mirror of
https://github.com/coredns/coredns.git
synced 2025-10-28 00:34:24 -04:00
merge
This commit is contained in:
@@ -51,6 +51,7 @@ var dnssecTestCases = []coretest.Case{
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
// NoData
|
||||||
Qname: "a.miek.nl.", Qtype: dns.TypeSRV, Do: true,
|
Qname: "a.miek.nl.", Qtype: dns.TypeSRV, Do: true,
|
||||||
Ns: []dns.RR{
|
Ns: []dns.RR{
|
||||||
coretest.NSEC("a.miek.nl. 14400 IN NSEC archive.miek.nl. A AAAA RRSIG NSEC"),
|
coretest.NSEC("a.miek.nl. 14400 IN NSEC archive.miek.nl. A AAAA RRSIG NSEC"),
|
||||||
@@ -60,6 +61,7 @@ var dnssecTestCases = []coretest.Case{
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
/* HAHA nsec... shit.
|
/* HAHA nsec... shit.
|
||||||
|
// disprove *.miek.nl and that b.miek.nl does not exist
|
||||||
{
|
{
|
||||||
Qname: "b.miek.nl.", Qtype: dns.TypeA,
|
Qname: "b.miek.nl.", Qtype: dns.TypeA,
|
||||||
Rcode: dns.RcodeNameError,
|
Rcode: dns.RcodeNameError,
|
||||||
|
|||||||
@@ -39,7 +39,7 @@ func (f File) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (i
|
|||||||
return xfr.ServeDNS(ctx, w, r)
|
return xfr.ServeDNS(ctx, w, r)
|
||||||
}
|
}
|
||||||
|
|
||||||
an, ns, extra, result := z.Lookup(qname, state.QType(), state.Do())
|
answer, ns, extra, result := z.Lookup(qname, state.QType(), state.Do())
|
||||||
|
|
||||||
m := new(dns.Msg)
|
m := new(dns.Msg)
|
||||||
m.SetReply(r)
|
m.SetReply(r)
|
||||||
@@ -47,10 +47,9 @@ func (f File) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (i
|
|||||||
|
|
||||||
switch result {
|
switch result {
|
||||||
case Success:
|
case Success:
|
||||||
// case?
|
m.Answer = answer
|
||||||
m.Answer = an
|
m.Ns = ns
|
||||||
m.Extra = extra
|
m.Extra = extra
|
||||||
// Ns section
|
|
||||||
case NameError:
|
case NameError:
|
||||||
m.Ns = ns
|
m.Ns = ns
|
||||||
m.Rcode = dns.RcodeNameError
|
m.Rcode = dns.RcodeNameError
|
||||||
|
|||||||
@@ -27,13 +27,14 @@ func (z *Zone) Lookup(qname string, qtype uint16, do bool) ([]dns.RR, []dns.RR,
|
|||||||
} else {
|
} else {
|
||||||
rr = mk()
|
rr = mk()
|
||||||
}
|
}
|
||||||
rr.Header().Rrtype = qtype // this is pretty nonobvious
|
|
||||||
|
|
||||||
if qtype == dns.TypeSOA {
|
if qtype == dns.TypeSOA {
|
||||||
return z.lookupSOA(do)
|
return z.lookupSOA(do)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Misuse rr to be a question.
|
||||||
|
rr.Header().Rrtype = qtype
|
||||||
rr.Header().Name = qname
|
rr.Header().Name = qname
|
||||||
|
|
||||||
elem := z.Tree.Get(rr)
|
elem := z.Tree.Get(rr)
|
||||||
if elem == nil {
|
if elem == nil {
|
||||||
// wildcard lookup
|
// wildcard lookup
|
||||||
@@ -50,6 +51,7 @@ func (z *Zone) Lookup(qname string, qtype uint16, do bool) ([]dns.RR, []dns.RR,
|
|||||||
if len(rrs) == 0 {
|
if len(rrs) == 0 {
|
||||||
return z.noData(elem, do)
|
return z.noData(elem, do)
|
||||||
}
|
}
|
||||||
|
|
||||||
if do {
|
if do {
|
||||||
sigs := elem.Types(dns.TypeRRSIG)
|
sigs := elem.Types(dns.TypeRRSIG)
|
||||||
sigs = signatureForSubType(sigs, qtype)
|
sigs = signatureForSubType(sigs, qtype)
|
||||||
@@ -76,8 +78,7 @@ func (z *Zone) nameError(elem *tree.Elem, rr dns.RR, do bool) ([]dns.RR, []dns.R
|
|||||||
elem = z.Tree.Prev(wildcard(rr))
|
elem = z.Tree.Prev(wildcard(rr))
|
||||||
fmt.Printf("%+v\n", elem.All())
|
fmt.Printf("%+v\n", elem.All())
|
||||||
}
|
}
|
||||||
|
return nil, ret, nil, NameError
|
||||||
return nil, ret, nil, Success
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (z *Zone) lookupSOA(do bool) ([]dns.RR, []dns.RR, []dns.RR, Result) {
|
func (z *Zone) lookupSOA(do bool) ([]dns.RR, []dns.RR, []dns.RR, Result) {
|
||||||
@@ -102,7 +103,6 @@ func (z *Zone) lookupNSEC(elem *tree.Elem, do bool) []dns.RR {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
return nsec
|
return nsec
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (z *Zone) lookupCNAME(rrs []dns.RR, rr dns.RR, do bool) ([]dns.RR, []dns.RR, []dns.RR, Result) {
|
func (z *Zone) lookupCNAME(rrs []dns.RR, rr dns.RR, do bool) ([]dns.RR, []dns.RR, []dns.RR, Result) {
|
||||||
|
|||||||
134
middleware/file/wildcard.test.go
Normal file
134
middleware/file/wildcard.test.go
Normal file
@@ -0,0 +1,134 @@
|
|||||||
|
package file
|
||||||
|
|
||||||
|
import (
|
||||||
|
"sort"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/miekg/coredns/middleware"
|
||||||
|
coretest "github.com/miekg/coredns/middleware/testing"
|
||||||
|
|
||||||
|
"github.com/miekg/dns"
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
)
|
||||||
|
|
||||||
|
var dnssecWildcardTestCases = []coretest.Case{
|
||||||
|
{
|
||||||
|
Qname: "miek.nl.", Qtype: dns.TypeSOA, Do: true,
|
||||||
|
Answer: []dns.RR{
|
||||||
|
// because we sort, this look fishy, but it is OK.
|
||||||
|
coretest.RRSIG("miek.nl. 1800 IN RRSIG SOA 8 2 1800 20160426031301 20160327031301 12051 miek.nl. FIrzy07acBbtyQczy1dc="),
|
||||||
|
coretest.SOA("miek.nl. 1800 IN SOA linode.atoom.net. miek.miek.nl. 1282630057 14400 3600 604800 14400"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Qname: "miek.nl.", Qtype: dns.TypeAAAA, Do: true,
|
||||||
|
Answer: []dns.RR{
|
||||||
|
coretest.AAAA("miek.nl. 1800 IN AAAA 2a01:7e00::f03c:91ff:fef1:6735"),
|
||||||
|
coretest.RRSIG("miek.nl. 1800 IN RRSIG AAAA 8 2 1800 20160426031301 20160327031301 12051 miek.nl. SsRT="),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Qname: "miek.nl.", Qtype: dns.TypeMX, Do: true,
|
||||||
|
Answer: []dns.RR{
|
||||||
|
coretest.MX("miek.nl. 1800 IN MX 1 aspmx.l.google.com."),
|
||||||
|
coretest.MX("miek.nl. 1800 IN MX 10 aspmx2.googlemail.com."),
|
||||||
|
coretest.MX("miek.nl. 1800 IN MX 10 aspmx3.googlemail.com."),
|
||||||
|
coretest.MX("miek.nl. 1800 IN MX 5 alt1.aspmx.l.google.com."),
|
||||||
|
coretest.MX("miek.nl. 1800 IN MX 5 alt2.aspmx.l.google.com."),
|
||||||
|
coretest.RRSIG("miek.nl. 1800 IN RRSIG MX 8 2 1800 20160426031301 20160327031301 12051 miek.nl. kLqG+iOr="),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Qname: "www.miek.nl.", Qtype: dns.TypeA, Do: true,
|
||||||
|
Answer: []dns.RR{
|
||||||
|
coretest.CNAME("www.miek.nl. 1800 IN CNAME a.miek.nl."),
|
||||||
|
},
|
||||||
|
|
||||||
|
Extra: []dns.RR{
|
||||||
|
coretest.A("a.miek.nl. 1800 IN A 139.162.196.78"),
|
||||||
|
coretest.RRSIG("a.miek.nl. 1800 IN RRSIG A 8 3 1800 20160426031301 20160327031301 12051 miek.nl. lxLotCjWZ3kihTxk="),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
// NoData
|
||||||
|
Qname: "a.miek.nl.", Qtype: dns.TypeSRV, Do: true,
|
||||||
|
Ns: []dns.RR{
|
||||||
|
coretest.NSEC("a.miek.nl. 14400 IN NSEC archive.miek.nl. A AAAA RRSIG NSEC"),
|
||||||
|
coretest.RRSIG("a.miek.nl. 14400 IN RRSIG NSEC 8 3 14400 20160426031301 20160327031301 12051 miek.nl. GqnF6cutipmSHEao="),
|
||||||
|
coretest.RRSIG("miek.nl. 1800 IN RRSIG SOA 8 2 1800 20160426031301 20160327031301 12051 miek.nl. FIrzy07acBbtyQczy1dc="),
|
||||||
|
coretest.SOA("miek.nl. 1800 IN SOA linode.atoom.net. miek.miek.nl. 1282630057 14400 3600 604800 14400"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
/* HAHA nsec... shit.
|
||||||
|
// disprove *.miek.nl and that b.miek.nl does not exist
|
||||||
|
{
|
||||||
|
Qname: "b.miek.nl.", Qtype: dns.TypeA,
|
||||||
|
Rcode: dns.RcodeNameError,
|
||||||
|
Ns: []dns.RR{
|
||||||
|
coretest.SOA("miek.nl. 1800 IN SOA linode.atoom.net. miek.miek.nl. 1282630057 14400 3600 604800 14400"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
*/
|
||||||
|
}
|
||||||
|
|
||||||
|
func testLookupDNSSECWildcard(t *testing.T) {
|
||||||
|
zone, err := Parse(strings.NewReader(dbMiekNL_signed), testzone, "stdin")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("expect no error when reading zone, got %q", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
fm := File{Next: coretest.ErrorHandler(), Zones: Zones{Z: map[string]*Zone{testzone: zone}, Names: []string{testzone}}}
|
||||||
|
ctx := context.TODO()
|
||||||
|
|
||||||
|
for _, tc := range dnssecWildcardTestCases {
|
||||||
|
m := tc.Msg()
|
||||||
|
|
||||||
|
rec := middleware.NewResponseRecorder(&middleware.TestResponseWriter{})
|
||||||
|
_, err := fm.ServeDNS(ctx, rec, m)
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("expected no error, got %v\n", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
resp := rec.Msg()
|
||||||
|
|
||||||
|
sort.Sort(coretest.RRSet(resp.Answer))
|
||||||
|
sort.Sort(coretest.RRSet(resp.Ns))
|
||||||
|
sort.Sort(coretest.RRSet(resp.Extra))
|
||||||
|
|
||||||
|
if resp.Rcode != tc.Rcode {
|
||||||
|
t.Errorf("rcode is %q, expected %q", dns.RcodeToString[resp.Rcode], dns.RcodeToString[tc.Rcode])
|
||||||
|
t.Logf("%v\n", resp)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(resp.Answer) != len(tc.Answer) {
|
||||||
|
t.Errorf("answer for %q contained %d results, %d expected", tc.Qname, len(resp.Answer), len(tc.Answer))
|
||||||
|
t.Logf("%v\n", resp)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if len(resp.Ns) != len(tc.Ns) {
|
||||||
|
t.Errorf("authority for %q contained %d results, %d expected", tc.Qname, len(resp.Ns), len(tc.Ns))
|
||||||
|
t.Logf("%v\n", resp)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if len(resp.Extra) != len(tc.Extra) {
|
||||||
|
t.Errorf("additional for %q contained %d results, %d expected", tc.Qname, len(resp.Extra), len(tc.Extra))
|
||||||
|
t.Logf("%v\n", resp)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if !coretest.CheckSection(t, tc, coretest.Answer, resp.Answer) {
|
||||||
|
t.Logf("%v\n", resp)
|
||||||
|
}
|
||||||
|
if !coretest.CheckSection(t, tc, coretest.Ns, resp.Ns) {
|
||||||
|
t.Logf("%v\n", resp)
|
||||||
|
|
||||||
|
}
|
||||||
|
if !coretest.CheckSection(t, tc, coretest.Extra, resp.Extra) {
|
||||||
|
t.Logf("%v\n", resp)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
const dbMiekNL_wildcard_signed = `§`
|
||||||
Reference in New Issue
Block a user