aboutsummaryrefslogblamecommitdiff
path: root/src/dns_config.rs
blob: acee8d7aba36c7d4fbe530383f00674626e25368 (plain) (tree)
1
2
3
4
5
6
7
8
9

                                         
                                   
                   
                        
 

                                    
                                 
               


                 

                            
                                                      

                                                       

                                                            

                                                   
                                        



                                                     
                                            
                        
                         







                                   
                                                  






















                                                         
                                            
 





                                                              
                                           
 


                                              

 
                      
                   
 
 
                    




                                             

                                                                                                    


                                                               
 
                                    

                                               
                                                     


                                                    
                                                                  

                                                                             






                                                                                         
 




                                                







                                                                                
                                                                                               
                                             
                     






                      
                     


                             
                                                





                                                        
                                                     
                                                                         
                                                                 




                                                                                                                                                 
                                                                            
                                                                    





                                                                                                                                                    
                                                                     












                                                                                                                                                              


                                                        


           





                                                            

     





                                                            

     


                                                                        





                                                                                                   






                                                                                                                                                                                 
                 
 
                                                                                      

                                                                                    
             
         

     
 













                                                              
                                                              














                                                              
use std::collections::{HashMap, HashSet};
use std::fmt;
use std::net::{Ipv4Addr, Ipv6Addr};
use std::sync::Arc;
use std::time::Duration;

use anyhow::Result;
use serde::{Deserialize, Serialize};
use tokio::{select, sync::watch};
use tracing::*;

use df_consul::*;

use crate::autodiscovery::*;

const IP_TARGET_METADATA_TAG_PREFIX: &str = "public_";
const CNAME_TARGET_METADATA_TAG: &str = "cname_target";

const AUTODISCOVERY_CACHE_DURATION: u64 = 600; // 10 minutes

// ---- Extract DNS config from Consul catalog ----

#[derive(Debug, Eq, PartialEq, Default)]
pub struct DnsConfig {
    pub entries: HashMap<DnsEntryKey, DnsEntryValue>,
}

#[derive(Clone, Debug, Hash, PartialEq, Eq)]
pub struct DnsEntryKey {
    pub dns_path: String,
    pub record_type: DnsRecordType,
}

#[derive(Debug, PartialEq, Eq)]
pub struct DnsEntryValue {
    pub targets: HashSet<String>,
}

#[derive(Clone, Copy, Debug, Hash, PartialEq, Eq)]
#[allow(clippy::upper_case_acronyms)]
pub enum DnsRecordType {
    A,
    AAAA,
    CNAME,
}

impl DnsConfig {
    pub fn new() -> Self {
        Self {
            entries: HashMap::new(),
        }
    }

    fn add(&mut self, k: DnsEntryKey, v: DnsEntryValue) {
        if let Some(ent) = self.entries.get_mut(&k) {
            ent.targets.extend(v.targets);
        } else {
            self.entries.insert(k, v);
        }
    }
}

// ---- fetcher and autodiscovery cache ----

pub fn spawn_dns_config_task(
    consul: Consul,
    must_exit: watch::Receiver<bool>,
) -> watch::Receiver<Arc<DnsConfig>> {
    let (tx, rx) = watch::channel(Arc::new(DnsConfig::new()));

    let fetcher = DnsConfigTask { consul };

    tokio::spawn(fetcher.task(tx, must_exit));

    rx
}

struct DnsConfigTask {
    consul: Consul,
}

impl DnsConfigTask {
    async fn task(
        mut self,
        tx: watch::Sender<Arc<DnsConfig>>,
        mut must_exit: watch::Receiver<bool>,
    ) {
        let mut autodiscovery_rx = watch_autodiscovered_ips(self.consul.clone(), must_exit.clone());

        let mut catalog_rx = self
            .consul
            .watch_all_service_health(Duration::from_secs(60));

        while !*must_exit.borrow() {
            select! {
                _ = catalog_rx.changed() => (),
                _ = autodiscovery_rx.changed() => (),
                _ = must_exit.changed() => continue,
            };

            let services = catalog_rx.borrow_and_update().clone();
            let autodiscovery = autodiscovery_rx.borrow_and_update().clone();
            match self.parse_catalog(&services, &autodiscovery) {
                Ok(dns_config) => tx.send(Arc::new(dns_config)).expect("Internal error"),
                Err(e) => {
                    error!("Error when parsing tags: {}", e);
                }
            };
        }
    }

    fn parse_catalog(
        &mut self,
        services: &catalog::AllServiceHealth,
        autodiscovery: &AutodiscoveredAddresses,
    ) -> Result<DnsConfig> {
        let mut dns_config = DnsConfig::new();
        for (_svc, nodes) in services.iter() {
            for node in nodes.iter() {
                // Do not take into account backends if any have status critical
                if node.checks.iter().any(|x| x.status == "critical") {
                    continue;
                }
                for tag in node.service.tags.iter() {
                    if let Some((k, v)) = self.parse_d53_tag(tag, &node.node, autodiscovery)? {
                        dns_config.add(k, v);
                    }
                }
            }
        }

        Ok(dns_config)
    }

    fn parse_d53_tag(
        &mut self,
        tag: &str,
        node: &catalog::Node,
        autodiscovery: &AutodiscoveredAddresses,
    ) -> Result<Option<(DnsEntryKey, DnsEntryValue)>> {
        let splits = tag.split(' ').collect::<Vec<_>>();
        if splits.len() != 2 {
            return Ok(None);
        }

        let (record_type, target) = match splits[0] {
            "d53-a" => match self.get_node_ipv4(&autodiscovery, &node)? {
                Some(tgt) => (DnsRecordType::A, tgt.to_string()),
                None => {
                    warn!("Got d53-a tag `{}` but node {} does not appear to have a known public IPv4 address. Tag is ignored.", tag, node.node);
                    return Ok(None);
                }
            },
            "d53-aaaa" => match self.get_node_ipv6(&autodiscovery, &node)? {
                Some(tgt) => (DnsRecordType::AAAA, tgt.to_string()),
                None => {
                    warn!("Got d53-aaaa tag `{}` but node {} does not appear to have a known public IPv6 address. Tag is ignored.", tag, node.node);
                    return Ok(None);
                }
            },
            "d53-cname" => match node.meta.get(CNAME_TARGET_METADATA_TAG) {
                Some(tgt) => (DnsRecordType::CNAME, tgt.to_string()),
                None => {
                    warn!("Got d53-cname tag `{}` but node {} does not have a {} metadata value. Tag is ignored.", tag, node.node, CNAME_TARGET_METADATA_TAG);
                    return Ok(None);
                }
            },
            _ => return Ok(None),
        };

        Ok(Some((
            DnsEntryKey {
                dns_path: splits[1].to_string(),
                record_type,
            },
            DnsEntryValue {
                targets: [target].into_iter().collect(),
            },
        )))
    }

    fn get_node_ipv4(
        &mut self,
        autodiscovery: &AutodiscoveredAddresses,
        node: &catalog::Node,
    ) -> Result<Option<Ipv4Addr>> {
        Self::get_node_ip("ipv4", &autodiscovery.ipv4, node)
    }

    fn get_node_ipv6(
        &mut self,
        autodiscovery: &AutodiscoveredAddresses,
        node: &catalog::Node,
    ) -> Result<Option<Ipv6Addr>> {
        Self::get_node_ip("ipv6", &autodiscovery.ipv6, node)
    }

    fn get_node_ip<A>(
        family: &'static str,
        autodiscovery: &HashMap<String, DiplonatAutodiscoveryResult<A>>,
        node: &catalog::Node,
    ) -> Result<Option<A>>
    where
        A: Serialize + for<'de> Deserialize<'de> + std::fmt::Debug + std::str::FromStr + Copy + Eq,
        <A as std::str::FromStr>::Err: Send + Sync + std::error::Error + 'static,
    {
        match autodiscovery.get(&node.node) {
            Some(ar) if timestamp() <= ar.timestamp + AUTODISCOVERY_CACHE_DURATION => {
                Ok(ar.address)
            }
            x => {
                if let Some(ar) = x {
                    warn!("{} address for {} from diplonat autodiscovery is outdated (value: {:?}), falling back on value from Consul node meta", family, node.node, ar.address);
                }

                let meta_tag = format!("{}{}", IP_TARGET_METADATA_TAG_PREFIX, family);
                let addr = node.meta.get(&meta_tag).map(|x| x.parse()).transpose()?;
                Ok(addr)
            }
        }
    }
}

// ---- Display impls ----

impl std::fmt::Display for DnsRecordType {
    fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
        match self {
            DnsRecordType::A => write!(f, "A"),
            DnsRecordType::AAAA => write!(f, "AAAA"),
            DnsRecordType::CNAME => write!(f, "CNAME"),
        }
    }
}

impl std::fmt::Display for DnsEntryKey {
    fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
        write!(f, "{} IN {}", self.dns_path, self.record_type)
    }
}

impl std::fmt::Display for DnsEntryValue {
    fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
        write!(f, "[")?;
        for (i, tgt) in self.targets.iter().enumerate() {
            if i > 0 {
                write!(f, " ")?;
            }
            write!(f, "{}", tgt)?;
        }
        write!(f, "]")
    }
}