aboutsummaryrefslogtreecommitdiff
path: root/test
diff options
context:
space:
mode:
authorGravatar Michael S. Fischer <mfischer-zd@users.noreply.github.com> 2017-03-16 14:10:54 -0700
committerGravatar Miek Gieben <miek@miek.nl> 2017-03-16 21:10:54 +0000
commitdfc71df07d7a19cc0227083ce6b04eea60ecd5a0 (patch)
treed1d22f3c0317f310935abcf56a72c8461af210d3 /test
parent36c743a4d81cac1f8de8454c707c1ac7089bf783 (diff)
downloadcoredns-dfc71df07d7a19cc0227083ce6b04eea60ecd5a0.tar.gz
coredns-dfc71df07d7a19cc0227083ce6b04eea60ecd5a0.tar.zst
coredns-dfc71df07d7a19cc0227083ce6b04eea60ecd5a0.zip
middleware/proxy: Allow non-HTTP upstreams to be health checked (#589)
Allow HTTP health check to be performed against a regular DNS upstream server. TODO: Add tests.
Diffstat (limited to 'test')
-rw-r--r--test/proxy_http_health_test.go95
1 files changed, 95 insertions, 0 deletions
diff --git a/test/proxy_http_health_test.go b/test/proxy_http_health_test.go
new file mode 100644
index 000000000..9bfc3b209
--- /dev/null
+++ b/test/proxy_http_health_test.go
@@ -0,0 +1,95 @@
+package test
+
+import (
+ "io"
+ "io/ioutil"
+ "log"
+ "net/http"
+ "net/http/httptest"
+ "net/url"
+ "testing"
+
+ "github.com/coredns/coredns/middleware/proxy"
+ "github.com/coredns/coredns/middleware/test"
+ "github.com/coredns/coredns/request"
+ "github.com/miekg/dns"
+)
+
+func TestProxyWithHTTPCheckOK(t *testing.T) {
+ log.SetOutput(ioutil.Discard)
+
+ healthCheckServer := httptest.NewServer(http.HandlerFunc(
+ func(w http.ResponseWriter, r *http.Request) {
+ w.WriteHeader(http.StatusOK)
+ io.WriteString(w, "OK\n")
+ }))
+ defer healthCheckServer.Close()
+
+ healthCheckURL, err := url.Parse(healthCheckServer.URL)
+ if err != nil {
+ t.Fatal(err)
+ }
+ healthCheckPort := healthCheckURL.Port()
+
+ name, rm, err := test.TempFile(".", exampleOrg)
+ if err != nil {
+ t.Fatalf("failed to create zone: %s", err)
+ }
+ defer rm()
+
+ // We have to bind to 127.0.0.1 because the server started by
+ // httptest.NewServer does, and the IP addresses of the backend
+ // DNS and HTTP servers must match.
+ authoritativeCorefile := `example.org:0 {
+ bind 127.0.0.1
+ file ` + name + `
+}
+`
+
+ authoritativeInstance, err := CoreDNSServer(authoritativeCorefile)
+ if err != nil {
+ t.Fatalf("Could not get CoreDNS authoritative instance: %s", err)
+ }
+
+ authoritativeAddr, _ := CoreDNSServerPorts(authoritativeInstance, 0)
+ if authoritativeAddr == "" {
+ t.Fatalf("Could not get CoreDNS authoritative instance UDP listening port")
+ }
+ defer authoritativeInstance.Stop()
+
+ proxyCorefile := `example.org:0 {
+ proxy . ` + authoritativeAddr + ` {
+ health_check /health:` + healthCheckPort + ` 1s
+
+ }
+}
+`
+
+ proxyInstance, err := CoreDNSServer(proxyCorefile)
+ if err != nil {
+ t.Fatalf("Could not get CoreDNS proxy instance: %s", err)
+ }
+
+ proxyAddr, _ := CoreDNSServerPorts(proxyInstance, 0)
+ if proxyAddr == "" {
+ t.Fatalf("Could not get CoreDNS proxy instance UDP listening port")
+ }
+ defer proxyInstance.Stop()
+
+ p := proxy.NewLookup([]string{proxyAddr})
+ state := request.Request{W: &test.ResponseWriter{}, Req: new(dns.Msg)}
+ resp, err := p.Lookup(state, "example.org.", dns.TypeA)
+ if err != nil {
+ t.Fatal("Expected to receive reply, but didn't")
+ }
+ // expect answer section with A record in it
+ if len(resp.Answer) == 0 {
+ t.Fatalf("Expected to at least one RR in the answer section, got none: %s", resp)
+ }
+ if resp.Answer[0].Header().Rrtype != dns.TypeA {
+ t.Errorf("Expected RR to A, got: %d", resp.Answer[0].Header().Rrtype)
+ }
+ if resp.Answer[0].(*dns.A).A.String() != "127.0.0.1" {
+ t.Errorf("Expected 127.0.0.1, got: %s", resp.Answer[0].(*dns.A).A.String())
+ }
+}