mirror of
				https://github.com/coredns/coredns.git
				synced 2025-11-03 18:53:13 -05:00 
			
		
		
		
	* Implement notifies for transfer plugin (#3972) * Fix notifies in transfer plugin Signed-off-by: Miek Gieben <miek@miek.nl> * Make it compile Signed-off-by: Miek Gieben <miek@miek.nl> * Port more plugins Signed-off-by: Miek Gieben <miek@miek.nl> * golint Signed-off-by: Miek Gieben <miek@miek.nl> * Fix tests Signed-off-by: Miek Gieben <miek@miek.nl> * Fix notifies in transfer plugin Signed-off-by: Miek Gieben <miek@miek.nl> * Make it compile Signed-off-by: Miek Gieben <miek@miek.nl> * Port more plugins Signed-off-by: Miek Gieben <miek@miek.nl> * golint Signed-off-by: Miek Gieben <miek@miek.nl> * Fix tests Signed-off-by: Miek Gieben <miek@miek.nl> * Fix tests Signed-off-by: Miek Gieben <miek@miek.nl> * really fix test Signed-off-by: Miek Gieben <miek@miek.nl> * Implement ixfr fallback and unify file and auto for transfering Signed-off-by: Miek Gieben <miek@miek.nl> * Add transfer tests copied and modified from #3452 Signed-off-by: Miek Gieben <miek@miek.nl> * Test correct selection of plugin Signed-off-by: Miek Gieben <miek@miek.nl> * add upstream back in Signed-off-by: Miek Gieben <miek@miek.nl> * Implement ixfr fallback and unify file and auto for transfering Signed-off-by: Miek Gieben <miek@miek.nl> * fix test Signed-off-by: Miek Gieben <miek@miek.nl> * properly merge Signed-off-by: Miek Gieben <miek@miek.nl> * Remove plugin/kubernetes/setup_transfer_test.go Signed-off-by: Yong Tang <yong.tang.github@outlook.com> Co-authored-by: Miek Gieben <miek@miek.nl>
		
			
				
	
	
		
			127 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			127 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package kubernetes
 | 
						|
 | 
						|
import (
 | 
						|
	"strings"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"github.com/miekg/dns"
 | 
						|
)
 | 
						|
 | 
						|
func TestKubernetesAXFR(t *testing.T) {
 | 
						|
	k := New([]string{"cluster.local."})
 | 
						|
	k.APIConn = &APIConnServeTest{}
 | 
						|
	k.Namespaces = map[string]struct{}{"testns": {}}
 | 
						|
 | 
						|
	dnsmsg := &dns.Msg{}
 | 
						|
	dnsmsg.SetAxfr(k.Zones[0])
 | 
						|
 | 
						|
	ch, err := k.Transfer(k.Zones[0], 0)
 | 
						|
	if err != nil {
 | 
						|
		t.Error(err)
 | 
						|
	}
 | 
						|
	validateAXFR(t, ch)
 | 
						|
}
 | 
						|
 | 
						|
func TestKubernetesIXFRFallback(t *testing.T) {
 | 
						|
	k := New([]string{"cluster.local."})
 | 
						|
	k.APIConn = &APIConnServeTest{}
 | 
						|
	k.Namespaces = map[string]struct{}{"testns": {}}
 | 
						|
 | 
						|
	dnsmsg := &dns.Msg{}
 | 
						|
	dnsmsg.SetAxfr(k.Zones[0])
 | 
						|
 | 
						|
	ch, err := k.Transfer(k.Zones[0], 1)
 | 
						|
	if err != nil {
 | 
						|
		t.Error(err)
 | 
						|
	}
 | 
						|
	validateAXFR(t, ch)
 | 
						|
}
 | 
						|
 | 
						|
func TestKubernetesIXFRCurrent(t *testing.T) {
 | 
						|
	k := New([]string{"cluster.local."})
 | 
						|
	k.APIConn = &APIConnServeTest{}
 | 
						|
	k.Namespaces = map[string]struct{}{"testns": {}}
 | 
						|
 | 
						|
	dnsmsg := &dns.Msg{}
 | 
						|
	dnsmsg.SetAxfr(k.Zones[0])
 | 
						|
 | 
						|
	ch, err := k.Transfer(k.Zones[0], 3)
 | 
						|
	if err != nil {
 | 
						|
		t.Error(err)
 | 
						|
	}
 | 
						|
 | 
						|
	var gotRRs []dns.RR
 | 
						|
	for rrs := range ch {
 | 
						|
		gotRRs = append(gotRRs, rrs...)
 | 
						|
	}
 | 
						|
 | 
						|
	// ensure only one record is returned
 | 
						|
	if len(gotRRs) > 1 {
 | 
						|
		t.Errorf("Expected only one answer, got %d", len(gotRRs))
 | 
						|
	}
 | 
						|
 | 
						|
	// Ensure first record is a SOA
 | 
						|
	if gotRRs[0].Header().Rrtype != dns.TypeSOA {
 | 
						|
		t.Error("Invalid transfer response, does not start with SOA record")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func validateAXFR(t *testing.T, ch <-chan []dns.RR) {
 | 
						|
	xfr := []dns.RR{}
 | 
						|
	for rrs := range ch {
 | 
						|
		xfr = append(xfr, rrs...)
 | 
						|
	}
 | 
						|
	if xfr[0].Header().Rrtype != dns.TypeSOA {
 | 
						|
		t.Error("Invalid transfer response, does not start with SOA record")
 | 
						|
	}
 | 
						|
 | 
						|
	zp := dns.NewZoneParser(strings.NewReader(expectedZone), "", "")
 | 
						|
	i := 0
 | 
						|
	for rr, ok := zp.Next(); ok; rr, ok = zp.Next() {
 | 
						|
		if !dns.IsDuplicate(rr, xfr[i]) {
 | 
						|
			t.Fatalf("Record %d, expected\n%v\n, got\n%v", i, rr, xfr[i])
 | 
						|
		}
 | 
						|
		i++
 | 
						|
	}
 | 
						|
 | 
						|
	if err := zp.Err(); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
const expectedZone = `
 | 
						|
cluster.local.	5	IN	SOA	ns.dns.cluster.local. hostmaster.cluster.local. 3 7200 1800 86400 5
 | 
						|
external.testns.svc.cluster.local.	5	IN	CNAME	ext.interwebs.test.
 | 
						|
external-to-service.testns.svc.cluster.local.	5	IN	CNAME	svc1.testns.svc.cluster.local.
 | 
						|
hdls1.testns.svc.cluster.local.	5	IN	A	172.0.0.2
 | 
						|
172-0-0-2.hdls1.testns.svc.cluster.local.	5	IN	A	172.0.0.2
 | 
						|
_http._tcp.hdls1.testns.svc.cluster.local.	5	IN	SRV	0 16 80 172-0-0-2.hdls1.testns.svc.cluster.local.
 | 
						|
hdls1.testns.svc.cluster.local.	5	IN	A	172.0.0.3
 | 
						|
172-0-0-3.hdls1.testns.svc.cluster.local.	5	IN	A	172.0.0.3
 | 
						|
_http._tcp.hdls1.testns.svc.cluster.local.	5	IN	SRV	0 16 80 172-0-0-3.hdls1.testns.svc.cluster.local.
 | 
						|
hdls1.testns.svc.cluster.local.	5	IN	A	172.0.0.4
 | 
						|
dup-name.hdls1.testns.svc.cluster.local.	5	IN	A	172.0.0.4
 | 
						|
_http._tcp.hdls1.testns.svc.cluster.local.	5	IN	SRV	0 16 80 dup-name.hdls1.testns.svc.cluster.local.
 | 
						|
hdls1.testns.svc.cluster.local.	5	IN	A	172.0.0.5
 | 
						|
dup-name.hdls1.testns.svc.cluster.local.	5	IN	A	172.0.0.5
 | 
						|
_http._tcp.hdls1.testns.svc.cluster.local.	5	IN	SRV	0 16 80 dup-name.hdls1.testns.svc.cluster.local.
 | 
						|
hdls1.testns.svc.cluster.local.	5	IN	AAAA	5678:abcd::1
 | 
						|
5678-abcd--1.hdls1.testns.svc.cluster.local.	5	IN	AAAA	5678:abcd::1
 | 
						|
_http._tcp.hdls1.testns.svc.cluster.local.	5	IN	SRV	0 16 80 5678-abcd--1.hdls1.testns.svc.cluster.local.
 | 
						|
hdls1.testns.svc.cluster.local.	5	IN	AAAA	5678:abcd::2
 | 
						|
5678-abcd--2.hdls1.testns.svc.cluster.local.	5	IN	AAAA	5678:abcd::2
 | 
						|
_http._tcp.hdls1.testns.svc.cluster.local.	5	IN	SRV	0 16 80 5678-abcd--2.hdls1.testns.svc.cluster.local.
 | 
						|
hdlsprtls.testns.svc.cluster.local.	5	IN	A	172.0.0.20
 | 
						|
172-0-0-20.hdlsprtls.testns.svc.cluster.local.	5	IN	A	172.0.0.20
 | 
						|
svc1.testns.svc.cluster.local.	5	IN	A	10.0.0.1
 | 
						|
svc1.testns.svc.cluster.local.	5	IN	SRV	0 100 80 svc1.testns.svc.cluster.local.
 | 
						|
_http._tcp.svc1.testns.svc.cluster.local.	5	IN	SRV	0 100 80 svc1.testns.svc.cluster.local.
 | 
						|
svc6.testns.svc.cluster.local.	5	IN	AAAA	1234:abcd::1
 | 
						|
svc6.testns.svc.cluster.local.	5	IN	SRV	0 100 80 svc6.testns.svc.cluster.local.
 | 
						|
_http._tcp.svc6.testns.svc.cluster.local.	5	IN	SRV	0 100 80 svc6.testns.svc.cluster.local.
 | 
						|
svcempty.testns.svc.cluster.local.	5	IN	A	10.0.0.1
 | 
						|
svcempty.testns.svc.cluster.local.	5	IN	SRV	0 100 80 svcempty.testns.svc.cluster.local.
 | 
						|
_http._tcp.svcempty.testns.svc.cluster.local.	5	IN	SRV	0 100 80 svcempty.testns.svc.cluster.local.
 | 
						|
cluster.local.	5	IN	SOA	ns.dns.cluster.local. hostmaster.cluster.local. 3 7200 1800 86400 5
 | 
						|
`
 |