coredns/test/proxy_health_test.go
Miek Gieben 1c45e262f5 middleware/proxy: remove singleinflight from dns (#717)
Singleinflight interferes with the health checking of upstream. If an
upstream would fail, singleinflight would mirror that error to to other
proxy *iff* multple identical queries would be inflight. This would lead
to marking *all* upstreams as bad, essentially collapsing multiple
upstreams into a SPOF. Clearly not what we want.

Singleinflight does have some nice properties, but I've opted to rip it
out entirely. Caching should almost (but not quite) as good.

Added a test case in test that uses 3 CoreDNS instances to reflect the
setup from #715.

Found another bug as well, where (when the policy would be nil), we
would always Spray even though we've found a healthy host.
2017-06-08 16:06:14 +01:00

116 lines
2.5 KiB
Go

package test
import (
"io/ioutil"
"log"
"testing"
"github.com/coredns/coredns/middleware/proxy"
"github.com/coredns/coredns/middleware/test"
"github.com/coredns/coredns/request"
"github.com/miekg/dns"
)
func TestProxyErratic(t *testing.T) {
log.SetOutput(ioutil.Discard)
corefile := `example.org:0 {
erratic {
drop 2
}
}
`
backend, err := CoreDNSServer(corefile)
if err != nil {
t.Fatalf("Could not get CoreDNS serving instance: %s", err)
}
udp, _ := CoreDNSServerPorts(backend, 0)
if udp == "" {
t.Fatalf("Could not get UDP listening port")
}
defer backend.Stop()
p := proxy.NewLookup([]string{udp})
state := request.Request{W: &test.ResponseWriter{}, Req: new(dns.Msg)}
// We do one lookup that should not time out.
// After this the backend is marked unhealthy anyway. So basically this
// tests that it times out.
p.Lookup(state, "example.org.", dns.TypeA)
}
func TestProxyThreeWay(t *testing.T) {
// Run 3 CoreDNS server, 2 upstream ones and a proxy. 1 Upstream is unhealthy after 1 query, but after
// that we should still be able to send to the other one
log.SetOutput(ioutil.Discard)
// Backend CoreDNS's.
corefileUp1 := `example.org:0 {
erratic {
drop 2
}
}
`
up1, err := CoreDNSServer(corefileUp1)
if err != nil {
t.Fatalf("Could not get CoreDNS serving instance: %s", err)
}
defer up1.Stop()
corefileUp2 := `example.org:0 {
whoami
}
`
up2, err := CoreDNSServer(corefileUp2)
if err != nil {
t.Fatalf("Could not get CoreDNS serving instance: %s", err)
}
defer up2.Stop()
addr1, _ := CoreDNSServerPorts(up1, 0)
if addr1 == "" {
t.Fatalf("Could not get UDP listening port")
}
addr2, _ := CoreDNSServerPorts(up2, 0)
if addr2 == "" {
t.Fatalf("Could not get UDP listening port")
}
// Proxying CoreDNS.
corefileProxy := `example.org:0 {
proxy . ` + addr1 + " " + addr2 + ` {
max_fails 1
}
}`
prx, err := CoreDNSServer(corefileProxy)
if err != nil {
t.Fatalf("Could not get CoreDNS serving instance: %s", err)
}
defer prx.Stop()
addr, _ := CoreDNSServerPorts(prx, 0)
if addr == "" {
t.Fatalf("Could not get UDP listening port")
}
m := new(dns.Msg)
m.SetQuestion("example.org.", dns.TypeA)
for i := 0; i < 10; i++ {
r, err := dns.Exchange(m, addr)
if err != nil {
continue
}
// We would previously get SERVFAIL, so just getting answers here
// is a good sign. The actuall timeouts are handled in the err != nil case
// above.
if r.Rcode != dns.RcodeSuccess {
t.Fatalf("Expected success rcode, got %d", r.Rcode)
}
}
}