|
@@ -200,7 +200,7 @@ class SessionTestBase(unittest.TestCase):
|
|
|
self._acl_map = {(TEST_ZONE_NAME, TEST_RRCLASS):
|
|
|
REQUEST_LOADER.load([{"action": "ACCEPT"}])}
|
|
|
self._session = UpdateSession(self._update_msg, TEST_CLIENT4,
|
|
|
- ZoneConfig([], TEST_RRCLASS,
|
|
|
+ ZoneConfig(set(), TEST_RRCLASS,
|
|
|
self._datasrc_client,
|
|
|
self._acl_map))
|
|
|
self._session._get_update_zone()
|
|
@@ -327,7 +327,7 @@ class SessionTest(SessionTestBase):
|
|
|
msg = create_update_msg(zones=[Question(TEST_ZONE_NAME, TEST_RRCLASS,
|
|
|
RRType.SOA())])
|
|
|
session = UpdateSession(msg, TEST_CLIENT4,
|
|
|
- ZoneConfig([(TEST_ZONE_NAME, TEST_RRCLASS)],
|
|
|
+ ZoneConfig({(TEST_ZONE_NAME, TEST_RRCLASS)},
|
|
|
TEST_RRCLASS, self._datasrc_client))
|
|
|
self.assertEqual(UPDATE_ERROR, session.handle()[0])
|
|
|
self.check_response(session.get_message(), Rcode.NOTIMP())
|
|
@@ -336,7 +336,7 @@ class SessionTest(SessionTestBase):
|
|
|
'''Common test sequence for the 'notauth' test'''
|
|
|
msg = create_update_msg(zones=[Question(zname, zclass, RRType.SOA())])
|
|
|
session = UpdateSession(msg, TEST_CLIENT4,
|
|
|
- ZoneConfig([(TEST_ZONE_NAME, TEST_RRCLASS)],
|
|
|
+ ZoneConfig({(TEST_ZONE_NAME, TEST_RRCLASS)},
|
|
|
TEST_RRCLASS, self._datasrc_client))
|
|
|
self.assertEqual(UPDATE_ERROR, session.handle()[0])
|
|
|
self.check_response(session.get_message(), Rcode.NOTAUTH())
|
|
@@ -360,7 +360,7 @@ class SessionTest(SessionTestBase):
|
|
|
msg = create_update_msg(zones=[Question(TEST_ZONE_NAME, TEST_RRCLASS,
|
|
|
RRType.SOA())])
|
|
|
session = UpdateSession(msg, TEST_CLIENT4,
|
|
|
- ZoneConfig([(TEST_ZONE_NAME, TEST_RRCLASS)],
|
|
|
+ ZoneConfig({(TEST_ZONE_NAME, TEST_RRCLASS)},
|
|
|
TEST_RRCLASS,
|
|
|
BadDataSourceClient()))
|
|
|
self.assertEqual(UPDATE_ERROR, session.handle()[0])
|
|
@@ -617,7 +617,7 @@ class SessionTest(SessionTestBase):
|
|
|
from 'prerequisites'. Then checks if __check_prerequisites()
|
|
|
returns the Rcode specified in 'expected'.'''
|
|
|
msg = create_update_msg([TEST_ZONE_RECORD], prerequisites)
|
|
|
- zconfig = ZoneConfig([], TEST_RRCLASS, self._datasrc_client,
|
|
|
+ zconfig = ZoneConfig(set(), TEST_RRCLASS, self._datasrc_client,
|
|
|
self._acl_map)
|
|
|
session = UpdateSession(msg, TEST_CLIENT4, zconfig)
|
|
|
session._get_update_zone()
|
|
@@ -643,7 +643,7 @@ class SessionTest(SessionTestBase):
|
|
|
from 'updates'. Then checks if __do_prescan()
|
|
|
returns the Rcode specified in 'expected'.'''
|
|
|
msg = create_update_msg([TEST_ZONE_RECORD], [], updates)
|
|
|
- zconfig = ZoneConfig([], TEST_RRCLASS, self._datasrc_client,
|
|
|
+ zconfig = ZoneConfig(set(), TEST_RRCLASS, self._datasrc_client,
|
|
|
self._acl_map)
|
|
|
session = UpdateSession(msg, TEST_CLIENT4, zconfig)
|
|
|
session._get_update_zone()
|
|
@@ -663,7 +663,7 @@ class SessionTest(SessionTestBase):
|
|
|
from 'updates'. Then checks if __handle()
|
|
|
results in a response with rcode 'expected'.'''
|
|
|
msg = create_update_msg([TEST_ZONE_RECORD], [], updates)
|
|
|
- zconfig = ZoneConfig([], TEST_RRCLASS, self._datasrc_client,
|
|
|
+ zconfig = ZoneConfig(set(), TEST_RRCLASS, self._datasrc_client,
|
|
|
self._acl_map)
|
|
|
session = UpdateSession(msg, TEST_CLIENT4, zconfig)
|
|
|
|
|
@@ -1406,7 +1406,7 @@ class SessionACLTest(SessionTestBase):
|
|
|
'''
|
|
|
# create a separate session, with default (empty) ACL map.
|
|
|
session = UpdateSession(self._update_msg,
|
|
|
- TEST_CLIENT4, ZoneConfig([], TEST_RRCLASS,
|
|
|
+ TEST_CLIENT4, ZoneConfig(set(), TEST_RRCLASS,
|
|
|
self._datasrc_client))
|
|
|
# then the request should be rejected.
|
|
|
self.assertEqual((UPDATE_ERROR, None, None), session.handle())
|
|
@@ -1435,7 +1435,7 @@ class SessionACLTest(SessionTestBase):
|
|
|
# If the message doesn't contain TSIG, it doesn't match the ACCEPT
|
|
|
# ACL entry, and the request should be rejected.
|
|
|
session = UpdateSession(self._update_msg,
|
|
|
- TEST_CLIENT4, ZoneConfig([], TEST_RRCLASS,
|
|
|
+ TEST_CLIENT4, ZoneConfig(set(), TEST_RRCLASS,
|
|
|
self._datasrc_client,
|
|
|
acl_map))
|
|
|
self.assertEqual((UPDATE_ERROR, None, None), session.handle())
|
|
@@ -1444,7 +1444,7 @@ class SessionACLTest(SessionTestBase):
|
|
|
# If the message contains TSIG, it should match the ACCEPT
|
|
|
# ACL entry, and the request should be granted.
|
|
|
session = UpdateSession(create_update_msg(tsig_key=TEST_TSIG_KEY),
|
|
|
- TEST_CLIENT4, ZoneConfig([], TEST_RRCLASS,
|
|
|
+ TEST_CLIENT4, ZoneConfig(set(), TEST_RRCLASS,
|
|
|
self._datasrc_client,
|
|
|
acl_map))
|
|
|
self.assertEqual((UPDATE_SUCCESS, TEST_ZONE_NAME, TEST_RRCLASS),
|