|
@@ -88,7 +88,7 @@ protected:
|
|
|
server.setStatisticsSession(&statistics_session);
|
|
|
}
|
|
|
virtual void processMessage() {
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer,
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
&dnsserv);
|
|
|
}
|
|
|
|
|
@@ -174,7 +174,7 @@ TEST_F(AuthSrvTest, builtInQuery) {
|
|
|
default_qid, Name("version.bind"),
|
|
|
RRClass::CH(), RRType::TXT());
|
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer,
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
&dnsserv);
|
|
|
createBuiltinVersionResponse(default_qid, response_data);
|
|
|
EXPECT_PRED_FORMAT4(UnitTestUtil::matchWireData,
|
|
@@ -286,7 +286,8 @@ TEST_F(AuthSrvTest, AXFRSuccess) {
|
|
|
createRequestPacket(request_message, IPPROTO_TCP);
|
|
|
// On success, the AXFR query has been passed to a separate process,
|
|
|
// so we shouldn't have to respond.
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_FALSE(dnsserv.hasAnswer());
|
|
|
EXPECT_TRUE(xfrout.isConnected());
|
|
|
checkAllRcodeCountersZero();
|
|
@@ -307,7 +308,7 @@ TEST_F(AuthSrvTest, TSIGSigned) {
|
|
|
boost::shared_ptr<TSIGKeyRing> keyring(new TSIGKeyRing);
|
|
|
keyring->add(key);
|
|
|
server.setTSIGKeyRing(&keyring);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer,
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
&dnsserv);
|
|
|
|
|
|
// What did we get?
|
|
@@ -342,7 +343,7 @@ TEST_F(AuthSrvTest, TSIGSignedBadKey) {
|
|
|
// Process the message, but use a different key there
|
|
|
boost::shared_ptr<TSIGKeyRing> keyring(new TSIGKeyRing);
|
|
|
server.setTSIGKeyRing(&keyring);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer,
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
&dnsserv);
|
|
|
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
@@ -377,7 +378,7 @@ TEST_F(AuthSrvTest, TSIGBadSig) {
|
|
|
boost::shared_ptr<TSIGKeyRing> keyring(new TSIGKeyRing);
|
|
|
keyring->add(TSIGKey("key:QkFECg==:hmac-sha1"));
|
|
|
server.setTSIGKeyRing(&keyring);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer,
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
&dnsserv);
|
|
|
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
@@ -415,7 +416,7 @@ TEST_F(AuthSrvTest, TSIGCheckFirst) {
|
|
|
boost::shared_ptr<TSIGKeyRing> keyring(new TSIGKeyRing);
|
|
|
keyring->add(TSIGKey("key:QkFECg==:hmac-sha1"));
|
|
|
server.setTSIGKeyRing(&keyring);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer,
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
&dnsserv);
|
|
|
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
@@ -446,7 +447,8 @@ TEST_F(AuthSrvTest, AXFRConnectFail) {
|
|
|
Name("example.com"), RRClass::IN(),
|
|
|
RRType::AXFR());
|
|
|
createRequestPacket(request_message, IPPROTO_TCP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
headerCheck(*parse_message, default_qid, Rcode::SERVFAIL(),
|
|
|
opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
|
|
@@ -460,7 +462,8 @@ TEST_F(AuthSrvTest, AXFRSendFail) {
|
|
|
Name("example.com"), RRClass::IN(),
|
|
|
RRType::AXFR());
|
|
|
createRequestPacket(request_message, IPPROTO_TCP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_TRUE(xfrout.isConnected());
|
|
|
|
|
|
xfrout.disableSend();
|
|
@@ -470,7 +473,8 @@ TEST_F(AuthSrvTest, AXFRSendFail) {
|
|
|
Name("example.com"), RRClass::IN(),
|
|
|
RRType::AXFR());
|
|
|
createRequestPacket(request_message, IPPROTO_TCP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
headerCheck(*parse_message, default_qid, Rcode::SERVFAIL(),
|
|
|
opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
|
|
@@ -488,8 +492,8 @@ TEST_F(AuthSrvTest, AXFRDisconnectFail) {
|
|
|
Name("example.com"), RRClass::IN(),
|
|
|
RRType::AXFR());
|
|
|
createRequestPacket(request_message, IPPROTO_TCP);
|
|
|
- EXPECT_THROW(server.processMessage(*io_message, parse_message,
|
|
|
- response_obuffer, &dnsserv),
|
|
|
+ EXPECT_THROW(server.processMessage(*io_message, *parse_message,
|
|
|
+ *response_obuffer, &dnsserv),
|
|
|
XfroutError);
|
|
|
EXPECT_TRUE(xfrout.isConnected());
|
|
|
// XXX: we need to re-enable disconnect. otherwise an exception would be
|
|
@@ -504,7 +508,8 @@ TEST_F(AuthSrvTest, IXFRConnectFail) {
|
|
|
Name("example.com"), RRClass::IN(),
|
|
|
RRType::IXFR());
|
|
|
createRequestPacket(request_message, IPPROTO_TCP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
headerCheck(*parse_message, default_qid, Rcode::SERVFAIL(),
|
|
|
opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
|
|
@@ -518,7 +523,8 @@ TEST_F(AuthSrvTest, IXFRSendFail) {
|
|
|
Name("example.com"), RRClass::IN(),
|
|
|
RRType::IXFR());
|
|
|
createRequestPacket(request_message, IPPROTO_TCP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_TRUE(xfrout.isConnected());
|
|
|
|
|
|
xfrout.disableSend();
|
|
@@ -528,7 +534,8 @@ TEST_F(AuthSrvTest, IXFRSendFail) {
|
|
|
Name("example.com"), RRClass::IN(),
|
|
|
RRType::IXFR());
|
|
|
createRequestPacket(request_message, IPPROTO_TCP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
headerCheck(*parse_message, default_qid, Rcode::SERVFAIL(),
|
|
|
opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
|
|
@@ -546,8 +553,8 @@ TEST_F(AuthSrvTest, IXFRDisconnectFail) {
|
|
|
Name("example.com"), RRClass::IN(),
|
|
|
RRType::IXFR());
|
|
|
createRequestPacket(request_message, IPPROTO_TCP);
|
|
|
- EXPECT_THROW(server.processMessage(*io_message, parse_message,
|
|
|
- response_obuffer, &dnsserv),
|
|
|
+ EXPECT_THROW(server.processMessage(*io_message, *parse_message,
|
|
|
+ *response_obuffer, &dnsserv),
|
|
|
XfroutError);
|
|
|
EXPECT_TRUE(xfrout.isConnected());
|
|
|
// XXX: we need to re-enable disconnect. otherwise an exception would be
|
|
@@ -561,7 +568,8 @@ TEST_F(AuthSrvTest, notify) {
|
|
|
RRClass::IN(), RRType::SOA());
|
|
|
request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
|
|
|
// An internal command message should have been created and sent to an
|
|
@@ -596,7 +604,8 @@ TEST_F(AuthSrvTest, notifyForCHClass) {
|
|
|
RRClass::CH(), RRType::SOA());
|
|
|
request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
|
|
|
// Other conditions should be the same, so simply confirm the RR class is
|
|
@@ -614,7 +623,8 @@ TEST_F(AuthSrvTest, notifyEmptyQuestion) {
|
|
|
request_message.setQid(default_qid);
|
|
|
request_message.toWire(request_renderer);
|
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
headerCheck(*parse_message, default_qid, Rcode::FORMERR(),
|
|
|
Opcode::NOTIFY().getCode(), QR_FLAG, 0, 0, 0, 0);
|
|
@@ -629,7 +639,8 @@ TEST_F(AuthSrvTest, notifyMultiQuestions) {
|
|
|
RRType::SOA()));
|
|
|
request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
headerCheck(*parse_message, default_qid, Rcode::FORMERR(),
|
|
|
Opcode::NOTIFY().getCode(), QR_FLAG, 2, 0, 0, 0);
|
|
@@ -641,7 +652,8 @@ TEST_F(AuthSrvTest, notifyNonSOAQuestion) {
|
|
|
RRClass::IN(), RRType::NS());
|
|
|
request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
headerCheck(*parse_message, default_qid, Rcode::FORMERR(),
|
|
|
Opcode::NOTIFY().getCode(), QR_FLAG, 1, 0, 0, 0);
|
|
@@ -653,7 +665,8 @@ TEST_F(AuthSrvTest, notifyWithoutAA) {
|
|
|
default_qid, Name("example.com"),
|
|
|
RRClass::IN(), RRType::SOA());
|
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
headerCheck(*parse_message, default_qid, Rcode::NOERROR(),
|
|
|
Opcode::NOTIFY().getCode(), QR_FLAG | AA_FLAG, 1, 0, 0, 0);
|
|
@@ -666,7 +679,8 @@ TEST_F(AuthSrvTest, notifyWithErrorRcode) {
|
|
|
request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
|
request_message.setRcode(Rcode::SERVFAIL());
|
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
headerCheck(*parse_message, default_qid, Rcode::NOERROR(),
|
|
|
Opcode::NOTIFY().getCode(), QR_FLAG | AA_FLAG, 1, 0, 0, 0);
|
|
@@ -683,7 +697,8 @@ TEST_F(AuthSrvTest, notifyWithoutSession) {
|
|
|
|
|
|
// we simply ignore the notify and let it be resent if an internal error
|
|
|
// happens.
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_FALSE(dnsserv.hasAnswer());
|
|
|
}
|
|
|
|
|
@@ -696,7 +711,8 @@ TEST_F(AuthSrvTest, notifySendFail) {
|
|
|
request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_FALSE(dnsserv.hasAnswer());
|
|
|
}
|
|
|
|
|
@@ -708,7 +724,8 @@ TEST_F(AuthSrvTest, notifyReceiveFail) {
|
|
|
RRClass::IN(), RRType::SOA());
|
|
|
request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_FALSE(dnsserv.hasAnswer());
|
|
|
}
|
|
|
|
|
@@ -720,7 +737,8 @@ TEST_F(AuthSrvTest, notifyWithBogusSessionMessage) {
|
|
|
RRClass::IN(), RRType::SOA());
|
|
|
request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_FALSE(dnsserv.hasAnswer());
|
|
|
}
|
|
|
|
|
@@ -733,7 +751,8 @@ TEST_F(AuthSrvTest, notifyWithSessionMessageError) {
|
|
|
RRClass::IN(), RRType::SOA());
|
|
|
request_message.setHeaderFlag(Message::HEADERFLAG_AA);
|
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_FALSE(dnsserv.hasAnswer());
|
|
|
}
|
|
|
|
|
@@ -759,7 +778,8 @@ TEST_F(AuthSrvTest, updateConfig) {
|
|
|
// response should have the AA flag on, and have an RR in each answer
|
|
|
// and authority section.
|
|
|
createDataFromFile("examplequery_fromWire.wire");
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
headerCheck(*parse_message, default_qid, Rcode::NOERROR(), opcode.getCode(),
|
|
|
QR_FLAG | AA_FLAG, 1, 1, 1, 0);
|
|
@@ -773,7 +793,8 @@ TEST_F(AuthSrvTest, datasourceFail) {
|
|
|
// in a SERVFAIL response, and the answer and authority sections should
|
|
|
// be empty.
|
|
|
createDataFromFile("badExampleQuery_fromWire.wire");
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
headerCheck(*parse_message, default_qid, Rcode::SERVFAIL(),
|
|
|
opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
|
|
@@ -788,7 +809,8 @@ TEST_F(AuthSrvTest, updateConfigFail) {
|
|
|
|
|
|
// The original data source should still exist.
|
|
|
createDataFromFile("examplequery_fromWire.wire");
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
headerCheck(*parse_message, default_qid, Rcode::NOERROR(), opcode.getCode(),
|
|
|
QR_FLAG | AA_FLAG, 1, 1, 1, 0);
|
|
@@ -808,7 +830,7 @@ TEST_F(AuthSrvTest, updateWithInMemoryClient) {
|
|
|
|
|
|
// The memory data source is empty, should return REFUSED rcode.
|
|
|
createDataFromFile("examplequery_fromWire.wire");
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer,
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
&dnsserv);
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
headerCheck(*parse_message, default_qid, Rcode::REFUSED(),
|
|
@@ -825,7 +847,7 @@ TEST_F(AuthSrvTest, queryWithInMemoryClientNoDNSSEC) {
|
|
|
EXPECT_EQ(1, server.getInMemoryClient(rrclass)->getZoneCount());
|
|
|
|
|
|
createDataFromFile("nsec3query_nodnssec_fromWire.wire");
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer,
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
&dnsserv);
|
|
|
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
@@ -842,7 +864,7 @@ TEST_F(AuthSrvTest, queryWithInMemoryClientDNSSEC) {
|
|
|
EXPECT_EQ(1, server.getInMemoryClient(rrclass)->getZoneCount());
|
|
|
|
|
|
createDataFromFile("nsec3query_fromWire.wire");
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer,
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
&dnsserv);
|
|
|
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
@@ -860,7 +882,7 @@ TEST_F(AuthSrvTest, chQueryWithInMemoryClient) {
|
|
|
default_qid, Name("version.bind"),
|
|
|
RRClass::CH(), RRType::TXT());
|
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer,
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
&dnsserv);
|
|
|
EXPECT_TRUE(dnsserv.hasAnswer());
|
|
|
headerCheck(*parse_message, default_qid, Rcode::NOERROR(),
|
|
@@ -886,7 +908,7 @@ TEST_F(AuthSrvTest, queryCounterUDPNormal) {
|
|
|
default_qid, Name("example.com"),
|
|
|
RRClass::IN(), RRType::NS());
|
|
|
createRequestPacket(request_message, IPPROTO_UDP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer,
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
&dnsserv);
|
|
|
// After processing UDP query, the counter should be 1.
|
|
|
EXPECT_EQ(1, server.getCounter(AuthCounters::SERVER_UDP_QUERY));
|
|
@@ -905,7 +927,7 @@ TEST_F(AuthSrvTest, queryCounterTCPNormal) {
|
|
|
default_qid, Name("example.com"),
|
|
|
RRClass::IN(), RRType::NS());
|
|
|
createRequestPacket(request_message, IPPROTO_TCP);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer,
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
&dnsserv);
|
|
|
// After processing TCP query, the counter should be 1.
|
|
|
EXPECT_EQ(1, server.getCounter(AuthCounters::SERVER_TCP_QUERY));
|
|
@@ -924,7 +946,8 @@ TEST_F(AuthSrvTest, queryCounterTCPAXFR) {
|
|
|
createRequestPacket(request_message, IPPROTO_TCP);
|
|
|
// On success, the AXFR query has been passed to a separate process,
|
|
|
// so auth itself shouldn't respond.
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_FALSE(dnsserv.hasAnswer());
|
|
|
// After processing TCP AXFR query, the counter should be 1.
|
|
|
EXPECT_EQ(1, server.getCounter(AuthCounters::SERVER_TCP_QUERY));
|
|
@@ -941,7 +964,8 @@ TEST_F(AuthSrvTest, queryCounterTCPIXFR) {
|
|
|
createRequestPacket(request_message, IPPROTO_TCP);
|
|
|
// On success, the IXFR query has been passed to a separate process,
|
|
|
// so auth itself shouldn't respond.
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
|
|
|
+ server.processMessage(*io_message, *parse_message, *response_obuffer,
|
|
|
+ &dnsserv);
|
|
|
EXPECT_FALSE(dnsserv.hasAnswer());
|
|
|
// After processing TCP IXFR query, the counter should be 1.
|
|
|
EXPECT_EQ(1, server.getCounter(AuthCounters::SERVER_TCP_QUERY));
|
|
@@ -962,7 +986,8 @@ TEST_F(AuthSrvTest, queryCounterOpcodes) {
|
|
|
// we intentionally use different values for each code
|
|
|
for (int j = 0; j <= i; ++j) {
|
|
|
parse_message->clear(Message::PARSE);
|
|
|
- server.processMessage(*io_message, parse_message, response_obuffer,
|
|
|
+ server.processMessage(*io_message, *parse_message,
|
|
|
+ *response_obuffer,
|
|
|
&dnsserv);
|
|
|
}
|
|
|
|
|
@@ -1008,8 +1033,8 @@ TEST_F(AuthSrvTest, queryCounterUnexpected) {
|
|
|
request_renderer.getLength(),
|
|
|
getDummyUnknownSocket(), *endpoint);
|
|
|
|
|
|
- EXPECT_THROW(server.processMessage(*io_message, parse_message,
|
|
|
- response_obuffer, &dnsserv),
|
|
|
+ EXPECT_THROW(server.processMessage(*io_message, *parse_message,
|
|
|
+ *response_obuffer, &dnsserv),
|
|
|
isc::Unexpected);
|
|
|
}
|
|
|
|