mirror of
https://github.com/StackExchange/dnscontrol.git
synced 2025-12-22 16:50:19 +08:00
# Issue Fixes https://github.com/StackExchange/dnscontrol/issues/3912 # Resolution ``` #!/bin/sh # Reset git fetch origin main git reset --hard origin/main git checkout main git branch -D tlim_moveproviders git checkout -b tlim_moveproviders find . -name \*.bak -delete # Move the *.go files out of providers/ mkdir -p pkg/providers git mv providers/*.go pkg/providers # move the _all file out of providers/ git mv providers/_all pkg/providers/_all # Update the imports (in go.* and the affected files) sed -i.bak -e 's@"github.com/StackExchange/dnscontrol/v4/providers"@"github.com/StackExchange/dnscontrol/v4/pkg/providers"@g' go.* $(fgrep -lr --include '*.go' '"github.com/StackExchange/dnscontrol/v4/providers"' *) sed -i.bak -e 's@"../../providers"@"../../pkg/providers"@g' pkg/normalize/capabilities_test.go sed -i.bak -e 's@"github.com/StackExchange/dnscontrol/v4/providers/_all"@"github.com/StackExchange/dnscontrol/v4/pkg/providers/_all"@g' go.* $(fgrep -lr --include '*.go' '"github.com/StackExchange/dnscontrol/v4/providers/_all"' *) # Fix the docs sed -i.bak -e 's@StackExchange/dnscontrol/blob/main/providers/_all/all.go@StackExchange/dnscontrol/blob/main/pkg/providers/_all/all.go@g' documentation/advanced-features/writing-providers.md sed -i.bak -e 's@StackExchange/dnscontrol/providers@StackExchange/dnscontrol/pkg/providers@g' documentation/advanced-features/writing-providers.md sed -i.bak -e 's@StackExchange/dnscontrol/v4/providers@StackExchange/dnscontrol/v4/pkg/providers@g' documentation/advanced-features/writing-providers.md sed -i.bak -e 's@dnscontrol/providers/providers.go@dnscontrol/pkg/providers/providers.go@g' documentation/advanced-features/writing-providers.md sed -i.bak -e 's@providers/_all/all.go@pkg/providers/_all/all.go@g' documentation/advanced-features/writing-providers.md #sed -i.bak -e 's@@@g' documentation/advanced-features/writing-providers.md #sed -i.bak -e 's@@@g' documentation/advanced-features/writing-providers.md find . -name \*.bak -delete go fmt ./... git status echo git commit -a -m'CHORE: Move Non-provider files in providers to pkg/providers' ```
212 lines
5.6 KiB
Go
212 lines
5.6 KiB
Go
package main
|
|
|
|
// Test the providers.
|
|
|
|
import (
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/StackExchange/dnscontrol/v4/models"
|
|
"github.com/StackExchange/dnscontrol/v4/pkg/nameservers"
|
|
"github.com/StackExchange/dnscontrol/v4/pkg/providers"
|
|
"github.com/StackExchange/dnscontrol/v4/pkg/zonerecs"
|
|
)
|
|
|
|
// TestDualProviders verifies that providers labeled DocDualHost support having
|
|
// delegation to multiple DNS Providers. i.e. verifies that example.com's
|
|
// delegations can be both ROUTE53 and GCLOUD. Some providers want to be the
|
|
// only provider for a domain.
|
|
func TestDualProviders(t *testing.T) {
|
|
p, domain, _ := getProvider(t)
|
|
if p == nil {
|
|
return
|
|
}
|
|
if domain == "" {
|
|
t.Fatal("NO DOMAIN SET! Exiting!")
|
|
}
|
|
dc := getDomainConfigWithNameservers(t, p, domain)
|
|
if !providers.ProviderHasCapability(*providerFlag, providers.DocDualHost) {
|
|
t.Skip("Skipping. DocDualHost == Cannot")
|
|
return
|
|
}
|
|
// clear everything
|
|
run := func() {
|
|
dom, _ := dc.Copy()
|
|
|
|
rs, cs, _, err := zonerecs.CorrectZoneRecords(p, dom)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
for i, c := range rs {
|
|
t.Logf("INFO#%d:\n%s", i+1, c.Msg)
|
|
}
|
|
for i, c := range cs {
|
|
t.Logf("#%d:\n%s", i+1, c.Msg)
|
|
if err = c.F(); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
}
|
|
t.Log("Clearing everything")
|
|
run()
|
|
// add bogus nameservers
|
|
dc.Records = []*models.RecordConfig{}
|
|
nsList, _ := models.ToNameservers([]string{"ns1.example.com", "ns2.example.com"})
|
|
dc.Nameservers = append(dc.Nameservers, nsList...)
|
|
nameservers.AddNSRecords(dc)
|
|
t.Log("Adding test nameservers")
|
|
run()
|
|
// run again to make sure no corrections
|
|
t.Log("Running again to ensure stability")
|
|
rs, cs, actualChangeCount, err := zonerecs.CorrectZoneRecords(p, dc)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if actualChangeCount != 0 {
|
|
t.Logf("Expect no corrections on second run, but found %d.", actualChangeCount)
|
|
for i, c := range rs {
|
|
t.Logf("INFO#%d:\n%s", i+1, c.Msg)
|
|
}
|
|
for i, c := range cs {
|
|
t.Logf("#%d: %s", i+1, c.Msg)
|
|
}
|
|
t.FailNow()
|
|
}
|
|
|
|
t.Log("Removing test nameservers")
|
|
dc.Records = []*models.RecordConfig{}
|
|
n := 0
|
|
for _, ns := range dc.Nameservers {
|
|
if ns.Name == "ns1.example.com" || ns.Name == "ns2.example.com" {
|
|
continue
|
|
}
|
|
dc.Nameservers[n] = ns
|
|
n++
|
|
}
|
|
dc.Nameservers = dc.Nameservers[:n]
|
|
nameservers.AddNSRecords(dc)
|
|
run()
|
|
}
|
|
|
|
// TestNameserverDots verifies a provider returns properly-formed nameservers.
|
|
func TestNameserverDots(t *testing.T) {
|
|
// Issue https://github.com/StackExchange/dnscontrol/issues/491
|
|
// If this fails, the provider's GetNameservers() function uses
|
|
// models.ToNameserversStripTD() instead of models.ToNameservers()
|
|
// or vise-versa.
|
|
|
|
// Setup:
|
|
p, domain, _ := getProvider(t)
|
|
if p == nil {
|
|
return
|
|
}
|
|
if domain == "" {
|
|
t.Fatal("NO DOMAIN SET! Exiting!")
|
|
}
|
|
dc := getDomainConfigWithNameservers(t, p, domain)
|
|
if !providers.ProviderHasCapability(*providerFlag, providers.DocDualHost) {
|
|
t.Skip("Skipping. DocDualHost == Cannot")
|
|
return
|
|
}
|
|
|
|
t.Run("No trailing dot in nameserver", func(t *testing.T) {
|
|
for _, nameserver := range dc.Nameservers {
|
|
// fmt.Printf("DEBUG: nameserver.Name = %q\n", nameserver.Name)
|
|
if strings.HasSuffix(nameserver.Name, ".") {
|
|
t.Errorf("Provider returned nameserver with trailing dot: %q", nameserver)
|
|
}
|
|
}
|
|
})
|
|
}
|
|
|
|
// TestDuplicateNameservers verifies that a provider de-dupes nameservers if existing nameservers are added.
|
|
func TestDuplicateNameservers(t *testing.T) {
|
|
// Issue: https://github.com/StackExchange/dnscontrol/issues/3088
|
|
// Only configuring for Azure DNS
|
|
|
|
// Setup:
|
|
p, domain, cfg := getProvider(t)
|
|
if p == nil {
|
|
return
|
|
}
|
|
|
|
if domain == "" {
|
|
t.Fatal("NO DOMAIN SET! Exiting!")
|
|
}
|
|
|
|
dc := getDomainConfigWithNameservers(t, p, domain)
|
|
|
|
if !providers.ProviderHasCapability(*providerFlag, providers.DocDualHost) {
|
|
t.Skip("Skipping. DocDualHost == Cannot")
|
|
return
|
|
}
|
|
|
|
if cfg["TYPE"] != "AZURE_DNS" {
|
|
t.Skip("Skipping. Deduplication logic is not implemented for this provider.")
|
|
return
|
|
}
|
|
|
|
// clear everything
|
|
run := func(expectedChangeCount int, msg string, ignoreExpected bool) {
|
|
dom, _ := dc.Copy()
|
|
|
|
rs, cs, actualChangeCount, err := zonerecs.CorrectZoneRecords(p, dom)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
for i, c := range rs {
|
|
t.Logf("INFO#%d:\n%s", i+1, c.Msg)
|
|
}
|
|
for i, c := range cs {
|
|
t.Logf("#%d:\n%s", i+1, c.Msg)
|
|
if err = c.F(); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
}
|
|
if (!ignoreExpected) && actualChangeCount != expectedChangeCount {
|
|
t.Logf(msg, actualChangeCount)
|
|
t.FailNow()
|
|
}
|
|
}
|
|
|
|
t.Log("Clearing everything")
|
|
dc.Records = []*models.RecordConfig{}
|
|
n := 0
|
|
for _, ns := range dc.Nameservers {
|
|
if ns.Name == "ns1.example.com" || ns.Name == "ns2.example.com" {
|
|
continue
|
|
}
|
|
dc.Nameservers[n] = ns
|
|
n++
|
|
}
|
|
dc.Nameservers = dc.Nameservers[:n]
|
|
nameservers.AddNSRecords(dc)
|
|
run(0, "Clearing everything", true)
|
|
|
|
// add bogus nameservers and duplicate nameservers
|
|
dc.Records = []*models.RecordConfig{}
|
|
nsList, _ := models.ToNameservers([]string{"ns1.example.com"})
|
|
dc.Nameservers = append(dc.Nameservers, dc.Nameservers...)
|
|
dc.Nameservers = append(dc.Nameservers, nsList...)
|
|
nameservers.AddNSRecords(dc)
|
|
t.Log("Adding test nameservers")
|
|
run(1, "Expect 1 correction, but found %d.", false)
|
|
|
|
// run again to make sure no corrections
|
|
t.Log("Running again to ensure stability")
|
|
run(0, "Expect no corrections on second run, but found %d.", false)
|
|
|
|
t.Log("Removing test nameservers")
|
|
dc.Records = []*models.RecordConfig{}
|
|
n = 0
|
|
for _, ns := range dc.Nameservers {
|
|
if ns.Name == "ns1.example.com" || ns.Name == "ns2.example.com" {
|
|
continue
|
|
}
|
|
dc.Nameservers[n] = ns
|
|
n++
|
|
}
|
|
dc.Nameservers = dc.Nameservers[:n]
|
|
nameservers.AddNSRecords(dc)
|
|
run(0, "Removing test nameservers", true)
|
|
}
|