mirror of
				https://github.com/coredns/coredns.git
				synced 2025-10-27 06:11:38 +01:00 
			
		
		
		
	This commit uses a cancelable context to spawn goroutines that refresh records from a cloud DNS provider. The Caddy shutdown routine uses the returned cancel function to terminate existing goroutines when a USR1 reload signal is received. Signed-off-by: Matt Kulka <mkulka@parchment.com>
		
			
				
	
	
		
			141 lines
		
	
	
		
			4.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			141 lines
		
	
	
		
			4.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package azure
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"strings"
 | |
| 
 | |
| 	"github.com/coredns/caddy"
 | |
| 	"github.com/coredns/coredns/core/dnsserver"
 | |
| 	"github.com/coredns/coredns/plugin"
 | |
| 	"github.com/coredns/coredns/plugin/pkg/fall"
 | |
| 	clog "github.com/coredns/coredns/plugin/pkg/log"
 | |
| 
 | |
| 	publicAzureDNS "github.com/Azure/azure-sdk-for-go/profiles/latest/dns/mgmt/dns"
 | |
| 	privateAzureDNS "github.com/Azure/azure-sdk-for-go/profiles/latest/privatedns/mgmt/privatedns"
 | |
| 	azurerest "github.com/Azure/go-autorest/autorest/azure"
 | |
| 	"github.com/Azure/go-autorest/autorest/azure/auth"
 | |
| )
 | |
| 
 | |
| var log = clog.NewWithPlugin("azure")
 | |
| 
 | |
| func init() { plugin.Register("azure", setup) }
 | |
| 
 | |
| func setup(c *caddy.Controller) error {
 | |
| 	env, keys, accessMap, fall, err := parse(c)
 | |
| 	if err != nil {
 | |
| 		return plugin.Error("azure", err)
 | |
| 	}
 | |
| 	ctx, cancel := context.WithCancel(context.Background())
 | |
| 
 | |
| 	publicDNSClient := publicAzureDNS.NewRecordSetsClient(env.Values[auth.SubscriptionID])
 | |
| 	if publicDNSClient.Authorizer, err = env.GetAuthorizer(); err != nil {
 | |
| 		return plugin.Error("azure", err)
 | |
| 	}
 | |
| 
 | |
| 	privateDNSClient := privateAzureDNS.NewRecordSetsClient(env.Values[auth.SubscriptionID])
 | |
| 	if privateDNSClient.Authorizer, err = env.GetAuthorizer(); err != nil {
 | |
| 		return plugin.Error("azure", err)
 | |
| 	}
 | |
| 
 | |
| 	h, err := New(ctx, publicDNSClient, privateDNSClient, keys, accessMap)
 | |
| 	if err != nil {
 | |
| 		return plugin.Error("azure", err)
 | |
| 	}
 | |
| 	h.Fall = fall
 | |
| 	if err := h.Run(ctx); err != nil {
 | |
| 		return plugin.Error("azure", err)
 | |
| 	}
 | |
| 
 | |
| 	dnsserver.GetConfig(c).AddPlugin(func(next plugin.Handler) plugin.Handler {
 | |
| 		h.Next = next
 | |
| 		return h
 | |
| 	})
 | |
| 	c.OnShutdown(func() error { cancel(); return nil })
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func parse(c *caddy.Controller) (auth.EnvironmentSettings, map[string][]string, map[string]string, fall.F, error) {
 | |
| 	resourceGroupMapping := map[string][]string{}
 | |
| 	accessMap := map[string]string{}
 | |
| 	resourceGroupSet := map[string]struct{}{}
 | |
| 	azureEnv := azurerest.PublicCloud
 | |
| 	env := auth.EnvironmentSettings{Values: map[string]string{}}
 | |
| 
 | |
| 	var fall fall.F
 | |
| 	var access string
 | |
| 	var resourceGroup string
 | |
| 	var zoneName string
 | |
| 
 | |
| 	for c.Next() {
 | |
| 		args := c.RemainingArgs()
 | |
| 
 | |
| 		for i := 0; i < len(args); i++ {
 | |
| 			parts := strings.SplitN(args[i], ":", 2)
 | |
| 			if len(parts) != 2 {
 | |
| 				return env, resourceGroupMapping, accessMap, fall, c.Errf("invalid resource group/zone: %q", args[i])
 | |
| 			}
 | |
| 			resourceGroup, zoneName = parts[0], parts[1]
 | |
| 			if resourceGroup == "" || zoneName == "" {
 | |
| 				return env, resourceGroupMapping, accessMap, fall, c.Errf("invalid resource group/zone: %q", args[i])
 | |
| 			}
 | |
| 			if _, ok := resourceGroupSet[resourceGroup+zoneName]; ok {
 | |
| 				return env, resourceGroupMapping, accessMap, fall, c.Errf("conflicting zone: %q", args[i])
 | |
| 			}
 | |
| 
 | |
| 			resourceGroupSet[resourceGroup+zoneName] = struct{}{}
 | |
| 			accessMap[resourceGroup+zoneName] = "public"
 | |
| 			resourceGroupMapping[resourceGroup] = append(resourceGroupMapping[resourceGroup], zoneName)
 | |
| 		}
 | |
| 
 | |
| 		for c.NextBlock() {
 | |
| 			switch c.Val() {
 | |
| 			case "subscription":
 | |
| 				if !c.NextArg() {
 | |
| 					return env, resourceGroupMapping, accessMap, fall, c.ArgErr()
 | |
| 				}
 | |
| 				env.Values[auth.SubscriptionID] = c.Val()
 | |
| 			case "tenant":
 | |
| 				if !c.NextArg() {
 | |
| 					return env, resourceGroupMapping, accessMap, fall, c.ArgErr()
 | |
| 				}
 | |
| 				env.Values[auth.TenantID] = c.Val()
 | |
| 			case "client":
 | |
| 				if !c.NextArg() {
 | |
| 					return env, resourceGroupMapping, accessMap, fall, c.ArgErr()
 | |
| 				}
 | |
| 				env.Values[auth.ClientID] = c.Val()
 | |
| 			case "secret":
 | |
| 				if !c.NextArg() {
 | |
| 					return env, resourceGroupMapping, accessMap, fall, c.ArgErr()
 | |
| 				}
 | |
| 				env.Values[auth.ClientSecret] = c.Val()
 | |
| 			case "environment":
 | |
| 				if !c.NextArg() {
 | |
| 					return env, resourceGroupMapping, accessMap, fall, c.ArgErr()
 | |
| 				}
 | |
| 				var err error
 | |
| 				if azureEnv, err = azurerest.EnvironmentFromName(c.Val()); err != nil {
 | |
| 					return env, resourceGroupMapping, accessMap, fall, c.Errf("cannot set azure environment: %q", err.Error())
 | |
| 				}
 | |
| 			case "fallthrough":
 | |
| 				fall.SetZonesFromArgs(c.RemainingArgs())
 | |
| 			case "access":
 | |
| 				if !c.NextArg() {
 | |
| 					return env, resourceGroupMapping, accessMap, fall, c.ArgErr()
 | |
| 				}
 | |
| 				access = c.Val()
 | |
| 				if access != "public" && access != "private" {
 | |
| 					return env, resourceGroupMapping, accessMap, fall, c.Errf("invalid access value: can be public/private, found: %s", access)
 | |
| 				}
 | |
| 				accessMap[resourceGroup+zoneName] = access
 | |
| 			default:
 | |
| 				return env, resourceGroupMapping, accessMap, fall, c.Errf("unknown property: %q", c.Val())
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	env.Values[auth.Resource] = azureEnv.ResourceManagerEndpoint
 | |
| 	env.Environment = azureEnv
 | |
| 	return env, resourceGroupMapping, accessMap, fall, nil
 | |
| }
 |