Add b.master.delegation-servers.dn42 and update SOA checking logic

This commit is contained in:
Simon Marsh 2019-06-28 20:27:00 +01:00
parent a10a5610c7
commit b5a23d04a8
Signed by: burble
GPG Key ID: 7B9FE8780CFB6593
2 changed files with 48 additions and 27 deletions

View File

@ -0,0 +1,29 @@
##########################################################################
# dn42promsrv example systemd service file
##########################################################################
[Unit]
Description=DN42 Prometheus Stats Server
After=network.target
[Install]
WantedBy=multi-user.target
[Service]
User=promsrv
Group=promsrv
Type=simple
Restart=on-failure
# service hardening
ProtectSystem=strict
NoNewPrivileges=yes
ProtectControlGroups=yes
PrivateTmp=yes
PrivateDevices=yes
DevicePolicy=closed
MemoryDenyWriteExecute=yes
#
ExecStart=/usr/local/bin/dn42promsrv
#########################################################################
# end of file

46
dns.go
View File

@ -9,7 +9,7 @@ package main
import ( import (
"encoding/json" "encoding/json"
"errors" "errors"
// "fmt" "fmt"
dns "github.com/miekg/dns" dns "github.com/miekg/dns"
"github.com/prometheus/client_golang/prometheus" "github.com/prometheus/client_golang/prometheus"
log "github.com/sirupsen/logrus" log "github.com/sirupsen/logrus"
@ -83,6 +83,8 @@ var dns_servers = []*DNSServer{
// master // master
&DNSServer{"master", "jrb0001", "b.master.delegation-servers.dn42", 6,
"[fd42:180:3de0:30::1]:53", 0},
&DNSServer{"master", "jrb0001", "j.master.delegation-servers.dn42", 6, &DNSServer{"master", "jrb0001", "j.master.delegation-servers.dn42", 6,
"[fd42:180:3de0:10:5054:ff:fe87:ea39]:53", 0}, "[fd42:180:3de0:10:5054:ff:fe87:ea39]:53", 0},
@ -204,17 +206,13 @@ func (m *DNSMetrics) Collect() {
now := uint64(time.Now().Unix()) now := uint64(time.Now().Unix())
// add master servers to a list to compare SOA // search the masters for the highest SOA
masters := make([]uint32, 2) var latest_soa uint32 = 0
for _, server := range dns_servers { for _, server := range dns_servers {
if server.role == "master" { if server.role == "master" {
masters = append(masters, server.soa) if server.soa > latest_soa {
} else { latest_soa = server.soa
// icky icky icky - manually add yamakaja's server temporarily
if server.role == "delegation" &&
server.owner == "yamakaja" &&
server.ip == 6 {
masters = append(masters, server.soa)
} }
} }
} }
@ -259,22 +257,11 @@ func (m *DNSMetrics) Collect() {
}).Info("DNS Server high RTT") }).Info("DNS Server high RTT")
} }
// check if the SOA matches any defined master SOA // check if the SOA matches the lastest master SOA
if r.serial == latest_soa {
// assume not valid = 0
valid = 1 } else {
valid = 1
// automatically invalid if out of date (older than 25 hours)
if (now - uint64(r.serial)) < (3600 * 25) {
// otherwise step through each 'master' and
// check if the SOA matches somewhere
for _, soa := range masters {
if r.serial == soa {
// match was found
valid = 0
break
}
}
} }
// before setting whether the server is valid, calculate the stime // before setting whether the server is valid, calculate the stime
@ -311,7 +298,9 @@ func (s *DNSServer) Query() *DNSResult {
msg.RecursionDesired = (s.role == "recursive") msg.RecursionDesired = (s.role == "recursive")
// query the dn42 root zone SOA // query the dn42 root zone SOA
msg.Question = []dns.Question{{"dn42.", dns.TypeSOA, dns.ClassINET}} msg.Question = []dns.Question{
{"dn42.", dns.TypeSOA, dns.ClassINET},
}
// add EDNS0 options to also query the service ID (NSID) // add EDNS0 options to also query the service ID (NSID)
// pretty much copied verbatim from the library docs // pretty much copied verbatim from the library docs
@ -333,6 +322,7 @@ func (s *DNSServer) Query() *DNSResult {
// create a new DNS client // create a new DNS client
client := new(dns.Client) client := new(dns.Client)
client.Timeout, _ = time.ParseDuration("4s")
// and finally query the server // and finally query the server
resp, rtt, err := client.Exchange(msg, s.addr) resp, rtt, err := client.Exchange(msg, s.addr)
@ -346,6 +336,8 @@ func (s *DNSServer) Query() *DNSResult {
return nil return nil
} }
fmt.Printf("Resp: %v\n", resp)
// was an SOA returned ? // was an SOA returned ?
if soa, ok := resp.Answer[0].(*dns.SOA); !ok { if soa, ok := resp.Answer[0].(*dns.SOA); !ok {