mirror of
https://github.com/siderolabs/talos.git
synced 2025-10-26 14:01:39 +01:00
Turns out there is actually no black magic in systemd, they simply listen on 127.0.0.53 and forward dns requests there in resolv.conf. Reason is the same as ours — to preserve compatibility with other applications. So we do the same in our code. This PR also does two things: - Adds `::1` into resolv.conf for IPv6 only resolvers. - Drops `SO_REUSEPORT` from control options (it works without them). Closes #8328 Signed-off-by: Dmitriy Matrenichev <dmitry.matrenichev@siderolabs.com>
333 lines
8.1 KiB
Go
333 lines
8.1 KiB
Go
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
// Package dns provides dns server implementation.
|
|
package dns
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"math/rand"
|
|
"net"
|
|
"slices"
|
|
"strings"
|
|
"sync"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/coredns/coredns/plugin"
|
|
"github.com/coredns/coredns/plugin/cache"
|
|
"github.com/coredns/coredns/plugin/pkg/proxy"
|
|
"github.com/coredns/coredns/request"
|
|
"github.com/miekg/dns"
|
|
"go.uber.org/zap"
|
|
"golang.org/x/sys/unix"
|
|
|
|
"github.com/siderolabs/talos/internal/pkg/utils"
|
|
)
|
|
|
|
// NewRunner creates a new Runner.
|
|
func NewRunner(srv Server, logger *zap.Logger) *Runner {
|
|
r := utils.NewRunner(srv.ActivateAndServe, srv.Shutdown, func(err error) bool {
|
|
// There a possible scenario where `Run` reached `ListenAndServe` and then yielded CPU time to another
|
|
// goroutine and then `Stop` reached `Shutdown`. In that case `ListenAndServe` will actually start after
|
|
// `Shutdown` and `Stop` method will forever block if we do not try again.
|
|
return strings.Contains(err.Error(), "server not started")
|
|
})
|
|
|
|
return &Runner{r: r, logger: logger}
|
|
}
|
|
|
|
// Runner is a dns server handler.
|
|
type Runner struct {
|
|
r *utils.Runner
|
|
logger *zap.Logger
|
|
}
|
|
|
|
// Server is a dns server.
|
|
type Server interface {
|
|
ActivateAndServe() error
|
|
Shutdown() error
|
|
}
|
|
|
|
// Run runs dns server.
|
|
func (r *Runner) Run() error {
|
|
r.logger.Info("starting dns server")
|
|
|
|
err := r.r.Run()
|
|
|
|
r.logger.Info("dns server stopped", zap.Error(err))
|
|
|
|
return err
|
|
}
|
|
|
|
// Stop stops dns server. It's safe to call even if server is already stopped.
|
|
func (r *Runner) Stop() {
|
|
err := r.r.Stop()
|
|
if err != nil {
|
|
r.logger.Warn("error shutting down dns server", zap.Error(err))
|
|
}
|
|
}
|
|
|
|
// Cache is a [dns.Handler] to [plugin.Handler] adapter.
|
|
type Cache struct {
|
|
cache *cache.Cache
|
|
logger *zap.Logger
|
|
}
|
|
|
|
// NewCache creates a new Cache.
|
|
func NewCache(next plugin.Handler, l *zap.Logger) *Cache {
|
|
c := cache.NewCache("zones", "view")
|
|
c.Next = next
|
|
|
|
return &Cache{cache: c, logger: l}
|
|
}
|
|
|
|
// ServeDNS implements [dns.Handler].
|
|
func (c *Cache) ServeDNS(wr dns.ResponseWriter, msg *dns.Msg) {
|
|
_, err := c.cache.ServeDNS(context.Background(), wr, msg)
|
|
if err != nil {
|
|
// we should probably call newProxy.Healthcheck() if there are too many errors
|
|
c.logger.Warn("error serving dns request", zap.Error(err))
|
|
}
|
|
}
|
|
|
|
// Handler is a dns proxy selector.
|
|
type Handler struct {
|
|
mx sync.RWMutex
|
|
dests []*proxy.Proxy
|
|
logger *zap.Logger
|
|
}
|
|
|
|
// NewHandler creates a new Handler.
|
|
func NewHandler(logger *zap.Logger) *Handler {
|
|
return &Handler{
|
|
logger: logger,
|
|
}
|
|
}
|
|
|
|
// Name implements plugin.Handler.
|
|
func (h *Handler) Name() string {
|
|
return "Handler"
|
|
}
|
|
|
|
// ServeDNS implements plugin.Handler.
|
|
func (h *Handler) ServeDNS(ctx context.Context, wrt dns.ResponseWriter, msg *dns.Msg) (int, error) {
|
|
h.mx.RLock()
|
|
defer h.mx.RUnlock()
|
|
|
|
req := request.Request{W: wrt, Req: msg}
|
|
|
|
h.logger.Debug("dns request", zap.Stringer("data", msg))
|
|
|
|
upstreams := slices.Clone(h.dests)
|
|
|
|
if len(upstreams) == 0 {
|
|
emptyProxyErr := new(dns.Msg).SetRcode(req.Req, dns.RcodeServerFailure)
|
|
|
|
err := wrt.WriteMsg(emptyProxyErr)
|
|
if err != nil {
|
|
// We can't do much here, but at least log the error.
|
|
h.logger.Warn("failed to write 'no destination available' error dns response", zap.Error(err))
|
|
}
|
|
|
|
return dns.RcodeServerFailure, errors.New("no destination available")
|
|
}
|
|
|
|
rand.Shuffle(len(upstreams), func(i, j int) { upstreams[i], upstreams[j] = upstreams[j], upstreams[i] })
|
|
|
|
var (
|
|
resp *dns.Msg
|
|
err error
|
|
)
|
|
|
|
for _, ups := range upstreams {
|
|
resp, err = ups.Connect(ctx, req, proxy.Options{})
|
|
if errors.Is(err, proxy.ErrCachedClosed) { // Remote side closed conn, can only happen with TCP.
|
|
continue
|
|
}
|
|
|
|
if err == nil {
|
|
break
|
|
}
|
|
|
|
continue
|
|
}
|
|
|
|
if err != nil {
|
|
return dns.RcodeServerFailure, err
|
|
}
|
|
|
|
if !req.Match(resp) {
|
|
resp = new(dns.Msg).SetRcode(req.Req, dns.RcodeFormatError)
|
|
|
|
err = wrt.WriteMsg(resp)
|
|
if err != nil {
|
|
// We can't do much here, but at least log the error.
|
|
h.logger.Warn("failed to write non-matched response", zap.Error(err))
|
|
}
|
|
|
|
h.logger.Warn("dns response didn't match", zap.Stringer("data", resp))
|
|
|
|
return 0, nil
|
|
}
|
|
|
|
err = wrt.WriteMsg(resp)
|
|
if err != nil {
|
|
// We can't do much here, but at least log the error.
|
|
h.logger.Warn("error writing dns response", zap.Error(err))
|
|
}
|
|
|
|
h.logger.Debug("dns response", zap.Stringer("data", resp))
|
|
|
|
return 0, nil
|
|
}
|
|
|
|
// SetProxy sets destination dns proxy servers.
|
|
func (h *Handler) SetProxy(prxs []*proxy.Proxy) bool {
|
|
h.mx.Lock()
|
|
defer h.mx.Unlock()
|
|
|
|
if slices.Equal(h.dests, prxs) {
|
|
return false
|
|
}
|
|
|
|
h.dests = prxs
|
|
|
|
return true
|
|
}
|
|
|
|
// Stop stops and clears dns proxy selector.
|
|
func (h *Handler) Stop() { h.SetProxy(nil) }
|
|
|
|
// ServerOptins is a Server options.
|
|
type ServerOptins struct {
|
|
Listener net.Listener
|
|
PacketConn net.PacketConn
|
|
Handler dns.Handler
|
|
ReadTimeout time.Duration
|
|
WriteTimeout time.Duration
|
|
IdleTimeout func() time.Duration
|
|
MaxTCPQueries int
|
|
}
|
|
|
|
// NewServer creates a new Server.
|
|
func NewServer(opts ServerOptins) Server {
|
|
return &server{&dns.Server{
|
|
Listener: opts.Listener,
|
|
PacketConn: opts.PacketConn,
|
|
Handler: opts.Handler,
|
|
ReadTimeout: opts.ReadTimeout,
|
|
WriteTimeout: opts.WriteTimeout,
|
|
IdleTimeout: opts.IdleTimeout,
|
|
MaxTCPQueries: opts.MaxTCPQueries,
|
|
}}
|
|
}
|
|
|
|
type server struct{ *dns.Server }
|
|
|
|
// NewTCPListener creates a new TCP listener.
|
|
func NewTCPListener(network, addr string) (net.Listener, error) {
|
|
var opts []controlOptions
|
|
|
|
switch network {
|
|
case "tcp", "tcp4":
|
|
network = "tcp4"
|
|
opts = tcpOptions
|
|
|
|
case "tcp6":
|
|
opts = tcpOptionsV6
|
|
|
|
default:
|
|
return nil, fmt.Errorf("unsupported network: %s", network)
|
|
}
|
|
|
|
lc := net.ListenConfig{Control: makeControl(opts)}
|
|
|
|
return lc.Listen(context.Background(), network, addr)
|
|
}
|
|
|
|
// NewUDPPacketConn creates a new UDP packet connection.
|
|
func NewUDPPacketConn(network, addr string) (net.PacketConn, error) {
|
|
var opts []controlOptions
|
|
|
|
switch network {
|
|
case "udp", "udp4":
|
|
network = "udp4"
|
|
opts = udpOptions
|
|
|
|
case "udp6":
|
|
opts = udpOptionsV6
|
|
|
|
default:
|
|
return nil, fmt.Errorf("unsupported network: %s", network)
|
|
}
|
|
|
|
lc := net.ListenConfig{
|
|
Control: makeControl(opts),
|
|
}
|
|
|
|
return lc.ListenPacket(context.Background(), network, addr)
|
|
}
|
|
|
|
var (
|
|
tcpOptions = []controlOptions{
|
|
{unix.IPPROTO_IP, unix.IP_RECVTTL, 1, "failed to set IP_RECVTTL"},
|
|
{unix.IPPROTO_TCP, unix.TCP_FASTOPEN, 5, "failed to set TCP_FASTOPEN"}, // tcp specific stuff from systemd
|
|
{unix.IPPROTO_TCP, unix.TCP_NODELAY, 1, "failed to set TCP_NODELAY"}, // tcp specific stuff from systemd
|
|
{unix.IPPROTO_IP, unix.IP_TTL, 1, "failed to set IP_TTL"},
|
|
}
|
|
|
|
tcpOptionsV6 = []controlOptions{
|
|
{unix.IPPROTO_IPV6, unix.IPV6_RECVHOPLIMIT, 1, "failed to set IPV6_RECVHOPLIMIT"},
|
|
{unix.IPPROTO_TCP, unix.TCP_FASTOPEN, 5, "failed to set TCP_FASTOPEN"}, // tcp specific stuff from systemd
|
|
{unix.IPPROTO_TCP, unix.TCP_NODELAY, 1, "failed to set TCP_NODELAY"}, // tcp specific stuff from systemd
|
|
{unix.IPPROTO_IPV6, unix.IPV6_UNICAST_HOPS, 1, "failed to set IPV6_UNICAST_HOPS"},
|
|
}
|
|
|
|
udpOptions = []controlOptions{
|
|
{unix.IPPROTO_IP, unix.IP_RECVTTL, 1, "failed to set IP_RECVTTL"},
|
|
{unix.IPPROTO_IP, unix.IP_TTL, 1, "failed to set IP_TTL"},
|
|
}
|
|
|
|
udpOptionsV6 = []controlOptions{
|
|
{unix.IPPROTO_IPV6, unix.IPV6_RECVHOPLIMIT, 1, "failed to set IPV6_RECVHOPLIMIT"},
|
|
{unix.IPPROTO_IPV6, unix.IPV6_UNICAST_HOPS, 1, "failed to set IPV6_UNICAST_HOPS"},
|
|
}
|
|
)
|
|
|
|
type controlOptions struct {
|
|
level int
|
|
opt int
|
|
val int
|
|
errorMessage string
|
|
}
|
|
|
|
func makeControl(opts []controlOptions) func(string, string, syscall.RawConn) error {
|
|
return func(_ string, _ string, c syscall.RawConn) error {
|
|
var resErr error
|
|
|
|
err := c.Control(func(fd uintptr) {
|
|
for _, opt := range opts {
|
|
opErr := unix.SetsockoptInt(int(fd), opt.level, opt.opt, opt.val)
|
|
if opErr != nil {
|
|
resErr = fmt.Errorf(opt.errorMessage+": %w", opErr)
|
|
|
|
return
|
|
}
|
|
}
|
|
})
|
|
if err != nil {
|
|
return fmt.Errorf("failed in control call: %w", err)
|
|
}
|
|
|
|
if resErr != nil {
|
|
return fmt.Errorf("failed to set socket options: %w", resErr)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
}
|