mirror of
https://github.com/StackExchange/dnscontrol.git
synced 2025-01-11 09:59:59 +08:00
2f83aa9302
* Switched to v2 go.mod Also set GO111MODULE=on in build stuff to always use Go modules even when in GOPATH. * Ensure go.mod, go.sum, and vendor are up to date * Attempt to fix Azure pipelines * Add set -e to properly fail on exit (it didn't seem to be propagating properly before). * Set workingDirectory for GoFmt and GoGen (this might be why it fails unlike compile and unitests). * Another attempt to fix Azure Pipelines * Use the Go env template for all go-related jobs. * Completely fixed Azure Pipelines * Added a display name to GoFmt for consistency. * Fixed diffs for GoFmt and GoGen. * Show git status for checks. * Drop GOPATH for tests TODO: Do the same for integration tests. * Drop GOPATH for integration tests * Show more diffs * Regenerate provider support matrix This wasn't done in #590...
281 lines
7.8 KiB
Go
281 lines
7.8 KiB
Go
package normalize
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"fmt"
|
|
|
|
"github.com/StackExchange/dnscontrol/v2/models"
|
|
)
|
|
|
|
func TestCheckLabel(t *testing.T) {
|
|
var tests = []struct {
|
|
label string
|
|
rType string
|
|
isError bool
|
|
hasSkipMeta bool
|
|
}{
|
|
{"@", "A", false, false},
|
|
{"foo.bar", "A", false, false},
|
|
{"_foo", "A", true, false},
|
|
{"_foo", "SRV", false, false},
|
|
{"_foo", "TLSA", false, false},
|
|
{"_foo", "TXT", false, false},
|
|
{"test.foo.tld", "A", true, false},
|
|
{"test.foo.tld", "A", false, true},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
t.Run(fmt.Sprintf("%s %s", test.label, test.rType), func(t *testing.T) {
|
|
meta := map[string]string{}
|
|
if test.hasSkipMeta {
|
|
meta["skip_fqdn_check"] = "true"
|
|
}
|
|
err := checkLabel(test.label, test.rType, "foo.tld", meta)
|
|
if err != nil && !test.isError {
|
|
t.Errorf(" Expected no error but got %s", err)
|
|
}
|
|
if err == nil && test.isError {
|
|
t.Errorf(" Expected error but got none")
|
|
}
|
|
})
|
|
|
|
}
|
|
}
|
|
|
|
func checkError(t *testing.T, err error, shouldError bool, experiment string) {
|
|
if err != nil && !shouldError {
|
|
t.Errorf("%v: Error (%v)\n", experiment, err)
|
|
}
|
|
if err == nil && shouldError {
|
|
t.Errorf("%v: Expected error but got none \n", experiment)
|
|
}
|
|
}
|
|
|
|
func Test_assert_valid_ipv4(t *testing.T) {
|
|
var tests = []struct {
|
|
experiment string
|
|
isError bool
|
|
}{
|
|
{"1.2.3.4", false},
|
|
{"1.2.3.4/10", true},
|
|
{"1.2.3", true},
|
|
{"foo", true},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
err := checkIPv4(test.experiment)
|
|
checkError(t, err, test.isError, test.experiment)
|
|
}
|
|
}
|
|
|
|
func Test_assert_valid_target(t *testing.T) {
|
|
var tests = []struct {
|
|
experiment string
|
|
isError bool
|
|
}{
|
|
{"@", false},
|
|
{"foo", false},
|
|
{"foo.bar.", false},
|
|
{"foo.", false},
|
|
{"foo.bar", true},
|
|
{"foo&bar", true},
|
|
{"foo bar", true},
|
|
{"elb21.freshdesk.com/", true},
|
|
{"elb21.freshdesk.com/.", true},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
err := checkTarget(test.experiment)
|
|
checkError(t, err, test.isError, test.experiment)
|
|
}
|
|
}
|
|
|
|
func Test_transform_cname(t *testing.T) {
|
|
var tests = []struct {
|
|
experiment string
|
|
expected string
|
|
}{
|
|
{"@", "old.com.new.com."},
|
|
{"foo", "foo.old.com.new.com."},
|
|
{"foo.bar", "foo.bar.old.com.new.com."},
|
|
{"foo.bar.", "foo.bar.new.com."},
|
|
{"chat.stackexchange.com.", "chat.stackexchange.com.new.com."},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
actual := transformCNAME(test.experiment, "old.com", "new.com")
|
|
if test.expected != actual {
|
|
t.Errorf("%v: expected (%v) got (%v)\n", test.experiment, test.expected, actual)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestNSAtRoot(t *testing.T) {
|
|
// do not allow ns records for @
|
|
rec := &models.RecordConfig{Type: "NS"}
|
|
rec.SetLabel("test", "foo.com")
|
|
rec.SetTarget("ns1.name.com.")
|
|
errs := checkTargets(rec, "foo.com")
|
|
if len(errs) > 0 {
|
|
t.Error("Expect no error with ns record on subdomain")
|
|
}
|
|
rec.SetLabel("@", "foo.com")
|
|
errs = checkTargets(rec, "foo.com")
|
|
if len(errs) != 1 {
|
|
t.Error("Expect error with ns record on @")
|
|
}
|
|
}
|
|
|
|
func TestTransforms(t *testing.T) {
|
|
var tests = []struct {
|
|
givenIP string
|
|
expectedRecords []string
|
|
}{
|
|
{"0.0.5.5", []string{"2.0.5.5"}},
|
|
{"3.0.5.5", []string{"5.5.5.5"}},
|
|
{"7.0.5.5", []string{"9.9.9.9", "10.10.10.10"}},
|
|
}
|
|
const transform = "0.0.0.0~1.0.0.0~2.0.0.0~; 3.0.0.0~4.0.0.0~~5.5.5.5; 7.0.0.0~8.0.0.0~~9.9.9.9,10.10.10.10"
|
|
for i, test := range tests {
|
|
dc := &models.DomainConfig{
|
|
Records: []*models.RecordConfig{
|
|
makeRC("f", "example.tld", test.givenIP, models.RecordConfig{Type: "A", Metadata: map[string]string{"transform": transform}}),
|
|
},
|
|
}
|
|
err := applyRecordTransforms(dc)
|
|
if err != nil {
|
|
t.Errorf("error on test %d: %s", i, err)
|
|
continue
|
|
}
|
|
if len(dc.Records) != len(test.expectedRecords) {
|
|
t.Errorf("test %d: expect %d records but found %d", i, len(test.expectedRecords), len(dc.Records))
|
|
continue
|
|
}
|
|
for r, rec := range dc.Records {
|
|
if rec.GetTargetField() != test.expectedRecords[r] {
|
|
t.Errorf("test %d at index %d: records don't match. Expect %s but found %s.", i, r, test.expectedRecords[r], rec.GetTargetField())
|
|
continue
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestCNAMEMutex(t *testing.T) {
|
|
var recA = &models.RecordConfig{Type: "CNAME"}
|
|
recA.SetLabel("foo", "foo.example.com")
|
|
recA.SetTarget("example.com.")
|
|
tests := []struct {
|
|
rType string
|
|
name string
|
|
fail bool
|
|
}{
|
|
{"A", "foo", true},
|
|
{"A", "foo2", false},
|
|
{"CNAME", "foo", true},
|
|
{"CNAME", "foo2", false},
|
|
}
|
|
for _, tst := range tests {
|
|
t.Run(fmt.Sprintf("%s %s", tst.rType, tst.name), func(t *testing.T) {
|
|
var recB = &models.RecordConfig{Type: tst.rType}
|
|
recB.SetLabel(tst.name, "example.com")
|
|
recB.SetTarget("example2.com.")
|
|
dc := &models.DomainConfig{
|
|
Name: "example.com",
|
|
Records: []*models.RecordConfig{recA, recB},
|
|
}
|
|
errs := checkCNAMEs(dc)
|
|
if errs != nil && !tst.fail {
|
|
t.Error("Got error but expected none")
|
|
}
|
|
if errs == nil && tst.fail {
|
|
t.Error("Expected error but got none")
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestCAAValidation(t *testing.T) {
|
|
config := &models.DNSConfig{
|
|
Domains: []*models.DomainConfig{
|
|
{
|
|
Name: "example.com",
|
|
RegistrarName: "BIND",
|
|
Records: []*models.RecordConfig{
|
|
makeRC("@", "example.com", "example.com", models.RecordConfig{Type: "CAA", CaaTag: "invalid"}),
|
|
},
|
|
},
|
|
},
|
|
}
|
|
errs := NormalizeAndValidateConfig(config)
|
|
if len(errs) != 1 {
|
|
t.Error("Expect error on invalid CAA but got none")
|
|
}
|
|
}
|
|
|
|
func TestCheckDuplicates(t *testing.T) {
|
|
records := []*models.RecordConfig{
|
|
// The only difference is the target:
|
|
makeRC("www", "example.com", "4.4.4.4", models.RecordConfig{Type: "A"}),
|
|
makeRC("www", "example.com", "5.5.5.5", models.RecordConfig{Type: "A"}),
|
|
// The only difference is the rType:
|
|
makeRC("aaa", "example.com", "uniquestring.com.", models.RecordConfig{Type: "NS"}),
|
|
makeRC("aaa", "example.com", "uniquestring.com.", models.RecordConfig{Type: "PTR"}),
|
|
// The only difference is the TTL.
|
|
makeRC("zzz", "example.com", "4.4.4.4", models.RecordConfig{Type: "A", TTL: 111}),
|
|
makeRC("zzz", "example.com", "4.4.4.4", models.RecordConfig{Type: "A", TTL: 222}),
|
|
// Three records each with a different target.
|
|
makeRC("@", "example.com", "ns1.foo.com.", models.RecordConfig{Type: "NS"}),
|
|
makeRC("@", "example.com", "ns2.foo.com.", models.RecordConfig{Type: "NS"}),
|
|
makeRC("@", "example.com", "ns3.foo.com.", models.RecordConfig{Type: "NS"}),
|
|
}
|
|
errs := checkDuplicates(records)
|
|
if len(errs) != 0 {
|
|
t.Errorf("Expect duplicate NOT found but found %q", errs)
|
|
}
|
|
}
|
|
|
|
func TestCheckDuplicates_dup_a(t *testing.T) {
|
|
records := []*models.RecordConfig{
|
|
// A records that are exact dupliates.
|
|
makeRC("@", "example.com", "1.1.1.1", models.RecordConfig{Type: "A"}),
|
|
makeRC("@", "example.com", "1.1.1.1", models.RecordConfig{Type: "A"}),
|
|
}
|
|
errs := checkDuplicates(records)
|
|
if len(errs) == 0 {
|
|
t.Error("Expect duplicate found but found none")
|
|
}
|
|
}
|
|
|
|
func TestCheckDuplicates_dup_ns(t *testing.T) {
|
|
records := []*models.RecordConfig{
|
|
// Three records, the last 2 are duplicates.
|
|
// NB: This is a common issue.
|
|
makeRC("@", "example.com", "ns1.foo.com.", models.RecordConfig{Type: "NS"}),
|
|
makeRC("@", "example.com", "ns2.foo.com.", models.RecordConfig{Type: "NS"}),
|
|
makeRC("@", "example.com", "ns2.foo.com.", models.RecordConfig{Type: "NS"}),
|
|
}
|
|
errs := checkDuplicates(records)
|
|
if len(errs) == 0 {
|
|
t.Error("Expect duplicate found but found none")
|
|
}
|
|
}
|
|
|
|
func TestTLSAValidation(t *testing.T) {
|
|
config := &models.DNSConfig{
|
|
Domains: []*models.DomainConfig{
|
|
{
|
|
Name: "_443._tcp.example.com",
|
|
RegistrarName: "BIND",
|
|
Records: []*models.RecordConfig{
|
|
makeRC("_443._tcp", "_443._tcp.example.com", "abcdef0", models.RecordConfig{
|
|
Type: "TLSA", TlsaUsage: 4, TlsaSelector: 1, TlsaMatchingType: 1}),
|
|
},
|
|
},
|
|
},
|
|
}
|
|
errs := NormalizeAndValidateConfig(config)
|
|
if len(errs) != 1 {
|
|
t.Error("Expect error on invalid TLSA but got none")
|
|
}
|
|
}
|