mirror of
				https://github.com/coredns/coredns.git
				synced 2025-10-31 10:13:14 -04:00 
			
		
		
		
	* share plugins among zones in the same server block Signed-off-by: Chris O'Haver <cohaver@infoblox.com> * update caddy dep Signed-off-by: Chris O'Haver <cohaver@infoblox.com> * simp code Signed-off-by: Chris O'Haver <cohaver@infoblox.com> * copy ListenHosts and Debug from first config Signed-off-by: Chris O'Haver <cohaver@infoblox.com> * copy tls configs from first config Signed-off-by: Chris O'Haver <cohaver@infoblox.com> * add test to validate debug setting is replicated to all configs in block Signed-off-by: Chris O'Haver <cohaver@infoblox.com> * stop server Signed-off-by: Chris O'Haver <cohaver@infoblox.com>
		
			
				
	
	
		
			141 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			141 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package test
 | |
| 
 | |
| import (
 | |
| 	"reflect"
 | |
| 	"testing"
 | |
| 	"unsafe"
 | |
| 
 | |
| 	"github.com/coredns/coredns/core/dnsserver"
 | |
| 
 | |
| 	"github.com/miekg/dns"
 | |
| )
 | |
| 
 | |
| // Start 2 tests server, server A will proxy to B, server B is an CH server.
 | |
| func TestProxyToChaosServer(t *testing.T) {
 | |
| 	t.Parallel()
 | |
| 	corefile := `.:0 {
 | |
| 		chaos CoreDNS-001 miek@miek.nl
 | |
| 	}`
 | |
| 
 | |
| 	chaos, udpChaos, _, err := CoreDNSServerAndPorts(corefile)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Could not get CoreDNS serving instance: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	defer chaos.Stop()
 | |
| 
 | |
| 	corefileProxy := `.:0 {
 | |
| 		forward . ` + udpChaos + `
 | |
| 	}`
 | |
| 
 | |
| 	proxy, udp, _, err := CoreDNSServerAndPorts(corefileProxy)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Could not get CoreDNS serving instance")
 | |
| 	}
 | |
| 	defer proxy.Stop()
 | |
| 
 | |
| 	chaosTest(t, udpChaos)
 | |
| 
 | |
| 	chaosTest(t, udp)
 | |
| 	// chaosTest(t, tcp, "tcp"), commented out because we use the original transport to reach the
 | |
| 	// proxy and we only forward to the udp port.
 | |
| }
 | |
| 
 | |
| func chaosTest(t *testing.T, server string) {
 | |
| 	m := new(dns.Msg)
 | |
| 	m.Question = make([]dns.Question, 1)
 | |
| 	m.Question[0] = dns.Question{Qclass: dns.ClassCHAOS, Name: "version.bind.", Qtype: dns.TypeTXT}
 | |
| 
 | |
| 	r, err := dns.Exchange(m, server)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Could not send message: %s", err)
 | |
| 	}
 | |
| 	if r.Rcode != dns.RcodeSuccess || len(r.Answer) == 0 {
 | |
| 		t.Fatalf("Expected successful reply, got %s", dns.RcodeToString[r.Rcode])
 | |
| 	}
 | |
| 	if r.Answer[0].String() != `version.bind.	0	CH	TXT	"CoreDNS-001"` {
 | |
| 		t.Fatalf("Expected version.bind. reply, got %s", r.Answer[0].String())
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestReverseExpansion(t *testing.T) {
 | |
| 	// this test needs a fixed port, because with :0 the expanded reverse zone will listen on different
 | |
| 	// addresses and we can't check which ones...
 | |
| 	corefile := `10.0.0.0/15:5053 {
 | |
| 		whoami
 | |
| 	}`
 | |
| 
 | |
| 	server, udp, _, err := CoreDNSServerAndPorts(corefile)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Could not get CoreDNS serving instance: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	defer server.Stop()
 | |
| 
 | |
| 	m := new(dns.Msg)
 | |
| 	m.SetQuestion("whoami.0.10.in-addr.arpa.", dns.TypeA)
 | |
| 
 | |
| 	r, err := dns.Exchange(m, udp)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Could not send message: %s", err)
 | |
| 	}
 | |
| 	if r.Rcode != dns.RcodeSuccess {
 | |
| 		t.Errorf("Expected NOERROR, got %d", r.Rcode)
 | |
| 	}
 | |
| 	if len(r.Extra) != 2 {
 | |
| 		t.Errorf("Expected 2 RRs in additional section, got %d", len(r.Extra))
 | |
| 	}
 | |
| 
 | |
| 	m.SetQuestion("whoami.1.10.in-addr.arpa.", dns.TypeA)
 | |
| 	r, err = dns.Exchange(m, udp)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Could not send message: %s", err)
 | |
| 	}
 | |
| 	if r.Rcode != dns.RcodeSuccess {
 | |
| 		t.Errorf("Expected NOERROR, got %d", r.Rcode)
 | |
| 	}
 | |
| 	if len(r.Extra) != 2 {
 | |
| 		t.Errorf("Expected 2 RRs in additional section, got %d", len(r.Extra))
 | |
| 	}
 | |
| 
 | |
| 	// should be refused
 | |
| 	m.SetQuestion("whoami.2.10.in-addr.arpa.", dns.TypeA)
 | |
| 	r, err = dns.Exchange(m, udp)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Could not send message: %s", err)
 | |
| 	}
 | |
| 	if r.Rcode != dns.RcodeRefused {
 | |
| 		t.Errorf("Expected REFUSED, got %d", r.Rcode)
 | |
| 	}
 | |
| 	if len(r.Extra) != 0 {
 | |
| 		t.Errorf("Expected 0 RRs in additional section, got %d", len(r.Extra))
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestMultiZoneBlockConfigs(t *testing.T) {
 | |
| 	corefile := `.:40000 .:40001 .:40002 {
 | |
| 		debug
 | |
| 	}`
 | |
| 
 | |
| 	server, err := CoreDNSServer(corefile)
 | |
| 	defer server.Stop()
 | |
| 
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Could not get CoreDNS serving instance: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	// unsafe reflection to read unexported fields "context" and "configs" within context
 | |
| 	ctxVal := reflect.ValueOf(server).Elem().FieldByName("context")
 | |
| 	ctxVal2 := reflect.NewAt(ctxVal.Type(), unsafe.Pointer(ctxVal.UnsafeAddr())).Elem()
 | |
| 	configs := reflect.ValueOf(ctxVal2.Interface()).Elem().FieldByName("configs")
 | |
| 	configs2 := reflect.NewAt(configs.Type(), unsafe.Pointer(configs.UnsafeAddr())).Elem()
 | |
| 
 | |
| 	for i := 0; i < 3; i++ {
 | |
| 		v := configs2.Index(i)
 | |
| 		config := v.Interface().(*dnsserver.Config)
 | |
| 		if !config.Debug {
 | |
| 			t.Fatalf("Debug was not set for %s://%s:%s", config.Transport, config.Zone, config.Port)
 | |
| 		}
 | |
| 	}
 | |
| }
 |