mirror of
				https://github.com/coredns/coredns.git
				synced 2025-10-30 17:53:21 -04:00 
			
		
		
		
	Document fallthrough and fix rewrite (#537)
* Document fallthrough and fix *reverse* While documenting the fallthrough behavior and testing it I noticed the did not properly work. This PR does a tiny bit too much as it - Documents fallthrough - Fixes fallthrough in reverse - Makes directives_generate complain on duplicate priorities - Moved reverse *before* file in middleware.cfg - Add a test that tests the reverse fallthrough behavior with a file backend Fixes #515 * ....and fix the tests
This commit is contained in:
		| @@ -23,12 +23,12 @@ var directives = []string{ | |||||||
| 	"rewrite", | 	"rewrite", | ||||||
| 	"loadbalance", | 	"loadbalance", | ||||||
| 	"dnssec", | 	"dnssec", | ||||||
|  | 	"reverse", | ||||||
| 	"file", | 	"file", | ||||||
| 	"auto", | 	"auto", | ||||||
| 	"secondary", | 	"secondary", | ||||||
| 	"etcd", | 	"etcd", | ||||||
| 	"kubernetes", | 	"kubernetes", | ||||||
| 	"reverse", |  | ||||||
| 	"proxy", | 	"proxy", | ||||||
| 	"whoami", | 	"whoami", | ||||||
| 	"erratic", | 	"erratic", | ||||||
|   | |||||||
| @@ -37,6 +37,9 @@ func main() { | |||||||
| 		priority, err := strconv.Atoi(items[0]) | 		priority, err := strconv.Atoi(items[0]) | ||||||
| 		fatalIfErr(err) | 		fatalIfErr(err) | ||||||
|  |  | ||||||
|  | 		if v, ok := md[priority]; ok { | ||||||
|  | 			log.Fatalf("Duplicate priority '%d', slot already taken by %q", priority, v) | ||||||
|  | 		} | ||||||
| 		md[priority] = items[1] | 		md[priority] = items[1] | ||||||
| 		mi[items[1]] = middlewarePath + items[2] // Default, unless overriden by 3rd arg | 		mi[items[1]] = middlewarePath + items[2] // Default, unless overriden by 3rd arg | ||||||
|  |  | ||||||
|   | |||||||
| @@ -32,12 +32,12 @@ | |||||||
| 110:rewrite:rewrite | 110:rewrite:rewrite | ||||||
| 120:loadbalance:loadbalance | 120:loadbalance:loadbalance | ||||||
| 130:dnssec:dnssec | 130:dnssec:dnssec | ||||||
| 140:file:file | 140:reverse:reverse | ||||||
| 150:auto:auto | 150:file:file | ||||||
| 160:secondary:secondary | 160:auto:auto | ||||||
| 170:etcd:etcd | 170:secondary:secondary | ||||||
| 180:kubernetes:kubernetes | 180:etcd:etcd | ||||||
| 185:reverse:reverse | 190:kubernetes:kubernetes | ||||||
| 190:proxy:proxy | 200:proxy:proxy | ||||||
| 210:whoami:whoami | 210:whoami:whoami | ||||||
| 220:erratic:erratic | 220:erratic:erratic | ||||||
|   | |||||||
| @@ -29,9 +29,12 @@ So CoreDNS treats: | |||||||
| as special and will then assume nothing has written to the client. In all other cases it is assumes | as special and will then assume nothing has written to the client. In all other cases it is assumes | ||||||
| something has been written to the client (by the middleware). | something has been written to the client (by the middleware). | ||||||
|  |  | ||||||
| ## Hooking it up | ## Hooking It Up | ||||||
|  |  | ||||||
| TODO(miek): text here on how to hook up middleware. | See a couple of blog posts on how to write and add middleware to CoreDNS: | ||||||
|  |  | ||||||
|  | * <https://blog.coredns.io/#> TO BE PUBLISHED. | ||||||
|  | * <https://blog.coredns.io/2016/12/19/writing-middleware-for-coredns/>, slightly older, but useful. | ||||||
|  |  | ||||||
| ## Metrics | ## Metrics | ||||||
|  |  | ||||||
| @@ -60,3 +63,72 @@ We use the Unix manual page style: | |||||||
| * Optional text: in block quotes: `[optional]`. | * Optional text: in block quotes: `[optional]`. | ||||||
| * Use three dots to indicate multiple options are allowed: `arg...`. | * Use three dots to indicate multiple options are allowed: `arg...`. | ||||||
| * Item used literal: `literal`. | * Item used literal: `literal`. | ||||||
|  |  | ||||||
|  | ### Example Domain Names | ||||||
|  |  | ||||||
|  | Please be sure to use `example.org` or `example.net` in any examples you provide. These are the | ||||||
|  | standard domain names created for this purpose. | ||||||
|  |  | ||||||
|  | ## Fallthrough | ||||||
|  |  | ||||||
|  | In a perfect world the following would be true for middleware: "Either you are responsible for | ||||||
|  | a zone or not". If the answer is "not", the middleware should call the next middleware in the chain. | ||||||
|  | If "yes" it should handle *all* names that fall in this zone and the names below - i.e. it should | ||||||
|  | handle the entire domain. | ||||||
|  |  | ||||||
|  | ~~~ txt | ||||||
|  | . { | ||||||
|  |     file example.org db.example | ||||||
|  | } | ||||||
|  | ~~~ | ||||||
|  | In this example the *file* middleware is handling all names below (and including) `example.org`. If | ||||||
|  | a query comes in that is not a subdomain (or equal to) `example.org` the next middleware is called. | ||||||
|  |  | ||||||
|  | Now, the world isn't perfect, and there are good reasons to "fallthrough" to the next middlware, | ||||||
|  | meaning a middleware is only responsible for a subset of names within the zone. The first of these | ||||||
|  | to appear was the *reverse* middleware that synthesis PTR and A/AAAA responses (useful with IPv6). | ||||||
|  |  | ||||||
|  | The nature of the *reverse* middleware is such that it only deals with A,AAAA and PTR and then only | ||||||
|  | for a subset of the names. Ideally you would want to layer *reverse* **in front off** another | ||||||
|  | middleware such as *file* or *auto* (or even *proxy*). This means *reverse* handles some special | ||||||
|  | reverse cases and **all other** request are handled by the backing middleware. This is exactly what | ||||||
|  | "fallthrough" does. To keep things explicit we've opted that middlewares implement such behavior | ||||||
|  | should implement a `fallthrough` keyword. | ||||||
|  |  | ||||||
|  | ### Example Fallthrough Usage | ||||||
|  |  | ||||||
|  | The following Corefile example, sets up the *reverse* middleware, but disables fallthrough. It | ||||||
|  | also defines a zonefile for use with the *file* middleware for other names in the `compute.internal`. | ||||||
|  |  | ||||||
|  | ~~~ txt | ||||||
|  | arpa compute.internal { | ||||||
|  |     reverse 10.32.0.0/16 { | ||||||
|  |         hostname ip-{ip}.{zone[2]} | ||||||
|  |         #fallthrough | ||||||
|  |     } | ||||||
|  |     file db.compute.internal compute.internal | ||||||
|  | } | ||||||
|  | ~~~ | ||||||
|  |  | ||||||
|  | This works for returning a response to a PTR request: | ||||||
|  |  | ||||||
|  | ~~~ sh | ||||||
|  | % dig +nocmd @localhost +noall +ans -x 10.32.0.1 | ||||||
|  | 1.0.32.10.in-addr.arpa.	3600	IN	PTR	ip-10-32-0-1.compute.internal. | ||||||
|  | ~~~ | ||||||
|  |  | ||||||
|  | And for the forward: | ||||||
|  |  | ||||||
|  | ~~~ sh | ||||||
|  | % dig +nocmd @localhost +noall +ans A ip-10-32-0-1.compute.internal | ||||||
|  | ip-10-32-0-1.compute.internal. 3600 IN	A	10.32.0.1 | ||||||
|  | ~~~ | ||||||
|  |  | ||||||
|  | But a query for `mx compute.internal` will return SERVFAIL. Now when we remove the '#' from | ||||||
|  | fallthrough and reload (on Unix: `kill -SIGUSR1 $(pidof coredns)`) CoreDNS, we *should* get an | ||||||
|  | answer for the MX query: | ||||||
|  |  | ||||||
|  | ~~~ sh | ||||||
|  | % dig +nocmd @localhost +noall +ans MX compute.internal | ||||||
|  | compute.internal.	3600	IN	MX	10 mx.compute.internal. | ||||||
|  | ~~~ | ||||||
|   | |||||||
| @@ -13,7 +13,6 @@ type network struct { | |||||||
| 	Template     string | 	Template     string | ||||||
| 	TTL          uint32 | 	TTL          uint32 | ||||||
| 	RegexMatchIP *regexp.Regexp | 	RegexMatchIP *regexp.Regexp | ||||||
| 	Fallthrough  bool |  | ||||||
| } | } | ||||||
|  |  | ||||||
| // TODO: we might want to get rid of these regexes. | // TODO: we might want to get rid of these regexes. | ||||||
|   | |||||||
| @@ -13,16 +13,14 @@ import ( | |||||||
|  |  | ||||||
| // Reverse provides dynamic reverse DNS and the related forward RR. | // Reverse provides dynamic reverse DNS and the related forward RR. | ||||||
| type Reverse struct { | type Reverse struct { | ||||||
| 	Next     middleware.Handler | 	Next        middleware.Handler | ||||||
| 	Networks networks | 	Networks    networks | ||||||
|  | 	Fallthrough bool | ||||||
| } | } | ||||||
|  |  | ||||||
| // ServeDNS implements the middleware.Handler interface. | // ServeDNS implements the middleware.Handler interface. | ||||||
| func (re Reverse) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (int, error) { | func (re Reverse) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (int, error) { | ||||||
| 	var ( | 	var rr dns.RR | ||||||
| 		rr          dns.RR |  | ||||||
| 		fallThrough bool |  | ||||||
| 	) |  | ||||||
|  |  | ||||||
| 	state := request.Request{W: w, Req: r} | 	state := request.Request{W: w, Req: r} | ||||||
| 	m := new(dns.Msg) | 	m := new(dns.Msg) | ||||||
| @@ -42,7 +40,6 @@ func (re Reverse) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg | |||||||
| 		// loop through the configured networks | 		// loop through the configured networks | ||||||
| 		for _, n := range re.Networks { | 		for _, n := range re.Networks { | ||||||
| 			if n.IPnet.Contains(ip) { | 			if n.IPnet.Contains(ip) { | ||||||
| 				fallThrough = n.Fallthrough |  | ||||||
| 				rr = &dns.PTR{ | 				rr = &dns.PTR{ | ||||||
| 					Hdr: dns.RR_Header{Name: state.QName(), Rrtype: dns.TypePTR, Class: dns.ClassINET, Ttl: n.TTL}, | 					Hdr: dns.RR_Header{Name: state.QName(), Rrtype: dns.TypePTR, Class: dns.ClassINET, Ttl: n.TTL}, | ||||||
| 					Ptr: n.ipToHostname(ip), | 					Ptr: n.ipToHostname(ip), | ||||||
| @@ -54,7 +51,6 @@ func (re Reverse) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg | |||||||
| 	case dns.TypeA: | 	case dns.TypeA: | ||||||
| 		for _, n := range re.Networks { | 		for _, n := range re.Networks { | ||||||
| 			if dns.IsSubDomain(n.Zone, state.Name()) { | 			if dns.IsSubDomain(n.Zone, state.Name()) { | ||||||
| 				fallThrough = n.Fallthrough |  | ||||||
|  |  | ||||||
| 				// skip if requesting an v4 address and network is not v4 | 				// skip if requesting an v4 address and network is not v4 | ||||||
| 				if n.IPnet.IP.To4() == nil { | 				if n.IPnet.IP.To4() == nil { | ||||||
| @@ -75,7 +71,6 @@ func (re Reverse) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg | |||||||
| 	case dns.TypeAAAA: | 	case dns.TypeAAAA: | ||||||
| 		for _, n := range re.Networks { | 		for _, n := range re.Networks { | ||||||
| 			if dns.IsSubDomain(n.Zone, state.Name()) { | 			if dns.IsSubDomain(n.Zone, state.Name()) { | ||||||
| 				fallThrough = n.Fallthrough |  | ||||||
|  |  | ||||||
| 				// Do not use To16 which tries to make v4 in v6 | 				// Do not use To16 which tries to make v4 in v6 | ||||||
| 				if n.IPnet.IP.To4() != nil { | 				if n.IPnet.IP.To4() != nil { | ||||||
| @@ -95,14 +90,17 @@ func (re Reverse) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg | |||||||
|  |  | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if rr == nil && !fallThrough { | 	if rr != nil { | ||||||
| 		return middleware.NextOrFailure(re.Name(), re.Next, ctx, w, r) | 		m.Answer = append(m.Answer, rr) | ||||||
|  | 		state.SizeAndDo(m) | ||||||
|  | 		w.WriteMsg(m) | ||||||
|  | 		return dns.RcodeSuccess, nil | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	m.Answer = append(m.Answer, rr) | 	if re.Fallthrough { | ||||||
| 	state.SizeAndDo(m) | 		return middleware.NextOrFailure(re.Name(), re.Next, ctx, w, r) | ||||||
| 	w.WriteMsg(m) | 	} | ||||||
| 	return dns.RcodeSuccess, nil | 	return dns.RcodeServerFailure, nil | ||||||
| } | } | ||||||
|  |  | ||||||
| // Name implements the Handler interface. | // Name implements the Handler interface. | ||||||
|   | |||||||
| @@ -21,29 +21,29 @@ func init() { | |||||||
| } | } | ||||||
|  |  | ||||||
| func setupReverse(c *caddy.Controller) error { | func setupReverse(c *caddy.Controller) error { | ||||||
| 	networks, err := reverseParse(c) | 	networks, fallThrough, err := reverseParse(c) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return middleware.Error("reverse", err) | 		return middleware.Error("reverse", err) | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	dnsserver.GetConfig(c).AddMiddleware(func(next middleware.Handler) middleware.Handler { | 	dnsserver.GetConfig(c).AddMiddleware(func(next middleware.Handler) middleware.Handler { | ||||||
| 		return Reverse{Next: next, Networks: networks} | 		return Reverse{Next: next, Networks: networks, Fallthrough: fallThrough} | ||||||
| 	}) | 	}) | ||||||
|  |  | ||||||
| 	return nil | 	return nil | ||||||
| } | } | ||||||
|  |  | ||||||
| func reverseParse(c *caddy.Controller) (networks, error) { | func reverseParse(c *caddy.Controller) (nets networks, fall bool, err error) { | ||||||
| 	var err error |  | ||||||
|  |  | ||||||
| 	// normalize zones, validation is almost done by dnsserver | 	// normalize zones, validation is almost done by dnsserver | ||||||
|  | 	// TODO(miek): need sane helpers for these. | ||||||
| 	zones := make([]string, len(c.ServerBlockKeys)) | 	zones := make([]string, len(c.ServerBlockKeys)) | ||||||
|  |  | ||||||
| 	for i, str := range c.ServerBlockKeys { | 	for i, str := range c.ServerBlockKeys { | ||||||
| 		host, _, _ := net.SplitHostPort(str) | 		host, _, _ := net.SplitHostPort(str) | ||||||
| 		zones[i] = strings.ToLower(host) | 		zones[i] = strings.ToLower(host) | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	networks := networks{} |  | ||||||
| 	for c.Next() { | 	for c.Next() { | ||||||
| 		if c.Val() == "reverse" { | 		if c.Val() == "reverse" { | ||||||
|  |  | ||||||
| @@ -56,42 +56,41 @@ func reverseParse(c *caddy.Controller) (networks, error) { | |||||||
| 				} | 				} | ||||||
| 				_, ipnet, err := net.ParseCIDR(cidr) | 				_, ipnet, err := net.ParseCIDR(cidr) | ||||||
| 				if err != nil { | 				if err != nil { | ||||||
| 					return nil, c.Errf("network needs to be CIDR formatted: %q\n", cidr) | 					return nil, false, c.Errf("network needs to be CIDR formatted: %q\n", cidr) | ||||||
| 				} | 				} | ||||||
| 				cidrs = append(cidrs, ipnet) | 				cidrs = append(cidrs, ipnet) | ||||||
| 			} | 			} | ||||||
| 			if len(cidrs) == 0 { | 			if len(cidrs) == 0 { | ||||||
| 				return nil, c.ArgErr() | 				return nil, false, c.ArgErr() | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 			// set defaults | 			// set defaults | ||||||
| 			var ( | 			var ( | ||||||
| 				template = "ip-" + templateNameIP + ".{zone[1]}" | 				template = "ip-" + templateNameIP + ".{zone[1]}" | ||||||
| 				ttl      = 60 | 				ttl      = 60 | ||||||
| 				fall     = false |  | ||||||
| 			) | 			) | ||||||
| 			for c.NextBlock() { | 			for c.NextBlock() { | ||||||
| 				switch c.Val() { | 				switch c.Val() { | ||||||
| 				case "hostname": | 				case "hostname": | ||||||
| 					if !c.NextArg() { | 					if !c.NextArg() { | ||||||
| 						return nil, c.ArgErr() | 						return nil, false, c.ArgErr() | ||||||
| 					} | 					} | ||||||
| 					template = c.Val() | 					template = c.Val() | ||||||
|  |  | ||||||
| 				case "ttl": | 				case "ttl": | ||||||
| 					if !c.NextArg() { | 					if !c.NextArg() { | ||||||
| 						return nil, c.ArgErr() | 						return nil, false, c.ArgErr() | ||||||
| 					} | 					} | ||||||
| 					ttl, err = strconv.Atoi(c.Val()) | 					ttl, err = strconv.Atoi(c.Val()) | ||||||
| 					if err != nil { | 					if err != nil { | ||||||
| 						return nil, err | 						return nil, false, err | ||||||
| 					} | 					} | ||||||
|  |  | ||||||
| 				case "fallthrough": | 				case "fallthrough": | ||||||
| 					fall = true | 					fall = true | ||||||
|  |  | ||||||
| 				default: | 				default: | ||||||
| 					return nil, c.ArgErr() | 					return nil, false, c.ArgErr() | ||||||
| 				} | 				} | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
| @@ -109,7 +108,7 @@ func reverseParse(c *caddy.Controller) (networks, error) { | |||||||
| 			// extract zone from template | 			// extract zone from template | ||||||
| 			templateZone := strings.SplitAfterN(template, ".", 2) | 			templateZone := strings.SplitAfterN(template, ".", 2) | ||||||
| 			if len(templateZone) != 2 || templateZone[1] == "" { | 			if len(templateZone) != 2 || templateZone[1] == "" { | ||||||
| 				return nil, c.Errf("cannot find domain in template '%v'", template) | 				return nil, false, c.Errf("cannot find domain in template '%v'", template) | ||||||
| 			} | 			} | ||||||
|  |  | ||||||
| 			// Create for each configured network in this stanza | 			// Create for each configured network in this stanza | ||||||
| @@ -126,22 +125,21 @@ func reverseParse(c *caddy.Controller) (networks, error) { | |||||||
| 						regexIP, | 						regexIP, | ||||||
| 						1) + "$") | 						1) + "$") | ||||||
| 				if err != nil { | 				if err != nil { | ||||||
| 					return nil, err | 					return nil, false, err | ||||||
| 				} | 				} | ||||||
|  |  | ||||||
| 				networks = append(networks, network{ | 				nets = append(nets, network{ | ||||||
| 					IPnet:        ipnet, | 					IPnet:        ipnet, | ||||||
| 					Zone:         templateZone[1], | 					Zone:         templateZone[1], | ||||||
| 					Template:     template, | 					Template:     template, | ||||||
| 					RegexMatchIP: regex, | 					RegexMatchIP: regex, | ||||||
| 					TTL:          uint32(ttl), | 					TTL:          uint32(ttl), | ||||||
| 					Fallthrough:  fall, |  | ||||||
| 				}) | 				}) | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	// sort by cidr | 	// sort by cidr | ||||||
| 	sort.Sort(networks) | 	sort.Sort(nets) | ||||||
| 	return networks, nil | 	return nets, fall, nil | ||||||
| } | } | ||||||
|   | |||||||
| @@ -36,7 +36,6 @@ func TestSetupParse(t *testing.T) { | |||||||
| 				Zone:         "domain.com.", | 				Zone:         "domain.com.", | ||||||
| 				TTL:          60, | 				TTL:          60, | ||||||
| 				RegexMatchIP: regexIP6, | 				RegexMatchIP: regexIP6, | ||||||
| 				Fallthrough:  false, |  | ||||||
| 			}}, | 			}}, | ||||||
| 		}, | 		}, | ||||||
| 		{ | 		{ | ||||||
| @@ -112,14 +111,12 @@ func TestSetupParse(t *testing.T) { | |||||||
| 				Zone:         "dynamic.domain.com.", | 				Zone:         "dynamic.domain.com.", | ||||||
| 				TTL:          50, | 				TTL:          50, | ||||||
| 				RegexMatchIP: regexIpv6dynamic, | 				RegexMatchIP: regexIpv6dynamic, | ||||||
| 				Fallthrough:  false, |  | ||||||
| 			}, network{ | 			}, network{ | ||||||
| 				IPnet:        net4, | 				IPnet:        net4, | ||||||
| 				Template:     "dynamic-{ip}-vpn.dynamic.domain.com.", | 				Template:     "dynamic-{ip}-vpn.dynamic.domain.com.", | ||||||
| 				Zone:         "dynamic.domain.com.", | 				Zone:         "dynamic.domain.com.", | ||||||
| 				TTL:          60, | 				TTL:          60, | ||||||
| 				RegexMatchIP: regexIpv4vpndynamic, | 				RegexMatchIP: regexIpv4vpndynamic, | ||||||
| 				Fallthrough:  true, |  | ||||||
| 			}}, | 			}}, | ||||||
| 		}, | 		}, | ||||||
| 		{ | 		{ | ||||||
| @@ -136,14 +133,12 @@ func TestSetupParse(t *testing.T) { | |||||||
| 				Zone:         "dynamic.domain.com.", | 				Zone:         "dynamic.domain.com.", | ||||||
| 				TTL:          50, | 				TTL:          50, | ||||||
| 				RegexMatchIP: regexIpv6dynamic, | 				RegexMatchIP: regexIpv6dynamic, | ||||||
| 				Fallthrough:  true, |  | ||||||
| 			}, network{ | 			}, network{ | ||||||
| 				IPnet:        net4, | 				IPnet:        net4, | ||||||
| 				Template:     "dynamic-{ip}-intern.dynamic.domain.com.", | 				Template:     "dynamic-{ip}-intern.dynamic.domain.com.", | ||||||
| 				Zone:         "dynamic.domain.com.", | 				Zone:         "dynamic.domain.com.", | ||||||
| 				TTL:          50, | 				TTL:          50, | ||||||
| 				RegexMatchIP: regexIpv4dynamic, | 				RegexMatchIP: regexIpv4dynamic, | ||||||
| 				Fallthrough:  true, |  | ||||||
| 			}}, | 			}}, | ||||||
| 		}, | 		}, | ||||||
| 		{ | 		{ | ||||||
| @@ -160,25 +155,23 @@ func TestSetupParse(t *testing.T) { | |||||||
| 				Zone:         "dynamic.domain.com.", | 				Zone:         "dynamic.domain.com.", | ||||||
| 				TTL:          300, | 				TTL:          300, | ||||||
| 				RegexMatchIP: regexIpv6dynamic, | 				RegexMatchIP: regexIpv6dynamic, | ||||||
| 				Fallthrough:  true, |  | ||||||
| 			}}, | 			}}, | ||||||
| 		}, | 		}, | ||||||
| 	} | 	} | ||||||
| 	for i, test := range tests { | 	for i, test := range tests { | ||||||
| 		c := caddy.NewTestController("dns", test.inputFileRules) | 		c := caddy.NewTestController("dns", test.inputFileRules) | ||||||
| 		c.ServerBlockKeys = serverBlockKeys | 		c.ServerBlockKeys = serverBlockKeys | ||||||
| 		networks, err := reverseParse(c) | 		networks, _, err := reverseParse(c) | ||||||
|  |  | ||||||
| 		if err == nil && test.shouldErr { | 		if err == nil && test.shouldErr { | ||||||
| 			t.Fatalf("Test %d expected errors, but got no error", i) | 			t.Fatalf("Test %d expected errors, but got no error", i) | ||||||
| 		} else if err != nil && !test.shouldErr { | 		} else if err != nil && !test.shouldErr { | ||||||
| 			t.Fatalf("Test %d expected no errors, but got '%v'", i, err) | 			t.Fatalf("Test %d expected no errors, but got '%v'", i, err) | ||||||
| 		} else { | 		} | ||||||
| 			for j, n := range networks { | 		for j, n := range networks { | ||||||
| 				reflect.DeepEqual(test.networks[j], n) | 			reflect.DeepEqual(test.networks[j], n) | ||||||
| 				if !reflect.DeepEqual(test.networks[j], n) { | 			if !reflect.DeepEqual(test.networks[j], n) { | ||||||
| 					t.Fatalf("Test %d/%d expected %v, got %v", i, j, test.networks[j], n) | 				t.Fatalf("Test %d/%d expected %v, got %v", i, j, test.networks[j], n) | ||||||
| 				} |  | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
|   | |||||||
							
								
								
									
										95
									
								
								test/reverse_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										95
									
								
								test/reverse_test.go
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,95 @@ | |||||||
|  | package test | ||||||
|  |  | ||||||
|  | import ( | ||||||
|  | 	"io/ioutil" | ||||||
|  | 	"log" | ||||||
|  | 	"testing" | ||||||
|  |  | ||||||
|  | 	"github.com/miekg/coredns/middleware/proxy" | ||||||
|  | 	"github.com/miekg/coredns/middleware/test" | ||||||
|  | 	"github.com/miekg/coredns/request" | ||||||
|  |  | ||||||
|  | 	"github.com/miekg/dns" | ||||||
|  | ) | ||||||
|  |  | ||||||
|  | func TestReverseFallthrough(t *testing.T) { | ||||||
|  | 	t.Parallel() | ||||||
|  | 	name, rm, err := test.TempFile(".", exampleOrg) | ||||||
|  | 	if err != nil { | ||||||
|  | 		t.Fatalf("failed to created zone: %s", err) | ||||||
|  | 	} | ||||||
|  | 	defer rm() | ||||||
|  |  | ||||||
|  | 	corefile := `arpa:0 example.org:0 { | ||||||
|  |     reverse 10.32.0.0/16 { | ||||||
|  |         hostname ip-{ip}.{zone[2]} | ||||||
|  |         #fallthrough | ||||||
|  |     } | ||||||
|  |     file ` + name + ` example.org | ||||||
|  | } | ||||||
|  | ` | ||||||
|  |  | ||||||
|  | 	i, err := CoreDNSServer(corefile) | ||||||
|  | 	if err != nil { | ||||||
|  | 		t.Fatalf("Could not get CoreDNS serving instance: %s", err) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	udp, _ := CoreDNSServerPorts(i, 0) | ||||||
|  | 	if udp == "" { | ||||||
|  | 		t.Fatalf("Could not get UDP listening port") | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	log.SetOutput(ioutil.Discard) | ||||||
|  |  | ||||||
|  | 	p := proxy.NewLookup([]string{udp}) | ||||||
|  | 	state := request.Request{W: &test.ResponseWriter{}, Req: new(dns.Msg)} | ||||||
|  | 	resp, err := p.Lookup(state, "example.org.", dns.TypeA) | ||||||
|  | 	if err != nil { | ||||||
|  | 		t.Fatal("Expected to receive reply, but didn't") | ||||||
|  | 	} | ||||||
|  | 	// Reply should be SERVFAIL because of no fallthrough | ||||||
|  | 	if resp.Rcode != dns.RcodeServerFailure { | ||||||
|  | 		t.Fatalf("Expected SERVFAIL, but got: %d", resp.Rcode) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	// Stop the server. | ||||||
|  | 	i.Stop() | ||||||
|  |  | ||||||
|  | 	// And redo with fallthrough enabled | ||||||
|  |  | ||||||
|  | 	corefile = `arpa:0 example.org:0 { | ||||||
|  |     reverse 10.32.0.0/16 { | ||||||
|  |         hostname ip-{ip}.{zone[2]} | ||||||
|  |         fallthrough | ||||||
|  |     } | ||||||
|  |     file ` + name + ` example.org | ||||||
|  | } | ||||||
|  | ` | ||||||
|  |  | ||||||
|  | 	i, err = CoreDNSServer(corefile) | ||||||
|  | 	if err != nil { | ||||||
|  | 		t.Fatalf("Could not get CoreDNS serving instance: %s", err) | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	udp, _ = CoreDNSServerPorts(i, 0) | ||||||
|  | 	if udp == "" { | ||||||
|  | 		t.Fatalf("Could not get UDP listening port") | ||||||
|  | 	} | ||||||
|  | 	defer i.Stop() | ||||||
|  |  | ||||||
|  | 	p = proxy.NewLookup([]string{udp}) | ||||||
|  | 	resp, err = p.Lookup(state, "example.org.", dns.TypeA) | ||||||
|  | 	if err != nil { | ||||||
|  | 		t.Fatal("Expected to receive reply, but didn't") | ||||||
|  | 	} | ||||||
|  |  | ||||||
|  | 	if len(resp.Answer) == 0 { | ||||||
|  | 		t.Error("Expected to at least one RR in the answer section, got none") | ||||||
|  | 	} | ||||||
|  | 	if resp.Answer[0].Header().Rrtype != dns.TypeA { | ||||||
|  | 		t.Errorf("Expected RR to A, got: %d", resp.Answer[0].Header().Rrtype) | ||||||
|  | 	} | ||||||
|  | 	if resp.Answer[0].(*dns.A).A.String() != "127.0.0.1" { | ||||||
|  | 		t.Errorf("Expected 127.0.0.1, got: %s", resp.Answer[0].(*dns.A).A.String()) | ||||||
|  | 	} | ||||||
|  | } | ||||||
		Reference in New Issue
	
	Block a user