|
@@ -15,26 +15,8 @@
|
|
// $Id$
|
|
// $Id$
|
|
|
|
|
|
#include <config.h>
|
|
#include <config.h>
|
|
-
|
|
|
|
-#include <gtest/gtest.h>
|
|
|
|
-
|
|
|
|
-#include <dns/buffer.h>
|
|
|
|
-#include <dns/name.h>
|
|
|
|
-#include <dns/message.h>
|
|
|
|
-#include <dns/messagerenderer.h>
|
|
|
|
-#include <dns/rrclass.h>
|
|
|
|
-#include <dns/rrtype.h>
|
|
|
|
-
|
|
|
|
-#include <cc/data.h>
|
|
|
|
-#include <cc/session.h>
|
|
|
|
-
|
|
|
|
-#include <xfr/xfrout_client.h>
|
|
|
|
-
|
|
|
|
#include <auth/auth_srv.h>
|
|
#include <auth/auth_srv.h>
|
|
-#include <asiolink/asiolink.h>
|
|
+#include <testutils/srv_unittest.h>
|
|
-
|
|
|
|
-#include <dns/tests/unittest_util.h>
|
|
|
|
-#include <auth/tests/mockups.h>
|
|
|
|
|
|
|
|
using namespace std;
|
|
using namespace std;
|
|
using namespace isc::cc;
|
|
using namespace isc::cc;
|
|
@@ -51,262 +33,60 @@ const char* const CONFIG_TESTDB =
|
|
// the sqlite3 test).
|
|
// the sqlite3 test).
|
|
const char* const BADCONFIG_TESTDB =
|
|
const char* const BADCONFIG_TESTDB =
|
|
"{ \"database_file\": \"" TEST_DATA_DIR "/nodir/notexist\"}";
|
|
"{ \"database_file\": \"" TEST_DATA_DIR "/nodir/notexist\"}";
|
|
-const char* const DEFAULT_REMOTE_ADDRESS = "192.0.2.1";
|
|
|
|
-
|
|
|
|
-class DummySocket : public IOSocket {
|
|
|
|
-private:
|
|
|
|
- DummySocket(const DummySocket& source);
|
|
|
|
- DummySocket& operator=(const DummySocket& source);
|
|
|
|
-public:
|
|
|
|
- DummySocket(const int protocol) : protocol_(protocol) {}
|
|
|
|
- virtual int getNative() const { return (-1); }
|
|
|
|
- virtual int getProtocol() const { return (protocol_); }
|
|
|
|
-private:
|
|
|
|
- const int protocol_;
|
|
|
|
-};
|
|
|
|
|
|
|
|
-class AuthSrvTest : public ::testing::Test {
|
|
+class AuthSrvTest : public SrvTestBase {
|
|
protected:
|
|
protected:
|
|
- AuthSrvTest() : server(true, xfrout),
|
|
+ AuthSrvTest() : server(true, xfrout) {
|
|
- request_message(Message::RENDER),
|
|
|
|
- parse_message(new Message(Message::PARSE)),
|
|
|
|
- default_qid(0x1035), opcode(Opcode(Opcode::QUERY())),
|
|
|
|
- qname("www.example.com"), qclass(RRClass::IN()),
|
|
|
|
- qtype(RRType::A()), io_message(NULL), endpoint(NULL),
|
|
|
|
- request_obuffer(0), request_renderer(request_obuffer),
|
|
|
|
- response_obuffer(new OutputBuffer(0))
|
|
|
|
- {
|
|
|
|
server.setXfrinSession(¬ify_session);
|
|
server.setXfrinSession(¬ify_session);
|
|
}
|
|
}
|
|
- ~AuthSrvTest() {
|
|
|
|
- delete io_message;
|
|
|
|
- delete endpoint;
|
|
|
|
- }
|
|
|
|
- MockSession notify_session;
|
|
|
|
MockXfroutClient xfrout;
|
|
MockXfroutClient xfrout;
|
|
- MockServer dnsserv;
|
|
|
|
AuthSrv server;
|
|
AuthSrv server;
|
|
- Message request_message;
|
|
|
|
- MessagePtr parse_message;
|
|
|
|
- const qid_t default_qid;
|
|
|
|
- const Opcode opcode;
|
|
|
|
- const Name qname;
|
|
|
|
- const RRClass qclass;
|
|
|
|
- const RRType qtype;
|
|
|
|
- IOSocket* io_sock;
|
|
|
|
- IOMessage* io_message;
|
|
|
|
- const IOEndpoint* endpoint;
|
|
|
|
- OutputBuffer request_obuffer;
|
|
|
|
- MessageRenderer request_renderer;
|
|
|
|
- OutputBufferPtr response_obuffer;
|
|
|
|
- vector<uint8_t> data;
|
|
|
|
-
|
|
|
|
- void createDataFromFile(const char* const datafile, int protocol);
|
|
|
|
- void createRequestPacket(Message& message, int protocol);
|
|
|
|
};
|
|
};
|
|
|
|
|
|
-
|
|
|
|
-// These are flags to indicate whether the corresponding flag bit of the
|
|
|
|
-// DNS header is to be set in the test cases. (Note that the flag values
|
|
|
|
-// is irrelevant to their wire-format values)
|
|
|
|
-const unsigned int QR_FLAG = 0x1;
|
|
|
|
-const unsigned int AA_FLAG = 0x2;
|
|
|
|
-const unsigned int TC_FLAG = 0x4;
|
|
|
|
-const unsigned int RD_FLAG = 0x8;
|
|
|
|
-const unsigned int RA_FLAG = 0x10;
|
|
|
|
-const unsigned int AD_FLAG = 0x20;
|
|
|
|
-const unsigned int CD_FLAG = 0x40;
|
|
|
|
-
|
|
|
|
-void
|
|
|
|
-AuthSrvTest::createDataFromFile(const char* const datafile,
|
|
|
|
- const int protocol = IPPROTO_UDP)
|
|
|
|
-{
|
|
|
|
- delete io_message;
|
|
|
|
- data.clear();
|
|
|
|
-
|
|
|
|
- delete endpoint;
|
|
|
|
-
|
|
|
|
- endpoint = IOEndpoint::create(protocol,
|
|
|
|
- IOAddress(DEFAULT_REMOTE_ADDRESS), 5300);
|
|
|
|
- UnitTestUtil::readWireData(datafile, data);
|
|
|
|
- io_sock = new DummySocket(protocol);
|
|
|
|
- io_message = new IOMessage(&data[0], data.size(), *io_sock, *endpoint);
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-void
|
|
|
|
-AuthSrvTest::createRequestPacket(Message& message,
|
|
|
|
- const int protocol = IPPROTO_UDP)
|
|
|
|
-{
|
|
|
|
- message.toWire(request_renderer);
|
|
|
|
-
|
|
|
|
- delete io_message;
|
|
|
|
- delete io_sock;
|
|
|
|
-
|
|
|
|
- endpoint = IOEndpoint::create(protocol,
|
|
|
|
- IOAddress(DEFAULT_REMOTE_ADDRESS), 5300);
|
|
|
|
- io_sock = new DummySocket(protocol);
|
|
|
|
- io_message = new IOMessage(request_renderer.getData(),
|
|
|
|
- request_renderer.getLength(),
|
|
|
|
- *io_sock, *endpoint);
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-void
|
|
|
|
-headerCheck(const Message& message, const qid_t qid, const Rcode& rcode,
|
|
|
|
- const uint16_t opcodeval, const unsigned int flags,
|
|
|
|
- const unsigned int qdcount,
|
|
|
|
- const unsigned int ancount, const unsigned int nscount,
|
|
|
|
- const unsigned int arcount)
|
|
|
|
-{
|
|
|
|
- EXPECT_EQ(qid, message.getQid());
|
|
|
|
- EXPECT_EQ(rcode, message.getRcode());
|
|
|
|
- EXPECT_EQ(opcodeval, message.getOpcode().getCode());
|
|
|
|
- EXPECT_EQ((flags & QR_FLAG) != 0, message.getHeaderFlag(MessageFlag::QR()));
|
|
|
|
- EXPECT_EQ((flags & AA_FLAG) != 0, message.getHeaderFlag(MessageFlag::AA()));
|
|
|
|
- EXPECT_EQ((flags & TC_FLAG) != 0, message.getHeaderFlag(MessageFlag::TC()));
|
|
|
|
- EXPECT_EQ((flags & RA_FLAG) != 0, message.getHeaderFlag(MessageFlag::RA()));
|
|
|
|
- EXPECT_EQ((flags & RD_FLAG) != 0, message.getHeaderFlag(MessageFlag::RD()));
|
|
|
|
- EXPECT_EQ((flags & AD_FLAG) != 0, message.getHeaderFlag(MessageFlag::AD()));
|
|
|
|
- EXPECT_EQ((flags & CD_FLAG) != 0, message.getHeaderFlag(MessageFlag::CD()));
|
|
|
|
-
|
|
|
|
- EXPECT_EQ(qdcount, message.getRRCount(Section::QUESTION()));
|
|
|
|
- EXPECT_EQ(ancount, message.getRRCount(Section::ANSWER()));
|
|
|
|
- EXPECT_EQ(nscount, message.getRRCount(Section::AUTHORITY()));
|
|
|
|
- EXPECT_EQ(arcount, message.getRRCount(Section::ADDITIONAL()));
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
// Unsupported requests. Should result in NOTIMP.
|
|
// Unsupported requests. Should result in NOTIMP.
|
|
TEST_F(AuthSrvTest, unsupportedRequest) {
|
|
TEST_F(AuthSrvTest, unsupportedRequest) {
|
|
- for (unsigned int i = 0; i < 16; ++i) {
|
|
+ UNSUPPORTED_REQUEST_TEST;
|
|
- // set Opcode to 'i', which iterators over all possible codes except
|
|
|
|
- // the standard query and notify
|
|
|
|
- if (i == Opcode::QUERY().getCode() ||
|
|
|
|
- i == Opcode::NOTIFY().getCode()) {
|
|
|
|
- continue;
|
|
|
|
- }
|
|
|
|
- createDataFromFile("simplequery_fromWire");
|
|
|
|
- data[2] = ((i << 3) & 0xff);
|
|
|
|
-
|
|
|
|
- parse_message->clear(Message::PARSE);
|
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer,
|
|
|
|
- &dnsserv);
|
|
|
|
- EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
|
- headerCheck(*parse_message, default_qid, Rcode::NOTIMP(), i, QR_FLAG,
|
|
|
|
- 0, 0, 0, 0);
|
|
|
|
- }
|
|
|
|
}
|
|
}
|
|
|
|
|
|
// Simple API check
|
|
// Simple API check
|
|
TEST_F(AuthSrvTest, verbose) {
|
|
TEST_F(AuthSrvTest, verbose) {
|
|
- EXPECT_FALSE(server.getVerbose());
|
|
+ VERBOSE_TEST;
|
|
- server.setVerbose(true);
|
|
|
|
- EXPECT_TRUE(server.getVerbose());
|
|
|
|
- server.setVerbose(false);
|
|
|
|
- EXPECT_FALSE(server.getVerbose());
|
|
|
|
}
|
|
}
|
|
|
|
|
|
// Multiple questions. Should result in FORMERR.
|
|
// Multiple questions. Should result in FORMERR.
|
|
TEST_F(AuthSrvTest, multiQuestion) {
|
|
TEST_F(AuthSrvTest, multiQuestion) {
|
|
- createDataFromFile("multiquestion_fromWire");
|
|
+ MULTI_QUESTION_TEST;
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
|
- EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
|
- headerCheck(*parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
|
|
|
|
- QR_FLAG, 2, 0, 0, 0);
|
|
|
|
-
|
|
|
|
- QuestionIterator qit = parse_message->beginQuestion();
|
|
|
|
- EXPECT_EQ(Name("example.com"), (*qit)->getName());
|
|
|
|
- EXPECT_EQ(RRClass::IN(), (*qit)->getClass());
|
|
|
|
- EXPECT_EQ(RRType::A(), (*qit)->getType());
|
|
|
|
- ++qit;
|
|
|
|
- EXPECT_EQ(Name("example.com"), (*qit)->getName());
|
|
|
|
- EXPECT_EQ(RRClass::IN(), (*qit)->getClass());
|
|
|
|
- EXPECT_EQ(RRType::AAAA(), (*qit)->getType());
|
|
|
|
- ++qit;
|
|
|
|
- EXPECT_TRUE(qit == parse_message->endQuestion());
|
|
|
|
}
|
|
}
|
|
|
|
|
|
// Incoming data doesn't even contain the complete header. Must be silently
|
|
// Incoming data doesn't even contain the complete header. Must be silently
|
|
// dropped.
|
|
// dropped.
|
|
TEST_F(AuthSrvTest, shortMessage) {
|
|
TEST_F(AuthSrvTest, shortMessage) {
|
|
- createDataFromFile("shortmessage_fromWire");
|
|
+ SHORT_MESSAGE_TEST;
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
|
- EXPECT_FALSE(dnsserv.hasAnswer());
|
|
|
|
}
|
|
}
|
|
|
|
|
|
// Response messages. Must be silently dropped, whether it's a valid response
|
|
// Response messages. Must be silently dropped, whether it's a valid response
|
|
// or malformed or could otherwise cause a protocol error.
|
|
// or malformed or could otherwise cause a protocol error.
|
|
TEST_F(AuthSrvTest, response) {
|
|
TEST_F(AuthSrvTest, response) {
|
|
- // A valid (although unusual) response
|
|
+ RESPONSE_TEST;
|
|
- createDataFromFile("simpleresponse_fromWire");
|
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
|
- EXPECT_FALSE(dnsserv.hasAnswer());
|
|
|
|
-
|
|
|
|
- // A response with a broken question section. must be dropped rather than
|
|
|
|
- // returning FORMERR.
|
|
|
|
- createDataFromFile("shortresponse_fromWire");
|
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
|
- EXPECT_FALSE(dnsserv.hasAnswer());
|
|
|
|
-
|
|
|
|
- // A response to iquery. must be dropped rather than returning NOTIMP.
|
|
|
|
- createDataFromFile("iqueryresponse_fromWire");
|
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
|
- EXPECT_FALSE(dnsserv.hasAnswer());
|
|
|
|
}
|
|
}
|
|
|
|
|
|
// Query with a broken question
|
|
// Query with a broken question
|
|
TEST_F(AuthSrvTest, shortQuestion) {
|
|
TEST_F(AuthSrvTest, shortQuestion) {
|
|
- createDataFromFile("shortquestion_fromWire");
|
|
+ SHORT_QUESTION_TEST;
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
|
- EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
|
- // Since the query's question is broken, the question section of the
|
|
|
|
- // response should be empty.
|
|
|
|
- headerCheck(*parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
|
|
|
|
- QR_FLAG, 0, 0, 0, 0);
|
|
|
|
}
|
|
}
|
|
|
|
|
|
// Query with a broken answer section
|
|
// Query with a broken answer section
|
|
TEST_F(AuthSrvTest, shortAnswer) {
|
|
TEST_F(AuthSrvTest, shortAnswer) {
|
|
- createDataFromFile("shortanswer_fromWire");
|
|
+ SHORT_ANSWER_TEST;
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
|
- EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
|
-
|
|
|
|
- // This is a bogus query, but question section is valid. So the response
|
|
|
|
- // should copy the question section.
|
|
|
|
- headerCheck(*parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
|
|
|
|
- QR_FLAG, 1, 0, 0, 0);
|
|
|
|
-
|
|
|
|
- QuestionIterator qit = parse_message->beginQuestion();
|
|
|
|
- EXPECT_EQ(Name("example.com"), (*qit)->getName());
|
|
|
|
- EXPECT_EQ(RRClass::IN(), (*qit)->getClass());
|
|
|
|
- EXPECT_EQ(RRType::A(), (*qit)->getType());
|
|
|
|
- ++qit;
|
|
|
|
- EXPECT_TRUE(qit == parse_message->endQuestion());
|
|
|
|
}
|
|
}
|
|
|
|
|
|
// Query with unsupported version of EDNS.
|
|
// Query with unsupported version of EDNS.
|
|
TEST_F(AuthSrvTest, ednsBadVers) {
|
|
TEST_F(AuthSrvTest, ednsBadVers) {
|
|
- createDataFromFile("queryBadEDNS_fromWire");
|
|
+ EDNS_BADVERS_TEST;
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
|
- EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
|
-
|
|
|
|
- // The response must have an EDNS OPT RR in the additional section.
|
|
|
|
- // Note that the DNSSEC DO bit is cleared even if this bit in the query
|
|
|
|
- // is set. This is a limitation of the current implementation.
|
|
|
|
- headerCheck(*parse_message, default_qid, Rcode::BADVERS(), opcode.getCode(),
|
|
|
|
- QR_FLAG, 1, 0, 0, 1);
|
|
|
|
- EXPECT_EQ(4096, parse_message->getUDPSize());
|
|
|
|
- EXPECT_FALSE(parse_message->isDNSSECSupported());
|
|
|
|
}
|
|
}
|
|
|
|
|
|
TEST_F(AuthSrvTest, AXFROverUDP) {
|
|
TEST_F(AuthSrvTest, AXFROverUDP) {
|
|
- // AXFR over UDP is invalid and should result in FORMERR.
|
|
+ AXFR_OVER_UDP_TEST;
|
|
- UnitTestUtil::createRequestMessage(request_message, opcode, default_qid,
|
|
|
|
- Name("example.com"), RRClass::IN(),
|
|
|
|
- RRType::AXFR());
|
|
|
|
- createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
|
- EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
|
- headerCheck(*parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
|
|
|
|
- QR_FLAG, 1, 0, 0, 0);
|
|
|
|
}
|
|
}
|
|
|
|
|
|
TEST_F(AuthSrvTest, AXFRSuccess) {
|
|
TEST_F(AuthSrvTest, AXFRSuccess) {
|
|
@@ -318,7 +98,7 @@ TEST_F(AuthSrvTest, AXFRSuccess) {
|
|
// so we shouldn't have to respond.
|
|
// so we shouldn't have to respond.
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
EXPECT_FALSE(dnsserv.hasAnswer());
|
|
EXPECT_FALSE(dnsserv.hasAnswer());
|
|
- EXPECT_FALSE(xfrout.isConnected());
|
|
+ EXPECT_TRUE(xfrout.isConnected());
|
|
}
|
|
}
|
|
|
|
|
|
TEST_F(AuthSrvTest, AXFRConnectFail) {
|
|
TEST_F(AuthSrvTest, AXFRConnectFail) {
|
|
@@ -331,8 +111,6 @@ TEST_F(AuthSrvTest, AXFRConnectFail) {
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
headerCheck(*parse_message, default_qid, Rcode::SERVFAIL(),
|
|
headerCheck(*parse_message, default_qid, Rcode::SERVFAIL(),
|
|
opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
|
|
opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
|
|
- // For a shot term workaround with xfrout we currently close the connection
|
|
|
|
- // for each AXFR attempt
|
|
|
|
EXPECT_FALSE(xfrout.isConnected());
|
|
EXPECT_FALSE(xfrout.isConnected());
|
|
}
|
|
}
|
|
|
|
|
|
@@ -343,7 +121,7 @@ TEST_F(AuthSrvTest, AXFRSendFail) {
|
|
Name("example.com"), RRClass::IN(), RRType::AXFR());
|
|
Name("example.com"), RRClass::IN(), RRType::AXFR());
|
|
createRequestPacket(request_message, IPPROTO_TCP);
|
|
createRequestPacket(request_message, IPPROTO_TCP);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
- EXPECT_FALSE(xfrout.isConnected()); // see above
|
|
+ EXPECT_TRUE(xfrout.isConnected());
|
|
|
|
|
|
xfrout.disableSend();
|
|
xfrout.disableSend();
|
|
parse_message->clear(Message::PARSE);
|
|
parse_message->clear(Message::PARSE);
|
|
@@ -380,7 +158,7 @@ TEST_F(AuthSrvTest, AXFRDisconnectFail) {
|
|
TEST_F(AuthSrvTest, notify) {
|
|
TEST_F(AuthSrvTest, notify) {
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
Name("example.com"), RRClass::IN(), RRType::SOA());
|
|
Name("example.com"), RRClass::IN(), RRType::SOA());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
@@ -412,7 +190,7 @@ TEST_F(AuthSrvTest, notifyForCHClass) {
|
|
// Same as the previous test, but for the CH RRClass.
|
|
// Same as the previous test, but for the CH RRClass.
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
Name("example.com"), RRClass::CH(), RRType::SOA());
|
|
Name("example.com"), RRClass::CH(), RRType::SOA());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
@@ -427,7 +205,8 @@ TEST_F(AuthSrvTest, notifyForCHClass) {
|
|
TEST_F(AuthSrvTest, notifyEmptyQuestion) {
|
|
TEST_F(AuthSrvTest, notifyEmptyQuestion) {
|
|
request_message.clear(Message::RENDER);
|
|
request_message.clear(Message::RENDER);
|
|
request_message.setOpcode(Opcode::NOTIFY());
|
|
request_message.setOpcode(Opcode::NOTIFY());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setRcode(Rcode::NOERROR());
|
|
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
request_message.setQid(default_qid);
|
|
request_message.setQid(default_qid);
|
|
request_message.toWire(request_renderer);
|
|
request_message.toWire(request_renderer);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
@@ -443,7 +222,7 @@ TEST_F(AuthSrvTest, notifyMultiQuestions) {
|
|
// add one more SOA question
|
|
// add one more SOA question
|
|
request_message.addQuestion(Question(Name("example.com"), RRClass::IN(),
|
|
request_message.addQuestion(Question(Name("example.com"), RRClass::IN(),
|
|
RRType::SOA()));
|
|
RRType::SOA()));
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
@@ -454,7 +233,7 @@ TEST_F(AuthSrvTest, notifyMultiQuestions) {
|
|
TEST_F(AuthSrvTest, notifyNonSOAQuestion) {
|
|
TEST_F(AuthSrvTest, notifyNonSOAQuestion) {
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
Name("example.com"), RRClass::IN(), RRType::NS());
|
|
Name("example.com"), RRClass::IN(), RRType::NS());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
@@ -476,7 +255,7 @@ TEST_F(AuthSrvTest, notifyWithoutAA) {
|
|
TEST_F(AuthSrvTest, notifyWithErrorRcode) {
|
|
TEST_F(AuthSrvTest, notifyWithErrorRcode) {
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
Name("example.com"), RRClass::IN(), RRType::SOA());
|
|
Name("example.com"), RRClass::IN(), RRType::SOA());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
request_message.setRcode(Rcode::SERVFAIL());
|
|
request_message.setRcode(Rcode::SERVFAIL());
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
@@ -490,7 +269,7 @@ TEST_F(AuthSrvTest, notifyWithoutSession) {
|
|
|
|
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
Name("example.com"), RRClass::IN(), RRType::SOA());
|
|
Name("example.com"), RRClass::IN(), RRType::SOA());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
|
|
|
// we simply ignore the notify and let it be resent if an internal error
|
|
// we simply ignore the notify and let it be resent if an internal error
|
|
@@ -504,7 +283,7 @@ TEST_F(AuthSrvTest, notifySendFail) {
|
|
|
|
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
Name("example.com"), RRClass::IN(), RRType::SOA());
|
|
Name("example.com"), RRClass::IN(), RRType::SOA());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
|
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
@@ -516,7 +295,7 @@ TEST_F(AuthSrvTest, notifyReceiveFail) {
|
|
|
|
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
Name("example.com"), RRClass::IN(), RRType::SOA());
|
|
Name("example.com"), RRClass::IN(), RRType::SOA());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
EXPECT_FALSE(dnsserv.hasAnswer());
|
|
EXPECT_FALSE(dnsserv.hasAnswer());
|
|
@@ -527,7 +306,7 @@ TEST_F(AuthSrvTest, notifyWithBogusSessionMessage) {
|
|
|
|
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
Name("example.com"), RRClass::IN(), RRType::SOA());
|
|
Name("example.com"), RRClass::IN(), RRType::SOA());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
EXPECT_FALSE(dnsserv.hasAnswer());
|
|
EXPECT_FALSE(dnsserv.hasAnswer());
|
|
@@ -539,7 +318,7 @@ TEST_F(AuthSrvTest, notifyWithSessionMessageError) {
|
|
|
|
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
|
|
Name("example.com"), RRClass::IN(), RRType::SOA());
|
|
Name("example.com"), RRClass::IN(), RRType::SOA());
|
|
- request_message.setHeaderFlag(MessageFlag::AA());
|
|
+ request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
EXPECT_FALSE(dnsserv.hasAnswer());
|
|
EXPECT_FALSE(dnsserv.hasAnswer());
|
|
@@ -566,7 +345,7 @@ TEST_F(AuthSrvTest, updateConfig) {
|
|
// query for existent data in the installed data source. The resulting
|
|
// query for existent data in the installed data source. The resulting
|
|
// response should have the AA flag on, and have an RR in each answer
|
|
// response should have the AA flag on, and have an RR in each answer
|
|
// and authority section.
|
|
// and authority section.
|
|
- createDataFromFile("examplequery_fromWire");
|
|
+ createDataFromFile("examplequery_fromWire.wire");
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
headerCheck(*parse_message, default_qid, Rcode::NOERROR(), opcode.getCode(),
|
|
headerCheck(*parse_message, default_qid, Rcode::NOERROR(), opcode.getCode(),
|
|
@@ -580,7 +359,7 @@ TEST_F(AuthSrvTest, datasourceFail) {
|
|
// tool and the data source itself naively accept it). This will result
|
|
// tool and the data source itself naively accept it). This will result
|
|
// in a SERVFAIL response, and the answer and authority sections should
|
|
// in a SERVFAIL response, and the answer and authority sections should
|
|
// be empty.
|
|
// be empty.
|
|
- createDataFromFile("badExampleQuery_fromWire");
|
|
+ createDataFromFile("badExampleQuery_fromWire.wire");
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
headerCheck(*parse_message, default_qid, Rcode::SERVFAIL(),
|
|
headerCheck(*parse_message, default_qid, Rcode::SERVFAIL(),
|
|
@@ -595,10 +374,20 @@ TEST_F(AuthSrvTest, updateConfigFail) {
|
|
updateConfig(&server, BADCONFIG_TESTDB, false);
|
|
updateConfig(&server, BADCONFIG_TESTDB, false);
|
|
|
|
|
|
// The original data source should still exist.
|
|
// The original data source should still exist.
|
|
- createDataFromFile("examplequery_fromWire");
|
|
+ createDataFromFile("examplequery_fromWire.wire");
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
headerCheck(*parse_message, default_qid, Rcode::NOERROR(), opcode.getCode(),
|
|
headerCheck(*parse_message, default_qid, Rcode::NOERROR(), opcode.getCode(),
|
|
QR_FLAG | AA_FLAG, 1, 1, 1, 0);
|
|
QR_FLAG | AA_FLAG, 1, 1, 1, 0);
|
|
}
|
|
}
|
|
|
|
+
|
|
|
|
+TEST_F(AuthSrvTest, cacheSlots) {
|
|
|
|
+ // simple check for the get/set operations
|
|
|
|
+ server.setCacheSlots(10); // 10 = arbitrary choice
|
|
|
|
+ EXPECT_EQ(10, server.getCacheSlots());
|
|
|
|
+
|
|
|
|
+ // 0 is a valid size
|
|
|
|
+ server.setCacheSlots(0);
|
|
|
|
+ EXPECT_EQ(00, server.getCacheSlots());
|
|
|
|
+}
|
|
}
|
|
}
|