12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407 |
- # Copyright (C) 2009-2013 Internet Systems Consortium.
- #
- # Permission to use, copy, modify, and distribute this software for any
- # purpose with or without fee is hereby granted, provided that the above
- # copyright notice and this permission notice appear in all copies.
- #
- # THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SYSTEMS CONSORTIUM
- # DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL
- # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL
- # INTERNET SYSTEMS CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT,
- # INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
- # FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
- # NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
- # WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
- import unittest
- import re
- import shutil
- import socket
- import sys
- import io
- from datetime import datetime
- from isc.testutils.tsigctx_mock import MockTSIGContext
- from isc.testutils.ccsession_mock import MockModuleCCSession
- from isc.testutils.rrset_utils import *
- from xfrin import *
- import xfrin
- from isc.xfrin.diff import Diff
- import isc.log
- from isc.server_common.tsig_keyring import init_keyring, get_keyring
- # If we use any python library that is basically a wrapper for
- # a library we use as well (like sqlite3 in our datasources),
- # we must make sure we import ours first; If we have special
- # rpath or libtool rules to pick the correct version, python might
- # choose the wrong one first, if those rules aren't hit first.
- # This would result in missing symbols later.
- import sqlite3
- #
- # Commonly used (mostly constant) test parameters
- #
- TEST_ZONE_NAME_STR = "example.com."
- TEST_ZONE_NAME = Name(TEST_ZONE_NAME_STR)
- TEST_RRCLASS = RRClass.IN
- TEST_RRCLASS_STR = 'IN'
- TEST_DB_FILE = 'db_file'
- TEST_MASTER_IPV4_ADDRESS = '127.0.0.1'
- TEST_MASTER_IPV4_ADDRINFO = (socket.AF_INET, socket.SOCK_STREAM,
- (TEST_MASTER_IPV4_ADDRESS, 53))
- TEST_MASTER_IPV6_ADDRESS = '::1'
- TEST_MASTER_IPV6_ADDRINFO = (socket.AF_INET6, socket.SOCK_STREAM,
- (TEST_MASTER_IPV6_ADDRESS, 53))
- TESTDATA_SRCDIR = os.getenv("TESTDATASRCDIR")
- TESTDATA_OBJDIR = os.getenv("TESTDATAOBJDIR")
- # XXX: This should be a non priviledge port that is unlikely to be used.
- # If some other process uses this port test will fail.
- TEST_MASTER_PORT = '53535'
- TSIG_KEY = TSIGKey("example.com:SFuWd/q99SzF8Yzd1QbB9g==")
- # SOA intended to be used for the new SOA as a result of transfer.
- soa_rdata = Rdata(RRType.SOA, TEST_RRCLASS,
- 'master.example.com. admin.example.com. ' +
- '1234 3600 1800 2419200 7200')
- soa_rrset = RRset(TEST_ZONE_NAME, TEST_RRCLASS, RRType.SOA, RRTTL(3600))
- soa_rrset.add_rdata(soa_rdata)
- # SOA intended to be used for the current SOA at the secondary side.
- # Note that its serial is smaller than that of soa_rdata.
- begin_soa_rdata = Rdata(RRType.SOA, TEST_RRCLASS,
- 'master.example.com. admin.example.com. ' +
- '1230 3600 1800 2419200 7200')
- begin_soa_rrset = RRset(TEST_ZONE_NAME, TEST_RRCLASS, RRType.SOA, RRTTL(3600))
- begin_soa_rrset.add_rdata(begin_soa_rdata)
- example_axfr_question = Question(TEST_ZONE_NAME, TEST_RRCLASS, RRType.AXFR)
- example_soa_question = Question(TEST_ZONE_NAME, TEST_RRCLASS, RRType.SOA)
- default_questions = [example_axfr_question]
- default_answers = [soa_rrset]
- def get_fake_time_time():
- '''Returns a temporary replacement function for time.time(), which
- always returns 0.1 more than the previous call. This is to make
- sure these tests do not fail on systems where the time.time()
- function has a high minimal accuracy.
- This fake time.time() is usually set in place of the real one
- where we need testing of get_running_time(). It is done is
- as low a scope as possible, so as not to mess up unit test
- framework time related tests. It must be set before
- XfrinTransferState (or any class that initializes that) is
- initialized.
- And every time it is set up, in must be reset later (again, so
- as not to mess up the framework's concept of time).
- '''
- fake_time = 0.0
- def fake_time_time():
- nonlocal fake_time
- fake_time += 0.1
- return fake_time
- return fake_time_time
- def check_diffs(assert_fn, expected, actual):
- '''A helper function checking the differences made in the XFR session.
- This is expected called from some subclass of unittest.TestCase and
- assert_fn is generally expected to be 'self.assertEqual' of that class.
- '''
- assert_fn(len(expected), len(actual))
- for (diffs_exp, diffs_actual) in zip(expected, actual):
- assert_fn(len(diffs_exp), len(diffs_actual))
- for (diff_exp, diff_actual) in zip(diffs_exp, diffs_actual):
- # operation should match
- assert_fn(diff_exp[0], diff_actual[0])
- # The diff as RRset should be equal (for simplicity we assume
- # all RRsets contain exactly one RDATA)
- assert_fn(diff_exp[1].get_name(), diff_actual[1].get_name())
- assert_fn(diff_exp[1].get_type(), diff_actual[1].get_type())
- assert_fn(diff_exp[1].get_class(), diff_actual[1].get_class())
- assert_fn(diff_exp[1].get_rdata_count(),
- diff_actual[1].get_rdata_count())
- assert_fn(1, diff_exp[1].get_rdata_count())
- assert_fn(diff_exp[1].get_rdata()[0],
- diff_actual[1].get_rdata()[0])
- class XfrinTestException(Exception):
- pass
- class XfrinTestTimeoutException(Exception):
- pass
- class MockCC(MockModuleCCSession):
- def get_default_value(self, identifier):
- # The returned values should be identical to the spec file
- # XXX: these should be retrieved from the spec file
- # (see MyCCSession of xfrout_test.py.in)
- if identifier == "zones/master_port":
- return TEST_MASTER_PORT
- if identifier == "zones/class":
- return TEST_RRCLASS_STR
- if identifier == "zones/use_ixfr":
- return False
- def add_remote_config_by_name(self, name, callback):
- pass
- def get_remote_config_value(self, module, identifier):
- if module == 'tsig_keys' and identifier == 'keys':
- return (['example.com.key.:EvAAsfU2h7uofnmqaTCrhHunGsc='], True)
- else:
- raise Exception('MockCC requested for unknown config value ' +
- + module + "/" + identifier)
- def remove_remote_config(self, module_name):
- pass
- class MockRRsetCollection:
- '''
- A mock RRset collection. We don't use it really (we mock the method that
- it is passed to too), so it's empty.
- '''
- pass
- class MockDataSourceClient():
- '''A simple mock data source client.
- This class provides a minimal set of wrappers related the data source
- API that would be used by Diff objects. For our testing purposes they
- only keep track of the history of the changes.
- '''
- def __init__(self):
- self.force_fail = False # if True, raise an exception on commit
- self.committed_diffs = []
- self.diffs = []
- def get_class(self):
- '''Mock version of get_class().
- We simply return the commonly used constant RR class. If and when
- we use this mock for a different RR class we need to adjust it
- accordingly.
- '''
- return TEST_RRCLASS
- def find_zone(self, zone_name):
- '''Mock version of find_zone().
- It returns itself (subsequently acting as a mock ZoneFinder) for
- some test zone names. For some others it returns either NOTFOUND
- or PARTIALMATCH.
- '''
- if zone_name == TEST_ZONE_NAME or \
- zone_name == Name('no-soa.example') or \
- zone_name == Name('dup-soa.example'):
- return (isc.datasrc.DataSourceClient.SUCCESS, self)
- elif zone_name == Name('no-such-zone.example'):
- return (DataSourceClient.NOTFOUND, None)
- elif zone_name == Name('partial-match-zone.example'):
- return (DataSourceClient.PARTIALMATCH, self)
- raise ValueError('Unexpected input to mock client: bug in test case?')
- def find(self, name, rrtype, options=ZoneFinder.FIND_DEFAULT):
- '''Mock ZoneFinder.find().
- It returns the predefined SOA RRset to queries for SOA of the common
- test zone name. It also emulates some unusual cases for special
- zone names.
- '''
- if name == TEST_ZONE_NAME and rrtype == RRType.SOA:
- return (ZoneFinder.SUCCESS, begin_soa_rrset, 0)
- if name == Name('no-soa.example'):
- return (ZoneFinder.NXDOMAIN, None, 0)
- if name == Name('dup-soa.example'):
- dup_soa_rrset = RRset(name, TEST_RRCLASS, RRType.SOA, RRTTL(0))
- dup_soa_rrset.add_rdata(begin_soa_rdata)
- dup_soa_rrset.add_rdata(soa_rdata)
- return (ZoneFinder.SUCCESS, dup_soa_rrset, 0)
- raise ValueError('Unexpected input to mock finder: bug in test case?')
- def get_updater(self, zone_name, replace, journaling=False):
- self._journaling_enabled = journaling
- return self
- def get_rrset_collection(self):
- '''
- Pretend to be a zone updater and provide a (dummy) rrset collection.
- '''
- return MockRRsetCollection()
- def add_rrset(self, rrset):
- self.diffs.append(('add', rrset))
- def delete_rrset(self, rrset):
- self.diffs.append(('delete', rrset))
- def commit(self):
- if self.force_fail:
- raise isc.datasrc.Error('Updater.commit() failed')
- self.committed_diffs.append(self.diffs)
- self.diffs = []
- def create_zone(self, zone_name):
- # pretend it just succeeds
- pass
- class MockXfrin(Xfrin):
- # This is a class attribute of a callable object that specifies a non
- # default behavior triggered in _cc_check_command(). Specific test methods
- # are expected to explicitly set this attribute before creating a
- # MockXfrin object (when it needs a non default behavior).
- # See the TestMain class.
- check_command_hook = None
- def _cc_setup(self):
- self._tsig_key = None
- self._module_cc = MockCC()
- init_keyring(self._module_cc)
- pass
- def _get_db_file(self):
- pass
- def _cc_check_command(self):
- self._shutdown_event.set()
- if MockXfrin.check_command_hook:
- MockXfrin.check_command_hook()
- def xfrin_start(self, zone_name, rrclass, db_file, master_addrinfo,
- tsig_key, request_type, check_soa=True):
- # store some of the arguments for verification, then call this
- # method in the superclass
- self.xfrin_started_master_addr = master_addrinfo[2][0]
- self.xfrin_started_master_port = master_addrinfo[2][1]
- self.xfrin_started_request_type = request_type
- return Xfrin.xfrin_start(self, zone_name, rrclass, None,
- master_addrinfo, tsig_key,
- request_type, check_soa)
- class MockXfrinConnection(XfrinConnection):
- def __init__(self, sock_map, zone_name, rrclass, datasrc_client,
- shutdown_event, master_addr, tsig_key=None):
- super().__init__(sock_map, zone_name, rrclass, MockDataSourceClient(),
- shutdown_event, master_addr, TEST_DB_FILE)
- self.query_data = b''
- self.reply_data = b''
- self.force_time_out = False
- self.force_close = False
- self.qlen = None
- self.qid = None
- self.response_generator = None
- def _asyncore_loop(self):
- if self.force_close:
- self.handle_close()
- elif not self.force_time_out:
- self.handle_read()
- def connect_to_master(self):
- return True
- def recv(self, size):
- data = self.reply_data[:size]
- self.reply_data = self.reply_data[size:]
- if len(data) == 0:
- raise XfrinTestTimeoutException('Emulated timeout')
- if len(data) < size:
- raise XfrinTestException('cannot get reply data (' + str(size) +
- ' bytes)')
- return data
- def send(self, data):
- if self.qlen != None and len(self.query_data) >= self.qlen:
- # This is a new query. reset the internal state.
- self.qlen = None
- self.qid = None
- self.query_data = b''
- self.query_data += data
- # when the outgoing data is sufficiently large to contain the length
- # and the QID fields (4 octets or more), extract these fields.
- # The length will be reset the internal query data to support multiple
- # queries in a single test.
- # The QID will be used to construct a matching response.
- if len(self.query_data) >= 4 and self.qid == None:
- self.qlen = socket.htons(struct.unpack('H',
- self.query_data[0:2])[0])
- self.qid = socket.htons(struct.unpack('H', self.query_data[2:4])[0])
- # if the response generator method is specified, invoke it now.
- if self.response_generator != None:
- self.response_generator()
- return len(data)
- def create_response_data(self, response=True, auth=True, bad_qid=False,
- rcode=Rcode.NOERROR,
- questions=default_questions,
- answers=default_answers,
- authorities=[],
- tsig_ctx=None):
- resp = Message(Message.RENDER)
- qid = self.qid
- if bad_qid:
- qid += 1
- resp.set_qid(qid)
- resp.set_opcode(Opcode.QUERY)
- resp.set_rcode(rcode)
- if response:
- resp.set_header_flag(Message.HEADERFLAG_QR)
- if auth:
- resp.set_header_flag(Message.HEADERFLAG_AA)
- [resp.add_question(q) for q in questions]
- [resp.add_rrset(Message.SECTION_ANSWER, a) for a in answers]
- [resp.add_rrset(Message.SECTION_AUTHORITY, a) for a in authorities]
- renderer = MessageRenderer()
- if tsig_ctx is not None:
- resp.to_wire(renderer, tsig_ctx)
- else:
- resp.to_wire(renderer)
- reply_data = struct.pack('H', socket.htons(renderer.get_length()))
- reply_data += renderer.get_data()
- return reply_data
- class TestXfrinState(unittest.TestCase):
- def setUp(self):
- self.sock_map = {}
- self.conn = MockXfrinConnection(self.sock_map, TEST_ZONE_NAME,
- TEST_RRCLASS, None, threading.Event(),
- TEST_MASTER_IPV4_ADDRINFO)
- self.conn.init_socket()
- self.begin_soa = RRset(TEST_ZONE_NAME, TEST_RRCLASS, RRType.SOA,
- RRTTL(3600))
- self.begin_soa.add_rdata(Rdata(RRType.SOA, TEST_RRCLASS,
- 'm. r. 1230 0 0 0 0'))
- self.ns_rrset = RRset(TEST_ZONE_NAME, TEST_RRCLASS, RRType.NS,
- RRTTL(3600))
- self.ns_rrset.add_rdata(Rdata(RRType.NS, TEST_RRCLASS,
- 'ns.example.com.'))
- self.a_rrset = RRset(TEST_ZONE_NAME, TEST_RRCLASS, RRType.A,
- RRTTL(3600))
- self.a_rrset.add_rdata(Rdata(RRType.A, TEST_RRCLASS, '192.0.2.1'))
- self.conn._datasrc_client = MockDataSourceClient()
- self.conn._diff = Diff(self.conn._datasrc_client, TEST_ZONE_NAME)
- class TestXfrinStateBase(TestXfrinState):
- def setUp(self):
- super().setUp()
- def test_handle_rr_on_base(self):
- # The base version of handle_rr() isn't supposed to be called
- # directly (the argument doesn't matter in this test)
- self.assertRaises(XfrinException, XfrinState().handle_rr, None)
- class TestXfrinInitialSOA(TestXfrinState):
- def setUp(self):
- super().setUp()
- self.state = XfrinInitialSOA()
- def test_handle_rr(self):
- # normal case
- self.assertTrue(self.state.handle_rr(self.conn, soa_rrset))
- self.assertEqual(type(XfrinFirstData()),
- type(self.conn.get_xfrstate()))
- self.assertEqual(1234, self.conn._end_serial.get_value())
- def test_handle_not_soa(self):
- # The given RR is not of SOA
- self.assertRaises(XfrinProtocolError, self.state.handle_rr, self.conn,
- self.ns_rrset)
- def test_handle_ixfr_uptodate(self):
- self.conn._request_type = RRType.IXFR
- self.conn._request_serial = isc.dns.Serial(1234) # same as soa_rrset
- self.assertTrue(self.state.handle_rr(self.conn, soa_rrset))
- self.assertEqual(type(XfrinIXFRUptodate()),
- type(self.conn.get_xfrstate()))
- def test_handle_ixfr_uptodate2(self):
- self.conn._request_type = RRType.IXFR
- self.conn._request_serial = isc.dns.Serial(1235) # > soa_rrset
- self.assertTrue(self.state.handle_rr(self.conn, soa_rrset))
- self.assertEqual(type(XfrinIXFRUptodate()),
- type(self.conn.get_xfrstate()))
- def test_handle_ixfr_uptodate3(self):
- # Similar to the previous case, but checking serial number arithmetic
- # comparison
- self.conn._request_type = RRType.IXFR
- self.conn._request_serial = isc.dns.Serial(0xffffffff)
- self.assertTrue(self.state.handle_rr(self.conn, soa_rrset))
- self.assertEqual(type(XfrinFirstData()),
- type(self.conn.get_xfrstate()))
- def test_handle_axfr_uptodate(self):
- # "request serial" should matter only for IXFR
- self.conn._request_type = RRType.AXFR
- self.conn._request_serial = isc.dns.Serial(1234) # same as soa_rrset
- self.assertTrue(self.state.handle_rr(self.conn, soa_rrset))
- self.assertEqual(type(XfrinFirstData()),
- type(self.conn.get_xfrstate()))
- def test_finish_message(self):
- self.assertTrue(self.state.finish_message(self.conn))
- class TestXfrinFirstData(TestXfrinState):
- def setUp(self):
- super().setUp()
- self.state = XfrinFirstData()
- self.conn._request_type = RRType.IXFR
- # arbitrary chosen serial < 1234:
- self.conn._request_serial = isc.dns.Serial(1230)
- self.conn._diff = None # should be replaced in the AXFR case
- def test_handle_ixfr_begin_soa(self):
- self.conn._request_type = RRType.IXFR
- self.assertFalse(self.state.handle_rr(self.conn, self.begin_soa))
- self.assertEqual(type(XfrinIXFRDeleteSOA()),
- type(self.conn.get_xfrstate()))
- def test_handle_axfr(self):
- # If the original type is AXFR, other conditions aren't considered,
- # and AXFR processing will continue
- self.conn._request_type = RRType.AXFR
- self.assertFalse(self.state.handle_rr(self.conn, self.begin_soa))
- self.assertEqual(type(XfrinAXFR()), type(self.conn.get_xfrstate()))
- def test_handle_ixfr_to_axfr(self):
- # Detecting AXFR-compatible IXFR response by seeing a non SOA RR after
- # the initial SOA. Should switch to AXFR.
- self.assertFalse(self.state.handle_rr(self.conn, self.ns_rrset))
- self.assertEqual(type(XfrinAXFR()), type(self.conn.get_xfrstate()))
- # The Diff for AXFR should be created at this point
- self.assertNotEqual(None, self.conn._diff)
- def test_handle_ixfr_to_axfr_by_different_soa(self):
- # An unusual case: Response contains two consecutive SOA but the
- # serial of the second does not match the requested one. See
- # the documentation for XfrinFirstData.handle_rr().
- self.assertFalse(self.state.handle_rr(self.conn, soa_rrset))
- self.assertEqual(type(XfrinAXFR()), type(self.conn.get_xfrstate()))
- self.assertNotEqual(None, self.conn._diff)
- def test_finish_message(self):
- self.assertTrue(self.state.finish_message(self.conn))
- class TestXfrinIXFRDeleteSOA(TestXfrinState):
- def setUp(self):
- super().setUp()
- self.state = XfrinIXFRDeleteSOA()
- # In this state a new Diff object is expected to be created. To
- # confirm it, we nullify it beforehand.
- self.conn._diff = None
- def test_handle_rr(self):
- self.assertTrue(self.state.handle_rr(self.conn, self.begin_soa))
- self.assertEqual(type(XfrinIXFRDelete()),
- type(self.conn.get_xfrstate()))
- self.assertEqual([('delete', self.begin_soa)],
- self.conn._diff.get_buffer())
- def test_handle_non_soa(self):
- self.assertRaises(XfrinException, self.state.handle_rr, self.conn,
- self.ns_rrset)
- def test_finish_message(self):
- self.assertTrue(self.state.finish_message(self.conn))
- class TestXfrinIXFRDelete(TestXfrinState):
- def setUp(self):
- super().setUp()
- # We need record the state in 'conn' to check the case where the
- # state doesn't change.
- XfrinIXFRDelete().set_xfrstate(self.conn, XfrinIXFRDelete())
- self.state = self.conn.get_xfrstate()
- def test_handle_delete_rr(self):
- # Non SOA RRs are simply (goting to be) deleted in this state
- self.assertTrue(self.state.handle_rr(self.conn, self.ns_rrset))
- self.assertEqual([('delete', self.ns_rrset)],
- self.conn._diff.get_buffer())
- # The state shouldn't change
- self.assertEqual(type(XfrinIXFRDelete()),
- type(self.conn.get_xfrstate()))
- def test_handle_soa(self):
- # SOA in this state means the beginning of added RRs. This SOA
- # should also be added in the next state, so handle_rr() should return
- # false.
- self.assertFalse(self.state.handle_rr(self.conn, soa_rrset))
- self.assertEqual([], self.conn._diff.get_buffer())
- self.assertEqual(1234, self.conn._current_serial.get_value())
- self.assertEqual(type(XfrinIXFRAddSOA()),
- type(self.conn.get_xfrstate()))
- def test_finish_message(self):
- self.assertTrue(self.state.finish_message(self.conn))
- class TestXfrinIXFRAddSOA(TestXfrinState):
- def setUp(self):
- super().setUp()
- self.state = XfrinIXFRAddSOA()
- def test_handle_rr(self):
- self.assertTrue(self.state.handle_rr(self.conn, soa_rrset))
- self.assertEqual(type(XfrinIXFRAdd()), type(self.conn.get_xfrstate()))
- self.assertEqual([('add', soa_rrset)],
- self.conn._diff.get_buffer())
- def test_handle_non_soa(self):
- self.assertRaises(XfrinException, self.state.handle_rr, self.conn,
- self.ns_rrset)
- def test_finish_message(self):
- self.assertTrue(self.state.finish_message(self.conn))
- class TestXfrinIXFRAdd(TestXfrinState):
- def setUp(self):
- super().setUp()
- # We need record the state in 'conn' to check the case where the
- # state doesn't change.
- XfrinIXFRAdd().set_xfrstate(self.conn, XfrinIXFRAdd())
- self.conn._current_serial = isc.dns.Serial(1230)
- self.state = self.conn.get_xfrstate()
- def test_handle_add_rr(self):
- # Non SOA RRs are simply (goting to be) added in this state
- self.assertTrue(self.state.handle_rr(self.conn, self.ns_rrset))
- self.assertEqual([('add', self.ns_rrset)],
- self.conn._diff.get_buffer())
- # The state shouldn't change
- self.assertEqual(type(XfrinIXFRAdd()), type(self.conn.get_xfrstate()))
- def test_handle_end_soa(self):
- self.conn._end_serial = isc.dns.Serial(1234)
- self.conn._diff.add_data(self.ns_rrset) # put some dummy change
- self.assertTrue(self.state.handle_rr(self.conn, soa_rrset))
- self.assertEqual(type(XfrinIXFREnd()), type(self.conn.get_xfrstate()))
- # handle_rr should have caused commit, and the buffer should now be
- # empty.
- self.assertEqual([], self.conn._diff.get_buffer())
- def test_handle_new_delete(self):
- self.conn._end_serial = isc.dns.Serial(1234)
- # SOA RR whose serial is the current one means we are going to a new
- # difference, starting with removing that SOA.
- self.conn._diff.add_data(self.ns_rrset) # put some dummy change
- self.assertFalse(self.state.handle_rr(self.conn, self.begin_soa))
- self.assertEqual([], self.conn._diff.get_buffer())
- self.assertEqual(type(XfrinIXFRDeleteSOA()),
- type(self.conn.get_xfrstate()))
- def test_handle_new_delete_missing_sig(self):
- self.conn._end_serial = isc.dns.Serial(1234)
- # SOA RR whose serial is the current one means we are going to a new
- # difference, starting with removing that SOA.
- self.conn._diff.add_data(self.ns_rrset) # put some dummy change
- self.conn._tsig_ctx = MockTSIGContext(TSIG_KEY)
- self.conn._tsig_ctx.last_had_signature = lambda: False
- # First, push a starting SOA inside. This should be OK, nothing checked
- # yet.
- self.state.handle_rr(self.conn, self.begin_soa)
- end_soa_rdata = Rdata(RRType.SOA, TEST_RRCLASS,
- 'm. r. 1234 0 0 0 0')
- end_soa_rrset = RRset(TEST_ZONE_NAME, TEST_RRCLASS, RRType.SOA,
- RRTTL(3600))
- end_soa_rrset.add_rdata(end_soa_rdata)
- # This would try to finish up. But the TSIG pretends not everything is
- # signed, rejecting it.
- self.assertRaises(xfrin.XfrinProtocolError, self.state.handle_rr,
- self.conn, end_soa_rrset)
- # No diffs were committed
- self.assertEqual([], self.conn._datasrc_client.committed_diffs)
- def test_handle_out_of_sync(self):
- # getting SOA with an inconsistent serial. This is an error.
- self.conn._end_serial = isc.dns.Serial(1235)
- self.assertRaises(XfrinProtocolError, self.state.handle_rr,
- self.conn, soa_rrset)
- def test_finish_message(self):
- self.assertTrue(self.state.finish_message(self.conn))
- class TestXfrinIXFREnd(TestXfrinState):
- def setUp(self):
- super().setUp()
- self.state = XfrinIXFREnd()
- def test_handle_rr(self):
- self.assertRaises(XfrinProtocolError, self.state.handle_rr, self.conn,
- self.ns_rrset)
- def test_finish_message(self):
- self.assertFalse(self.state.finish_message(self.conn))
- class TestXfrinIXFREndUpToDate(TestXfrinState):
- def setUp(self):
- super().setUp()
- self.state = XfrinIXFRUptodate()
- def test_handle_rr(self):
- self.assertRaises(XfrinProtocolError, self.state.handle_rr, self.conn,
- self.ns_rrset)
- def test_finish_message(self):
- self.assertRaises(XfrinZoneUptodate, self.state.finish_message,
- self.conn)
- class TestXfrinAXFR(TestXfrinState):
- def setUp(self):
- super().setUp()
- self.state = XfrinAXFR()
- self.conn._end_serial = isc.dns.Serial(1234)
- def test_handle_rr(self):
- """
- Test we can put data inside.
- """
- # Put some data inside
- self.assertTrue(self.state.handle_rr(self.conn, self.a_rrset))
- # This test uses internal Diff structure to check the behaviour of
- # XfrinAXFR. Maybe there could be a cleaner way, but it would be more
- # complicated.
- self.assertEqual([('add', self.a_rrset)], self.conn._diff.get_buffer())
- # This SOA terminates the transfer
- self.assertTrue(self.state.handle_rr(self.conn, soa_rrset))
- # It should have changed the state
- self.assertEqual(type(XfrinAXFREnd()), type(self.conn.get_xfrstate()))
- # At this point, the data haven't been committed yet
- self.assertEqual([('add', self.a_rrset), ('add', soa_rrset)],
- self.conn._diff.get_buffer())
- def test_handle_rr_mismatch_soa(self):
- """ SOA with inconsistent serial - unexpected, but we accept it.
- """
- self.assertTrue(self.state.handle_rr(self.conn, begin_soa_rrset))
- self.assertEqual(type(XfrinAXFREnd()), type(self.conn.get_xfrstate()))
- def test_finish_message(self):
- """
- Check normal end of message.
- """
- # When a message ends, nothing happens usually
- self.assertTrue(self.state.finish_message(self.conn))
- class TestXfrinAXFREnd(TestXfrinState):
- def setUp(self):
- super().setUp()
- self.state = XfrinAXFREnd()
- def test_handle_rr(self):
- self.assertRaises(XfrinProtocolError, self.state.handle_rr, self.conn,
- self.ns_rrset)
- def test_finish_message(self):
- self.conn._diff.add_data(self.a_rrset)
- self.conn._diff.add_data(soa_rrset)
- self.assertFalse(self.state.finish_message(self.conn))
- # The data should have been committed
- self.assertEqual([], self.conn._diff.get_buffer())
- check_diffs(self.assertEqual, [[('add', self.a_rrset),
- ('add', soa_rrset)]],
- self.conn._datasrc_client.committed_diffs)
- self.assertRaises(ValueError, self.conn._diff.commit)
- class TestXfrinConnection(unittest.TestCase):
- '''Convenient parent class for XFR-protocol tests.
- This class provides common setups and helper methods for protocol related
- tests on AXFR and IXFR.
- '''
- def setUp(self):
- if os.path.exists(TEST_DB_FILE):
- os.remove(TEST_DB_FILE)
- self.sock_map = {}
- self.conn = MockXfrinConnection(self.sock_map, TEST_ZONE_NAME,
- TEST_RRCLASS, None, threading.Event(),
- self._master_addrinfo)
- self.conn.init_socket()
- self.soa_response_params = {
- 'questions': [example_soa_question],
- 'bad_qid': False,
- 'response': True,
- 'auth': True,
- 'rcode': Rcode.NOERROR,
- 'answers': default_answers,
- 'authorities': [],
- 'tsig': False,
- 'axfr_after_soa': self._create_normal_response_data
- }
- self.axfr_response_params = {
- 'question_1st': default_questions,
- 'question_2nd': default_questions,
- 'answer_1st': [soa_rrset, self._create_ns()],
- 'answer_2nd': default_answers,
- 'tsig_1st': None,
- 'tsig_2nd': None
- }
- self.__orig_check_zone = xfrin.check_zone
- xfrin.check_zone = self.__check_zone
- self._check_zone_result = True
- self._check_zone_params = None
- def tearDown(self):
- self.conn.close()
- if os.path.exists(TEST_DB_FILE):
- os.remove(TEST_DB_FILE)
- xfrin.check_zone = self.__orig_check_zone
- @property
- def _master_addrinfo(self):
- return TEST_MASTER_IPV4_ADDRINFO
- def __check_zone(self, name, rrclass, rrsets, callbacks):
- '''
- A mock function used instead of dns.check_zone.
- '''
- self._check_zone_params = (name, rrclass, rrsets, callbacks)
- # Call both callbacks to see they do nothing. This checks
- # the transfer depends on the result only.
- callbacks[0]("Test error")
- callbacks[1]("Test warning")
- return self._check_zone_result
- def _create_normal_response_data(self):
- # This helper method creates a simple sequence of DNS messages that
- # forms a valid AXFR transaction. It consists of two messages: the
- # first one containing SOA, NS, the second containing the trailing SOA.
- question_1st = self.axfr_response_params['question_1st']
- question_2nd = self.axfr_response_params['question_2nd']
- answer_1st = self.axfr_response_params['answer_1st']
- answer_2nd = self.axfr_response_params['answer_2nd']
- tsig_1st = self.axfr_response_params['tsig_1st']
- tsig_2nd = self.axfr_response_params['tsig_2nd']
- self.conn.reply_data = self.conn.create_response_data(
- questions=question_1st, answers=answer_1st,
- tsig_ctx=tsig_1st)
- self.conn.reply_data += \
- self.conn.create_response_data(questions=question_2nd,
- answers=answer_2nd,
- tsig_ctx=tsig_2nd)
- def _create_soa_response_data(self):
- # This helper method creates a DNS message that is supposed to be
- # used a valid response to SOA queries prior to XFR.
- # If tsig is True, it tries to verify the query with a locally
- # created TSIG context (which may or may not succeed) so that the
- # response will include a TSIG.
- # If axfr_after_soa is True, it resets the response_generator so that
- # a valid XFR messages will follow.
- verify_ctx = None
- if self.soa_response_params['tsig']:
- # xfrin (currently) always uses TCP. strip off the length field.
- query_data = self.conn.query_data[2:]
- query_message = Message(Message.PARSE)
- query_message.from_wire(query_data)
- verify_ctx = TSIGContext(TSIG_KEY)
- verify_ctx.verify(query_message.get_tsig_record(), query_data)
- self.conn.reply_data = self.conn.create_response_data(
- bad_qid=self.soa_response_params['bad_qid'],
- response=self.soa_response_params['response'],
- auth=self.soa_response_params['auth'],
- rcode=self.soa_response_params['rcode'],
- questions=self.soa_response_params['questions'],
- answers=self.soa_response_params['answers'],
- authorities=self.soa_response_params['authorities'],
- tsig_ctx=verify_ctx)
- if self.soa_response_params['axfr_after_soa'] != None:
- self.conn.response_generator = \
- self.soa_response_params['axfr_after_soa']
- def _create_broken_response_data(self):
- # This helper method creates a bogus "DNS message" that only contains
- # 4 octets of data. The DNS message parser will raise an exception.
- bogus_data = b'xxxx'
- self.conn.reply_data = struct.pack('H', socket.htons(len(bogus_data)))
- self.conn.reply_data += bogus_data
- def _create_a(self, address):
- rrset = RRset(Name('a.example.com'), TEST_RRCLASS, RRType.A,
- RRTTL(3600))
- rrset.add_rdata(Rdata(RRType.A, TEST_RRCLASS, address))
- return rrset
- def _create_soa(self, serial):
- rrset = RRset(TEST_ZONE_NAME, TEST_RRCLASS, RRType.SOA,
- RRTTL(3600))
- rdata_str = 'm. r. ' + serial + ' 3600 1800 2419200 7200'
- rrset.add_rdata(Rdata(RRType.SOA, TEST_RRCLASS, rdata_str))
- return rrset
- def _create_ns(self, nsname='ns.'+TEST_ZONE_NAME_STR):
- rrset = RRset(TEST_ZONE_NAME, TEST_RRCLASS, RRType.NS, RRTTL(3600))
- rrset.add_rdata(Rdata(RRType.NS, TEST_RRCLASS, nsname))
- return rrset
- def _set_test_zone(self, zone_name):
- '''Set the zone name for transfer to the specified one.
- It also make sure that the SOA RR (if exist) is correctly (re)set.
- '''
- self.conn._zone_name = zone_name
- self.conn._zone_soa = self.conn._get_zone_soa()
- class TestAXFR(TestXfrinConnection):
- def setUp(self):
- # replace time.time with a steadily increasing fake one
- self.orig_time_time = time.time
- time.time = get_fake_time_time()
- super().setUp()
- XfrinInitialSOA().set_xfrstate(self.conn, XfrinInitialSOA())
- def tearDown(self):
- time.time = self.orig_time_time
- super().tearDown()
- def __create_mock_tsig(self, key, error, has_last_signature=True):
- # This helper function creates a MockTSIGContext for a given key
- # and TSIG error to be used as a result of verify (normally faked
- # one)
- mock_ctx = MockTSIGContext(key)
- mock_ctx.error = error
- if not has_last_signature:
- mock_ctx.last_had_signature = lambda: False
- return mock_ctx
- def __match_exception(self, expected_exception, expected_msg, expression):
- # This helper method is a higher-granularity version of assertRaises().
- # If it's not sufficient to check the exception class (e.g., when
- # the same type of exceptions can be thrown from many places), this
- # method can be used to check it with the exception argument.
- try:
- expression()
- except expected_exception as ex:
- self.assertEqual(str(ex), expected_msg)
- else:
- self.assertFalse('exception is expected, but not raised')
- def test_close(self):
- # we shouldn't be using the global asyncore map.
- self.assertEqual(len(asyncore.socket_map), 0)
- # there should be exactly one entry in our local map
- self.assertEqual(len(self.sock_map), 1)
- # once closing the dispatch the map should become empty
- self.conn.close()
- self.assertEqual(len(self.sock_map), 0)
- def test_init_ip6(self):
- # This test simply creates a new XfrinConnection object with an
- # IPv6 address, tries to bind it to an IPv6 wildcard address/port
- # to confirm an AF_INET6 socket has been created. A naive application
- # tends to assume it's IPv4 only and hardcode AF_INET. This test
- # uncovers such a bug.
- c = MockXfrinConnection({}, TEST_ZONE_NAME, TEST_RRCLASS, None,
- threading.Event(), TEST_MASTER_IPV6_ADDRINFO)
- c.init_socket()
- c.bind(('::', 0))
- c.close()
- def test_init_chclass(self):
- c = MockXfrinConnection({}, TEST_ZONE_NAME, RRClass.CH, None,
- threading.Event(), TEST_MASTER_IPV4_ADDRINFO)
- c.init_socket()
- axfrmsg = c._create_query(RRType.AXFR)
- self.assertEqual(axfrmsg.get_question()[0].get_class(),
- RRClass.CH)
- c.close()
- def test_create_query(self):
- def check_query(expected_qtype, expected_auth):
- '''Helper method to repeat the same pattern of tests'''
- self.assertEqual(Opcode.QUERY, msg.get_opcode())
- self.assertEqual(Rcode.NOERROR, msg.get_rcode())
- self.assertEqual(1, msg.get_rr_count(Message.SECTION_QUESTION))
- self.assertEqual(TEST_ZONE_NAME, msg.get_question()[0].get_name())
- self.assertEqual(expected_qtype, msg.get_question()[0].get_type())
- self.assertEqual(0, msg.get_rr_count(Message.SECTION_ANSWER))
- self.assertEqual(0, msg.get_rr_count(Message.SECTION_ADDITIONAL))
- if expected_auth is None:
- self.assertEqual(0,
- msg.get_rr_count(Message.SECTION_AUTHORITY))
- else:
- self.assertEqual(1,
- msg.get_rr_count(Message.SECTION_AUTHORITY))
- auth_rr = msg.get_section(Message.SECTION_AUTHORITY)[0]
- self.assertEqual(expected_auth.get_name(), auth_rr.get_name())
- self.assertEqual(expected_auth.get_type(), auth_rr.get_type())
- self.assertEqual(expected_auth.get_class(),
- auth_rr.get_class())
- # In our test scenario RDATA must be 1
- self.assertEqual(1, expected_auth.get_rdata_count())
- self.assertEqual(1, auth_rr.get_rdata_count())
- self.assertEqual(expected_auth.get_rdata()[0],
- auth_rr.get_rdata()[0])
- # Actual tests start here
- # SOA query
- msg = self.conn._create_query(RRType.SOA)
- check_query(RRType.SOA, None)
- # AXFR query
- msg = self.conn._create_query(RRType.AXFR)
- check_query(RRType.AXFR, None)
- # IXFR query
- msg = self.conn._create_query(RRType.IXFR)
- check_query(RRType.IXFR, begin_soa_rrset)
- self.assertEqual(1230, self.conn._request_serial.get_value())
- def test_create_ixfr_query_fail(self):
- # In these cases _create_query() will fail to find a valid SOA RR to
- # insert in the IXFR query, and should raise an exception.
- self._set_test_zone(Name('no-such-zone.example'))
- self.assertRaises(XfrinException, self.conn._create_query,
- RRType.IXFR)
- self._set_test_zone(Name('partial-match-zone.example'))
- self.assertRaises(XfrinException, self.conn._create_query,
- RRType.IXFR)
- self._set_test_zone(Name('no-soa.example'))
- self.assertRaises(XfrinException, self.conn._create_query,
- RRType.IXFR)
- self._set_test_zone(Name('dup-soa.example'))
- self.conn._zone_soa = self.conn._get_zone_soa()
- self.assertRaises(XfrinException, self.conn._create_query,
- RRType.IXFR)
- def test_send_query(self):
- def message_has_tsig(data):
- # a simple check if the actual data contains a TSIG RR.
- # At our level this simple check should suffice; other detailed
- # tests regarding the TSIG protocol are done in pydnspp.
- msg = Message(Message.PARSE)
- msg.from_wire(data)
- return msg.get_tsig_record() is not None
- # soa request with tsig
- self.conn._tsig_key = TSIG_KEY
- self.conn._send_query(RRType.SOA)
- self.assertTrue(message_has_tsig(self.conn.query_data[2:]))
- # axfr request with tsig
- self.conn._send_query(RRType.AXFR)
- self.assertTrue(message_has_tsig(self.conn.query_data[2:]))
- def test_response_with_invalid_msg(self):
- self.conn.reply_data = b'aaaxxxx'
- self.assertRaises(XfrinTestException,
- self.conn._handle_xfrin_responses)
- def test_response_with_tsigfail(self):
- self.conn._tsig_key = TSIG_KEY
- # server tsig check fail, return with RCODE 9 (NOTAUTH)
- self.conn._send_query(RRType.SOA)
- self.conn.reply_data = \
- self.conn.create_response_data(rcode=Rcode.NOTAUTH)
- self.assertRaises(XfrinProtocolError,
- self.conn._handle_xfrin_responses)
- def test_response_without_end_soa(self):
- self.conn._send_query(RRType.AXFR)
- self.conn.reply_data = self.conn.create_response_data()
- # This should result in timeout in the asyncore loop. We emulate
- # that situation in recv() by emptying the reply data buffer.
- self.assertRaises(XfrinTestTimeoutException,
- self.conn._handle_xfrin_responses)
- def test_response_bad_qid(self):
- self.conn._send_query(RRType.AXFR)
- self.conn.reply_data = self.conn.create_response_data(bad_qid=True)
- self.assertRaises(XfrinProtocolError,
- self.conn._handle_xfrin_responses)
- def test_response_error_code_bad_sig(self):
- self.conn._tsig_key = TSIG_KEY
- self.conn._tsig_ctx_creator = \
- lambda key: self.__create_mock_tsig(key, TSIGError.BAD_SIG)
- self.conn._send_query(RRType.AXFR)
- self.conn.reply_data = self.conn.create_response_data(
- rcode=Rcode.SERVFAIL)
- # xfrin should check TSIG before other part of incoming message
- # validate log message for XfrinException
- self.__match_exception(XfrinProtocolError,
- "TSIG verify fail: BADSIG",
- self.conn._handle_xfrin_responses)
- def test_response_bad_qid_bad_key(self):
- self.conn._tsig_key = TSIG_KEY
- self.conn._tsig_ctx_creator = \
- lambda key: self.__create_mock_tsig(key, TSIGError.BAD_KEY)
- self.conn._send_query(RRType.AXFR)
- self.conn.reply_data = self.conn.create_response_data(bad_qid=True)
- # xfrin should check TSIG before other part of incoming message
- # validate log message for XfrinException
- self.__match_exception(XfrinProtocolError,
- "TSIG verify fail: BADKEY",
- self.conn._handle_xfrin_responses)
- def test_response_non_response(self):
- self.conn._send_query(RRType.AXFR)
- self.conn.reply_data = self.conn.create_response_data(response=False)
- self.assertRaises(XfrinException, self.conn._handle_xfrin_responses)
- def test_response_error_code(self):
- self.conn._send_query(RRType.AXFR)
- self.conn.reply_data = self.conn.create_response_data(
- rcode=Rcode.SERVFAIL)
- self.assertRaises(XfrinProtocolError,
- self.conn._handle_xfrin_responses)
- def test_response_multi_question(self):
- self.conn._send_query(RRType.AXFR)
- self.conn.reply_data = self.conn.create_response_data(
- questions=[example_axfr_question, example_axfr_question])
- self.assertRaises(XfrinProtocolError,
- self.conn._handle_xfrin_responses)
- def test_response_non_response(self):
- self.conn._send_query(RRType.AXFR)
- self.conn.reply_data = self.conn.create_response_data(response = False)
- self.assertRaises(XfrinProtocolError,
- self.conn._handle_xfrin_responses)
- def test_ipver_str(self):
- addrs = (((socket.AF_INET, socket.SOCK_STREAM), 'v4'),
- ((socket.AF_INET6, socket.SOCK_STREAM), 'v6'),
- ((socket.AF_UNIX, socket.SOCK_STREAM), None))
- for (info, ver) in addrs:
- c = MockXfrinConnection({}, TEST_ZONE_NAME, RRClass.CH, None,
- threading.Event(), info)
- c.init_socket()
- if ver is not None:
- self.assertEqual(ver, c._get_ipver_str())
- else:
- self.assertRaises(ValueError, c._get_ipver_str)
- c.close()
- def test_soacheck(self):
- # we need to defer the creation until we know the QID, which is
- # determined in _check_soa_serial(), so we use response_generator.
- self.conn.response_generator = self._create_soa_response_data
- self.assertEqual(self.conn._check_soa_serial(), XFRIN_OK)
- def test_soacheck_with_bad_response(self):
- self.conn.response_generator = self._create_broken_response_data
- self.assertRaises(MessageTooShort, self.conn._check_soa_serial)
- def test_soacheck_badqid(self):
- self.soa_response_params['bad_qid'] = True
- self.conn.response_generator = self._create_soa_response_data
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_bad_qid_bad_sig(self):
- self.conn._tsig_key = TSIG_KEY
- self.conn._tsig_ctx_creator = \
- lambda key: self.__create_mock_tsig(key, TSIGError.BAD_SIG)
- self.soa_response_params['bad_qid'] = True
- self.conn.response_generator = self._create_soa_response_data
- # xfrin should check TSIG before other part of incoming message
- # validate log message for XfrinException
- self.__match_exception(XfrinProtocolError,
- "TSIG verify fail: BADSIG",
- self.conn._check_soa_serial)
- def test_soacheck_non_response(self):
- self.soa_response_params['response'] = False
- self.conn.response_generator = self._create_soa_response_data
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_error_code(self):
- self.soa_response_params['rcode'] = Rcode.SERVFAIL
- self.conn.response_generator = self._create_soa_response_data
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_notauth(self):
- self.soa_response_params['auth'] = False
- self.conn.response_generator = self._create_soa_response_data
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_uptodate(self):
- # Primary's SOA serial is identical the local serial
- self.soa_response_params['answers'] = [begin_soa_rrset]
- self.conn.response_generator = self._create_soa_response_data
- self.assertRaises(XfrinZoneUptodate, self.conn._check_soa_serial)
- def test_soacheck_uptodate2(self):
- # Primary's SOA serial is "smaller" than the local serial
- self.soa_response_params['answers'] = [create_soa(1229)]
- self.conn.response_generator = self._create_soa_response_data
- self.assertRaises(XfrinZoneUptodate, self.conn._check_soa_serial)
- def test_soacheck_uptodate3(self):
- # Similar to the previous case, but checking the comparison is based
- # on the serial number arithmetic.
- self.soa_response_params['answers'] = [create_soa(0xffffffff)]
- self.conn.response_generator = self._create_soa_response_data
- self.assertRaises(XfrinZoneUptodate, self.conn._check_soa_serial)
- def test_soacheck_newzone(self):
- # Primary's SOA is 'old', but this secondary doesn't know anything
- # about the zone yet, so it should accept it.
- def response_generator():
- # _request_serial is set in _check_soa_serial(). Reset it here.
- self.conn._request_serial = None
- self._create_soa_response_data()
- self.soa_response_params['answers'] = [begin_soa_rrset]
- self.conn.response_generator = response_generator
- self.assertEqual(XFRIN_OK, self.conn._check_soa_serial())
- def test_soacheck_question_empty(self):
- self.conn.response_generator = self._create_soa_response_data
- self.soa_response_params['questions'] = []
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_question_name_mismatch(self):
- self.conn.response_generator = self._create_soa_response_data
- self.soa_response_params['questions'] = [Question(Name('example.org'),
- TEST_RRCLASS,
- RRType.SOA)]
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_question_class_mismatch(self):
- self.conn.response_generator = self._create_soa_response_data
- self.soa_response_params['questions'] = [Question(TEST_ZONE_NAME,
- RRClass.CH,
- RRType.SOA)]
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_question_type_mismatch(self):
- self.conn.response_generator = self._create_soa_response_data
- self.soa_response_params['questions'] = [Question(TEST_ZONE_NAME,
- TEST_RRCLASS,
- RRType.AAAA)]
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_no_soa(self):
- # The response just doesn't contain SOA without any other indication
- # of errors.
- self.conn.response_generator = self._create_soa_response_data
- self.soa_response_params['answers'] = []
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_soa_name_mismatch(self):
- self.conn.response_generator = self._create_soa_response_data
- self.soa_response_params['answers'] = [create_soa(1234,
- Name('example.org'))]
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_soa_class_mismatch(self):
- self.conn.response_generator = self._create_soa_response_data
- soa = RRset(TEST_ZONE_NAME, RRClass.CH, RRType.SOA, RRTTL(0))
- soa.add_rdata(Rdata(RRType.SOA, RRClass.CH, 'm. r. 1234 0 0 0 0'))
- self.soa_response_params['answers'] = [soa]
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_multiple_soa(self):
- self.conn.response_generator = self._create_soa_response_data
- self.soa_response_params['answers'] = [soa_rrset, soa_rrset]
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_cname_response(self):
- self.conn.response_generator = self._create_soa_response_data
- # Add SOA to answer, too, to make sure that it that deceives the parser
- self.soa_response_params['answers'] = [soa_rrset, create_cname()]
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_referral_response(self):
- self.conn.response_generator = self._create_soa_response_data
- self.soa_response_params['answers'] = []
- self.soa_response_params['authorities'] = [create_ns('ns.example.com.')]
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_nodata_response(self):
- self.conn.response_generator = self._create_soa_response_data
- self.soa_response_params['answers'] = []
- self.soa_response_params['authorities'] = [soa_rrset]
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_with_tsig(self):
- # Use a mock tsig context emulating a validly signed response
- self.conn._tsig_key = TSIG_KEY
- self.conn._tsig_ctx_creator = \
- lambda key: self.__create_mock_tsig(key, TSIGError.NOERROR)
- self.conn.response_generator = self._create_soa_response_data
- self.assertEqual(self.conn._check_soa_serial(), XFRIN_OK)
- self.assertEqual(self.conn._tsig_ctx.get_error(), TSIGError.NOERROR)
- def test_soacheck_with_tsig_notauth(self):
- # emulate a valid error response
- self.conn._tsig_key = TSIG_KEY
- self.conn._tsig_ctx_creator = \
- lambda key: self.__create_mock_tsig(key, TSIGError.BAD_SIG)
- self.soa_response_params['rcode'] = Rcode.NOTAUTH
- self.conn.response_generator = self._create_soa_response_data
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_with_tsig_noerror_badsig(self):
- self.conn._tsig_key = TSIG_KEY
- self.conn._tsig_ctx_creator = \
- lambda key: self.__create_mock_tsig(key, TSIGError.BAD_SIG)
- # emulate a normal response bad verification failure due to BADSIG.
- # According RFC2845, in this case we should ignore it and keep
- # waiting for a valid response until a timeout. But we immediately
- # treat this as a final failure (just as BIND 9 does).
- self.conn.response_generator = self._create_soa_response_data
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_with_tsig_unsigned_response(self):
- # we can use a real TSIGContext for this. the response doesn't
- # contain a TSIG while we sent a signed query. RFC2845 states
- # we should wait for a valid response in this case, but we treat
- # it as a fatal transaction failure, too.
- self.conn._tsig_key = TSIG_KEY
- self.conn.response_generator = self._create_soa_response_data
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_soacheck_with_unexpected_tsig_response(self):
- # we reject unexpected TSIG in responses (following BIND 9's
- # behavior)
- self.soa_response_params['tsig'] = True
- self.conn.response_generator = self._create_soa_response_data
- self.assertRaises(XfrinProtocolError, self.conn._check_soa_serial)
- def test_response_shutdown(self):
- self.conn.response_generator = self._create_normal_response_data
- self.conn._shutdown_event.set()
- self.conn._send_query(RRType.AXFR)
- self.assertRaises(XfrinException, self.conn._handle_xfrin_responses)
- def test_response_timeout(self):
- self.conn.response_generator = self._create_normal_response_data
- self.conn.force_time_out = True
- self.assertRaises(XfrinException, self.conn._handle_xfrin_responses)
- def test_response_remote_close(self):
- self.conn.response_generator = self._create_normal_response_data
- self.conn.force_close = True
- self.assertRaises(XfrinException, self.conn._handle_xfrin_responses)
- def test_response_bad_message(self):
- self.conn.response_generator = self._create_broken_response_data
- self.conn._send_query(RRType.AXFR)
- self.assertRaises(Exception, self.conn._handle_xfrin_responses)
- def test_axfr_response(self):
- # A simple normal case: AXFR consists of SOA, NS, then trailing SOA.
- self.conn.response_generator = self._create_normal_response_data
- self.conn._send_query(RRType.AXFR)
- self.conn._handle_xfrin_responses()
- self.assertEqual(type(XfrinAXFREnd()), type(self.conn.get_xfrstate()))
- check_diffs(self.assertEqual,
- [[('add', self._create_ns()), ('add', soa_rrset)]],
- self.conn._datasrc_client.committed_diffs)
- def test_response_empty_answer(self):
- '''Test with an empty AXFR answer section.
- This is an unusual response, but there is no reason to reject it.
- The second message is a complete AXFR response, and transfer should
- succeed just like the normal case.
- '''
- self.axfr_response_params['answer_1st'] = []
- self.axfr_response_params['answer_2nd'] = [soa_rrset,
- self._create_ns(),
- soa_rrset]
- self.conn.response_generator = self._create_normal_response_data
- self.conn._send_query(RRType.AXFR)
- self.conn._handle_xfrin_responses()
- self.assertEqual(type(XfrinAXFREnd()), type(self.conn.get_xfrstate()))
- check_diffs(self.assertEqual,
- [[('add', self._create_ns()), ('add', soa_rrset)]],
- self.conn._datasrc_client.committed_diffs)
- def test_axfr_response_soa_mismatch(self):
- '''AXFR response whose begin/end SOAs are not same.
- What should we do this is moot, for now we accept it, so does BIND 9.
- '''
- ns_rr = self._create_ns()
- a_rr = self._create_a('192.0.2.1')
- self.conn._send_query(RRType.AXFR)
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS, RRType.AXFR)],
- # begin serial=1230, end serial=1234. end will be used.
- answers=[begin_soa_rrset, ns_rr, a_rr, soa_rrset])
- self.conn._handle_xfrin_responses()
- self.assertEqual(type(XfrinAXFREnd()), type(self.conn.get_xfrstate()))
- check_diffs(self.assertEqual,
- [[('add', ns_rr), ('add', a_rr), ('add', soa_rrset)]],
- self.conn._datasrc_client.committed_diffs)
- def test_axfr_response_fail_validation(self):
- """
- Test we reject a zone transfer if it fails the check_zone validation.
- """
- a_rr = self._create_a('192.0.2.1')
- self.conn._send_query(RRType.AXFR)
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS, RRType.AXFR)],
- # begin serial=1230, end serial=1234. end will be used.
- answers=[begin_soa_rrset, a_rr, soa_rrset])
- # Make it fail the validation
- self._check_zone_result = False
- self.assertRaises(XfrinZoneError, self.conn._handle_xfrin_responses)
- self.assertEqual(type(XfrinAXFREnd()), type(self.conn.get_xfrstate()))
- self.assertEqual([], self.conn._datasrc_client.committed_diffs)
- # Check the validation is called with the correct parameters
- self.assertEqual(TEST_ZONE_NAME, self._check_zone_params[0])
- self.assertEqual(TEST_RRCLASS, self._check_zone_params[1])
- self.assertTrue(isinstance(self._check_zone_params[2],
- MockRRsetCollection))
- # Check we can safely call the callbacks. They have no sideeffects
- # we can check (checking logging is hard), but we at least check
- # they don't crash.
- self._check_zone_params[3][0]("Test error")
- self._check_zone_params[3][1]("Test warning")
- def test_axfr_response_extra(self):
- '''Test with an extra RR after the end of AXFR session.
- The session should be rejected, and nothing should be committed.
- '''
- ns_rr = self._create_ns()
- a_rr = self._create_a('192.0.2.1')
- self.conn._send_query(RRType.AXFR)
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS,
- RRType.AXFR)],
- answers=[soa_rrset, ns_rr, a_rr, soa_rrset, a_rr])
- self.assertRaises(XfrinProtocolError,
- self.conn._handle_xfrin_responses)
- self.assertEqual(type(XfrinAXFREnd()), type(self.conn.get_xfrstate()))
- self.assertEqual([], self.conn._datasrc_client.committed_diffs)
- def test_axfr_response_qname_mismatch(self):
- '''AXFR response with a mismatch question name.
- Our implementation accepts that, so does BIND 9.
- '''
- self.axfr_response_params['question_1st'] = \
- [Question(Name('mismatch.example'), TEST_RRCLASS, RRType.AXFR)]
- self.conn.response_generator = self._create_normal_response_data
- self.conn._send_query(RRType.AXFR)
- self.conn._handle_xfrin_responses()
- self.assertEqual(type(XfrinAXFREnd()), type(self.conn.get_xfrstate()))
- check_diffs(self.assertEqual,
- [[('add', self._create_ns()), ('add', soa_rrset)]],
- self.conn._datasrc_client.committed_diffs)
- def test_axfr_response_qclass_mismatch(self):
- '''AXFR response with a mismatch RR class.
- Our implementation accepts that, so does BIND 9.
- '''
- self.axfr_response_params['question_1st'] = \
- [Question(TEST_ZONE_NAME, RRClass.CH, RRType.AXFR)]
- self.conn.response_generator = self._create_normal_response_data
- self.conn._send_query(RRType.AXFR)
- self.conn._handle_xfrin_responses()
- self.assertEqual(type(XfrinAXFREnd()), type(self.conn.get_xfrstate()))
- check_diffs(self.assertEqual,
- [[('add', self._create_ns()), ('add', soa_rrset)]],
- self.conn._datasrc_client.committed_diffs)
- def test_axfr_response_qtype_mismatch(self):
- '''AXFR response with a mismatch RR type.
- Our implementation accepts that, so does BIND 9.
- '''
- # returning IXFR in question to AXFR query
- self.axfr_response_params['question_1st'] = \
- [Question(TEST_ZONE_NAME, RRClass.CH, RRType.IXFR)]
- self.conn.response_generator = self._create_normal_response_data
- self.conn._send_query(RRType.AXFR)
- self.conn._handle_xfrin_responses()
- self.assertEqual(type(XfrinAXFREnd()), type(self.conn.get_xfrstate()))
- check_diffs(self.assertEqual,
- [[('add', self._create_ns()), ('add', soa_rrset)]],
- self.conn._datasrc_client.committed_diffs)
- def test_axfr_response_empty_question(self):
- '''AXFR response with an empty question.
- Our implementation accepts that, so does BIND 9.
- '''
- self.axfr_response_params['question_1st'] = []
- self.conn.response_generator = self._create_normal_response_data
- self.conn._send_query(RRType.AXFR)
- self.conn._handle_xfrin_responses()
- self.assertEqual(type(XfrinAXFREnd()), type(self.conn.get_xfrstate()))
- check_diffs(self.assertEqual,
- [[('add', self._create_ns()), ('add', soa_rrset)]],
- self.conn._datasrc_client.committed_diffs)
- def test_do_xfrin(self):
- self.conn.response_generator = self._create_normal_response_data
- self.assertEqual(self.conn.do_xfrin(False), XFRIN_OK)
- self.assertFalse(self.conn._datasrc_client._journaling_enabled)
- self.assertEqual(2, self.conn._transfer_stats.message_count)
- self.assertEqual(2, self.conn._transfer_stats.axfr_rr_count)
- self.assertEqual(0, self.conn._transfer_stats.ixfr_changeset_count)
- self.assertEqual(0, self.conn._transfer_stats.ixfr_deletion_count)
- self.assertEqual(0, self.conn._transfer_stats.ixfr_addition_count)
- self.assertEqual(177, self.conn._transfer_stats.byte_count)
- self.assertGreater(self.conn._transfer_stats.get_running_time(), 0)
- def test_do_xfrin_with_tsig(self):
- # use TSIG with a mock context. we fake all verify results to
- # emulate successful verification.
- self.conn._tsig_key = TSIG_KEY
- self.conn._tsig_ctx_creator = \
- lambda key: self.__create_mock_tsig(key, TSIGError.NOERROR)
- self.conn.response_generator = self._create_normal_response_data
- self.assertEqual(self.conn.do_xfrin(False), XFRIN_OK)
- self.assertEqual(type(XfrinAXFREnd()), type(self.conn.get_xfrstate()))
- check_diffs(self.assertEqual,
- [[('add', self._create_ns()), ('add', soa_rrset)]],
- self.conn._datasrc_client.committed_diffs)
- def test_do_xfrin_with_tsig_fail(self):
- # TSIG verify will fail for the first message. xfrin should fail
- # immediately.
- self.conn._tsig_key = TSIG_KEY
- self.conn._tsig_ctx_creator = \
- lambda key: self.__create_mock_tsig(key, TSIGError.BAD_SIG)
- self.conn.response_generator = self._create_normal_response_data
- self.assertEqual(self.conn.do_xfrin(False), XFRIN_FAIL)
- self.assertEqual(1, self.conn._tsig_ctx.verify_called)
- def test_do_xfrin_without_last_tsig(self):
- # TSIG verify will succeed, but it will pretend the last message is
- # not signed.
- self.conn._tsig_key = TSIG_KEY
- self.conn._tsig_ctx_creator = \
- lambda key: self.__create_mock_tsig(key, TSIGError.NOERROR, False)
- self.conn.response_generator = self._create_normal_response_data
- self.assertEqual(self.conn.do_xfrin(False), XFRIN_FAIL)
- self.assertEqual(2, self.conn._tsig_ctx.verify_called)
- def test_do_xfrin_with_tsig_fail_for_second_message(self):
- # Similar to the previous test, but first verify succeeds. There
- # should be a second verify attempt, which will fail, which should
- # make xfrin fail.
- def fake_tsig_error(ctx):
- if self.conn._tsig_ctx.verify_called == 1:
- return TSIGError.NOERROR
- return TSIGError.BAD_SIG
- self.conn._tsig_key = TSIG_KEY
- self.conn._tsig_ctx_creator = \
- lambda key: self.__create_mock_tsig(key, fake_tsig_error)
- self.conn.response_generator = self._create_normal_response_data
- self.assertEqual(self.conn.do_xfrin(False), XFRIN_FAIL)
- self.assertEqual(2, self.conn._tsig_ctx.verify_called)
- def test_do_xfrin_with_missing_tsig(self):
- # XFR request sent with TSIG, but the response doesn't have TSIG.
- # xfr should fail.
- self.conn._tsig_key = TSIG_KEY
- self.conn._tsig_ctx_creator = \
- lambda key: self.__create_mock_tsig(key, None)
- self.conn._tsig_ctx = MockTSIGContext(TSIG_KEY)
- self.conn.response_generator = self._create_normal_response_data
- self.assertEqual(self.conn.do_xfrin(False), XFRIN_FAIL)
- self.assertEqual(1, self.conn._tsig_ctx.verify_called)
- def test_do_xfrin_with_missing_tsig_for_second_message(self):
- # Similar to the previous test, but firt one contains TSIG and verify
- # succeeds (due to fake). The second message lacks TSIG.
- #
- # Note: this test case is actually not that trivial: Skipping
- # intermediate TSIG is allowed. In this case, however, the second
- # message is the last one, which must contain TSIG anyway, so the
- # expected result is correct. If/when we support skipping
- # intermediate TSIGs, we'll need additional test cases.
- def fake_tsig_error(ctx):
- if self.conn._tsig_ctx.verify_called == 1:
- return TSIGError.NOERROR
- return TSIGError.FORMERR
- self.conn._tsig_key = TSIG_KEY
- self.conn._tsig_ctx_creator = \
- lambda key: self.__create_mock_tsig(key, fake_tsig_error)
- self.conn.response_generator = self._create_normal_response_data
- self.assertEqual(self.conn.do_xfrin(False), XFRIN_FAIL)
- self.assertEqual(2, self.conn._tsig_ctx.verify_called)
- def test_do_xfrin_with_unexpected_tsig(self):
- # XFR request wasn't signed, but response includes TSIG. Like BIND 9,
- # we reject that.
- self.axfr_response_params['tsig_1st'] = TSIGContext(TSIG_KEY)
- self.conn.response_generator = self._create_normal_response_data
- self.assertEqual(self.conn.do_xfrin(False), XFRIN_FAIL)
- def test_do_xfrin_with_unexpected_tsig_for_second_message(self):
- # similar to the previous test, but the first message is normal.
- # the second one contains an unexpected TSIG. should be rejected.
- self.axfr_response_params['tsig_2nd'] = TSIGContext(TSIG_KEY)
- self.conn.response_generator = self._create_normal_response_data
- self.assertEqual(self.conn.do_xfrin(False), XFRIN_FAIL)
- def test_do_xfrin_empty_response(self):
- # skipping the creation of response data, so the transfer will fail.
- self.assertEqual(self.conn.do_xfrin(False), XFRIN_FAIL)
- def test_do_xfrin_bad_response(self):
- self.conn.response_generator = self._create_broken_response_data
- self.assertEqual(self.conn.do_xfrin(False), XFRIN_FAIL)
- def test_do_xfrin_datasrc_error(self):
- # Emulate failure in the data source client on commit.
- self.conn._datasrc_client.force_fail = True
- self.conn.response_generator = self._create_normal_response_data
- self.assertEqual(self.conn.do_xfrin(False), XFRIN_FAIL)
- def test_do_xfrin_invalid_zone(self):
- """
- Test receiving an invalid zone. We mock the check and see the whole
- transfer is rejected.
- """
- self._check_zone_result = False
- self.conn.response_generator = self._create_normal_response_data
- self.assertEqual(self.conn.do_xfrin(False), XFRIN_FAIL)
- def test_do_soacheck_and_xfrin(self):
- self.conn.response_generator = self._create_soa_response_data
- self.assertEqual(self.conn.do_xfrin(True), XFRIN_OK)
- def test_do_soacheck_uptodate(self):
- self.soa_response_params['answers'] = [begin_soa_rrset]
- self.conn.response_generator = self._create_soa_response_data
- self.assertEqual(self.conn.do_xfrin(True), XFRIN_OK)
- def test_do_soacheck_protocol_error(self):
- # There are several cases, but at this level it's sufficient to check
- # only one. We use the case where there's no SOA in the response.
- self.soa_response_params['answers'] = []
- self.conn.response_generator = self._create_soa_response_data
- self.assertEqual(self.conn.do_xfrin(True), XFRIN_FAIL)
- def test_do_soacheck_and_xfrin_with_tsig(self):
- # We are going to have a SOA query/response transaction, followed by
- # AXFR, all TSIG signed. xfrin should use a new TSIG context for
- # AXFR. We are not interested in whether verify works correctly in
- # this test, so we simply fake the results (they need to succeed for
- # this test)
- self.conn._tsig_key = TSIG_KEY
- self.conn._tsig_ctx_creator = \
- lambda key: self.__create_mock_tsig(key, TSIGError.NOERROR)
- self.soa_response_params['tsig'] = True
- self.conn.response_generator = self._create_soa_response_data
- self.assertEqual(self.conn.do_xfrin(True), XFRIN_OK)
- # We should've got 3 response messages: 1 SOA and two AXFR, but
- # the context should be replaced for AXFR, so verify() should be
- # called only twice for the latest context.
- self.assertEqual(2, self.conn._tsig_ctx.verify_called)
- def test_do_soacheck_broken_response(self):
- self.conn.response_generator = self._create_broken_response_data
- self.assertEqual(self.conn.do_xfrin(True), XFRIN_FAIL)
- def test_do_soacheck_badqid(self):
- # the QID mismatch would internally trigger a XfrinException exception,
- # and covers part of the code that other tests can't.
- self.soa_response_params['bad_qid'] = True
- self.conn.response_generator = self._create_soa_response_data
- self.assertEqual(self.conn.do_xfrin(True), XFRIN_FAIL)
- class TestIXFRResponse(TestXfrinConnection):
- def setUp(self):
- # replace time.time with a steadily increasing fake one
- self.orig_time_time = time.time
- time.time = get_fake_time_time()
- super().setUp()
- self.conn._query_id = self.conn.qid = 1035
- self.conn._request_serial = isc.dns.Serial(1230)
- self.conn._request_type = RRType.IXFR
- self.conn._datasrc_client = MockDataSourceClient()
- XfrinInitialSOA().set_xfrstate(self.conn, XfrinInitialSOA())
- def tearDown(self):
- time.time = self.orig_time_time
- def test_ixfr_response(self):
- '''A simplest form of IXFR response.
- It simply updates the zone's SOA one time.
- '''
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS, RRType.IXFR)],
- answers=[soa_rrset, begin_soa_rrset, soa_rrset, soa_rrset])
- self.conn._handle_xfrin_responses()
- self.assertEqual(type(XfrinIXFREnd()), type(self.conn.get_xfrstate()))
- self.assertTrue(self.conn._datasrc_client._journaling_enabled)
- self.assertEqual([], self.conn._datasrc_client.diffs)
- check_diffs(self.assertEqual,
- [[('delete', begin_soa_rrset), ('add', soa_rrset)]],
- self.conn._datasrc_client.committed_diffs)
- def test_ixfr_response_fail_validation(self):
- '''
- An IXFR that fails validation later on. Check it is rejected.
- '''
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS, RRType.IXFR)],
- answers=[soa_rrset, begin_soa_rrset, soa_rrset, soa_rrset])
- self._check_zone_result = False
- self.assertRaises(XfrinZoneError, self.conn._handle_xfrin_responses)
- self.assertEqual([], self.conn._datasrc_client.committed_diffs)
- self.assertEqual(TEST_ZONE_NAME, self._check_zone_params[0])
- self.assertEqual(TEST_RRCLASS, self._check_zone_params[1])
- self.assertTrue(isinstance(self._check_zone_params[2],
- MockRRsetCollection))
- # Check we can safely call the callbacks. They have no sideeffects
- # we can check (checking logging is hard), but we at least check
- # they don't crash.
- self._check_zone_params[3][0]("Test error")
- self._check_zone_params[3][1]("Test warning")
- def test_ixfr_response_multi_sequences(self):
- '''Similar to the previous case, but with multiple diff seqs.
- '''
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS, RRType.IXFR)],
- answers=[soa_rrset,
- # removing one A in serial 1230
- begin_soa_rrset, self._create_a('192.0.2.1'),
- # adding one A in serial 1231
- self._create_soa('1231'), self._create_a('192.0.2.2'),
- # removing one A in serial 1231
- self._create_soa('1231'), self._create_a('192.0.2.3'),
- # adding one A in serial 1232
- self._create_soa('1232'), self._create_a('192.0.2.4'),
- # removing one A in serial 1232
- self._create_soa('1232'), self._create_a('192.0.2.5'),
- # adding one A in serial 1234
- soa_rrset, self._create_a('192.0.2.6'),
- soa_rrset])
- self.conn._handle_xfrin_responses()
- self.assertEqual(type(XfrinIXFREnd()), type(self.conn.get_xfrstate()))
- self.assertEqual([], self.conn._datasrc_client.diffs)
- # Everything is committed as one bunch, currently we commit at the very
- # end.
- check_diffs(self.assertEqual,
- [[('delete', begin_soa_rrset),
- ('delete', self._create_a('192.0.2.1')),
- ('add', self._create_soa('1231')),
- ('add', self._create_a('192.0.2.2')),
- ('delete', self._create_soa('1231')),
- ('delete', self._create_a('192.0.2.3')),
- ('add', self._create_soa('1232')),
- ('add', self._create_a('192.0.2.4')),
- ('delete', self._create_soa('1232')),
- ('delete', self._create_a('192.0.2.5')),
- ('add', soa_rrset),
- ('add', self._create_a('192.0.2.6'))]],
- self.conn._datasrc_client.committed_diffs)
- def test_ixfr_response_multi_messages(self):
- '''Similar to the first case, but RRs span over multiple messages.
- '''
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS, RRType.IXFR)],
- answers=[soa_rrset, begin_soa_rrset, soa_rrset])
- self.conn.reply_data += self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS, RRType.IXFR)],
- answers=[soa_rrset])
- self.conn._handle_xfrin_responses()
- self.assertEqual(type(XfrinIXFREnd()), type(self.conn.get_xfrstate()))
- check_diffs(self.assertEqual,
- [[('delete', begin_soa_rrset), ('add', soa_rrset)]],
- self.conn._datasrc_client.committed_diffs)
- def test_ixfr_response_uptodate(self):
- '''IXFR response indicates the zone is new enough'''
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS, RRType.IXFR)],
- answers=[begin_soa_rrset])
- self.assertRaises(XfrinZoneUptodate, self.conn._handle_xfrin_responses)
- # no diffs should have been committed
- check_diffs(self.assertEqual,
- [], self.conn._datasrc_client.committed_diffs)
- def test_ixfr_response_broken(self):
- '''Test with a broken response.
- '''
- # SOA sequence is out-of-sync
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS, RRType.IXFR)],
- answers=[soa_rrset, begin_soa_rrset, soa_rrset,
- self._create_soa('1235')])
- self.assertRaises(XfrinProtocolError,
- self.conn._handle_xfrin_responses)
- # no diffs should have been committed
- check_diffs(self.assertEqual,
- [], self.conn._datasrc_client.committed_diffs)
- def test_ixfr_response_extra(self):
- '''Test with an extra RR after the end of IXFR diff sequences.
- IXFR should be rejected, but complete diff sequences should be
- committed; it's not clear whether it's compliant to the protocol
- specification, but it is how BIND 9 works and we do the same.
- '''
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS, RRType.IXFR)],
- answers=[soa_rrset, begin_soa_rrset, soa_rrset, soa_rrset,
- self._create_a('192.0.2.1')])
- self.assertRaises(XfrinProtocolError,
- self.conn._handle_xfrin_responses)
- check_diffs(self.assertEqual,
- [[('delete', begin_soa_rrset), ('add', soa_rrset)]],
- self.conn._datasrc_client.committed_diffs)
- def test_ixfr_response_uptodate_extra(self):
- '''Similar to 'uptodate' test, but with extra bogus data.
- In either case an exception will be raised, but in this case it's
- considered an error.
- '''
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS, RRType.IXFR)],
- answers=[begin_soa_rrset, soa_rrset])
- self.assertRaises(XfrinProtocolError,
- self.conn._handle_xfrin_responses)
- # no diffs should have been committed
- check_diffs(self.assertEqual,
- [], self.conn._datasrc_client.committed_diffs)
- def test_ixfr_to_axfr_response(self):
- '''AXFR-style IXFR response.
- It simply updates the zone's SOA one time.
- '''
- ns_rr = self._create_ns()
- a_rr = self._create_a('192.0.2.1')
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS, RRType.IXFR)],
- answers=[soa_rrset, ns_rr, a_rr, soa_rrset])
- self.conn._handle_xfrin_responses()
- self.assertEqual(type(XfrinAXFREnd()), type(self.conn.get_xfrstate()))
- # In the case AXFR-style IXFR, journaling must have been disabled.
- self.assertFalse(self.conn._datasrc_client._journaling_enabled)
- self.assertEqual([], self.conn._datasrc_client.diffs)
- # The SOA should be added exactly once, and in our implementation
- # it should be added at the end of the sequence.
- check_diffs(self.assertEqual,
- [[('add', ns_rr), ('add', a_rr), ('add', soa_rrset)]],
- self.conn._datasrc_client.committed_diffs)
- def test_ixfr_to_axfr_response_mismatch_soa(self):
- '''AXFR-style IXFR response, but the two SOA are not the same.
- In the current implementation, we accept it and use the second SOA.
- '''
- ns_rr = self._create_ns()
- a_rr = self._create_a('192.0.2.1')
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS, RRType.IXFR)],
- answers=[soa_rrset, ns_rr, a_rr, begin_soa_rrset])
- self.conn._handle_xfrin_responses()
- self.assertEqual(type(XfrinAXFREnd()), type(self.conn.get_xfrstate()))
- self.assertEqual([], self.conn._datasrc_client.diffs)
- check_diffs(self.assertEqual,
- [[('add', ns_rr), ('add', a_rr),
- ('add', begin_soa_rrset)]],
- self.conn._datasrc_client.committed_diffs)
- def test_ixfr_to_axfr_response_extra(self):
- '''Test with an extra RR after the end of AXFR-style IXFR session.
- The session should be rejected, and nothing should be committed.
- '''
- ns_rr = self._create_ns()
- a_rr = self._create_a('192.0.2.1')
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS, RRType.IXFR)],
- answers=[soa_rrset, ns_rr, a_rr, soa_rrset, a_rr])
- self.assertRaises(XfrinProtocolError,
- self.conn._handle_xfrin_responses)
- self.assertEqual(type(XfrinAXFREnd()), type(self.conn.get_xfrstate()))
- self.assertEqual([], self.conn._datasrc_client.committed_diffs)
- class TestIXFRSession(TestXfrinConnection):
- '''Tests for a full IXFR session (query and response).
- Detailed corner cases should have been covered in test_create_query()
- and TestIXFRResponse, so we'll only check some typical cases to confirm
- the general logic flow.
- '''
- def setUp(self):
- # replace time.time with a steadily increasing fake one
- self.orig_time_time = time.time
- time.time = get_fake_time_time()
- super().setUp()
- def tearDown(self):
- time.time = self.orig_time_time
- def test_do_xfrin(self):
- def create_ixfr_response():
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS,
- RRType.IXFR)],
- answers=[soa_rrset, begin_soa_rrset, soa_rrset, soa_rrset])
- self.conn.response_generator = create_ixfr_response
- self.assertEqual(XFRIN_OK, self.conn.do_xfrin(False, RRType.IXFR))
- # Check some details of the IXFR protocol processing
- self.assertEqual(type(XfrinIXFREnd()), type(self.conn.get_xfrstate()))
- check_diffs(self.assertEqual,
- [[('delete', begin_soa_rrset), ('add', soa_rrset)]],
- self.conn._datasrc_client.committed_diffs)
- # Check if the query was IXFR.
- qdata = self.conn.query_data[2:]
- qmsg = Message(Message.PARSE)
- qmsg.from_wire(qdata, len(qdata))
- self.assertEqual(1, qmsg.get_rr_count(Message.SECTION_QUESTION))
- self.assertEqual(TEST_ZONE_NAME, qmsg.get_question()[0].get_name())
- self.assertEqual(RRType.IXFR, qmsg.get_question()[0].get_type())
- self.assertEqual(1, self.conn._transfer_stats.message_count)
- self.assertEqual(0, self.conn._transfer_stats.axfr_rr_count)
- self.assertEqual(1, self.conn._transfer_stats.ixfr_changeset_count)
- self.assertEqual(1, self.conn._transfer_stats.ixfr_deletion_count)
- self.assertEqual(1, self.conn._transfer_stats.ixfr_addition_count)
- self.assertEqual(188, self.conn._transfer_stats.byte_count)
- self.assertGreater(self.conn._transfer_stats.get_running_time(), 0)
- def test_do_xfrin_fail(self):
- '''IXFR fails due to a protocol error.
- '''
- def create_ixfr_response():
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS,
- RRType.IXFR)],
- answers=[soa_rrset, begin_soa_rrset, soa_rrset,
- self._create_soa('1235')])
- self.conn.response_generator = create_ixfr_response
- self.assertEqual(XFRIN_FAIL, self.conn.do_xfrin(False, RRType.IXFR))
- def test_do_xfrin_fail2(self):
- '''IXFR fails due to a bogus DNS message.
- '''
- self._create_broken_response_data()
- self.assertEqual(XFRIN_FAIL, self.conn.do_xfrin(False, RRType.IXFR))
- def test_do_xfrin_uptodate(self):
- '''IXFR is (gracefully) aborted because serial is not new
- '''
- def create_response():
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS,
- RRType.IXFR)],
- answers=[begin_soa_rrset])
- self.conn.response_generator = create_response
- self.assertEqual(XFRIN_OK, self.conn.do_xfrin(False, RRType.IXFR))
- self.assertEqual(1, self.conn._transfer_stats.message_count)
- self.assertEqual(0, self.conn._transfer_stats.axfr_rr_count)
- self.assertEqual(0, self.conn._transfer_stats.ixfr_changeset_count)
- self.assertEqual(0, self.conn._transfer_stats.ixfr_deletion_count)
- self.assertEqual(0, self.conn._transfer_stats.ixfr_addition_count)
- self.assertEqual(80, self.conn._transfer_stats.byte_count)
- self.assertGreater(self.conn._transfer_stats.get_running_time(), 0)
- class TestXFRSessionWithSQLite3(TestXfrinConnection):
- '''Tests for XFR sessions using an SQLite3 DB.
- These are provided mainly to confirm the implementation actually works
- in an environment closer to actual operational environments. So we
- only check a few common cases; other details are tested using mock
- data sources.
- '''
- def setUp(self):
- self.sqlite3db_src = TESTDATA_SRCDIR + '/example.com.sqlite3'
- self.sqlite3db_obj = TESTDATA_OBJDIR + '/example.com.sqlite3.copy'
- self.empty_sqlite3db_obj = TESTDATA_OBJDIR + '/empty.sqlite3'
- self.sqlite3db_cfg = "{ \"database_file\": \"" +\
- self.sqlite3db_obj + "\"}"
- # replace time.time with a steadily increasing fake one
- self.orig_time_time = time.time
- time.time = get_fake_time_time()
- super().setUp()
- if os.path.exists(self.sqlite3db_obj):
- os.unlink(self.sqlite3db_obj)
- if os.path.exists(self.empty_sqlite3db_obj):
- os.unlink(self.empty_sqlite3db_obj)
- shutil.copyfile(self.sqlite3db_src, self.sqlite3db_obj)
- self.conn._datasrc_client = DataSourceClient("sqlite3",
- self.sqlite3db_cfg)
- def tearDown(self):
- if os.path.exists(self.sqlite3db_obj):
- os.unlink(self.sqlite3db_obj)
- if os.path.exists(self.empty_sqlite3db_obj):
- os.unlink(self.empty_sqlite3db_obj)
- time.time = self.orig_time_time
- def get_zone_serial(self):
- result, finder = self.conn._datasrc_client.find_zone(TEST_ZONE_NAME)
- self.assertEqual(DataSourceClient.SUCCESS, result)
- result, soa, _ = finder.find(TEST_ZONE_NAME, RRType.SOA)
- self.assertEqual(ZoneFinder.SUCCESS, result)
- self.assertEqual(1, soa.get_rdata_count())
- return get_soa_serial(soa.get_rdata()[0])
- def record_exist(self, name, type):
- result, finder = self.conn._datasrc_client.find_zone(TEST_ZONE_NAME)
- self.assertEqual(DataSourceClient.SUCCESS, result)
- result, soa, _ = finder.find(name, type)
- return result == ZoneFinder.SUCCESS
- def test_do_ixfrin_sqlite3(self):
- def create_ixfr_response():
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS,
- RRType.IXFR)],
- answers=[soa_rrset, begin_soa_rrset, soa_rrset, soa_rrset])
- self.conn.response_generator = create_ixfr_response
- # Confirm xfrin succeeds and SOA is updated
- self.assertEqual(1230, self.get_zone_serial().get_value())
- self.assertEqual(XFRIN_OK, self.conn.do_xfrin(False, RRType.IXFR))
- self.assertEqual(1234, self.get_zone_serial().get_value())
- # Also confirm the corresponding diffs are stored in the diffs table
- conn = sqlite3.connect(self.sqlite3db_obj)
- cur = conn.cursor()
- cur.execute('SELECT name, rrtype, ttl, rdata FROM diffs ORDER BY id')
- soa_rdata_base = 'master.example.com. admin.example.com. ' + \
- 'SERIAL 3600 1800 2419200 7200'
- self.assertEqual(cur.fetchall(),
- [(TEST_ZONE_NAME_STR, 'SOA', 3600,
- re.sub('SERIAL', str(1230), soa_rdata_base)),
- (TEST_ZONE_NAME_STR, 'SOA', 3600,
- re.sub('SERIAL', str(1234), soa_rdata_base))])
- conn.close()
- def test_do_ixfrin_sqlite3_fail(self):
- '''Similar to the previous test, but xfrin fails due to error.
- Check the DB is not changed.
- '''
- def create_ixfr_response():
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS,
- RRType.IXFR)],
- answers=[soa_rrset, begin_soa_rrset, soa_rrset,
- self._create_soa('1235')])
- self.conn.response_generator = create_ixfr_response
- self.assertEqual(1230, self.get_zone_serial().get_value())
- self.assertEqual(XFRIN_FAIL, self.conn.do_xfrin(False, RRType.IXFR))
- self.assertEqual(1230, self.get_zone_serial().get_value())
- def test_do_ixfrin_nozone_sqlite3(self):
- self._set_test_zone(Name('nosuchzone.example'))
- self.assertEqual(XFRIN_FAIL, self.conn.do_xfrin(False, RRType.IXFR))
- # This should fail even before starting state transition
- self.assertEqual(None, self.conn.get_xfrstate())
- def axfr_check(self, type):
- '''Common checks for AXFR and AXFR-style IXFR
- '''
- def create_response():
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS, type)],
- answers=[soa_rrset, self._create_ns(), soa_rrset])
- self.conn.response_generator = create_response
- # Confirm xfrin succeeds and SOA is updated, A RR is deleted.
- self.assertEqual(1230, self.get_zone_serial().get_value())
- self.assertTrue(self.record_exist(Name('dns01.example.com'),
- RRType.A))
- self.assertEqual(XFRIN_OK, self.conn.do_xfrin(False, type))
- self.assertEqual(1234, self.get_zone_serial().get_value())
- self.assertFalse(self.record_exist(Name('dns01.example.com'),
- RRType.A))
- def test_do_ixfrin_axfr_sqlite3(self):
- '''AXFR-style IXFR.
- '''
- self.axfr_check(RRType.IXFR)
- def test_do_axfrin_sqlite3(self):
- '''AXFR.
- '''
- self.axfr_check(RRType.AXFR)
- def axfr_failure_check(self, type):
- '''Similar to the previous two tests, but xfrin fails due to error.
- Check the DB is not changed.
- '''
- def create_response():
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS, type)],
- answers=[soa_rrset, self._create_ns(), soa_rrset, soa_rrset])
- self.conn.response_generator = create_response
- self.assertEqual(1230, self.get_zone_serial().get_value())
- self.assertTrue(self.record_exist(Name('dns01.example.com'),
- RRType.A))
- self.assertEqual(XFRIN_FAIL, self.conn.do_xfrin(False, type))
- self.assertEqual(1230, self.get_zone_serial().get_value())
- self.assertTrue(self.record_exist(Name('dns01.example.com'),
- RRType.A))
- def test_do_xfrin_axfr_sqlite3_fail(self):
- '''Failure case for AXFR-style IXFR.
- '''
- self.axfr_failure_check(RRType.IXFR)
- def test_do_axfrin_sqlite3_fail(self):
- '''Failure case for AXFR.
- '''
- self.axfr_failure_check(RRType.AXFR)
- def test_do_axfrin_nozone_sqlite3(self):
- '''AXFR test with an empty SQLite3 DB file, thus no target zone there.
- For now, we provide backward compatible behavior: xfrin will create
- the zone (after even setting up the entire schema) in the zone.
- Note: a future version of this test will make it fail.
- '''
- self.conn._db_file = self.empty_sqlite3db_obj
- self.conn._datasrc_client = DataSourceClient(
- "sqlite3",
- "{ \"database_file\": \"" + self.empty_sqlite3db_obj + "\"}")
- def create_response():
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS,
- RRType.AXFR)],
- answers=[soa_rrset, self._create_ns(), soa_rrset])
- self.conn.response_generator = create_response
- self._set_test_zone(Name('example.com'))
- self.assertEqual(XFRIN_OK, self.conn.do_xfrin(False, RRType.AXFR))
- self.assertEqual(type(XfrinAXFREnd()),
- type(self.conn.get_xfrstate()))
- self.assertEqual(1234, self.get_zone_serial().get_value())
- self.assertFalse(self.record_exist(Name('dns01.example.com'),
- RRType.A))
- class TestStatisticsXfrinConn(TestXfrinConnection):
- '''Test class based on TestXfrinConnection and including paramters
- and methods related to statistics tests'''
- def setUp(self):
- super().setUp()
- # clear all statistics counters before each test
- self.conn._counters.clear_all()
- # fake datetime
- self.__orig_datetime = isc.statistics.counters.datetime
- self.__orig_start_timer = isc.statistics.counters._start_timer
- time1 = datetime(2000, 1, 1, 0, 0, 0, 0)
- time2 = datetime(2000, 1, 1, 0, 0, 0, 1)
- class FakeDateTime:
- @classmethod
- def now(cls): return time2
- isc.statistics.counters.datetime = FakeDateTime
- isc.statistics.counters._start_timer = lambda : time1
- delta = time2 - time1
- self._const_sec = round(delta.days * 86400 + delta.seconds +
- delta.microseconds * 1E-6, 6)
- # List of statistics counter names and expected initial values
- self.__name_to_counter = (('axfrreqv4', 0),
- ('axfrreqv6', 0),
- ('ixfrreqv4', 0),
- ('ixfrreqv6', 0),
- ('last_axfr_duration', 0.0),
- ('last_ixfr_duration', 0.0),
- ('soaoutv4', 0),
- ('soaoutv6', 0),
- ('xfrfail', 0),
- ('xfrsuccess', 0))
- self.__zones = 'zones'
- def tearDown(self):
- super().tearDown()
- isc.statistics.counters.datetime = self.__orig_datetime
- isc.statistics.counters._start_timer = self.__orig_start_timer
- @property
- def _ipver(self):
- return 'v4'
- def _check_init_statistics(self):
- '''checks exception being raised if not incremented statistics
- counter gotten'''
- for (name, exp) in self.__name_to_counter:
- self.assertRaises(isc.cc.data.DataNotFoundError,
- self.conn._counters.get, self.__zones,
- TEST_ZONE_NAME_STR, name)
- def _check_updated_statistics(self, overwrite):
- '''checks getting expect values after updating the pairs of
- statistics counter name and value on to the "overwrite"
- dictionary'''
- name2count = dict(self.__name_to_counter)
- name2count.update(overwrite)
- for (name, exp) in name2count.items():
- act = self.conn._counters.get(self.__zones,
- TEST_ZONE_NAME_STR,
- name)
- msg = '%s is expected %s but actually %s' % (name, exp, act)
- self.assertEqual(exp, act, msg=msg)
- class TestStatisticsXfrinAXFRv4(TestStatisticsXfrinConn):
- '''Xfrin AXFR tests for IPv4 to check statistics counters'''
- def test_soaout(self):
- '''tests that an soaoutv4 or soaoutv6 counter is incremented
- when an soa query succeeds'''
- self.conn.response_generator = self._create_soa_response_data
- self._check_init_statistics()
- self.assertEqual(self.conn._check_soa_serial(), XFRIN_OK)
- self._check_updated_statistics({'soaout' + self._ipver: 1})
- def test_axfrreq_xfrsuccess_last_axfr_duration(self):
- '''tests that axfrreqv4 or axfrreqv6 and xfrsuccess counters
- and last_axfr_duration timer are incremented when xfr succeeds'''
- self.conn.response_generator = self._create_normal_response_data
- self._check_init_statistics()
- self.assertEqual(self.conn.do_xfrin(False), XFRIN_OK)
- self._check_updated_statistics({'axfrreq' + self._ipver: 1,
- 'xfrsuccess': 1,
- 'last_axfr_duration': self._const_sec})
- def test_axfrreq_xfrsuccess_last_axfr_duration2(self):
- '''tests that axfrreqv4 or axfrreqv6 and xfrsuccess counters
- and last_axfr_duration timer are incremented when raising
- XfrinZoneUptodate. The exception is treated as success.'''
- def exception_raiser():
- raise XfrinZoneUptodate()
- self.conn._handle_xfrin_responses = exception_raiser
- self._check_init_statistics()
- self.assertEqual(self.conn.do_xfrin(False), XFRIN_OK)
- self._check_updated_statistics({'axfrreq' + self._ipver: 1,
- 'xfrsuccess': 1,
- 'last_axfr_duration':
- self._const_sec})
- def test_axfrreq_xfrfail(self):
- '''tests that axfrreqv4 or axfrreqv6 and xfrfail counters are
- incremented even if some failure exceptions are expected to be
- raised inside do_xfrin(): XfrinZoneError, XfrinProtocolError,
- XfrinException, and Exception'''
- self._check_init_statistics()
- count = 0
- for ex in [XfrinZoneError, XfrinProtocolError, XfrinException,
- Exception]:
- def exception_raiser():
- raise ex()
- self.conn._handle_xfrin_responses = exception_raiser
- self.assertEqual(self.conn.do_xfrin(False), XFRIN_FAIL)
- count += 1
- self._check_updated_statistics({'axfrreq' + self._ipver: count,
- 'xfrfail': count})
- class TestStatisticsXfrinIXFRv4(TestStatisticsXfrinConn):
- '''Xfrin IXFR tests for IPv4 to check statistics counters'''
- def test_ixfrreq_xfrsuccess_last_ixfr_duration(self):
- '''tests that ixfrreqv4 or ixfrreqv6 and xfrsuccess counters
- and last_ixfr_duration timer are incremented when xfr succeeds'''
- def create_ixfr_response():
- self.conn.reply_data = self.conn.create_response_data(
- questions=[Question(TEST_ZONE_NAME, TEST_RRCLASS,
- RRType.IXFR)],
- answers=[soa_rrset, begin_soa_rrset, soa_rrset, soa_rrset])
- self.conn.response_generator = create_ixfr_response
- self._check_init_statistics()
- self.assertEqual(XFRIN_OK, self.conn.do_xfrin(False, RRType.IXFR))
- self._check_updated_statistics({'ixfrreq' + self._ipver: 1,
- 'xfrsuccess': 1,
- 'last_ixfr_duration':
- self._const_sec})
- def test_ixfrreq_xfrsuccess_last_ixfr_duration2(self):
- '''tests that ixfrreqv4 or ixfrreqv6 and xfrsuccess counters
- and last_ixfr_duration timer are incremented when raising
- XfrinZoneUptodate. The exception is treated as success.'''
- def exception_raiser():
- raise XfrinZoneUptodate()
- self.conn._handle_xfrin_responses = exception_raiser
- self._check_init_statistics()
- self.assertEqual(self.conn.do_xfrin(False, RRType.IXFR), XFRIN_OK)
- self._check_updated_statistics({'ixfrreq' + self._ipver: 1,
- 'xfrsuccess': 1,
- 'last_ixfr_duration':
- self._const_sec})
- def test_ixfrreq_xfrfail(self):
- '''tests that ixfrreqv4 or ixfrreqv6 and xfrfail counters are
- incremented even if some failure exceptions are expected to be
- raised inside do_xfrin(): XfrinZoneError, XfrinProtocolError,
- XfrinException, and Exception'''
- self._check_init_statistics()
- count = 0
- for ex in [XfrinZoneError, XfrinProtocolError, XfrinException,
- Exception]:
- def exception_raiser():
- raise ex()
- self.conn._handle_xfrin_responses = exception_raiser
- self.assertEqual(self.conn.do_xfrin(False, RRType.IXFR), XFRIN_FAIL)
- count += 1
- self._check_updated_statistics({'ixfrreq' + self._ipver: count,
- 'xfrfail': count})
- class TestStatisticsXfrinAXFRv6(TestStatisticsXfrinAXFRv4):
- '''Same tests as TestStatisticsXfrinAXFRv4 for IPv6'''
- @property
- def _master_addrinfo(self):
- return TEST_MASTER_IPV6_ADDRINFO
- @property
- def _ipver(self):
- return 'v6'
- class TestStatisticsIXFRv6(TestStatisticsXfrinIXFRv4):
- '''Same tests as TestStatisticsXfrinIXFRv4 for IPv6'''
- @property
- def _master_addrinfo(self):
- return TEST_MASTER_IPV6_ADDRINFO
- @property
- def _ipver(self):
- return 'v6'
- class TestXfrinRecorder(unittest.TestCase):
- def setUp(self):
- self.recorder = XfrinRecorder()
- def test_increment(self):
- self.assertEqual(self.recorder.count(), 0)
- self.recorder.increment(TEST_ZONE_NAME)
- self.assertEqual(self.recorder.count(), 1)
- # duplicate "increment" should probably be rejected. but it's not
- # checked at this moment
- self.recorder.increment(TEST_ZONE_NAME)
- self.assertEqual(self.recorder.count(), 2)
- def test_decrement(self):
- self.assertEqual(self.recorder.count(), 0)
- self.recorder.increment(TEST_ZONE_NAME)
- self.assertEqual(self.recorder.count(), 1)
- self.recorder.decrement(TEST_ZONE_NAME)
- self.assertEqual(self.recorder.count(), 0)
- def test_decrement_from_empty(self):
- self.assertEqual(self.recorder.count(), 0)
- self.recorder.decrement(TEST_ZONE_NAME)
- self.assertEqual(self.recorder.count(), 0)
- def test_inprogress(self):
- self.assertEqual(self.recorder.count(), 0)
- self.recorder.increment(TEST_ZONE_NAME)
- self.assertEqual(self.recorder.xfrin_in_progress(TEST_ZONE_NAME), True)
- self.recorder.decrement(TEST_ZONE_NAME)
- self.assertEqual(self.recorder.xfrin_in_progress(TEST_ZONE_NAME), False)
- class TestXfrinProcess(unittest.TestCase):
- def setUp(self):
- self.unlocked = False
- self.conn_closed = False
- self.do_raise_on_close = False
- self.do_raise_on_connect = False
- self.do_raise_on_publish = False
- self.master = (socket.AF_INET, socket.SOCK_STREAM,
- (TEST_MASTER_IPV4_ADDRESS, TEST_MASTER_PORT))
- def tearDown(self):
- # whatever happens the lock acquired in xfrin_recorder.increment
- # must always be released. We checked the condition for all test
- # cases.
- self.assertTrue(self.unlocked)
- # Same for the connection
- self.assertTrue(self.conn_closed)
- def increment(self, zone_name):
- '''Fake method of xfrin_recorder.increment.
- '''
- self.unlocked = False
- def decrement(self, zone_name):
- '''Fake method of xfrin_recorder.decrement.
- '''
- self.unlocked = True
- def publish_xfrin_news(self, zone_name, rrclass, ret):
- '''Fake method of serve.publish_xfrin_news
- '''
- if self.do_raise_on_publish:
- raise XfrinTestException('Emulated exception in publish')
- def connect_to_master(self, conn):
- self.sock_fd = conn.fileno()
- if self.do_raise_on_connect:
- raise XfrinTestException('Emulated exception in connect')
- return True
- def conn_close(self, conn):
- self.conn_closed = True
- XfrinConnection.close(conn)
- if self.do_raise_on_close:
- raise XfrinTestException('Emulated exception in connect')
- def create_xfrinconn(self, sock_map, zone_name, rrclass, datasrc_client,
- shutdown_event, master_addrinfo, tsig_key):
- conn = MockXfrinConnection(sock_map, zone_name, rrclass,
- datasrc_client, shutdown_event,
- master_addrinfo, tsig_key)
- # An awkward check that would specifically identify an old bug
- # where initialization of XfrinConnection._tsig_ctx_creator caused
- # self reference and subsequently led to reference leak.
- orig_ref = sys.getrefcount(conn)
- conn._tsig_ctx_creator = None
- self.assertEqual(orig_ref, sys.getrefcount(conn))
- # Replace some methods for connect with our internal ones for the
- # convenience of tests
- conn.connect_to_master = lambda : self.connect_to_master(conn)
- conn.do_xfrin = lambda x, y : XFRIN_OK
- conn.close = lambda : self.conn_close(conn)
- return conn
- def test_process_xfrin_normal(self):
- # Normal, successful case. We only check that things are cleaned up
- # at the tearDown time.
- process_xfrin(self, self, TEST_ZONE_NAME, TEST_RRCLASS, None, None,
- self.master, False, None, RRType.AXFR,
- self.create_xfrinconn)
- def test_process_xfrin_exception_on_connect(self):
- # connect_to_master() will raise an exception. Things must still be
- # cleaned up.
- self.do_raise_on_connect = True
- process_xfrin(self, self, TEST_ZONE_NAME, TEST_RRCLASS, None, None,
- self.master, False, None, RRType.AXFR,
- self.create_xfrinconn)
- def test_process_xfrin_exception_on_close(self):
- # connect() will result in exception, and even the cleanup close()
- # will fail with an exception. This should be quite likely a bug,
- # but we deal with that case.
- self.do_raise_on_connect = True
- self.do_raise_on_close = True
- process_xfrin(self, self, TEST_ZONE_NAME, TEST_RRCLASS, None, None,
- self.master, False, None, RRType.AXFR,
- self.create_xfrinconn)
- def test_process_xfrin_exception_on_publish(self):
- # xfr succeeds but notifying the zonemgr fails with exception.
- # everything must still be cleaned up.
- self.do_raise_on_publish = True
- process_xfrin(self, self, TEST_ZONE_NAME, TEST_RRCLASS, None, None,
- self.master, False, None, RRType.AXFR,
- self.create_xfrinconn)
- class TestXfrin(unittest.TestCase):
- def setUp(self):
- # redirect output
- self.stderr_backup = sys.stderr
- sys.stderr = open(os.devnull, 'w')
- self.xfr = MockXfrin()
- self.args = {}
- self.args['zone_name'] = TEST_ZONE_NAME_STR
- self.args['class'] = TEST_RRCLASS_STR
- self.args['port'] = TEST_MASTER_PORT
- self.args['master'] = TEST_MASTER_IPV4_ADDRESS
- self.args['db_file'] = TEST_DB_FILE
- self.args['tsig_key'] = ''
- def tearDown(self):
- self.assertFalse(self.xfr._module_cc.stopped);
- self.xfr.shutdown()
- self.assertTrue(self.xfr._module_cc.stopped);
- sys.stderr.close()
- sys.stderr = self.stderr_backup
- def _do_parse_zone_name_class(self):
- return self.xfr._parse_zone_name_and_class(self.args)
- def _do_parse_master_port(self):
- name, rrclass = self._do_parse_zone_name_class()
- return self.xfr._parse_master_and_port(self.args, name, rrclass)
- def test_parse_cmd_params(self):
- name, rrclass = self._do_parse_zone_name_class()
- master_addrinfo = self._do_parse_master_port()
- db_file = self.args.get('db_file')
- self.assertEqual(master_addrinfo[2][1], int(TEST_MASTER_PORT))
- self.assertEqual(name, TEST_ZONE_NAME)
- self.assertEqual(rrclass, TEST_RRCLASS)
- self.assertEqual(master_addrinfo[2][0], TEST_MASTER_IPV4_ADDRESS)
- self.assertEqual(db_file, TEST_DB_FILE)
- def test_parse_cmd_params_default_port(self):
- del self.args['port']
- master_addrinfo = self._do_parse_master_port()
- self.assertEqual(master_addrinfo[2][1], 53)
- def test_parse_cmd_params_ip6master(self):
- self.args['master'] = TEST_MASTER_IPV6_ADDRESS
- master_addrinfo = self._do_parse_master_port()
- self.assertEqual(master_addrinfo[2][0], TEST_MASTER_IPV6_ADDRESS)
- def test_parse_cmd_params_chclass(self):
- self.args['zone_class'] = 'CH'
- self.assertEqual(self._do_parse_zone_name_class()[1], RRClass.CH)
- def test_parse_cmd_params_bogusclass(self):
- self.args['zone_class'] = 'XXX'
- self.assertRaises(XfrinZoneInfoException, self._do_parse_zone_name_class)
- def test_parse_cmd_params_nozone(self):
- # zone name is mandatory.
- del self.args['zone_name']
- self.assertRaises(XfrinException, self._do_parse_zone_name_class)
- def test_parse_cmd_params_nomaster(self):
- # master address is mandatory.
- del self.args['master']
- self.assertRaises(XfrinException, self._do_parse_master_port)
- def test_parse_cmd_params_bad_ip4(self):
- self.args['master'] = '3.3.3.3.3'
- self.assertRaises(XfrinException, self._do_parse_master_port)
- def test_parse_cmd_params_bad_ip6(self):
- self.args['master'] = '1::1::1'
- self.assertRaises(XfrinException, self._do_parse_master_port)
- def test_parse_cmd_params_bad_port(self):
- self.args['port'] = '-1'
- self.assertRaises(XfrinException, self._do_parse_master_port)
- self.args['port'] = '65536'
- self.assertRaises(XfrinException, self._do_parse_master_port)
- self.args['port'] = 'http'
- self.assertRaises(XfrinException, self._do_parse_master_port)
- def test_command_handler_shutdown(self):
- self.assertEqual(self.xfr.command_handler("shutdown",
- None)['result'][0], 0)
- # shutdown command doesn't expect an argument, but accepts it if any.
- self.assertEqual(self.xfr.command_handler("shutdown",
- "unused")['result'][0], 0)
- def test_command_handler_retransfer(self):
- self.assertEqual(self.xfr.command_handler("retransfer",
- self.args)['result'][0], 0)
- self.assertEqual(self.args['master'], self.xfr.xfrin_started_master_addr)
- self.assertEqual(int(self.args['port']), self.xfr.xfrin_started_master_port)
- # By default we use AXFR (for now)
- self.assertEqual(RRType.AXFR, self.xfr.xfrin_started_request_type)
- def test_command_handler_retransfer_short_command1(self):
- # try it when only specifying the zone name (of unknown zone)
- # this should fail because master address is not specified.
- short_args = {}
- short_args['zone_name'] = TEST_ZONE_NAME_STR
- self.assertEqual(self.xfr.command_handler("retransfer",
- short_args)['result'][0], 1)
- def test_command_handler_retransfer_short_command2(self):
- # try it when only specifying the zone name (of known zone)
- short_args = {}
- short_args['zone_name'] = TEST_ZONE_NAME_STR
- zones = { 'zones': [
- { 'name': TEST_ZONE_NAME_STR,
- 'master_addr': TEST_MASTER_IPV4_ADDRESS,
- 'master_port': TEST_MASTER_PORT
- }
- ]}
- self.xfr.config_handler(zones)
- self.assertEqual(self.xfr.command_handler("retransfer",
- short_args)['result'][0], 0)
- self.assertEqual(TEST_MASTER_IPV4_ADDRESS,
- self.xfr.xfrin_started_master_addr)
- self.assertEqual(int(TEST_MASTER_PORT),
- self.xfr.xfrin_started_master_port)
- def test_command_handler_retransfer_short_command3(self):
- # try it when only specifying the zone name (of known zone)
- short_args = {}
- # test it without the trailing root dot
- short_args['zone_name'] = TEST_ZONE_NAME_STR[:-1]
- zones = { 'zones': [
- { 'name': TEST_ZONE_NAME_STR,
- 'master_addr': TEST_MASTER_IPV4_ADDRESS,
- 'master_port': TEST_MASTER_PORT
- }
- ]}
- self.xfr.config_handler(zones)
- self.assertEqual(self.xfr.command_handler("retransfer",
- short_args)['result'][0], 0)
- self.assertEqual(TEST_MASTER_IPV4_ADDRESS,
- self.xfr.xfrin_started_master_addr)
- self.assertEqual(int(TEST_MASTER_PORT),
- self.xfr.xfrin_started_master_port)
- def test_command_handler_retransfer_short_command4(self):
- # try it when only specifying the zone name (of known zone, with
- # different case)
- short_args = {}
- # swap the case of the zone name in our command
- short_args['zone_name'] = TEST_ZONE_NAME_STR.swapcase()
- zones = { 'zones': [
- { 'name': TEST_ZONE_NAME_STR,
- 'master_addr': TEST_MASTER_IPV4_ADDRESS,
- 'master_port': TEST_MASTER_PORT
- }
- ]}
- self.xfr.config_handler(zones)
- self.assertEqual(self.xfr.command_handler("retransfer",
- short_args)['result'][0], 0)
- self.assertEqual(TEST_MASTER_IPV4_ADDRESS,
- self.xfr.xfrin_started_master_addr)
- self.assertEqual(int(TEST_MASTER_PORT),
- self.xfr.xfrin_started_master_port)
- def test_command_handler_retransfer_badcommand(self):
- self.args['master'] = 'invalid'
- self.assertEqual(self.xfr.command_handler("retransfer",
- self.args)['result'][0], 1)
- def test_command_handler_retransfer_quota(self):
- self.args['master'] = TEST_MASTER_IPV4_ADDRESS
- for i in range(self.xfr._max_transfers_in - 1):
- self.xfr.recorder.increment(Name(str(i) + TEST_ZONE_NAME_STR))
- # there can be one more outstanding transfer.
- self.assertEqual(self.xfr.command_handler("retransfer",
- self.args)['result'][0], 0)
- # make sure the # xfrs would exceed the quota
- self.xfr.recorder.increment(Name(str(self.xfr._max_transfers_in) + TEST_ZONE_NAME_STR))
- # this one should fail
- self.assertEqual(self.xfr.command_handler("retransfer",
- self.args)['result'][0], 1)
- def test_command_handler_retransfer_inprogress(self):
- self.xfr.recorder.increment(TEST_ZONE_NAME)
- self.assertEqual(self.xfr.command_handler("retransfer",
- self.args)['result'][0], 1)
- def test_command_handler_retransfer_nomodule(self):
- dns_module = sys.modules['pydnspp'] # this must exist
- del sys.modules['pydnspp']
- self.assertEqual(self.xfr.command_handler("retransfer",
- self.args)['result'][0], 1)
- # sys.modules is global, so we must recover it
- sys.modules['pydnspp'] = dns_module
- def test_command_handler_refresh(self):
- # at this level, refresh is no different than retransfer.
- # just confirm the successful case with a different family of address.
- self.args['master'] = TEST_MASTER_IPV6_ADDRESS
- self.assertEqual(self.xfr.command_handler("refresh",
- self.args)['result'][0], 0)
- self.assertEqual(TEST_MASTER_IPV6_ADDRESS,
- self.xfr.xfrin_started_master_addr)
- self.assertEqual(int(TEST_MASTER_PORT),
- self.xfr.xfrin_started_master_port)
- # By default we use AXFR (for now)
- self.assertEqual(RRType.AXFR, self.xfr.xfrin_started_request_type)
- def test_command_handler_notify(self):
- # at this level, refresh is no different than retransfer.
- self.args['master'] = TEST_MASTER_IPV6_ADDRESS
- # ...but the zone is unknown so this would return an error
- self.assertEqual(self.xfr.command_handler("notify",
- self.args)['result'][0], 1)
- def test_command_handler_notify_known_zone_bad_addr(self):
- # try it with a known zone
- self.args['master'] = TEST_MASTER_IPV6_ADDRESS
- # but use a different address in the actual command
- zones = { 'zones': [
- { 'name': TEST_ZONE_NAME_STR,
- 'master_addr': TEST_MASTER_IPV4_ADDRESS,
- 'master_port': TEST_MASTER_PORT
- }
- ]}
- self.xfr.config_handler(zones)
- # the command should now fail
- self.assertEqual(self.xfr.command_handler("notify",
- self.args)['result'][0], 1)
- # also try a different port in the actual command
- zones = { 'zones': [
- { 'name': TEST_ZONE_NAME_STR,
- 'master_addr': TEST_MASTER_IPV6_ADDRESS,
- 'master_port': str(int(TEST_MASTER_PORT) + 1)
- }
- ]}
- self.xfr.config_handler(zones)
- # the command should now fail
- self.assertEqual(self.xfr.command_handler("notify",
- self.args)['result'][0], 1)
- def test_command_handler_notify_known_zone(self):
- # try it with a known zone
- self.args['master'] = TEST_MASTER_IPV6_ADDRESS
- # with a zone configuration that has a matching master address.
- zones = { 'zones': [
- { 'name': TEST_ZONE_NAME_STR,
- 'master_addr': TEST_MASTER_IPV6_ADDRESS,
- 'master_port': TEST_MASTER_PORT
- }
- ]}
- self.xfr.config_handler(zones)
- self.assertEqual(self.xfr.command_handler("notify",
- self.args)['result'][0], 0)
- def test_command_handler_unknown(self):
- self.assertEqual(self.xfr.command_handler("xxx", None)['result'][0], 1)
- def test_command_handler_transfers_in(self):
- self.assertEqual(self.xfr.config_handler({})['result'][0], 0)
- self.assertEqual(self.xfr.config_handler({'transfers_in': 3})['result'][0], 0)
- self.assertEqual(self.xfr._max_transfers_in, 3)
- def test_command_handler_getstats(self):
- module_spec = isc.config.module_spec_from_file(
- xfrin.SPECFILE_LOCATION)
- ans = isc.config.parse_answer(
- self.xfr.command_handler("getstats", None))
- self.assertEqual(0, ans[0])
- self.assertTrue(module_spec.validate_statistics(False, ans[1]))
- def _check_zones_config(self, config_given):
- if 'transfers_in' in config_given:
- self.assertEqual(config_given['transfers_in'],
- self.xfr._max_transfers_in)
- for zone_config in config_given['zones']:
- zone_name = zone_config['name']
- zone_info = self.xfr._get_zone_info(Name(zone_name), RRClass.IN)
- self.assertEqual(str(zone_info.master_addr), zone_config['master_addr'])
- self.assertEqual(zone_info.master_port, zone_config['master_port'])
- if 'tsig_key' in zone_config:
- self.assertEqual(zone_info.tsig_key_name.to_text(),
- Name(zone_config['tsig_key']).to_text())
- else:
- self.assertIsNone(zone_info.tsig_key_name)
- if 'use_ixfr' in zone_config and\
- zone_config.get('use_ixfr'):
- self.assertTrue(zone_info.use_ixfr)
- else:
- # if not set, should default to False
- self.assertFalse(zone_info.use_ixfr)
- def test_config_handler_zones(self):
- # This test passes a number of good and bad configs, and checks whether
- # the values are reflected in the structure that will dictate the
- # actual behaviour. It also checks if bad values are correctly
- # handled
- config1 = { 'transfers_in': 3,
- 'zones': [
- { 'name': 'test.example.',
- 'master_addr': '192.0.2.1',
- 'master_port': 53,
- 'use_ixfr': False
- }
- ]}
- self.assertEqual(self.xfr.config_handler(config1)['result'][0], 0)
- self._check_zones_config(config1)
- config2 = { 'transfers_in': 4,
- 'zones': [
- { 'name': 'test.example.',
- 'master_addr': '192.0.2.2',
- 'master_port': 53,
- 'tsig_key': "example.com:SFuWd/q99SzF8Yzd1QbB9g==",
- 'use_ixfr': True
- }
- ]}
- self.assertEqual(self.xfr.config_handler(config2)['result'][0], 0)
- self._check_zones_config(config2)
- # test that configuring the zone multiple times fails
- zones = { 'transfers_in': 5,
- 'zones': [
- { 'name': 'test.example.',
- 'master_addr': '192.0.2.1',
- 'master_port': 53
- },
- { 'name': 'test.example.',
- 'master_addr': '192.0.2.2',
- 'master_port': 53
- }
- ]}
- self.assertEqual(self.xfr.config_handler(zones)['result'][0], 1)
- # since this has failed, we should still have the previous config
- self._check_zones_config(config2)
- zones = { 'zones': [
- { 'name': 'test.example.',
- 'master_addr': '192.0.2.3',
- 'master_port': 53,
- 'class': 'BADCLASS'
- }
- ]}
- self.assertEqual(self.xfr.config_handler(zones)['result'][0], 1)
- self._check_zones_config(config2)
- zones = { 'zones': [
- { 'master_addr': '192.0.2.4',
- 'master_port': 53
- }
- ]}
- self.assertEqual(self.xfr.config_handler(zones)['result'][0], 1)
- # since this has failed, we should still have the previous config
- self._check_zones_config(config2)
- zones = { 'zones': [
- { 'name': 'bad..zone.',
- 'master_addr': '192.0.2.5',
- 'master_port': 53
- }
- ]}
- self.assertEqual(self.xfr.config_handler(zones)['result'][0], 1)
- # since this has failed, we should still have the previous config
- self._check_zones_config(config2)
- zones = { 'zones': [
- { 'name': '',
- 'master_addr': '192.0.2.6',
- 'master_port': 53
- }
- ]}
- self.assertEqual(self.xfr.config_handler(zones)['result'][0], 1)
- # since this has failed, we should still have the previous config
- self._check_zones_config(config2)
- zones = { 'zones': [
- { 'name': 'test.example',
- 'master_addr': 'badaddress',
- 'master_port': 53
- }
- ]}
- self.assertEqual(self.xfr.config_handler(zones)['result'][0], 1)
- # since this has failed, we should still have the previous config
- self._check_zones_config(config2)
- zones = { 'zones': [
- { 'name': 'test.example',
- 'master_addr': '192.0.2.7',
- 'master_port': 'bad_port'
- }
- ]}
- self.assertEqual(self.xfr.config_handler(zones)['result'][0], 1)
- # since this has failed, we should still have the previous config
- self._check_zones_config(config2)
- zones = { 'zones': [
- { 'name': 'test.example',
- 'master_addr': '192.0.2.7',
- 'master_port': 53,
- # using a bad TSIG key spec
- 'tsig_key': "bad..example.com:SFuWd/q99SzF8Yzd1QbB9g=="
- }
- ]}
- self.assertEqual(self.xfr.config_handler(zones)['result'][0], 1)
- # since this has failed, we should still have the previous config
- self._check_zones_config(config2)
- # let's also add a zone that is correct too, and make sure
- # that the new config is not partially taken
- zones = { 'zones': [
- { 'name': 'test.example.',
- 'master_addr': '192.0.2.8',
- 'master_port': 53
- },
- { 'name': 'test2.example.',
- 'master_addr': '192.0.2.9',
- 'master_port': 53,
- 'tsig_key': 'badkey..'
- }
- ]}
- self.assertEqual(self.xfr.config_handler(zones)['result'][0], 1)
- # since this has failed, we should still have the previous config
- self._check_zones_config(config2)
- def test_config_handler_zones_default(self):
- # Checking it some default config values apply. Using a separate
- # test case for a fresh xfr object.
- config = { 'zones': [
- { 'name': 'test.example.',
- 'master_addr': '192.0.2.1',
- 'master_port': 53,
- }
- ]}
- self.assertEqual(self.xfr.config_handler(config)['result'][0], 0)
- self._check_zones_config(config)
- def common_ixfr_setup(self, xfr_mode, use_ixfr, tsig_key_str = None):
- # This helper method explicitly sets up a zone configuration with
- # use_ixfr, and invokes either retransfer or refresh.
- # Shared by some of the following test cases.
- config = {'zones': [
- {'name': 'example.com.',
- 'master_addr': '192.0.2.1',
- 'tsig_key': tsig_key_str,
- 'use_ixfr': use_ixfr}]}
- self.assertEqual(self.xfr.config_handler(config)['result'][0], 0)
- self.assertEqual(self.xfr.command_handler(xfr_mode,
- self.args)['result'][0], 0)
- def test_command_handler_retransfer_ixfr_enabled(self):
- # If IXFR is explicitly enabled in config, IXFR will be used
- self.common_ixfr_setup('retransfer', True)
- self.assertEqual(RRType.IXFR, self.xfr.xfrin_started_request_type)
- def test_command_handler_refresh_ixfr_enabled(self):
- # Same for refresh
- self.common_ixfr_setup('refresh', True)
- self.assertEqual(RRType.IXFR, self.xfr.xfrin_started_request_type)
- def test_command_handler_retransfer_with_tsig(self):
- self.common_ixfr_setup('retransfer', False, 'example.com.key')
- self.assertEqual(RRType.AXFR, self.xfr.xfrin_started_request_type)
- def test_command_handler_retransfer_with_tsig_bad_key(self):
- # bad keys should not reach xfrin, but should they somehow,
- # they are ignored (and result in 'key not found' + error log).
- self.assertRaises(XfrinZoneInfoException, self.common_ixfr_setup,
- 'retransfer', False, 'bad.key')
- def test_command_handler_retransfer_with_tsig_unknown_key(self):
- self.assertRaises(XfrinZoneInfoException, self.common_ixfr_setup,
- 'retransfer', False, 'no.such.key')
- def test_command_handler_refresh_with_tsig(self):
- self.common_ixfr_setup('refresh', False, 'example.com.key')
- self.assertEqual(RRType.AXFR, self.xfr.xfrin_started_request_type)
- def test_command_handler_refresh_with_tsig_bad_key(self):
- # bad keys should not reach xfrin, but should they somehow,
- # they are ignored (and result in 'key not found' + error log).
- self.assertRaises(XfrinZoneInfoException, self.common_ixfr_setup,
- 'refresh', False, 'bad.key')
- def test_command_handler_refresh_with_tsig_unknown_key(self):
- self.assertRaises(XfrinZoneInfoException, self.common_ixfr_setup,
- 'refresh', False, 'no.such.key')
- def test_command_handler_retransfer_ixfr_disabled(self):
- # Similar to the previous case, but explicitly disabled. AXFR should
- # be used.
- self.common_ixfr_setup('retransfer', False)
- self.assertEqual(RRType.AXFR, self.xfr.xfrin_started_request_type)
- def test_command_handler_refresh_ixfr_disabled(self):
- # Same for refresh
- self.common_ixfr_setup('refresh', False)
- self.assertEqual(RRType.AXFR, self.xfr.xfrin_started_request_type)
- class TestXfrinMemoryZones(unittest.TestCase):
- def setUp(self):
- self.xfr = MockXfrin()
- # Configuration snippet containing 2 memory datasources,
- # one for IN and one for CH. Both contain a zone 'example.com'
- # the IN ds also contains a zone example2.com, and a zone example3.com,
- # which is of file type 'text' (and hence, should be ignored)
- self.config = { 'datasources': [
- { 'type': 'memory',
- 'class': 'IN',
- 'zones': [
- { 'origin': 'example.com',
- 'filetype': 'sqlite3' },
- { 'origin': 'EXAMPLE2.com.',
- 'filetype': 'sqlite3' },
- { 'origin': 'example3.com',
- 'filetype': 'text' }
- ]
- },
- { 'type': 'memory',
- 'class': 'ch',
- 'zones': [
- { 'origin': 'example.com',
- 'filetype': 'sqlite3' }
- ]
- }
- ] }
- def test_updates(self):
- self.assertFalse(self.xfr._is_memory_zone("example.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example2.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example3.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example.com", "CH"))
- # add them all
- self.xfr._set_memory_zones(self.config, None)
- self.assertTrue(self.xfr._is_memory_zone("example.com", "IN"))
- self.assertTrue(self.xfr._is_memory_zone("example2.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example3.com", "IN"))
- self.assertTrue(self.xfr._is_memory_zone("example.com", "CH"))
- # Remove the CH data source from the self.config snippet, and update
- del self.config['datasources'][1]
- self.xfr._set_memory_zones(self.config, None)
- self.assertTrue(self.xfr._is_memory_zone("example.com", "IN"))
- self.assertTrue(self.xfr._is_memory_zone("example2.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example3.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example.com", "CH"))
- # Remove example2.com from the datasource, and update
- del self.config['datasources'][0]['zones'][1]
- self.xfr._set_memory_zones(self.config, None)
- self.assertTrue(self.xfr._is_memory_zone("example.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example2.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example3.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example.com", "CH"))
- # If 'datasources' is not in the self.config update list (i.e. its
- # self.config has not changed), no difference should be found
- self.xfr._set_memory_zones({}, None)
- self.assertTrue(self.xfr._is_memory_zone("example.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example2.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example3.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example.com", "CH"))
- # If datasources list becomes empty, everything should be removed
- self.config['datasources'][0]['zones'] = []
- self.xfr._set_memory_zones(self.config, None)
- self.assertFalse(self.xfr._is_memory_zone("example.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example2.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example3.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example.com", "CH"))
- def test_normalization(self):
- self.xfr._set_memory_zones(self.config, None)
- # make sure it is case insensitive, root-dot-insensitive,
- # and supports CLASSXXX notation
- self.assertTrue(self.xfr._is_memory_zone("EXAMPLE.com", "IN"))
- self.assertTrue(self.xfr._is_memory_zone("example.com", "in"))
- self.assertTrue(self.xfr._is_memory_zone("example2.com.", "IN"))
- self.assertTrue(self.xfr._is_memory_zone("example.com", "CLASS3"))
- def test_bad_name(self):
- # First set it to some config
- self.xfr._set_memory_zones(self.config, None)
- # Error checking; bad owner name should result in no changes
- self.config['datasources'][1]['zones'][0]['origin'] = ".."
- self.xfr._set_memory_zones(self.config, None)
- self.assertTrue(self.xfr._is_memory_zone("example.com", "IN"))
- self.assertTrue(self.xfr._is_memory_zone("example2.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example3.com", "IN"))
- self.assertTrue(self.xfr._is_memory_zone("example.com", "CH"))
- def test_bad_class(self):
- # First set it to some config
- self.xfr._set_memory_zones(self.config, None)
- # Error checking; bad owner name should result in no changes
- self.config['datasources'][1]['class'] = "Foo"
- self.xfr._set_memory_zones(self.config, None)
- self.assertTrue(self.xfr._is_memory_zone("example.com", "IN"))
- self.assertTrue(self.xfr._is_memory_zone("example2.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example3.com", "IN"))
- self.assertTrue(self.xfr._is_memory_zone("example.com", "CH"))
- def test_no_filetype(self):
- # omitting the filetype should leave that zone out, but not
- # the rest
- del self.config['datasources'][1]['zones'][0]['filetype']
- self.xfr._set_memory_zones(self.config, None)
- self.assertTrue(self.xfr._is_memory_zone("example.com", "IN"))
- self.assertTrue(self.xfr._is_memory_zone("example2.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example3.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example.com", "CH"))
- def test_class_filetype(self):
- # omitting the class should have it default to what is in the
- # specfile for Auth.
- AuthConfigData = isc.config.config_data.ConfigData(
- isc.config.module_spec_from_file(xfrin.AUTH_SPECFILE_LOCATION))
- del self.config['datasources'][0]['class']
- self.xfr._set_memory_zones(self.config, AuthConfigData)
- self.assertTrue(self.xfr._is_memory_zone("example.com", "IN"))
- self.assertTrue(self.xfr._is_memory_zone("example2.com", "IN"))
- self.assertFalse(self.xfr._is_memory_zone("example3.com", "IN"))
- self.assertTrue(self.xfr._is_memory_zone("example.com", "CH"))
- def raise_interrupt():
- raise KeyboardInterrupt()
- def raise_ccerror():
- raise isc.cc.session.SessionError('test error')
- def raise_exception():
- raise Exception('test exception')
- class TestMain(unittest.TestCase):
- def setUp(self):
- MockXfrin.check_command_hook = None
- def tearDown(self):
- MockXfrin.check_command_hook = None
- def test_startup(self):
- main(MockXfrin, False)
- def test_startup_interrupt(self):
- MockXfrin.check_command_hook = raise_interrupt
- main(MockXfrin, False)
- def test_startup_ccerror(self):
- MockXfrin.check_command_hook = raise_ccerror
- main(MockXfrin, False)
- def test_startup_generalerror(self):
- MockXfrin.check_command_hook = raise_exception
- main(MockXfrin, False)
- class TestXfrinProcessMockCC:
- def __init__(self):
- self.config = []
- class TestXfrinProcessMockCCSession:
- def __init__(self):
- self.send_called = False
- self.send_called_correctly = False
- self.recv_called = False
- self.recv_called_correctly = False
- def group_sendmsg(self, msg, module, want_answer=False):
- self.send_called = True
- if module == 'Auth' and msg['command'][0] == 'loadzone':
- self.send_called_correctly = True
- seq = "random-e068c2de26d760f20cf10afc4b87ef0f"
- else:
- seq = None
- return seq
- def group_recvmsg(self, message, seq):
- self.recv_called = True
- if message == False and seq == "random-e068c2de26d760f20cf10afc4b87ef0f":
- self.recv_called_correctly = True
- # return values are ignored
- return (None, None)
- class TestXfrinProcess(unittest.TestCase):
- """
- Some tests for the xfrin_process function. This replaces the
- XfrinConnection class with itself, so we can emulate whatever behavior we
- might want.
- Currently only tests for retry if IXFR fails.
- """
- def setUp(self):
- """
- Backs up the original class implementation so it can be restored
- and places our own version in place of the constructor.
- Also sets up several internal variables to watch what happens.
- """
- self._module_cc = TestXfrinProcessMockCC()
- self._send_cc_session = TestXfrinProcessMockCCSession()
- # This will hold a "log" of what transfers were attempted.
- self.__transfers = []
- # This will "log" if failures or successes happened.
- self.__published = []
- # How many connections were created.
- self.__created_connections = 0
- def __get_connection(self, *args):
- """
- Provides a "connection". To mock the connection and see what it is
- asked to do, we pretend to be the connection.
- """
- self.__created_connections += 1
- return self
- def connect_to_master(self):
- """
- Part of pretending to be the connection. It pretends it connected
- correctly every time.
- """
- return True
- def do_xfrin(self, check_soa, request_type):
- """
- Part of pretending to be the connection. It looks what answer should
- be answered now and logs what request happened.
- """
- self.__transfers.append(request_type)
- ret = self.__rets[0]
- self.__rets = self.__rets[1:]
- return ret
- def zone_str(self):
- """
- Part of pretending to be the connection. It provides the logging name
- of zone.
- """
- return "example.org/IN"
- def publish_xfrin_news(self, zone_name, rrclass, ret):
- """
- Part of pretending to be the server as well. This just logs the
- success/failure of the previous operation.
- """
- if ret == XFRIN_OK:
- xfrin._do_auth_loadzone(self, zone_name, rrclass)
- self.__published.append(ret)
- def close(self):
- """
- Part of pretending to be the connection.
- """
- pass
- def init_socket(self):
- """
- Part of pretending to be the connection.
- """
- pass
- def __do_test(self, rets, transfers, request_type):
- """
- Do the actual test. The request type, prepared sucesses/failures
- and expected sequence of transfers is passed to specify what test
- should happen.
- """
- self.__rets = rets
- published = rets[-1]
- xfrin.process_xfrin(self, XfrinRecorder(), Name("example.org."),
- RRClass.IN, None, None, None, True, None,
- request_type, self.__get_connection)
- self.assertEqual([], self.__rets)
- self.assertEqual(transfers, self.__transfers)
- # Create a connection for each attempt
- self.assertEqual(len(transfers), self.__created_connections)
- self.assertEqual([published], self.__published)
- def test_ixfr_ok(self):
- """
- Everything OK the first time, over IXFR.
- """
- self.__do_test([XFRIN_OK], [RRType.IXFR], RRType.IXFR)
- # Check there was loadzone command
- self.assertTrue(self._send_cc_session.send_called)
- self.assertTrue(self._send_cc_session.send_called_correctly)
- self.assertTrue(self._send_cc_session.recv_called)
- self.assertTrue(self._send_cc_session.recv_called_correctly)
- def test_axfr_ok(self):
- """
- Everything OK the first time, over AXFR.
- """
- self.__do_test([XFRIN_OK], [RRType.AXFR], RRType.AXFR)
- def test_axfr_fail(self):
- """
- The transfer failed over AXFR. Should not be retried (we don't expect
- to fail on AXFR, but succeed on IXFR and we didn't use IXFR in the first
- place for some reason.
- """
- self.__do_test([XFRIN_FAIL], [RRType.AXFR], RRType.AXFR)
- def test_ixfr_fallback(self):
- """
- The transfer fails over IXFR, but suceeds over AXFR. It should fall back
- to it and say everything is OK.
- """
- self.__do_test([XFRIN_FAIL, XFRIN_OK], [RRType.IXFR, RRType.AXFR],
- RRType.IXFR)
- def test_ixfr_fail(self):
- """
- The transfer fails both over IXFR and AXFR. It should report failure
- (only once) and should try both before giving up.
- """
- self.__do_test([XFRIN_FAIL, XFRIN_FAIL],
- [RRType.IXFR, RRType.AXFR], RRType.IXFR)
- def test_send_loadzone(self):
- """
- Check the loadzone command is sent after successful transfer.
- """
- self.__do_test([XFRIN_OK], [RRType.IXFR], RRType.IXFR)
- self.assertTrue(self._send_cc_session.send_called)
- self.assertTrue(self._send_cc_session.send_called_correctly)
- self.assertTrue(self._send_cc_session.recv_called)
- self.assertTrue(self._send_cc_session.recv_called_correctly)
- class TestFormatting(unittest.TestCase):
- # If the formatting functions are moved to a more general library
- # (ticket #1379), these tests should be moved with them.
- def test_format_zone_str(self):
- self.assertEqual("example.com/IN",
- format_zone_str(isc.dns.Name("example.com"),
- isc.dns.RRClass("IN")))
- self.assertEqual("example.com/CH",
- format_zone_str(isc.dns.Name("example.com"),
- isc.dns.RRClass("CH")))
- self.assertEqual("example.org/IN",
- format_zone_str(isc.dns.Name("example.org"),
- isc.dns.RRClass("IN")))
- def test_format_addrinfo(self):
- # This test may need to be updated if the input type is changed,
- # right now it is a nested tuple:
- # (family, sockettype, (address, port))
- # of which sockettype is ignored
- self.assertEqual("192.0.2.1:53",
- format_addrinfo((socket.AF_INET, socket.SOCK_STREAM,
- ("192.0.2.1", 53))))
- self.assertEqual("192.0.2.2:53",
- format_addrinfo((socket.AF_INET, socket.SOCK_STREAM,
- ("192.0.2.2", 53))))
- self.assertEqual("192.0.2.1:54",
- format_addrinfo((socket.AF_INET, socket.SOCK_STREAM,
- ("192.0.2.1", 54))))
- self.assertEqual("[2001:db8::1]:53",
- format_addrinfo((socket.AF_INET6, socket.SOCK_STREAM,
- ("2001:db8::1", 53))))
- self.assertEqual("[2001:db8::2]:53",
- format_addrinfo((socket.AF_INET6, socket.SOCK_STREAM,
- ("2001:db8::2", 53))))
- self.assertEqual("[2001:db8::1]:54",
- format_addrinfo((socket.AF_INET6, socket.SOCK_STREAM,
- ("2001:db8::1", 54))))
- self.assertEqual("/some/file",
- format_addrinfo((socket.AF_UNIX, socket.SOCK_STREAM,
- "/some/file")))
- # second element of passed tuple should be ignored
- self.assertEqual("192.0.2.1:53",
- format_addrinfo((socket.AF_INET, None,
- ("192.0.2.1", 53))))
- self.assertEqual("192.0.2.1:53",
- format_addrinfo((socket.AF_INET, "Just some string",
- ("192.0.2.1", 53))))
- self.assertRaises(TypeError, format_addrinfo, 1)
- self.assertRaises(TypeError, format_addrinfo,
- (socket.AF_INET, "asdf"))
- self.assertRaises(TypeError, format_addrinfo,
- (socket.AF_INET, "asdf", ()))
- class TestXfrinTransferStats(unittest.TestCase):
- def setUp(self):
- # replace time.time with a steadily increasing fake one
- self.orig_time_time = time.time
- time.time = get_fake_time_time()
- self.stats = XfrinTransferStats()
- def tearDown(self):
- time.time = self.orig_time_time
- def zero_check(self):
- # Checks whether all counters are zero
- self.assertEqual(0, self.stats.message_count)
- self.assertEqual(0, self.stats.axfr_rr_count)
- self.assertEqual(0, self.stats.byte_count)
- self.assertEqual(0, self.stats.ixfr_changeset_count)
- self.assertEqual(0, self.stats.ixfr_deletion_count)
- self.assertEqual(0, self.stats.ixfr_addition_count)
- def test_init(self):
- self.zero_check()
- self.assertIsNone(self.stats._end_time)
- def test_get_running_time(self):
- self.assertIsNone(self.stats._end_time)
- runtime = self.stats.get_running_time()
- self.assertIsNotNone(self.stats._end_time)
- self.assertGreater(runtime, 0)
- # make sure a second get does not change anything
- runtime2 = self.stats.get_running_time()
- self.assertEqual(runtime, runtime2)
- # And that no counters have been modified
- self.zero_check()
- def test_bytes_per_second(self):
- zbps = self.stats.get_bytes_per_second()
- self.assertEqual(0, zbps)
- self.stats._start_time = 1
- self.stats._end_time = 2
- self.stats.byte_count += 4
- zbps = self.stats.get_bytes_per_second()
- self.assertEqual(4, zbps)
- self.stats._start_time = float(1)
- self.stats._end_time = float(11)
- self.assertEqual(10, self.stats.get_running_time())
- self.stats.byte_count = 1234
- zbps = self.stats.get_bytes_per_second()
- self.assertEqual(123.4, zbps)
- # if for some reason the runtime is 0, depending
- # on whether bytes have actually been seen, bps is either
- # 0 or 'infinite'
- self.stats._end_time = self.stats._start_time
- zbps = self.stats.get_bytes_per_second()
- self.assertEqual(float("inf"), zbps)
- self.stats.byte_count = 0
- zbps = self.stats.get_bytes_per_second()
- self.assertEqual(0, zbps)
- if __name__== "__main__":
- try:
- isc.log.resetUnitTestRootLogger()
- unittest.main()
- except KeyboardInterrupt as e:
- print(e)
|