mirror of
				https://github.com/coredns/coredns.git
				synced 2025-10-31 10:13:14 -04:00 
			
		
		
		
	* mw/federaration This PR add the federation back as a middleware to keep it more contained from the main kubernetes code. It also makes parseRequest less import and pushes this functionlity down in the k.Entries. This minimizes (or tries to) the importance for the qtype in the query. In the end the qtype checking should only happen in ServeDNS - but for k8s this might proof difficult. Numerous other cleanup in code and kubernetes tests. * up test coverage
		
			
				
	
	
		
			82 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			82 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package federation
 | |
| 
 | |
| import (
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/coredns/coredns/middleware/kubernetes"
 | |
| 	"github.com/coredns/coredns/middleware/pkg/dnsrecorder"
 | |
| 	"github.com/coredns/coredns/middleware/test"
 | |
| 
 | |
| 	"github.com/miekg/dns"
 | |
| 	"golang.org/x/net/context"
 | |
| )
 | |
| 
 | |
| func TestIsNameFederation(t *testing.T) {
 | |
| 	tests := []struct {
 | |
| 		fed          string
 | |
| 		qname        string
 | |
| 		expectedZone string
 | |
| 	}{
 | |
| 		{"prod", "nginx.mynamespace.prod.svc.example.com.", "nginx.mynamespace.svc.example.com."},
 | |
| 		{"prod", "nginx.mynamespace.staging.svc.example.com.", ""},
 | |
| 		{"prod", "nginx.mynamespace.example.com.", ""},
 | |
| 		{"prod", "example.com.", ""},
 | |
| 		{"prod", "com.", ""},
 | |
| 	}
 | |
| 
 | |
| 	fed := New()
 | |
| 	for i, tc := range tests {
 | |
| 		fed.f[tc.fed] = "test-name"
 | |
| 		if x, _ := fed.isNameFederation(tc.qname, "example.com."); x != tc.expectedZone {
 | |
| 			t.Errorf("Test %d, failed to get zone, expected %s, got %s", i, tc.expectedZone, x)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestFederationKubernetes(t *testing.T) {
 | |
| 	tests := []test.Case{
 | |
| 		{
 | |
| 			// service exists so we return the IP address associated with it.
 | |
| 			Qname: "svc1.testns.prod.svc.cluster.local.", Qtype: dns.TypeA,
 | |
| 			Rcode: dns.RcodeSuccess,
 | |
| 			Answer: []dns.RR{
 | |
| 				test.A("svc1.testns.prod.svc.cluster.local.      303       IN      A       10.0.0.1"),
 | |
| 			},
 | |
| 		},
 | |
| 		{
 | |
| 			// service does not exist, do the federation dance.
 | |
| 			Qname: "svc0.testns.prod.svc.cluster.local.", Qtype: dns.TypeA,
 | |
| 			Rcode: dns.RcodeSuccess,
 | |
| 			Answer: []dns.RR{
 | |
| 				test.CNAME("svc0.testns.prod.svc.cluster.local.  303       IN      CNAME   svc0.testns.prod.svc.fd-az.fd-r.federal.example."),
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	k := kubernetes.New([]string{"cluster.local."})
 | |
| 	k.APIConn = &APIConnFederationTest{}
 | |
| 
 | |
| 	fed := New()
 | |
| 	fed.zones = []string{"cluster.local."}
 | |
| 	fed.Federations = k.Federations
 | |
| 	fed.Next = k
 | |
| 	fed.f = map[string]string{
 | |
| 		"prod": "federal.example.",
 | |
| 	}
 | |
| 
 | |
| 	ctx := context.TODO()
 | |
| 	for i, tc := range tests {
 | |
| 		m := tc.Msg()
 | |
| 
 | |
| 		rec := dnsrecorder.New(&test.ResponseWriter{})
 | |
| 		_, err := fed.ServeDNS(ctx, rec, m)
 | |
| 		if err != nil {
 | |
| 			t.Errorf("Test %d, expected no error, got %v\n", i, err)
 | |
| 			return
 | |
| 		}
 | |
| 
 | |
| 		resp := rec.Msg
 | |
| 		test.SortAndCheck(t, resp, tc)
 | |
| 	}
 | |
| }
 |