|
@@ -469,7 +469,7 @@ TEST_F(AuthSrvTest, AXFRSuccess) {
|
|
|
// so we shouldn't have to respond.
|
|
|
EXPECT_EQ(false, server.processMessage(*io_message, parse_message,
|
|
|
response_renderer));
|
|
|
- EXPECT_TRUE(xfrout.isConnected());
|
|
|
+ EXPECT_FALSE(xfrout.isConnected());
|
|
|
}
|
|
|
|
|
|
TEST_F(AuthSrvTest, AXFRConnectFail) {
|
|
@@ -481,6 +481,8 @@ TEST_F(AuthSrvTest, AXFRConnectFail) {
|
|
|
response_renderer));
|
|
|
headerCheck(parse_message, default_qid, Rcode::SERVFAIL(),
|
|
|
opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
|
|
|
+ // For a shot term workaround with xfrout we currently close the connection
|
|
|
+ // for each AXFR attempt
|
|
|
EXPECT_FALSE(xfrout.isConnected());
|
|
|
}
|
|
|
|
|
@@ -490,7 +492,7 @@ TEST_F(AuthSrvTest, AXFRSendFail) {
|
|
|
createRequestPacket(opcode, Name("example.com"), RRClass::IN(),
|
|
|
RRType::AXFR(), IPPROTO_TCP);
|
|
|
server.processMessage(*io_message, parse_message, response_renderer);
|
|
|
- EXPECT_TRUE(xfrout.isConnected());
|
|
|
+ EXPECT_FALSE(xfrout.isConnected()); // see above
|
|
|
|
|
|
xfrout.disableSend();
|
|
|
parse_message.clear(Message::PARSE);
|