mirror of
https://github.com/kubernetes-sigs/external-dns.git
synced 2025-08-06 01:26:59 +02:00
* feat(google): auto-detect and multiple zone support * chore: run gofmt with the simplified command * fix: pass desired domain to google provider * feat(google): correctly auto-detect records for sub-zones * chore: update changelog with support for multiple zones in google * fix(google): don't append traling dot to TXT records * ref(provider): extract hostname sanitization to general provider
341 lines
9.9 KiB
Go
341 lines
9.9 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package provider
|
|
|
|
import (
|
|
"strings"
|
|
|
|
log "github.com/Sirupsen/logrus"
|
|
|
|
"golang.org/x/net/context"
|
|
"golang.org/x/oauth2/google"
|
|
|
|
"google.golang.org/api/dns/v1"
|
|
googleapi "google.golang.org/api/googleapi"
|
|
|
|
"github.com/kubernetes-incubator/external-dns/endpoint"
|
|
"github.com/kubernetes-incubator/external-dns/plan"
|
|
)
|
|
|
|
type managedZonesCreateCallInterface interface {
|
|
Do(opts ...googleapi.CallOption) (*dns.ManagedZone, error)
|
|
}
|
|
|
|
type managedZonesListCallInterface interface {
|
|
Pages(ctx context.Context, f func(*dns.ManagedZonesListResponse) error) error
|
|
}
|
|
|
|
type managedZonesServiceInterface interface {
|
|
Create(project string, managedzone *dns.ManagedZone) managedZonesCreateCallInterface
|
|
List(project string) managedZonesListCallInterface
|
|
}
|
|
|
|
type resourceRecordSetsListCallInterface interface {
|
|
Pages(ctx context.Context, f func(*dns.ResourceRecordSetsListResponse) error) error
|
|
}
|
|
|
|
type resourceRecordSetsClientInterface interface {
|
|
List(project string, managedZone string) resourceRecordSetsListCallInterface
|
|
}
|
|
|
|
type changesCreateCallInterface interface {
|
|
Do(opts ...googleapi.CallOption) (*dns.Change, error)
|
|
}
|
|
|
|
type changesServiceInterface interface {
|
|
Create(project string, managedZone string, change *dns.Change) changesCreateCallInterface
|
|
}
|
|
|
|
type resourceRecordSetsService struct {
|
|
service *dns.ResourceRecordSetsService
|
|
}
|
|
|
|
func (r resourceRecordSetsService) List(project string, managedZone string) resourceRecordSetsListCallInterface {
|
|
return r.service.List(project, managedZone)
|
|
}
|
|
|
|
type managedZonesService struct {
|
|
service *dns.ManagedZonesService
|
|
}
|
|
|
|
func (m managedZonesService) Create(project string, managedzone *dns.ManagedZone) managedZonesCreateCallInterface {
|
|
return m.service.Create(project, managedzone)
|
|
}
|
|
|
|
func (m managedZonesService) List(project string) managedZonesListCallInterface {
|
|
return m.service.List(project)
|
|
}
|
|
|
|
type changesService struct {
|
|
service *dns.ChangesService
|
|
}
|
|
|
|
func (c changesService) Create(project string, managedZone string, change *dns.Change) changesCreateCallInterface {
|
|
return c.service.Create(project, managedZone, change)
|
|
}
|
|
|
|
// googleProvider is an implementation of Provider for Google CloudDNS.
|
|
type googleProvider struct {
|
|
// The Google project to work in
|
|
project string
|
|
// Enabled dry-run will print any modifying actions rather than execute them.
|
|
dryRun bool
|
|
// only consider hosted zones managing domains ending in this suffix
|
|
domain string
|
|
// A client for managing resource record sets
|
|
resourceRecordSetsClient resourceRecordSetsClientInterface
|
|
// A client for managing hosted zones
|
|
managedZonesClient managedZonesServiceInterface
|
|
// A client for managing change sets
|
|
changesClient changesServiceInterface
|
|
}
|
|
|
|
// NewGoogleProvider initializes a new Google CloudDNS based Provider.
|
|
func NewGoogleProvider(project string, domain string, dryRun bool) (Provider, error) {
|
|
gcloud, err := google.DefaultClient(context.TODO(), dns.NdevClouddnsReadwriteScope)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
dnsClient, err := dns.New(gcloud)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
provider := &googleProvider{
|
|
project: project,
|
|
domain: domain,
|
|
dryRun: dryRun,
|
|
resourceRecordSetsClient: resourceRecordSetsService{dnsClient.ResourceRecordSets},
|
|
managedZonesClient: managedZonesService{dnsClient.ManagedZones},
|
|
changesClient: changesService{dnsClient.Changes},
|
|
}
|
|
|
|
return provider, nil
|
|
}
|
|
|
|
// Zones returns the list of hosted zones.
|
|
func (p *googleProvider) Zones() (map[string]*dns.ManagedZone, error) {
|
|
zones := make(map[string]*dns.ManagedZone)
|
|
|
|
f := func(resp *dns.ManagedZonesListResponse) error {
|
|
for _, zone := range resp.ManagedZones {
|
|
if strings.HasSuffix(zone.DnsName, p.domain) {
|
|
zones[zone.Name] = zone
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
if err := p.managedZonesClient.List(p.project).Pages(context.TODO(), f); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return zones, nil
|
|
}
|
|
|
|
// Records returns the list of records in all relevant zones.
|
|
func (p *googleProvider) Records(_ string) (endpoints []*endpoint.Endpoint, _ error) {
|
|
zones, err := p.Zones()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
f := func(resp *dns.ResourceRecordSetsListResponse) error {
|
|
for _, r := range resp.Rrsets {
|
|
// TODO(linki, ownership): Remove once ownership system is in place.
|
|
// See: https://github.com/kubernetes-incubator/external-dns/pull/122/files/74e2c3d3e237411e619aefc5aab694742001cdec#r109863370
|
|
switch r.Type {
|
|
case "A", "CNAME", "TXT":
|
|
break
|
|
default:
|
|
continue
|
|
}
|
|
|
|
for _, rr := range r.Rrdatas {
|
|
// each page is processed sequentially, no need for a mutex here.
|
|
endpoints = append(endpoints, endpoint.NewEndpoint(r.Name, rr, r.Type))
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
for _, z := range zones {
|
|
if err := p.resourceRecordSetsClient.List(p.project, z.Name).Pages(context.TODO(), f); err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
return endpoints, nil
|
|
}
|
|
|
|
// CreateRecords creates a given set of DNS records in the given hosted zone.
|
|
func (p *googleProvider) CreateRecords(endpoints []*endpoint.Endpoint) error {
|
|
change := &dns.Change{}
|
|
|
|
change.Additions = append(change.Additions, newRecords(endpoints)...)
|
|
|
|
return p.submitChange(change)
|
|
}
|
|
|
|
// UpdateRecords updates a given set of old records to a new set of records in a given hosted zone.
|
|
func (p *googleProvider) UpdateRecords(records, oldRecords []*endpoint.Endpoint) error {
|
|
change := &dns.Change{}
|
|
|
|
change.Additions = append(change.Additions, newRecords(records)...)
|
|
change.Deletions = append(change.Deletions, newRecords(oldRecords)...)
|
|
|
|
return p.submitChange(change)
|
|
}
|
|
|
|
// DeleteRecords deletes a given set of DNS records in a given zone.
|
|
func (p *googleProvider) DeleteRecords(endpoints []*endpoint.Endpoint) error {
|
|
change := &dns.Change{}
|
|
|
|
change.Deletions = append(change.Deletions, newRecords(endpoints)...)
|
|
|
|
return p.submitChange(change)
|
|
}
|
|
|
|
// ApplyChanges applies a given set of changes in a given zone.
|
|
func (p *googleProvider) ApplyChanges(_ string, changes *plan.Changes) error {
|
|
change := &dns.Change{}
|
|
|
|
change.Additions = append(change.Additions, newRecords(changes.Create)...)
|
|
|
|
change.Additions = append(change.Additions, newRecords(changes.UpdateNew)...)
|
|
change.Deletions = append(change.Deletions, newRecords(changes.UpdateOld)...)
|
|
|
|
change.Deletions = append(change.Deletions, newRecords(changes.Delete)...)
|
|
|
|
return p.submitChange(change)
|
|
}
|
|
|
|
// submitChange takes a zone and a Change and sends it to Google.
|
|
func (p *googleProvider) submitChange(change *dns.Change) error {
|
|
if len(change.Additions) == 0 && len(change.Deletions) == 0 {
|
|
log.Infoln("Received empty list of records for creation and deletion")
|
|
return nil
|
|
}
|
|
|
|
for _, del := range change.Deletions {
|
|
log.Infof("Del records: %s %s %s", del.Name, del.Type, del.Rrdatas)
|
|
}
|
|
for _, add := range change.Additions {
|
|
log.Infof("Add records: %s %s %s", add.Name, add.Type, add.Rrdatas)
|
|
}
|
|
|
|
if p.dryRun {
|
|
return nil
|
|
}
|
|
|
|
zones, err := p.Zones()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// separate into per-zone change sets to be passed to the API.
|
|
changes := separateChange(zones, change)
|
|
|
|
for z, c := range changes {
|
|
if _, err := p.changesClient.Create(p.project, z, c).Do(); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// separateChange separates a multi-zone change into a single change per zone.
|
|
func separateChange(zones map[string]*dns.ManagedZone, change *dns.Change) map[string]*dns.Change {
|
|
changes := make(map[string]*dns.Change)
|
|
|
|
for _, z := range zones {
|
|
changes[z.Name] = &dns.Change{
|
|
Additions: []*dns.ResourceRecordSet{},
|
|
Deletions: []*dns.ResourceRecordSet{},
|
|
}
|
|
}
|
|
|
|
for _, a := range change.Additions {
|
|
if zone := suitableManagedZone(ensureTrailingDot(a.Name), zones); zone != nil {
|
|
changes[zone.Name].Additions = append(changes[zone.Name].Additions, a)
|
|
}
|
|
}
|
|
|
|
for _, d := range change.Deletions {
|
|
if zone := suitableManagedZone(ensureTrailingDot(d.Name), zones); zone != nil {
|
|
changes[zone.Name].Deletions = append(changes[zone.Name].Deletions, d)
|
|
}
|
|
}
|
|
|
|
// separating a change could lead to empty sub changes, remove them here.
|
|
for zone, change := range changes {
|
|
if len(change.Additions) == 0 && len(change.Deletions) == 0 {
|
|
delete(changes, zone)
|
|
}
|
|
}
|
|
|
|
return changes
|
|
}
|
|
|
|
// suitableManagedZone returns the most suitable zone for a given hostname and a set of zones.
|
|
func suitableManagedZone(hostname string, zones map[string]*dns.ManagedZone) *dns.ManagedZone {
|
|
var zone *dns.ManagedZone
|
|
|
|
for _, z := range zones {
|
|
if strings.HasSuffix(hostname, z.DnsName) {
|
|
if zone == nil || len(z.DnsName) > len(zone.DnsName) {
|
|
zone = z
|
|
}
|
|
}
|
|
}
|
|
|
|
return zone
|
|
}
|
|
|
|
// newRecords returns a collection of RecordSets based on the given endpoints.
|
|
func newRecords(endpoints []*endpoint.Endpoint) []*dns.ResourceRecordSet {
|
|
records := make([]*dns.ResourceRecordSet, len(endpoints))
|
|
|
|
for i, endpoint := range endpoints {
|
|
records[i] = newRecord(endpoint)
|
|
}
|
|
|
|
return records
|
|
}
|
|
|
|
// newRecord returns a RecordSet based on the given endpoint.
|
|
func newRecord(endpoint *endpoint.Endpoint) *dns.ResourceRecordSet {
|
|
// TODO(linki): works around appending a trailing dot to TXT records. I think
|
|
// we should go back to storing DNS names with a trailing dot internally. This
|
|
// way we can use it has is here and trim it off if it exists when necessary.
|
|
target := endpoint.Target
|
|
if suitableType(endpoint) == "CNAME" {
|
|
target = ensureTrailingDot(target)
|
|
}
|
|
|
|
return &dns.ResourceRecordSet{
|
|
Name: ensureTrailingDot(endpoint.DNSName),
|
|
Rrdatas: []string{target},
|
|
Ttl: 300,
|
|
Type: suitableType(endpoint),
|
|
}
|
|
}
|