
return nil, query, err
|
return nil, query, err
|
||||||
|
@ -303,6 +306,13 @@ func (r *Router) getQueryResults(req *dns.Msg, reqCtx Context, reqType requestTy
|
||||||
results, err := r.processor.QueryByName(query, discovery.Context{Token: reqCtx.Token})
|
results, err := r.processor.QueryByName(query, discovery.Context{Token: reqCtx.Token})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
r.logger.Error("error processing discovery query", "error", err)
|
r.logger.Error("error processing discovery query", "error", err)
|
||||||
|
switch err.Error() {
|
||||||
|
case errNameNotFound.Error():
|
||||||
|
return nil, query, errNameNotFound
|
||||||
|
case errQueryNotFound.Error():
|
||||||
|
return nil, query, errQueryNotFound
|
||||||
|
}
|
||||||
|
|
||||||
return nil, query, err
|
return nil, query, err
|
||||||
}
|
}
|
||||||
return results, query, nil
|
return results, query, nil
|
||||||
|
@ -376,8 +386,8 @@ const (
|
||||||
// it will return true for needRecurse. The logic is based on miekg/dns.ServeDNS matcher.
|
// it will return true for needRecurse. The logic is based on miekg/dns.ServeDNS matcher.
|
||||||
// The implementation assumes that the only valid domains are "consul." and the alternative domain, and
|
// The implementation assumes that the only valid domains are "consul." and the alternative domain, and
|
||||||
// that DS query types are not supported.
|
// that DS query types are not supported.
|
||||||
func (r *Router) parseDomain(req *dns.Msg) (string, bool) {
|
func (r *Router) parseDomain(questionName string) (string, bool) {
|
||||||
target := dns.CanonicalName(req.Question[0].Name)
|
target := dns.CanonicalName(questionName)
|
||||||
target, _ = stripSuffix(target)
|
target, _ = stripSuffix(target)
|
||||||
|
|
||||||
for offset, overflow := 0, false; !overflow; offset, overflow = dns.NextLabel(target, offset) {
|
for offset, overflow := 0, false; !overflow; offset, overflow = dns.NextLabel(target, offset) {
|
||||||
|
@ -786,8 +796,10 @@ func buildAddressResults(req *dns.Msg) ([]*discovery.Result, error) {
|
||||||
|
|
||||||
return []*discovery.Result{
|
return []*discovery.Result{
|
||||||
{
|
{
|
||||||
Address: ip.String(),
|
Node: &discovery.Location{
|
||||||
Type: discovery.ResultTypeNode, // We choose node by convention since we do not know the origin of the IP
|
Address: ip.String(),
|
||||||
|
},
|
||||||
|
Type: discovery.ResultTypeNode, // We choose node by convention since we do not know the origin of the IP
|
||||||
},
|
},
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
@ -796,8 +808,14 @@ func buildAddressResults(req *dns.Msg) ([]*discovery.Result, error) {
|
||||||
func (r *Router) getAnswerExtraAndNs(result *discovery.Result, req *dns.Msg, reqCtx Context,
|
func (r *Router) getAnswerExtraAndNs(result *discovery.Result, req *dns.Msg, reqCtx Context,
|
||||||
query *discovery.Query, cfg *RouterDynamicConfig, domain string, remoteAddress net.Addr,
|
query *discovery.Query, cfg *RouterDynamicConfig, domain string, remoteAddress net.Addr,
|
||||||
maxRecursionLevel int) (answer []dns.RR, extra []dns.RR, ns []dns.RR) {
|
maxRecursionLevel int) (answer []dns.RR, extra []dns.RR, ns []dns.RR) {
|
||||||
target := newDNSAddress(result.Target)
|
serviceAddress := newDNSAddress("")
|
||||||
address := newDNSAddress(result.Address)
|
if result.Service != nil {
|
||||||
|
serviceAddress = newDNSAddress(result.Service.Address)
|
||||||
|
}
|
||||||
|
nodeAddress := newDNSAddress("")
|
||||||
|
if result.Node != nil {
|
||||||
|
nodeAddress = newDNSAddress(result.Node.Address)
|
||||||
|
}
|
||||||
qName := req.Question[0].Name
|
qName := req.Question[0].Name
|
||||||
ttlLookupName := qName
|
ttlLookupName := qName
|
||||||
if query != nil {
|
if query != nil {
|
||||||
|
@ -812,53 +830,60 @@ func (r *Router) getAnswerExtraAndNs(result *discovery.Result, req *dns.Msg, req
|
||||||
switch {
|
switch {
|
||||||
// PTR requests are first since they are a special case of domain overriding question type
|
// PTR requests are first since they are a special case of domain overriding question type
|
||||||
case parseRequestType(req) == requestTypeIP:
|
case parseRequestType(req) == requestTypeIP:
|
||||||
|
ptrTarget := ""
|
||||||
|
if result.Type == discovery.ResultTypeNode {
|
||||||
|
ptrTarget = result.Node.Name
|
||||||
|
} else if result.Type == discovery.ResultTypeService {
|
||||||
|
ptrTarget = result.Service.Name
|
||||||
|
}
|
||||||
|
|
||||||
ptr := &dns.PTR{
|
ptr := &dns.PTR{
|
||||||
Hdr: dns.RR_Header{Name: qName, Rrtype: dns.TypePTR, Class: dns.ClassINET, Ttl: 0},
|
Hdr: dns.RR_Header{Name: qName, Rrtype: dns.TypePTR, Class: dns.ClassINET, Ttl: 0},
|
||||||
Ptr: canonicalNameForResult(result, domain),
|
Ptr: canonicalNameForResult(result.Type, ptrTarget, domain, result.Tenancy, result.PortName),
|
||||||
}
|
}
|
||||||
answer = append(answer, ptr)
|
answer = append(answer, ptr)
|
||||||
case qType == dns.TypeNS:
|
case qType == dns.TypeNS:
|
||||||
// TODO (v2-dns): fqdn in V1 has the datacenter included, this would need to be added to discovery.Result
|
// TODO (v2-dns): fqdn in V1 has the datacenter included, this would need to be added to discovery.Result
|
||||||
fqdn := canonicalNameForResult(result, domain)
|
fqdn := canonicalNameForResult(result.Type, serviceAddress.String(), domain, result.Tenancy, result.PortName)
|
||||||
extraRecord := makeIPBasedRecord(fqdn, address, ttl) // TODO (v2-dns): this is not sufficient, because recursion and CNAMES are supported
|
extraRecord := makeIPBasedRecord(fqdn, nodeAddress, ttl) // TODO (v2-dns): this is not sufficient, because recursion and CNAMES are supported
|
||||||
|
|
||||||
answer = append(answer, makeNSRecord(domain, fqdn, ttl))
|
answer = append(answer, makeNSRecord(domain, fqdn, ttl))
|
||||||
extra = append(extra, extraRecord)
|
extra = append(extra, extraRecord)
|
||||||
case qType == dns.TypeSOA:
|
case qType == dns.TypeSOA:
|
||||||
// TODO (v2-dns): fqdn in V1 has the datacenter included, this would need to be added to discovery.Result
|
// TODO (v2-dns): fqdn in V1 has the datacenter included, this would need to be added to discovery.Result
|
||||||
// to be returned in the result.
|
// to be returned in the result.
|
||||||
fqdn := canonicalNameForResult(result, domain)
|
fqdn := canonicalNameForResult(result.Type, serviceAddress.String(), domain, result.Tenancy, result.PortName)
|
||||||
extraRecord := makeIPBasedRecord(fqdn, address, ttl) // TODO (v2-dns): this is not sufficient, because recursion and CNAMES are supported
|
extraRecord := makeIPBasedRecord(fqdn, nodeAddress, ttl) // TODO (v2-dns): this is not sufficient, because recursion and CNAMES are supported
|
||||||
|
|
||||||
ns = append(ns, makeNSRecord(domain, fqdn, ttl))
|
ns = append(ns, makeNSRecord(domain, fqdn, ttl))
|
||||||
extra = append(extra, extraRecord)
|
extra = append(extra, extraRecord)
|
||||||
case qType == dns.TypeSRV:
|
case qType == dns.TypeSRV:
|
||||||
// We put A/AAAA/CNAME records in the additional section for SRV requests
|
// We put A/AAAA/CNAME records in the additional section for SRV requests
|
||||||
a, e := r.getAnswerExtrasForAddressAndTarget(address, target, req, reqCtx,
|
a, e := r.getAnswerExtrasForAddressAndTarget(nodeAddress, serviceAddress, req, reqCtx,
|
||||||
result, ttl, remoteAddress, cfg, maxRecursionLevel)
|
result, ttl, remoteAddress, cfg, domain, maxRecursionLevel)
|
||||||
answer = append(answer, a...)
|
answer = append(answer, a...)
|
||||||
extra = append(extra, e...)
|
extra = append(extra, e...)
|
||||||
|
|
||||||
if cfg.NodeMetaTXT {
|
if cfg.NodeMetaTXT {
|
||||||
name := target.FQDN()
|
name := serviceAddress.FQDN()
|
||||||
if !target.IsInternalFQDN(r.domain) && !target.IsExternalFQDN(r.domain) {
|
if !serviceAddress.IsInternalFQDN(r.domain) && !serviceAddress.IsExternalFQDN(r.domain) {
|
||||||
name = canonicalNameForResult(result, r.domain)
|
name = canonicalNameForResult(discovery.ResultTypeNode, result.Node.Name, domain, result.Tenancy, result.PortName)
|
||||||
}
|
}
|
||||||
extra = append(extra, makeTXTRecord(name, result, ttl)...)
|
extra = append(extra, makeTXTRecord(name, result, ttl)...)
|
||||||
}
|
}
|
||||||
default:
|
default:
|
||||||
a, e := r.getAnswerExtrasForAddressAndTarget(address, target, req, reqCtx,
|
a, e := r.getAnswerExtrasForAddressAndTarget(nodeAddress, serviceAddress, req, reqCtx,
|
||||||
result, ttl, remoteAddress, cfg, maxRecursionLevel)
|
result, ttl, remoteAddress, cfg, domain, maxRecursionLevel)
|
||||||
answer = append(answer, a...)
|
answer = append(answer, a...)
|
||||||
extra = append(extra, e...)
|
extra = append(extra, e...)
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// getAnswerExtrasForAddressAndTarget creates the dns answer and extra from address and target dnsAddress pairs.
|
// getAnswerExtrasForAddressAndTarget creates the dns answer and extra from nodeAddress and serviceAddress dnsAddress pairs.
|
||||||
func (r *Router) getAnswerExtrasForAddressAndTarget(address *dnsAddress, target *dnsAddress, req *dns.Msg,
|
func (r *Router) getAnswerExtrasForAddressAndTarget(nodeAddress *dnsAddress, serviceAddress *dnsAddress, req *dns.Msg,
|
||||||
reqCtx Context, result *discovery.Result, ttl uint32, remoteAddress net.Addr,
|
reqCtx Context, result *discovery.Result, ttl uint32, remoteAddress net.Addr,
|
||||||
cfg *RouterDynamicConfig, maxRecursionLevel int) (answer []dns.RR, extra []dns.RR) {
|
cfg *RouterDynamicConfig, domain string, maxRecursionLevel int) (answer []dns.RR, extra []dns.RR) {
|
||||||
qName := req.Question[0].Name
|
qName := req.Question[0].Name
|
||||||
reqType := parseRequestType(req)
|
reqType := parseRequestType(req)
|
||||||
|
|
||||||
|
@ -866,64 +891,82 @@ func (r *Router) getAnswerExtrasForAddressAndTarget(address *dnsAddress, target
|
||||||
// Virtual IPs and Address requests
|
// Virtual IPs and Address requests
|
||||||
// both return IPs with empty targets
|
// both return IPs with empty targets
|
||||||
case (reqType == requestTypeAddress || result.Type == discovery.ResultTypeVirtual) &&
|
case (reqType == requestTypeAddress || result.Type == discovery.ResultTypeVirtual) &&
|
||||||
target.IsEmptyString() && address.IsIP():
|
serviceAddress.IsEmptyString() && nodeAddress.IsIP():
|
||||||
a, e := getAnswerExtrasForIP(qName, address, req.Question[0], reqType,
|
a, e := getAnswerExtrasForIP(qName, nodeAddress, req.Question[0], reqType,
|
||||||
result, ttl)
|
result, ttl, domain)
|
||||||
answer = append(a, answer...)
|
|
||||||
extra = append(e, extra...)
|
|
||||||
|
|
||||||
// Address is a FQDN and requires a CNAME lookup.
|
|
||||||
case address.IsFQDN():
|
|
||||||
a, e := r.makeRecordFromFQDN(address.FQDN(), result, req, reqCtx,
|
|
||||||
cfg, ttl, remoteAddress, maxRecursionLevel)
|
|
||||||
answer = append(a, answer...)
|
|
||||||
extra = append(e, extra...)
|
|
||||||
|
|
||||||
// Target is FQDN that point to IP
|
|
||||||
case target.IsFQDN() && address.IsIP():
|
|
||||||
var a, e []dns.RR
|
|
||||||
if result.Type == discovery.ResultTypeNode || result.Type == discovery.ResultTypeWorkload {
|
|
||||||
// if it is a node record it means the service address pointed to a node
|
|
||||||
// and the node address was used. So we create an A record for the node address,
|
|
||||||
// as well as a CNAME for the service to node mapping.
|
|
||||||
name := target.FQDN()
|
|
||||||
if !target.IsInternalFQDN(r.domain) && !target.IsExternalFQDN(r.domain) {
|
|
||||||
name = canonicalNameForResult(result, r.domain)
|
|
||||||
} else if target.IsInternalFQDN(r.domain) {
|
|
||||||
answer = append(answer, makeCNAMERecord(qName, canonicalNameForResult(result, r.domain), ttl))
|
|
||||||
}
|
|
||||||
a, e = getAnswerExtrasForIP(name, address, req.Question[0], reqType,
|
|
||||||
result, ttl)
|
|
||||||
} else {
|
|
||||||
// if it is a service record, it means that the service address had the IP directly
|
|
||||||
// and there was not a need for an intermediate CNAME.
|
|
||||||
a, e = getAnswerExtrasForIP(qName, address, req.Question[0], reqType,
|
|
||||||
result, ttl)
|
|
||||||
}
|
|
||||||
answer = append(answer, a...)
|
answer = append(answer, a...)
|
||||||
extra = append(extra, e...)
|
extra = append(extra, e...)
|
||||||
|
|
||||||
// The target is a FQDN (internal or external service name)
|
case result.Type == discovery.ResultTypeNode:
|
||||||
default:
|
canonicalNodeName := canonicalNameForResult(result.Type, result.Node.Name, domain, result.Tenancy, result.PortName)
|
||||||
a, e := r.makeRecordFromFQDN(target.FQDN(), result, req, reqCtx, cfg,
|
a, e := getAnswerExtrasForIP(canonicalNodeName, nodeAddress, req.Question[0], reqType,
|
||||||
|
result, ttl, domain)
|
||||||
|
answer = append(answer, a...)
|
||||||
|
extra = append(extra, e...)
|
||||||
|
|
||||||
|
case serviceAddress.IsEmptyString() && nodeAddress.IsEmptyString():
|
||||||
|
return nil, nil
|
||||||
|
|
||||||
|
// There is no service address and the node address is an IP
|
||||||
|
case serviceAddress.IsEmptyString() && nodeAddress.IsIP():
|
||||||
|
canonicalNodeName := canonicalNameForResult(discovery.ResultTypeNode, result.Node.Name, domain, result.Tenancy, result.PortName)
|
||||||
|
a, e := getAnswerExtrasForIP(canonicalNodeName, nodeAddress, req.Question[0], reqType,
|
||||||
|
result, ttl, domain)
|
||||||
|
answer = append(answer, a...)
|
||||||
|
extra = append(extra, e...)
|
||||||
|
|
||||||
|
// There is no service address and the node address is a FQDN (external service)
|
||||||
|
case serviceAddress.IsEmptyString():
|
||||||
|
a, e := r.makeRecordFromFQDN(nodeAddress.FQDN(), result, req, reqCtx, cfg,
|
||||||
ttl, remoteAddress, maxRecursionLevel)
|
ttl, remoteAddress, maxRecursionLevel)
|
||||||
answer = append(a, answer...)
|
answer = append(answer, a...)
|
||||||
extra = append(e, extra...)
|
extra = append(extra, e...)
|
||||||
|
|
||||||
|
// The service address is an IP
|
||||||
|
case serviceAddress.IsIP():
|
||||||
|
canonicalServiceName := canonicalNameForResult(discovery.ResultTypeService, result.Service.Name, domain, result.Tenancy, result.PortName)
|
||||||
|
a, e := getAnswerExtrasForIP(canonicalServiceName, serviceAddress, req.Question[0], reqType,
|
||||||
|
result, ttl, domain)
|
||||||
|
answer = append(answer, a...)
|
||||||
|
extra = append(extra, e...)
|
||||||
|
|
||||||
|
// If the service address is a CNAME for the service we are looking
|
||||||
|
// for then use the node address.
|
||||||
|
case serviceAddress.FQDN() == req.Question[0].Name && nodeAddress.IsIP():
|
||||||
|
canonicalNodeName := canonicalNameForResult(discovery.ResultTypeNode, result.Node.Name, domain, result.Tenancy, result.PortName)
|
||||||
|
a, e := getAnswerExtrasForIP(canonicalNodeName, nodeAddress, req.Question[0], reqType,
|
||||||
|
result, ttl, domain)
|
||||||
|
answer = append(answer, a...)
|
||||||
|
extra = append(extra, e...)
|
||||||
|
|
||||||
|
// The service address is a FQDN (internal or external service name)
|
||||||
|
default:
|
||||||
|
a, e := r.makeRecordFromFQDN(serviceAddress.FQDN(), result, req, reqCtx, cfg,
|
||||||
|
ttl, remoteAddress, maxRecursionLevel)
|
||||||
|
answer = append(answer, a...)
|
||||||
|
extra = append(extra, e...)
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// getAnswerExtrasForIP creates the dns answer and extra from IP dnsAddress pairs.
|
// getAnswerExtrasForIP creates the dns answer and extra from IP dnsAddress pairs.
|
||||||
func getAnswerExtrasForIP(name string, addr *dnsAddress, question dns.Question,
|
func getAnswerExtrasForIP(name string, addr *dnsAddress, question dns.Question,
|
||||||
reqType requestType, result *discovery.Result, ttl uint32) (answer []dns.RR, extra []dns.RR) {
|
reqType requestType, result *discovery.Result, ttl uint32, _ string) (answer []dns.RR, extra []dns.RR) {
|
||||||
qType := question.Qtype
|
qType := question.Qtype
|
||||||
|
|
||||||
// Have to pass original question name here even if the system has recursed
|
// Have to pass original question name here even if the system has recursed
|
||||||
// and stripped off the domain suffix.
|
// and stripped off the domain suffix.
|
||||||
recHdrName := question.Name
|
recHdrName := question.Name
|
||||||
if qType == dns.TypeSRV {
|
if qType == dns.TypeSRV {
|
||||||
recHdrName = name
|
nameSplit := strings.Split(name, ".")
|
||||||
|
if len(nameSplit) > 1 && nameSplit[1] == addrLabel {
|
||||||
|
recHdrName = name
|
||||||
|
} else {
|
||||||
|
recHdrName = name
|
||||||
|
}
|
||||||
|
name = question.Name
|
||||||
}
|
}
|
||||||
|
|
||||||
record := makeIPBasedRecord(recHdrName, addr, ttl)
|
record := makeIPBasedRecord(recHdrName, addr, ttl)
|
||||||
|
|
||||||
isARecordWhenNotExplicitlyQueried := record.Header().Rrtype == dns.TypeA && qType != dns.TypeA && qType != dns.TypeANY
|
isARecordWhenNotExplicitlyQueried := record.Header().Rrtype == dns.TypeA && qType != dns.TypeA && qType != dns.TypeANY
|
||||||
|
@ -938,12 +981,28 @@ func getAnswerExtrasForIP(name string, addr *dnsAddress, question dns.Question,
|
||||||
}
|
}
|
||||||
|
|
||||||
if reqType != requestTypeAddress && qType == dns.TypeSRV {
|
if reqType != requestTypeAddress && qType == dns.TypeSRV {
|
||||||
srv := makeSRVRecord(name, name, result, ttl)
|
srv := makeSRVRecord(name, recHdrName, result, ttl)
|
||||||
answer = append(answer, srv)
|
answer = append(answer, srv)
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// encodeIPAsFqdn encodes an IP address as a FQDN.
|
||||||
|
func encodeIPAsFqdn(result *discovery.Result, ip net.IP, responseDomain string) string {
|
||||||
|
ipv4 := ip.To4()
|
||||||
|
ipStr := hex.EncodeToString(ip)
|
||||||
|
if ipv4 != nil {
|
||||||
|
ipStr = ipStr[len(ipStr)-(net.IPv4len*2):]
|
||||||
|
}
|
||||||
|
if result.Tenancy.PeerName != "" {
|
||||||
|
// Exclude the datacenter from the FQDN on the addr for peers.
|
||||||
|
// This technically makes no difference, since the addr endpoint ignores the DC
|
||||||
|
// component of the request, but do it anyway for a less confusing experience.
|
||||||
|
return fmt.Sprintf("%s.addr.%s", ipStr, responseDomain)
|
||||||
|
}
|
||||||
|
return fmt.Sprintf("%s.addr.%s.%s", ipStr, result.Tenancy.Datacenter, responseDomain)
|
||||||
|
}
|
||||||
|
|
||||||
func makeSOARecord(domain string, cfg *RouterDynamicConfig) dns.RR {
|
func makeSOARecord(domain string, cfg *RouterDynamicConfig) dns.RR {
|
||||||
return &dns.SOA{
|
return &dns.SOA{
|
||||||
Hdr: dns.RR_Header{
|
Hdr: dns.RR_Header{
|
||||||
|
@ -1035,8 +1094,15 @@ MORE_REC:
|
||||||
return answers, additional
|
return answers, additional
|
||||||
}
|
}
|
||||||
|
|
||||||
|
address := ""
|
||||||
|
if result.Service != nil && result.Service.Address != "" {
|
||||||
|
address = result.Service.Address
|
||||||
|
} else if result.Node != nil {
|
||||||
|
address = result.Node.Address
|
||||||
|
}
|
||||||
|
|
||||||
answers := []dns.RR{
|
answers := []dns.RR{
|
||||||
makeCNAMERecord(q.Name, result.Target, ttl),
|
makeCNAMERecord(q.Name, address, ttl),
|
||||||
}
|
}
|
||||||
answers = append(answers, additional...)
|
answers = append(answers, additional...)
|
||||||
|
|
||||||
|
|
|
@ -12,26 +12,27 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
// canonicalNameForResult returns the canonical name for a discovery result.
|
// canonicalNameForResult returns the canonical name for a discovery result.
|
||||||
func canonicalNameForResult(result *discovery.Result, domain string) string {
|
func canonicalNameForResult(resultType discovery.ResultType, target, domain string,
|
||||||
switch result.Type {
|
tenancy discovery.ResultTenancy, portName string) string {
|
||||||
|
switch resultType {
|
||||||
case discovery.ResultTypeService:
|
case discovery.ResultTypeService:
|
||||||
return fmt.Sprintf("%s.%s.%s.%s", result.Target, "service", result.Tenancy.Datacenter, domain)
|
return fmt.Sprintf("%s.%s.%s.%s", target, "service", tenancy.Datacenter, domain)
|
||||||
case discovery.ResultTypeNode:
|
case discovery.ResultTypeNode:
|
||||||
if result.Tenancy.PeerName != "" {
|
if tenancy.PeerName != "" {
|
||||||
// We must return a more-specific DNS name for peering so
|
// We must return a more-specific DNS name for peering so
|
||||||
// that there is no ambiguity with lookups.
|
// that there is no ambiguity with lookups.
|
||||||
return fmt.Sprintf("%s.node.%s.peer.%s",
|
return fmt.Sprintf("%s.node.%s.peer.%s",
|
||||||
result.Target,
|
target,
|
||||||
result.Tenancy.PeerName,
|
tenancy.PeerName,
|
||||||
domain)
|
domain)
|
||||||
}
|
}
|
||||||
// Return a simpler format for non-peering nodes.
|
// Return a simpler format for non-peering nodes.
|
||||||
return fmt.Sprintf("%s.node.%s.%s", result.Target, result.Tenancy.Datacenter, domain)
|
return fmt.Sprintf("%s.node.%s.%s", target, tenancy.Datacenter, domain)
|
||||||
case discovery.ResultTypeWorkload:
|
case discovery.ResultTypeWorkload:
|
||||||
if result.PortName != "" {
|
if portName != "" {
|
||||||
return fmt.Sprintf("%s.port.%s.workload.%s", result.PortName, result.Target, domain)
|
return fmt.Sprintf("%s.port.%s.workload.%s", portName, target, domain)
|
||||||
}
|
}
|
||||||
return fmt.Sprintf("%s.workload.%s", result.Target, domain)
|
return fmt.Sprintf("%s.workload.%s", target, domain)
|
||||||
}
|
}
|
||||||
return ""
|
return ""
|
||||||
}
|
}
|
||||||
|
|
|
@ -37,9 +37,9 @@ func getAdditionalTestCases(t *testing.T) []HandleTestCase {
|
||||||
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
||||||
results := []*discovery.Result{
|
results := []*discovery.Result{
|
||||||
{
|
{
|
||||||
Address: "1.2.3.4",
|
Node: &discovery.Location{Name: "foonode", Address: "1.2.3.4"},
|
||||||
Type: discovery.ResultTypeNode,
|
Type: discovery.ResultTypeNode,
|
||||||
Target: "foo",
|
Service: &discovery.Location{Name: "foo", Address: "foo"},
|
||||||
Tenancy: discovery.ResultTenancy{
|
Tenancy: discovery.ResultTenancy{
|
||||||
Datacenter: "dc2",
|
Datacenter: "dc2",
|
||||||
PeerName: "peer1",
|
PeerName: "peer1",
|
||||||
|
@ -100,9 +100,9 @@ func getAdditionalTestCases(t *testing.T) []HandleTestCase {
|
||||||
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
||||||
results := []*discovery.Result{
|
results := []*discovery.Result{
|
||||||
{
|
{
|
||||||
Address: "1.2.3.4",
|
Node: &discovery.Location{Name: "foonode", Address: "1.2.3.4"},
|
||||||
|
Service: &discovery.Location{Name: "foo", Address: "foo"},
|
||||||
Type: discovery.ResultTypeService,
|
Type: discovery.ResultTypeService,
|
||||||
Target: "foo",
|
|
||||||
Tenancy: discovery.ResultTenancy{
|
Tenancy: discovery.ResultTenancy{
|
||||||
Datacenter: "dc2",
|
Datacenter: "dc2",
|
||||||
},
|
},
|
||||||
|
|
|
@ -4,6 +4,7 @@
|
||||||
package dns
|
package dns
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"net"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/miekg/dns"
|
"github.com/miekg/dns"
|
||||||
|
@ -12,7 +13,8 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
// buildQueryFromDNSMessage returns a discovery.Query from a DNS message.
|
// buildQueryFromDNSMessage returns a discovery.Query from a DNS message.
|
||||||
func buildQueryFromDNSMessage(req *dns.Msg, reqCtx Context, domain, altDomain string) (*discovery.Query, error) {
|
func buildQueryFromDNSMessage(req *dns.Msg, reqCtx Context, domain, altDomain string,
|
||||||
|
remoteAddress net.Addr) (*discovery.Query, error) {
|
||||||
queryType, queryParts, querySuffixes := getQueryTypePartsAndSuffixesFromDNSMessage(req, domain, altDomain)
|
queryType, queryParts, querySuffixes := getQueryTypePartsAndSuffixesFromDNSMessage(req, domain, altDomain)
|
||||||
|
|
||||||
queryTenancy, err := getQueryTenancy(reqCtx, queryType, querySuffixes)
|
queryTenancy, err := getQueryTenancy(reqCtx, queryType, querySuffixes)
|
||||||
|
@ -36,7 +38,7 @@ func buildQueryFromDNSMessage(req *dns.Msg, reqCtx Context, domain, altDomain st
|
||||||
Tenancy: queryTenancy,
|
Tenancy: queryTenancy,
|
||||||
Tag: tag,
|
Tag: tag,
|
||||||
PortName: portName,
|
PortName: portName,
|
||||||
//RemoteAddr: nil, // TODO (v2-dns): Prepared Queries for V1 Catalog
|
SourceIP: getSourceIP(req, queryType, remoteAddress),
|
||||||
},
|
},
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
@ -177,3 +179,24 @@ func getQueryTypeFromLabels(label string) discovery.QueryType {
|
||||||
return discovery.QueryTypeInvalid
|
return discovery.QueryTypeInvalid
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// getSourceIP returns the source IP from the dns request.
|
||||||
|
func getSourceIP(req *dns.Msg, queryType discovery.QueryType, remoteAddr net.Addr) (sourceIP net.IP) {
|
||||||
|
if queryType == discovery.QueryTypePreparedQuery {
|
||||||
|
subnet := ednsSubnetForRequest(req)
|
||||||
|
|
||||||
|
if subnet != nil {
|
||||||
|
sourceIP = subnet.Address
|
||||||
|
} else {
|
||||||
|
switch v := remoteAddr.(type) {
|
||||||
|
case *net.UDPAddr:
|
||||||
|
sourceIP = v.IP
|
||||||
|
case *net.TCPAddr:
|
||||||
|
sourceIP = v.IP
|
||||||
|
case *net.IPAddr:
|
||||||
|
sourceIP = v.IP
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return sourceIP
|
||||||
|
}
|
||||||
|
|
|
@ -206,7 +206,7 @@ func Test_buildQueryFromDNSMessage(t *testing.T) {
|
||||||
if context == nil {
|
if context == nil {
|
||||||
context = &Context{}
|
context = &Context{}
|
||||||
}
|
}
|
||||||
query, err := buildQueryFromDNSMessage(tc.request, *context, "consul.", ".")
|
query, err := buildQueryFromDNSMessage(tc.request, *context, "consul.", ".", nil)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
assert.Equal(t, tc.expectedQuery, query)
|
assert.Equal(t, tc.expectedQuery, query)
|
||||||
})
|
})
|
||||||
|
|
|
@ -21,8 +21,6 @@ import (
|
||||||
"github.com/hashicorp/consul/agent/structs"
|
"github.com/hashicorp/consul/agent/structs"
|
||||||
)
|
)
|
||||||
|
|
||||||
// TODO (v2-dns)
|
|
||||||
|
|
||||||
// TBD Test Cases
|
// TBD Test Cases
|
||||||
// 1. Reload the configuration (e.g. SOA)
|
// 1. Reload the configuration (e.g. SOA)
|
||||||
// 2. Something to check the token makes it through to the data fetcher
|
// 2. Something to check the token makes it through to the data fetcher
|
||||||
|
@ -717,8 +715,8 @@ func Test_HandleRequest(t *testing.T) {
|
||||||
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
||||||
fetcher.(*discovery.MockCatalogDataFetcher).On("FetchVirtualIP",
|
fetcher.(*discovery.MockCatalogDataFetcher).On("FetchVirtualIP",
|
||||||
mock.Anything, mock.Anything).Return(&discovery.Result{
|
mock.Anything, mock.Anything).Return(&discovery.Result{
|
||||||
Address: "240.0.0.2",
|
Node: &discovery.Location{Address: "240.0.0.2"},
|
||||||
Type: discovery.ResultTypeVirtual,
|
Type: discovery.ResultTypeVirtual,
|
||||||
}, nil)
|
}, nil)
|
||||||
},
|
},
|
||||||
validateAndNormalizeExpected: true,
|
validateAndNormalizeExpected: true,
|
||||||
|
@ -767,8 +765,8 @@ func Test_HandleRequest(t *testing.T) {
|
||||||
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
||||||
fetcher.(*discovery.MockCatalogDataFetcher).On("FetchVirtualIP",
|
fetcher.(*discovery.MockCatalogDataFetcher).On("FetchVirtualIP",
|
||||||
mock.Anything, mock.Anything).Return(&discovery.Result{
|
mock.Anything, mock.Anything).Return(&discovery.Result{
|
||||||
Address: "2001:db8:1:2:cafe::1337",
|
Node: &discovery.Location{Address: "2001:db8:1:2:cafe::1337"},
|
||||||
Type: discovery.ResultTypeVirtual,
|
Type: discovery.ResultTypeVirtual,
|
||||||
}, nil)
|
}, nil)
|
||||||
},
|
},
|
||||||
validateAndNormalizeExpected: true,
|
validateAndNormalizeExpected: true,
|
||||||
|
@ -819,14 +817,14 @@ func Test_HandleRequest(t *testing.T) {
|
||||||
On("FetchEndpoints", mock.Anything, mock.Anything, mock.Anything).
|
On("FetchEndpoints", mock.Anything, mock.Anything, mock.Anything).
|
||||||
Return([]*discovery.Result{
|
Return([]*discovery.Result{
|
||||||
{
|
{
|
||||||
Address: "1.2.3.4",
|
Node: &discovery.Location{Name: "server-one", Address: "1.2.3.4"},
|
||||||
|
Service: &discovery.Location{Name: "service-one", Address: "server-one"},
|
||||||
Type: discovery.ResultTypeWorkload,
|
Type: discovery.ResultTypeWorkload,
|
||||||
Target: "server-one", // This would correlate to the workload name
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Address: "4.5.6.7",
|
Node: &discovery.Location{Name: "server-two", Address: "4.5.6.7"},
|
||||||
|
Service: &discovery.Location{Name: "service-one", Address: "server-two"},
|
||||||
Type: discovery.ResultTypeWorkload,
|
Type: discovery.ResultTypeWorkload,
|
||||||
Target: "server-two", // This would correlate to the workload name
|
|
||||||
},
|
},
|
||||||
}, nil).
|
}, nil).
|
||||||
Run(func(args mock.Arguments) {
|
Run(func(args mock.Arguments) {
|
||||||
|
@ -941,14 +939,14 @@ func Test_HandleRequest(t *testing.T) {
|
||||||
On("FetchEndpoints", mock.Anything, mock.Anything, mock.Anything).
|
On("FetchEndpoints", mock.Anything, mock.Anything, mock.Anything).
|
||||||
Return([]*discovery.Result{
|
Return([]*discovery.Result{
|
||||||
{
|
{
|
||||||
Address: "1.2.3.4",
|
Node: &discovery.Location{Name: "server-one", Address: "1.2.3.4"},
|
||||||
|
Service: &discovery.Location{Name: "service-one", Address: "server-one"},
|
||||||
Type: discovery.ResultTypeWorkload,
|
Type: discovery.ResultTypeWorkload,
|
||||||
Target: "server-one", // This would correlate to the workload name
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Address: "4.5.6.7",
|
Node: &discovery.Location{Name: "server-two", Address: "4.5.6.7"},
|
||||||
|
Service: &discovery.Location{Name: "service-two", Address: "server-two"},
|
||||||
Type: discovery.ResultTypeWorkload,
|
Type: discovery.ResultTypeWorkload,
|
||||||
Target: "server-two", // This would correlate to the workload name
|
|
||||||
},
|
},
|
||||||
}, nil).
|
}, nil).
|
||||||
Run(func(args mock.Arguments) {
|
Run(func(args mock.Arguments) {
|
||||||
|
@ -1051,9 +1049,9 @@ func Test_HandleRequest(t *testing.T) {
|
||||||
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
||||||
results := []*discovery.Result{
|
results := []*discovery.Result{
|
||||||
{
|
{
|
||||||
Address: "1.2.3.4",
|
Node: &discovery.Location{Name: "foo", Address: "1.2.3.4"},
|
||||||
|
Service: &discovery.Location{Name: "bar", Address: "foo"},
|
||||||
Type: discovery.ResultTypeNode,
|
Type: discovery.ResultTypeNode,
|
||||||
Target: "foo",
|
|
||||||
Tenancy: discovery.ResultTenancy{
|
Tenancy: discovery.ResultTenancy{
|
||||||
Datacenter: "dc2",
|
Datacenter: "dc2",
|
||||||
},
|
},
|
||||||
|
@ -1113,9 +1111,9 @@ func Test_HandleRequest(t *testing.T) {
|
||||||
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
||||||
results := []*discovery.Result{
|
results := []*discovery.Result{
|
||||||
{
|
{
|
||||||
Address: "2001:db8::567:89ab",
|
Node: &discovery.Location{Name: "foo", Address: "2001:db8::567:89ab"},
|
||||||
|
Service: &discovery.Location{Name: "web", Address: "foo"},
|
||||||
Type: discovery.ResultTypeNode,
|
Type: discovery.ResultTypeNode,
|
||||||
Target: "foo",
|
|
||||||
Tenancy: discovery.ResultTenancy{
|
Tenancy: discovery.ResultTenancy{
|
||||||
Datacenter: "dc2",
|
Datacenter: "dc2",
|
||||||
},
|
},
|
||||||
|
@ -1315,6 +1313,85 @@ func Test_HandleRequest(t *testing.T) {
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
// TestDNS_ExternalServiceToConsulCNAMELookup
|
||||||
|
name: "req type: service / question type: SRV / CNAME required: no",
|
||||||
|
request: &dns.Msg{
|
||||||
|
MsgHdr: dns.MsgHdr{
|
||||||
|
Opcode: dns.OpcodeQuery,
|
||||||
|
},
|
||||||
|
Question: []dns.Question{
|
||||||
|
{
|
||||||
|
Name: "alias.service.consul.",
|
||||||
|
Qtype: dns.TypeSRV,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
||||||
|
fetcher.(*discovery.MockCatalogDataFetcher).
|
||||||
|
On("FetchEndpoints", mock.Anything,
|
||||||
|
&discovery.QueryPayload{
|
||||||
|
Name: "alias",
|
||||||
|
Tenancy: discovery.QueryTenancy{},
|
||||||
|
}, discovery.LookupTypeService).
|
||||||
|
Return([]*discovery.Result{
|
||||||
|
{
|
||||||
|
Type: discovery.ResultTypeVirtual,
|
||||||
|
Service: &discovery.Location{Name: "alias", Address: "web.service.consul"},
|
||||||
|
Node: &discovery.Location{Name: "web", Address: "web.service.consul"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
nil).On("FetchEndpoints", mock.Anything,
|
||||||
|
&discovery.QueryPayload{
|
||||||
|
Name: "web",
|
||||||
|
Tenancy: discovery.QueryTenancy{},
|
||||||
|
}, discovery.LookupTypeService).
|
||||||
|
Return([]*discovery.Result{
|
||||||
|
{
|
||||||
|
Type: discovery.ResultTypeNode,
|
||||||
|
Service: &discovery.Location{Name: "web", Address: "webnode"},
|
||||||
|
Node: &discovery.Location{Name: "webnode", Address: "127.0.0.2"},
|
||||||
|
},
|
||||||
|
}, nil).On("ValidateRequest", mock.Anything,
|
||||||
|
mock.Anything).Return(nil).On("NormalizeRequest", mock.Anything)
|
||||||
|
},
|
||||||
|
response: &dns.Msg{
|
||||||
|
MsgHdr: dns.MsgHdr{
|
||||||
|
Response: true,
|
||||||
|
Authoritative: true,
|
||||||
|
},
|
||||||
|
Compress: true,
|
||||||
|
Question: []dns.Question{
|
||||||
|
{
|
||||||
|
Name: "alias.service.consul.",
|
||||||
|
Qtype: dns.TypeSRV,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Answer: []dns.RR{
|
||||||
|
&dns.SRV{
|
||||||
|
Hdr: dns.RR_Header{
|
||||||
|
Name: "alias.service.consul.",
|
||||||
|
Rrtype: dns.TypeSRV,
|
||||||
|
Class: dns.ClassINET,
|
||||||
|
Ttl: 123,
|
||||||
|
},
|
||||||
|
Target: "web.service.consul.",
|
||||||
|
Priority: 1,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Extra: []dns.RR{
|
||||||
|
&dns.A{
|
||||||
|
Hdr: dns.RR_Header{
|
||||||
|
Name: "web.service.consul.",
|
||||||
|
Rrtype: dns.TypeA,
|
||||||
|
Class: dns.ClassINET,
|
||||||
|
Ttl: 123,
|
||||||
|
},
|
||||||
|
A: net.ParseIP("127.0.0.2"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
// TODO (v2-dns): add a test to make sure only 3 records are returned
|
// TODO (v2-dns): add a test to make sure only 3 records are returned
|
||||||
// V2 Workload Lookup
|
// V2 Workload Lookup
|
||||||
{
|
{
|
||||||
|
@ -1333,12 +1410,12 @@ func Test_HandleRequest(t *testing.T) {
|
||||||
},
|
},
|
||||||
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
||||||
result := &discovery.Result{
|
result := &discovery.Result{
|
||||||
Address: "1.2.3.4",
|
Node: &discovery.Location{Address: "1.2.3.4"},
|
||||||
Type: discovery.ResultTypeWorkload,
|
Type: discovery.ResultTypeWorkload,
|
||||||
Tenancy: discovery.ResultTenancy{},
|
Tenancy: discovery.ResultTenancy{},
|
||||||
PortName: "api",
|
PortName: "api",
|
||||||
PortNumber: 5678,
|
PortNumber: 5678,
|
||||||
Target: "foo",
|
Service: &discovery.Location{Name: "foo"},
|
||||||
}
|
}
|
||||||
|
|
||||||
fetcher.(*discovery.MockCatalogDataFetcher).
|
fetcher.(*discovery.MockCatalogDataFetcher).
|
||||||
|
@ -1394,10 +1471,10 @@ func Test_HandleRequest(t *testing.T) {
|
||||||
},
|
},
|
||||||
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
||||||
result := &discovery.Result{
|
result := &discovery.Result{
|
||||||
Address: "1.2.3.4",
|
Node: &discovery.Location{Address: "1.2.3.4"},
|
||||||
Type: discovery.ResultTypeWorkload,
|
Type: discovery.ResultTypeWorkload,
|
||||||
Tenancy: discovery.ResultTenancy{},
|
Tenancy: discovery.ResultTenancy{},
|
||||||
Target: "foo",
|
Service: &discovery.Location{Name: "foo"},
|
||||||
}
|
}
|
||||||
|
|
||||||
fetcher.(*discovery.MockCatalogDataFetcher).
|
fetcher.(*discovery.MockCatalogDataFetcher).
|
||||||
|
@ -1453,14 +1530,14 @@ func Test_HandleRequest(t *testing.T) {
|
||||||
},
|
},
|
||||||
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
configureDataFetcher: func(fetcher discovery.CatalogDataFetcher) {
|
||||||
result := &discovery.Result{
|
result := &discovery.Result{
|
||||||
Address: "1.2.3.4",
|
Node: &discovery.Location{Address: "1.2.3.4"},
|
||||||
Type: discovery.ResultTypeWorkload,
|
Type: discovery.ResultTypeWorkload,
|
||||||
Tenancy: discovery.ResultTenancy{
|
Tenancy: discovery.ResultTenancy{
|
||||||
Namespace: "bar",
|
Namespace: "bar",
|
||||||
Partition: "baz",
|
Partition: "baz",
|
||||||
Datacenter: "dc3",
|
Datacenter: "dc3",
|
||||||
},
|
},
|
||||||
Target: "foo",
|
Service: &discovery.Location{Name: "foo"},
|
||||||
}
|
}
|
||||||
|
|
||||||
fetcher.(*discovery.MockCatalogDataFetcher).
|
fetcher.(*discovery.MockCatalogDataFetcher).
|
||||||
|
|
|
@ -6,6 +6,7 @@ package agent
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"net"
|
||||||
"sort"
|
"sort"
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
@ -20,7 +21,6 @@ import (
|
||||||
"github.com/hashicorp/consul/testrpc"
|
"github.com/hashicorp/consul/testrpc"
|
||||||
)
|
)
|
||||||
|
|
||||||
// TODO (v2-dns): requires PTR implementation
|
|
||||||
func TestDNS_ServiceReverseLookup(t *testing.T) {
|
func TestDNS_ServiceReverseLookup(t *testing.T) {
|
||||||
if testing.Short() {
|
if testing.Short() {
|
||||||
t.Skip("too slow for testing.Short")
|
t.Skip("too slow for testing.Short")
|
||||||
|
@ -77,7 +77,6 @@ func TestDNS_ServiceReverseLookup(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO (v2-dns): requires PTR implementation
|
|
||||||
func TestDNS_ServiceReverseLookup_IPV6(t *testing.T) {
|
func TestDNS_ServiceReverseLookup_IPV6(t *testing.T) {
|
||||||
if testing.Short() {
|
if testing.Short() {
|
||||||
t.Skip("too slow for testing.Short")
|
t.Skip("too slow for testing.Short")
|
||||||
|
@ -134,7 +133,6 @@ func TestDNS_ServiceReverseLookup_IPV6(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO (v2-dns): requires PTR implementation
|
|
||||||
func TestDNS_ServiceReverseLookup_CustomDomain(t *testing.T) {
|
func TestDNS_ServiceReverseLookup_CustomDomain(t *testing.T) {
|
||||||
if testing.Short() {
|
if testing.Short() {
|
||||||
t.Skip("too slow for testing.Short")
|
t.Skip("too slow for testing.Short")
|
||||||
|
@ -193,7 +191,6 @@ func TestDNS_ServiceReverseLookup_CustomDomain(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO (v2-dns): requires PTR implementation
|
|
||||||
func TestDNS_ServiceReverseLookupNodeAddress(t *testing.T) {
|
func TestDNS_ServiceReverseLookupNodeAddress(t *testing.T) {
|
||||||
if testing.Short() {
|
if testing.Short() {
|
||||||
t.Skip("too slow for testing.Short")
|
t.Skip("too slow for testing.Short")
|
||||||
|
@ -379,6 +376,7 @@ func TestDNS_ServiceLookupPreferNoCNAME(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// TODO (v2-dns): requires additional recursion work
|
||||||
func TestDNS_ServiceLookupMultiAddrNoCNAME(t *testing.T) {
|
func TestDNS_ServiceLookupMultiAddrNoCNAME(t *testing.T) {
|
||||||
if testing.Short() {
|
if testing.Short() {
|
||||||
t.Skip("too slow for testing.Short")
|
t.Skip("too slow for testing.Short")
|
||||||
|
@ -453,10 +451,20 @@ func TestDNS_ServiceLookupMultiAddrNoCNAME(t *testing.T) {
|
||||||
in, _, err := c.Exchange(m, a.DNSAddr())
|
in, _, err := c.Exchange(m, a.DNSAddr())
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
// expect a CNAME and an A RR
|
// expect two A RRs
|
||||||
require.Len(t, in.Answer, 2)
|
require.Len(t, in.Answer, 2)
|
||||||
require.IsType(t, &dns.A{}, in.Answer[0])
|
require.IsType(t, &dns.A{}, in.Answer[0])
|
||||||
|
require.Equal(t, "db.service.consul.", in.Answer[0].Header().Name)
|
||||||
|
isOneOfTheseIPs := func(ip net.IP) bool {
|
||||||
|
if ip.Equal(net.ParseIP("198.18.0.1")) || ip.Equal(net.ParseIP("198.18.0.3")) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
require.True(t, isOneOfTheseIPs(in.Answer[0].(*dns.A).A))
|
||||||
require.IsType(t, &dns.A{}, in.Answer[1])
|
require.IsType(t, &dns.A{}, in.Answer[1])
|
||||||
|
require.Equal(t, "db.service.consul.", in.Answer[1].Header().Name)
|
||||||
|
require.True(t, isOneOfTheseIPs(in.Answer[1].(*dns.A).A))
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -590,15 +598,13 @@ func TestDNS_ServiceLookup(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO (v2-dns): this is formulating the correct response
|
|
||||||
// but failing with an I/O timeout on the dns client Exchange() call
|
|
||||||
func TestDNS_ServiceLookupWithInternalServiceAddress(t *testing.T) {
|
func TestDNS_ServiceLookupWithInternalServiceAddress(t *testing.T) {
|
||||||
if testing.Short() {
|
if testing.Short() {
|
||||||
t.Skip("too slow for testing.Short")
|
t.Skip("too slow for testing.Short")
|
||||||
}
|
}
|
||||||
|
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
for name, experimentsHCL := range getVersionHCL(false) {
|
for name, experimentsHCL := range getVersionHCL(true) {
|
||||||
t.Run(name, func(t *testing.T) {
|
t.Run(name, func(t *testing.T) {
|
||||||
a := NewTestAgent(t, `
|
a := NewTestAgent(t, `
|
||||||
node_name = "my.test-node"
|
node_name = "my.test-node"
|
||||||
|
@ -999,7 +1005,7 @@ func TestDNS_ExternalServiceToConsulCNAMENestedLookup(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
for name, experimentsHCL := range getVersionHCL(false) {
|
for name, experimentsHCL := range getVersionHCL(true) {
|
||||||
t.Run(name, func(t *testing.T) {
|
t.Run(name, func(t *testing.T) {
|
||||||
a := NewTestAgent(t, `
|
a := NewTestAgent(t, `
|
||||||
node_name = "test-node"
|
node_name = "test-node"
|
||||||
|
@ -1672,7 +1678,7 @@ func TestDNS_AltDomain_ServiceLookup_ServiceAddressIPV6(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO (v2-dns): this requires a prepared query
|
// TODO (v2-dns): this requires WAN translation work to be implemented
|
||||||
func TestDNS_ServiceLookup_WanTranslation(t *testing.T) {
|
func TestDNS_ServiceLookup_WanTranslation(t *testing.T) {
|
||||||
if testing.Short() {
|
if testing.Short() {
|
||||||
t.Skip("too slow for testing.Short")
|
t.Skip("too slow for testing.Short")
|
||||||
|
@ -1889,7 +1895,6 @@ func TestDNS_ServiceLookup_WanTranslation(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO (v2-dns): this requires a prepared query
|
|
||||||
func TestDNS_CaseInsensitiveServiceLookup(t *testing.T) {
|
func TestDNS_CaseInsensitiveServiceLookup(t *testing.T) {
|
||||||
if testing.Short() {
|
if testing.Short() {
|
||||||
t.Skip("too slow for testing.Short")
|
t.Skip("too slow for testing.Short")
|
||||||
|
@ -1913,7 +1918,7 @@ func TestDNS_CaseInsensitiveServiceLookup(t *testing.T) {
|
||||||
}
|
}
|
||||||
for _, tst := range tests {
|
for _, tst := range tests {
|
||||||
t.Run(fmt.Sprintf("A lookup %v", tst.name), func(t *testing.T) {
|
t.Run(fmt.Sprintf("A lookup %v", tst.name), func(t *testing.T) {
|
||||||
for name, experimentsHCL := range getVersionHCL(false) {
|
for name, experimentsHCL := range getVersionHCL(true) {
|
||||||
t.Run(name, func(t *testing.T) {
|
t.Run(name, func(t *testing.T) {
|
||||||
a := NewTestAgent(t, fmt.Sprintf("%s %s", tst.config, experimentsHCL))
|
a := NewTestAgent(t, fmt.Sprintf("%s %s", tst.config, experimentsHCL))
|
||||||
defer a.Shutdown()
|
defer a.Shutdown()
|
||||||
|
@ -2161,14 +2166,13 @@ func TestDNS_ServiceLookup_PreparedQueryNamePeriod(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO (v2-dns): this requires a prepared query
|
|
||||||
func TestDNS_ServiceLookup_Dedup(t *testing.T) {
|
func TestDNS_ServiceLookup_Dedup(t *testing.T) {
|
||||||
if testing.Short() {
|
if testing.Short() {
|
||||||
t.Skip("too slow for testing.Short")
|
t.Skip("too slow for testing.Short")
|
||||||
}
|
}
|
||||||
|
|
||||||
t.Parallel()
|
t.Parallel()
|
||||||
for name, experimentsHCL := range getVersionHCL(false) {
|
for name, experimentsHCL := range getVersionHCL(true) {
|
||||||
t.Run(name, func(t *testing.T) {
|
t.Run(name, func(t *testing.T) {
|
||||||
a := NewTestAgent(t, experimentsHCL)
|
a := NewTestAgent(t, experimentsHCL)
|
||||||
defer a.Shutdown()
|
defer a.Shutdown()
|
||||||
|
@ -2413,6 +2417,7 @@ func TestDNS_ServiceLookup_Dedup_SRV(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// TODO (v2-dns): this requires implementing health filtering
|
||||||
func TestDNS_ServiceLookup_FilterCritical(t *testing.T) {
|
func TestDNS_ServiceLookup_FilterCritical(t *testing.T) {
|
||||||
if testing.Short() {
|
if testing.Short() {
|
||||||
t.Skip("too slow for testing.Short")
|
t.Skip("too slow for testing.Short")
|
||||||
|
@ -2577,6 +2582,7 @@ func TestDNS_ServiceLookup_FilterCritical(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// TODO (v2-dns): this requires implementing health filtering
|
||||||
func TestDNS_ServiceLookup_OnlyFailing(t *testing.T) {
|
func TestDNS_ServiceLookup_OnlyFailing(t *testing.T) {
|
||||||
if testing.Short() {
|
if testing.Short() {
|
||||||
t.Skip("too slow for testing.Short")
|
t.Skip("too slow for testing.Short")
|
||||||
|
@ -2698,6 +2704,7 @@ func TestDNS_ServiceLookup_OnlyFailing(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// TODO (v2-dns): this requires implementing health filtering
|
||||||
func TestDNS_ServiceLookup_OnlyPassing(t *testing.T) {
|
func TestDNS_ServiceLookup_OnlyPassing(t *testing.T) {
|
||||||
if testing.Short() {
|
if testing.Short() {
|
||||||
t.Skip("too slow for testing.Short")
|
t.Skip("too slow for testing.Short")
|
||||||
|
|
Loading…
Reference in New Issue