Deflake by retrying and adding random port numbers. We try 3 times to get an instance. Also fix a bug where server.Stop() was called even if the server creation failed - this was never hit due to t.Fatal() above it, but fix that nontheless. Signed-off-by: Miek Gieben <miek@miek.nl>
160 lines
4.5 KiB
Go
160 lines
4.5 KiB
Go
package test
|
|
|
|
import (
|
|
"fmt"
|
|
"math/rand"
|
|
"reflect"
|
|
"testing"
|
|
"unsafe"
|
|
|
|
"github.com/coredns/caddy"
|
|
"github.com/coredns/coredns/core/dnsserver"
|
|
|
|
"github.com/miekg/dns"
|
|
)
|
|
|
|
// Start 2 tests server, server A will proxy to B, server B is an CH server.
|
|
func TestProxyToChaosServer(t *testing.T) {
|
|
t.Parallel()
|
|
corefile := `.:0 {
|
|
chaos CoreDNS-001 miek@miek.nl
|
|
}`
|
|
|
|
chaos, udpChaos, _, err := CoreDNSServerAndPorts(corefile)
|
|
if err != nil {
|
|
t.Fatalf("Could not get CoreDNS serving instance: %s", err)
|
|
}
|
|
|
|
defer chaos.Stop()
|
|
|
|
corefileProxy := `.:0 {
|
|
forward . ` + udpChaos + `
|
|
}`
|
|
|
|
proxy, udp, _, err := CoreDNSServerAndPorts(corefileProxy)
|
|
if err != nil {
|
|
t.Fatalf("Could not get CoreDNS serving instance")
|
|
}
|
|
defer proxy.Stop()
|
|
|
|
chaosTest(t, udpChaos)
|
|
|
|
chaosTest(t, udp)
|
|
// chaosTest(t, tcp, "tcp"), commented out because we use the original transport to reach the
|
|
// proxy and we only forward to the udp port.
|
|
}
|
|
|
|
func chaosTest(t *testing.T, server string) {
|
|
m := new(dns.Msg)
|
|
m.Question = make([]dns.Question, 1)
|
|
m.Question[0] = dns.Question{Qclass: dns.ClassCHAOS, Name: "version.bind.", Qtype: dns.TypeTXT}
|
|
|
|
r, err := dns.Exchange(m, server)
|
|
if err != nil {
|
|
t.Fatalf("Could not send message: %s", err)
|
|
}
|
|
if r.Rcode != dns.RcodeSuccess || len(r.Answer) == 0 {
|
|
t.Fatalf("Expected successful reply, got %s", dns.RcodeToString[r.Rcode])
|
|
}
|
|
if r.Answer[0].String() != `version.bind. 0 CH TXT "CoreDNS-001"` {
|
|
t.Fatalf("Expected version.bind. reply, got %s", r.Answer[0].String())
|
|
}
|
|
}
|
|
|
|
func TestReverseExpansion(t *testing.T) {
|
|
// this test needs a fixed port, because with :0 the expanded reverse zone will listen on different
|
|
// addresses and we can't check which ones...
|
|
corefile := `10.0.0.0/15:5053 {
|
|
whoami
|
|
}`
|
|
|
|
server, udp, _, err := CoreDNSServerAndPorts(corefile)
|
|
if err != nil {
|
|
t.Fatalf("Could not get CoreDNS serving instance: %s", err)
|
|
}
|
|
|
|
defer server.Stop()
|
|
|
|
m := new(dns.Msg)
|
|
m.SetQuestion("whoami.0.10.in-addr.arpa.", dns.TypeA)
|
|
|
|
r, err := dns.Exchange(m, udp)
|
|
if err != nil {
|
|
t.Fatalf("Could not send message: %s", err)
|
|
}
|
|
if r.Rcode != dns.RcodeSuccess {
|
|
t.Errorf("Expected NOERROR, got %d", r.Rcode)
|
|
}
|
|
if len(r.Extra) != 2 {
|
|
t.Errorf("Expected 2 RRs in additional section, got %d", len(r.Extra))
|
|
}
|
|
|
|
m.SetQuestion("whoami.1.10.in-addr.arpa.", dns.TypeA)
|
|
r, err = dns.Exchange(m, udp)
|
|
if err != nil {
|
|
t.Fatalf("Could not send message: %s", err)
|
|
}
|
|
if r.Rcode != dns.RcodeSuccess {
|
|
t.Errorf("Expected NOERROR, got %d", r.Rcode)
|
|
}
|
|
if len(r.Extra) != 2 {
|
|
t.Errorf("Expected 2 RRs in additional section, got %d", len(r.Extra))
|
|
}
|
|
|
|
// should be refused
|
|
m.SetQuestion("whoami.2.10.in-addr.arpa.", dns.TypeA)
|
|
r, err = dns.Exchange(m, udp)
|
|
if err != nil {
|
|
t.Fatalf("Could not send message: %s", err)
|
|
}
|
|
if r.Rcode != dns.RcodeRefused {
|
|
t.Errorf("Expected REFUSED, got %d", r.Rcode)
|
|
}
|
|
if len(r.Extra) != 0 {
|
|
t.Errorf("Expected 0 RRs in additional section, got %d", len(r.Extra))
|
|
}
|
|
}
|
|
|
|
func TestMultiZoneBlockConfigs(t *testing.T) {
|
|
// We need fixed port numbers here to have multiple serving instances, using ".:0" wont work because that
|
|
// leads to a 'duplicate server instances' because '0' is used literary (only the kernel knows what port will
|
|
// be assigned).
|
|
//
|
|
// This makes the test flaky because we don't know if there are in-use or not. We add a random number to each base and
|
|
// retry when we fail to get a serving instance (up to 3 times).
|
|
|
|
var (
|
|
server *caddy.Instance
|
|
err error
|
|
)
|
|
for j := 0; j < 3; j++ {
|
|
corefile := `.:%d .:%d .:%d {
|
|
debug
|
|
}`
|
|
corefile = fmt.Sprintf(corefile, 40000+rand.Intn(9000), 50000+rand.Intn(9000), 60000+rand.Intn(9000))
|
|
|
|
if server, err = CoreDNSServer(corefile); err != nil {
|
|
continue
|
|
}
|
|
t.Logf("Got running CoreDNS serving instance, after %d tries", j+1)
|
|
break // success
|
|
}
|
|
if server == nil {
|
|
t.Fatalf("Could not get CoreDNS serving instance: %s", err)
|
|
}
|
|
defer server.Stop()
|
|
|
|
// unsafe reflection to read unexported fields "context" and "configs" within context
|
|
ctxVal := reflect.ValueOf(server).Elem().FieldByName("context")
|
|
ctxVal2 := reflect.NewAt(ctxVal.Type(), unsafe.Pointer(ctxVal.UnsafeAddr())).Elem()
|
|
configs := reflect.ValueOf(ctxVal2.Interface()).Elem().FieldByName("configs")
|
|
configs2 := reflect.NewAt(configs.Type(), unsafe.Pointer(configs.UnsafeAddr())).Elem()
|
|
|
|
for i := 0; i < 3; i++ {
|
|
v := configs2.Index(i)
|
|
config := v.Interface().(*dnsserver.Config)
|
|
if !config.Debug {
|
|
t.Fatalf("Debug was not set for %s://%s:%s", config.Transport, config.Zone, config.Port)
|
|
}
|
|
}
|
|
}
|