dnscontrol/integrationTest/provider_test.go
Tom Limoncelli 7ab7d147fb
CHORE: Move non-provider code out of /providers (#3916)
# Issue

Fixes https://github.com/StackExchange/dnscontrol/issues/3912

# Resolution

```
#!/bin/sh

# Reset

git fetch origin main
git reset --hard origin/main
git checkout main
git branch -D tlim_moveproviders
git checkout -b tlim_moveproviders
find . -name \*.bak -delete

# Move the *.go files out of providers/

mkdir -p pkg/providers
git mv providers/*.go pkg/providers

# move the _all file out of providers/

git mv providers/_all pkg/providers/_all

# Update the imports (in go.* and the affected files)

sed -i.bak -e 's@"github.com/StackExchange/dnscontrol/v4/providers"@"github.com/StackExchange/dnscontrol/v4/pkg/providers"@g' go.* $(fgrep -lr --include '*.go' '"github.com/StackExchange/dnscontrol/v4/providers"' *)
sed -i.bak -e 's@"../../providers"@"../../pkg/providers"@g' pkg/normalize/capabilities_test.go
sed -i.bak -e 's@"github.com/StackExchange/dnscontrol/v4/providers/_all"@"github.com/StackExchange/dnscontrol/v4/pkg/providers/_all"@g' go.* $(fgrep -lr --include '*.go' '"github.com/StackExchange/dnscontrol/v4/providers/_all"' *)

# Fix the docs

sed -i.bak -e 's@StackExchange/dnscontrol/blob/main/providers/_all/all.go@StackExchange/dnscontrol/blob/main/pkg/providers/_all/all.go@g' documentation/advanced-features/writing-providers.md
sed -i.bak -e 's@StackExchange/dnscontrol/providers@StackExchange/dnscontrol/pkg/providers@g' documentation/advanced-features/writing-providers.md
sed -i.bak -e 's@StackExchange/dnscontrol/v4/providers@StackExchange/dnscontrol/v4/pkg/providers@g' documentation/advanced-features/writing-providers.md
sed -i.bak -e 's@dnscontrol/providers/providers.go@dnscontrol/pkg/providers/providers.go@g' documentation/advanced-features/writing-providers.md
sed -i.bak -e 's@providers/_all/all.go@pkg/providers/_all/all.go@g' documentation/advanced-features/writing-providers.md
#sed -i.bak -e 's@@@g' documentation/advanced-features/writing-providers.md
#sed -i.bak -e 's@@@g' documentation/advanced-features/writing-providers.md

find . -name \*.bak -delete

go fmt ./...

git status

echo git commit -a -m'CHORE: Move Non-provider files in providers to pkg/providers'



```
2025-12-15 12:53:52 -05:00

212 lines
5.6 KiB
Go

package main
// Test the providers.
import (
"strings"
"testing"
"github.com/StackExchange/dnscontrol/v4/models"
"github.com/StackExchange/dnscontrol/v4/pkg/nameservers"
"github.com/StackExchange/dnscontrol/v4/pkg/providers"
"github.com/StackExchange/dnscontrol/v4/pkg/zonerecs"
)
// TestDualProviders verifies that providers labeled DocDualHost support having
// delegation to multiple DNS Providers. i.e. verifies that example.com's
// delegations can be both ROUTE53 and GCLOUD. Some providers want to be the
// only provider for a domain.
func TestDualProviders(t *testing.T) {
p, domain, _ := getProvider(t)
if p == nil {
return
}
if domain == "" {
t.Fatal("NO DOMAIN SET! Exiting!")
}
dc := getDomainConfigWithNameservers(t, p, domain)
if !providers.ProviderHasCapability(*providerFlag, providers.DocDualHost) {
t.Skip("Skipping. DocDualHost == Cannot")
return
}
// clear everything
run := func() {
dom, _ := dc.Copy()
rs, cs, _, err := zonerecs.CorrectZoneRecords(p, dom)
if err != nil {
t.Fatal(err)
}
for i, c := range rs {
t.Logf("INFO#%d:\n%s", i+1, c.Msg)
}
for i, c := range cs {
t.Logf("#%d:\n%s", i+1, c.Msg)
if err = c.F(); err != nil {
t.Fatal(err)
}
}
}
t.Log("Clearing everything")
run()
// add bogus nameservers
dc.Records = []*models.RecordConfig{}
nsList, _ := models.ToNameservers([]string{"ns1.example.com", "ns2.example.com"})
dc.Nameservers = append(dc.Nameservers, nsList...)
nameservers.AddNSRecords(dc)
t.Log("Adding test nameservers")
run()
// run again to make sure no corrections
t.Log("Running again to ensure stability")
rs, cs, actualChangeCount, err := zonerecs.CorrectZoneRecords(p, dc)
if err != nil {
t.Fatal(err)
}
if actualChangeCount != 0 {
t.Logf("Expect no corrections on second run, but found %d.", actualChangeCount)
for i, c := range rs {
t.Logf("INFO#%d:\n%s", i+1, c.Msg)
}
for i, c := range cs {
t.Logf("#%d: %s", i+1, c.Msg)
}
t.FailNow()
}
t.Log("Removing test nameservers")
dc.Records = []*models.RecordConfig{}
n := 0
for _, ns := range dc.Nameservers {
if ns.Name == "ns1.example.com" || ns.Name == "ns2.example.com" {
continue
}
dc.Nameservers[n] = ns
n++
}
dc.Nameservers = dc.Nameservers[:n]
nameservers.AddNSRecords(dc)
run()
}
// TestNameserverDots verifies a provider returns properly-formed nameservers.
func TestNameserverDots(t *testing.T) {
// Issue https://github.com/StackExchange/dnscontrol/issues/491
// If this fails, the provider's GetNameservers() function uses
// models.ToNameserversStripTD() instead of models.ToNameservers()
// or vise-versa.
// Setup:
p, domain, _ := getProvider(t)
if p == nil {
return
}
if domain == "" {
t.Fatal("NO DOMAIN SET! Exiting!")
}
dc := getDomainConfigWithNameservers(t, p, domain)
if !providers.ProviderHasCapability(*providerFlag, providers.DocDualHost) {
t.Skip("Skipping. DocDualHost == Cannot")
return
}
t.Run("No trailing dot in nameserver", func(t *testing.T) {
for _, nameserver := range dc.Nameservers {
// fmt.Printf("DEBUG: nameserver.Name = %q\n", nameserver.Name)
if strings.HasSuffix(nameserver.Name, ".") {
t.Errorf("Provider returned nameserver with trailing dot: %q", nameserver)
}
}
})
}
// TestDuplicateNameservers verifies that a provider de-dupes nameservers if existing nameservers are added.
func TestDuplicateNameservers(t *testing.T) {
// Issue: https://github.com/StackExchange/dnscontrol/issues/3088
// Only configuring for Azure DNS
// Setup:
p, domain, cfg := getProvider(t)
if p == nil {
return
}
if domain == "" {
t.Fatal("NO DOMAIN SET! Exiting!")
}
dc := getDomainConfigWithNameservers(t, p, domain)
if !providers.ProviderHasCapability(*providerFlag, providers.DocDualHost) {
t.Skip("Skipping. DocDualHost == Cannot")
return
}
if cfg["TYPE"] != "AZURE_DNS" {
t.Skip("Skipping. Deduplication logic is not implemented for this provider.")
return
}
// clear everything
run := func(expectedChangeCount int, msg string, ignoreExpected bool) {
dom, _ := dc.Copy()
rs, cs, actualChangeCount, err := zonerecs.CorrectZoneRecords(p, dom)
if err != nil {
t.Fatal(err)
}
for i, c := range rs {
t.Logf("INFO#%d:\n%s", i+1, c.Msg)
}
for i, c := range cs {
t.Logf("#%d:\n%s", i+1, c.Msg)
if err = c.F(); err != nil {
t.Fatal(err)
}
}
if (!ignoreExpected) && actualChangeCount != expectedChangeCount {
t.Logf(msg, actualChangeCount)
t.FailNow()
}
}
t.Log("Clearing everything")
dc.Records = []*models.RecordConfig{}
n := 0
for _, ns := range dc.Nameservers {
if ns.Name == "ns1.example.com" || ns.Name == "ns2.example.com" {
continue
}
dc.Nameservers[n] = ns
n++
}
dc.Nameservers = dc.Nameservers[:n]
nameservers.AddNSRecords(dc)
run(0, "Clearing everything", true)
// add bogus nameservers and duplicate nameservers
dc.Records = []*models.RecordConfig{}
nsList, _ := models.ToNameservers([]string{"ns1.example.com"})
dc.Nameservers = append(dc.Nameservers, dc.Nameservers...)
dc.Nameservers = append(dc.Nameservers, nsList...)
nameservers.AddNSRecords(dc)
t.Log("Adding test nameservers")
run(1, "Expect 1 correction, but found %d.", false)
// run again to make sure no corrections
t.Log("Running again to ensure stability")
run(0, "Expect no corrections on second run, but found %d.", false)
t.Log("Removing test nameservers")
dc.Records = []*models.RecordConfig{}
n = 0
for _, ns := range dc.Nameservers {
if ns.Name == "ns1.example.com" || ns.Name == "ns2.example.com" {
continue
}
dc.Nameservers[n] = ns
n++
}
dc.Nameservers = dc.Nameservers[:n]
nameservers.AddNSRecords(dc)
run(0, "Removing test nameservers", true)
}