resolver_config_unittest.cc 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517
  1. // Copyright (C) 2010 Internet Systems Consortium, Inc. ("ISC")
  2. //
  3. // Permission to use, copy, modify, and/or distribute this software for any
  4. // purpose with or without fee is hereby granted, provided that the above
  5. // copyright notice and this permission notice appear in all copies.
  6. //
  7. // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
  8. // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
  9. // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
  10. // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
  11. // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
  12. // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  13. // PERFORMANCE OF THIS SOFTWARE.
  14. #include <config.h>
  15. #include <sys/types.h>
  16. #include <sys/socket.h>
  17. #include <netinet/in.h>
  18. #include <netdb.h>
  19. #include <cerrno>
  20. #include <cstring>
  21. #include <string>
  22. #include <boost/scoped_ptr.hpp>
  23. #include <boost/noncopyable.hpp>
  24. #include <gtest/gtest.h>
  25. #include <exceptions/exceptions.h>
  26. #include <cc/data.h>
  27. #include <config/ccsession.h>
  28. #include <asiodns/asiodns.h>
  29. #include <asiolink/asiolink.h>
  30. #include <asiolink/io_address.h>
  31. #include <asiolink/io_socket.h>
  32. #include <asiolink/io_message.h>
  33. #include <acl/acl.h>
  34. #include <server_common/client.h>
  35. #include <resolver/resolver.h>
  36. #include <dns/tests/unittest_util.h>
  37. #include <testutils/srv_test.h>
  38. #include <testutils/portconfig.h>
  39. using namespace std;
  40. using boost::scoped_ptr;
  41. using namespace isc::acl;
  42. using isc::acl::dns::RequestContext;
  43. using namespace isc::data;
  44. using namespace isc::testutils;
  45. using namespace isc::asiodns;
  46. using namespace isc::asiolink;
  47. using namespace isc::server_common;
  48. using isc::UnitTestUtil;
  49. namespace {
  50. const char* const TEST_ADDRESS = "127.0.0.1";
  51. const char* const TEST_PORT = "53535";
  52. // An internal exception class
  53. class TestConfigError : public isc::Exception {
  54. public:
  55. TestConfigError(const char *file, size_t line, const char *what):
  56. isc::Exception(file, line, what) {}
  57. };
  58. class ResolverConfig : public ::testing::Test {
  59. protected:
  60. IOService ios;
  61. DNSService dnss;
  62. Resolver server;
  63. scoped_ptr<const IOEndpoint> endpoint;
  64. scoped_ptr<const IOMessage> query_message;
  65. scoped_ptr<const Client> client;
  66. scoped_ptr<const RequestContext> request;
  67. ResolverConfig() : dnss(ios, NULL, NULL, NULL) {
  68. server.setDNSService(dnss);
  69. }
  70. const RequestContext& createRequest(const string& source_addr) {
  71. endpoint.reset(IOEndpoint::create(IPPROTO_UDP, IOAddress(source_addr),
  72. 53210));
  73. query_message.reset(new IOMessage(NULL, 0,
  74. IOSocket::getDummyUDPSocket(),
  75. *endpoint));
  76. client.reset(new Client(*query_message));
  77. request.reset(new RequestContext(client->getRequestSourceIPAddress(),
  78. NULL));
  79. return (*request);
  80. }
  81. void invalidTest(const string &JSON, const string& name);
  82. };
  83. TEST_F(ResolverConfig, forwardAddresses) {
  84. // Default value should be fully recursive
  85. EXPECT_TRUE(server.getForwardAddresses().empty());
  86. EXPECT_FALSE(server.isForwarding());
  87. // Try putting there some addresses
  88. vector<pair<string, uint16_t> > addresses;
  89. addresses.push_back(pair<string, uint16_t>(DEFAULT_REMOTE_ADDRESS, 53));
  90. addresses.push_back(pair<string, uint16_t>("::1", 53));
  91. server.setForwardAddresses(addresses);
  92. EXPECT_EQ(2, server.getForwardAddresses().size());
  93. EXPECT_EQ("::1", server.getForwardAddresses()[1].first);
  94. EXPECT_TRUE(server.isForwarding());
  95. // Is it independent from what we do with the vector later?
  96. addresses.clear();
  97. EXPECT_EQ(2, server.getForwardAddresses().size());
  98. // Did it return to fully recursive?
  99. server.setForwardAddresses(addresses);
  100. EXPECT_TRUE(server.getForwardAddresses().empty());
  101. EXPECT_FALSE(server.isForwarding());
  102. }
  103. TEST_F(ResolverConfig, forwardAddressConfig) {
  104. // Try putting there some address
  105. ConstElementPtr config(Element::fromJSON("{"
  106. "\"forward_addresses\": ["
  107. " {"
  108. " \"address\": \"192.0.2.1\","
  109. " \"port\": 53"
  110. " }"
  111. "]"
  112. "}"));
  113. ConstElementPtr result(server.updateConfig(config));
  114. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  115. EXPECT_TRUE(server.isForwarding());
  116. ASSERT_EQ(1, server.getForwardAddresses().size());
  117. EXPECT_EQ("192.0.2.1", server.getForwardAddresses()[0].first);
  118. EXPECT_EQ(53, server.getForwardAddresses()[0].second);
  119. // And then remove all addresses
  120. config = Element::fromJSON("{"
  121. "\"forward_addresses\": null"
  122. "}");
  123. result = server.updateConfig(config);
  124. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  125. EXPECT_FALSE(server.isForwarding());
  126. EXPECT_EQ(0, server.getForwardAddresses().size());
  127. }
  128. TEST_F(ResolverConfig, rootAddressConfig) {
  129. // Try putting there some address
  130. ConstElementPtr config(Element::fromJSON("{"
  131. "\"root_addresses\": ["
  132. " {"
  133. " \"address\": \"192.0.2.1\","
  134. " \"port\": 53"
  135. " }"
  136. "]"
  137. "}"));
  138. ConstElementPtr result(server.updateConfig(config));
  139. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  140. ASSERT_EQ(1, server.getRootAddresses().size());
  141. EXPECT_EQ("192.0.2.1", server.getRootAddresses()[0].first);
  142. EXPECT_EQ(53, server.getRootAddresses()[0].second);
  143. // And then remove all addresses
  144. config = Element::fromJSON("{"
  145. "\"root_addresses\": null"
  146. "}");
  147. result = server.updateConfig(config);
  148. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  149. EXPECT_EQ(0, server.getRootAddresses().size());
  150. }
  151. // The following two are helper classes to manage some temporary system
  152. // resources in an RAII manner.
  153. class ScopedAddrInfo : public boost::noncopyable {
  154. public:
  155. ScopedAddrInfo(struct addrinfo* ai) : ai_(ai) {}
  156. ~ScopedAddrInfo() { freeaddrinfo(ai_);}
  157. private:
  158. struct addrinfo* ai_;
  159. };
  160. struct ScopedSocket : public boost::noncopyable {
  161. public:
  162. ScopedSocket(int fd) : fd_(fd) {}
  163. ~ScopedSocket() { close(fd_); }
  164. private:
  165. const int fd_;
  166. };
  167. int
  168. createSocket(const char* address, const char* port) {
  169. struct addrinfo hints, *res;
  170. memset(&hints, 0, sizeof(hints));
  171. hints.ai_family = AF_UNSPEC;
  172. hints.ai_socktype = SOCK_DGRAM;
  173. hints.ai_protocol = IPPROTO_UDP;
  174. hints.ai_flags = AI_NUMERICHOST | AI_NUMERICSERV;
  175. const int error = getaddrinfo(address, port, &hints, &res);
  176. if (error != 0) {
  177. isc_throw(TestConfigError, "getaddrinfo failed: " <<
  178. gai_strerror(error));
  179. }
  180. ScopedAddrInfo scoped_res(res);
  181. const int s = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
  182. if (s == -1) {
  183. isc_throw(TestConfigError, "socket system call failed: " <<
  184. strerror(errno));
  185. }
  186. if (bind(s, res->ai_addr, res->ai_addrlen) == -1) {
  187. close(s);
  188. isc_throw(TestConfigError, "bind system call failed: " <<
  189. strerror(errno));
  190. }
  191. return (s);
  192. }
  193. void
  194. configAnswerCheck(ConstElementPtr config_answer, bool expect_success) {
  195. EXPECT_EQ(Element::map, config_answer->getType());
  196. EXPECT_TRUE(config_answer->contains("result"));
  197. ConstElementPtr result = config_answer->get("result");
  198. EXPECT_EQ(Element::list, result->getType());
  199. EXPECT_EQ(expect_success ? 0 : 1, result->get(0)->intValue());
  200. }
  201. TEST_F(ResolverConfig, listenOnConfig) {
  202. ConstElementPtr config(Element::fromJSON("{"
  203. "\"listen_on\": ["
  204. " {"
  205. " \"address\": \"" +
  206. string(TEST_ADDRESS) + "\","
  207. " \"port\": " +
  208. string(TEST_PORT) + "}]}"));
  209. configAnswerCheck(server.updateConfig(config), true);
  210. }
  211. TEST_F(ResolverConfig, listenOnConfigFail) {
  212. // Create and bind a socket that would make the subsequent listen_on fail
  213. ScopedSocket sock(createSocket(TEST_ADDRESS, TEST_PORT));
  214. ConstElementPtr config(Element::fromJSON("{"
  215. "\"listen_on\": ["
  216. " {"
  217. " \"address\": \"" +
  218. string(TEST_ADDRESS) + "\","
  219. " \"port\": " +
  220. string(TEST_PORT) + "}]}"));
  221. configAnswerCheck(server.updateConfig(config), false);
  222. }
  223. TEST_F(ResolverConfig, listenOnAndOtherConfig) {
  224. // Create and bind a socket that would make the subsequent listen_on fail
  225. ScopedSocket sock(createSocket(TEST_ADDRESS, TEST_PORT));
  226. // We are going to install a pair of "root_addresses" and "listen_on"
  227. // in a single update.
  228. const string config_str("{\"root_addresses\": ["
  229. " {\"address\": \"192.0.2.1\","
  230. " \"port\": 53}], "
  231. "\"listen_on\": ["
  232. " {\"address\": \"" + string(TEST_ADDRESS) + "\","
  233. " \"port\": " + string(TEST_PORT) + "}]}");
  234. // Normally, if listen_on fails the rest of the config parameters will
  235. // be ignored.
  236. ConstElementPtr config(Element::fromJSON(config_str));
  237. configAnswerCheck(server.updateConfig(config), false);
  238. EXPECT_EQ(0, server.getRootAddresses().size());
  239. // On startup the other parameters will be installed anyway.
  240. configAnswerCheck(server.updateConfig(config, true), false);
  241. EXPECT_EQ(1, server.getRootAddresses().size());
  242. }
  243. void
  244. ResolverConfig::invalidTest(const string &JSON, const string& name) {
  245. isc::testutils::portconfig::configRejected(server, JSON, name);
  246. }
  247. TEST_F(ResolverConfig, invalidForwardAddresses) {
  248. // Try torturing it with some invalid inputs
  249. invalidTest("{"
  250. "\"forward_addresses\": \"error\""
  251. "}", "Invalid type");
  252. invalidTest("{"
  253. "\"forward_addresses\": [{}]"
  254. "}", "Empty element");
  255. invalidTest("{"
  256. "\"forward_addresses\": [{"
  257. " \"port\": 1.5,"
  258. " \"address\": \"192.0.2.1\""
  259. "}]}", "Float port");
  260. invalidTest("{"
  261. "\"forward_addresses\": [{"
  262. " \"port\": -5,"
  263. " \"address\": \"192.0.2.1\""
  264. "}]}", "Negative port");
  265. invalidTest("{"
  266. "\"forward_addresses\": [{"
  267. " \"port\": 53,"
  268. " \"address\": \"bad_address\""
  269. "}]}", "Bad address");
  270. }
  271. // Try setting the addresses directly
  272. TEST_F(ResolverConfig, listenAddresses) {
  273. isc::testutils::portconfig::listenAddresses(server);
  274. }
  275. // Try setting some addresses and a rollback
  276. TEST_F(ResolverConfig, listenAddressConfig) {
  277. isc::testutils::portconfig::listenAddressConfig(server);
  278. }
  279. // Try some invalid configs are rejected
  280. TEST_F(ResolverConfig, invalidListenAddresses) {
  281. isc::testutils::portconfig::invalidListenAddressConfig(server);
  282. }
  283. // Just test it sets and gets the values correctly
  284. TEST_F(ResolverConfig, timeouts) {
  285. server.setTimeouts(0, 1, 2, 3);
  286. EXPECT_EQ(0, server.getQueryTimeout());
  287. EXPECT_EQ(1, server.getClientTimeout());
  288. EXPECT_EQ(2, server.getLookupTimeout());
  289. EXPECT_EQ(3, server.getRetries());
  290. server.setTimeouts();
  291. EXPECT_EQ(2000, server.getQueryTimeout());
  292. EXPECT_EQ(4000, server.getClientTimeout());
  293. EXPECT_EQ(30000, server.getLookupTimeout());
  294. EXPECT_EQ(3, server.getRetries());
  295. }
  296. TEST_F(ResolverConfig, timeoutsConfig) {
  297. ConstElementPtr config = Element::fromJSON("{"
  298. "\"timeout_query\": 1000,"
  299. "\"timeout_client\": 2000,"
  300. "\"timeout_lookup\": 3000,"
  301. "\"retries\": 4"
  302. "}");
  303. ConstElementPtr result(server.updateConfig(config));
  304. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  305. EXPECT_EQ(1000, server.getQueryTimeout());
  306. EXPECT_EQ(2000, server.getClientTimeout());
  307. EXPECT_EQ(3000, server.getLookupTimeout());
  308. EXPECT_EQ(4, server.getRetries());
  309. }
  310. TEST_F(ResolverConfig, invalidTimeoutsConfig) {
  311. invalidTest("{"
  312. "\"timeout_query\": \"error\""
  313. "}", "Wrong query element type");
  314. invalidTest("{"
  315. "\"timeout_query\": -2"
  316. "}", "Negative query timeout");
  317. invalidTest("{"
  318. "\"timeout_client\": \"error\""
  319. "}", "Wrong client element type");
  320. invalidTest("{"
  321. "\"timeout_client\": -2"
  322. "}", "Negative client timeout");
  323. invalidTest("{"
  324. "\"timeout_lookup\": \"error\""
  325. "}", "Wrong lookup element type");
  326. invalidTest("{"
  327. "\"timeout_lookup\": -2"
  328. "}", "Negative lookup timeout");
  329. invalidTest("{"
  330. "\"retries\": \"error\""
  331. "}", "Wrong retries element type");
  332. invalidTest("{"
  333. "\"retries\": -1"
  334. "}", "Negative number of retries");
  335. }
  336. TEST_F(ResolverConfig, defaultQueryACL) {
  337. // If no configuration is loaded, the default ACL should reject everything.
  338. EXPECT_EQ(REJECT, server.getQueryACL().execute(createRequest("192.0.2.1")));
  339. EXPECT_EQ(REJECT, server.getQueryACL().execute(
  340. createRequest("2001:db8::1")));
  341. // The following would be allowed if the server had loaded the default
  342. // configuration from the spec file. In this context it should not have
  343. // happened, and they should be rejected just like the above cases.
  344. EXPECT_EQ(REJECT, server.getQueryACL().execute(createRequest("127.0.0.1")));
  345. EXPECT_EQ(REJECT, server.getQueryACL().execute(createRequest("::1")));
  346. }
  347. TEST_F(ResolverConfig, emptyQueryACL) {
  348. // Explicitly configured empty ACL should have the same effect.
  349. ConstElementPtr config(Element::fromJSON("{ \"query_acl\": [] }"));
  350. ConstElementPtr result(server.updateConfig(config));
  351. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  352. EXPECT_EQ(REJECT, server.getQueryACL().execute(createRequest("192.0.2.1")));
  353. EXPECT_EQ(REJECT, server.getQueryACL().execute(
  354. createRequest("2001:db8::1")));
  355. }
  356. TEST_F(ResolverConfig, queryACLIPv4) {
  357. // A simple "accept" query for a specific IPv4 address
  358. ConstElementPtr config(Element::fromJSON(
  359. "{ \"query_acl\": "
  360. " [ {\"action\": \"ACCEPT\","
  361. " \"from\": \"192.0.2.1\"} ] }"));
  362. ConstElementPtr result(server.updateConfig(config));
  363. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  364. EXPECT_EQ(ACCEPT, server.getQueryACL().execute(createRequest("192.0.2.1")));
  365. EXPECT_EQ(REJECT, server.getQueryACL().execute(
  366. createRequest("2001:db8::1")));
  367. }
  368. TEST_F(ResolverConfig, queryACLIPv6) {
  369. // same for IPv6
  370. ConstElementPtr config(Element::fromJSON(
  371. "{ \"query_acl\": "
  372. " [ {\"action\": \"ACCEPT\","
  373. " \"from\": \"2001:db8::1\"} ] }"));
  374. ConstElementPtr result(server.updateConfig(config));
  375. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  376. EXPECT_EQ(REJECT, server.getQueryACL().execute(createRequest("192.0.2.1")));
  377. EXPECT_EQ(ACCEPT, server.getQueryACL().execute(
  378. createRequest("2001:db8::1")));
  379. }
  380. TEST_F(ResolverConfig, multiEntryACL) {
  381. // A bit more complicated one: mixture of IPv4 and IPv6 with 3 rules
  382. // in total. We shouldn't have to check so many variations of rules
  383. // as it should have been tested in the underlying ACL module. All we
  384. // have to do to check is a reasonably complicated ACL configuration is
  385. // loaded as expected.
  386. ConstElementPtr config(Element::fromJSON(
  387. "{ \"query_acl\": "
  388. " [ {\"action\": \"ACCEPT\","
  389. " \"from\": \"192.0.2.1\"},"
  390. " {\"action\": \"REJECT\","
  391. " \"from\": \"192.0.2.0/24\"},"
  392. " {\"action\": \"DROP\","
  393. " \"from\": \"2001:db8::1\"},"
  394. "] }"));
  395. ConstElementPtr result(server.updateConfig(config));
  396. EXPECT_EQ(result->toWire(), isc::config::createAnswer()->toWire());
  397. EXPECT_EQ(ACCEPT, server.getQueryACL().execute(createRequest("192.0.2.1")));
  398. EXPECT_EQ(REJECT, server.getQueryACL().execute(createRequest("192.0.2.2")));
  399. EXPECT_EQ(DROP, server.getQueryACL().execute(
  400. createRequest("2001:db8::1")));
  401. EXPECT_EQ(REJECT, server.getQueryACL().execute(
  402. createRequest("2001:db8::2"))); // match the default rule
  403. }
  404. int
  405. getResultCode(ConstElementPtr result) {
  406. int rcode;
  407. isc::config::parseAnswer(rcode, result);
  408. return (rcode);
  409. }
  410. TEST_F(ResolverConfig, queryACLActionOnly) {
  411. // "action only" rule will be accepted by the loader, which can
  412. // effectively change the default action.
  413. ConstElementPtr config(Element::fromJSON(
  414. "{ \"query_acl\": "
  415. " [ {\"action\": \"ACCEPT\","
  416. " \"from\": \"192.0.2.1\"},"
  417. " {\"action\": \"DROP\"} ] }"));
  418. EXPECT_EQ(0, getResultCode(server.updateConfig(config)));
  419. EXPECT_EQ(ACCEPT, server.getQueryACL().execute(createRequest("192.0.2.1")));
  420. // We reject non matching queries by default, but the last resort
  421. // rule should have changed the action in that case to "DROP".
  422. EXPECT_EQ(DROP, server.getQueryACL().execute(createRequest("192.0.2.2")));
  423. }
  424. TEST_F(ResolverConfig, badQueryACL) {
  425. // Most of these cases shouldn't happen in practice because the syntax
  426. // check should be performed before updateConfig(). But we check at
  427. // least the server code won't crash even if an unexpected input is given.
  428. // ACL must be a list
  429. EXPECT_EQ(1, getResultCode(
  430. server.updateConfig(
  431. Element::fromJSON("{ \"query_acl\": 1 }"))));
  432. // Each rule must have "action" and "from"
  433. EXPECT_EQ(1, getResultCode(
  434. server.updateConfig(
  435. Element::fromJSON("{ \"query_acl\":"
  436. " [ {\"from\": \"192.0.2.1\"} ] }"))));
  437. // invalid "action"
  438. EXPECT_EQ(1, getResultCode(
  439. server.updateConfig(
  440. Element::fromJSON("{ \"query_acl\":"
  441. " [ {\"action\": 1,"
  442. " \"from\": \"192.0.2.1\"}]}"))));
  443. EXPECT_EQ(1, getResultCode(
  444. server.updateConfig(
  445. Element::fromJSON("{ \"query_acl\":"
  446. " [ {\"action\": \"BADACTION\","
  447. " \"from\": \"192.0.2.1\"}]}"))));
  448. // invalid "from"
  449. EXPECT_EQ(1, getResultCode(
  450. server.updateConfig(
  451. Element::fromJSON("{ \"query_acl\":"
  452. " [ {\"action\": \"ACCEPT\","
  453. " \"from\": 53}]}"))));
  454. EXPECT_EQ(1, getResultCode(
  455. server.updateConfig(
  456. Element::fromJSON("{ \"query_acl\":"
  457. " [ {\"action\": \"ACCEPT\","
  458. " \"from\": \"1922.0.2.1\"}]}"))));
  459. }
  460. }