mirror of
https://github.com/AdguardTeam/AdGuardHome.git
synced 2024-11-25 14:35:48 +03:00
86444eacc2
Merge in DNS/adguard-home from 2704-local-addresses-vol.2 to master Updates #2704. Updates #2829. Squashed commit of the following: commit 507d038c2709de59246fc0b65c3c4ab8e38d1990 Author: Eugene Burkov <e.burkov@adguard.com> Date: Wed Mar 31 14:33:05 2021 +0300 aghtest: fix file name commit 8e19f99337bee1d88ad6595adb96f9bb23fa3c41 Author: Eugene Burkov <e.burkov@adguard.com> Date: Wed Mar 31 14:06:43 2021 +0300 aghnet: rm redundant mutexes commit 361fa418b33ed160ca20862be1c455ab9378c03f Author: Eugene Burkov <e.burkov@adguard.com> Date: Wed Mar 31 13:45:30 2021 +0300 all: fix names, docs commit 14034f4f0230d7aaa3645054946ae5c278089a99 Merge: 35e265cca72ce1cf
Author: Eugene Burkov <e.burkov@adguard.com> Date: Wed Mar 31 13:38:15 2021 +0300 Merge branch 'master' into 2704-local-addresses-vol.2 commit 35e265cc8cd308ef1fda414b58c0217cb5f258e4 Author: Eugene Burkov <e.burkov@adguard.com> Date: Wed Mar 31 13:33:35 2021 +0300 aghnet: imp naming commit 7a7edac7208a40697d7bc50682b923a144e28e2b Author: Eugene Burkov <e.burkov@adguard.com> Date: Tue Mar 30 20:59:54 2021 +0300 changelog: oops, nope yet commit d26a5d2513daf662ac92053b5e235189a64cc022 Author: Eugene Burkov <e.burkov@adguard.com> Date: Tue Mar 30 20:55:53 2021 +0300 all: some renaming for the glory of semantics commit 9937fa619452b0742616217b975e3ff048d58acb Author: Eugene Burkov <e.burkov@adguard.com> Date: Mon Mar 29 15:34:42 2021 +0300 all: log changes commit d8d9e6dfeea8474466ee25f27021efdd3ddb1592 Author: Eugene Burkov <e.burkov@adguard.com> Date: Fri Mar 26 18:32:23 2021 +0300 all: imp localresolver, imp cutting off own addresses commit 344140df449b85925f19b460fd7dc7c08e29c35a Author: Eugene Burkov <e.burkov@adguard.com> Date: Fri Mar 26 14:53:33 2021 +0300 all: imp code quality commit 1c5c0babec73b125044e23dd3aa75d8eefc19b28 Author: Eugene Burkov <e.burkov@adguard.com> Date: Thu Mar 25 20:44:08 2021 +0300 all: fix go.mod commit 0b9fb3c2369a752e893af8ddc45a86bb9fb27ce5 Author: Eugene Burkov <e.burkov@adguard.com> Date: Thu Mar 25 20:38:51 2021 +0300 all: add error handling commit a7a2e51f57fc6f8f74b95a264ad345cd2a9e026e Merge: c13be63427f4f052
Author: Eugene Burkov <e.burkov@adguard.com> Date: Thu Mar 25 19:48:36 2021 +0300 Merge branch 'master' into 2704-local-addresses-vol.2 commit c13be634f47bcaed9320a732a51c0e4752d0dad0 Author: Eugene Burkov <e.burkov@adguard.com> Date: Thu Mar 25 18:52:28 2021 +0300 all: cover rdns with tests, imp aghnet functionality commit 48bed9025944530c613ee53e7961d6d5fbabf8be Author: Eugene Burkov <e.burkov@adguard.com> Date: Wed Mar 24 20:18:07 2021 +0300 home: make rdns great again commit 1dbacfc8d5b6895807797998317fe3cc814617c1 Author: Eugene Burkov <e.burkov@adguard.com> Date: Wed Mar 24 16:07:52 2021 +0300 all: imp external client restriction commit 1208a319a7f4ffe7b7fa8956f245d7a19437c0a4 Author: Eugene Burkov <e.burkov@adguard.com> Date: Mon Mar 22 15:26:45 2021 +0300 all: finish local ptr processor commit c8827fc3db289e1a5d7a11d057743bab39957b02 Author: Eugene Burkov <e.burkov@adguard.com> Date: Tue Mar 2 13:41:22 2021 +0300 all: imp ipdetector, add local ptr processor
1305 lines
33 KiB
Go
1305 lines
33 KiB
Go
package dnsforward
|
||
|
||
import (
|
||
"crypto/ecdsa"
|
||
"crypto/rand"
|
||
"crypto/rsa"
|
||
"crypto/tls"
|
||
"crypto/x509"
|
||
"crypto/x509/pkix"
|
||
"encoding/pem"
|
||
"fmt"
|
||
"io/ioutil"
|
||
"math/big"
|
||
"net"
|
||
"os"
|
||
"sort"
|
||
"sync"
|
||
"testing"
|
||
"time"
|
||
|
||
"github.com/AdguardTeam/AdGuardHome/internal/aghnet"
|
||
"github.com/AdguardTeam/AdGuardHome/internal/aghtest"
|
||
"github.com/AdguardTeam/AdGuardHome/internal/dhcpd"
|
||
"github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
|
||
"github.com/AdguardTeam/AdGuardHome/internal/util"
|
||
"github.com/AdguardTeam/dnsproxy/proxy"
|
||
"github.com/AdguardTeam/dnsproxy/upstream"
|
||
"github.com/miekg/dns"
|
||
"github.com/stretchr/testify/assert"
|
||
"github.com/stretchr/testify/require"
|
||
)
|
||
|
||
func TestMain(m *testing.M) {
|
||
aghtest.DiscardLogOutput(m)
|
||
}
|
||
|
||
const (
|
||
tlsServerName = "testdns.adguard.com"
|
||
testMessagesCount = 10
|
||
)
|
||
|
||
func startDeferStop(t *testing.T, s *Server) {
|
||
t.Helper()
|
||
|
||
err := s.Start()
|
||
require.NoErrorf(t, err, "failed to start server: %s", err)
|
||
|
||
t.Cleanup(func() {
|
||
serr := s.Stop()
|
||
require.NoErrorf(t, serr, "dns server failed to stop: %s", serr)
|
||
})
|
||
}
|
||
|
||
func createTestServer(t *testing.T, filterConf *dnsfilter.Config, forwardConf ServerConfig) *Server {
|
||
t.Helper()
|
||
|
||
rules := `||nxdomain.example.org
|
||
||null.example.org^
|
||
127.0.0.1 host.example.org
|
||
@@||whitelist.example.org^
|
||
||127.0.0.255`
|
||
filters := []dnsfilter.Filter{{
|
||
ID: 0, Data: []byte(rules),
|
||
}}
|
||
|
||
f := dnsfilter.New(filterConf, filters)
|
||
|
||
snd, err := aghnet.NewSubnetDetector()
|
||
require.NoError(t, err)
|
||
require.NotNil(t, snd)
|
||
|
||
var s *Server
|
||
s, err = NewServer(DNSCreateParams{
|
||
DNSFilter: f,
|
||
SubnetDetector: snd,
|
||
LocalResolvers: &aghtest.Exchanger{},
|
||
})
|
||
require.NoError(t, err)
|
||
|
||
s.conf = forwardConf
|
||
|
||
err = s.Prepare(nil)
|
||
require.NoError(t, err)
|
||
|
||
return s
|
||
}
|
||
|
||
func createServerTLSConfig(t *testing.T) (*tls.Config, []byte, []byte) {
|
||
t.Helper()
|
||
|
||
privateKey, err := rsa.GenerateKey(rand.Reader, 2048)
|
||
require.NoErrorf(t, err, "cannot generate RSA key: %s", err)
|
||
|
||
serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 128)
|
||
serialNumber, err := rand.Int(rand.Reader, serialNumberLimit)
|
||
require.NoErrorf(t, err, "failed to generate serial number: %s", err)
|
||
|
||
notBefore := time.Now()
|
||
notAfter := notBefore.Add(5 * 365 * time.Hour * 24)
|
||
|
||
template := x509.Certificate{
|
||
SerialNumber: serialNumber,
|
||
Subject: pkix.Name{
|
||
Organization: []string{"AdGuard Tests"},
|
||
},
|
||
NotBefore: notBefore,
|
||
NotAfter: notAfter,
|
||
|
||
KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
|
||
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
|
||
BasicConstraintsValid: true,
|
||
IsCA: true,
|
||
}
|
||
template.DNSNames = append(template.DNSNames, tlsServerName)
|
||
|
||
derBytes, err := x509.CreateCertificate(rand.Reader, &template, &template, publicKey(privateKey), privateKey)
|
||
require.NoErrorf(t, err, "failed to create certificate: %s", err)
|
||
|
||
certPem := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
|
||
keyPem := pem.EncodeToMemory(&pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(privateKey)})
|
||
|
||
cert, err := tls.X509KeyPair(certPem, keyPem)
|
||
require.NoErrorf(t, err, "failed to create certificate: %s", err)
|
||
|
||
return &tls.Config{
|
||
Certificates: []tls.Certificate{cert},
|
||
ServerName: tlsServerName,
|
||
MinVersion: tls.VersionTLS12,
|
||
}, certPem, keyPem
|
||
}
|
||
|
||
func createTestTLS(t *testing.T, tlsConf TLSConfig) (s *Server, certPem []byte) {
|
||
t.Helper()
|
||
|
||
var keyPem []byte
|
||
_, certPem, keyPem = createServerTLSConfig(t)
|
||
|
||
s = createTestServer(t, &dnsfilter.Config{}, ServerConfig{
|
||
UDPListenAddrs: []*net.UDPAddr{{}},
|
||
TCPListenAddrs: []*net.TCPAddr{{}},
|
||
})
|
||
|
||
tlsConf.CertificateChainData, tlsConf.PrivateKeyData = certPem, keyPem
|
||
s.conf.TLSConfig = tlsConf
|
||
|
||
err := s.Prepare(nil)
|
||
require.NoErrorf(t, err, "failed to prepare server: %s", err)
|
||
|
||
return s, certPem
|
||
}
|
||
|
||
func createGoogleATestMessage() *dns.Msg {
|
||
return createTestMessage("google-public-dns-a.google.com.")
|
||
}
|
||
|
||
func createTestMessage(host string) *dns.Msg {
|
||
return &dns.Msg{
|
||
MsgHdr: dns.MsgHdr{
|
||
Id: dns.Id(),
|
||
RecursionDesired: true,
|
||
},
|
||
Question: []dns.Question{{
|
||
Name: host,
|
||
Qtype: dns.TypeA,
|
||
Qclass: dns.ClassINET,
|
||
}},
|
||
}
|
||
}
|
||
|
||
func createTestMessageWithType(host string, qtype uint16) *dns.Msg {
|
||
req := createTestMessage(host)
|
||
req.Question[0].Qtype = qtype
|
||
|
||
return req
|
||
}
|
||
|
||
func assertGoogleAResponse(t *testing.T, reply *dns.Msg) {
|
||
assertResponse(t, reply, net.IP{8, 8, 8, 8})
|
||
}
|
||
|
||
func assertResponse(t *testing.T, reply *dns.Msg, ip net.IP) {
|
||
t.Helper()
|
||
|
||
require.Lenf(t, reply.Answer, 1, "dns server returned reply with wrong number of answers - %d", len(reply.Answer))
|
||
|
||
a, ok := reply.Answer[0].(*dns.A)
|
||
require.Truef(t, ok, "dns server returned wrong answer type instead of A: %v", reply.Answer[0])
|
||
assert.Truef(t, a.A.Equal(ip), "dns server returned wrong answer instead of %s: %s", ip, a.A)
|
||
}
|
||
|
||
// sendTestMessagesAsync sends messages in parallel to check for race issues.
|
||
//
|
||
//lint:ignore U1000 it's called from the function which is skipped for now.
|
||
func sendTestMessagesAsync(t *testing.T, conn *dns.Conn) {
|
||
t.Helper()
|
||
|
||
wg := &sync.WaitGroup{}
|
||
|
||
for i := 0; i < testMessagesCount; i++ {
|
||
msg := createGoogleATestMessage()
|
||
wg.Add(1)
|
||
|
||
go func() {
|
||
defer wg.Done()
|
||
|
||
err := conn.WriteMsg(msg)
|
||
require.NoErrorf(t, err, "cannot write message: %s", err)
|
||
|
||
res, err := conn.ReadMsg()
|
||
require.NoErrorf(t, err, "cannot read response to message: %s", err)
|
||
|
||
assertGoogleAResponse(t, res)
|
||
}()
|
||
}
|
||
|
||
wg.Wait()
|
||
}
|
||
|
||
func sendTestMessages(t *testing.T, conn *dns.Conn) {
|
||
t.Helper()
|
||
|
||
for i := 0; i < testMessagesCount; i++ {
|
||
req := createGoogleATestMessage()
|
||
err := conn.WriteMsg(req)
|
||
assert.Nilf(t, err, "cannot write message #%d: %s", i, err)
|
||
|
||
res, err := conn.ReadMsg()
|
||
assert.Nilf(t, err, "cannot read response to message #%d: %s", i, err)
|
||
assertGoogleAResponse(t, res)
|
||
}
|
||
}
|
||
|
||
func TestServer(t *testing.T) {
|
||
s := createTestServer(t, &dnsfilter.Config{}, ServerConfig{
|
||
UDPListenAddrs: []*net.UDPAddr{{}},
|
||
TCPListenAddrs: []*net.TCPAddr{{}},
|
||
})
|
||
s.conf.UpstreamConfig.Upstreams = []upstream.Upstream{
|
||
&aghtest.TestUpstream{
|
||
IPv4: map[string][]net.IP{
|
||
"google-public-dns-a.google.com.": {{8, 8, 8, 8}},
|
||
},
|
||
},
|
||
}
|
||
startDeferStop(t, s)
|
||
|
||
testCases := []struct {
|
||
name string
|
||
proto string
|
||
}{{
|
||
name: "message_over_udp",
|
||
proto: proxy.ProtoUDP,
|
||
}, {
|
||
name: "message_over_tcp",
|
||
proto: proxy.ProtoTCP,
|
||
}}
|
||
|
||
for _, tc := range testCases {
|
||
t.Run(tc.name, func(t *testing.T) {
|
||
addr := s.dnsProxy.Addr(tc.proto)
|
||
client := dns.Client{Net: tc.proto}
|
||
|
||
reply, _, err := client.Exchange(createGoogleATestMessage(), addr.String())
|
||
require.NoErrorf(t, err, "сouldn't talk to server %s: %s", addr, err)
|
||
|
||
assertGoogleAResponse(t, reply)
|
||
})
|
||
}
|
||
}
|
||
|
||
func TestServerWithProtectionDisabled(t *testing.T) {
|
||
s := createTestServer(t, &dnsfilter.Config{}, ServerConfig{
|
||
UDPListenAddrs: []*net.UDPAddr{{}},
|
||
TCPListenAddrs: []*net.TCPAddr{{}},
|
||
})
|
||
s.conf.UpstreamConfig.Upstreams = []upstream.Upstream{
|
||
&aghtest.TestUpstream{
|
||
IPv4: map[string][]net.IP{
|
||
"google-public-dns-a.google.com.": {{8, 8, 8, 8}},
|
||
},
|
||
},
|
||
}
|
||
startDeferStop(t, s)
|
||
|
||
// Message over UDP.
|
||
req := createGoogleATestMessage()
|
||
addr := s.dnsProxy.Addr(proxy.ProtoUDP)
|
||
client := dns.Client{Net: proxy.ProtoUDP}
|
||
|
||
reply, _, err := client.Exchange(req, addr.String())
|
||
require.NoErrorf(t, err, "сouldn't talk to server %s: %s", addr, err)
|
||
assertGoogleAResponse(t, reply)
|
||
}
|
||
|
||
func TestDoTServer(t *testing.T) {
|
||
s, certPem := createTestTLS(t, TLSConfig{
|
||
TLSListenAddrs: []*net.TCPAddr{{}},
|
||
})
|
||
s.conf.UpstreamConfig.Upstreams = []upstream.Upstream{
|
||
&aghtest.TestUpstream{
|
||
IPv4: map[string][]net.IP{
|
||
"google-public-dns-a.google.com.": {{8, 8, 8, 8}},
|
||
},
|
||
},
|
||
}
|
||
startDeferStop(t, s)
|
||
|
||
// Add our self-signed generated config to roots.
|
||
roots := x509.NewCertPool()
|
||
roots.AppendCertsFromPEM(certPem)
|
||
tlsConfig := &tls.Config{
|
||
ServerName: tlsServerName,
|
||
RootCAs: roots,
|
||
MinVersion: tls.VersionTLS12,
|
||
}
|
||
|
||
// Create a DNS-over-TLS client connection.
|
||
addr := s.dnsProxy.Addr(proxy.ProtoTLS)
|
||
conn, err := dns.DialWithTLS("tcp-tls", addr.String(), tlsConfig)
|
||
require.NoErrorf(t, err, "cannot connect to the proxy: %s", err)
|
||
|
||
sendTestMessages(t, conn)
|
||
}
|
||
|
||
func TestDoQServer(t *testing.T) {
|
||
s, _ := createTestTLS(t, TLSConfig{
|
||
QUICListenAddrs: []*net.UDPAddr{{}},
|
||
})
|
||
s.conf.UpstreamConfig.Upstreams = []upstream.Upstream{
|
||
&aghtest.TestUpstream{
|
||
IPv4: map[string][]net.IP{
|
||
"google-public-dns-a.google.com.": {{8, 8, 8, 8}},
|
||
},
|
||
},
|
||
}
|
||
startDeferStop(t, s)
|
||
|
||
// Create a DNS-over-QUIC upstream.
|
||
addr := s.dnsProxy.Addr(proxy.ProtoQUIC)
|
||
opts := upstream.Options{InsecureSkipVerify: true}
|
||
u, err := upstream.AddressToUpstream(fmt.Sprintf("%s://%s", proxy.ProtoQUIC, addr), opts)
|
||
require.NoError(t, err)
|
||
|
||
// Send the test message.
|
||
req := createGoogleATestMessage()
|
||
res, err := u.Exchange(req)
|
||
require.NoError(t, err)
|
||
|
||
assertGoogleAResponse(t, res)
|
||
}
|
||
|
||
func TestServerRace(t *testing.T) {
|
||
t.Skip("TODO(e.burkov): inspect the golibs/cache package for locks")
|
||
|
||
filterConf := &dnsfilter.Config{
|
||
SafeBrowsingEnabled: true,
|
||
SafeBrowsingCacheSize: 1000,
|
||
SafeSearchEnabled: true,
|
||
SafeSearchCacheSize: 1000,
|
||
ParentalCacheSize: 1000,
|
||
CacheTime: 30,
|
||
}
|
||
forwardConf := ServerConfig{
|
||
UDPListenAddrs: []*net.UDPAddr{{}},
|
||
TCPListenAddrs: []*net.TCPAddr{{}},
|
||
FilteringConfig: FilteringConfig{
|
||
ProtectionEnabled: true,
|
||
UpstreamDNS: []string{"8.8.8.8:53", "8.8.4.4:53"},
|
||
},
|
||
ConfigModified: func() {},
|
||
}
|
||
s := createTestServer(t, filterConf, forwardConf)
|
||
s.conf.UpstreamConfig.Upstreams = []upstream.Upstream{
|
||
&aghtest.TestUpstream{
|
||
IPv4: map[string][]net.IP{
|
||
"google-public-dns-a.google.com.": {{8, 8, 8, 8}},
|
||
},
|
||
},
|
||
}
|
||
startDeferStop(t, s)
|
||
|
||
// Message over UDP.
|
||
addr := s.dnsProxy.Addr(proxy.ProtoUDP)
|
||
conn, err := dns.Dial(proxy.ProtoUDP, addr.String())
|
||
require.NoErrorf(t, err, "cannot connect to the proxy: %s", err)
|
||
|
||
sendTestMessagesAsync(t, conn)
|
||
}
|
||
|
||
func TestSafeSearch(t *testing.T) {
|
||
resolver := &aghtest.TestResolver{}
|
||
filterConf := &dnsfilter.Config{
|
||
SafeSearchEnabled: true,
|
||
SafeSearchCacheSize: 1000,
|
||
CacheTime: 30,
|
||
CustomResolver: resolver,
|
||
}
|
||
forwardConf := ServerConfig{
|
||
UDPListenAddrs: []*net.UDPAddr{{}},
|
||
TCPListenAddrs: []*net.TCPAddr{{}},
|
||
FilteringConfig: FilteringConfig{
|
||
ProtectionEnabled: true,
|
||
},
|
||
}
|
||
s := createTestServer(t, filterConf, forwardConf)
|
||
startDeferStop(t, s)
|
||
|
||
addr := s.dnsProxy.Addr(proxy.ProtoUDP).String()
|
||
client := dns.Client{Net: proxy.ProtoUDP}
|
||
|
||
yandexIP := net.IP{213, 180, 193, 56}
|
||
googleIP, _ := resolver.HostToIPs("forcesafesearch.google.com")
|
||
|
||
testCases := []struct {
|
||
host string
|
||
want net.IP
|
||
}{{
|
||
host: "yandex.com.",
|
||
want: yandexIP,
|
||
}, {
|
||
host: "yandex.by.",
|
||
want: yandexIP,
|
||
}, {
|
||
host: "yandex.kz.",
|
||
want: yandexIP,
|
||
}, {
|
||
host: "yandex.ru.",
|
||
want: yandexIP,
|
||
}, {
|
||
host: "www.google.com.",
|
||
want: googleIP,
|
||
}, {
|
||
host: "www.google.com.af.",
|
||
want: googleIP,
|
||
}, {
|
||
host: "www.google.be.",
|
||
want: googleIP,
|
||
}, {
|
||
host: "www.google.by.",
|
||
want: googleIP,
|
||
}}
|
||
|
||
for _, tc := range testCases {
|
||
t.Run(tc.host, func(t *testing.T) {
|
||
req := createTestMessage(tc.host)
|
||
|
||
reply, _, err := client.Exchange(req, addr)
|
||
require.NoErrorf(t, err, "couldn't talk to server %s: %s", addr, err)
|
||
assertResponse(t, reply, tc.want)
|
||
})
|
||
}
|
||
}
|
||
|
||
func TestInvalidRequest(t *testing.T) {
|
||
s := createTestServer(t, &dnsfilter.Config{}, ServerConfig{
|
||
UDPListenAddrs: []*net.UDPAddr{{}},
|
||
TCPListenAddrs: []*net.TCPAddr{{}},
|
||
})
|
||
startDeferStop(t, s)
|
||
|
||
addr := s.dnsProxy.Addr(proxy.ProtoUDP).String()
|
||
req := dns.Msg{
|
||
MsgHdr: dns.MsgHdr{
|
||
Id: dns.Id(),
|
||
RecursionDesired: true,
|
||
},
|
||
}
|
||
|
||
// Send a DNS request without question.
|
||
_, _, err := (&dns.Client{
|
||
Net: proxy.ProtoUDP,
|
||
Timeout: 500 * time.Millisecond,
|
||
}).Exchange(&req, addr)
|
||
|
||
assert.NoErrorf(t, err, "got a response to an invalid query")
|
||
}
|
||
|
||
func TestBlockedRequest(t *testing.T) {
|
||
forwardConf := ServerConfig{
|
||
UDPListenAddrs: []*net.UDPAddr{{}},
|
||
TCPListenAddrs: []*net.TCPAddr{{}},
|
||
FilteringConfig: FilteringConfig{
|
||
ProtectionEnabled: true,
|
||
},
|
||
}
|
||
s := createTestServer(t, &dnsfilter.Config{}, forwardConf)
|
||
startDeferStop(t, s)
|
||
|
||
addr := s.dnsProxy.Addr(proxy.ProtoUDP)
|
||
|
||
// Default blocking.
|
||
req := createTestMessage("nxdomain.example.org.")
|
||
|
||
reply, err := dns.Exchange(req, addr.String())
|
||
require.NoErrorf(t, err, "couldn't talk to server %s: %s", addr, err)
|
||
|
||
assert.Equal(t, dns.RcodeSuccess, reply.Rcode)
|
||
|
||
require.Len(t, reply.Answer, 1)
|
||
assert.True(t, reply.Answer[0].(*dns.A).A.IsUnspecified())
|
||
}
|
||
|
||
func TestServerCustomClientUpstream(t *testing.T) {
|
||
forwardConf := ServerConfig{
|
||
UDPListenAddrs: []*net.UDPAddr{{}},
|
||
TCPListenAddrs: []*net.TCPAddr{{}},
|
||
FilteringConfig: FilteringConfig{
|
||
ProtectionEnabled: true,
|
||
},
|
||
}
|
||
s := createTestServer(t, &dnsfilter.Config{}, forwardConf)
|
||
s.conf.GetCustomUpstreamByClient = func(_ string) *proxy.UpstreamConfig {
|
||
return &proxy.UpstreamConfig{
|
||
Upstreams: []upstream.Upstream{
|
||
&aghtest.TestUpstream{
|
||
IPv4: map[string][]net.IP{
|
||
"host.": {{192, 168, 0, 1}},
|
||
},
|
||
},
|
||
},
|
||
}
|
||
}
|
||
startDeferStop(t, s)
|
||
|
||
addr := s.dnsProxy.Addr(proxy.ProtoUDP)
|
||
|
||
// Send test request.
|
||
req := createTestMessage("host.")
|
||
|
||
reply, err := dns.Exchange(req, addr.String())
|
||
require.NoError(t, err)
|
||
|
||
assert.Equal(t, dns.RcodeSuccess, reply.Rcode)
|
||
require.NotEmpty(t, reply.Answer)
|
||
|
||
require.Len(t, reply.Answer, 1)
|
||
assert.Equal(t, net.IP{192, 168, 0, 1}, reply.Answer[0].(*dns.A).A)
|
||
}
|
||
|
||
// testCNAMEs is a map of names and CNAMEs necessary for the TestUpstream work.
|
||
var testCNAMEs = map[string]string{
|
||
"badhost.": "null.example.org.",
|
||
"whitelist.example.org.": "null.example.org.",
|
||
}
|
||
|
||
// testIPv4 is a map of names and IPv4s necessary for the TestUpstream work.
|
||
var testIPv4 = map[string][]net.IP{
|
||
"null.example.org.": {{1, 2, 3, 4}},
|
||
"example.org.": {{127, 0, 0, 255}},
|
||
}
|
||
|
||
func TestBlockCNAMEProtectionEnabled(t *testing.T) {
|
||
s := createTestServer(t, &dnsfilter.Config{}, ServerConfig{
|
||
UDPListenAddrs: []*net.UDPAddr{{}},
|
||
TCPListenAddrs: []*net.TCPAddr{{}},
|
||
})
|
||
testUpstm := &aghtest.TestUpstream{
|
||
CName: testCNAMEs,
|
||
IPv4: testIPv4,
|
||
IPv6: nil,
|
||
}
|
||
s.conf.ProtectionEnabled = false
|
||
s.dnsProxy.UpstreamConfig = &proxy.UpstreamConfig{
|
||
Upstreams: []upstream.Upstream{testUpstm},
|
||
}
|
||
startDeferStop(t, s)
|
||
|
||
addr := s.dnsProxy.Addr(proxy.ProtoUDP)
|
||
|
||
// 'badhost' has a canonical name 'null.example.org' which should be
|
||
// blocked by filters, but protection is disabled so it is not.
|
||
req := createTestMessage("badhost.")
|
||
|
||
reply, err := dns.Exchange(req, addr.String())
|
||
require.NoError(t, err)
|
||
|
||
assert.Equal(t, dns.RcodeSuccess, reply.Rcode)
|
||
}
|
||
|
||
func TestBlockCNAME(t *testing.T) {
|
||
forwardConf := ServerConfig{
|
||
UDPListenAddrs: []*net.UDPAddr{{}},
|
||
TCPListenAddrs: []*net.TCPAddr{{}},
|
||
FilteringConfig: FilteringConfig{
|
||
ProtectionEnabled: true,
|
||
},
|
||
}
|
||
s := createTestServer(t, &dnsfilter.Config{}, forwardConf)
|
||
s.conf.UpstreamConfig.Upstreams = []upstream.Upstream{
|
||
&aghtest.TestUpstream{
|
||
CName: testCNAMEs,
|
||
IPv4: testIPv4,
|
||
},
|
||
}
|
||
startDeferStop(t, s)
|
||
|
||
addr := s.dnsProxy.Addr(proxy.ProtoUDP).String()
|
||
|
||
testCases := []struct {
|
||
host string
|
||
want bool
|
||
}{{
|
||
host: "badhost.",
|
||
// 'badhost' has a canonical name 'null.example.org' which is
|
||
// blocked by filters: response is blocked.
|
||
want: true,
|
||
}, {
|
||
host: "whitelist.example.org.",
|
||
// 'whitelist.example.org' has a canonical name
|
||
// 'null.example.org' which is blocked by filters
|
||
// but 'whitelist.example.org' is in a whitelist:
|
||
// response isn't blocked.
|
||
want: false,
|
||
}, {
|
||
host: "example.org.",
|
||
// 'example.org' has a canonical name 'cname1' with IP
|
||
// 127.0.0.255 which is blocked by filters: response is blocked.
|
||
want: true,
|
||
}}
|
||
|
||
for _, tc := range testCases {
|
||
t.Run("block_cname_"+tc.host, func(t *testing.T) {
|
||
req := createTestMessage(tc.host)
|
||
|
||
reply, err := dns.Exchange(req, addr)
|
||
require.NoError(t, err)
|
||
|
||
assert.Equal(t, dns.RcodeSuccess, reply.Rcode)
|
||
if tc.want {
|
||
require.Len(t, reply.Answer, 1)
|
||
a, ok := reply.Answer[0].(*dns.A)
|
||
require.True(t, ok)
|
||
assert.True(t, a.A.IsUnspecified())
|
||
}
|
||
})
|
||
}
|
||
}
|
||
|
||
func TestClientRulesForCNAMEMatching(t *testing.T) {
|
||
forwardConf := ServerConfig{
|
||
UDPListenAddrs: []*net.UDPAddr{{}},
|
||
TCPListenAddrs: []*net.TCPAddr{{}},
|
||
FilteringConfig: FilteringConfig{
|
||
ProtectionEnabled: true,
|
||
FilterHandler: func(_ net.IP, _ string, settings *dnsfilter.FilteringSettings) {
|
||
settings.FilteringEnabled = false
|
||
},
|
||
},
|
||
}
|
||
s := createTestServer(t, &dnsfilter.Config{}, forwardConf)
|
||
s.conf.UpstreamConfig.Upstreams = []upstream.Upstream{
|
||
&aghtest.TestUpstream{
|
||
CName: testCNAMEs,
|
||
IPv4: testIPv4,
|
||
},
|
||
}
|
||
startDeferStop(t, s)
|
||
|
||
addr := s.dnsProxy.Addr(proxy.ProtoUDP)
|
||
|
||
// 'badhost' has a canonical name 'null.example.org' which is blocked by
|
||
// filters: response is blocked.
|
||
req := dns.Msg{
|
||
MsgHdr: dns.MsgHdr{
|
||
Id: dns.Id(),
|
||
},
|
||
Question: []dns.Question{{
|
||
Name: "badhost.",
|
||
Qtype: dns.TypeA,
|
||
Qclass: dns.ClassINET,
|
||
}},
|
||
}
|
||
|
||
// However, in our case it should not be blocked as filtering is
|
||
// disabled on the client level.
|
||
reply, err := dns.Exchange(&req, addr.String())
|
||
require.NoError(t, err)
|
||
|
||
assert.Equal(t, dns.RcodeSuccess, reply.Rcode)
|
||
}
|
||
|
||
func TestNullBlockedRequest(t *testing.T) {
|
||
forwardConf := ServerConfig{
|
||
UDPListenAddrs: []*net.UDPAddr{{}},
|
||
TCPListenAddrs: []*net.TCPAddr{{}},
|
||
FilteringConfig: FilteringConfig{
|
||
ProtectionEnabled: true,
|
||
BlockingMode: "null_ip",
|
||
},
|
||
}
|
||
s := createTestServer(t, &dnsfilter.Config{}, forwardConf)
|
||
startDeferStop(t, s)
|
||
addr := s.dnsProxy.Addr(proxy.ProtoUDP)
|
||
|
||
// Nil filter blocking.
|
||
req := dns.Msg{
|
||
MsgHdr: dns.MsgHdr{
|
||
Id: dns.Id(),
|
||
RecursionDesired: true,
|
||
},
|
||
Question: []dns.Question{{
|
||
Name: "null.example.org.",
|
||
Qtype: dns.TypeA,
|
||
Qclass: dns.ClassINET,
|
||
}},
|
||
}
|
||
|
||
reply, err := dns.Exchange(&req, addr.String())
|
||
require.NoErrorf(t, err, "couldn't talk to server %s: %s", addr, err)
|
||
require.Lenf(t, reply.Answer, 1, "dns server %s returned reply with wrong number of answers - %d", addr, len(reply.Answer))
|
||
a, ok := reply.Answer[0].(*dns.A)
|
||
require.Truef(t, ok, "dns server %s returned wrong answer type instead of A: %v", addr, reply.Answer[0])
|
||
assert.Truef(t, a.A.IsUnspecified(), "dns server %s returned wrong answer instead of 0.0.0.0: %v", addr, a.A)
|
||
}
|
||
|
||
func TestBlockedCustomIP(t *testing.T) {
|
||
rules := "||nxdomain.example.org^\n||null.example.org^\n127.0.0.1 host.example.org\n@@||whitelist.example.org^\n||127.0.0.255\n"
|
||
filters := []dnsfilter.Filter{{
|
||
ID: 0,
|
||
Data: []byte(rules),
|
||
}}
|
||
|
||
snd, err := aghnet.NewSubnetDetector()
|
||
require.NoError(t, err)
|
||
require.NotNil(t, snd)
|
||
|
||
var s *Server
|
||
s, err = NewServer(DNSCreateParams{
|
||
DNSFilter: dnsfilter.New(&dnsfilter.Config{}, filters),
|
||
SubnetDetector: snd,
|
||
LocalResolvers: &aghtest.Exchanger{},
|
||
})
|
||
require.NoError(t, err)
|
||
|
||
conf := &ServerConfig{
|
||
UDPListenAddrs: []*net.UDPAddr{{}},
|
||
TCPListenAddrs: []*net.TCPAddr{{}},
|
||
FilteringConfig: FilteringConfig{
|
||
ProtectionEnabled: true,
|
||
BlockingMode: "custom_ip",
|
||
BlockingIPv4: nil,
|
||
UpstreamDNS: []string{"8.8.8.8:53", "8.8.4.4:53"},
|
||
},
|
||
}
|
||
|
||
// Invalid BlockingIPv4.
|
||
err = s.Prepare(conf)
|
||
assert.Error(t, err)
|
||
|
||
conf.BlockingIPv4 = net.IP{0, 0, 0, 1}
|
||
conf.BlockingIPv6 = net.ParseIP("::1")
|
||
|
||
err = s.Prepare(conf)
|
||
require.NoError(t, err)
|
||
|
||
startDeferStop(t, s)
|
||
|
||
addr := s.dnsProxy.Addr(proxy.ProtoUDP)
|
||
|
||
req := createTestMessageWithType("null.example.org.", dns.TypeA)
|
||
reply, err := dns.Exchange(req, addr.String())
|
||
require.NoError(t, err)
|
||
|
||
require.Len(t, reply.Answer, 1)
|
||
|
||
a, ok := reply.Answer[0].(*dns.A)
|
||
require.True(t, ok)
|
||
|
||
assert.True(t, net.IP{0, 0, 0, 1}.Equal(a.A))
|
||
|
||
req = createTestMessageWithType("null.example.org.", dns.TypeAAAA)
|
||
reply, err = dns.Exchange(req, addr.String())
|
||
require.NoError(t, err)
|
||
|
||
require.Len(t, reply.Answer, 1)
|
||
|
||
a6, ok := reply.Answer[0].(*dns.AAAA)
|
||
require.True(t, ok)
|
||
|
||
assert.Equal(t, "::1", a6.AAAA.String())
|
||
}
|
||
|
||
func TestBlockedByHosts(t *testing.T) {
|
||
forwardConf := ServerConfig{
|
||
UDPListenAddrs: []*net.UDPAddr{{}},
|
||
TCPListenAddrs: []*net.TCPAddr{{}},
|
||
FilteringConfig: FilteringConfig{
|
||
ProtectionEnabled: true,
|
||
},
|
||
}
|
||
s := createTestServer(t, &dnsfilter.Config{}, forwardConf)
|
||
startDeferStop(t, s)
|
||
addr := s.dnsProxy.Addr(proxy.ProtoUDP)
|
||
|
||
// Hosts blocking.
|
||
req := createTestMessage("host.example.org.")
|
||
|
||
reply, err := dns.Exchange(req, addr.String())
|
||
require.NoErrorf(t, err, "couldn't talk to server %s: %s", addr, err)
|
||
require.Lenf(t, reply.Answer, 1, "dns server %s returned reply with wrong number of answers - %d", addr, len(reply.Answer))
|
||
a, ok := reply.Answer[0].(*dns.A)
|
||
require.Truef(t, ok, "dns server %s returned wrong answer type instead of A: %v", addr, reply.Answer[0])
|
||
assert.Equalf(t, net.IP{127, 0, 0, 1}, a.A, "dns server %s returned wrong answer instead of 8.8.8.8: %v", addr, a.A)
|
||
}
|
||
|
||
func TestBlockedBySafeBrowsing(t *testing.T) {
|
||
const hostname = "wmconvirus.narod.ru"
|
||
|
||
sbUps := &aghtest.TestBlockUpstream{
|
||
Hostname: hostname,
|
||
Block: true,
|
||
}
|
||
ans4, _ := (&aghtest.TestResolver{}).HostToIPs(hostname)
|
||
|
||
filterConf := &dnsfilter.Config{
|
||
SafeBrowsingEnabled: true,
|
||
}
|
||
forwardConf := ServerConfig{
|
||
UDPListenAddrs: []*net.UDPAddr{{}},
|
||
TCPListenAddrs: []*net.TCPAddr{{}},
|
||
FilteringConfig: FilteringConfig{
|
||
SafeBrowsingBlockHost: ans4.String(),
|
||
ProtectionEnabled: true,
|
||
},
|
||
}
|
||
s := createTestServer(t, filterConf, forwardConf)
|
||
s.dnsFilter.SetSafeBrowsingUpstream(sbUps)
|
||
startDeferStop(t, s)
|
||
addr := s.dnsProxy.Addr(proxy.ProtoUDP)
|
||
|
||
// SafeBrowsing blocking.
|
||
req := createTestMessage(hostname + ".")
|
||
|
||
reply, err := dns.Exchange(req, addr.String())
|
||
require.NoErrorf(t, err, "couldn't talk to server %s: %s", addr, err)
|
||
require.Lenf(t, reply.Answer, 1, "dns server %s returned reply with wrong number of answers - %d", addr, len(reply.Answer))
|
||
|
||
a, ok := reply.Answer[0].(*dns.A)
|
||
require.Truef(t, ok, "dns server %s returned wrong answer type instead of A: %v", addr, reply.Answer[0])
|
||
assert.Equal(t, ans4, a.A, "dns server %s returned wrong answer: %v", addr, a.A)
|
||
}
|
||
|
||
func TestRewrite(t *testing.T) {
|
||
c := &dnsfilter.Config{
|
||
Rewrites: []dnsfilter.RewriteEntry{{
|
||
Domain: "test.com",
|
||
Answer: "1.2.3.4",
|
||
Type: dns.TypeA,
|
||
}, {
|
||
Domain: "alias.test.com",
|
||
Answer: "test.com",
|
||
Type: dns.TypeCNAME,
|
||
}, {
|
||
Domain: "my.alias.example.org",
|
||
Answer: "example.org",
|
||
Type: dns.TypeCNAME,
|
||
}},
|
||
}
|
||
f := dnsfilter.New(c, nil)
|
||
|
||
snd, err := aghnet.NewSubnetDetector()
|
||
require.NoError(t, err)
|
||
require.NotNil(t, snd)
|
||
|
||
var s *Server
|
||
s, err = NewServer(DNSCreateParams{
|
||
DNSFilter: f,
|
||
SubnetDetector: snd,
|
||
LocalResolvers: &aghtest.Exchanger{},
|
||
})
|
||
require.NoError(t, err)
|
||
|
||
assert.NoError(t, s.Prepare(&ServerConfig{
|
||
UDPListenAddrs: []*net.UDPAddr{{}},
|
||
TCPListenAddrs: []*net.TCPAddr{{}},
|
||
FilteringConfig: FilteringConfig{
|
||
ProtectionEnabled: true,
|
||
UpstreamDNS: []string{"8.8.8.8:53"},
|
||
},
|
||
}))
|
||
|
||
s.conf.UpstreamConfig.Upstreams = []upstream.Upstream{
|
||
&aghtest.TestUpstream{
|
||
CName: map[string]string{
|
||
"example.org": "somename",
|
||
},
|
||
IPv4: map[string][]net.IP{
|
||
"example.org.": {{4, 3, 2, 1}},
|
||
},
|
||
},
|
||
}
|
||
startDeferStop(t, s)
|
||
|
||
addr := s.dnsProxy.Addr(proxy.ProtoUDP)
|
||
|
||
req := createTestMessageWithType("test.com.", dns.TypeA)
|
||
reply, err := dns.Exchange(req, addr.String())
|
||
require.NoError(t, err)
|
||
|
||
require.Len(t, reply.Answer, 1)
|
||
|
||
a, ok := reply.Answer[0].(*dns.A)
|
||
require.True(t, ok)
|
||
|
||
assert.True(t, net.IP{1, 2, 3, 4}.Equal(a.A))
|
||
|
||
req = createTestMessageWithType("test.com.", dns.TypeAAAA)
|
||
reply, err = dns.Exchange(req, addr.String())
|
||
require.NoError(t, err)
|
||
|
||
assert.Empty(t, reply.Answer)
|
||
|
||
req = createTestMessageWithType("alias.test.com.", dns.TypeA)
|
||
reply, err = dns.Exchange(req, addr.String())
|
||
require.NoError(t, err)
|
||
|
||
require.Len(t, reply.Answer, 2)
|
||
|
||
assert.Equal(t, "test.com.", reply.Answer[0].(*dns.CNAME).Target)
|
||
assert.True(t, net.IP{1, 2, 3, 4}.Equal(reply.Answer[1].(*dns.A).A))
|
||
|
||
req = createTestMessageWithType("my.alias.example.org.", dns.TypeA)
|
||
reply, err = dns.Exchange(req, addr.String())
|
||
require.NoError(t, err)
|
||
|
||
// The original question is restored.
|
||
require.Len(t, reply.Question, 1)
|
||
|
||
assert.Equal(t, "my.alias.example.org.", reply.Question[0].Name)
|
||
|
||
require.Len(t, reply.Answer, 2)
|
||
|
||
assert.Equal(t, "example.org.", reply.Answer[0].(*dns.CNAME).Target)
|
||
assert.Equal(t, dns.TypeA, reply.Answer[1].Header().Rrtype)
|
||
}
|
||
|
||
func publicKey(priv interface{}) interface{} {
|
||
switch k := priv.(type) {
|
||
case *rsa.PrivateKey:
|
||
return &k.PublicKey
|
||
|
||
case *ecdsa.PrivateKey:
|
||
return &k.PublicKey
|
||
|
||
default:
|
||
return nil
|
||
}
|
||
}
|
||
|
||
func TestValidateUpstream(t *testing.T) {
|
||
testCases := []struct {
|
||
name string
|
||
upstream string
|
||
valid bool
|
||
wantDef bool
|
||
}{{
|
||
name: "invalid",
|
||
upstream: "1.2.3.4.5",
|
||
valid: false,
|
||
}, {
|
||
name: "invalid",
|
||
upstream: "123.3.7m",
|
||
valid: false,
|
||
}, {
|
||
name: "invalid",
|
||
upstream: "htttps://google.com/dns-query",
|
||
valid: false,
|
||
}, {
|
||
name: "invalid",
|
||
upstream: "[/host.com]tls://dns.adguard.com",
|
||
valid: false,
|
||
}, {
|
||
name: "invalid",
|
||
upstream: "[host.ru]#",
|
||
valid: false,
|
||
}, {
|
||
name: "valid_default",
|
||
upstream: "1.1.1.1",
|
||
valid: true,
|
||
wantDef: true,
|
||
}, {
|
||
name: "valid_default",
|
||
upstream: "tls://1.1.1.1",
|
||
valid: true,
|
||
wantDef: true,
|
||
}, {
|
||
name: "valid_default",
|
||
upstream: "https://dns.adguard.com/dns-query",
|
||
valid: true,
|
||
wantDef: true,
|
||
}, {
|
||
name: "valid_default",
|
||
upstream: "sdns://AQMAAAAAAAAAFDE3Ni4xMDMuMTMwLjEzMDo1NDQzINErR_JS3PLCu_iZEIbq95zkSV2LFsigxDIuUso_OQhzIjIuZG5zY3J5cHQuZGVmYXVsdC5uczEuYWRndWFyZC5jb20",
|
||
valid: true,
|
||
wantDef: true,
|
||
}, {
|
||
name: "valid",
|
||
upstream: "[/host.com/]1.1.1.1",
|
||
valid: true,
|
||
wantDef: false,
|
||
}, {
|
||
name: "valid",
|
||
upstream: "[//]tls://1.1.1.1",
|
||
valid: true,
|
||
wantDef: false,
|
||
}, {
|
||
name: "valid",
|
||
upstream: "[/www.host.com/]#",
|
||
valid: true,
|
||
wantDef: false,
|
||
}, {
|
||
name: "valid",
|
||
upstream: "[/host.com/google.com/]8.8.8.8",
|
||
valid: true,
|
||
wantDef: false,
|
||
}, {
|
||
name: "valid",
|
||
upstream: "[/host/]sdns://AQMAAAAAAAAAFDE3Ni4xMDMuMTMwLjEzMDo1NDQzINErR_JS3PLCu_iZEIbq95zkSV2LFsigxDIuUso_OQhzIjIuZG5zY3J5cHQuZGVmYXVsdC5uczEuYWRndWFyZC5jb20",
|
||
valid: true,
|
||
wantDef: false,
|
||
}}
|
||
|
||
for _, tc := range testCases {
|
||
t.Run(tc.name, func(t *testing.T) {
|
||
defaultUpstream, err := validateUpstream(tc.upstream)
|
||
require.Equal(t, tc.valid, err == nil)
|
||
if tc.valid {
|
||
assert.Equal(t, tc.wantDef, defaultUpstream)
|
||
}
|
||
})
|
||
}
|
||
}
|
||
|
||
func TestValidateUpstreamsSet(t *testing.T) {
|
||
testCases := []struct {
|
||
name string
|
||
msg string
|
||
set []string
|
||
wantNil bool
|
||
}{{
|
||
name: "empty",
|
||
msg: "empty upstreams array should be valid",
|
||
set: nil,
|
||
wantNil: true,
|
||
}, {
|
||
name: "comment",
|
||
msg: "comments should not be validated",
|
||
set: []string{"# comment"},
|
||
wantNil: true,
|
||
}, {
|
||
name: "valid_no_default",
|
||
msg: "there is no default upstream",
|
||
set: []string{
|
||
"[/host.com/]1.1.1.1",
|
||
"[//]tls://1.1.1.1",
|
||
"[/www.host.com/]#",
|
||
"[/host.com/google.com/]8.8.8.8",
|
||
"[/host/]sdns://AQMAAAAAAAAAFDE3Ni4xMDMuMTMwLjEzMDo1NDQzINErR_JS3PLCu_iZEIbq95zkSV2LFsigxDIuUso_OQhzIjIuZG5zY3J5cHQuZGVmYXVsdC5uczEuYWRndWFyZC5jb20",
|
||
},
|
||
wantNil: false,
|
||
}, {
|
||
name: "valid_with_default",
|
||
msg: "upstreams set is valid, but doesn't pass through validation cause: %s",
|
||
set: []string{
|
||
"[/host.com/]1.1.1.1",
|
||
"[//]tls://1.1.1.1",
|
||
"[/www.host.com/]#",
|
||
"[/host.com/google.com/]8.8.8.8",
|
||
"[/host/]sdns://AQMAAAAAAAAAFDE3Ni4xMDMuMTMwLjEzMDo1NDQzINErR_JS3PLCu_iZEIbq95zkSV2LFsigxDIuUso_OQhzIjIuZG5zY3J5cHQuZGVmYXVsdC5uczEuYWRndWFyZC5jb20",
|
||
"8.8.8.8",
|
||
},
|
||
wantNil: true,
|
||
}, {
|
||
name: "invalid",
|
||
msg: "there is an invalid upstream in set, but it pass through validation",
|
||
set: []string{"dhcp://fake.dns"},
|
||
wantNil: false,
|
||
}}
|
||
|
||
for _, tc := range testCases {
|
||
t.Run(tc.name, func(t *testing.T) {
|
||
err := ValidateUpstreams(tc.set)
|
||
|
||
assert.Equalf(t, tc.wantNil, err == nil, tc.msg, err)
|
||
})
|
||
}
|
||
}
|
||
|
||
func TestIPStringFromAddr(t *testing.T) {
|
||
t.Run("not_nil", func(t *testing.T) {
|
||
addr := net.UDPAddr{
|
||
IP: net.ParseIP("1:2:3::4"),
|
||
Port: 12345,
|
||
Zone: "eth0",
|
||
}
|
||
assert.Equal(t, IPStringFromAddr(&addr), addr.IP.String())
|
||
})
|
||
|
||
t.Run("nil", func(t *testing.T) {
|
||
assert.Empty(t, IPStringFromAddr(nil))
|
||
})
|
||
}
|
||
|
||
func TestMatchDNSName(t *testing.T) {
|
||
dnsNames := []string{"host1", "*.host2", "1.2.3.4"}
|
||
sort.Strings(dnsNames)
|
||
|
||
testCases := []struct {
|
||
name string
|
||
dnsName string
|
||
want bool
|
||
}{{
|
||
name: "match",
|
||
dnsName: "host1",
|
||
want: true,
|
||
}, {
|
||
name: "match",
|
||
dnsName: "a.host2",
|
||
want: true,
|
||
}, {
|
||
name: "match",
|
||
dnsName: "b.a.host2",
|
||
want: true,
|
||
}, {
|
||
name: "match",
|
||
dnsName: "1.2.3.4",
|
||
want: true,
|
||
}, {
|
||
name: "mismatch",
|
||
dnsName: "host2",
|
||
want: false,
|
||
}, {
|
||
name: "mismatch",
|
||
dnsName: "",
|
||
want: false,
|
||
}, {
|
||
name: "mismatch",
|
||
dnsName: "*.host2",
|
||
want: false,
|
||
}}
|
||
for _, tc := range testCases {
|
||
t.Run(tc.name, func(t *testing.T) {
|
||
assert.Equal(t, tc.want, matchDNSName(dnsNames, tc.dnsName))
|
||
})
|
||
}
|
||
}
|
||
|
||
type testDHCP struct{}
|
||
|
||
func (d *testDHCP) Leases(flags int) []dhcpd.Lease {
|
||
l := dhcpd.Lease{
|
||
IP: net.IP{127, 0, 0, 1},
|
||
HWAddr: net.HardwareAddr{0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA},
|
||
Hostname: "localhost",
|
||
}
|
||
|
||
return []dhcpd.Lease{l}
|
||
}
|
||
func (d *testDHCP) SetOnLeaseChanged(onLeaseChanged dhcpd.OnLeaseChangedT) {}
|
||
|
||
func TestPTRResponseFromDHCPLeases(t *testing.T) {
|
||
snd, err := aghnet.NewSubnetDetector()
|
||
require.NoError(t, err)
|
||
require.NotNil(t, snd)
|
||
|
||
var s *Server
|
||
s, err = NewServer(DNSCreateParams{
|
||
DNSFilter: dnsfilter.New(&dnsfilter.Config{}, nil),
|
||
DHCPServer: &testDHCP{},
|
||
SubnetDetector: snd,
|
||
LocalResolvers: &aghtest.Exchanger{},
|
||
})
|
||
require.NoError(t, err)
|
||
|
||
s.conf.UDPListenAddrs = []*net.UDPAddr{{}}
|
||
s.conf.TCPListenAddrs = []*net.TCPAddr{{}}
|
||
s.conf.UpstreamDNS = []string{"127.0.0.1:53"}
|
||
s.conf.FilteringConfig.ProtectionEnabled = true
|
||
|
||
err = s.Prepare(nil)
|
||
require.NoError(t, err)
|
||
|
||
err = s.Start()
|
||
require.NoError(t, err)
|
||
|
||
t.Cleanup(func() {
|
||
s.Close()
|
||
})
|
||
|
||
addr := s.dnsProxy.Addr(proxy.ProtoUDP)
|
||
req := createTestMessageWithType("1.0.0.127.in-addr.arpa.", dns.TypePTR)
|
||
|
||
resp, err := dns.Exchange(req, addr.String())
|
||
require.NoError(t, err)
|
||
|
||
require.Len(t, resp.Answer, 1)
|
||
|
||
assert.Equal(t, dns.TypePTR, resp.Answer[0].Header().Rrtype)
|
||
assert.Equal(t, "1.0.0.127.in-addr.arpa.", resp.Answer[0].Header().Name)
|
||
|
||
ptr, ok := resp.Answer[0].(*dns.PTR)
|
||
require.True(t, ok)
|
||
assert.Equal(t, "localhost.", ptr.Ptr)
|
||
}
|
||
|
||
func TestPTRResponseFromHosts(t *testing.T) {
|
||
c := dnsfilter.Config{
|
||
AutoHosts: &util.AutoHosts{},
|
||
}
|
||
|
||
// Prepare test hosts file.
|
||
hf, err := ioutil.TempFile("", "")
|
||
require.NoError(t, err)
|
||
|
||
t.Cleanup(func() {
|
||
assert.NoError(t, hf.Close())
|
||
assert.NoError(t, os.Remove(hf.Name()))
|
||
})
|
||
|
||
_, _ = hf.WriteString(" 127.0.0.1 host # comment \n")
|
||
_, _ = hf.WriteString(" ::1 localhost#comment \n")
|
||
|
||
// Init auto hosts.
|
||
c.AutoHosts.Init(hf.Name())
|
||
t.Cleanup(c.AutoHosts.Close)
|
||
|
||
var snd *aghnet.SubnetDetector
|
||
snd, err = aghnet.NewSubnetDetector()
|
||
require.NoError(t, err)
|
||
require.NotNil(t, snd)
|
||
|
||
var s *Server
|
||
s, err = NewServer(DNSCreateParams{
|
||
DNSFilter: dnsfilter.New(&c, nil),
|
||
SubnetDetector: snd,
|
||
LocalResolvers: &aghtest.Exchanger{},
|
||
})
|
||
require.NoError(t, err)
|
||
|
||
s.conf.UDPListenAddrs = []*net.UDPAddr{{}}
|
||
s.conf.TCPListenAddrs = []*net.TCPAddr{{}}
|
||
s.conf.UpstreamDNS = []string{"127.0.0.1:53"}
|
||
s.conf.FilteringConfig.ProtectionEnabled = true
|
||
|
||
err = s.Prepare(nil)
|
||
require.NoError(t, err)
|
||
|
||
err = s.Start()
|
||
require.NoError(t, err)
|
||
|
||
t.Cleanup(func() {
|
||
s.Close()
|
||
})
|
||
|
||
addr := s.dnsProxy.Addr(proxy.ProtoUDP)
|
||
req := createTestMessageWithType("1.0.0.127.in-addr.arpa.", dns.TypePTR)
|
||
|
||
resp, err := dns.Exchange(req, addr.String())
|
||
require.NoError(t, err)
|
||
|
||
require.Len(t, resp.Answer, 1)
|
||
|
||
assert.Equal(t, dns.TypePTR, resp.Answer[0].Header().Rrtype)
|
||
assert.Equal(t, "1.0.0.127.in-addr.arpa.", resp.Answer[0].Header().Name)
|
||
|
||
ptr, ok := resp.Answer[0].(*dns.PTR)
|
||
require.True(t, ok)
|
||
assert.Equal(t, "host.", ptr.Ptr)
|
||
}
|
||
|
||
func TestNewServer(t *testing.T) {
|
||
testCases := []struct {
|
||
name string
|
||
in DNSCreateParams
|
||
wantErrMsg string
|
||
}{{
|
||
name: "success",
|
||
in: DNSCreateParams{},
|
||
wantErrMsg: "",
|
||
}, {
|
||
name: "success_autohost_tld",
|
||
in: DNSCreateParams{
|
||
AutohostTLD: "mynet",
|
||
},
|
||
wantErrMsg: "",
|
||
}, {
|
||
name: "bad_autohost_tld",
|
||
in: DNSCreateParams{
|
||
AutohostTLD: "!!!",
|
||
},
|
||
wantErrMsg: `autohost tld: invalid char '!' at index 0 in "!!!"`,
|
||
}}
|
||
|
||
for _, tc := range testCases {
|
||
t.Run(tc.name, func(t *testing.T) {
|
||
_, err := NewServer(tc.in)
|
||
if tc.wantErrMsg == "" {
|
||
assert.NoError(t, err)
|
||
} else {
|
||
require.Error(t, err)
|
||
assert.Equal(t, tc.wantErrMsg, err.Error())
|
||
}
|
||
})
|
||
}
|
||
}
|