mirror of
				https://github.com/coredns/coredns.git
				synced 2025-10-27 16:24:19 -04:00 
			
		
		
		
	
		
			
				
	
	
		
			162 lines
		
	
	
		
			4.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			162 lines
		
	
	
		
			4.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package test
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"math/rand"
 | |
| 	"reflect"
 | |
| 	"testing"
 | |
| 	"unsafe"
 | |
| 
 | |
| 	"github.com/coredns/caddy"
 | |
| 	"github.com/coredns/coredns/core/dnsserver"
 | |
| 
 | |
| 	"github.com/miekg/dns"
 | |
| )
 | |
| 
 | |
| // Start 2 tests server, server A will proxy to B, server B is an CH server.
 | |
| func TestProxyToChaosServer(t *testing.T) {
 | |
| 	t.Parallel()
 | |
| 	corefile := `.:0 {
 | |
| 		chaos CoreDNS-001 miek@miek.nl
 | |
| 	}`
 | |
| 
 | |
| 	chaos, udpChaos, _, err := CoreDNSServerAndPorts(corefile)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Could not get CoreDNS serving instance: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	defer chaos.Stop()
 | |
| 
 | |
| 	corefileProxy := `.:0 {
 | |
| 		forward . ` + udpChaos + `
 | |
| 	}`
 | |
| 
 | |
| 	proxy, udp, _, err := CoreDNSServerAndPorts(corefileProxy)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Could not get CoreDNS serving instance")
 | |
| 	}
 | |
| 	defer proxy.Stop()
 | |
| 
 | |
| 	chaosTest(t, udpChaos)
 | |
| 
 | |
| 	chaosTest(t, udp)
 | |
| 	// chaosTest(t, tcp, "tcp"), commented out because we use the original transport to reach the
 | |
| 	// proxy and we only forward to the udp port.
 | |
| }
 | |
| 
 | |
| func chaosTest(t *testing.T, server string) {
 | |
| 	t.Helper()
 | |
| 	m := new(dns.Msg)
 | |
| 	m.Question = make([]dns.Question, 1)
 | |
| 	m.Question[0] = dns.Question{Qclass: dns.ClassCHAOS, Name: "version.bind.", Qtype: dns.TypeTXT}
 | |
| 
 | |
| 	r, err := dns.Exchange(m, server)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Could not send message: %s", err)
 | |
| 	}
 | |
| 	if r.Rcode != dns.RcodeSuccess || len(r.Answer) == 0 {
 | |
| 		t.Fatalf("Expected successful reply, got %s", dns.RcodeToString[r.Rcode])
 | |
| 	}
 | |
| 	if r.Answer[0].String() != `version.bind.	0	CH	TXT	"CoreDNS-001"` {
 | |
| 		t.Fatalf("Expected version.bind. reply, got %s", r.Answer[0].String())
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestReverseExpansion(t *testing.T) {
 | |
| 	// this test needs a fixed port, because with :0 the expanded reverse zone will listen on different
 | |
| 	// addresses and we can't check which ones...
 | |
| 	corefile := `10.0.0.0/15:5053 {
 | |
| 		whoami
 | |
| 	}`
 | |
| 
 | |
| 	server, udp, _, err := CoreDNSServerAndPorts(corefile)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Could not get CoreDNS serving instance: %s", err)
 | |
| 	}
 | |
| 
 | |
| 	defer server.Stop()
 | |
| 
 | |
| 	m := new(dns.Msg)
 | |
| 	m.SetQuestion("whoami.0.10.in-addr.arpa.", dns.TypeA)
 | |
| 
 | |
| 	r, err := dns.Exchange(m, udp)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Could not send message: %s", err)
 | |
| 	}
 | |
| 	if r.Rcode != dns.RcodeSuccess {
 | |
| 		t.Errorf("Expected NOERROR, got %d", r.Rcode)
 | |
| 	}
 | |
| 	if len(r.Extra) != 2 {
 | |
| 		t.Errorf("Expected 2 RRs in additional section, got %d", len(r.Extra))
 | |
| 	}
 | |
| 
 | |
| 	m.SetQuestion("whoami.1.10.in-addr.arpa.", dns.TypeA)
 | |
| 	r, err = dns.Exchange(m, udp)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Could not send message: %s", err)
 | |
| 	}
 | |
| 	if r.Rcode != dns.RcodeSuccess {
 | |
| 		t.Errorf("Expected NOERROR, got %d", r.Rcode)
 | |
| 	}
 | |
| 	if len(r.Extra) != 2 {
 | |
| 		t.Errorf("Expected 2 RRs in additional section, got %d", len(r.Extra))
 | |
| 	}
 | |
| 
 | |
| 	// should be refused
 | |
| 	m.SetQuestion("whoami.2.10.in-addr.arpa.", dns.TypeA)
 | |
| 	r, err = dns.Exchange(m, udp)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Could not send message: %s", err)
 | |
| 	}
 | |
| 	if r.Rcode != dns.RcodeRefused {
 | |
| 		t.Errorf("Expected REFUSED, got %d", r.Rcode)
 | |
| 	}
 | |
| 	if len(r.Extra) != 0 {
 | |
| 		t.Errorf("Expected 0 RRs in additional section, got %d", len(r.Extra))
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestMultiZoneBlockConfigs(t *testing.T) {
 | |
| 	// We need fixed port numbers here to have multiple serving instances, using ".:0" wont work because that
 | |
| 	// leads to a 'duplicate server instances' because '0' is used literary (only the kernel knows what port will
 | |
| 	// be assigned).
 | |
| 	//
 | |
| 	// This makes the test flaky because we don't know if there are in-use or not. We add a random number to each base and
 | |
| 	// retry when we fail to get a serving instance (up to 3 times).
 | |
| 
 | |
| 	var (
 | |
| 		server *caddy.Instance
 | |
| 		err    error
 | |
| 	)
 | |
| 	for j := range 3 {
 | |
| 		corefile := `.:%d .:%d .:%d {
 | |
| 		debug
 | |
| 	}`
 | |
| 		corefile = fmt.Sprintf(corefile, 40000+rand.Intn(9000), 50000+rand.Intn(9000), 60000+rand.Intn(9000))
 | |
| 
 | |
| 		if server, err = CoreDNSServer(corefile); err != nil {
 | |
| 			continue
 | |
| 		}
 | |
| 		t.Logf("Got running CoreDNS serving instance, after %d tries", j+1)
 | |
| 		break // success
 | |
| 	}
 | |
| 	if server == nil {
 | |
| 		t.Fatalf("Could not get CoreDNS serving instance: %s", err)
 | |
| 	}
 | |
| 	defer server.Stop()
 | |
| 
 | |
| 	// unsafe reflection to read unexported fields "context" and "configs" within context
 | |
| 	ctxVal := reflect.ValueOf(server).Elem().FieldByName("context")
 | |
| 	ctxVal2 := reflect.NewAt(ctxVal.Type(), unsafe.Pointer(ctxVal.UnsafeAddr())).Elem()
 | |
| 	configs := reflect.ValueOf(ctxVal2.Interface()).Elem().FieldByName("configs")
 | |
| 	configs2 := reflect.NewAt(configs.Type(), unsafe.Pointer(configs.UnsafeAddr())).Elem()
 | |
| 
 | |
| 	for i := range 3 {
 | |
| 		v := configs2.Index(i)
 | |
| 		config := v.Interface().(*dnsserver.Config)
 | |
| 		if !config.Debug {
 | |
| 			t.Fatalf("Debug was not set for %s://%s:%s", config.Transport, config.Zone, config.Port)
 | |
| 		}
 | |
| 	}
 | |
| }
 |