mirror of
https://github.com/DeBrosOfficial/network.git
synced 2026-01-30 10:13:03 +00:00
added support for different domain except orama.network
This commit is contained in:
parent
ec66213e2e
commit
b1011c29b5
@ -19,6 +19,7 @@ type HTTPGatewayConfig struct {
|
|||||||
IPFSClusterAPIURL string `yaml:"ipfs_cluster_api_url"` // IPFS Cluster API URL
|
IPFSClusterAPIURL string `yaml:"ipfs_cluster_api_url"` // IPFS Cluster API URL
|
||||||
IPFSAPIURL string `yaml:"ipfs_api_url"` // IPFS API URL
|
IPFSAPIURL string `yaml:"ipfs_api_url"` // IPFS API URL
|
||||||
IPFSTimeout time.Duration `yaml:"ipfs_timeout"` // Timeout for IPFS operations
|
IPFSTimeout time.Duration `yaml:"ipfs_timeout"` // Timeout for IPFS operations
|
||||||
|
BaseDomain string `yaml:"base_domain"` // Base domain for deployments (e.g., "dbrs.space", defaults to "orama.network")
|
||||||
}
|
}
|
||||||
|
|
||||||
// HTTPSConfig contains HTTPS/TLS configuration for the gateway
|
// HTTPSConfig contains HTTPS/TLS configuration for the gateway
|
||||||
|
|||||||
@ -18,6 +18,9 @@ type Config struct {
|
|||||||
DomainName string // Domain name for HTTPS certificate
|
DomainName string // Domain name for HTTPS certificate
|
||||||
TLSCacheDir string // Directory to cache TLS certificates (default: ~/.orama/tls-cache)
|
TLSCacheDir string // Directory to cache TLS certificates (default: ~/.orama/tls-cache)
|
||||||
|
|
||||||
|
// Domain routing configuration
|
||||||
|
BaseDomain string // Base domain for deployment routing (e.g., "dbrs.space"). Defaults to "orama.network"
|
||||||
|
|
||||||
// Olric cache configuration
|
// Olric cache configuration
|
||||||
OlricServers []string // List of Olric server addresses (e.g., ["localhost:3320"]). If empty, defaults to ["localhost:3320"]
|
OlricServers []string // List of Olric server addresses (e.g., ["localhost:3320"]). If empty, defaults to ["localhost:3320"]
|
||||||
OlricTimeout time.Duration // Timeout for Olric operations (default: 10s)
|
OlricTimeout time.Duration // Timeout for Olric operations (default: 10s)
|
||||||
|
|||||||
@ -252,6 +252,10 @@ func New(logger *logging.ColoredLogger, cfg *Config) (*Gateway, error) {
|
|||||||
gw.portAllocator,
|
gw.portAllocator,
|
||||||
logger.Logger,
|
logger.Logger,
|
||||||
)
|
)
|
||||||
|
// Set base domain from config
|
||||||
|
if gw.cfg.BaseDomain != "" {
|
||||||
|
gw.deploymentService.SetBaseDomain(gw.cfg.BaseDomain)
|
||||||
|
}
|
||||||
|
|
||||||
// Create deployment handlers
|
// Create deployment handlers
|
||||||
gw.staticHandler = deploymentshandlers.NewStaticDeploymentHandler(
|
gw.staticHandler = deploymentshandlers.NewStaticDeploymentHandler(
|
||||||
|
|||||||
@ -65,9 +65,10 @@ func (h *DomainHandler) HandleAddDomain(w http.ResponseWriter, r *http.Request)
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check if domain is reserved
|
// Check if domain is reserved (using configured base domain)
|
||||||
if strings.HasSuffix(domain, ".orama.network") {
|
baseDomain := h.service.BaseDomain()
|
||||||
http.Error(w, "Cannot use .orama.network domains as custom domains", http.StatusBadRequest)
|
if strings.HasSuffix(domain, "."+baseDomain) {
|
||||||
|
http.Error(w, fmt.Sprintf("Cannot use .%s domains as custom domains", baseDomain), http.StatusBadRequest)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@ -62,13 +62,14 @@ func (h *ListHandler) HandleList(w http.ResponseWriter, r *http.Request) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
baseDomain := h.service.BaseDomain()
|
||||||
deployments := make([]map[string]interface{}, len(rows))
|
deployments := make([]map[string]interface{}, len(rows))
|
||||||
for i, row := range rows {
|
for i, row := range rows {
|
||||||
urls := []string{
|
urls := []string{
|
||||||
"https://" + row.Name + "." + row.HomeNodeID + ".orama.network",
|
"https://" + row.Name + "." + row.HomeNodeID + "." + baseDomain,
|
||||||
}
|
}
|
||||||
if row.Subdomain != "" {
|
if row.Subdomain != "" {
|
||||||
urls = append(urls, "https://"+row.Subdomain+".orama.network")
|
urls = append(urls, "https://"+row.Subdomain+"."+baseDomain)
|
||||||
}
|
}
|
||||||
|
|
||||||
deployments[i] = map[string]interface{}{
|
deployments[i] = map[string]interface{}{
|
||||||
|
|||||||
@ -18,6 +18,7 @@ type DeploymentService struct {
|
|||||||
homeNodeManager *deployments.HomeNodeManager
|
homeNodeManager *deployments.HomeNodeManager
|
||||||
portAllocator *deployments.PortAllocator
|
portAllocator *deployments.PortAllocator
|
||||||
logger *zap.Logger
|
logger *zap.Logger
|
||||||
|
baseDomain string // Base domain for deployments (e.g., "dbrs.space")
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewDeploymentService creates a new deployment service
|
// NewDeploymentService creates a new deployment service
|
||||||
@ -32,9 +33,25 @@ func NewDeploymentService(
|
|||||||
homeNodeManager: homeNodeManager,
|
homeNodeManager: homeNodeManager,
|
||||||
portAllocator: portAllocator,
|
portAllocator: portAllocator,
|
||||||
logger: logger,
|
logger: logger,
|
||||||
|
baseDomain: "orama.network", // default
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// SetBaseDomain sets the base domain for deployments
|
||||||
|
func (s *DeploymentService) SetBaseDomain(domain string) {
|
||||||
|
if domain != "" {
|
||||||
|
s.baseDomain = domain
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// BaseDomain returns the configured base domain
|
||||||
|
func (s *DeploymentService) BaseDomain() string {
|
||||||
|
if s.baseDomain == "" {
|
||||||
|
return "orama.network"
|
||||||
|
}
|
||||||
|
return s.baseDomain
|
||||||
|
}
|
||||||
|
|
||||||
// CreateDeployment creates a new deployment
|
// CreateDeployment creates a new deployment
|
||||||
func (s *DeploymentService) CreateDeployment(ctx context.Context, deployment *deployments.Deployment) error {
|
func (s *DeploymentService) CreateDeployment(ctx context.Context, deployment *deployments.Deployment) error {
|
||||||
// Assign home node if not already assigned
|
// Assign home node if not already assigned
|
||||||
@ -249,14 +266,14 @@ func (s *DeploymentService) CreateDNSRecords(ctx context.Context, deployment *de
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Create node-specific record
|
// Create node-specific record
|
||||||
nodeFQDN := fmt.Sprintf("%s.%s.orama.network.", deployment.Name, deployment.HomeNodeID)
|
nodeFQDN := fmt.Sprintf("%s.%s.%s.", deployment.Name, deployment.HomeNodeID, s.BaseDomain())
|
||||||
if err := s.createDNSRecord(ctx, nodeFQDN, "A", nodeIP, deployment.Namespace, deployment.ID); err != nil {
|
if err := s.createDNSRecord(ctx, nodeFQDN, "A", nodeIP, deployment.Namespace, deployment.ID); err != nil {
|
||||||
s.logger.Error("Failed to create node-specific DNS record", zap.Error(err))
|
s.logger.Error("Failed to create node-specific DNS record", zap.Error(err))
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create load-balanced record if subdomain is set
|
// Create load-balanced record if subdomain is set
|
||||||
if deployment.Subdomain != "" {
|
if deployment.Subdomain != "" {
|
||||||
lbFQDN := fmt.Sprintf("%s.orama.network.", deployment.Subdomain)
|
lbFQDN := fmt.Sprintf("%s.%s.", deployment.Subdomain, s.BaseDomain())
|
||||||
if err := s.createDNSRecord(ctx, lbFQDN, "A", nodeIP, deployment.Namespace, deployment.ID); err != nil {
|
if err := s.createDNSRecord(ctx, lbFQDN, "A", nodeIP, deployment.Namespace, deployment.ID); err != nil {
|
||||||
s.logger.Error("Failed to create load-balanced DNS record", zap.Error(err))
|
s.logger.Error("Failed to create load-balanced DNS record", zap.Error(err))
|
||||||
}
|
}
|
||||||
@ -301,11 +318,11 @@ func (s *DeploymentService) getNodeIP(ctx context.Context, nodeID string) (strin
|
|||||||
// BuildDeploymentURLs builds all URLs for a deployment
|
// BuildDeploymentURLs builds all URLs for a deployment
|
||||||
func (s *DeploymentService) BuildDeploymentURLs(deployment *deployments.Deployment) []string {
|
func (s *DeploymentService) BuildDeploymentURLs(deployment *deployments.Deployment) []string {
|
||||||
urls := []string{
|
urls := []string{
|
||||||
fmt.Sprintf("https://%s.%s.orama.network", deployment.Name, deployment.HomeNodeID),
|
fmt.Sprintf("https://%s.%s.%s", deployment.Name, deployment.HomeNodeID, s.BaseDomain()),
|
||||||
}
|
}
|
||||||
|
|
||||||
if deployment.Subdomain != "" {
|
if deployment.Subdomain != "" {
|
||||||
urls = append(urls, fmt.Sprintf("https://%s.orama.network", deployment.Subdomain))
|
urls = append(urls, fmt.Sprintf("https://%s.%s", deployment.Subdomain, s.BaseDomain()))
|
||||||
}
|
}
|
||||||
|
|
||||||
return urls
|
return urls
|
||||||
|
|||||||
@ -439,8 +439,14 @@ func (g *Gateway) domainRoutingMiddleware(next http.Handler) http.Handler {
|
|||||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
host := strings.Split(r.Host, ":")[0] // Strip port
|
host := strings.Split(r.Host, ":")[0] // Strip port
|
||||||
|
|
||||||
// Only process .orama.network domains
|
// Get base domain from config (default to orama.network)
|
||||||
if !strings.HasSuffix(host, ".orama.network") {
|
baseDomain := "orama.network"
|
||||||
|
if g.cfg != nil && g.cfg.BaseDomain != "" {
|
||||||
|
baseDomain = g.cfg.BaseDomain
|
||||||
|
}
|
||||||
|
|
||||||
|
// Only process base domain and its subdomains
|
||||||
|
if !strings.HasSuffix(host, "."+baseDomain) {
|
||||||
next.ServeHTTP(w, r)
|
next.ServeHTTP(w, r)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@ -493,6 +499,12 @@ func (g *Gateway) getDeploymentByDomain(ctx context.Context, domain string) (*de
|
|||||||
// Strip trailing dot if present
|
// Strip trailing dot if present
|
||||||
domain = strings.TrimSuffix(domain, ".")
|
domain = strings.TrimSuffix(domain, ".")
|
||||||
|
|
||||||
|
// Get base domain from config (default to orama.network)
|
||||||
|
baseDomain := "orama.network"
|
||||||
|
if g.cfg != nil && g.cfg.BaseDomain != "" {
|
||||||
|
baseDomain = g.cfg.BaseDomain
|
||||||
|
}
|
||||||
|
|
||||||
// Query deployment by domain (node-specific subdomain or custom domain)
|
// Query deployment by domain (node-specific subdomain or custom domain)
|
||||||
db := g.client.Database()
|
db := g.client.Database()
|
||||||
internalCtx := client.WithInternalAuth(ctx)
|
internalCtx := client.WithInternalAuth(ctx)
|
||||||
@ -501,15 +513,15 @@ func (g *Gateway) getDeploymentByDomain(ctx context.Context, domain string) (*de
|
|||||||
SELECT d.id, d.namespace, d.name, d.type, d.port, d.content_cid, d.status
|
SELECT d.id, d.namespace, d.name, d.type, d.port, d.content_cid, d.status
|
||||||
FROM deployments d
|
FROM deployments d
|
||||||
LEFT JOIN deployment_domains dd ON d.id = dd.deployment_id
|
LEFT JOIN deployment_domains dd ON d.id = dd.deployment_id
|
||||||
WHERE (d.name || '.' || d.home_node_id || '.orama.network' = ?
|
WHERE (d.name || '.' || d.home_node_id || '.' || ? = ?
|
||||||
OR d.name || '.node-' || d.home_node_id || '.orama.network' = ?
|
OR d.name || '.node-' || d.home_node_id || '.' || ? = ?
|
||||||
OR d.name || '.orama.network' = ?
|
OR d.name || '.' || ? = ?
|
||||||
OR dd.domain = ? AND dd.verified_at IS NOT NULL)
|
OR dd.domain = ? AND dd.verified_at IS NOT NULL)
|
||||||
AND d.status = 'active'
|
AND d.status = 'active'
|
||||||
LIMIT 1
|
LIMIT 1
|
||||||
`
|
`
|
||||||
|
|
||||||
result, err := db.Query(internalCtx, query, domain, domain, domain, domain)
|
result, err := db.Query(internalCtx, query, baseDomain, domain, baseDomain, domain, baseDomain, domain, domain)
|
||||||
if err != nil || result.Count == 0 {
|
if err != nil || result.Count == 0 {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|||||||
@ -46,6 +46,7 @@ func (n *Node) startHTTPGateway(ctx context.Context) error {
|
|||||||
EnableHTTPS: n.config.HTTPGateway.HTTPS.Enabled,
|
EnableHTTPS: n.config.HTTPGateway.HTTPS.Enabled,
|
||||||
DomainName: n.config.HTTPGateway.HTTPS.Domain,
|
DomainName: n.config.HTTPGateway.HTTPS.Domain,
|
||||||
TLSCacheDir: n.config.HTTPGateway.HTTPS.CacheDir,
|
TLSCacheDir: n.config.HTTPGateway.HTTPS.CacheDir,
|
||||||
|
BaseDomain: n.config.HTTPGateway.BaseDomain,
|
||||||
}
|
}
|
||||||
|
|
||||||
apiGateway, err := gateway.New(gatewayLogger, gwCfg)
|
apiGateway, err := gateway.New(gatewayLogger, gwCfg)
|
||||||
|
|||||||
@ -1,5 +1,6 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
# install-coredns.sh - Install and configure CoreDNS on Orama Network nodes
|
# install-coredns.sh - Install and configure CoreDNS for DeBros Network nodes
|
||||||
|
# This script sets up a simple wildcard DNS server for deployment subdomains
|
||||||
set -euo pipefail
|
set -euo pipefail
|
||||||
|
|
||||||
COREDNS_VERSION="${COREDNS_VERSION:-1.11.1}"
|
COREDNS_VERSION="${COREDNS_VERSION:-1.11.1}"
|
||||||
@ -9,6 +10,10 @@ CONFIG_DIR="/etc/coredns"
|
|||||||
DATA_DIR="/var/lib/coredns"
|
DATA_DIR="/var/lib/coredns"
|
||||||
USER="debros"
|
USER="debros"
|
||||||
|
|
||||||
|
# Configuration - Override these with environment variables
|
||||||
|
DOMAIN="${DOMAIN:-dbrs.space}"
|
||||||
|
NODE_IP="${NODE_IP:-}" # Auto-detected if not provided
|
||||||
|
|
||||||
# Colors for output
|
# Colors for output
|
||||||
RED='\033[0;31m'
|
RED='\033[0;31m'
|
||||||
GREEN='\033[0;32m'
|
GREEN='\033[0;32m'
|
||||||
@ -35,11 +40,31 @@ fi
|
|||||||
|
|
||||||
# Check if debros user exists
|
# Check if debros user exists
|
||||||
if ! id -u "$USER" >/dev/null 2>&1; then
|
if ! id -u "$USER" >/dev/null 2>&1; then
|
||||||
log_error "User '$USER' does not exist. Please create it first."
|
log_warn "User '$USER' does not exist. Creating..."
|
||||||
|
useradd -r -m -s /bin/bash "$USER" || true
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Auto-detect node IP if not provided
|
||||||
|
if [ -z "$NODE_IP" ]; then
|
||||||
|
NODE_IP=$(hostname -I | awk '{print $1}')
|
||||||
|
log_info "Auto-detected node IP: $NODE_IP"
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ -z "$NODE_IP" ]; then
|
||||||
|
log_error "Could not detect node IP. Please set NODE_IP environment variable."
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
log_info "Installing CoreDNS $COREDNS_VERSION..."
|
log_info "Installing CoreDNS $COREDNS_VERSION for domain $DOMAIN..."
|
||||||
|
|
||||||
|
# Disable systemd-resolved stub listener to free port 53
|
||||||
|
log_info "Configuring systemd-resolved..."
|
||||||
|
mkdir -p /etc/systemd/resolved.conf.d/
|
||||||
|
cat > /etc/systemd/resolved.conf.d/disable-stub.conf << 'EOF'
|
||||||
|
[Resolve]
|
||||||
|
DNSStubListener=no
|
||||||
|
EOF
|
||||||
|
systemctl restart systemd-resolved || true
|
||||||
|
|
||||||
# Download CoreDNS
|
# Download CoreDNS
|
||||||
cd /tmp
|
cd /tmp
|
||||||
@ -66,67 +91,150 @@ mkdir -p "$CONFIG_DIR"
|
|||||||
mkdir -p "$DATA_DIR"
|
mkdir -p "$DATA_DIR"
|
||||||
chown -R "$USER:$USER" "$DATA_DIR"
|
chown -R "$USER:$USER" "$DATA_DIR"
|
||||||
|
|
||||||
# Copy Corefile if provided
|
# Create Corefile for simple wildcard DNS
|
||||||
if [ -f "./configs/coredns/Corefile" ]; then
|
log_info "Creating Corefile..."
|
||||||
log_info "Copying Corefile configuration..."
|
cat > "$CONFIG_DIR/Corefile" << EOF
|
||||||
cp ./configs/coredns/Corefile "$CONFIG_DIR/Corefile"
|
# CoreDNS configuration for $DOMAIN
|
||||||
|
# Serves wildcard DNS for deployment subdomains
|
||||||
|
|
||||||
|
$DOMAIN {
|
||||||
|
file $CONFIG_DIR/db.$DOMAIN
|
||||||
|
log
|
||||||
|
errors
|
||||||
|
}
|
||||||
|
|
||||||
|
# Forward all other queries to upstream DNS
|
||||||
|
. {
|
||||||
|
forward . 8.8.8.8 8.8.4.4 1.1.1.1
|
||||||
|
cache 300
|
||||||
|
errors
|
||||||
|
}
|
||||||
|
EOF
|
||||||
|
|
||||||
|
# Create zone file
|
||||||
|
log_info "Creating zone file for $DOMAIN..."
|
||||||
|
SERIAL=$(date +%Y%m%d%H)
|
||||||
|
cat > "$CONFIG_DIR/db.$DOMAIN" << EOF
|
||||||
|
\$ORIGIN $DOMAIN.
|
||||||
|
\$TTL 300
|
||||||
|
|
||||||
|
@ IN SOA ns1.$DOMAIN. admin.$DOMAIN. (
|
||||||
|
$SERIAL ; Serial
|
||||||
|
3600 ; Refresh
|
||||||
|
1800 ; Retry
|
||||||
|
604800 ; Expire
|
||||||
|
300 ) ; Negative TTL
|
||||||
|
|
||||||
|
; Nameservers
|
||||||
|
@ IN NS ns1.$DOMAIN.
|
||||||
|
@ IN NS ns2.$DOMAIN.
|
||||||
|
@ IN NS ns3.$DOMAIN.
|
||||||
|
|
||||||
|
; Glue records - update these with actual nameserver IPs
|
||||||
|
ns1 IN A $NODE_IP
|
||||||
|
ns2 IN A $NODE_IP
|
||||||
|
ns3 IN A $NODE_IP
|
||||||
|
|
||||||
|
; Root domain
|
||||||
|
@ IN A $NODE_IP
|
||||||
|
|
||||||
|
; Wildcard for all subdomains (deployments)
|
||||||
|
* IN A $NODE_IP
|
||||||
|
EOF
|
||||||
|
|
||||||
|
# Create systemd service
|
||||||
|
log_info "Creating systemd service..."
|
||||||
|
cat > /etc/systemd/system/coredns.service << EOF
|
||||||
|
[Unit]
|
||||||
|
Description=CoreDNS DNS Server
|
||||||
|
Documentation=https://coredns.io
|
||||||
|
After=network.target
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Type=simple
|
||||||
|
User=root
|
||||||
|
ExecStart=$INSTALL_DIR/coredns -conf $CONFIG_DIR/Corefile
|
||||||
|
Restart=on-failure
|
||||||
|
RestartSec=5
|
||||||
|
|
||||||
|
# Security hardening
|
||||||
|
NoNewPrivileges=true
|
||||||
|
ProtectSystem=full
|
||||||
|
ProtectHome=true
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
||||||
|
EOF
|
||||||
|
|
||||||
|
systemctl daemon-reload
|
||||||
|
|
||||||
|
# Set up iptables redirect for port 80 -> gateway port 6001
|
||||||
|
log_info "Setting up port 80 redirect to gateway port 6001..."
|
||||||
|
iptables -t nat -C PREROUTING -p tcp --dport 80 -j REDIRECT --to-port 6001 2>/dev/null || \
|
||||||
|
iptables -t nat -A PREROUTING -p tcp --dport 80 -j REDIRECT --to-port 6001
|
||||||
|
|
||||||
|
# Make iptables rules persistent
|
||||||
|
mkdir -p /etc/network/if-pre-up.d/
|
||||||
|
cat > /etc/network/if-pre-up.d/iptables-redirect << 'EOF'
|
||||||
|
#!/bin/sh
|
||||||
|
iptables -t nat -C PREROUTING -p tcp --dport 80 -j REDIRECT --to-port 6001 2>/dev/null || \
|
||||||
|
iptables -t nat -A PREROUTING -p tcp --dport 80 -j REDIRECT --to-port 6001
|
||||||
|
EOF
|
||||||
|
chmod +x /etc/network/if-pre-up.d/iptables-redirect
|
||||||
|
|
||||||
|
# Configure firewall
|
||||||
|
log_info "Configuring firewall..."
|
||||||
|
if command -v ufw >/dev/null 2>&1; then
|
||||||
|
ufw allow 53/tcp >/dev/null 2>&1 || true
|
||||||
|
ufw allow 53/udp >/dev/null 2>&1 || true
|
||||||
|
ufw allow 80/tcp >/dev/null 2>&1 || true
|
||||||
|
log_info "Firewall rules added for ports 53 (DNS) and 80 (HTTP)"
|
||||||
else
|
else
|
||||||
log_warn "Corefile not found in ./configs/coredns/Corefile"
|
log_warn "UFW not found. Please manually configure firewall for ports 53 and 80"
|
||||||
log_warn "Please copy your Corefile to $CONFIG_DIR/Corefile manually"
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Install systemd service
|
# Enable and start CoreDNS
|
||||||
log_info "Installing systemd service..."
|
log_info "Starting CoreDNS..."
|
||||||
if [ -f "./configs/coredns/coredns.service" ]; then
|
systemctl enable coredns
|
||||||
cp ./configs/coredns/coredns.service /etc/systemd/system/
|
systemctl start coredns
|
||||||
systemctl daemon-reload
|
|
||||||
log_info "Systemd service installed"
|
|
||||||
else
|
|
||||||
log_warn "Service file not found in ./configs/coredns/coredns.service"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# Verify installation
|
# Verify installation
|
||||||
log_info "Verifying installation..."
|
sleep 2
|
||||||
if command -v coredns >/dev/null 2>&1; then
|
if systemctl is-active --quiet coredns; then
|
||||||
VERSION_OUTPUT=$(coredns -version 2>&1 | head -1)
|
log_info "CoreDNS is running"
|
||||||
log_info "Installed: $VERSION_OUTPUT"
|
|
||||||
else
|
else
|
||||||
log_error "CoreDNS installation verification failed"
|
log_error "CoreDNS failed to start. Check: journalctl -u coredns"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Firewall configuration reminder
|
# Test DNS resolution
|
||||||
log_warn "IMPORTANT: Configure firewall to allow DNS traffic"
|
log_info "Testing DNS resolution..."
|
||||||
log_warn " - UDP/TCP port 53 (DNS)"
|
if dig @localhost test.$DOMAIN +short | grep -q "$NODE_IP"; then
|
||||||
log_warn " - TCP port 8080 (health check)"
|
log_info "DNS test passed: test.$DOMAIN resolves to $NODE_IP"
|
||||||
log_warn " - TCP port 9153 (metrics)"
|
else
|
||||||
echo
|
log_warn "DNS test failed or returned unexpected result"
|
||||||
log_warn "Example firewall rules:"
|
fi
|
||||||
log_warn " sudo ufw allow 53/tcp"
|
|
||||||
log_warn " sudo ufw allow 53/udp"
|
|
||||||
log_warn " sudo ufw allow 8080/tcp"
|
|
||||||
log_warn " sudo ufw allow 9153/tcp"
|
|
||||||
|
|
||||||
# Service management instructions
|
|
||||||
echo
|
|
||||||
log_info "Installation complete!"
|
|
||||||
echo
|
|
||||||
log_info "To configure CoreDNS:"
|
|
||||||
log_info " 1. Edit $CONFIG_DIR/Corefile"
|
|
||||||
log_info " 2. Ensure RQLite is running and accessible"
|
|
||||||
echo
|
|
||||||
log_info "To start CoreDNS:"
|
|
||||||
log_info " sudo systemctl enable coredns"
|
|
||||||
log_info " sudo systemctl start coredns"
|
|
||||||
echo
|
|
||||||
log_info "To check status:"
|
|
||||||
log_info " sudo systemctl status coredns"
|
|
||||||
log_info " sudo journalctl -u coredns -f"
|
|
||||||
echo
|
|
||||||
log_info "To test DNS:"
|
|
||||||
log_info " dig @localhost test.orama.network"
|
|
||||||
|
|
||||||
# Cleanup
|
# Cleanup
|
||||||
rm -f /tmp/coredns.tgz
|
rm -f /tmp/coredns.tgz
|
||||||
|
|
||||||
|
echo
|
||||||
|
log_info "============================================"
|
||||||
|
log_info "CoreDNS installation complete!"
|
||||||
|
log_info "============================================"
|
||||||
|
echo
|
||||||
|
log_info "Configuration:"
|
||||||
|
log_info " Domain: $DOMAIN"
|
||||||
|
log_info " Node IP: $NODE_IP"
|
||||||
|
log_info " Corefile: $CONFIG_DIR/Corefile"
|
||||||
|
log_info " Zone file: $CONFIG_DIR/db.$DOMAIN"
|
||||||
|
echo
|
||||||
|
log_info "Commands:"
|
||||||
|
log_info " Status: sudo systemctl status coredns"
|
||||||
|
log_info " Logs: sudo journalctl -u coredns -f"
|
||||||
|
log_info " Test: dig @localhost anything.$DOMAIN"
|
||||||
|
echo
|
||||||
|
log_info "Note: Update the zone file with other nameserver IPs for redundancy:"
|
||||||
|
log_info " sudo vi $CONFIG_DIR/db.$DOMAIN"
|
||||||
|
echo
|
||||||
log_info "Done!"
|
log_info "Done!"
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user