cidr everywhere: check all middleware (#915)

* cidr everywhere: check all middleware

Add tests for cidr in only that middleware that already tests for this.
Check the other ones manually (and put reverse in the tests cases
anyway).

Make etcd setup_test run without +build etcd tag - it is not needed
for this test - move rest of the code to lookup_test.go.

Cleanup proxy test a bit and remove TempDir as there is test.TempFile
that does the same thing.

Fixes #909

* coredns package

* Fix test compile
This commit is contained in:
Miek Gieben 2017-08-13 18:16:25 +01:00 committed by GitHub
parent 0c02708d63
commit 818d2b10ad
9 changed files with 135 additions and 127 deletions

View file

@ -22,6 +22,12 @@ func TestAutoParse(t *testing.T) {
}`, }`,
false, "/tmp", "${1}", `db\.(.*)`, []string{"127.0.0.1:53"}, false, "/tmp", "${1}", `db\.(.*)`, []string{"127.0.0.1:53"},
}, },
{
`auto 10.0.0.0/24 {
directory /tmp
}`,
false, "/tmp", "${1}", `db\.(.*)`, nil,
},
{ {
`auto { `auto {
directory /tmp directory /tmp

View file

@ -21,21 +21,18 @@ func TestSetupAutoPath(t *testing.T) {
tests := []struct { tests := []struct {
input string input string
shouldErr bool shouldErr bool
expectedZone string
expectedMw string // expected middleware. expectedMw string // expected middleware.
expectedSearch []string // expected search path expectedSearch []string // expected search path
expectedErrContent string // substring from the expected error. Empty for positive cases. expectedErrContent string // substring from the expected error. Empty for positive cases.
}{ }{
// positive // positive
{ {`autopath @kubernetes`, false, "", "kubernetes", nil, ""},
`autopath @kubernetes`, false, "kubernetes", nil, "", {`autopath example.org @kubernetes`, false, "example.org.", "kubernetes", nil, ""},
}, {`autopath 10.0.0.0/8 @kubernetes`, false, "10.in-addr.arpa.", "kubernetes", nil, ""},
{ {`autopath ` + resolv, false, "", "", []string{"bar.com.", "baz.com.", ""}, ""},
`autopath ` + resolv, false, "", []string{"bar.com.", "baz.com.", ""}, "",
},
// negative // negative
{ {`autopath kubernetes`, true, "", "", nil, "open kubernetes: no such file or directory"},
`autopath kubernetes`, true, "", nil, "open kubernetes: no such file or directory",
},
} }
for i, test := range tests { for i, test := range tests {
@ -64,6 +61,11 @@ func TestSetupAutoPath(t *testing.T) {
t.Errorf("Test %d, wrong searchpath for input %s. Expected: '%v', actual: '%v'", i, test.input, test.expectedSearch, ap.search) t.Errorf("Test %d, wrong searchpath for input %s. Expected: '%v', actual: '%v'", i, test.input, test.expectedSearch, ap.search)
} }
} }
if !test.shouldErr && test.expectedZone != "" {
if test.expectedZone != ap.Zones[0] {
t.Errorf("Test %d, expected zone %q for input %s, got: %q", i, test.expectedZone, test.input, ap.Zones[0])
}
}
} }
} }

View file

@ -20,12 +20,15 @@ func TestSetupDnssec(t *testing.T) {
`dnssec`, false, nil, nil, defaultCap, "", `dnssec`, false, nil, nil, defaultCap, "",
}, },
{ {
`dnssec miek.nl`, false, []string{"miek.nl."}, nil, defaultCap, "", `dnssec example.org`, false, []string{"example.org."}, nil, defaultCap, "",
}, },
{ {
`dnssec miek.nl { `dnssec 10.0.0.0/8`, false, []string{"10.in-addr.arpa."}, nil, defaultCap, "",
},
{
`dnssec example.org {
cache_capacity 100 cache_capacity 100
}`, false, []string{"miek.nl."}, nil, 100, "", }`, false, []string{"example.org."}, nil, 100, "",
}, },
} }

View file

@ -3,12 +3,27 @@
package etcd package etcd
import ( import (
"context"
"encoding/json"
"sort"
"testing"
"time"
"github.com/coredns/coredns/middleware/etcd/msg" "github.com/coredns/coredns/middleware/etcd/msg"
"github.com/coredns/coredns/middleware/pkg/dnsrecorder"
"github.com/coredns/coredns/middleware/pkg/singleflight"
"github.com/coredns/coredns/middleware/pkg/tls"
"github.com/coredns/coredns/middleware/proxy"
"github.com/coredns/coredns/middleware/test" "github.com/coredns/coredns/middleware/test"
etcdc "github.com/coreos/etcd/client"
"github.com/miekg/dns" "github.com/miekg/dns"
) )
func init() {
ctxt, _ = context.WithTimeout(context.Background(), etcdTimeout)
}
// Note the key is encoded as DNS name, while in "reality" it is a etcd path. // Note the key is encoded as DNS name, while in "reality" it is a etcd path.
var services = []*msg.Service{ var services = []*msg.Service{
{Host: "dev.server1", Port: 8080, Key: "a.server1.dev.region1.skydns.test."}, {Host: "dev.server1", Port: 8080, Key: "a.server1.dev.region1.skydns.test."},
@ -206,3 +221,70 @@ var dnsTestCases = []test.Case{
Answer: []dns.RR{test.PTR("1.0.0.10.in-addr.arpa. 300 PTR reverse.example.com.")}, Answer: []dns.RR{test.PTR("1.0.0.10.in-addr.arpa. 300 PTR reverse.example.com.")},
}, },
} }
func newEtcdMiddleware() *Etcd {
ctxt, _ = context.WithTimeout(context.Background(), etcdTimeout)
endpoints := []string{"http://localhost:2379"}
tlsc, _ := tls.NewTLSConfigFromArgs()
client, _ := newEtcdClient(endpoints, tlsc)
return &Etcd{
Proxy: proxy.NewLookup([]string{"8.8.8.8:53"}),
PathPrefix: "skydns",
Ctx: context.Background(),
Inflight: &singleflight.Group{},
Zones: []string{"skydns.test.", "skydns_extra.test.", "in-addr.arpa."},
Client: client,
}
}
func set(t *testing.T, e *Etcd, k string, ttl time.Duration, m *msg.Service) {
b, err := json.Marshal(m)
if err != nil {
t.Fatal(err)
}
path, _ := msg.PathWithWildcard(k, e.PathPrefix)
e.Client.Set(ctxt, path, string(b), &etcdc.SetOptions{TTL: ttl})
}
func delete(t *testing.T, e *Etcd, k string) {
path, _ := msg.PathWithWildcard(k, e.PathPrefix)
e.Client.Delete(ctxt, path, &etcdc.DeleteOptions{Recursive: false})
}
func TestLookup(t *testing.T) {
etc := newEtcdMiddleware()
for _, serv := range services {
set(t, etc, serv.Key, 0, serv)
defer delete(t, etc, serv.Key)
}
for _, tc := range dnsTestCases {
m := tc.Msg()
rec := dnsrecorder.New(&test.ResponseWriter{})
etc.ServeDNS(ctxt, rec, m)
resp := rec.Msg
sort.Sort(test.RRSet(resp.Answer))
sort.Sort(test.RRSet(resp.Ns))
sort.Sort(test.RRSet(resp.Extra))
if !test.Header(t, tc, resp) {
t.Logf("%v\n", resp)
continue
}
if !test.Section(t, tc, test.Answer, resp.Answer) {
t.Logf("%v\n", resp)
}
if !test.Section(t, tc, test.Ns, resp.Ns) {
t.Logf("%v\n", resp)
}
if !test.Section(t, tc, test.Extra, resp.Extra) {
t.Logf("%v\n", resp)
}
}
}
var ctxt context.Context

View file

@ -1,95 +1,12 @@
// +build etcd
package etcd package etcd
import ( import (
"encoding/json"
"sort"
"strings" "strings"
"testing" "testing"
"time"
"github.com/coredns/coredns/middleware/etcd/msg"
"github.com/coredns/coredns/middleware/pkg/dnsrecorder"
"github.com/coredns/coredns/middleware/pkg/singleflight"
"github.com/coredns/coredns/middleware/pkg/tls"
"github.com/coredns/coredns/middleware/proxy"
"github.com/coredns/coredns/middleware/test"
etcdc "github.com/coreos/etcd/client"
"github.com/mholt/caddy" "github.com/mholt/caddy"
"golang.org/x/net/context"
) )
func init() {
ctxt, _ = context.WithTimeout(context.Background(), etcdTimeout)
}
func newEtcdMiddleware() *Etcd {
ctxt, _ = context.WithTimeout(context.Background(), etcdTimeout)
endpoints := []string{"http://localhost:2379"}
tlsc, _ := tls.NewTLSConfigFromArgs()
client, _ := newEtcdClient(endpoints, tlsc)
return &Etcd{
Proxy: proxy.NewLookup([]string{"8.8.8.8:53"}),
PathPrefix: "skydns",
Ctx: context.Background(),
Inflight: &singleflight.Group{},
Zones: []string{"skydns.test.", "skydns_extra.test.", "in-addr.arpa."},
Client: client,
}
}
func set(t *testing.T, e *Etcd, k string, ttl time.Duration, m *msg.Service) {
b, err := json.Marshal(m)
if err != nil {
t.Fatal(err)
}
path, _ := msg.PathWithWildcard(k, e.PathPrefix)
e.Client.Set(ctxt, path, string(b), &etcdc.SetOptions{TTL: ttl})
}
func delete(t *testing.T, e *Etcd, k string) {
path, _ := msg.PathWithWildcard(k, e.PathPrefix)
e.Client.Delete(ctxt, path, &etcdc.DeleteOptions{Recursive: false})
}
func TestLookup(t *testing.T) {
etc := newEtcdMiddleware()
for _, serv := range services {
set(t, etc, serv.Key, 0, serv)
defer delete(t, etc, serv.Key)
}
for _, tc := range dnsTestCases {
m := tc.Msg()
rec := dnsrecorder.New(&test.ResponseWriter{})
etc.ServeDNS(ctxt, rec, m)
resp := rec.Msg
sort.Sort(test.RRSet(resp.Answer))
sort.Sort(test.RRSet(resp.Ns))
sort.Sort(test.RRSet(resp.Extra))
if !test.Header(t, tc, resp) {
t.Logf("%v\n", resp)
continue
}
if !test.Section(t, tc, test.Answer, resp.Answer) {
t.Logf("%v\n", resp)
}
if !test.Section(t, tc, test.Ns, resp.Ns) {
t.Logf("%v\n", resp)
}
if !test.Section(t, tc, test.Extra, resp.Extra) {
t.Logf("%v\n", resp)
}
}
}
func TestSetupEtcd(t *testing.T) { func TestSetupEtcd(t *testing.T) {
tests := []struct { tests := []struct {
input string input string
@ -145,5 +62,3 @@ func TestSetupEtcd(t *testing.T) {
} }
} }
} }
var ctxt context.Context

View file

@ -48,6 +48,11 @@ func TestFileParse(t *testing.T) {
false, false,
Zones{Names: []string{"dnssex.nl."}}, Zones{Names: []string{"dnssex.nl."}},
}, },
{
`file ` + zoneFileName2 + ` 10.0.0.0/8`,
false,
Zones{Names: []string{"10.in-addr.arpa."}},
},
} }
for i, test := range tests { for i, test := range tests {

View file

@ -50,10 +50,10 @@ func TestHostsParse(t *testing.T) {
false, "/etc/hosts", []string{"miek.nl."}, true, false, "/etc/hosts", []string{"miek.nl."}, true,
}, },
{ {
`hosts /etc/hosts miek.nl. pun.gent. { `hosts /etc/hosts miek.nl 10.0.0.9/8 {
fallthrough fallthrough
}`, }`,
false, "/etc/hosts", []string{"miek.nl.", "pun.gent."}, true, false, "/etc/hosts", []string{"miek.nl.", "10.in-addr.arpa."}, true,
}, },
} }

View file

@ -4,7 +4,6 @@ import (
"fmt" "fmt"
"net" "net"
"strconv" "strconv"
"strings"
"sync/atomic" "sync/atomic"
"time" "time"
@ -44,6 +43,8 @@ func NewStaticUpstreams(c *caddyfile.Dispenser) ([]Upstream, error) {
if !c.Args(&upstream.from) { if !c.Args(&upstream.from) {
return upstreams, c.ArgErr() return upstreams, c.ArgErr()
} }
upstream.from = middleware.Host(upstream.from).Normalize()
to := c.RemainingArgs() to := c.RemainingArgs()
if len(to) == 0 { if len(to) == 0 {
return upstreams, c.ArgErr() return upstreams, c.ArgErr()
@ -168,7 +169,7 @@ func parseBlock(c *caddyfile.Dispenser, u *staticUpstream) error {
return c.ArgErr() return c.ArgErr()
} }
for i := 0; i < len(ignoredDomains); i++ { for i := 0; i < len(ignoredDomains); i++ {
ignoredDomains[i] = strings.ToLower(dns.Fqdn(ignoredDomains[i])) ignoredDomains[i] = middleware.Host(ignoredDomains[i]).Normalize()
} }
u.IgnoredSubDomains = ignoredDomains u.IgnoredSubDomains = ignoredDomains
case "spray": case "spray":

View file

@ -1,8 +1,6 @@
package proxy package proxy
import ( import (
"io/ioutil"
"os"
"path/filepath" "path/filepath"
"strings" "strings"
"testing" "testing"
@ -35,19 +33,6 @@ func TestAllowedDomain(t *testing.T) {
} }
} }
func writeTmpFile(t *testing.T, data string) (string, string) {
tempDir, err := ioutil.TempDir("", "")
if err != nil {
t.Fatalf("tempDir: %v", err)
}
path := filepath.Join(tempDir, "resolv.conf")
if err := ioutil.WriteFile(path, []byte(data), 0644); err != nil {
t.Fatalf("writeFile: %v", err)
}
return tempDir, path
}
func TestProxyParse(t *testing.T) { func TestProxyParse(t *testing.T) {
rmFunc, cert, key, ca := getPEMFiles(t) rmFunc, cert, key, ca := getPEMFiles(t)
defer rmFunc() defer rmFunc()
@ -65,6 +50,10 @@ func TestProxyParse(t *testing.T) {
`proxy . 8.8.8.8:53`, `proxy . 8.8.8.8:53`,
false, false,
}, },
{
`proxy 10.0.0.0/24 8.8.8.8:53`,
false,
},
{ {
` `
proxy . 8.8.8.8:53 { proxy . 8.8.8.8:53 {
@ -103,7 +92,7 @@ proxy . 8.8.8.8:53 {
{ {
` `
proxy . 8.8.8.8:53 { proxy . 8.8.8.8:53 {
except miek.nl example.org except miek.nl example.org 10.0.0.0/24
}`, }`,
false, false,
}, },
@ -283,13 +272,18 @@ junky resolve.conf
[]string{"1.1.1.1:5000", "2.2.2.2:1234"}, []string{"1.1.1.1:5000", "2.2.2.2:1234"},
}, },
} }
for i, test := range tests { for i, tc := range tests {
tempDir, path := writeTmpFile(t, test.filedata)
defer os.RemoveAll(tempDir) path, rm, err := test.TempFile(".", tc.filedata)
config := strings.Replace(test.inputUpstreams, "FILE", path, -1) if err != nil {
t.Fatalf("Test %d could not creat temp file %v", i, err)
}
defer rm()
config := strings.Replace(tc.inputUpstreams, "FILE", path, -1)
c := caddy.NewTestController("dns", config) c := caddy.NewTestController("dns", config)
upstreams, err := NewStaticUpstreams(&c.Dispenser) upstreams, err := NewStaticUpstreams(&c.Dispenser)
if (err != nil) != test.shouldErr { if (err != nil) != tc.shouldErr {
t.Errorf("Test %d expected no error, got %v", i+1, err) t.Errorf("Test %d expected no error, got %v", i+1, err)
} }
var hosts []string var hosts []string
@ -298,18 +292,18 @@ junky resolve.conf
hosts = append(hosts, h.Name) hosts = append(hosts, h.Name)
} }
} }
if !test.shouldErr { if !tc.shouldErr {
if len(hosts) != len(test.expected) { if len(hosts) != len(tc.expected) {
t.Errorf("Test %d expected %d hosts got %d", i+1, len(test.expected), len(upstreams)) t.Errorf("Test %d expected %d hosts got %d", i+1, len(tc.expected), len(upstreams))
} else { } else {
ok := true ok := true
for i, v := range test.expected { for i, v := range tc.expected {
if v != hosts[i] { if v != hosts[i] {
ok = false ok = false
} }
} }
if !ok { if !ok {
t.Errorf("Test %d expected %v got %v", i+1, test.expected, upstreams) t.Errorf("Test %d expected %v got %v", i+1, tc.expected, upstreams)
} }
} }
} }