resolver_config_unittest.cc 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512
  1. // Copyright (C) 2010 Internet Systems Consortium, Inc. ("ISC")
  2. //
  3. // Permission to use, copy, modify, and/or distribute this software for any
  4. // purpose with or without fee is hereby granted, provided that the above
  5. // copyright notice and this permission notice appear in all copies.
  6. //
  7. // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
  8. // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
  9. // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
  10. // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
  11. // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
  12. // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  13. // PERFORMANCE OF THIS SOFTWARE.
  14. #include <config.h>
  15. #include <sys/types.h>
  16. #include <sys/socket.h>
  17. #include <netinet/in.h>
  18. #include <netdb.h>
  19. #include <cerrno>
  20. #include <cstring>
  21. #include <string>
  22. #include <boost/scoped_ptr.hpp>
  23. #include <boost/noncopyable.hpp>
  24. #include <gtest/gtest.h>
  25. #include <exceptions/exceptions.h>
  26. #include <cc/data.h>
  27. #include <config/ccsession.h>
  28. #include <asiodns/asiodns.h>
  29. #include <asiolink/asiolink.h>
  30. #include <asiolink/io_address.h>
  31. #include <asiolink/io_socket.h>
  32. #include <asiolink/io_message.h>
  33. #include <acl/acl.h>
  34. #include <server_common/client.h>
  35. #include <resolver/resolver.h>
  36. #include <dns/tests/unittest_util.h>
  37. #include <testutils/srv_test.h>
  38. #include <testutils/portconfig.h>
  39. using namespace std;
  40. using boost::scoped_ptr;
  41. using namespace isc::acl;
  42. using isc::acl::dns::RequestContext;
  43. using namespace isc::data;
  44. using namespace isc::testutils;
  45. using namespace isc::asiodns;
  46. using namespace isc::asiolink;
  47. using namespace isc::server_common;
  48. using isc::UnitTestUtil;
  49. namespace {
  50. const char* const TEST_ADDRESS = "127.0.0.1";
  51. const char* const TEST_PORT = "53535";
  52. // An internal exception class
  53. class TestConfigError : public isc::Exception {
  54. public:
  55. TestConfigError(const char *file, size_t line, const char *what):
  56. isc::Exception(file, line, what) {}
  57. };
  58. class ResolverConfig : public ::testing::Test {
  59. protected:
  60. IOService ios;
  61. DNSService dnss;
  62. Resolver server;
  63. scoped_ptr<const IOEndpoint> endpoint;
  64. scoped_ptr<const IOMessage> query_message;
  65. scoped_ptr<const Client> client;
  66. scoped_ptr<const RequestContext> request;
  67. ResolverConfig() : dnss(ios, NULL, NULL, NULL) {
  68. server.setDNSService(dnss);
  69. }
  70. const RequestContext& createRequest(const string& source_addr) {
  71. endpoint.reset(IOEndpoint::create(IPPROTO_UDP, IOAddress(source_addr),
  72. 53210));
  73. query_message.reset(new IOMessage(NULL, 0,
  74. IOSocket::getDummyUDPSocket(),
  75. *endpoint));
  76. client.reset(new Client(*query_message));
  77. request.reset(new RequestContext(client->getRequestSourceIPAddress(),
  78. NULL));
  79. return (*request);
  80. }
  81. void invalidTest(const string &JSON, const string& name);
  82. };
  83. TEST_F(ResolverConfig, forwardAddresses) {
  84. // Default value should be fully recursive
  85. EXPECT_TRUE(server.getForwardAddresses().empty());
  86. EXPECT_FALSE(server.isForwarding());
  87. // Try putting there some addresses
  88. vector<pair<string, uint16_t> > addresses;
  89. addresses.push_back(pair<string, uint16_t>(DEFAULT_REMOTE_ADDRESS, 53));
  90. addresses.push_back(pair<string, uint16_t>("::1", 53));
  91. server.setForwardAddresses(addresses);
  92. EXPECT_EQ(2, server.getForwardAddresses().size());
  93. EXPECT_EQ("::1", server.getForwardAddresses()[1].first);
  94. EXPECT_TRUE(server.isForwarding());
  95. // Is it independent from what we do with the vector later?
  96. addresses.clear();
  97. EXPECT_EQ(2, server.getForwardAddresses().size());
  98. // Did it return to fully recursive?
  99. server.setForwardAddresses(addresses);
  100. EXPECT_TRUE(server.getForwardAddresses().empty());
  101. EXPECT_FALSE(server.isForwarding());
  102. }
  103. TEST_F(ResolverConfig, forwardAddressConfig) {
  104. // Try putting there some address
  105. ConstElementPtr config(Element::fromJSON("{"
  106. "\"forward_addresses\": ["
  107. " {"
  108. " \"address\": \"192.0.2.1\","
  109. " \"port\": 53"
  110. " }"
  111. "]"
  112. "}"));
  113. ConstElementPtr result(server.updateConfig(config));
  114. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  115. EXPECT_TRUE(server.isForwarding());
  116. ASSERT_EQ(1, server.getForwardAddresses().size());
  117. EXPECT_EQ("192.0.2.1", server.getForwardAddresses()[0].first);
  118. EXPECT_EQ(53, server.getForwardAddresses()[0].second);
  119. // And then remove all addresses
  120. config = Element::fromJSON("{"
  121. "\"forward_addresses\": null"
  122. "}");
  123. result = server.updateConfig(config);
  124. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  125. EXPECT_FALSE(server.isForwarding());
  126. EXPECT_EQ(0, server.getForwardAddresses().size());
  127. }
  128. TEST_F(ResolverConfig, rootAddressConfig) {
  129. // Try putting there some address
  130. ConstElementPtr config(Element::fromJSON("{"
  131. "\"root_addresses\": ["
  132. " {"
  133. " \"address\": \"192.0.2.1\","
  134. " \"port\": 53"
  135. " }"
  136. "]"
  137. "}"));
  138. ConstElementPtr result(server.updateConfig(config));
  139. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  140. ASSERT_EQ(1, server.getRootAddresses().size());
  141. EXPECT_EQ("192.0.2.1", server.getRootAddresses()[0].first);
  142. EXPECT_EQ(53, server.getRootAddresses()[0].second);
  143. // And then remove all addresses
  144. config = Element::fromJSON("{"
  145. "\"root_addresses\": null"
  146. "}");
  147. result = server.updateConfig(config);
  148. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  149. EXPECT_EQ(0, server.getRootAddresses().size());
  150. }
  151. // The following two are helper classes to manage some temporary system
  152. // resources in an RAII manner.
  153. class ScopedAddrInfo : public boost::noncopyable {
  154. public:
  155. ScopedAddrInfo(struct addrinfo* ai) : ai_(ai) {}
  156. ~ScopedAddrInfo() { freeaddrinfo(ai_);}
  157. private:
  158. struct addrinfo* ai_;
  159. };
  160. struct ScopedSocket : public boost::noncopyable {
  161. public:
  162. ScopedSocket(int fd) : fd_(fd) {}
  163. ~ScopedSocket() { close(fd_); }
  164. private:
  165. const int fd_;
  166. };
  167. int
  168. createSocket(const char* address, const char* port) {
  169. struct addrinfo hints, *res;
  170. memset(&hints, 0, sizeof(hints));
  171. hints.ai_family = AF_UNSPEC;
  172. hints.ai_socktype = SOCK_DGRAM;
  173. hints.ai_protocol = IPPROTO_UDP;
  174. hints.ai_flags = AI_NUMERICHOST | AI_NUMERICSERV;
  175. const int error = getaddrinfo(address, port, &hints, &res);
  176. if (error != 0) {
  177. isc_throw(TestConfigError, "getaddrinfo failed: " <<
  178. gai_strerror(error));
  179. }
  180. ScopedAddrInfo scoped_res(res);
  181. const int s = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
  182. if (s == -1) {
  183. isc_throw(TestConfigError, "socket system call failed: " <<
  184. strerror(errno));
  185. }
  186. if (bind(s, res->ai_addr, res->ai_addrlen) == -1) {
  187. close(s);
  188. isc_throw(TestConfigError, "bind system call failed: " <<
  189. strerror(errno));
  190. }
  191. return (s);
  192. }
  193. void
  194. configAnswerCheck(ConstElementPtr config_answer, bool expect_success) {
  195. EXPECT_EQ(Element::map, config_answer->getType());
  196. EXPECT_TRUE(config_answer->contains("result"));
  197. ConstElementPtr result = config_answer->get("result");
  198. EXPECT_EQ(Element::list, result->getType());
  199. EXPECT_EQ(expect_success ? 0 : 1, result->get(0)->intValue());
  200. }
  201. TEST_F(ResolverConfig, listenOnConfig) {
  202. ConstElementPtr config(Element::fromJSON("{"
  203. "\"listen_on\": ["
  204. " {"
  205. " \"address\": \"" +
  206. string(TEST_ADDRESS) + "\","
  207. " \"port\": " +
  208. string(TEST_PORT) + "}]}"));
  209. configAnswerCheck(server.updateConfig(config), true);
  210. }
  211. TEST_F(ResolverConfig, listenOnConfigFail) {
  212. // Create and bind a socket that would make the subsequent listen_on fail
  213. ScopedSocket sock(createSocket(TEST_ADDRESS, TEST_PORT));
  214. ConstElementPtr config(Element::fromJSON("{"
  215. "\"listen_on\": ["
  216. " {"
  217. " \"address\": \"" +
  218. string(TEST_ADDRESS) + "\","
  219. " \"port\": " +
  220. string(TEST_PORT) + "}]}"));
  221. configAnswerCheck(server.updateConfig(config), false);
  222. }
  223. TEST_F(ResolverConfig, listenOnAndOtherConfig) {
  224. // Create and bind a socket that would make the subsequent listen_on fail
  225. ScopedSocket sock(createSocket(TEST_ADDRESS, TEST_PORT));
  226. const string config_str("{\"root_addresses\": ["
  227. " {\"address\": \"192.0.2.1\","
  228. " \"port\": 53}], "
  229. "\"listen_on\": ["
  230. " {\"address\": \"" + string(TEST_ADDRESS) + "\","
  231. " \"port\": " + string(TEST_PORT) + "}]}");
  232. ConstElementPtr config(Element::fromJSON(config_str));
  233. configAnswerCheck(server.updateConfig(config), false);
  234. EXPECT_EQ(0, server.getRootAddresses().size());
  235. configAnswerCheck(server.updateConfig(config, true), false);
  236. EXPECT_EQ(1, server.getRootAddresses().size());
  237. }
  238. void
  239. ResolverConfig::invalidTest(const string &JSON, const string& name) {
  240. isc::testutils::portconfig::configRejected(server, JSON, name);
  241. }
  242. TEST_F(ResolverConfig, invalidForwardAddresses) {
  243. // Try torturing it with some invalid inputs
  244. invalidTest("{"
  245. "\"forward_addresses\": \"error\""
  246. "}", "Invalid type");
  247. invalidTest("{"
  248. "\"forward_addresses\": [{}]"
  249. "}", "Empty element");
  250. invalidTest("{"
  251. "\"forward_addresses\": [{"
  252. " \"port\": 1.5,"
  253. " \"address\": \"192.0.2.1\""
  254. "}]}", "Float port");
  255. invalidTest("{"
  256. "\"forward_addresses\": [{"
  257. " \"port\": -5,"
  258. " \"address\": \"192.0.2.1\""
  259. "}]}", "Negative port");
  260. invalidTest("{"
  261. "\"forward_addresses\": [{"
  262. " \"port\": 53,"
  263. " \"address\": \"bad_address\""
  264. "}]}", "Bad address");
  265. }
  266. // Try setting the addresses directly
  267. TEST_F(ResolverConfig, listenAddresses) {
  268. isc::testutils::portconfig::listenAddresses(server);
  269. }
  270. // Try setting some addresses and a rollback
  271. TEST_F(ResolverConfig, listenAddressConfig) {
  272. isc::testutils::portconfig::listenAddressConfig(server);
  273. }
  274. // Try some invalid configs are rejected
  275. TEST_F(ResolverConfig, invalidListenAddresses) {
  276. isc::testutils::portconfig::invalidListenAddressConfig(server);
  277. }
  278. // Just test it sets and gets the values correctly
  279. TEST_F(ResolverConfig, timeouts) {
  280. server.setTimeouts(0, 1, 2, 3);
  281. EXPECT_EQ(0, server.getQueryTimeout());
  282. EXPECT_EQ(1, server.getClientTimeout());
  283. EXPECT_EQ(2, server.getLookupTimeout());
  284. EXPECT_EQ(3, server.getRetries());
  285. server.setTimeouts();
  286. EXPECT_EQ(2000, server.getQueryTimeout());
  287. EXPECT_EQ(4000, server.getClientTimeout());
  288. EXPECT_EQ(30000, server.getLookupTimeout());
  289. EXPECT_EQ(3, server.getRetries());
  290. }
  291. TEST_F(ResolverConfig, timeoutsConfig) {
  292. ConstElementPtr config = Element::fromJSON("{"
  293. "\"timeout_query\": 1000,"
  294. "\"timeout_client\": 2000,"
  295. "\"timeout_lookup\": 3000,"
  296. "\"retries\": 4"
  297. "}");
  298. ConstElementPtr result(server.updateConfig(config));
  299. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  300. EXPECT_EQ(1000, server.getQueryTimeout());
  301. EXPECT_EQ(2000, server.getClientTimeout());
  302. EXPECT_EQ(3000, server.getLookupTimeout());
  303. EXPECT_EQ(4, server.getRetries());
  304. }
  305. TEST_F(ResolverConfig, invalidTimeoutsConfig) {
  306. invalidTest("{"
  307. "\"timeout_query\": \"error\""
  308. "}", "Wrong query element type");
  309. invalidTest("{"
  310. "\"timeout_query\": -2"
  311. "}", "Negative query timeout");
  312. invalidTest("{"
  313. "\"timeout_client\": \"error\""
  314. "}", "Wrong client element type");
  315. invalidTest("{"
  316. "\"timeout_client\": -2"
  317. "}", "Negative client timeout");
  318. invalidTest("{"
  319. "\"timeout_lookup\": \"error\""
  320. "}", "Wrong lookup element type");
  321. invalidTest("{"
  322. "\"timeout_lookup\": -2"
  323. "}", "Negative lookup timeout");
  324. invalidTest("{"
  325. "\"retries\": \"error\""
  326. "}", "Wrong retries element type");
  327. invalidTest("{"
  328. "\"retries\": -1"
  329. "}", "Negative number of retries");
  330. }
  331. TEST_F(ResolverConfig, defaultQueryACL) {
  332. // If no configuration is loaded, the default ACL should reject everything.
  333. EXPECT_EQ(REJECT, server.getQueryACL().execute(createRequest("192.0.2.1")));
  334. EXPECT_EQ(REJECT, server.getQueryACL().execute(
  335. createRequest("2001:db8::1")));
  336. // The following would be allowed if the server had loaded the default
  337. // configuration from the spec file. In this context it should not have
  338. // happened, and they should be rejected just like the above cases.
  339. EXPECT_EQ(REJECT, server.getQueryACL().execute(createRequest("127.0.0.1")));
  340. EXPECT_EQ(REJECT, server.getQueryACL().execute(createRequest("::1")));
  341. }
  342. TEST_F(ResolverConfig, emptyQueryACL) {
  343. // Explicitly configured empty ACL should have the same effect.
  344. ConstElementPtr config(Element::fromJSON("{ \"query_acl\": [] }"));
  345. ConstElementPtr result(server.updateConfig(config));
  346. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  347. EXPECT_EQ(REJECT, server.getQueryACL().execute(createRequest("192.0.2.1")));
  348. EXPECT_EQ(REJECT, server.getQueryACL().execute(
  349. createRequest("2001:db8::1")));
  350. }
  351. TEST_F(ResolverConfig, queryACLIPv4) {
  352. // A simple "accept" query for a specific IPv4 address
  353. ConstElementPtr config(Element::fromJSON(
  354. "{ \"query_acl\": "
  355. " [ {\"action\": \"ACCEPT\","
  356. " \"from\": \"192.0.2.1\"} ] }"));
  357. ConstElementPtr result(server.updateConfig(config));
  358. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  359. EXPECT_EQ(ACCEPT, server.getQueryACL().execute(createRequest("192.0.2.1")));
  360. EXPECT_EQ(REJECT, server.getQueryACL().execute(
  361. createRequest("2001:db8::1")));
  362. }
  363. TEST_F(ResolverConfig, queryACLIPv6) {
  364. // same for IPv6
  365. ConstElementPtr config(Element::fromJSON(
  366. "{ \"query_acl\": "
  367. " [ {\"action\": \"ACCEPT\","
  368. " \"from\": \"2001:db8::1\"} ] }"));
  369. ConstElementPtr result(server.updateConfig(config));
  370. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  371. EXPECT_EQ(REJECT, server.getQueryACL().execute(createRequest("192.0.2.1")));
  372. EXPECT_EQ(ACCEPT, server.getQueryACL().execute(
  373. createRequest("2001:db8::1")));
  374. }
  375. TEST_F(ResolverConfig, multiEntryACL) {
  376. // A bit more complicated one: mixture of IPv4 and IPv6 with 3 rules
  377. // in total. We shouldn't have to check so many variations of rules
  378. // as it should have been tested in the underlying ACL module. All we
  379. // have to do to check is a reasonably complicated ACL configuration is
  380. // loaded as expected.
  381. ConstElementPtr config(Element::fromJSON(
  382. "{ \"query_acl\": "
  383. " [ {\"action\": \"ACCEPT\","
  384. " \"from\": \"192.0.2.1\"},"
  385. " {\"action\": \"REJECT\","
  386. " \"from\": \"192.0.2.0/24\"},"
  387. " {\"action\": \"DROP\","
  388. " \"from\": \"2001:db8::1\"},"
  389. "] }"));
  390. ConstElementPtr result(server.updateConfig(config));
  391. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  392. EXPECT_EQ(ACCEPT, server.getQueryACL().execute(createRequest("192.0.2.1")));
  393. EXPECT_EQ(REJECT, server.getQueryACL().execute(createRequest("192.0.2.2")));
  394. EXPECT_EQ(DROP, server.getQueryACL().execute(
  395. createRequest("2001:db8::1")));
  396. EXPECT_EQ(REJECT, server.getQueryACL().execute(
  397. createRequest("2001:db8::2"))); // match the default rule
  398. }
  399. int
  400. getResultCode(ConstElementPtr result) {
  401. int rcode;
  402. isc::config::parseAnswer(rcode, result);
  403. return (rcode);
  404. }
  405. TEST_F(ResolverConfig, queryACLActionOnly) {
  406. // "action only" rule will be accepted by the loader, which can
  407. // effectively change the default action.
  408. ConstElementPtr config(Element::fromJSON(
  409. "{ \"query_acl\": "
  410. " [ {\"action\": \"ACCEPT\","
  411. " \"from\": \"192.0.2.1\"},"
  412. " {\"action\": \"DROP\"} ] }"));
  413. EXPECT_EQ(0, getResultCode(server.updateConfig(config)));
  414. EXPECT_EQ(ACCEPT, server.getQueryACL().execute(createRequest("192.0.2.1")));
  415. // We reject non matching queries by default, but the last resort
  416. // rule should have changed the action in that case to "DROP".
  417. EXPECT_EQ(DROP, server.getQueryACL().execute(createRequest("192.0.2.2")));
  418. }
  419. TEST_F(ResolverConfig, badQueryACL) {
  420. // Most of these cases shouldn't happen in practice because the syntax
  421. // check should be performed before updateConfig(). But we check at
  422. // least the server code won't crash even if an unexpected input is given.
  423. // ACL must be a list
  424. EXPECT_EQ(1, getResultCode(
  425. server.updateConfig(
  426. Element::fromJSON("{ \"query_acl\": 1 }"))));
  427. // Each rule must have "action" and "from"
  428. EXPECT_EQ(1, getResultCode(
  429. server.updateConfig(
  430. Element::fromJSON("{ \"query_acl\":"
  431. " [ {\"from\": \"192.0.2.1\"} ] }"))));
  432. // invalid "action"
  433. EXPECT_EQ(1, getResultCode(
  434. server.updateConfig(
  435. Element::fromJSON("{ \"query_acl\":"
  436. " [ {\"action\": 1,"
  437. " \"from\": \"192.0.2.1\"}]}"))));
  438. EXPECT_EQ(1, getResultCode(
  439. server.updateConfig(
  440. Element::fromJSON("{ \"query_acl\":"
  441. " [ {\"action\": \"BADACTION\","
  442. " \"from\": \"192.0.2.1\"}]}"))));
  443. // invalid "from"
  444. EXPECT_EQ(1, getResultCode(
  445. server.updateConfig(
  446. Element::fromJSON("{ \"query_acl\":"
  447. " [ {\"action\": \"ACCEPT\","
  448. " \"from\": 53}]}"))));
  449. EXPECT_EQ(1, getResultCode(
  450. server.updateConfig(
  451. Element::fromJSON("{ \"query_acl\":"
  452. " [ {\"action\": \"ACCEPT\","
  453. " \"from\": \"1922.0.2.1\"}]}"))));
  454. }
  455. }