resolver_unix_test.go 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178
  1. //go:build !windows
  2. package libnetwork
  3. import (
  4. "net"
  5. "testing"
  6. "github.com/docker/docker/internal/testutils/netnsutils"
  7. "github.com/miekg/dns"
  8. )
  9. // test only works on linux
  10. func TestDNSIPQuery(t *testing.T) {
  11. defer netnsutils.SetupTestOSContext(t)()
  12. c, err := New()
  13. if err != nil {
  14. t.Fatal(err)
  15. }
  16. defer c.Stop()
  17. n, err := c.NewNetwork("bridge", "dtnet1", "", nil)
  18. if err != nil {
  19. t.Fatal(err)
  20. }
  21. defer func() {
  22. if err := n.Delete(); err != nil {
  23. t.Fatal(err)
  24. }
  25. }()
  26. ep, err := n.CreateEndpoint("testep")
  27. if err != nil {
  28. t.Fatal(err)
  29. }
  30. sb, err := c.NewSandbox("c1")
  31. if err != nil {
  32. t.Fatal(err)
  33. }
  34. defer func() {
  35. if err := sb.Delete(); err != nil {
  36. t.Fatal(err)
  37. }
  38. }()
  39. // we need the endpoint only to populate ep_list for the sandbox as part of resolve_name
  40. // it is not set as a target for name resolution and does not serve any other purpose
  41. err = ep.Join(sb)
  42. if err != nil {
  43. t.Fatal(err)
  44. }
  45. // add service records which are used to resolve names. These are the real targets for the DNS querries
  46. n.addSvcRecords("ep1", "name1", "svc1", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
  47. w := new(tstwriter)
  48. // the unit tests right now will focus on non-proxyed DNS requests
  49. r := NewResolver(resolverIPSandbox, false, sb)
  50. // test name1's IP is resolved correctly with the default A type query
  51. // Also make sure DNS lookups are case insensitive
  52. names := []string{"name1", "NaMe1"}
  53. for _, name := range names {
  54. q := new(dns.Msg)
  55. q.SetQuestion(name, dns.TypeA)
  56. r.serveDNS(w, q)
  57. resp := w.GetResponse()
  58. checkNonNullResponse(t, resp)
  59. t.Log("Response: ", resp.String())
  60. checkDNSResponseCode(t, resp, dns.RcodeSuccess)
  61. checkDNSAnswersCount(t, resp, 1)
  62. checkDNSRRType(t, resp.Answer[0].Header().Rrtype, dns.TypeA)
  63. if answer, ok := resp.Answer[0].(*dns.A); ok {
  64. if !answer.A.Equal(net.ParseIP("192.168.0.1")) {
  65. t.Fatalf("IP response in Answer %v does not match 192.168.0.1", answer.A)
  66. }
  67. } else {
  68. t.Fatal("Answer of type A not found")
  69. }
  70. w.ClearResponse()
  71. }
  72. // test MX query with name1 results in Success response with 0 answer records
  73. q := new(dns.Msg)
  74. q.SetQuestion("name1", dns.TypeMX)
  75. r.serveDNS(w, q)
  76. resp := w.GetResponse()
  77. checkNonNullResponse(t, resp)
  78. t.Log("Response: ", resp.String())
  79. checkDNSResponseCode(t, resp, dns.RcodeSuccess)
  80. checkDNSAnswersCount(t, resp, 0)
  81. w.ClearResponse()
  82. // test MX query with non existent name results in ServFail response with 0 answer records
  83. // since this is a unit test env, we disable proxying DNS above which results in ServFail rather than NXDOMAIN
  84. q = new(dns.Msg)
  85. q.SetQuestion("nonexistent", dns.TypeMX)
  86. r.serveDNS(w, q)
  87. resp = w.GetResponse()
  88. checkNonNullResponse(t, resp)
  89. t.Log("Response: ", resp.String())
  90. checkDNSResponseCode(t, resp, dns.RcodeServerFailure)
  91. w.ClearResponse()
  92. }
  93. // test only works on linux
  94. func TestDNSProxyServFail(t *testing.T) {
  95. osctx := netnsutils.SetupTestOSContextEx(t)
  96. defer osctx.Cleanup(t)
  97. c, err := New()
  98. if err != nil {
  99. t.Fatal(err)
  100. }
  101. defer c.Stop()
  102. n, err := c.NewNetwork("bridge", "dtnet2", "", nil)
  103. if err != nil {
  104. t.Fatal(err)
  105. }
  106. defer func() {
  107. if err := n.Delete(); err != nil {
  108. t.Fatal(err)
  109. }
  110. }()
  111. sb, err := c.NewSandbox("c1")
  112. if err != nil {
  113. t.Fatal(err)
  114. }
  115. defer func() {
  116. if err := sb.Delete(); err != nil {
  117. t.Fatal(err)
  118. }
  119. }()
  120. var nRequests int
  121. // initialize a local DNS server and configure it to fail the first query
  122. dns.HandleFunc(".", newDNSHandlerServFailOnce(&nRequests))
  123. // use TCP for predictable results. Connection tests (to figure out DNS server initialization) don't work with UDP
  124. server := &dns.Server{Addr: "127.0.0.1:53", Net: "tcp"}
  125. srvErrCh := make(chan error, 1)
  126. osctx.Go(t, func() {
  127. srvErrCh <- server.ListenAndServe()
  128. })
  129. defer func() {
  130. server.Shutdown() //nolint:errcheck
  131. if err := <-srvErrCh; err != nil {
  132. t.Error(err)
  133. }
  134. }()
  135. waitForLocalDNSServer(t)
  136. t.Log("DNS Server can be reached")
  137. w := new(tstwriter)
  138. r := NewResolver(resolverIPSandbox, true, sb)
  139. q := new(dns.Msg)
  140. q.SetQuestion("name1.", dns.TypeA)
  141. var localDNSEntries []extDNSEntry
  142. extTestDNSEntry := extDNSEntry{IPStr: "127.0.0.1", HostLoopback: true}
  143. // configure two external DNS entries and point both to local DNS server thread
  144. localDNSEntries = append(localDNSEntries, extTestDNSEntry)
  145. localDNSEntries = append(localDNSEntries, extTestDNSEntry)
  146. // this should generate two requests: the first will fail leading to a retry
  147. r.SetExtServers(localDNSEntries)
  148. r.serveDNS(w, q)
  149. if nRequests != 2 {
  150. t.Fatalf("Expected 2 DNS querries. Found: %d", nRequests)
  151. }
  152. t.Logf("Expected number of DNS requests generated")
  153. }