Skip to content

Commit

Permalink
powerdns: RADOS Gateway backend for bucket directioning
Browse files Browse the repository at this point in the history
This backend can be used to create one global namespace for multiple
RGW regions.

Using a CNAME DNS response the traffic is directed towards the RGW region
without using HTTP redirects.
  • Loading branch information
wido committed Jul 22, 2014
1 parent 9061988 commit d87e5b9
Show file tree
Hide file tree
Showing 3 changed files with 345 additions and 0 deletions.
51 changes: 51 additions & 0 deletions src/powerdns/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
# PowerDNS RADOS Gateway backend

A backend for PowerDNS to direct RADOS Gateway bucket traffic to the correct regions.

For example, two regions exist, US and EU.

EU: o.myobjects.eu
US: o.myobjects.us

A global domain o.myobjects.com exists.

Bucket 'foo' exists in the region EU and 'bar' in US.

foo.o.myobjects.com will return a CNAME to foo.o.myobjects.eu
bar.o.myobjects.com will return a CNAME to foo.o.myobjects.us

The HTTP Remote Backend from PowerDNS is used in this case: http://doc.powerdns.com/html/remotebackend.html

PowerDNS must be compiled with Remote HTTP backend support enabled, this is not default.

For more information visit the [Blueprint](http://wiki.ceph.com/Planning/Blueprints/Firefly/PowerDNS_backend_for_RGW)

# Configuration

## PowerDNS
launch=remote
remote-connection-string=http:url=http://localhost:6780/dns

## PowerDNS backend
Usage for this backend is showed by invoking with --help. See rgw-pdns.conf.in for a configuration example

The ACCESS and SECRET key pair requires the caps "metadata=read"

# Testing

$ curl -X GET http://localhost:6780/dns/lookup/foo.o.myobjects.com/ANY

Should return something like:

{
"result": [
{
"content": "foo.o.myobjects.eu",
"qtype": "CNAME",
"qname": "foo.o.myobjects.com",
"ttl": 60
}
]
}

## WSGI
279 changes: 279 additions & 0 deletions src/powerdns/pdns-backend-rgw.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,279 @@
#!/usr/bin/python
'''
A backend for PowerDNS to direct RADOS Gateway bucket traffic to the correct regions.
For example, two regions exist, US and EU.
EU: o.myobjects.eu
US: o.myobjects.us
A global domain o.myobjects.com exists.
Bucket 'foo' exists in the region EU and 'bar' in US.
foo.o.myobjects.com will return a CNAME to foo.o.myobjects.eu
bar.o.myobjects.com will return a CNAME to foo.o.myobjects.us
The HTTP Remote Backend from PowerDNS is used in this case: http://doc.powerdns.com/html/remotebackend.html
PowerDNS must be compiled with Remote HTTP backend support enabled, this is not default.
Configuration for PowerDNS:
launch=remote
remote-connection-string=http:url=http://localhost:6780/dns
Usage for this backend is showed by invoking with --help. See rgw-pdns.conf.in for a configuration example
The ACCESS and SECRET key pair requires the caps "metadata=read"
To test:
$ curl -X GET http://localhost:6780/dns/lookup/foo.o.myobjects.com/ANY
Should return something like:
{
"result": [
{
"content": "foo.o.myobjects.eu",
"qtype": "CNAME",
"qname": "foo.o.myobjects.com",
"ttl": 60
}
]
}
'''

# Copyright: Wido den Hollander <[email protected]> 2014
# License: LGPL2.1

from ConfigParser import SafeConfigParser, NoSectionError
from flask import abort, Flask, request, Response
from hashlib import sha1 as sha
from time import gmtime, strftime
from urlparse import urlparse
import argparse
import base64
import hmac
import json
import pycurl
import StringIO
import urllib
import os
import sys

config_locations = ['rgw-pdns.conf', '~/rgw-pdns.conf', '/etc/ceph/rgw-pdns.conf']

# PowerDNS expects a 200 what ever happends and always wants
# 'result' to 'true' if the query fails
def abort_early():
return json.dumps({'result': 'true'}) + "\n"

# Generate the Signature string for S3 Authorization with the RGW Admin API
def generate_signature(method, date, uri, headers=None):
sign = "%s\n\n" % method

if 'Content-Type' in headers:
sign += "%s\n" % headers['Content-Type']
else:
sign += "\n"

sign += "%s\n/%s/%s" % (date, config['rgw']['admin_entry'], uri)
h = hmac.new(config['rgw']['secret_key'].encode('utf-8'), sign.encode('utf-8'), digestmod=sha)
return base64.encodestring(h.digest()).strip()

def generate_auth_header(signature):
return str("AWS %s:%s" % (config['rgw']['access_key'], signature.decode('utf-8')))

# Do a HTTP request to the RGW Admin API
def do_rgw_request(uri, params=None, data=None, headers=None):
if headers == None:
headers = {}

headers['Date'] = strftime("%a, %d %b %Y %H:%M:%S +0000", gmtime())
signature = generate_signature("GET", headers['Date'], uri, headers)
headers['Authorization'] = generate_auth_header(signature)

query = None
if params != None:
query = '&'.join("%s=%s" % (key,val) for (key,val) in params.iteritems())

c = pycurl.Curl()
b = StringIO.StringIO()
url = "http://" + config['rgw']['endpoint'] + "/" + config['rgw']['admin_entry'] + "/" + uri + "?format=json"
if query != None:
url += "&" + urllib.quote_plus(query)

http_headers = []
for header in headers.keys():
http_headers.append(header + ": " + headers[header])

c.setopt(pycurl.URL, str(url))
c.setopt(pycurl.HTTPHEADER, http_headers)
c.setopt(pycurl.WRITEFUNCTION, b.write)
c.setopt(pycurl.FOLLOWLOCATION, 0)
c.setopt(pycurl.CONNECTTIMEOUT, 5)
c.perform()

response = b.getvalue()
if len(response) > 0:
return json.loads(response)

return None

def get_radosgw_metadata(key):
return do_rgw_request('metadata', {'key': key})

# Returns a string of the region where the bucket is in
def get_bucket_region(bucket):
meta = get_radosgw_metadata("bucket:%s" % bucket)
bucket_id = meta['data']['bucket']['bucket_id']
meta_instance = get_radosgw_metadata("bucket.instance:%s:%s" % (bucket, bucket_id))
region = meta_instance['data']['bucket_info']['region']
return region

# Returns the correct host for the bucket based on the regionmap
def get_bucket_host(bucket, region_map):
region = get_bucket_region(bucket)
return bucket + "." + region_map[region]

# This should support multiple endpoints per region!
def parse_region_map(map):
regions = {}
for region in map['regions']:
url = urlparse(region['val']['endpoints'][0])
regions.update({region['key']: url.netloc})

return regions

def str2bool(s):
return s.lower() in ("yes", "true", "1")

def init_config():
parser = argparse.ArgumentParser()
parser.add_argument("--config", help="The configuration file to use.", action="store")

args = parser.parse_args()

defaults = {
'listen_addr': '127.0.0.1',
'listen_port': '6780',
'dns_zone': 'rgw.local.lan',
'dns_soa_record': 'dns1.icann.org. hostmaster.icann.org. 2012080849 7200 3600 1209600 3600',
'dns_soa_ttl': '3600',
'dns_default_ttl': '60',
'rgw_endpoint': 'localhost:8080',
'rgw_admin_entry': 'admin',
'rgw_access_key': 'access',
'rgw_secret_key': 'secret',
'debug': False
}

cfg = SafeConfigParser(defaults)
if args.config == None:
cfg.read(config_locations)
else:
if not os.path.isfile(args.config):
print "Could not open configuration file %s" % args.config
sys.exit(1)

cfg.read(args.config)

config_section = 'powerdns'

try:
return {
'listen': {
'port': cfg.getint(config_section, 'listen_port'),
'addr': cfg.get(config_section, 'listen_addr')
},
'dns': {
'zone': cfg.get(config_section, 'dns_zone'),
'soa_record': cfg.get(config_section, 'dns_soa_record'),
'soa_ttl': cfg.get(config_section, 'dns_soa_ttl'),
'default_ttl': cfg.get(config_section, 'dns_default_ttl')
},
'rgw': {
'endpoint': cfg.get(config_section, 'rgw_endpoint'),
'admin_entry': cfg.get(config_section, 'rgw_admin_entry'),
'access_key': cfg.get(config_section, 'rgw_access_key'),
'secret_key': cfg.get(config_section, 'rgw_secret_key')
},
'debug': str2bool(cfg.get(config_section, 'debug'))
}

except NoSectionError:
return None

def generate_app(config):
# The Flask App
app = Flask(__name__)

# Get the RGW Region Map
region_map = parse_region_map(do_rgw_request('config'))

@app.route('/')
def index():
abort(404)

@app.route("/dns/lookup/<qname>/<qtype>")
def bucket_location(qname, qtype):
if len(qname) == 0:
return abort_early()

split = qname.split(".", 1)
if len(split) != 2:
return abort_early()

bucket = split[0]
zone = split[1]

# If the received qname doesn't match our zone we abort
if zone != config['dns']['zone']:
return abort_early()

# We do not serve MX records
if qtype == "MX":
return abort_early()

# The basic result we always return, this is what PowerDNS expects.
response = {'result': 'true'}
result = {}

# A hardcoded SOA response (FIXME!)
if qtype == "SOA":
result.update({'qtype': qtype})
result.update({'qname': qname})
result.update({'content': config['dns']['soa_record']})
result.update({'ttl': config['dns']['soa_ttl']})
else:
region_hostname = get_bucket_host(bucket, region_map)
result.update({'qtype': 'CNAME'})
result.update({'qname': qname})
result.update({'content': region_hostname})
result.update({'ttl': config['dns']['default_ttl']})

if len(result) > 0:
res = []
res.append(result)
response['result'] = res

return json.dumps(response, indent=1) + "\n"

return app


# Initialize the configuration and generate the Application
config = init_config()
if config == None:
print "Could not parse configuration file. Tried to parse %s" % config_locations
sys.exit(1)

app = generate_app(config)
app.debug = config['debug']

# Only run the App if this script is invoked from a Shell
if __name__ == '__main__':
app.run(host=config['listen']['addr'], port=config['listen']['port'])
15 changes: 15 additions & 0 deletions src/powerdns/rgw-pdns.conf.in
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
[powerdns]
listen_addr = 127.0.0.1
listen_port = 6780

dns_zone = rgw.local.lan
dns_soa_record = dns1.icann.org. hostmaster.icann.org. 2012080849 7200 3600 1209600 3600
dns_soa_ttl = 3600
dns_default_ttl = 60

rgw_access_key = myAccessKey
rgw_secret_key = mySecretKey
rgw_endpoint = localhost
rgw_admin_entry = admin

debug = no

0 comments on commit d87e5b9

Please sign in to comment.