aboutsummaryrefslogtreecommitdiff
path: root/middleware/file/wildcard_test.go
diff options
context:
space:
mode:
authorGravatar Miek Gieben <miek@miek.nl> 2016-03-31 09:25:22 +0000
committerGravatar Miek Gieben <miek@miek.nl> 2016-03-31 21:47:44 +0100
commit09c94fa443f337a58131d8220b0a8e13c9698bff (patch)
tree2e638f24a7a715ddcd53e37a031cef4a94ed45f8 /middleware/file/wildcard_test.go
parent24394f0d4decf683e56ffd9514321fe57418dff1 (diff)
downloadcoredns-09c94fa443f337a58131d8220b0a8e13c9698bff.tar.gz
coredns-09c94fa443f337a58131d8220b0a8e13c9698bff.tar.zst
coredns-09c94fa443f337a58131d8220b0a8e13c9698bff.zip
Positive wildcare replies
Reply to queries when you have a wildcard in the zone. This works for DNS and DNSSEC. Thing missing is NODATA responses for that specific wildcard. Add wildcard_test.go as well.
Diffstat (limited to 'middleware/file/wildcard_test.go')
-rw-r--r--middleware/file/wildcard_test.go39
1 files changed, 32 insertions, 7 deletions
diff --git a/middleware/file/wildcard_test.go b/middleware/file/wildcard_test.go
index 81b799955..1dab78226 100644
--- a/middleware/file/wildcard_test.go
+++ b/middleware/file/wildcard_test.go
@@ -12,15 +12,40 @@ import (
"golang.org/x/net/context"
)
-var dnssecWildcardTestCases = []coretest.Case{
+var wildcardTestCases = []coretest.Case{
{
- Qname: "blaat.dnssex.nl.", Qtype: dns.TypeTXT, Do: true,
- Answer: []dns.RR{},
+ Qname: "wild.dnssex.nl.", Qtype: dns.TypeTXT,
+ Answer: []dns.RR{
+ coretest.TXT(`wild.dnssex.nl. 1800 IN TXT "Doing It Safe Is Better"`),
+ },
},
+ {
+ Qname: "wild.dnssex.nl.", Qtype: dns.TypeTXT, Do: true,
+ Answer: []dns.RR{
+ coretest.RRSIG("wild.dnssex.nl. 1800 IN RRSIG TXT 8 2 1800 20160428190224 20160329190224 14460 dnssex.nl. FUZSTyvZfeuuOpCm"),
+ coretest.TXT(`wild.dnssex.nl. 1800 IN TXT "Doing It Safe Is Better"`),
+ },
+ },
+ // nodata reponse
+ /*
+ {
+ Qname: "wild.dnssex.nl.", Qtype: dns.TypeSRV,
+ Answer: []dns.RR{
+ coretest.TXT(`wild.dnssex.nl. 1800 IN TXT "Doing It Safe Is Better"`),
+ },
+ },
+ {
+ Qname: "wild.dnssex.nl.", Qtype: dns.TypeSRV, Do: true,
+ Answer: []dns.RR{
+ coretest.RRSIG("wild.dnssex.nl. 1800 IN RRSIG TXT 8 2 1800 20160428190224 20160329190224 14460 dnssex.nl. FUZSTyvZfeuuOpCm"),
+ coretest.TXT(`wild.dnssex.nl. 1800 IN TXT "Doing It Safe Is Better"`),
+ },
+ },
+ */
}
-func testLookupDNSSECWildcard(t *testing.T) {
- zone, err := Parse(strings.NewReader(dbMiekNL_signed), testzone1, "stdin")
+func TestLookupWildcard(t *testing.T) {
+ zone, err := Parse(strings.NewReader(dbDnssexNl_signed), testzone1, "stdin")
if err != nil {
t.Fatalf("expect no error when reading zone, got %q", err)
}
@@ -28,7 +53,7 @@ func testLookupDNSSECWildcard(t *testing.T) {
fm := File{Next: coretest.ErrorHandler(), Zones: Zones{Z: map[string]*Zone{testzone1: zone}, Names: []string{testzone1}}}
ctx := context.TODO()
- for _, tc := range dnssecWildcardTestCases {
+ for _, tc := range wildcardTestCases {
m := tc.Msg()
rec := middleware.NewResponseRecorder(&middleware.TestResponseWriter{})
@@ -77,7 +102,7 @@ func testLookupDNSSECWildcard(t *testing.T) {
}
}
-const dbMiekNL_wildcard_signed = `
+const dbDnssexNl_signed = `
; File written on Tue Mar 29 21:02:24 2016
; dnssec_signzone version 9.10.3-P4-Ubuntu
dnssex.nl. 1800 IN SOA linode.atoom.net. miek.miek.nl. (