|
@@ -97,7 +97,7 @@ private:
|
|
virtual void startRead(boost::function<void()> read_callback);
|
|
virtual void startRead(boost::function<void()> read_callback);
|
|
virtual int reply(ConstElementPtr envelope, ConstElementPtr newmsg);
|
|
virtual int reply(ConstElementPtr envelope, ConstElementPtr newmsg);
|
|
virtual bool hasQueuedMsgs() const;
|
|
virtual bool hasQueuedMsgs() const;
|
|
- virtual void setTimeout(size_t timeout UNUSED_PARAM) {};
|
|
+ virtual void setTimeout(size_t) {}
|
|
virtual size_t getTimeout() const { return 0; };
|
|
virtual size_t getTimeout() const { return 0; };
|
|
|
|
|
|
void setMessage(ConstElementPtr msg) { msg_ = msg; }
|
|
void setMessage(ConstElementPtr msg) { msg_ = msg; }
|
|
@@ -156,30 +156,25 @@ protected:
|
|
};
|
|
};
|
|
|
|
|
|
void
|
|
void
|
|
-AuthSrvTest::MockSession::establish(const char* socket_file UNUSED_PARAM) {}
|
|
+AuthSrvTest::MockSession::establish(const char*) {}
|
|
|
|
|
|
void
|
|
void
|
|
AuthSrvTest::MockSession::disconnect() {}
|
|
AuthSrvTest::MockSession::disconnect() {}
|
|
|
|
|
|
void
|
|
void
|
|
-AuthSrvTest::MockSession::subscribe(string group UNUSED_PARAM,
|
|
+AuthSrvTest::MockSession::subscribe(string, string)
|
|
- string instance UNUSED_PARAM)
|
|
|
|
{}
|
|
{}
|
|
|
|
|
|
void
|
|
void
|
|
-AuthSrvTest::MockSession::unsubscribe(string group UNUSED_PARAM,
|
|
+AuthSrvTest::MockSession::unsubscribe(string, string)
|
|
- string instance UNUSED_PARAM)
|
|
|
|
{}
|
|
{}
|
|
|
|
|
|
void
|
|
void
|
|
-AuthSrvTest::MockSession::startRead(
|
|
+AuthSrvTest::MockSession::startRead(boost::function<void()>)
|
|
- boost::function<void()> read_callback UNUSED_PARAM)
|
|
|
|
{}
|
|
{}
|
|
|
|
|
|
int
|
|
int
|
|
-AuthSrvTest::MockSession::reply(ConstElementPtr envelope UNUSED_PARAM,
|
|
+AuthSrvTest::MockSession::reply(ConstElementPtr, ConstElementPtr) {
|
|
- ConstElementPtr newmsg UNUSED_PARAM)
|
|
|
|
-{
|
|
|
|
return (-1);
|
|
return (-1);
|
|
}
|
|
}
|
|
|
|
|
|
@@ -190,8 +185,7 @@ AuthSrvTest::MockSession::hasQueuedMsgs() const {
|
|
|
|
|
|
int
|
|
int
|
|
AuthSrvTest::MockSession::group_sendmsg(ConstElementPtr msg, string group,
|
|
AuthSrvTest::MockSession::group_sendmsg(ConstElementPtr msg, string group,
|
|
- string instance UNUSED_PARAM,
|
|
+ string, string)
|
|
- string to UNUSED_PARAM)
|
|
|
|
{
|
|
{
|
|
if (!send_ok_) {
|
|
if (!send_ok_) {
|
|
isc_throw(XfroutError, "mock session send is disabled for test");
|
|
isc_throw(XfroutError, "mock session send is disabled for test");
|
|
@@ -203,10 +197,8 @@ AuthSrvTest::MockSession::group_sendmsg(ConstElementPtr msg, string group,
|
|
}
|
|
}
|
|
|
|
|
|
bool
|
|
bool
|
|
-AuthSrvTest::MockSession::group_recvmsg(ConstElementPtr& envelope UNUSED_PARAM,
|
|
+AuthSrvTest::MockSession::group_recvmsg(ConstElementPtr&,
|
|
- ConstElementPtr& msg,
|
|
+ ConstElementPtr& msg, bool, int)
|
|
- bool nonblock UNUSED_PARAM,
|
|
|
|
- int seq UNUSED_PARAM)
|
|
|
|
{
|
|
{
|
|
if (!receive_ok_) {
|
|
if (!receive_ok_) {
|
|
isc_throw(XfroutError, "mock session receive is disabled for test");
|
|
isc_throw(XfroutError, "mock session receive is disabled for test");
|
|
@@ -234,10 +226,9 @@ AuthSrvTest::MockXfroutClient::disconnect() {
|
|
}
|
|
}
|
|
|
|
|
|
int
|
|
int
|
|
-AuthSrvTest::MockXfroutClient::sendXfroutRequestInfo(
|
|
+AuthSrvTest::MockXfroutClient::sendXfroutRequestInfo(const int,
|
|
- const int tcp_sock UNUSED_PARAM,
|
|
+ const void*,
|
|
- const void* msg_data UNUSED_PARAM,
|
|
+ const uint16_t)
|
|
- const uint16_t msg_len UNUSED_PARAM)
|
|
|
|
{
|
|
{
|
|
if (!send_ok_) {
|
|
if (!send_ok_) {
|
|
isc_throw(XfroutError, "xfrout connection send is disabled for test");
|
|
isc_throw(XfroutError, "xfrout connection send is disabled for test");
|
|
@@ -321,18 +312,25 @@ headerCheck(const Message& message, const qid_t qid, const Rcode& rcode,
|
|
EXPECT_EQ(qid, message.getQid());
|
|
EXPECT_EQ(qid, message.getQid());
|
|
EXPECT_EQ(rcode, message.getRcode());
|
|
EXPECT_EQ(rcode, message.getRcode());
|
|
EXPECT_EQ(opcodeval, message.getOpcode().getCode());
|
|
EXPECT_EQ(opcodeval, message.getOpcode().getCode());
|
|
- EXPECT_EQ((flags & QR_FLAG) != 0, message.getHeaderFlag(MessageFlag::QR()));
|
|
+ EXPECT_EQ((flags & QR_FLAG) != 0,
|
|
- EXPECT_EQ((flags & AA_FLAG) != 0, message.getHeaderFlag(MessageFlag::AA()));
|
|
+ message.getHeaderFlag(Message::HEADERFLAG_QR));
|
|
- EXPECT_EQ((flags & TC_FLAG) != 0, message.getHeaderFlag(MessageFlag::TC()));
|
|
+ EXPECT_EQ((flags & AA_FLAG) != 0,
|
|
- EXPECT_EQ((flags & RA_FLAG) != 0, message.getHeaderFlag(MessageFlag::RA()));
|
|
+ message.getHeaderFlag(Message::HEADERFLAG_AA));
|
|
- EXPECT_EQ((flags & RD_FLAG) != 0, message.getHeaderFlag(MessageFlag::RD()));
|
|
+ EXPECT_EQ((flags & TC_FLAG) != 0,
|
|
- EXPECT_EQ((flags & AD_FLAG) != 0, message.getHeaderFlag(MessageFlag::AD()));
|
|
+ message.getHeaderFlag(Message::HEADERFLAG_TC));
|
|
- EXPECT_EQ((flags & CD_FLAG) != 0, message.getHeaderFlag(MessageFlag::CD()));
|
|
+ EXPECT_EQ((flags & RA_FLAG) != 0,
|
|
-
|
|
+ message.getHeaderFlag(Message::HEADERFLAG_RA));
|
|
- EXPECT_EQ(qdcount, message.getRRCount(Section::QUESTION()));
|
|
+ EXPECT_EQ((flags & RD_FLAG) != 0,
|
|
- EXPECT_EQ(ancount, message.getRRCount(Section::ANSWER()));
|
|
+ message.getHeaderFlag(Message::HEADERFLAG_RD));
|
|
- EXPECT_EQ(nscount, message.getRRCount(Section::AUTHORITY()));
|
|
+ EXPECT_EQ((flags & AD_FLAG) != 0,
|
|
- EXPECT_EQ(arcount, message.getRRCount(Section::ADDITIONAL()));
|
|
+ message.getHeaderFlag(Message::HEADERFLAG_AD));
|
|
|
|
+ EXPECT_EQ((flags & CD_FLAG) != 0,
|
|
|
|
+ message.getHeaderFlag(Message::HEADERFLAG_CD));
|
|
|
|
+
|
|
|
|
+ EXPECT_EQ(qdcount, message.getRRCount(Message::SECTION_QUESTION));
|
|
|
|
+ EXPECT_EQ(ancount, message.getRRCount(Message::SECTION_ANSWER));
|
|
|
|
+ EXPECT_EQ(nscount, message.getRRCount(Message::SECTION_AUTHORITY));
|
|
|
|
+ EXPECT_EQ(arcount, message.getRRCount(Message::SECTION_ADDITIONAL));
|
|
}
|
|
}
|
|
|
|
|
|
// Unsupported requests. Should result in NOTIMP.
|
|
// Unsupported requests. Should result in NOTIMP.
|
|
@@ -348,8 +346,8 @@ TEST_F(AuthSrvTest, unsupportedRequest) {
|
|
data[2] = ((i << 3) & 0xff);
|
|
data[2] = ((i << 3) & 0xff);
|
|
|
|
|
|
parse_message.clear(Message::PARSE);
|
|
parse_message.clear(Message::PARSE);
|
|
- EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_TRUE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
headerCheck(parse_message, default_qid, Rcode::NOTIMP(), i, QR_FLAG,
|
|
headerCheck(parse_message, default_qid, Rcode::NOTIMP(), i, QR_FLAG,
|
|
0, 0, 0, 0);
|
|
0, 0, 0, 0);
|
|
}
|
|
}
|
|
@@ -367,8 +365,8 @@ TEST_F(AuthSrvTest, verbose) {
|
|
// Multiple questions. Should result in FORMERR.
|
|
// Multiple questions. Should result in FORMERR.
|
|
TEST_F(AuthSrvTest, multiQuestion) {
|
|
TEST_F(AuthSrvTest, multiQuestion) {
|
|
createDataFromFile("multiquestion_fromWire.wire");
|
|
createDataFromFile("multiquestion_fromWire.wire");
|
|
- EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_TRUE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
headerCheck(parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
|
|
headerCheck(parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
|
|
QR_FLAG, 2, 0, 0, 0);
|
|
QR_FLAG, 2, 0, 0, 0);
|
|
|
|
|
|
@@ -388,8 +386,8 @@ TEST_F(AuthSrvTest, multiQuestion) {
|
|
// dropped.
|
|
// dropped.
|
|
TEST_F(AuthSrvTest, shortMessage) {
|
|
TEST_F(AuthSrvTest, shortMessage) {
|
|
createDataFromFile("shortmessage_fromWire");
|
|
createDataFromFile("shortmessage_fromWire");
|
|
- EXPECT_EQ(false, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_FALSE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
}
|
|
}
|
|
|
|
|
|
// Response messages. Must be silently dropped, whether it's a valid response
|
|
// Response messages. Must be silently dropped, whether it's a valid response
|
|
@@ -397,26 +395,26 @@ TEST_F(AuthSrvTest, shortMessage) {
|
|
TEST_F(AuthSrvTest, response) {
|
|
TEST_F(AuthSrvTest, response) {
|
|
// A valid (although unusual) response
|
|
// A valid (although unusual) response
|
|
createDataFromFile("simpleresponse_fromWire.wire");
|
|
createDataFromFile("simpleresponse_fromWire.wire");
|
|
- EXPECT_EQ(false, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_FALSE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
|
|
|
|
// A response with a broken question section. must be dropped rather than
|
|
// A response with a broken question section. must be dropped rather than
|
|
// returning FORMERR.
|
|
// returning FORMERR.
|
|
createDataFromFile("shortresponse_fromWire");
|
|
createDataFromFile("shortresponse_fromWire");
|
|
- EXPECT_EQ(false, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_FALSE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
|
|
|
|
// A response to iquery. must be dropped rather than returning NOTIMP.
|
|
// A response to iquery. must be dropped rather than returning NOTIMP.
|
|
createDataFromFile("iqueryresponse_fromWire.wire");
|
|
createDataFromFile("iqueryresponse_fromWire.wire");
|
|
- EXPECT_EQ(false, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_FALSE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
}
|
|
}
|
|
|
|
|
|
// Query with a broken question
|
|
// Query with a broken question
|
|
TEST_F(AuthSrvTest, shortQuestion) {
|
|
TEST_F(AuthSrvTest, shortQuestion) {
|
|
createDataFromFile("shortquestion_fromWire");
|
|
createDataFromFile("shortquestion_fromWire");
|
|
- EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_TRUE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
// Since the query's question is broken, the question section of the
|
|
// Since the query's question is broken, the question section of the
|
|
// response should be empty.
|
|
// response should be empty.
|
|
headerCheck(parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
|
|
headerCheck(parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
|
|
@@ -426,8 +424,8 @@ TEST_F(AuthSrvTest, shortQuestion) {
|
|
// Query with a broken answer section
|
|
// Query with a broken answer section
|
|
TEST_F(AuthSrvTest, shortAnswer) {
|
|
TEST_F(AuthSrvTest, shortAnswer) {
|
|
createDataFromFile("shortanswer_fromWire.wire");
|
|
createDataFromFile("shortanswer_fromWire.wire");
|
|
- EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_TRUE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
|
|
|
|
// This is a bogus query, but question section is valid. So the response
|
|
// This is a bogus query, but question section is valid. So the response
|
|
// should copy the question section.
|
|
// should copy the question section.
|
|
@@ -445,8 +443,8 @@ TEST_F(AuthSrvTest, shortAnswer) {
|
|
// Query with unsupported version of EDNS.
|
|
// Query with unsupported version of EDNS.
|
|
TEST_F(AuthSrvTest, ednsBadVers) {
|
|
TEST_F(AuthSrvTest, ednsBadVers) {
|
|
createDataFromFile("queryBadEDNS_fromWire.wire");
|
|
createDataFromFile("queryBadEDNS_fromWire.wire");
|
|
- EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_TRUE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
|
|
|
|
// The response must have an EDNS OPT RR in the additional section, but
|
|
// The response must have an EDNS OPT RR in the additional section, but
|
|
// it will be added automatically at the render time.
|
|
// it will be added automatically at the render time.
|
|
@@ -468,8 +466,8 @@ TEST_F(AuthSrvTest, AXFROverUDP) {
|
|
// AXFR over UDP is invalid and should result in FORMERR.
|
|
// AXFR over UDP is invalid and should result in FORMERR.
|
|
createRequestPacket(opcode, Name("example.com"), RRClass::IN(),
|
|
createRequestPacket(opcode, Name("example.com"), RRClass::IN(),
|
|
RRType::AXFR(), IPPROTO_UDP);
|
|
RRType::AXFR(), IPPROTO_UDP);
|
|
- EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_TRUE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
headerCheck(parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
|
|
headerCheck(parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
|
|
QR_FLAG, 1, 0, 0, 0);
|
|
QR_FLAG, 1, 0, 0, 0);
|
|
}
|
|
}
|
|
@@ -480,9 +478,9 @@ TEST_F(AuthSrvTest, AXFRSuccess) {
|
|
RRType::AXFR(), IPPROTO_TCP);
|
|
RRType::AXFR(), IPPROTO_TCP);
|
|
// On success, the AXFR query has been passed to a separate process,
|
|
// On success, the AXFR query has been passed to a separate process,
|
|
// so we shouldn't have to respond.
|
|
// so we shouldn't have to respond.
|
|
- EXPECT_EQ(false, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_FALSE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
- EXPECT_FALSE(xfrout.isConnected());
|
|
+ EXPECT_TRUE(xfrout.isConnected());
|
|
}
|
|
}
|
|
|
|
|
|
TEST_F(AuthSrvTest, AXFRConnectFail) {
|
|
TEST_F(AuthSrvTest, AXFRConnectFail) {
|
|
@@ -494,8 +492,6 @@ TEST_F(AuthSrvTest, AXFRConnectFail) {
|
|
response_renderer));
|
|
response_renderer));
|
|
headerCheck(parse_message, default_qid, Rcode::SERVFAIL(),
|
|
headerCheck(parse_message, default_qid, Rcode::SERVFAIL(),
|
|
opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
|
|
opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
|
|
- // For a shot term workaround with xfrout we currently close the connection
|
|
|
|
- // for each AXFR attempt
|
|
|
|
EXPECT_FALSE(xfrout.isConnected());
|
|
EXPECT_FALSE(xfrout.isConnected());
|
|
}
|
|
}
|
|
|
|
|
|
@@ -505,7 +501,7 @@ TEST_F(AuthSrvTest, AXFRSendFail) {
|
|
createRequestPacket(opcode, Name("example.com"), RRClass::IN(),
|
|
createRequestPacket(opcode, Name("example.com"), RRClass::IN(),
|
|
RRType::AXFR(), IPPROTO_TCP);
|
|
RRType::AXFR(), IPPROTO_TCP);
|
|
server.processMessage(*io_message, parse_message, response_renderer);
|
|
server.processMessage(*io_message, parse_message, response_renderer);
|
|
- EXPECT_FALSE(xfrout.isConnected()); // see above
|
|
+ EXPECT_TRUE(xfrout.isConnected());
|
|
|
|
|
|
xfrout.disableSend();
|
|
xfrout.disableSend();
|
|
parse_message.clear(Message::PARSE);
|
|
parse_message.clear(Message::PARSE);
|
|
@@ -540,10 +536,10 @@ TEST_F(AuthSrvTest, AXFRDisconnectFail) {
|
|
TEST_F(AuthSrvTest, notify) {
|
|
TEST_F(AuthSrvTest, notify) {
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
RRType::SOA());
|
|
RRType::SOA());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
- EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_TRUE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
|
|
|
|
// An internal command message should have been created and sent to an
|
|
// An internal command message should have been created and sent to an
|
|
// external module. Check them.
|
|
// external module. Check them.
|
|
@@ -572,10 +568,10 @@ TEST_F(AuthSrvTest, notifyForCHClass) {
|
|
// Same as the previous test, but for the CH RRClass.
|
|
// Same as the previous test, but for the CH RRClass.
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::CH(),
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::CH(),
|
|
RRType::SOA());
|
|
RRType::SOA());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
- EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_TRUE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
|
|
|
|
// Other conditions should be the same, so simply confirm the RR class is
|
|
// Other conditions should be the same, so simply confirm the RR class is
|
|
// set correctly.
|
|
// set correctly.
|
|
@@ -588,12 +584,12 @@ TEST_F(AuthSrvTest, notifyEmptyQuestion) {
|
|
request_message.clear(Message::RENDER);
|
|
request_message.clear(Message::RENDER);
|
|
request_message.setOpcode(Opcode::NOTIFY());
|
|
request_message.setOpcode(Opcode::NOTIFY());
|
|
request_message.setRcode(Rcode::NOERROR());
|
|
request_message.setRcode(Rcode::NOERROR());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
request_message.setQid(default_qid);
|
|
request_message.setQid(default_qid);
|
|
request_message.toWire(request_renderer);
|
|
request_message.toWire(request_renderer);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
- EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_TRUE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
headerCheck(parse_message, default_qid, Rcode::FORMERR(),
|
|
headerCheck(parse_message, default_qid, Rcode::FORMERR(),
|
|
Opcode::NOTIFY().getCode(), QR_FLAG, 0, 0, 0, 0);
|
|
Opcode::NOTIFY().getCode(), QR_FLAG, 0, 0, 0, 0);
|
|
}
|
|
}
|
|
@@ -604,10 +600,10 @@ TEST_F(AuthSrvTest, notifyMultiQuestions) {
|
|
// add one more SOA question
|
|
// add one more SOA question
|
|
request_message.addQuestion(Question(Name("example.com"), RRClass::IN(),
|
|
request_message.addQuestion(Question(Name("example.com"), RRClass::IN(),
|
|
RRType::SOA()));
|
|
RRType::SOA()));
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
- EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_TRUE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
headerCheck(parse_message, default_qid, Rcode::FORMERR(),
|
|
headerCheck(parse_message, default_qid, Rcode::FORMERR(),
|
|
Opcode::NOTIFY().getCode(), QR_FLAG, 2, 0, 0, 0);
|
|
Opcode::NOTIFY().getCode(), QR_FLAG, 2, 0, 0, 0);
|
|
}
|
|
}
|
|
@@ -615,10 +611,10 @@ TEST_F(AuthSrvTest, notifyMultiQuestions) {
|
|
TEST_F(AuthSrvTest, notifyNonSOAQuestion) {
|
|
TEST_F(AuthSrvTest, notifyNonSOAQuestion) {
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
RRType::NS());
|
|
RRType::NS());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
- EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_TRUE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
headerCheck(parse_message, default_qid, Rcode::FORMERR(),
|
|
headerCheck(parse_message, default_qid, Rcode::FORMERR(),
|
|
Opcode::NOTIFY().getCode(), QR_FLAG, 1, 0, 0, 0);
|
|
Opcode::NOTIFY().getCode(), QR_FLAG, 1, 0, 0, 0);
|
|
}
|
|
}
|
|
@@ -627,8 +623,8 @@ TEST_F(AuthSrvTest, notifyWithoutAA) {
|
|
// implicitly leave the AA bit off. our implementation will accept it.
|
|
// implicitly leave the AA bit off. our implementation will accept it.
|
|
createRequestPacket(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
createRequestPacket(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
RRType::SOA());
|
|
RRType::SOA());
|
|
- EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_TRUE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
headerCheck(parse_message, default_qid, Rcode::NOERROR(),
|
|
headerCheck(parse_message, default_qid, Rcode::NOERROR(),
|
|
Opcode::NOTIFY().getCode(), QR_FLAG | AA_FLAG, 1, 0, 0, 0);
|
|
Opcode::NOTIFY().getCode(), QR_FLAG | AA_FLAG, 1, 0, 0, 0);
|
|
}
|
|
}
|
|
@@ -636,11 +632,11 @@ TEST_F(AuthSrvTest, notifyWithoutAA) {
|
|
TEST_F(AuthSrvTest, notifyWithErrorRcode) {
|
|
TEST_F(AuthSrvTest, notifyWithErrorRcode) {
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
RRType::SOA());
|
|
RRType::SOA());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
request_message.setRcode(Rcode::SERVFAIL());
|
|
request_message.setRcode(Rcode::SERVFAIL());
|
|
createRequestPacket(IPPROTO_UDP);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
- EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_TRUE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
headerCheck(parse_message, default_qid, Rcode::NOERROR(),
|
|
headerCheck(parse_message, default_qid, Rcode::NOERROR(),
|
|
Opcode::NOTIFY().getCode(), QR_FLAG | AA_FLAG, 1, 0, 0, 0);
|
|
Opcode::NOTIFY().getCode(), QR_FLAG | AA_FLAG, 1, 0, 0, 0);
|
|
}
|
|
}
|
|
@@ -650,7 +646,7 @@ TEST_F(AuthSrvTest, notifyWithoutSession) {
|
|
|
|
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
RRType::SOA());
|
|
RRType::SOA());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
|
|
|
|
// we simply ignore the notify and let it be resent if an internal error
|
|
// we simply ignore the notify and let it be resent if an internal error
|
|
@@ -664,7 +660,7 @@ TEST_F(AuthSrvTest, notifySendFail) {
|
|
|
|
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
RRType::SOA());
|
|
RRType::SOA());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
|
|
|
|
EXPECT_FALSE(server.processMessage(*io_message, parse_message,
|
|
EXPECT_FALSE(server.processMessage(*io_message, parse_message,
|
|
@@ -676,7 +672,7 @@ TEST_F(AuthSrvTest, notifyReceiveFail) {
|
|
|
|
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
RRType::SOA());
|
|
RRType::SOA());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
EXPECT_FALSE(server.processMessage(*io_message, parse_message,
|
|
EXPECT_FALSE(server.processMessage(*io_message, parse_message,
|
|
response_renderer));
|
|
response_renderer));
|
|
@@ -687,7 +683,7 @@ TEST_F(AuthSrvTest, notifyWithBogusSessionMessage) {
|
|
|
|
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
RRType::SOA());
|
|
RRType::SOA());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
EXPECT_FALSE(server.processMessage(*io_message, parse_message,
|
|
EXPECT_FALSE(server.processMessage(*io_message, parse_message,
|
|
response_renderer));
|
|
response_renderer));
|
|
@@ -699,7 +695,7 @@ TEST_F(AuthSrvTest, notifyWithSessionMessageError) {
|
|
|
|
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
|
|
RRType::SOA());
|
|
RRType::SOA());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
createRequestPacket(IPPROTO_UDP);
|
|
EXPECT_FALSE(server.processMessage(*io_message, parse_message,
|
|
EXPECT_FALSE(server.processMessage(*io_message, parse_message,
|
|
response_renderer));
|
|
response_renderer));
|
|
@@ -727,8 +723,8 @@ TEST_F(AuthSrvTest, updateConfig) {
|
|
// response should have the AA flag on, and have an RR in each answer
|
|
// response should have the AA flag on, and have an RR in each answer
|
|
// and authority section.
|
|
// and authority section.
|
|
createDataFromFile("examplequery_fromWire.wire");
|
|
createDataFromFile("examplequery_fromWire.wire");
|
|
- EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_TRUE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
headerCheck(parse_message, default_qid, Rcode::NOERROR(), opcode.getCode(),
|
|
headerCheck(parse_message, default_qid, Rcode::NOERROR(), opcode.getCode(),
|
|
QR_FLAG | AA_FLAG, 1, 1, 1, 0);
|
|
QR_FLAG | AA_FLAG, 1, 1, 1, 0);
|
|
}
|
|
}
|
|
@@ -741,8 +737,8 @@ TEST_F(AuthSrvTest, datasourceFail) {
|
|
// in a SERVFAIL response, and the answer and authority sections should
|
|
// in a SERVFAIL response, and the answer and authority sections should
|
|
// be empty.
|
|
// be empty.
|
|
createDataFromFile("badExampleQuery_fromWire.wire");
|
|
createDataFromFile("badExampleQuery_fromWire.wire");
|
|
- EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_TRUE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
headerCheck(parse_message, default_qid, Rcode::SERVFAIL(),
|
|
headerCheck(parse_message, default_qid, Rcode::SERVFAIL(),
|
|
opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
|
|
opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
|
|
}
|
|
}
|
|
@@ -756,8 +752,8 @@ TEST_F(AuthSrvTest, updateConfigFail) {
|
|
|
|
|
|
// The original data source should still exist.
|
|
// The original data source should still exist.
|
|
createDataFromFile("examplequery_fromWire.wire");
|
|
createDataFromFile("examplequery_fromWire.wire");
|
|
- EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
|
|
+ EXPECT_TRUE(server.processMessage(*io_message, parse_message,
|
|
- response_renderer));
|
|
+ response_renderer));
|
|
headerCheck(parse_message, default_qid, Rcode::NOERROR(), opcode.getCode(),
|
|
headerCheck(parse_message, default_qid, Rcode::NOERROR(), opcode.getCode(),
|
|
QR_FLAG | AA_FLAG, 1, 1, 1, 0);
|
|
QR_FLAG | AA_FLAG, 1, 1, 1, 0);
|
|
}
|
|
}
|