mirror of
https://github.com/kubernetes-sigs/external-dns.git
synced 2025-08-05 17:16:59 +02:00
2019 lines
89 KiB
Go
2019 lines
89 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package aws
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"math"
|
|
"net"
|
|
"sort"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
"github.com/aws/aws-sdk-go/aws/request"
|
|
"github.com/aws/aws-sdk-go/service/route53"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/mock"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"sigs.k8s.io/external-dns/endpoint"
|
|
"sigs.k8s.io/external-dns/internal/testutils"
|
|
"sigs.k8s.io/external-dns/plan"
|
|
"sigs.k8s.io/external-dns/provider"
|
|
)
|
|
|
|
const (
|
|
defaultBatchChangeSize = 4000
|
|
defaultBatchChangeSizeBytes = 32000
|
|
defaultBatchChangeSizeValues = 1000
|
|
defaultBatchChangeInterval = time.Second
|
|
defaultEvaluateTargetHealth = true
|
|
)
|
|
|
|
// Compile time check for interface conformance
|
|
var _ Route53API = &Route53APIStub{}
|
|
|
|
// Route53APIStub is a minimal implementation of Route53API, used primarily for unit testing.
|
|
// See http://http://docs.aws.amazon.com/sdk-for-go/api/service/route53.html for descriptions
|
|
// of all of its methods.
|
|
// mostly taken from: https://github.com/kubernetes/kubernetes/blob/853167624edb6bc0cfdcdfb88e746e178f5db36c/federation/pkg/dnsprovider/providers/aws/route53/stubs/route53api.go
|
|
type Route53APIStub struct {
|
|
zones map[string]*route53.HostedZone
|
|
recordSets map[string]map[string][]*route53.ResourceRecordSet
|
|
zoneTags map[string][]*route53.Tag
|
|
m dynamicMock
|
|
t *testing.T
|
|
}
|
|
|
|
// MockMethod starts a description of an expectation of the specified method
|
|
// being called.
|
|
//
|
|
// Route53APIStub.MockMethod("MyMethod", arg1, arg2)
|
|
func (r *Route53APIStub) MockMethod(method string, args ...interface{}) *mock.Call {
|
|
return r.m.On(method, args...)
|
|
}
|
|
|
|
// NewRoute53APIStub returns an initialized Route53APIStub
|
|
func NewRoute53APIStub(t *testing.T) *Route53APIStub {
|
|
return &Route53APIStub{
|
|
zones: make(map[string]*route53.HostedZone),
|
|
recordSets: make(map[string]map[string][]*route53.ResourceRecordSet),
|
|
zoneTags: make(map[string][]*route53.Tag),
|
|
t: t,
|
|
}
|
|
}
|
|
|
|
func (r *Route53APIStub) ListResourceRecordSetsPagesWithContext(ctx context.Context, input *route53.ListResourceRecordSetsInput, fn func(p *route53.ListResourceRecordSetsOutput, lastPage bool) (shouldContinue bool), opts ...request.Option) error {
|
|
output := route53.ListResourceRecordSetsOutput{} // TODO: Support optional input args.
|
|
require.NotNil(r.t, input.MaxItems)
|
|
assert.EqualValues(r.t, route53PageSize, *input.MaxItems)
|
|
if len(r.recordSets) == 0 {
|
|
output.ResourceRecordSets = []*route53.ResourceRecordSet{}
|
|
} else if _, ok := r.recordSets[aws.StringValue(input.HostedZoneId)]; !ok {
|
|
output.ResourceRecordSets = []*route53.ResourceRecordSet{}
|
|
} else {
|
|
for _, rrsets := range r.recordSets[aws.StringValue(input.HostedZoneId)] {
|
|
output.ResourceRecordSets = append(output.ResourceRecordSets, rrsets...)
|
|
}
|
|
}
|
|
lastPage := true
|
|
fn(&output, lastPage)
|
|
return nil
|
|
}
|
|
|
|
type Route53APICounter struct {
|
|
wrapped Route53API
|
|
calls map[string]int
|
|
}
|
|
|
|
func NewRoute53APICounter(w Route53API) *Route53APICounter {
|
|
return &Route53APICounter{
|
|
wrapped: w,
|
|
calls: map[string]int{},
|
|
}
|
|
}
|
|
|
|
func (c *Route53APICounter) ListResourceRecordSetsPagesWithContext(ctx context.Context, input *route53.ListResourceRecordSetsInput, fn func(resp *route53.ListResourceRecordSetsOutput, lastPage bool) (shouldContinue bool), opts ...request.Option) error {
|
|
c.calls["ListResourceRecordSetsPages"]++
|
|
return c.wrapped.ListResourceRecordSetsPagesWithContext(ctx, input, fn)
|
|
}
|
|
|
|
func (c *Route53APICounter) ChangeResourceRecordSetsWithContext(ctx context.Context, input *route53.ChangeResourceRecordSetsInput, opts ...request.Option) (*route53.ChangeResourceRecordSetsOutput, error) {
|
|
c.calls["ChangeResourceRecordSets"]++
|
|
return c.wrapped.ChangeResourceRecordSetsWithContext(ctx, input)
|
|
}
|
|
|
|
func (c *Route53APICounter) CreateHostedZoneWithContext(ctx context.Context, input *route53.CreateHostedZoneInput, opts ...request.Option) (*route53.CreateHostedZoneOutput, error) {
|
|
c.calls["CreateHostedZone"]++
|
|
return c.wrapped.CreateHostedZoneWithContext(ctx, input)
|
|
}
|
|
|
|
func (c *Route53APICounter) ListHostedZonesPagesWithContext(ctx context.Context, input *route53.ListHostedZonesInput, fn func(resp *route53.ListHostedZonesOutput, lastPage bool) (shouldContinue bool), opts ...request.Option) error {
|
|
c.calls["ListHostedZonesPages"]++
|
|
return c.wrapped.ListHostedZonesPagesWithContext(ctx, input, fn)
|
|
}
|
|
|
|
func (c *Route53APICounter) ListTagsForResourceWithContext(ctx context.Context, input *route53.ListTagsForResourceInput, opts ...request.Option) (*route53.ListTagsForResourceOutput, error) {
|
|
c.calls["ListTagsForResource"]++
|
|
return c.wrapped.ListTagsForResourceWithContext(ctx, input)
|
|
}
|
|
|
|
// Route53 stores wildcards escaped: http://docs.aws.amazon.com/Route53/latest/DeveloperGuide/DomainNameFormat.html?shortFooter=true#domain-name-format-asterisk
|
|
func wildcardEscape(s string) string {
|
|
if strings.Contains(s, "*") {
|
|
s = strings.Replace(s, "*", "\\052", 1)
|
|
}
|
|
return s
|
|
}
|
|
|
|
func (r *Route53APIStub) ListTagsForResourceWithContext(ctx context.Context, input *route53.ListTagsForResourceInput, opts ...request.Option) (*route53.ListTagsForResourceOutput, error) {
|
|
if aws.StringValue(input.ResourceType) == "hostedzone" {
|
|
tags := r.zoneTags[aws.StringValue(input.ResourceId)]
|
|
return &route53.ListTagsForResourceOutput{
|
|
ResourceTagSet: &route53.ResourceTagSet{
|
|
ResourceId: input.ResourceId,
|
|
ResourceType: input.ResourceType,
|
|
Tags: tags,
|
|
},
|
|
}, nil
|
|
}
|
|
return &route53.ListTagsForResourceOutput{}, nil
|
|
}
|
|
|
|
func (r *Route53APIStub) ChangeResourceRecordSetsWithContext(ctx context.Context, input *route53.ChangeResourceRecordSetsInput, opts ...request.Option) (*route53.ChangeResourceRecordSetsOutput, error) {
|
|
if r.m.isMocked("ChangeResourceRecordSets", input) {
|
|
return r.m.ChangeResourceRecordSets(input)
|
|
}
|
|
|
|
_, ok := r.zones[aws.StringValue(input.HostedZoneId)]
|
|
if !ok {
|
|
return nil, fmt.Errorf("Hosted zone doesn't exist: %s", aws.StringValue(input.HostedZoneId))
|
|
}
|
|
|
|
if len(input.ChangeBatch.Changes) == 0 {
|
|
return nil, fmt.Errorf("ChangeBatch doesn't contain any changes")
|
|
}
|
|
|
|
output := &route53.ChangeResourceRecordSetsOutput{}
|
|
recordSets, ok := r.recordSets[aws.StringValue(input.HostedZoneId)]
|
|
if !ok {
|
|
recordSets = make(map[string][]*route53.ResourceRecordSet)
|
|
}
|
|
|
|
for _, change := range input.ChangeBatch.Changes {
|
|
if aws.StringValue(change.ResourceRecordSet.Type) == route53.RRTypeA {
|
|
for _, rrs := range change.ResourceRecordSet.ResourceRecords {
|
|
if net.ParseIP(aws.StringValue(rrs.Value)) == nil {
|
|
return nil, fmt.Errorf("A records must point to IPs")
|
|
}
|
|
}
|
|
}
|
|
|
|
change.ResourceRecordSet.Name = aws.String(wildcardEscape(provider.EnsureTrailingDot(aws.StringValue(change.ResourceRecordSet.Name))))
|
|
|
|
if change.ResourceRecordSet.AliasTarget != nil {
|
|
change.ResourceRecordSet.AliasTarget.DNSName = aws.String(wildcardEscape(provider.EnsureTrailingDot(aws.StringValue(change.ResourceRecordSet.AliasTarget.DNSName))))
|
|
}
|
|
|
|
setID := ""
|
|
if change.ResourceRecordSet.SetIdentifier != nil {
|
|
setID = aws.StringValue(change.ResourceRecordSet.SetIdentifier)
|
|
}
|
|
key := aws.StringValue(change.ResourceRecordSet.Name) + "::" + aws.StringValue(change.ResourceRecordSet.Type) + "::" + setID
|
|
switch aws.StringValue(change.Action) {
|
|
case route53.ChangeActionCreate:
|
|
if _, found := recordSets[key]; found {
|
|
return nil, fmt.Errorf("Attempt to create duplicate rrset %s", key) // TODO: Return AWS errors with codes etc
|
|
}
|
|
recordSets[key] = append(recordSets[key], change.ResourceRecordSet)
|
|
case route53.ChangeActionDelete:
|
|
if _, found := recordSets[key]; !found {
|
|
return nil, fmt.Errorf("Attempt to delete non-existent rrset %s", key) // TODO: Check other fields too
|
|
}
|
|
delete(recordSets, key)
|
|
case route53.ChangeActionUpsert:
|
|
recordSets[key] = []*route53.ResourceRecordSet{change.ResourceRecordSet}
|
|
}
|
|
}
|
|
r.recordSets[aws.StringValue(input.HostedZoneId)] = recordSets
|
|
return output, nil // TODO: We should ideally return status etc, but we don't' use that yet.
|
|
}
|
|
|
|
func (r *Route53APIStub) ListHostedZonesPagesWithContext(ctx context.Context, input *route53.ListHostedZonesInput, fn func(p *route53.ListHostedZonesOutput, lastPage bool) (shouldContinue bool), opts ...request.Option) error {
|
|
output := &route53.ListHostedZonesOutput{}
|
|
for _, zone := range r.zones {
|
|
output.HostedZones = append(output.HostedZones, zone)
|
|
}
|
|
lastPage := true
|
|
fn(output, lastPage)
|
|
return nil
|
|
}
|
|
|
|
func (r *Route53APIStub) CreateHostedZoneWithContext(ctx context.Context, input *route53.CreateHostedZoneInput, opts ...request.Option) (*route53.CreateHostedZoneOutput, error) {
|
|
name := aws.StringValue(input.Name)
|
|
id := "/hostedzone/" + name
|
|
if _, ok := r.zones[id]; ok {
|
|
return nil, fmt.Errorf("Error creating hosted DNS zone: %s already exists", id)
|
|
}
|
|
r.zones[id] = &route53.HostedZone{
|
|
Id: aws.String(id),
|
|
Name: aws.String(name),
|
|
Config: input.HostedZoneConfig,
|
|
}
|
|
return &route53.CreateHostedZoneOutput{HostedZone: r.zones[id]}, nil
|
|
}
|
|
|
|
type dynamicMock struct {
|
|
mock.Mock
|
|
}
|
|
|
|
func (m *dynamicMock) ChangeResourceRecordSets(input *route53.ChangeResourceRecordSetsInput) (*route53.ChangeResourceRecordSetsOutput, error) {
|
|
args := m.Called(input)
|
|
if args.Get(0) != nil {
|
|
return args.Get(0).(*route53.ChangeResourceRecordSetsOutput), args.Error(1)
|
|
}
|
|
return nil, args.Error(1)
|
|
}
|
|
|
|
func (m *dynamicMock) isMocked(method string, arguments ...interface{}) bool {
|
|
for _, call := range m.ExpectedCalls {
|
|
if call.Method == method && call.Repeatability > -1 {
|
|
_, diffCount := call.Arguments.Diff(arguments)
|
|
if diffCount == 0 {
|
|
return true
|
|
}
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
func TestAWSZones(t *testing.T) {
|
|
publicZones := map[string]*route53.HostedZone{
|
|
"/hostedzone/zone-1.ext-dns-test-2.teapot.zalan.do.": {
|
|
Id: aws.String("/hostedzone/zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Name: aws.String("zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
},
|
|
"/hostedzone/zone-2.ext-dns-test-2.teapot.zalan.do.": {
|
|
Id: aws.String("/hostedzone/zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Name: aws.String("zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
},
|
|
}
|
|
|
|
privateZones := map[string]*route53.HostedZone{
|
|
"/hostedzone/zone-3.ext-dns-test-2.teapot.zalan.do.": {
|
|
Id: aws.String("/hostedzone/zone-3.ext-dns-test-2.teapot.zalan.do."),
|
|
Name: aws.String("zone-3.ext-dns-test-2.teapot.zalan.do."),
|
|
},
|
|
}
|
|
|
|
allZones := map[string]*route53.HostedZone{}
|
|
for k, v := range publicZones {
|
|
allZones[k] = v
|
|
}
|
|
for k, v := range privateZones {
|
|
allZones[k] = v
|
|
}
|
|
|
|
noZones := map[string]*route53.HostedZone{}
|
|
|
|
for _, ti := range []struct {
|
|
msg string
|
|
zoneIDFilter provider.ZoneIDFilter
|
|
zoneTypeFilter provider.ZoneTypeFilter
|
|
zoneTagFilter provider.ZoneTagFilter
|
|
expectedZones map[string]*route53.HostedZone
|
|
}{
|
|
{"no filter", provider.NewZoneIDFilter([]string{}), provider.NewZoneTypeFilter(""), provider.NewZoneTagFilter([]string{}), allZones},
|
|
{"public filter", provider.NewZoneIDFilter([]string{}), provider.NewZoneTypeFilter("public"), provider.NewZoneTagFilter([]string{}), publicZones},
|
|
{"private filter", provider.NewZoneIDFilter([]string{}), provider.NewZoneTypeFilter("private"), provider.NewZoneTagFilter([]string{}), privateZones},
|
|
{"unknown filter", provider.NewZoneIDFilter([]string{}), provider.NewZoneTypeFilter("unknown"), provider.NewZoneTagFilter([]string{}), noZones},
|
|
{"zone id filter", provider.NewZoneIDFilter([]string{"/hostedzone/zone-3.ext-dns-test-2.teapot.zalan.do."}), provider.NewZoneTypeFilter(""), provider.NewZoneTagFilter([]string{}), privateZones},
|
|
{"tag filter", provider.NewZoneIDFilter([]string{}), provider.NewZoneTypeFilter(""), provider.NewZoneTagFilter([]string{"zone=3"}), privateZones},
|
|
} {
|
|
provider, _ := newAWSProviderWithTagFilter(t, endpoint.NewDomainFilter([]string{"ext-dns-test-2.teapot.zalan.do."}), ti.zoneIDFilter, ti.zoneTypeFilter, ti.zoneTagFilter, defaultEvaluateTargetHealth, false, nil)
|
|
|
|
zones, err := provider.Zones(context.Background())
|
|
require.NoError(t, err)
|
|
|
|
validateAWSZones(t, zones, ti.expectedZones)
|
|
}
|
|
}
|
|
|
|
func TestAWSRecordsFilter(t *testing.T) {
|
|
provider, _ := newAWSProvider(t, endpoint.DomainFilter{}, provider.ZoneIDFilter{}, provider.ZoneTypeFilter{}, false, false, nil)
|
|
domainFilter := provider.GetDomainFilter()
|
|
assert.NotNil(t, domainFilter)
|
|
require.IsType(t, endpoint.DomainFilter{}, domainFilter)
|
|
count := 0
|
|
filters := domainFilter.Filters
|
|
for _, tld := range []string{
|
|
"zone-4.ext-dns-test-3.teapot.zalan.do",
|
|
".zone-4.ext-dns-test-3.teapot.zalan.do",
|
|
"zone-2.ext-dns-test-2.teapot.zalan.do",
|
|
".zone-2.ext-dns-test-2.teapot.zalan.do",
|
|
"zone-3.ext-dns-test-2.teapot.zalan.do",
|
|
".zone-3.ext-dns-test-2.teapot.zalan.do",
|
|
"zone-4.ext-dns-test-3.teapot.zalan.do",
|
|
".zone-4.ext-dns-test-3.teapot.zalan.do",
|
|
} {
|
|
assert.Contains(t, filters, tld)
|
|
count++
|
|
}
|
|
assert.Len(t, filters, count)
|
|
}
|
|
|
|
func TestAWSRecords(t *testing.T) {
|
|
provider, _ := newAWSProvider(t, endpoint.NewDomainFilter([]string{"ext-dns-test-2.teapot.zalan.do."}), provider.NewZoneIDFilter([]string{}), provider.NewZoneTypeFilter(""), false, false, []*route53.ResourceRecordSet{
|
|
{
|
|
Name: aws.String("list-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
},
|
|
{
|
|
Name: aws.String("list-test.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("8.8.8.8")}},
|
|
},
|
|
{
|
|
Name: aws.String("*.wildcard-test.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("8.8.8.8")}},
|
|
},
|
|
{
|
|
Name: aws.String("list-test-alias.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
AliasTarget: &route53.AliasTarget{
|
|
DNSName: aws.String("foo.eu-central-1.elb.amazonaws.com."),
|
|
EvaluateTargetHealth: aws.Bool(false),
|
|
HostedZoneId: aws.String("Z215JYRZR1TBD5"),
|
|
},
|
|
},
|
|
{
|
|
Name: aws.String("*.wildcard-test-alias.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
AliasTarget: &route53.AliasTarget{
|
|
DNSName: aws.String("foo.eu-central-1.elb.amazonaws.com."),
|
|
EvaluateTargetHealth: aws.Bool(false),
|
|
HostedZoneId: aws.String("Z215JYRZR1TBD5"),
|
|
},
|
|
},
|
|
{
|
|
Name: aws.String("list-test-alias-evaluate.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
AliasTarget: &route53.AliasTarget{
|
|
DNSName: aws.String("foo.eu-central-1.elb.amazonaws.com."),
|
|
EvaluateTargetHealth: aws.Bool(true),
|
|
HostedZoneId: aws.String("Z215JYRZR1TBD5"),
|
|
},
|
|
},
|
|
{
|
|
Name: aws.String("list-test-multiple.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("8.8.8.8")}, {Value: aws.String("8.8.4.4")}},
|
|
},
|
|
{
|
|
Name: aws.String("prefix-*.wildcard.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeTxt),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("random")}},
|
|
},
|
|
{
|
|
Name: aws.String("weight-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
SetIdentifier: aws.String("test-set-1"),
|
|
Weight: aws.Int64(10),
|
|
},
|
|
{
|
|
Name: aws.String("weight-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("4.3.2.1")}},
|
|
SetIdentifier: aws.String("test-set-2"),
|
|
Weight: aws.Int64(20),
|
|
},
|
|
{
|
|
Name: aws.String("latency-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
SetIdentifier: aws.String("test-set"),
|
|
Region: aws.String("us-east-1"),
|
|
},
|
|
{
|
|
Name: aws.String("failover-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
SetIdentifier: aws.String("test-set"),
|
|
Failover: aws.String("PRIMARY"),
|
|
},
|
|
{
|
|
Name: aws.String("multi-value-answer-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
SetIdentifier: aws.String("test-set"),
|
|
MultiValueAnswer: aws.Bool(true),
|
|
},
|
|
{
|
|
Name: aws.String("geolocation-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
SetIdentifier: aws.String("test-set-1"),
|
|
GeoLocation: &route53.GeoLocation{
|
|
ContinentCode: aws.String("EU"),
|
|
},
|
|
},
|
|
{
|
|
Name: aws.String("geolocation-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("4.3.2.1")}},
|
|
SetIdentifier: aws.String("test-set-2"),
|
|
GeoLocation: &route53.GeoLocation{
|
|
CountryCode: aws.String("DE"),
|
|
},
|
|
},
|
|
{
|
|
Name: aws.String("geolocation-subdivision-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
SetIdentifier: aws.String("test-set-1"),
|
|
GeoLocation: &route53.GeoLocation{
|
|
SubdivisionCode: aws.String("NY"),
|
|
},
|
|
},
|
|
{
|
|
Name: aws.String("healthcheck-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeCname),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("foo.example.com")}},
|
|
SetIdentifier: aws.String("test-set-1"),
|
|
HealthCheckId: aws.String("foo-bar-healthcheck-id"),
|
|
Weight: aws.Int64(10),
|
|
},
|
|
{
|
|
Name: aws.String("healthcheck-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("4.3.2.1")}},
|
|
SetIdentifier: aws.String("test-set-2"),
|
|
HealthCheckId: aws.String("abc-def-healthcheck-id"),
|
|
Weight: aws.Int64(20),
|
|
},
|
|
{
|
|
Name: aws.String("mail.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeMx),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("10 mailhost1.example.com")}, {Value: aws.String("20 mailhost2.example.com")}},
|
|
},
|
|
})
|
|
|
|
records, err := provider.Records(context.Background())
|
|
require.NoError(t, err)
|
|
|
|
validateEndpoints(t, provider, records, []*endpoint.Endpoint{
|
|
endpoint.NewEndpointWithTTL("list-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "1.2.3.4"),
|
|
endpoint.NewEndpointWithTTL("list-test.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "8.8.8.8"),
|
|
endpoint.NewEndpointWithTTL("*.wildcard-test.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "8.8.8.8"),
|
|
endpoint.NewEndpointWithTTL("list-test-alias.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "foo.eu-central-1.elb.amazonaws.com").WithProviderSpecific(providerSpecificEvaluateTargetHealth, "false").WithProviderSpecific(providerSpecificAlias, "true"),
|
|
endpoint.NewEndpointWithTTL("*.wildcard-test-alias.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "foo.eu-central-1.elb.amazonaws.com").WithProviderSpecific(providerSpecificEvaluateTargetHealth, "false").WithProviderSpecific(providerSpecificAlias, "true"),
|
|
endpoint.NewEndpointWithTTL("list-test-alias-evaluate.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "foo.eu-central-1.elb.amazonaws.com").WithProviderSpecific(providerSpecificEvaluateTargetHealth, "true").WithProviderSpecific(providerSpecificAlias, "true"),
|
|
endpoint.NewEndpointWithTTL("list-test-multiple.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "8.8.8.8", "8.8.4.4"),
|
|
endpoint.NewEndpointWithTTL("prefix-*.wildcard.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeTXT, endpoint.TTL(recordTTL), "random"),
|
|
endpoint.NewEndpointWithTTL("weight-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "1.2.3.4").WithSetIdentifier("test-set-1").WithProviderSpecific(providerSpecificWeight, "10"),
|
|
endpoint.NewEndpointWithTTL("weight-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "4.3.2.1").WithSetIdentifier("test-set-2").WithProviderSpecific(providerSpecificWeight, "20"),
|
|
endpoint.NewEndpointWithTTL("latency-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "1.2.3.4").WithSetIdentifier("test-set").WithProviderSpecific(providerSpecificRegion, "us-east-1"),
|
|
endpoint.NewEndpointWithTTL("failover-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "1.2.3.4").WithSetIdentifier("test-set").WithProviderSpecific(providerSpecificFailover, "PRIMARY"),
|
|
endpoint.NewEndpointWithTTL("multi-value-answer-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "1.2.3.4").WithSetIdentifier("test-set").WithProviderSpecific(providerSpecificMultiValueAnswer, ""),
|
|
endpoint.NewEndpointWithTTL("geolocation-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "1.2.3.4").WithSetIdentifier("test-set-1").WithProviderSpecific(providerSpecificGeolocationContinentCode, "EU"),
|
|
endpoint.NewEndpointWithTTL("geolocation-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "4.3.2.1").WithSetIdentifier("test-set-2").WithProviderSpecific(providerSpecificGeolocationCountryCode, "DE"),
|
|
endpoint.NewEndpointWithTTL("geolocation-subdivision-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "1.2.3.4").WithSetIdentifier("test-set-1").WithProviderSpecific(providerSpecificGeolocationSubdivisionCode, "NY"),
|
|
endpoint.NewEndpointWithTTL("healthcheck-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, endpoint.TTL(recordTTL), "foo.example.com").WithSetIdentifier("test-set-1").WithProviderSpecific(providerSpecificWeight, "10").WithProviderSpecific(providerSpecificHealthCheckID, "foo-bar-healthcheck-id").WithProviderSpecific(providerSpecificAlias, "false"),
|
|
endpoint.NewEndpointWithTTL("healthcheck-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "4.3.2.1").WithSetIdentifier("test-set-2").WithProviderSpecific(providerSpecificWeight, "20").WithProviderSpecific(providerSpecificHealthCheckID, "abc-def-healthcheck-id"),
|
|
endpoint.NewEndpointWithTTL("mail.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeMX, endpoint.TTL(recordTTL), "10 mailhost1.example.com", "20 mailhost2.example.com"),
|
|
})
|
|
}
|
|
|
|
func TestAWSAdjustEndpoints(t *testing.T) {
|
|
provider, _ := newAWSProvider(t, endpoint.NewDomainFilter([]string{"ext-dns-test-2.teapot.zalan.do."}), provider.NewZoneIDFilter([]string{}), provider.NewZoneTypeFilter(""), defaultEvaluateTargetHealth, false, nil)
|
|
|
|
records := []*endpoint.Endpoint{
|
|
endpoint.NewEndpoint("a-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.8.8"),
|
|
endpoint.NewEndpoint("cname-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "foo.example.com"),
|
|
endpoint.NewEndpointWithTTL("cname-test-alias.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, 60, "alias-target.zone-2.ext-dns-test-2.teapot.zalan.do").WithProviderSpecific(providerSpecificAlias, "true"),
|
|
endpoint.NewEndpoint("cname-test-elb.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "foo.eu-central-1.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("cname-test-elb-no-alias.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "foo.eu-central-1.elb.amazonaws.com").WithProviderSpecific(providerSpecificAlias, "false"),
|
|
endpoint.NewEndpoint("cname-test-elb-no-eth.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "foo.eu-central-1.elb.amazonaws.com").WithProviderSpecific(providerSpecificEvaluateTargetHealth, "false"), // eth = evaluate target health
|
|
endpoint.NewEndpoint("cname-test-elb-alias.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "foo.eu-central-1.elb.amazonaws.com").WithProviderSpecific(providerSpecificAlias, "true").WithProviderSpecific(providerSpecificEvaluateTargetHealth, "true"),
|
|
}
|
|
|
|
records, err := provider.AdjustEndpoints(records)
|
|
assert.NoError(t, err)
|
|
|
|
validateEndpoints(t, provider, records, []*endpoint.Endpoint{
|
|
endpoint.NewEndpoint("a-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.8.8"),
|
|
endpoint.NewEndpoint("cname-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "foo.example.com").WithProviderSpecific(providerSpecificAlias, "false"),
|
|
endpoint.NewEndpointWithTTL("cname-test-alias.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, 300, "alias-target.zone-2.ext-dns-test-2.teapot.zalan.do").WithProviderSpecific(providerSpecificAlias, "true").WithProviderSpecific(providerSpecificEvaluateTargetHealth, "true"),
|
|
endpoint.NewEndpoint("cname-test-elb.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "foo.eu-central-1.elb.amazonaws.com").WithProviderSpecific(providerSpecificAlias, "true").WithProviderSpecific(providerSpecificEvaluateTargetHealth, "true"),
|
|
endpoint.NewEndpoint("cname-test-elb-no-alias.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "foo.eu-central-1.elb.amazonaws.com").WithProviderSpecific(providerSpecificAlias, "false"),
|
|
endpoint.NewEndpoint("cname-test-elb-no-eth.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "foo.eu-central-1.elb.amazonaws.com").WithProviderSpecific(providerSpecificAlias, "true").WithProviderSpecific(providerSpecificEvaluateTargetHealth, "false"), // eth = evaluate target health
|
|
endpoint.NewEndpoint("cname-test-elb-alias.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "foo.eu-central-1.elb.amazonaws.com").WithProviderSpecific(providerSpecificAlias, "true").WithProviderSpecific(providerSpecificEvaluateTargetHealth, "true"),
|
|
})
|
|
}
|
|
|
|
func TestAWSApplyChanges(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
setup func(p *AWSProvider) context.Context
|
|
listRRSets int
|
|
}{
|
|
{"no cache", func(p *AWSProvider) context.Context { return context.Background() }, 0},
|
|
{"cached", func(p *AWSProvider) context.Context {
|
|
ctx := context.Background()
|
|
records, err := p.Records(ctx)
|
|
require.NoError(t, err)
|
|
return context.WithValue(ctx, provider.RecordsContextKey, records)
|
|
}, 0},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
provider, _ := newAWSProvider(t, endpoint.NewDomainFilter([]string{"ext-dns-test-2.teapot.zalan.do."}), provider.NewZoneIDFilter([]string{}), provider.NewZoneTypeFilter(""), defaultEvaluateTargetHealth, false, []*route53.ResourceRecordSet{
|
|
{
|
|
Name: aws.String("update-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("8.8.8.8")}},
|
|
},
|
|
{
|
|
Name: aws.String("delete-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("8.8.8.8")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("8.8.4.4")}},
|
|
},
|
|
{
|
|
Name: aws.String("delete-test.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("8.8.4.4")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test-a-to-cname.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.1.1.1")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test-alias-to-cname.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
AliasTarget: &route53.AliasTarget{
|
|
DNSName: aws.String("foo.eu-central-1.elb.amazonaws.com."),
|
|
EvaluateTargetHealth: aws.Bool(true),
|
|
HostedZoneId: aws.String("Z215JYRZR1TBD5"),
|
|
},
|
|
},
|
|
{
|
|
Name: aws.String("update-test-cname.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeCname),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("bar.elb.amazonaws.com")}},
|
|
},
|
|
{
|
|
Name: aws.String("delete-test-cname.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeCname),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("qux.elb.amazonaws.com")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test-cname-alias.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeCname),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("bar.elb.amazonaws.com")}},
|
|
},
|
|
{
|
|
Name: aws.String("delete-test-cname-alias.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeCname),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("qux.elb.amazonaws.com")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test-multiple.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("8.8.8.8")}, {Value: aws.String("8.8.4.4")}},
|
|
},
|
|
{
|
|
Name: aws.String("delete-test-multiple.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}, {Value: aws.String("4.3.2.1")}},
|
|
},
|
|
{
|
|
Name: aws.String("weighted-to-simple.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
SetIdentifier: aws.String("weighted-to-simple"),
|
|
Weight: aws.Int64(10),
|
|
},
|
|
{
|
|
Name: aws.String("simple-to-weighted.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
},
|
|
{
|
|
Name: aws.String("policy-change.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
SetIdentifier: aws.String("policy-change"),
|
|
Weight: aws.Int64(10),
|
|
},
|
|
{
|
|
Name: aws.String("set-identifier-change.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
SetIdentifier: aws.String("before"),
|
|
Weight: aws.Int64(10),
|
|
},
|
|
{
|
|
Name: aws.String("set-identifier-no-change.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
SetIdentifier: aws.String("no-change"),
|
|
Weight: aws.Int64(10),
|
|
},
|
|
{
|
|
Name: aws.String("update-test-mx.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeMx),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("10 mailhost2.bar.elb.amazonaws.com")}},
|
|
},
|
|
{
|
|
Name: aws.String("delete-test-mx.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeMx),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("30 mailhost1.foo.elb.amazonaws.com")}},
|
|
},
|
|
})
|
|
|
|
createRecords := []*endpoint.Endpoint{
|
|
endpoint.NewEndpoint("create-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.8.8"),
|
|
endpoint.NewEndpoint("create-test.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.4.4"),
|
|
endpoint.NewEndpoint("create-test-cname.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "foo.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("create-test-cname-alias.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "foo.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("create-test-multiple.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.8.8", "8.8.4.4"),
|
|
endpoint.NewEndpoint("create-test-mx.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeMX, "10 mailhost1.foo.elb.amazonaws.com"),
|
|
}
|
|
|
|
currentRecords := []*endpoint.Endpoint{
|
|
endpoint.NewEndpoint("update-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.8.8"),
|
|
endpoint.NewEndpoint("update-test.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.4.4"),
|
|
endpoint.NewEndpoint("update-test-a-to-cname.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.1.1.1"),
|
|
endpoint.NewEndpoint("update-test-alias-to-cname.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "foo.eu-central-1.elb.amazonaws.com").WithProviderSpecific(providerSpecificAlias, "true"),
|
|
endpoint.NewEndpoint("update-test-cname.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "bar.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("update-test-cname-alias.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "bar.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("update-test-multiple.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.8.8", "8.8.4.4"),
|
|
endpoint.NewEndpoint("weighted-to-simple.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.2.3.4").WithSetIdentifier("weighted-to-simple").WithProviderSpecific(providerSpecificWeight, "10"),
|
|
endpoint.NewEndpoint("simple-to-weighted.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.2.3.4"),
|
|
endpoint.NewEndpoint("policy-change.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.2.3.4").WithSetIdentifier("policy-change").WithProviderSpecific(providerSpecificWeight, "10"),
|
|
endpoint.NewEndpoint("set-identifier-change.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.2.3.4").WithSetIdentifier("before").WithProviderSpecific(providerSpecificWeight, "10"),
|
|
endpoint.NewEndpoint("set-identifier-no-change.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.2.3.4").WithSetIdentifier("no-change").WithProviderSpecific(providerSpecificWeight, "10"),
|
|
endpoint.NewEndpoint("update-test-mx.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeMX, "10 mailhost2.bar.elb.amazonaws.com"),
|
|
}
|
|
updatedRecords := []*endpoint.Endpoint{
|
|
endpoint.NewEndpoint("update-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.2.3.4"),
|
|
endpoint.NewEndpoint("update-test.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "4.3.2.1"),
|
|
endpoint.NewEndpoint("update-test-a-to-cname.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "foo.elb.amazonaws.com").WithProviderSpecific(providerSpecificAlias, "true"),
|
|
endpoint.NewEndpoint("update-test-alias-to-cname.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "my-internal-host.example.com"),
|
|
endpoint.NewEndpoint("update-test-cname.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "baz.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("update-test-cname-alias.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "baz.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("update-test-multiple.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.2.3.4", "4.3.2.1"),
|
|
endpoint.NewEndpoint("weighted-to-simple.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.2.3.4"),
|
|
endpoint.NewEndpoint("simple-to-weighted.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.2.3.4").WithSetIdentifier("simple-to-weighted").WithProviderSpecific(providerSpecificWeight, "10"),
|
|
endpoint.NewEndpoint("policy-change.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.2.3.4").WithSetIdentifier("policy-change").WithProviderSpecific(providerSpecificRegion, "us-east-1"),
|
|
endpoint.NewEndpoint("set-identifier-change.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.2.3.4").WithSetIdentifier("after").WithProviderSpecific(providerSpecificWeight, "10"),
|
|
endpoint.NewEndpoint("set-identifier-no-change.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.2.3.4").WithSetIdentifier("no-change").WithProviderSpecific(providerSpecificWeight, "20"),
|
|
endpoint.NewEndpoint("update-test-mx.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeMX, "20 mailhost3.foo.elb.amazonaws.com"),
|
|
}
|
|
|
|
deleteRecords := []*endpoint.Endpoint{
|
|
endpoint.NewEndpoint("delete-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.8.8"),
|
|
endpoint.NewEndpoint("delete-test.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.4.4"),
|
|
endpoint.NewEndpoint("delete-test-cname.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "qux.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("delete-test-cname-alias.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "qux.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("delete-test-multiple.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.2.3.4", "4.3.2.1"),
|
|
endpoint.NewEndpoint("delete-test-mx.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeMX, "30 mailhost1.foo.elb.amazonaws.com"),
|
|
}
|
|
|
|
changes := &plan.Changes{
|
|
Create: createRecords,
|
|
UpdateNew: updatedRecords,
|
|
UpdateOld: currentRecords,
|
|
Delete: deleteRecords,
|
|
}
|
|
|
|
ctx := tt.setup(provider)
|
|
|
|
provider.zonesCache = &zonesListCache{duration: 0 * time.Minute}
|
|
counter := NewRoute53APICounter(provider.client)
|
|
provider.client = counter
|
|
require.NoError(t, provider.ApplyChanges(ctx, changes))
|
|
|
|
assert.Equal(t, 1, counter.calls["ListHostedZonesPages"], tt.name)
|
|
assert.Equal(t, tt.listRRSets, counter.calls["ListResourceRecordSetsPages"], tt.name)
|
|
|
|
validateRecords(t, listAWSRecords(t, provider.client, "/hostedzone/zone-1.ext-dns-test-2.teapot.zalan.do."), []*route53.ResourceRecordSet{
|
|
{
|
|
Name: aws.String("create-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("8.8.8.8")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test-a-to-cname.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
AliasTarget: &route53.AliasTarget{
|
|
DNSName: aws.String("foo.elb.amazonaws.com."),
|
|
EvaluateTargetHealth: aws.Bool(true),
|
|
HostedZoneId: aws.String("zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
},
|
|
},
|
|
{
|
|
Name: aws.String("update-test-alias-to-cname.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeCname),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("my-internal-host.example.com")}},
|
|
},
|
|
{
|
|
Name: aws.String("create-test-cname.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeCname),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("foo.elb.amazonaws.com")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test-cname.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeCname),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("baz.elb.amazonaws.com")}},
|
|
},
|
|
{
|
|
Name: aws.String("create-test-cname-alias.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeCname),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("foo.elb.amazonaws.com")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test-cname-alias.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeCname),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("baz.elb.amazonaws.com")}},
|
|
},
|
|
{
|
|
Name: aws.String("weighted-to-simple.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
},
|
|
{
|
|
Name: aws.String("simple-to-weighted.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
SetIdentifier: aws.String("simple-to-weighted"),
|
|
Weight: aws.Int64(10),
|
|
},
|
|
{
|
|
Name: aws.String("policy-change.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
SetIdentifier: aws.String("policy-change"),
|
|
Region: aws.String("us-east-1"),
|
|
},
|
|
{
|
|
Name: aws.String("set-identifier-change.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
SetIdentifier: aws.String("after"),
|
|
Weight: aws.Int64(10),
|
|
},
|
|
{
|
|
Name: aws.String("set-identifier-no-change.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}},
|
|
SetIdentifier: aws.String("no-change"),
|
|
Weight: aws.Int64(20),
|
|
},
|
|
{
|
|
Name: aws.String("create-test-mx.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeMx),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("10 mailhost1.foo.elb.amazonaws.com")}},
|
|
},
|
|
})
|
|
validateRecords(t, listAWSRecords(t, provider.client, "/hostedzone/zone-2.ext-dns-test-2.teapot.zalan.do."), []*route53.ResourceRecordSet{
|
|
{
|
|
Name: aws.String("create-test.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("8.8.4.4")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("4.3.2.1")}},
|
|
},
|
|
{
|
|
Name: aws.String("create-test-multiple.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("8.8.8.8")}, {Value: aws.String("8.8.4.4")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test-multiple.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}, {Value: aws.String("4.3.2.1")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test-mx.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeMx),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("20 mailhost3.foo.elb.amazonaws.com")}},
|
|
},
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestAWSApplyChangesDryRun(t *testing.T) {
|
|
originalRecords := []*route53.ResourceRecordSet{
|
|
{
|
|
Name: aws.String("update-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("8.8.8.8")}},
|
|
},
|
|
{
|
|
Name: aws.String("delete-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("8.8.8.8")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("8.8.4.4")}},
|
|
},
|
|
{
|
|
Name: aws.String("delete-test.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("8.8.4.4")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test-a-to-cname.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.1.1.1")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test-cname.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeCname),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("bar.elb.amazonaws.com")}},
|
|
},
|
|
{
|
|
Name: aws.String("delete-test-cname.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeCname),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("qux.elb.amazonaws.com")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test-cname-alias.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeCname),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("bar.elb.amazonaws.com")}},
|
|
},
|
|
{
|
|
Name: aws.String("delete-test-cname-alias.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeCname),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("qux.elb.amazonaws.com")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test-multiple.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("8.8.8.8")}, {Value: aws.String("8.8.4.4")}},
|
|
},
|
|
{
|
|
Name: aws.String("delete-test-multiple.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("1.2.3.4")}, {Value: aws.String("4.3.2.1")}},
|
|
},
|
|
{
|
|
Name: aws.String("update-test-mx.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeMx),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("20 mail.foo.elb.amazonaws.com")}},
|
|
},
|
|
{
|
|
Name: aws.String("delete-test-mx.zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeMx),
|
|
TTL: aws.Int64(recordTTL),
|
|
ResourceRecords: []*route53.ResourceRecord{{Value: aws.String("10 mail.bar.elb.amazonaws.com")}},
|
|
},
|
|
}
|
|
|
|
provider, _ := newAWSProvider(t, endpoint.NewDomainFilter([]string{"ext-dns-test-2.teapot.zalan.do."}), provider.NewZoneIDFilter([]string{}), provider.NewZoneTypeFilter(""), defaultEvaluateTargetHealth, true, originalRecords)
|
|
|
|
createRecords := []*endpoint.Endpoint{
|
|
endpoint.NewEndpoint("create-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.8.8"),
|
|
endpoint.NewEndpoint("create-test.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.4.4"),
|
|
endpoint.NewEndpoint("create-test-cname.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "foo.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("create-test-cname-alias.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "foo.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("create-test-multiple.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.8.8", "8.8.4.4"),
|
|
endpoint.NewEndpoint("create-test-mx.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeMX, "30 mail.foo.elb.amazonaws.com"),
|
|
}
|
|
|
|
currentRecords := []*endpoint.Endpoint{
|
|
endpoint.NewEndpoint("update-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.8.8"),
|
|
endpoint.NewEndpoint("update-test.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.4.4"),
|
|
endpoint.NewEndpoint("update-test-a-to-cname.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.1.1.1"),
|
|
endpoint.NewEndpoint("update-test-cname.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "bar.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("update-test-cname-alias.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "bar.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("update-test-multiple.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.8.8", "8.8.4.4"),
|
|
endpoint.NewEndpoint("update-test-mx.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeMX, "20 mail.foo.elb.amazonaws.com"),
|
|
}
|
|
updatedRecords := []*endpoint.Endpoint{
|
|
endpoint.NewEndpoint("update-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.2.3.4"),
|
|
endpoint.NewEndpoint("update-test.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "4.3.2.1"),
|
|
endpoint.NewEndpoint("update-test-a-to-cname.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "foo.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("update-test-cname.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "baz.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("update-test-cname-alias.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "baz.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("update-test-multiple.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.2.3.4", "4.3.2.1"),
|
|
endpoint.NewEndpoint("update-test-mx.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeMX, "10 mail.bar.elb.amazonaws.com"),
|
|
}
|
|
|
|
deleteRecords := []*endpoint.Endpoint{
|
|
endpoint.NewEndpoint("delete-test.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.8.8"),
|
|
endpoint.NewEndpoint("delete-test.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "8.8.4.4"),
|
|
endpoint.NewEndpoint("delete-test-cname.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "qux.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("delete-test-cname-alias.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeCNAME, "qux.elb.amazonaws.com"),
|
|
endpoint.NewEndpoint("delete-test-multiple.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, "1.2.3.4", "4.3.2.1"),
|
|
endpoint.NewEndpoint("delete-test-mx.zone-2.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeMX, "10 mail.bar.elb.amazonaws.com"),
|
|
}
|
|
|
|
changes := &plan.Changes{
|
|
Create: createRecords,
|
|
UpdateNew: updatedRecords,
|
|
UpdateOld: currentRecords,
|
|
Delete: deleteRecords,
|
|
}
|
|
|
|
ctx := context.Background()
|
|
|
|
require.NoError(t, provider.ApplyChanges(ctx, changes))
|
|
|
|
validateRecords(t,
|
|
append(
|
|
listAWSRecords(t, provider.client, "/hostedzone/zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
listAWSRecords(t, provider.client, "/hostedzone/zone-2.ext-dns-test-2.teapot.zalan.do.")...),
|
|
originalRecords)
|
|
}
|
|
|
|
func TestAWSChangesByZones(t *testing.T) {
|
|
changes := Route53Changes{
|
|
{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionCreate),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String("qux.foo.example.org"), TTL: aws.Int64(1),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionCreate),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String("qux.bar.example.org"), TTL: aws.Int64(2),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionDelete),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String("wambo.foo.example.org"), TTL: aws.Int64(10),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionDelete),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String("wambo.bar.example.org"), TTL: aws.Int64(20),
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
zones := map[string]*route53.HostedZone{
|
|
"foo-example-org": {
|
|
Id: aws.String("foo-example-org"),
|
|
Name: aws.String("foo.example.org."),
|
|
},
|
|
"bar-example-org": {
|
|
Id: aws.String("bar-example-org"),
|
|
Name: aws.String("bar.example.org."),
|
|
},
|
|
"bar-example-org-private": {
|
|
Id: aws.String("bar-example-org-private"),
|
|
Name: aws.String("bar.example.org."),
|
|
Config: &route53.HostedZoneConfig{PrivateZone: aws.Bool(true)},
|
|
},
|
|
"baz-example-org": {
|
|
Id: aws.String("baz-example-org"),
|
|
Name: aws.String("baz.example.org."),
|
|
},
|
|
}
|
|
|
|
changesByZone := changesByZone(zones, changes)
|
|
require.Len(t, changesByZone, 3)
|
|
|
|
validateAWSChangeRecords(t, changesByZone["foo-example-org"], Route53Changes{
|
|
{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionCreate),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String("qux.foo.example.org"), TTL: aws.Int64(1),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionDelete),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String("wambo.foo.example.org"), TTL: aws.Int64(10),
|
|
},
|
|
},
|
|
},
|
|
})
|
|
|
|
validateAWSChangeRecords(t, changesByZone["bar-example-org"], Route53Changes{
|
|
{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionCreate),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String("qux.bar.example.org"), TTL: aws.Int64(2),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionDelete),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String("wambo.bar.example.org"), TTL: aws.Int64(20),
|
|
},
|
|
},
|
|
},
|
|
})
|
|
|
|
validateAWSChangeRecords(t, changesByZone["bar-example-org-private"], Route53Changes{
|
|
{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionCreate),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String("qux.bar.example.org"), TTL: aws.Int64(2),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionDelete),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String("wambo.bar.example.org"), TTL: aws.Int64(20),
|
|
},
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
func TestAWSsubmitChanges(t *testing.T) {
|
|
provider, _ := newAWSProvider(t, endpoint.NewDomainFilter([]string{"ext-dns-test-2.teapot.zalan.do."}), provider.NewZoneIDFilter([]string{}), provider.NewZoneTypeFilter(""), defaultEvaluateTargetHealth, false, nil)
|
|
const subnets = 16
|
|
const hosts = defaultBatchChangeSize / subnets
|
|
|
|
endpoints := make([]*endpoint.Endpoint, 0)
|
|
for i := 0; i < subnets; i++ {
|
|
for j := 1; j < (hosts + 1); j++ {
|
|
hostname := fmt.Sprintf("subnet%dhost%d.zone-1.ext-dns-test-2.teapot.zalan.do", i, j)
|
|
ip := fmt.Sprintf("1.1.%d.%d", i, j)
|
|
ep := endpoint.NewEndpointWithTTL(hostname, endpoint.RecordTypeA, endpoint.TTL(recordTTL), ip)
|
|
endpoints = append(endpoints, ep)
|
|
}
|
|
}
|
|
|
|
ctx := context.Background()
|
|
zones, _ := provider.Zones(ctx)
|
|
records, _ := provider.Records(ctx)
|
|
cs := make(Route53Changes, 0, len(endpoints))
|
|
cs = append(cs, provider.newChanges(route53.ChangeActionCreate, endpoints)...)
|
|
|
|
require.NoError(t, provider.submitChanges(ctx, cs, zones))
|
|
|
|
records, err := provider.Records(ctx)
|
|
require.NoError(t, err)
|
|
|
|
validateEndpoints(t, provider, records, endpoints)
|
|
}
|
|
|
|
func TestAWSsubmitChangesError(t *testing.T) {
|
|
provider, clientStub := newAWSProvider(t, endpoint.NewDomainFilter([]string{"ext-dns-test-2.teapot.zalan.do."}), provider.NewZoneIDFilter([]string{}), provider.NewZoneTypeFilter(""), defaultEvaluateTargetHealth, false, nil)
|
|
clientStub.MockMethod("ChangeResourceRecordSets", mock.Anything).Return(nil, fmt.Errorf("Mock route53 failure"))
|
|
|
|
ctx := context.Background()
|
|
zones, err := provider.Zones(ctx)
|
|
require.NoError(t, err)
|
|
|
|
ep := endpoint.NewEndpointWithTTL("fail.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "1.0.0.1")
|
|
cs := provider.newChanges(route53.ChangeActionCreate, []*endpoint.Endpoint{ep})
|
|
|
|
require.Error(t, provider.submitChanges(ctx, cs, zones))
|
|
}
|
|
|
|
func TestAWSsubmitChangesRetryOnError(t *testing.T) {
|
|
provider, clientStub := newAWSProvider(t, endpoint.NewDomainFilter([]string{"ext-dns-test-2.teapot.zalan.do."}), provider.NewZoneIDFilter([]string{}), provider.NewZoneTypeFilter(""), defaultEvaluateTargetHealth, false, nil)
|
|
|
|
ctx := context.Background()
|
|
zones, err := provider.Zones(ctx)
|
|
require.NoError(t, err)
|
|
|
|
ep1 := endpoint.NewEndpointWithTTL("success.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "1.0.0.1")
|
|
ep2 := endpoint.NewEndpointWithTTL("fail.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "1.0.0.2")
|
|
ep3 := endpoint.NewEndpointWithTTL("success2.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "1.0.0.3")
|
|
|
|
ep2txt := endpoint.NewEndpointWithTTL("fail__edns_housekeeping.zone-1.ext-dns-test-2.teapot.zalan.do", endpoint.RecordTypeTXT, endpoint.TTL(recordTTL), "something") // "__edns_housekeeping" is the TXT suffix
|
|
ep2txt.Labels = map[string]string{
|
|
endpoint.OwnedRecordLabelKey: "fail.zone-1.ext-dns-test-2.teapot.zalan.do",
|
|
}
|
|
|
|
// "success" and "fail" are created in the first step, both are submitted in the same batch; this should fail
|
|
cs1 := provider.newChanges(route53.ChangeActionCreate, []*endpoint.Endpoint{ep2, ep2txt, ep1})
|
|
input1 := &route53.ChangeResourceRecordSetsInput{
|
|
HostedZoneId: aws.String("/hostedzone/zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
ChangeBatch: &route53.ChangeBatch{
|
|
Changes: cs1.Route53Changes(),
|
|
},
|
|
}
|
|
clientStub.MockMethod("ChangeResourceRecordSets", input1).Return(nil, fmt.Errorf("Mock route53 failure"))
|
|
|
|
// because of the failure, changes will be retried one by one; make "fail" submitted in its own batch fail as well
|
|
cs2 := provider.newChanges(route53.ChangeActionCreate, []*endpoint.Endpoint{ep2, ep2txt})
|
|
input2 := &route53.ChangeResourceRecordSetsInput{
|
|
HostedZoneId: aws.String("/hostedzone/zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
ChangeBatch: &route53.ChangeBatch{
|
|
Changes: cs2.Route53Changes(),
|
|
},
|
|
}
|
|
clientStub.MockMethod("ChangeResourceRecordSets", input2).Return(nil, fmt.Errorf("Mock route53 failure"))
|
|
|
|
// "success" should have been created, verify that we still get an error because "fail" failed
|
|
require.Error(t, provider.submitChanges(ctx, cs1, zones))
|
|
|
|
// assert that "success" was successfully created and "fail" and its TXT record were not
|
|
records, err := provider.Records(ctx)
|
|
require.NoError(t, err)
|
|
require.True(t, containsRecordWithDNSName(records, "success.zone-1.ext-dns-test-2.teapot.zalan.do"))
|
|
require.False(t, containsRecordWithDNSName(records, "fail.zone-1.ext-dns-test-2.teapot.zalan.do"))
|
|
require.False(t, containsRecordWithDNSName(records, "fail__edns_housekeeping.zone-1.ext-dns-test-2.teapot.zalan.do"))
|
|
|
|
// next batch should contain "fail" and "success2", should succeed this time
|
|
cs3 := provider.newChanges(route53.ChangeActionCreate, []*endpoint.Endpoint{ep2, ep2txt, ep3})
|
|
require.NoError(t, provider.submitChanges(ctx, cs3, zones))
|
|
|
|
// verify all records are there
|
|
records, err = provider.Records(ctx)
|
|
require.NoError(t, err)
|
|
require.True(t, containsRecordWithDNSName(records, "success.zone-1.ext-dns-test-2.teapot.zalan.do"))
|
|
require.True(t, containsRecordWithDNSName(records, "fail.zone-1.ext-dns-test-2.teapot.zalan.do"))
|
|
require.True(t, containsRecordWithDNSName(records, "success2.zone-1.ext-dns-test-2.teapot.zalan.do"))
|
|
require.True(t, containsRecordWithDNSName(records, "fail__edns_housekeeping.zone-1.ext-dns-test-2.teapot.zalan.do"))
|
|
}
|
|
|
|
func TestAWSBatchChangeSet(t *testing.T) {
|
|
var cs Route53Changes
|
|
|
|
for i := 1; i <= defaultBatchChangeSize; i += 2 {
|
|
cs = append(cs, &Route53Change{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionCreate),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String(fmt.Sprintf("host-%d", i)),
|
|
Type: aws.String("A"),
|
|
},
|
|
},
|
|
})
|
|
cs = append(cs, &Route53Change{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionCreate),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String(fmt.Sprintf("host-%d", i)),
|
|
Type: aws.String("TXT"),
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
batchCs := batchChangeSet(cs, defaultBatchChangeSize, defaultBatchChangeSizeBytes, defaultBatchChangeSizeValues)
|
|
|
|
require.Equal(t, 1, len(batchCs))
|
|
|
|
// sorting cs not needed as it should be returned as is
|
|
validateAWSChangeRecords(t, batchCs[0], cs)
|
|
}
|
|
|
|
func TestAWSBatchChangeSetExceeding(t *testing.T) {
|
|
var cs Route53Changes
|
|
const testCount = 50
|
|
const testLimit = 11
|
|
const expectedBatchCount = 5
|
|
const expectedChangesCount = 10
|
|
|
|
for i := 1; i <= testCount; i += 2 {
|
|
cs = append(cs,
|
|
&Route53Change{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionCreate),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String(fmt.Sprintf("host-%d", i)),
|
|
Type: aws.String("A"),
|
|
},
|
|
},
|
|
},
|
|
&Route53Change{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionCreate),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String(fmt.Sprintf("host-%d", i)),
|
|
Type: aws.String("TXT"),
|
|
},
|
|
},
|
|
},
|
|
)
|
|
}
|
|
|
|
batchCs := batchChangeSet(cs, testLimit, defaultBatchChangeSizeBytes, defaultBatchChangeSizeValues)
|
|
|
|
require.Equal(t, expectedBatchCount, len(batchCs))
|
|
|
|
// sorting cs needed to match batchCs
|
|
for i, batch := range batchCs {
|
|
validateAWSChangeRecords(t, batch, sortChangesByActionNameType(cs)[i*expectedChangesCount:expectedChangesCount*(i+1)])
|
|
}
|
|
}
|
|
|
|
func TestAWSBatchChangeSetExceedingNameChange(t *testing.T) {
|
|
var cs Route53Changes
|
|
const testCount = 10
|
|
const testLimit = 1
|
|
|
|
for i := 1; i <= testCount; i += 2 {
|
|
cs = append(cs,
|
|
&Route53Change{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionCreate),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String(fmt.Sprintf("host-%d", i)),
|
|
Type: aws.String("A"),
|
|
},
|
|
},
|
|
},
|
|
&Route53Change{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionCreate),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String(fmt.Sprintf("host-%d", i)),
|
|
Type: aws.String("TXT"),
|
|
},
|
|
},
|
|
},
|
|
)
|
|
}
|
|
|
|
batchCs := batchChangeSet(cs, testLimit, defaultBatchChangeSizeBytes, defaultBatchChangeSizeValues)
|
|
|
|
require.Equal(t, 0, len(batchCs))
|
|
}
|
|
|
|
func TestAWSBatchChangeSetExceedingBytesLimit(t *testing.T) {
|
|
const (
|
|
testCount = 50
|
|
testLimit = 100
|
|
groupSize = 2
|
|
)
|
|
|
|
var (
|
|
cs Route53Changes
|
|
// Bytes for each name
|
|
testBytes = len([]byte("1.2.3.4")) + len([]byte("test-record"))
|
|
// testCount / groupSize / (testLimit // bytes)
|
|
expectedBatchCountFloat = float64(testCount) / float64(groupSize) / float64(testLimit/testBytes)
|
|
// Round up
|
|
expectedBatchCount = int(math.Ceil(expectedBatchCountFloat))
|
|
)
|
|
|
|
for i := 1; i <= testCount; i += groupSize {
|
|
cs = append(cs,
|
|
&Route53Change{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionCreate),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String(fmt.Sprintf("host-%d", i)),
|
|
Type: aws.String("A"),
|
|
ResourceRecords: []*route53.ResourceRecord{
|
|
{
|
|
Value: aws.String("1.2.3.4"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
sizeBytes: len([]byte("1.2.3.4")),
|
|
sizeValues: 1,
|
|
},
|
|
&Route53Change{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionCreate),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String(fmt.Sprintf("host-%d", i)),
|
|
Type: aws.String("TXT"),
|
|
ResourceRecords: []*route53.ResourceRecord{
|
|
{
|
|
Value: aws.String("txt-record"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
sizeBytes: len([]byte("txt-record")),
|
|
sizeValues: 1,
|
|
},
|
|
)
|
|
}
|
|
|
|
batchCs := batchChangeSet(cs, defaultBatchChangeSize, testLimit, defaultBatchChangeSizeValues)
|
|
|
|
require.Equal(t, expectedBatchCount, len(batchCs))
|
|
}
|
|
|
|
func TestAWSBatchChangeSetExceedingBytesLimitUpsert(t *testing.T) {
|
|
const (
|
|
testCount = 50
|
|
testLimit = 100
|
|
groupSize = 2
|
|
)
|
|
|
|
var (
|
|
cs Route53Changes
|
|
// Bytes for each name multiplied by 2 for Upsert records
|
|
testBytes = (len([]byte("1.2.3.4")) + len([]byte("test-record"))) * 2
|
|
// testCount / groupSize / (testLimit // bytes)
|
|
expectedBatchCountFloat = float64(testCount) / float64(groupSize) / float64(testLimit/testBytes)
|
|
// Round up
|
|
expectedBatchCount = int(math.Ceil(expectedBatchCountFloat))
|
|
)
|
|
|
|
for i := 1; i <= testCount; i += groupSize {
|
|
cs = append(cs,
|
|
&Route53Change{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionUpsert),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String(fmt.Sprintf("host-%d", i)),
|
|
Type: aws.String("A"),
|
|
ResourceRecords: []*route53.ResourceRecord{
|
|
{
|
|
Value: aws.String("1.2.3.4"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
sizeBytes: len([]byte("1.2.3.4")) * 2,
|
|
sizeValues: 1,
|
|
},
|
|
&Route53Change{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionUpsert),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String(fmt.Sprintf("host-%d", i)),
|
|
Type: aws.String("TXT"),
|
|
ResourceRecords: []*route53.ResourceRecord{
|
|
{
|
|
Value: aws.String("txt-record"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
sizeBytes: len([]byte("txt-record")) * 2,
|
|
sizeValues: 1,
|
|
},
|
|
)
|
|
}
|
|
|
|
batchCs := batchChangeSet(cs, defaultBatchChangeSize, testLimit, defaultBatchChangeSizeValues)
|
|
|
|
require.Equal(t, expectedBatchCount, len(batchCs))
|
|
}
|
|
|
|
func TestAWSBatchChangeSetExceedingValuesLimit(t *testing.T) {
|
|
const (
|
|
testCount = 50
|
|
testLimit = 100
|
|
groupSize = 2
|
|
// Values for each group
|
|
testValues = 2
|
|
)
|
|
|
|
var (
|
|
cs Route53Changes
|
|
// testCount / groupSize / (testLimit // bytes)
|
|
expectedBatchCountFloat = float64(testCount) / float64(groupSize) / float64(testLimit/testValues)
|
|
// Round up
|
|
expectedBatchCount = int(math.Ceil(expectedBatchCountFloat))
|
|
)
|
|
|
|
for i := 1; i <= testCount; i += groupSize {
|
|
cs = append(cs,
|
|
&Route53Change{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionCreate),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String(fmt.Sprintf("host-%d", i)),
|
|
Type: aws.String("A"),
|
|
ResourceRecords: []*route53.ResourceRecord{
|
|
{
|
|
Value: aws.String("1.2.3.4"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
sizeBytes: len([]byte("1.2.3.4")),
|
|
sizeValues: 1,
|
|
},
|
|
&Route53Change{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionCreate),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String(fmt.Sprintf("host-%d", i)),
|
|
Type: aws.String("TXT"),
|
|
ResourceRecords: []*route53.ResourceRecord{
|
|
{
|
|
Value: aws.String("txt-record"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
sizeBytes: len([]byte("txt-record")),
|
|
sizeValues: 1,
|
|
},
|
|
)
|
|
}
|
|
|
|
batchCs := batchChangeSet(cs, defaultBatchChangeSize, defaultBatchChangeSizeBytes, testLimit)
|
|
|
|
require.Equal(t, expectedBatchCount, len(batchCs))
|
|
}
|
|
|
|
func TestAWSBatchChangeSetExceedingValuesLimitUpsert(t *testing.T) {
|
|
const (
|
|
testCount = 50
|
|
testLimit = 100
|
|
groupSize = 2
|
|
// Values for each group multiplied by 2 for Upsert records
|
|
testValues = 2 * 2
|
|
)
|
|
|
|
var (
|
|
cs Route53Changes
|
|
// testCount / groupSize / (testLimit // bytes)
|
|
expectedBatchCountFloat = float64(testCount) / float64(groupSize) / float64(testLimit/testValues)
|
|
// Round up
|
|
expectedBatchCount = int(math.Ceil(expectedBatchCountFloat))
|
|
)
|
|
|
|
for i := 1; i <= testCount; i += groupSize {
|
|
cs = append(cs,
|
|
&Route53Change{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionUpsert),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String(fmt.Sprintf("host-%d", i)),
|
|
Type: aws.String("A"),
|
|
ResourceRecords: []*route53.ResourceRecord{
|
|
{
|
|
Value: aws.String("1.2.3.4"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
sizeBytes: len([]byte("1.2.3.4")) * 2,
|
|
sizeValues: 1,
|
|
},
|
|
&Route53Change{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionUpsert),
|
|
ResourceRecordSet: &route53.ResourceRecordSet{
|
|
Name: aws.String(fmt.Sprintf("host-%d", i)),
|
|
Type: aws.String("TXT"),
|
|
ResourceRecords: []*route53.ResourceRecord{
|
|
{
|
|
Value: aws.String("txt-record"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
sizeBytes: len([]byte("txt-record")) * 2,
|
|
sizeValues: 1,
|
|
},
|
|
)
|
|
}
|
|
|
|
batchCs := batchChangeSet(cs, defaultBatchChangeSize, defaultBatchChangeSizeBytes, testLimit)
|
|
|
|
require.Equal(t, expectedBatchCount, len(batchCs))
|
|
}
|
|
|
|
func validateEndpoints(t *testing.T, provider *AWSProvider, endpoints []*endpoint.Endpoint, expected []*endpoint.Endpoint) {
|
|
assert.True(t, testutils.SameEndpoints(endpoints, expected), "actual and expected endpoints don't match. %+v:%+v", endpoints, expected)
|
|
|
|
normalized, err := provider.AdjustEndpoints(endpoints)
|
|
assert.NoError(t, err)
|
|
assert.True(t, testutils.SameEndpoints(normalized, expected), "actual and normalized endpoints don't match. %+v:%+v", endpoints, normalized)
|
|
}
|
|
|
|
func validateAWSZones(t *testing.T, zones map[string]*route53.HostedZone, expected map[string]*route53.HostedZone) {
|
|
require.Len(t, zones, len(expected))
|
|
|
|
for i, zone := range zones {
|
|
validateAWSZone(t, zone, expected[i])
|
|
}
|
|
}
|
|
|
|
func validateAWSZone(t *testing.T, zone *route53.HostedZone, expected *route53.HostedZone) {
|
|
assert.Equal(t, aws.StringValue(expected.Id), aws.StringValue(zone.Id))
|
|
assert.Equal(t, aws.StringValue(expected.Name), aws.StringValue(zone.Name))
|
|
}
|
|
|
|
func validateAWSChangeRecords(t *testing.T, records Route53Changes, expected Route53Changes) {
|
|
require.Len(t, records, len(expected))
|
|
|
|
for i := range records {
|
|
validateAWSChangeRecord(t, records[i], expected[i])
|
|
}
|
|
}
|
|
|
|
func validateAWSChangeRecord(t *testing.T, record *Route53Change, expected *Route53Change) {
|
|
assert.Equal(t, aws.StringValue(expected.Action), aws.StringValue(record.Action))
|
|
assert.Equal(t, aws.StringValue(expected.ResourceRecordSet.Name), aws.StringValue(record.ResourceRecordSet.Name))
|
|
assert.Equal(t, aws.StringValue(expected.ResourceRecordSet.Type), aws.StringValue(record.ResourceRecordSet.Type))
|
|
}
|
|
|
|
func TestAWSCreateRecordsWithCNAME(t *testing.T) {
|
|
provider, _ := newAWSProvider(t, endpoint.NewDomainFilter([]string{"ext-dns-test-2.teapot.zalan.do."}), provider.NewZoneIDFilter([]string{}), provider.NewZoneTypeFilter(""), defaultEvaluateTargetHealth, false, nil)
|
|
|
|
records := []*endpoint.Endpoint{
|
|
{DNSName: "create-test.zone-1.ext-dns-test-2.teapot.zalan.do", Targets: endpoint.Targets{"foo.example.org"}, RecordType: endpoint.RecordTypeCNAME},
|
|
}
|
|
|
|
adjusted, err := provider.AdjustEndpoints(records)
|
|
require.NoError(t, err)
|
|
require.NoError(t, provider.ApplyChanges(context.Background(), &plan.Changes{
|
|
Create: adjusted,
|
|
}))
|
|
|
|
recordSets := listAWSRecords(t, provider.client, "/hostedzone/zone-1.ext-dns-test-2.teapot.zalan.do.")
|
|
|
|
validateRecords(t, recordSets, []*route53.ResourceRecordSet{
|
|
{
|
|
Name: aws.String("create-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(endpoint.RecordTypeCNAME),
|
|
TTL: aws.Int64(300),
|
|
ResourceRecords: []*route53.ResourceRecord{
|
|
{
|
|
Value: aws.String("foo.example.org"),
|
|
},
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
func TestAWSCreateRecordsWithALIAS(t *testing.T) {
|
|
for key, evaluateTargetHealth := range map[string]bool{
|
|
"true": true,
|
|
"false": false,
|
|
"": false,
|
|
} {
|
|
provider, _ := newAWSProvider(t, endpoint.NewDomainFilter([]string{"ext-dns-test-2.teapot.zalan.do."}), provider.NewZoneIDFilter([]string{}), provider.NewZoneTypeFilter(""), defaultEvaluateTargetHealth, false, nil)
|
|
|
|
// Test dualstack and ipv4 load balancer targets
|
|
records := []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "create-test.zone-1.ext-dns-test-2.teapot.zalan.do",
|
|
Targets: endpoint.Targets{"foo.eu-central-1.elb.amazonaws.com"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
ProviderSpecific: endpoint.ProviderSpecific{
|
|
endpoint.ProviderSpecificProperty{
|
|
Name: providerSpecificAlias,
|
|
Value: "true",
|
|
},
|
|
endpoint.ProviderSpecificProperty{
|
|
Name: providerSpecificEvaluateTargetHealth,
|
|
Value: key,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
DNSName: "create-test-dualstack.zone-1.ext-dns-test-2.teapot.zalan.do",
|
|
Targets: endpoint.Targets{"bar.eu-central-1.elb.amazonaws.com"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
ProviderSpecific: endpoint.ProviderSpecific{
|
|
endpoint.ProviderSpecificProperty{
|
|
Name: providerSpecificAlias,
|
|
Value: "true",
|
|
},
|
|
endpoint.ProviderSpecificProperty{
|
|
Name: providerSpecificEvaluateTargetHealth,
|
|
Value: key,
|
|
},
|
|
},
|
|
Labels: map[string]string{endpoint.DualstackLabelKey: "true"},
|
|
},
|
|
}
|
|
adjusted, err := provider.AdjustEndpoints(records)
|
|
require.NoError(t, err)
|
|
require.NoError(t, provider.ApplyChanges(context.Background(), &plan.Changes{
|
|
Create: adjusted,
|
|
}))
|
|
|
|
recordSets := listAWSRecords(t, provider.client, "/hostedzone/zone-1.ext-dns-test-2.teapot.zalan.do.")
|
|
|
|
validateRecords(t, recordSets, []*route53.ResourceRecordSet{
|
|
{
|
|
AliasTarget: &route53.AliasTarget{
|
|
DNSName: aws.String("foo.eu-central-1.elb.amazonaws.com."),
|
|
EvaluateTargetHealth: aws.Bool(evaluateTargetHealth),
|
|
HostedZoneId: aws.String("Z215JYRZR1TBD5"),
|
|
},
|
|
Name: aws.String("create-test.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
},
|
|
{
|
|
AliasTarget: &route53.AliasTarget{
|
|
DNSName: aws.String("bar.eu-central-1.elb.amazonaws.com."),
|
|
EvaluateTargetHealth: aws.Bool(evaluateTargetHealth),
|
|
HostedZoneId: aws.String("Z215JYRZR1TBD5"),
|
|
},
|
|
Name: aws.String("create-test-dualstack.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeA),
|
|
},
|
|
{
|
|
AliasTarget: &route53.AliasTarget{
|
|
DNSName: aws.String("bar.eu-central-1.elb.amazonaws.com."),
|
|
EvaluateTargetHealth: aws.Bool(evaluateTargetHealth),
|
|
HostedZoneId: aws.String("Z215JYRZR1TBD5"),
|
|
},
|
|
Name: aws.String("create-test-dualstack.zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Type: aws.String(route53.RRTypeAaaa),
|
|
},
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestAWSisLoadBalancer(t *testing.T) {
|
|
for _, tc := range []struct {
|
|
target string
|
|
recordType string
|
|
preferCNAME bool
|
|
expected bool
|
|
}{
|
|
{"bar.eu-central-1.elb.amazonaws.com", endpoint.RecordTypeCNAME, false, true},
|
|
{"bar.eu-central-1.elb.amazonaws.com", endpoint.RecordTypeCNAME, true, false},
|
|
{"foo.example.org", endpoint.RecordTypeCNAME, false, false},
|
|
{"foo.example.org", endpoint.RecordTypeCNAME, true, false},
|
|
} {
|
|
ep := &endpoint.Endpoint{
|
|
Targets: endpoint.Targets{tc.target},
|
|
RecordType: tc.recordType,
|
|
}
|
|
assert.Equal(t, tc.expected, useAlias(ep, tc.preferCNAME))
|
|
}
|
|
}
|
|
|
|
func TestAWSisAWSAlias(t *testing.T) {
|
|
for _, tc := range []struct {
|
|
target string
|
|
recordType string
|
|
alias bool
|
|
hz string
|
|
}{
|
|
{"foo.example.org", endpoint.RecordTypeA, false, ""}, // normal A record
|
|
{"bar.eu-central-1.elb.amazonaws.com", endpoint.RecordTypeA, true, "Z215JYRZR1TBD5"}, // pointing to ELB DNS name
|
|
{"foobar.example.org", endpoint.RecordTypeA, true, "Z1234567890ABC"}, // HZID retrieved by Route53
|
|
{"baz.example.org", endpoint.RecordTypeA, true, sameZoneAlias}, // record to be created
|
|
} {
|
|
ep := &endpoint.Endpoint{
|
|
Targets: endpoint.Targets{tc.target},
|
|
RecordType: tc.recordType,
|
|
}
|
|
if tc.alias {
|
|
ep = ep.WithProviderSpecific(providerSpecificAlias, "true")
|
|
ep = ep.WithProviderSpecific(providerSpecificTargetHostedZone, tc.hz)
|
|
}
|
|
assert.Equal(t, tc.hz, isAWSAlias(ep), "%v", tc)
|
|
}
|
|
}
|
|
|
|
func TestAWSCanonicalHostedZone(t *testing.T) {
|
|
for suffix, id := range canonicalHostedZones {
|
|
zone := canonicalHostedZone(fmt.Sprintf("foo.%s", suffix))
|
|
assert.Equal(t, id, zone)
|
|
}
|
|
|
|
zone := canonicalHostedZone("foo.example.org")
|
|
assert.Equal(t, "", zone, "no canonical zone should be returned for a non-aws hostname")
|
|
}
|
|
|
|
func TestAWSSuitableZones(t *testing.T) {
|
|
zones := map[string]*route53.HostedZone{
|
|
// Public domain
|
|
"example-org": {Id: aws.String("example-org"), Name: aws.String("example.org.")},
|
|
// Public subdomain
|
|
"bar-example-org": {Id: aws.String("bar-example-org"), Name: aws.String("bar.example.org."), Config: &route53.HostedZoneConfig{PrivateZone: aws.Bool(false)}},
|
|
// Public subdomain
|
|
"longfoo-bar-example-org": {Id: aws.String("longfoo-bar-example-org"), Name: aws.String("longfoo.bar.example.org.")},
|
|
// Private domain
|
|
"example-org-private": {Id: aws.String("example-org-private"), Name: aws.String("example.org."), Config: &route53.HostedZoneConfig{PrivateZone: aws.Bool(true)}},
|
|
// Private subdomain
|
|
"bar-example-org-private": {Id: aws.String("bar-example-org-private"), Name: aws.String("bar.example.org."), Config: &route53.HostedZoneConfig{PrivateZone: aws.Bool(true)}},
|
|
}
|
|
|
|
for _, tc := range []struct {
|
|
hostname string
|
|
expected []*route53.HostedZone
|
|
}{
|
|
// bar.example.org is NOT suitable
|
|
{"foobar.example.org.", []*route53.HostedZone{zones["example-org-private"], zones["example-org"]}},
|
|
|
|
// all matching private zones are suitable
|
|
// https://github.com/kubernetes-sigs/external-dns/pull/356
|
|
{"bar.example.org.", []*route53.HostedZone{zones["example-org-private"], zones["bar-example-org-private"], zones["bar-example-org"]}},
|
|
|
|
{"foo.bar.example.org.", []*route53.HostedZone{zones["example-org-private"], zones["bar-example-org-private"], zones["bar-example-org"]}},
|
|
{"foo.example.org.", []*route53.HostedZone{zones["example-org-private"], zones["example-org"]}},
|
|
{"foo.kubernetes.io.", nil},
|
|
} {
|
|
suitableZones := suitableZones(tc.hostname, zones)
|
|
sort.Slice(suitableZones, func(i, j int) bool {
|
|
return *suitableZones[i].Id < *suitableZones[j].Id
|
|
})
|
|
sort.Slice(tc.expected, func(i, j int) bool {
|
|
return *tc.expected[i].Id < *tc.expected[j].Id
|
|
})
|
|
assert.Equal(t, tc.expected, suitableZones)
|
|
}
|
|
}
|
|
|
|
func createAWSZone(t *testing.T, provider *AWSProvider, zone *route53.HostedZone) {
|
|
params := &route53.CreateHostedZoneInput{
|
|
CallerReference: aws.String("external-dns.alpha.kubernetes.io/test-zone"),
|
|
Name: zone.Name,
|
|
HostedZoneConfig: zone.Config,
|
|
}
|
|
|
|
if _, err := provider.client.CreateHostedZoneWithContext(context.Background(), params); err != nil {
|
|
require.EqualError(t, err, route53.ErrCodeHostedZoneAlreadyExists)
|
|
}
|
|
}
|
|
|
|
func setAWSRecords(t *testing.T, provider *AWSProvider, records []*route53.ResourceRecordSet) {
|
|
dryRun := provider.dryRun
|
|
provider.dryRun = false
|
|
defer func() {
|
|
provider.dryRun = dryRun
|
|
}()
|
|
|
|
ctx := context.Background()
|
|
endpoints, err := provider.Records(ctx)
|
|
require.NoError(t, err)
|
|
|
|
validateEndpoints(t, provider, endpoints, []*endpoint.Endpoint{})
|
|
|
|
var changes Route53Changes
|
|
for _, record := range records {
|
|
changes = append(changes, &Route53Change{
|
|
Change: route53.Change{
|
|
Action: aws.String(route53.ChangeActionCreate),
|
|
ResourceRecordSet: record,
|
|
},
|
|
})
|
|
}
|
|
|
|
zones, err := provider.Zones(ctx)
|
|
require.NoError(t, err)
|
|
err = provider.submitChanges(ctx, changes, zones)
|
|
require.NoError(t, err)
|
|
|
|
_, err = provider.Records(ctx)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func listAWSRecords(t *testing.T, client Route53API, zone string) []*route53.ResourceRecordSet {
|
|
recordSets := []*route53.ResourceRecordSet{}
|
|
require.NoError(t, client.ListResourceRecordSetsPagesWithContext(context.Background(), &route53.ListResourceRecordSetsInput{
|
|
HostedZoneId: aws.String(zone),
|
|
MaxItems: aws.String(route53PageSize),
|
|
}, func(resp *route53.ListResourceRecordSetsOutput, _ bool) bool {
|
|
recordSets = append(recordSets, resp.ResourceRecordSets...)
|
|
return true
|
|
}))
|
|
|
|
return recordSets
|
|
}
|
|
|
|
func newAWSProvider(t *testing.T, domainFilter endpoint.DomainFilter, zoneIDFilter provider.ZoneIDFilter, zoneTypeFilter provider.ZoneTypeFilter, evaluateTargetHealth, dryRun bool, records []*route53.ResourceRecordSet) (*AWSProvider, *Route53APIStub) {
|
|
return newAWSProviderWithTagFilter(t, domainFilter, zoneIDFilter, zoneTypeFilter, provider.NewZoneTagFilter([]string{}), evaluateTargetHealth, dryRun, records)
|
|
}
|
|
|
|
func newAWSProviderWithTagFilter(t *testing.T, domainFilter endpoint.DomainFilter, zoneIDFilter provider.ZoneIDFilter, zoneTypeFilter provider.ZoneTypeFilter, zoneTagFilter provider.ZoneTagFilter, evaluateTargetHealth, dryRun bool, records []*route53.ResourceRecordSet) (*AWSProvider, *Route53APIStub) {
|
|
client := NewRoute53APIStub(t)
|
|
|
|
provider := &AWSProvider{
|
|
client: client,
|
|
batchChangeSize: defaultBatchChangeSize,
|
|
batchChangeSizeBytes: defaultBatchChangeSizeBytes,
|
|
batchChangeSizeValues: defaultBatchChangeSizeValues,
|
|
batchChangeInterval: defaultBatchChangeInterval,
|
|
evaluateTargetHealth: evaluateTargetHealth,
|
|
domainFilter: domainFilter,
|
|
zoneIDFilter: zoneIDFilter,
|
|
zoneTypeFilter: zoneTypeFilter,
|
|
zoneTagFilter: zoneTagFilter,
|
|
dryRun: false,
|
|
zonesCache: &zonesListCache{duration: 1 * time.Minute},
|
|
failedChangesQueue: make(map[string]Route53Changes),
|
|
}
|
|
|
|
createAWSZone(t, provider, &route53.HostedZone{
|
|
Id: aws.String("/hostedzone/zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Name: aws.String("zone-1.ext-dns-test-2.teapot.zalan.do."),
|
|
Config: &route53.HostedZoneConfig{PrivateZone: aws.Bool(false)},
|
|
})
|
|
|
|
createAWSZone(t, provider, &route53.HostedZone{
|
|
Id: aws.String("/hostedzone/zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Name: aws.String("zone-2.ext-dns-test-2.teapot.zalan.do."),
|
|
Config: &route53.HostedZoneConfig{PrivateZone: aws.Bool(false)},
|
|
})
|
|
|
|
createAWSZone(t, provider, &route53.HostedZone{
|
|
Id: aws.String("/hostedzone/zone-3.ext-dns-test-2.teapot.zalan.do."),
|
|
Name: aws.String("zone-3.ext-dns-test-2.teapot.zalan.do."),
|
|
Config: &route53.HostedZoneConfig{PrivateZone: aws.Bool(true)},
|
|
})
|
|
|
|
// filtered out by domain filter
|
|
createAWSZone(t, provider, &route53.HostedZone{
|
|
Id: aws.String("/hostedzone/zone-4.ext-dns-test-3.teapot.zalan.do."),
|
|
Name: aws.String("zone-4.ext-dns-test-3.teapot.zalan.do."),
|
|
Config: &route53.HostedZoneConfig{PrivateZone: aws.Bool(false)},
|
|
})
|
|
|
|
setupZoneTags(provider.client.(*Route53APIStub))
|
|
|
|
setAWSRecords(t, provider, records)
|
|
|
|
provider.dryRun = dryRun
|
|
|
|
return provider, client
|
|
}
|
|
|
|
func setupZoneTags(client *Route53APIStub) {
|
|
addZoneTags(client.zoneTags, "/hostedzone/zone-1.ext-dns-test-2.teapot.zalan.do.", map[string]string{
|
|
"zone-1-tag-1": "tag-1-value",
|
|
"domain": "test-2",
|
|
"zone": "1",
|
|
})
|
|
addZoneTags(client.zoneTags, "/hostedzone/zone-2.ext-dns-test-2.teapot.zalan.do.", map[string]string{
|
|
"zone-2-tag-1": "tag-1-value",
|
|
"domain": "test-2",
|
|
"zone": "2",
|
|
})
|
|
addZoneTags(client.zoneTags, "/hostedzone/zone-3.ext-dns-test-2.teapot.zalan.do.", map[string]string{
|
|
"zone-3-tag-1": "tag-1-value",
|
|
"domain": "test-2",
|
|
"zone": "3",
|
|
})
|
|
addZoneTags(client.zoneTags, "/hostedzone/zone-4.ext-dns-test-2.teapot.zalan.do.", map[string]string{
|
|
"zone-4-tag-1": "tag-1-value",
|
|
"domain": "test-3",
|
|
"zone": "4",
|
|
})
|
|
}
|
|
|
|
func addZoneTags(tagMap map[string][]*route53.Tag, zoneID string, tags map[string]string) {
|
|
tagList := make([]*route53.Tag, 0, len(tags))
|
|
for k, v := range tags {
|
|
tagList = append(tagList, &route53.Tag{
|
|
Key: aws.String(k),
|
|
Value: aws.String(v),
|
|
})
|
|
}
|
|
tagMap[zoneID] = tagList
|
|
}
|
|
|
|
func validateRecords(t *testing.T, records []*route53.ResourceRecordSet, expected []*route53.ResourceRecordSet) {
|
|
assert.ElementsMatch(t, expected, records)
|
|
}
|
|
|
|
func containsRecordWithDNSName(records []*endpoint.Endpoint, dnsName string) bool {
|
|
for _, record := range records {
|
|
if record.DNSName == dnsName {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
func TestRequiresDeleteCreate(t *testing.T) {
|
|
provider, _ := newAWSProvider(t, endpoint.NewDomainFilter([]string{"foo.bar."}), provider.NewZoneIDFilter([]string{}), provider.NewZoneTypeFilter(""), defaultEvaluateTargetHealth, false, nil)
|
|
|
|
oldRecordType := endpoint.NewEndpointWithTTL("recordType", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "8.8.8.8")
|
|
newRecordType := endpoint.NewEndpointWithTTL("recordType", endpoint.RecordTypeCNAME, endpoint.TTL(recordTTL), "bar").WithProviderSpecific(providerSpecificAlias, "false")
|
|
|
|
assert.False(t, provider.requiresDeleteCreate(oldRecordType, oldRecordType), "actual and expected endpoints don't match. %+v:%+v", oldRecordType, oldRecordType)
|
|
assert.True(t, provider.requiresDeleteCreate(oldRecordType, newRecordType), "actual and expected endpoints don't match. %+v:%+v", oldRecordType, newRecordType)
|
|
|
|
oldAtoAlias := endpoint.NewEndpointWithTTL("AtoAlias", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "1.1.1.1")
|
|
newAtoAlias := endpoint.NewEndpointWithTTL("AtoAlias", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "bar.us-east-1.elb.amazonaws.com").WithProviderSpecific(providerSpecificAlias, "true")
|
|
|
|
assert.False(t, provider.requiresDeleteCreate(oldAtoAlias, oldAtoAlias), "actual and expected endpoints don't match. %+v:%+v", oldAtoAlias, oldAtoAlias.DNSName)
|
|
assert.True(t, provider.requiresDeleteCreate(oldAtoAlias, newAtoAlias), "actual and expected endpoints don't match. %+v:%+v", oldAtoAlias, newAtoAlias)
|
|
|
|
oldPolicy := endpoint.NewEndpointWithTTL("policy", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "8.8.8.8").WithSetIdentifier("nochange").WithProviderSpecific(providerSpecificRegion, "us-east-1")
|
|
newPolicy := endpoint.NewEndpointWithTTL("policy", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "8.8.8.8").WithSetIdentifier("nochange").WithProviderSpecific(providerSpecificWeight, "10")
|
|
|
|
assert.False(t, provider.requiresDeleteCreate(oldPolicy, oldPolicy), "actual and expected endpoints don't match. %+v:%+v", oldPolicy, oldPolicy)
|
|
assert.True(t, provider.requiresDeleteCreate(oldPolicy, newPolicy), "actual and expected endpoints don't match. %+v:%+v", oldPolicy, newPolicy)
|
|
|
|
oldSetIdentifier := endpoint.NewEndpointWithTTL("setIdentifier", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "8.8.8.8").WithSetIdentifier("old")
|
|
newSetIdentifier := endpoint.NewEndpointWithTTL("setIdentifier", endpoint.RecordTypeA, endpoint.TTL(recordTTL), "8.8.8.8").WithSetIdentifier("new")
|
|
|
|
assert.False(t, provider.requiresDeleteCreate(oldSetIdentifier, oldSetIdentifier), "actual and expected endpoints don't match. %+v:%+v", oldSetIdentifier, oldSetIdentifier)
|
|
assert.True(t, provider.requiresDeleteCreate(oldSetIdentifier, newSetIdentifier), "actual and expected endpoints don't match. %+v:%+v", oldSetIdentifier, newSetIdentifier)
|
|
}
|