database_unittest.cc 84 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974
  1. // Copyright (C) 2011 Internet Systems Consortium, Inc. ("ISC")
  2. //
  3. // Permission to use, copy, modify, and/or distribute this software for any
  4. // purpose with or without fee is hereby granted, provided that the above
  5. // copyright notice and this permission notice appear in all copies.
  6. //
  7. // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
  8. // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
  9. // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
  10. // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
  11. // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
  12. // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  13. // PERFORMANCE OF THIS SOFTWARE.
  14. #include <boost/foreach.hpp>
  15. #include <gtest/gtest.h>
  16. #include <dns/name.h>
  17. #include <dns/rrttl.h>
  18. #include <dns/rrset.h>
  19. #include <exceptions/exceptions.h>
  20. #include <datasrc/database.h>
  21. #include <datasrc/zone.h>
  22. #include <datasrc/data_source.h>
  23. #include <datasrc/iterator.h>
  24. #include <testutils/dnsmessage_test.h>
  25. #include <map>
  26. using namespace isc::datasrc;
  27. using namespace std;
  28. using namespace boost;
  29. using namespace isc::dns;
  30. namespace {
  31. // Imaginary zone IDs used in the mock accessor below.
  32. const int READONLY_ZONE_ID = 42;
  33. const int WRITABLE_ZONE_ID = 4200;
  34. /*
  35. * An accessor with minimum implementation, keeping the original
  36. * "NotImplemented" methods.
  37. */
  38. class NopAccessor : public DatabaseAccessor {
  39. public:
  40. NopAccessor() : database_name_("mock_database")
  41. { }
  42. virtual std::pair<bool, int> getZone(const std::string& name) const {
  43. if (name == "example.org.") {
  44. return (std::pair<bool, int>(true, READONLY_ZONE_ID));
  45. } else if (name == "null.example.org.") {
  46. return (std::pair<bool, int>(true, 13));
  47. } else if (name == "empty.example.org.") {
  48. return (std::pair<bool, int>(true, 0));
  49. } else if (name == "bad.example.org.") {
  50. return (std::pair<bool, int>(true, -1));
  51. } else {
  52. return (std::pair<bool, int>(false, 0));
  53. }
  54. }
  55. virtual shared_ptr<DatabaseAccessor> clone() {
  56. return (shared_ptr<DatabaseAccessor>()); // bogus data, but unused
  57. }
  58. virtual std::pair<bool, int> startUpdateZone(const std::string&, bool) {
  59. // return dummy value. unused anyway.
  60. return (pair<bool, int>(true, 0));
  61. }
  62. virtual void commitUpdateZone() {}
  63. virtual void rollbackUpdateZone() {}
  64. virtual void addRecordToZone(const string (&)[ADD_COLUMN_COUNT]) {}
  65. virtual void deleteRecordInZone(const string (&)[DEL_PARAM_COUNT]) {}
  66. virtual const std::string& getDBName() const {
  67. return (database_name_);
  68. }
  69. virtual IteratorContextPtr getRecords(const std::string&, int, bool)
  70. const
  71. {
  72. isc_throw(isc::NotImplemented,
  73. "This database datasource can't be iterated");
  74. }
  75. virtual IteratorContextPtr getAllRecords(int) const {
  76. isc_throw(isc::NotImplemented,
  77. "This database datasource can't be iterated");
  78. }
  79. private:
  80. const std::string database_name_;
  81. };
  82. /*
  83. * A virtual database accessor that pretends it contains single zone --
  84. * example.org.
  85. *
  86. * It has the same getZone method as NopConnection, but it provides
  87. * implementation of the optional functionality.
  88. */
  89. class MockAccessor : public NopAccessor {
  90. // Type of mock database "row"s
  91. typedef std::map<std::string, std::vector< std::vector<std::string> > >
  92. Domains;
  93. public:
  94. MockAccessor() : rollbacked_(false) {
  95. readonly_records_ = &readonly_records_master_;
  96. update_records_ = &update_records_master_;
  97. empty_records_ = &empty_records_master_;
  98. fillData();
  99. }
  100. virtual shared_ptr<DatabaseAccessor> clone() {
  101. shared_ptr<MockAccessor> cloned_accessor(new MockAccessor());
  102. cloned_accessor->readonly_records_ = &readonly_records_master_;
  103. cloned_accessor->update_records_ = &update_records_master_;
  104. cloned_accessor->empty_records_ = &empty_records_master_;
  105. latest_clone_ = cloned_accessor;
  106. return (cloned_accessor);
  107. }
  108. private:
  109. class MockNameIteratorContext : public IteratorContext {
  110. public:
  111. MockNameIteratorContext(const MockAccessor& mock_accessor, int zone_id,
  112. const std::string& name, bool subdomains) :
  113. searched_name_(name), cur_record_(0)
  114. {
  115. // 'hardcoded' names to trigger exceptions
  116. // On these names some exceptions are thrown, to test the robustness
  117. // of the find() method.
  118. if (searched_name_ == "dsexception.in.search.") {
  119. isc_throw(DataSourceError, "datasource exception on search");
  120. } else if (searched_name_ == "iscexception.in.search.") {
  121. isc_throw(isc::Exception, "isc exception on search");
  122. } else if (searched_name_ == "basicexception.in.search.") {
  123. throw std::exception();
  124. }
  125. cur_record_ = 0;
  126. const Domains& cur_records = mock_accessor.getMockRecords(zone_id);
  127. if (cur_records.count(name) > 0) {
  128. // we're not aiming for efficiency in this test, simply
  129. // copy the relevant vector from records
  130. cur_name = cur_records.find(name)->second;
  131. } else if (subdomains) {
  132. cur_name.clear();
  133. // Just walk everything and check if it is a subdomain.
  134. // If it is, just copy all data from there.
  135. for (Domains::const_iterator i(cur_records.begin());
  136. i != cur_records.end(); ++i) {
  137. const Name local(i->first);
  138. if (local.compare(Name(name)).getRelation() ==
  139. isc::dns::NameComparisonResult::SUBDOMAIN) {
  140. cur_name.insert(cur_name.end(), i->second.begin(),
  141. i->second.end());
  142. }
  143. }
  144. } else {
  145. cur_name.clear();
  146. }
  147. }
  148. virtual bool getNext(std::string (&columns)[COLUMN_COUNT]) {
  149. if (searched_name_ == "dsexception.in.getnext.") {
  150. isc_throw(DataSourceError, "datasource exception on getnextrecord");
  151. } else if (searched_name_ == "iscexception.in.getnext.") {
  152. isc_throw(isc::Exception, "isc exception on getnextrecord");
  153. } else if (searched_name_ == "basicexception.in.getnext.") {
  154. throw std::exception();
  155. }
  156. if (cur_record_ < cur_name.size()) {
  157. for (size_t i = 0; i < COLUMN_COUNT; ++i) {
  158. columns[i] = cur_name[cur_record_][i];
  159. }
  160. cur_record_++;
  161. return (true);
  162. } else {
  163. return (false);
  164. }
  165. }
  166. private:
  167. const std::string searched_name_;
  168. int cur_record_;
  169. std::vector< std::vector<std::string> > cur_name;
  170. };
  171. class MockIteratorContext : public IteratorContext {
  172. private:
  173. int step;
  174. public:
  175. MockIteratorContext() :
  176. step(0)
  177. { }
  178. virtual bool getNext(string (&data)[COLUMN_COUNT]) {
  179. switch (step ++) {
  180. case 0:
  181. data[DatabaseAccessor::NAME_COLUMN] = "example.org";
  182. data[DatabaseAccessor::TYPE_COLUMN] = "SOA";
  183. data[DatabaseAccessor::TTL_COLUMN] = "300";
  184. data[DatabaseAccessor::RDATA_COLUMN] = "ns1.example.org. admin.example.org. "
  185. "1234 3600 1800 2419200 7200";
  186. return (true);
  187. case 1:
  188. data[DatabaseAccessor::NAME_COLUMN] = "x.example.org";
  189. data[DatabaseAccessor::TYPE_COLUMN] = "A";
  190. data[DatabaseAccessor::TTL_COLUMN] = "300";
  191. data[DatabaseAccessor::RDATA_COLUMN] = "192.0.2.1";
  192. return (true);
  193. case 2:
  194. data[DatabaseAccessor::NAME_COLUMN] = "x.example.org";
  195. data[DatabaseAccessor::TYPE_COLUMN] = "A";
  196. data[DatabaseAccessor::TTL_COLUMN] = "300";
  197. data[DatabaseAccessor::RDATA_COLUMN] = "192.0.2.2";
  198. return (true);
  199. case 3:
  200. data[DatabaseAccessor::NAME_COLUMN] = "x.example.org";
  201. data[DatabaseAccessor::TYPE_COLUMN] = "AAAA";
  202. data[DatabaseAccessor::TTL_COLUMN] = "300";
  203. data[DatabaseAccessor::RDATA_COLUMN] = "2001:db8::1";
  204. return (true);
  205. case 4:
  206. data[DatabaseAccessor::NAME_COLUMN] = "x.example.org";
  207. data[DatabaseAccessor::TYPE_COLUMN] = "AAAA";
  208. data[DatabaseAccessor::TTL_COLUMN] = "300";
  209. data[DatabaseAccessor::RDATA_COLUMN] = "2001:db8::2";
  210. return (true);
  211. default:
  212. ADD_FAILURE() <<
  213. "Request past the end of iterator context";
  214. case 5:
  215. return (false);
  216. }
  217. }
  218. };
  219. class EmptyIteratorContext : public IteratorContext {
  220. public:
  221. virtual bool getNext(string(&)[COLUMN_COUNT]) {
  222. return (false);
  223. }
  224. };
  225. class BadIteratorContext : public IteratorContext {
  226. private:
  227. int step;
  228. public:
  229. BadIteratorContext() :
  230. step(0)
  231. { }
  232. virtual bool getNext(string (&data)[COLUMN_COUNT]) {
  233. switch (step ++) {
  234. case 0:
  235. data[DatabaseAccessor::NAME_COLUMN] = "x.example.org";
  236. data[DatabaseAccessor::TYPE_COLUMN] = "A";
  237. data[DatabaseAccessor::TTL_COLUMN] = "300";
  238. data[DatabaseAccessor::RDATA_COLUMN] = "192.0.2.1";
  239. return (true);
  240. case 1:
  241. data[DatabaseAccessor::NAME_COLUMN] = "x.example.org";
  242. data[DatabaseAccessor::TYPE_COLUMN] = "A";
  243. data[DatabaseAccessor::TTL_COLUMN] = "301";
  244. data[DatabaseAccessor::RDATA_COLUMN] = "192.0.2.2";
  245. return (true);
  246. default:
  247. ADD_FAILURE() <<
  248. "Request past the end of iterator context";
  249. case 2:
  250. return (false);
  251. }
  252. }
  253. };
  254. public:
  255. virtual IteratorContextPtr getAllRecords(int id) const {
  256. if (id == READONLY_ZONE_ID) {
  257. return (IteratorContextPtr(new MockIteratorContext()));
  258. } else if (id == 13) {
  259. return (IteratorContextPtr());
  260. } else if (id == 0) {
  261. return (IteratorContextPtr(new EmptyIteratorContext()));
  262. } else if (id == -1) {
  263. return (IteratorContextPtr(new BadIteratorContext()));
  264. } else {
  265. isc_throw(isc::Unexpected, "Unknown zone ID");
  266. }
  267. }
  268. virtual IteratorContextPtr getRecords(const std::string& name, int id,
  269. bool subdomains) const
  270. {
  271. if (id == READONLY_ZONE_ID || id == WRITABLE_ZONE_ID) {
  272. return (IteratorContextPtr(
  273. new MockNameIteratorContext(*this, id, name,
  274. subdomains)));
  275. } else {
  276. isc_throw(isc::Unexpected, "Unknown zone ID");
  277. }
  278. }
  279. virtual pair<bool, int> startUpdateZone(const std::string& zone_name,
  280. bool replace)
  281. {
  282. const pair<bool, int> zone_info = getZone(zone_name);
  283. if (!zone_info.first) {
  284. return (pair<bool, int>(false, 0));
  285. }
  286. // Prepare the record set for update. If replacing the existing one,
  287. // we use an empty set; otherwise we use a writable copy of the
  288. // original.
  289. if (replace) {
  290. update_records_->clear();
  291. } else {
  292. *update_records_ = *readonly_records_;
  293. }
  294. return (pair<bool, int>(true, WRITABLE_ZONE_ID));
  295. }
  296. virtual void commitUpdateZone() {
  297. *readonly_records_ = *update_records_;
  298. }
  299. virtual void rollbackUpdateZone() {
  300. // Special hook: if something with a name of "throw.example.org"
  301. // has been added, trigger an imaginary unexpected event with an
  302. // exception.
  303. if (update_records_->count("throw.example.org.") > 0) {
  304. isc_throw(DataSourceError, "unexpected failure in rollback");
  305. }
  306. rollbacked_ = true;
  307. }
  308. virtual void addRecordToZone(const string (&columns)[ADD_COLUMN_COUNT]) {
  309. // Copy the current value to cur_name. If it doesn't exist,
  310. // operator[] will create a new one.
  311. cur_name_ = (*update_records_)[columns[DatabaseAccessor::ADD_NAME]];
  312. vector<string> record_columns;
  313. record_columns.push_back(columns[DatabaseAccessor::ADD_TYPE]);
  314. record_columns.push_back(columns[DatabaseAccessor::ADD_TTL]);
  315. record_columns.push_back(columns[DatabaseAccessor::ADD_SIGTYPE]);
  316. record_columns.push_back(columns[DatabaseAccessor::ADD_RDATA]);
  317. record_columns.push_back(columns[DatabaseAccessor::ADD_NAME]);
  318. // copy back the added entry
  319. cur_name_.push_back(record_columns);
  320. (*update_records_)[columns[DatabaseAccessor::ADD_NAME]] = cur_name_;
  321. // remember this one so that test cases can check it.
  322. copy(columns, columns + DatabaseAccessor::ADD_COLUMN_COUNT,
  323. columns_lastadded_);
  324. }
  325. // Helper predicate class used in deleteRecordInZone().
  326. struct deleteMatch {
  327. deleteMatch(const string& type, const string& rdata) :
  328. type_(type), rdata_(rdata)
  329. {}
  330. bool operator()(const vector<string>& row) const {
  331. return (row[0] == type_ && row[3] == rdata_);
  332. }
  333. const string& type_;
  334. const string& rdata_;
  335. };
  336. virtual void deleteRecordInZone(const string (&params)[DEL_PARAM_COUNT]) {
  337. vector<vector<string> >& records =
  338. (*update_records_)[params[DatabaseAccessor::DEL_NAME]];
  339. records.erase(remove_if(records.begin(), records.end(),
  340. deleteMatch(
  341. params[DatabaseAccessor::DEL_TYPE],
  342. params[DatabaseAccessor::DEL_RDATA])),
  343. records.end());
  344. if (records.empty()) {
  345. (*update_records_).erase(params[DatabaseAccessor::DEL_NAME]);
  346. }
  347. }
  348. //
  349. // Helper methods to keep track of some update related activities
  350. //
  351. bool isRollbacked() const {
  352. return (rollbacked_);
  353. }
  354. const string* getLastAdded() const {
  355. return (columns_lastadded_);
  356. }
  357. // This allows the test code to get the accessor used in an update context
  358. shared_ptr<const MockAccessor> getLatestClone() const {
  359. return (latest_clone_);
  360. }
  361. private:
  362. // The following member variables are storage and/or update work space
  363. // of the test zone. The "master"s are the real objects that contain
  364. // the data, and they are shared among all accessors cloned from
  365. // an initially created one. The pointer members allow the sharing.
  366. // "readonly" is for normal lookups. "update" is the workspace for
  367. // updates. When update starts it will be initialized either as an
  368. // empty set (when replacing the entire zone) or as a copy of the
  369. // "readonly" one. "empty" is a sentinel to produce negative results.
  370. Domains readonly_records_master_;
  371. Domains* readonly_records_;
  372. Domains update_records_master_;
  373. Domains* update_records_;
  374. const Domains empty_records_master_;
  375. const Domains* empty_records_;
  376. // used as temporary storage during the building of the fake data
  377. // used as temporary storage after searchForRecord() and during
  378. // getNextRecord() calls, as well as during the building of the
  379. // fake data
  380. std::vector< std::vector<std::string> > cur_name_;
  381. // The columns that were most recently added via addRecordToZone()
  382. string columns_lastadded_[ADD_COLUMN_COUNT];
  383. // Whether rollback operation has been performed for the database.
  384. // Not useful except for purely testing purpose.
  385. bool rollbacked_;
  386. // Remember the mock accessor that was last cloned
  387. boost::shared_ptr<MockAccessor> latest_clone_;
  388. const Domains& getMockRecords(int zone_id) const {
  389. if (zone_id == READONLY_ZONE_ID) {
  390. return (*readonly_records_);
  391. } else if (zone_id == WRITABLE_ZONE_ID) {
  392. return (*update_records_);
  393. }
  394. return (*empty_records_);
  395. }
  396. // Adds one record to the current name in the database
  397. // The actual data will not be added to 'records' until
  398. // addCurName() is called
  399. void addRecord(const std::string& type,
  400. const std::string& ttl,
  401. const std::string& sigtype,
  402. const std::string& rdata) {
  403. std::vector<std::string> columns;
  404. columns.push_back(type);
  405. columns.push_back(ttl);
  406. columns.push_back(sigtype);
  407. columns.push_back(rdata);
  408. cur_name_.push_back(columns);
  409. }
  410. // Adds all records we just built with calls to addRecords
  411. // to the actual fake database. This will clear cur_name_,
  412. // so we can immediately start adding new records.
  413. void addCurName(const std::string& name) {
  414. ASSERT_EQ(0, readonly_records_->count(name));
  415. // Append the name to all of them
  416. for (std::vector<std::vector<std::string> >::iterator
  417. i(cur_name_.begin()); i != cur_name_.end(); ++ i) {
  418. i->push_back(name);
  419. }
  420. (*readonly_records_)[name] = cur_name_;
  421. cur_name_.clear();
  422. }
  423. // Fills the database with zone data.
  424. // This method constructs a number of resource records (with addRecord),
  425. // which will all be added for one domain name to the fake database
  426. // (with addCurName). So for instance the first set of calls create
  427. // data for the name 'www.example.org', which will consist of one A RRset
  428. // of one record, and one AAAA RRset of two records.
  429. // The order in which they are added is the order in which getNextRecord()
  430. // will return them (so we can test whether find() etc. support data that
  431. // might not come in 'normal' order)
  432. // It shall immediately fail if you try to add the same name twice.
  433. void fillData() {
  434. // some plain data
  435. addRecord("A", "3600", "", "192.0.2.1");
  436. addRecord("AAAA", "3600", "", "2001:db8::1");
  437. addRecord("AAAA", "3600", "", "2001:db8::2");
  438. addCurName("www.example.org.");
  439. addRecord("A", "3600", "", "192.0.2.1");
  440. addRecord("AAAA", "3600", "", "2001:db8::1");
  441. addRecord("A", "3600", "", "192.0.2.2");
  442. addCurName("www2.example.org.");
  443. addRecord("CNAME", "3600", "", "www.example.org.");
  444. addCurName("cname.example.org.");
  445. // some DNSSEC-'signed' data
  446. addRecord("A", "3600", "", "192.0.2.1");
  447. addRecord("RRSIG", "3600", "", "A 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  448. addRecord("RRSIG", "3600", "", "A 5 3 3600 20000101000000 20000201000000 12346 example.org. FAKEFAKEFAKE");
  449. addRecord("AAAA", "3600", "", "2001:db8::1");
  450. addRecord("AAAA", "3600", "", "2001:db8::2");
  451. addRecord("RRSIG", "3600", "", "AAAA 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  452. addCurName("signed1.example.org.");
  453. addRecord("CNAME", "3600", "", "www.example.org.");
  454. addRecord("RRSIG", "3600", "", "CNAME 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  455. addCurName("signedcname1.example.org.");
  456. // special case might fail; sig is for cname, which isn't there (should be ignored)
  457. // (ignoring of 'normal' other type is done above by www.)
  458. addRecord("A", "3600", "", "192.0.2.1");
  459. addRecord("RRSIG", "3600", "", "A 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  460. addRecord("RRSIG", "3600", "", "CNAME 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  461. addCurName("acnamesig1.example.org.");
  462. // let's pretend we have a database that is not careful
  463. // about the order in which it returns data
  464. addRecord("RRSIG", "3600", "", "A 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  465. addRecord("AAAA", "3600", "", "2001:db8::2");
  466. addRecord("RRSIG", "3600", "", "A 5 3 3600 20000101000000 20000201000000 12346 example.org. FAKEFAKEFAKE");
  467. addRecord("A", "3600", "", "192.0.2.1");
  468. addRecord("RRSIG", "3600", "", "AAAA 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  469. addRecord("AAAA", "3600", "", "2001:db8::1");
  470. addCurName("signed2.example.org.");
  471. addRecord("RRSIG", "3600", "", "CNAME 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  472. addRecord("CNAME", "3600", "", "www.example.org.");
  473. addCurName("signedcname2.example.org.");
  474. addRecord("RRSIG", "3600", "", "CNAME 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  475. addRecord("A", "3600", "", "192.0.2.1");
  476. addRecord("RRSIG", "3600", "", "A 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  477. addCurName("acnamesig2.example.org.");
  478. addRecord("RRSIG", "3600", "", "CNAME 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  479. addRecord("RRSIG", "3600", "", "A 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  480. addRecord("A", "3600", "", "192.0.2.1");
  481. addCurName("acnamesig3.example.org.");
  482. addRecord("A", "3600", "", "192.0.2.1");
  483. addRecord("A", "360", "", "192.0.2.2");
  484. addCurName("ttldiff1.example.org.");
  485. addRecord("A", "360", "", "192.0.2.1");
  486. addRecord("A", "3600", "", "192.0.2.2");
  487. addCurName("ttldiff2.example.org.");
  488. // also add some intentionally bad data
  489. addRecord("A", "3600", "", "192.0.2.1");
  490. addRecord("CNAME", "3600", "", "www.example.org.");
  491. addCurName("badcname1.example.org.");
  492. addRecord("CNAME", "3600", "", "www.example.org.");
  493. addRecord("A", "3600", "", "192.0.2.1");
  494. addCurName("badcname2.example.org.");
  495. addRecord("CNAME", "3600", "", "www.example.org.");
  496. addRecord("CNAME", "3600", "", "www.example2.org.");
  497. addCurName("badcname3.example.org.");
  498. addRecord("A", "3600", "", "bad");
  499. addCurName("badrdata.example.org.");
  500. addRecord("BAD_TYPE", "3600", "", "192.0.2.1");
  501. addCurName("badtype.example.org.");
  502. addRecord("A", "badttl", "", "192.0.2.1");
  503. addCurName("badttl.example.org.");
  504. addRecord("A", "badttl", "", "192.0.2.1");
  505. addRecord("RRSIG", "3600", "", "A 5 3 3600 somebaddata 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  506. addCurName("badsig.example.org.");
  507. addRecord("A", "3600", "", "192.0.2.1");
  508. addRecord("RRSIG", "3600", "TXT", "A 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  509. addCurName("badsigtype.example.org.");
  510. // Data for testing delegation (with NS and DNAME)
  511. addRecord("NS", "3600", "", "ns.example.com.");
  512. addRecord("NS", "3600", "", "ns.delegation.example.org.");
  513. addRecord("RRSIG", "3600", "", "NS 5 3 3600 20000101000000 "
  514. "20000201000000 12345 example.org. FAKEFAKEFAKE");
  515. addCurName("delegation.example.org.");
  516. addRecord("A", "3600", "", "192.0.2.1");
  517. addCurName("ns.delegation.example.org.");
  518. addRecord("A", "3600", "", "192.0.2.1");
  519. addCurName("deep.below.delegation.example.org.");
  520. addRecord("A", "3600", "", "192.0.2.1");
  521. addRecord("DNAME", "3600", "", "dname.example.com.");
  522. addRecord("RRSIG", "3600", "", "DNAME 5 3 3600 20000101000000 "
  523. "20000201000000 12345 example.org. FAKEFAKEFAKE");
  524. addCurName("dname.example.org.");
  525. addRecord("A", "3600", "", "192.0.2.1");
  526. addCurName("below.dname.example.org.");
  527. // Broken NS
  528. addRecord("A", "3600", "", "192.0.2.1");
  529. addRecord("NS", "3600", "", "ns.example.com.");
  530. addCurName("brokenns1.example.org.");
  531. addRecord("NS", "3600", "", "ns.example.com.");
  532. addRecord("A", "3600", "", "192.0.2.1");
  533. addCurName("brokenns2.example.org.");
  534. // Now double DNAME, to test failure mode
  535. addRecord("DNAME", "3600", "", "dname1.example.com.");
  536. addRecord("DNAME", "3600", "", "dname2.example.com.");
  537. addCurName("baddname.example.org.");
  538. // Put some data into apex (including NS) so we can check our NS
  539. // doesn't break anything
  540. addRecord("NS", "3600", "", "ns.example.com.");
  541. addRecord("A", "3600", "", "192.0.2.1");
  542. addRecord("RRSIG", "3600", "", "NS 5 3 3600 20000101000000 "
  543. "20000201000000 12345 example.org. FAKEFAKEFAKE");
  544. addCurName("example.org.");
  545. // This is because of empty domain test
  546. addRecord("A", "3600", "", "192.0.2.1");
  547. addCurName("a.b.example.org.");
  548. // Something for wildcards
  549. addRecord("A", "3600", "", "192.0.2.5");
  550. addCurName("*.wild.example.org.");
  551. addRecord("AAAA", "3600", "", "2001:db8::5");
  552. addCurName("cancel.here.wild.example.org.");
  553. addRecord("NS", "3600", "", "ns.example.com.");
  554. addCurName("delegatedwild.example.org.");
  555. addRecord("A", "3600", "", "192.0.2.5");
  556. addCurName("*.delegatedwild.example.org.");
  557. addRecord("A", "3600", "", "192.0.2.5");
  558. addCurName("wild.*.foo.example.org.");
  559. addRecord("A", "3600", "", "192.0.2.5");
  560. addCurName("wild.*.foo.*.bar.example.org.");
  561. }
  562. };
  563. // This tests the default getRecords behaviour, throwing NotImplemented
  564. TEST(DatabaseConnectionTest, getRecords) {
  565. EXPECT_THROW(NopAccessor().getRecords(".", 1, false),
  566. isc::NotImplemented);
  567. }
  568. // This tests the default getAllRecords behaviour, throwing NotImplemented
  569. TEST(DatabaseConnectionTest, getAllRecords) {
  570. // The parameters don't matter
  571. EXPECT_THROW(NopAccessor().getAllRecords(1),
  572. isc::NotImplemented);
  573. }
  574. class DatabaseClientTest : public ::testing::Test {
  575. public:
  576. DatabaseClientTest() : zname_("example.org"), qname_("www.example.org"),
  577. qclass_(RRClass::IN()), qtype_(RRType::A()),
  578. rrttl_(3600)
  579. {
  580. createClient();
  581. // set up the commonly used finder.
  582. DataSourceClient::FindResult zone(client_->findZone(zname_));
  583. assert(zone.code == result::SUCCESS);
  584. finder_ = dynamic_pointer_cast<DatabaseClient::Finder>(
  585. zone.zone_finder);
  586. // Test IN/A RDATA to be added in update tests. Intentionally using
  587. // different data than the initial data configured in the MockAccessor.
  588. rrset_.reset(new RRset(qname_, qclass_, qtype_, rrttl_));
  589. rrset_->addRdata(rdata::createRdata(rrset_->getType(),
  590. rrset_->getClass(), "192.0.2.2"));
  591. // And its RRSIG. Also different from the configured one.
  592. rrsigset_.reset(new RRset(qname_, qclass_, RRType::RRSIG(),
  593. rrttl_));
  594. rrsigset_->addRdata(rdata::createRdata(rrsigset_->getType(),
  595. rrsigset_->getClass(),
  596. "A 5 3 0 20000101000000 "
  597. "20000201000000 0 example.org. "
  598. "FAKEFAKEFAKE"));
  599. }
  600. /*
  601. * We initialize the client from a function, so we can call it multiple
  602. * times per test.
  603. */
  604. void createClient() {
  605. current_accessor_ = new MockAccessor();
  606. client_.reset(new DatabaseClient(qclass_,
  607. shared_ptr<DatabaseAccessor>(
  608. current_accessor_)));
  609. }
  610. /**
  611. * Check the zone finder is a valid one and references the zone ID and
  612. * database available here.
  613. */
  614. void checkZoneFinder(const DataSourceClient::FindResult& zone) {
  615. ASSERT_NE(ZoneFinderPtr(), zone.zone_finder) << "No zone finder";
  616. shared_ptr<DatabaseClient::Finder> finder(
  617. dynamic_pointer_cast<DatabaseClient::Finder>(zone.zone_finder));
  618. ASSERT_NE(shared_ptr<DatabaseClient::Finder>(), finder) <<
  619. "Wrong type of finder";
  620. EXPECT_EQ(READONLY_ZONE_ID, finder->zone_id());
  621. EXPECT_EQ(current_accessor_, &finder->getAccessor());
  622. }
  623. shared_ptr<DatabaseClient::Finder> getFinder() {
  624. DataSourceClient::FindResult zone(client_->findZone(zname_));
  625. EXPECT_EQ(result::SUCCESS, zone.code);
  626. shared_ptr<DatabaseClient::Finder> finder(
  627. dynamic_pointer_cast<DatabaseClient::Finder>(zone.zone_finder));
  628. EXPECT_EQ(READONLY_ZONE_ID, finder->zone_id());
  629. return (finder);
  630. }
  631. // Helper methods for update tests
  632. bool isRollbacked() const {
  633. return (update_accessor_->isRollbacked());
  634. }
  635. void checkLastAdded(const char* const expected[]) const {
  636. for (int i = 0; i < DatabaseAccessor::ADD_COLUMN_COUNT; ++i) {
  637. EXPECT_EQ(expected[i],
  638. current_accessor_->getLatestClone()->getLastAdded()[i]);
  639. }
  640. }
  641. void setUpdateAccessor() {
  642. update_accessor_ = current_accessor_->getLatestClone();
  643. }
  644. // Will be deleted by client_, just keep the current value for comparison.
  645. MockAccessor* current_accessor_;
  646. shared_ptr<DatabaseClient> client_;
  647. const std::string database_name_;
  648. // The zone finder of the test zone commonly used in various tests.
  649. shared_ptr<DatabaseClient::Finder> finder_;
  650. // Some shortcut variables for commonly used test parameters
  651. const Name zname_; // the zone name stored in the test data source
  652. const Name qname_; // commonly used name to be found
  653. const RRClass qclass_; // commonly used RR class used with qname
  654. const RRType qtype_; // commonly used RR type used with qname
  655. const RRTTL rrttl_; // commonly used RR TTL
  656. RRsetPtr rrset_; // for adding/deleting an RRset
  657. RRsetPtr rrsigset_; // for adding/deleting an RRset
  658. // update related objects to be tested
  659. ZoneUpdaterPtr updater_;
  660. shared_ptr<const MockAccessor> update_accessor_;
  661. // placeholders
  662. const std::vector<std::string> empty_rdatas_; // for NXRRSET/NXDOMAIN
  663. std::vector<std::string> expected_rdatas_;
  664. std::vector<std::string> expected_sig_rdatas_;
  665. };
  666. TEST_F(DatabaseClientTest, zoneNotFound) {
  667. DataSourceClient::FindResult zone(client_->findZone(Name("example.com")));
  668. EXPECT_EQ(result::NOTFOUND, zone.code);
  669. }
  670. TEST_F(DatabaseClientTest, exactZone) {
  671. DataSourceClient::FindResult zone(client_->findZone(Name("example.org")));
  672. EXPECT_EQ(result::SUCCESS, zone.code);
  673. checkZoneFinder(zone);
  674. }
  675. TEST_F(DatabaseClientTest, superZone) {
  676. DataSourceClient::FindResult zone(client_->findZone(Name(
  677. "sub.example.org")));
  678. EXPECT_EQ(result::PARTIALMATCH, zone.code);
  679. checkZoneFinder(zone);
  680. }
  681. TEST_F(DatabaseClientTest, noAccessorException) {
  682. // We need a dummy variable here; some compiler would regard it a mere
  683. // declaration instead of an instantiation and make the test fail.
  684. EXPECT_THROW(DatabaseClient dummy(RRClass::IN(),
  685. shared_ptr<DatabaseAccessor>()),
  686. isc::InvalidParameter);
  687. }
  688. // If the zone doesn't exist, exception is thrown
  689. TEST_F(DatabaseClientTest, noZoneIterator) {
  690. EXPECT_THROW(client_->getIterator(Name("example.com")), DataSourceError);
  691. }
  692. // If the zone doesn't exist and iteration is not implemented, it still throws
  693. // the exception it doesn't exist
  694. TEST_F(DatabaseClientTest, noZoneNotImplementedIterator) {
  695. EXPECT_THROW(DatabaseClient(RRClass::IN(),
  696. boost::shared_ptr<DatabaseAccessor>(
  697. new NopAccessor())).getIterator(
  698. Name("example.com")),
  699. DataSourceError);
  700. }
  701. TEST_F(DatabaseClientTest, notImplementedIterator) {
  702. EXPECT_THROW(DatabaseClient(RRClass::IN(), shared_ptr<DatabaseAccessor>(
  703. new NopAccessor())).getIterator(Name("example.org")),
  704. isc::NotImplemented);
  705. }
  706. // Pretend a bug in the connection and pass NULL as the context
  707. // Should not crash, but gracefully throw
  708. TEST_F(DatabaseClientTest, nullIteratorContext) {
  709. EXPECT_THROW(client_->getIterator(Name("null.example.org")),
  710. isc::Unexpected);
  711. }
  712. // It doesn't crash or anything if the zone is completely empty
  713. TEST_F(DatabaseClientTest, emptyIterator) {
  714. ZoneIteratorPtr it(client_->getIterator(Name("empty.example.org")));
  715. EXPECT_EQ(ConstRRsetPtr(), it->getNextRRset());
  716. // This is past the end, it should throw
  717. EXPECT_THROW(it->getNextRRset(), isc::Unexpected);
  718. }
  719. // Iterate trough a zone
  720. TEST_F(DatabaseClientTest, iterator) {
  721. ZoneIteratorPtr it(client_->getIterator(Name("example.org")));
  722. ConstRRsetPtr rrset(it->getNextRRset());
  723. ASSERT_NE(ConstRRsetPtr(), rrset);
  724. EXPECT_EQ(Name("example.org"), rrset->getName());
  725. EXPECT_EQ(RRClass::IN(), rrset->getClass());
  726. EXPECT_EQ(RRType::SOA(), rrset->getType());
  727. EXPECT_EQ(RRTTL(300), rrset->getTTL());
  728. RdataIteratorPtr rit(rrset->getRdataIterator());
  729. ASSERT_FALSE(rit->isLast());
  730. rit->next();
  731. EXPECT_TRUE(rit->isLast());
  732. rrset = it->getNextRRset();
  733. ASSERT_NE(ConstRRsetPtr(), rrset);
  734. EXPECT_EQ(Name("x.example.org"), rrset->getName());
  735. EXPECT_EQ(RRClass::IN(), rrset->getClass());
  736. EXPECT_EQ(RRType::A(), rrset->getType());
  737. EXPECT_EQ(RRTTL(300), rrset->getTTL());
  738. rit = rrset->getRdataIterator();
  739. ASSERT_FALSE(rit->isLast());
  740. EXPECT_EQ("192.0.2.1", rit->getCurrent().toText());
  741. rit->next();
  742. ASSERT_FALSE(rit->isLast());
  743. EXPECT_EQ("192.0.2.2", rit->getCurrent().toText());
  744. rit->next();
  745. EXPECT_TRUE(rit->isLast());
  746. rrset = it->getNextRRset();
  747. ASSERT_NE(ConstRRsetPtr(), rrset);
  748. EXPECT_EQ(Name("x.example.org"), rrset->getName());
  749. EXPECT_EQ(RRClass::IN(), rrset->getClass());
  750. EXPECT_EQ(RRType::AAAA(), rrset->getType());
  751. EXPECT_EQ(RRTTL(300), rrset->getTTL());
  752. EXPECT_EQ(ConstRRsetPtr(), it->getNextRRset());
  753. rit = rrset->getRdataIterator();
  754. ASSERT_FALSE(rit->isLast());
  755. EXPECT_EQ("2001:db8::1", rit->getCurrent().toText());
  756. rit->next();
  757. ASSERT_FALSE(rit->isLast());
  758. EXPECT_EQ("2001:db8::2", rit->getCurrent().toText());
  759. rit->next();
  760. EXPECT_TRUE(rit->isLast());
  761. }
  762. // This has inconsistent TTL in the set (the rest, like nonsense in
  763. // the data is handled in rdata itself).
  764. TEST_F(DatabaseClientTest, badIterator) {
  765. // It should not throw, but get the lowest one of them
  766. ZoneIteratorPtr it(client_->getIterator(Name("bad.example.org")));
  767. EXPECT_EQ(it->getNextRRset()->getTTL(), isc::dns::RRTTL(300));
  768. }
  769. // checks if the given rrset matches the
  770. // given name, class, type and rdatas
  771. void
  772. checkRRset(isc::dns::ConstRRsetPtr rrset,
  773. const isc::dns::Name& name,
  774. const isc::dns::RRClass& rrclass,
  775. const isc::dns::RRType& rrtype,
  776. const isc::dns::RRTTL& rrttl,
  777. const std::vector<std::string>& rdatas) {
  778. isc::dns::RRsetPtr expected_rrset(
  779. new isc::dns::RRset(name, rrclass, rrtype, rrttl));
  780. for (unsigned int i = 0; i < rdatas.size(); ++i) {
  781. expected_rrset->addRdata(
  782. isc::dns::rdata::createRdata(rrtype, rrclass,
  783. rdatas[i]));
  784. }
  785. isc::testutils::rrsetCheck(expected_rrset, rrset);
  786. }
  787. void
  788. doFindTest(ZoneFinder& finder,
  789. const isc::dns::Name& name,
  790. const isc::dns::RRType& type,
  791. const isc::dns::RRType& expected_type,
  792. const isc::dns::RRTTL expected_ttl,
  793. ZoneFinder::Result expected_result,
  794. const std::vector<std::string>& expected_rdatas,
  795. const std::vector<std::string>& expected_sig_rdatas,
  796. const isc::dns::Name& expected_name = isc::dns::Name::ROOT_NAME(),
  797. const ZoneFinder::FindOptions options = ZoneFinder::FIND_DEFAULT)
  798. {
  799. SCOPED_TRACE("doFindTest " + name.toText() + " " + type.toText());
  800. ZoneFinder::FindResult result =
  801. finder.find(name, type, NULL, options);
  802. ASSERT_EQ(expected_result, result.code) << name << " " << type;
  803. if (!expected_rdatas.empty()) {
  804. checkRRset(result.rrset, expected_name != Name(".") ? expected_name :
  805. name, finder.getClass(), expected_type, expected_ttl,
  806. expected_rdatas);
  807. if (!expected_sig_rdatas.empty()) {
  808. checkRRset(result.rrset->getRRsig(), expected_name != Name(".") ?
  809. expected_name : name, finder.getClass(),
  810. isc::dns::RRType::RRSIG(), expected_ttl,
  811. expected_sig_rdatas);
  812. } else {
  813. EXPECT_EQ(isc::dns::RRsetPtr(), result.rrset->getRRsig());
  814. }
  815. } else {
  816. EXPECT_EQ(isc::dns::RRsetPtr(), result.rrset);
  817. }
  818. }
  819. TEST_F(DatabaseClientTest, find) {
  820. shared_ptr<DatabaseClient::Finder> finder(getFinder());
  821. expected_rdatas_.clear();
  822. expected_sig_rdatas_.clear();
  823. expected_rdatas_.push_back("192.0.2.1");
  824. doFindTest(*finder, isc::dns::Name("www.example.org."),
  825. isc::dns::RRType::A(), isc::dns::RRType::A(),
  826. isc::dns::RRTTL(3600),
  827. ZoneFinder::SUCCESS,
  828. expected_rdatas_, expected_sig_rdatas_);
  829. expected_rdatas_.clear();
  830. expected_sig_rdatas_.clear();
  831. expected_rdatas_.push_back("192.0.2.1");
  832. expected_rdatas_.push_back("192.0.2.2");
  833. doFindTest(*finder, isc::dns::Name("www2.example.org."),
  834. isc::dns::RRType::A(), isc::dns::RRType::A(),
  835. isc::dns::RRTTL(3600),
  836. ZoneFinder::SUCCESS,
  837. expected_rdatas_, expected_sig_rdatas_);
  838. expected_rdatas_.clear();
  839. expected_sig_rdatas_.clear();
  840. expected_rdatas_.push_back("2001:db8::1");
  841. expected_rdatas_.push_back("2001:db8::2");
  842. doFindTest(*finder, isc::dns::Name("www.example.org."),
  843. isc::dns::RRType::AAAA(), isc::dns::RRType::AAAA(),
  844. isc::dns::RRTTL(3600),
  845. ZoneFinder::SUCCESS,
  846. expected_rdatas_, expected_sig_rdatas_);
  847. expected_rdatas_.clear();
  848. expected_sig_rdatas_.clear();
  849. doFindTest(*finder, isc::dns::Name("www.example.org."),
  850. isc::dns::RRType::TXT(), isc::dns::RRType::TXT(),
  851. isc::dns::RRTTL(3600),
  852. ZoneFinder::NXRRSET,
  853. expected_rdatas_, expected_sig_rdatas_);
  854. expected_rdatas_.clear();
  855. expected_sig_rdatas_.clear();
  856. expected_rdatas_.push_back("www.example.org.");
  857. doFindTest(*finder, isc::dns::Name("cname.example.org."),
  858. isc::dns::RRType::A(), isc::dns::RRType::CNAME(),
  859. isc::dns::RRTTL(3600),
  860. ZoneFinder::CNAME,
  861. expected_rdatas_, expected_sig_rdatas_);
  862. expected_rdatas_.clear();
  863. expected_sig_rdatas_.clear();
  864. expected_rdatas_.push_back("www.example.org.");
  865. doFindTest(*finder, isc::dns::Name("cname.example.org."),
  866. isc::dns::RRType::CNAME(), isc::dns::RRType::CNAME(),
  867. isc::dns::RRTTL(3600),
  868. ZoneFinder::SUCCESS,
  869. expected_rdatas_, expected_sig_rdatas_);
  870. expected_rdatas_.clear();
  871. expected_sig_rdatas_.clear();
  872. doFindTest(*finder, isc::dns::Name("doesnotexist.example.org."),
  873. isc::dns::RRType::A(), isc::dns::RRType::A(),
  874. isc::dns::RRTTL(3600),
  875. ZoneFinder::NXDOMAIN,
  876. expected_rdatas_, expected_sig_rdatas_);
  877. expected_rdatas_.clear();
  878. expected_sig_rdatas_.clear();
  879. expected_rdatas_.push_back("192.0.2.1");
  880. expected_sig_rdatas_.push_back("A 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  881. expected_sig_rdatas_.push_back("A 5 3 3600 20000101000000 20000201000000 12346 example.org. FAKEFAKEFAKE");
  882. doFindTest(*finder, isc::dns::Name("signed1.example.org."),
  883. isc::dns::RRType::A(), isc::dns::RRType::A(),
  884. isc::dns::RRTTL(3600),
  885. ZoneFinder::SUCCESS,
  886. expected_rdatas_, expected_sig_rdatas_);
  887. expected_rdatas_.clear();
  888. expected_sig_rdatas_.clear();
  889. expected_rdatas_.push_back("2001:db8::1");
  890. expected_rdatas_.push_back("2001:db8::2");
  891. expected_sig_rdatas_.push_back("AAAA 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  892. doFindTest(*finder, isc::dns::Name("signed1.example.org."),
  893. isc::dns::RRType::AAAA(), isc::dns::RRType::AAAA(),
  894. isc::dns::RRTTL(3600),
  895. ZoneFinder::SUCCESS,
  896. expected_rdatas_, expected_sig_rdatas_);
  897. expected_rdatas_.clear();
  898. expected_sig_rdatas_.clear();
  899. doFindTest(*finder, isc::dns::Name("signed1.example.org."),
  900. isc::dns::RRType::TXT(), isc::dns::RRType::TXT(),
  901. isc::dns::RRTTL(3600),
  902. ZoneFinder::NXRRSET,
  903. expected_rdatas_, expected_sig_rdatas_);
  904. expected_rdatas_.clear();
  905. expected_sig_rdatas_.clear();
  906. expected_rdatas_.push_back("www.example.org.");
  907. expected_sig_rdatas_.push_back("CNAME 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  908. doFindTest(*finder, isc::dns::Name("signedcname1.example.org."),
  909. isc::dns::RRType::A(), isc::dns::RRType::CNAME(),
  910. isc::dns::RRTTL(3600),
  911. ZoneFinder::CNAME,
  912. expected_rdatas_, expected_sig_rdatas_);
  913. expected_rdatas_.clear();
  914. expected_sig_rdatas_.clear();
  915. expected_rdatas_.push_back("192.0.2.1");
  916. expected_sig_rdatas_.push_back("A 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  917. expected_sig_rdatas_.push_back("A 5 3 3600 20000101000000 20000201000000 12346 example.org. FAKEFAKEFAKE");
  918. doFindTest(*finder, isc::dns::Name("signed2.example.org."),
  919. isc::dns::RRType::A(), isc::dns::RRType::A(),
  920. isc::dns::RRTTL(3600),
  921. ZoneFinder::SUCCESS,
  922. expected_rdatas_, expected_sig_rdatas_);
  923. expected_rdatas_.clear();
  924. expected_sig_rdatas_.clear();
  925. expected_rdatas_.push_back("2001:db8::2");
  926. expected_rdatas_.push_back("2001:db8::1");
  927. expected_sig_rdatas_.push_back("AAAA 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  928. doFindTest(*finder, isc::dns::Name("signed2.example.org."),
  929. isc::dns::RRType::AAAA(), isc::dns::RRType::AAAA(),
  930. isc::dns::RRTTL(3600),
  931. ZoneFinder::SUCCESS,
  932. expected_rdatas_, expected_sig_rdatas_);
  933. expected_rdatas_.clear();
  934. expected_sig_rdatas_.clear();
  935. doFindTest(*finder, isc::dns::Name("signed2.example.org."),
  936. isc::dns::RRType::TXT(), isc::dns::RRType::TXT(),
  937. isc::dns::RRTTL(3600),
  938. ZoneFinder::NXRRSET,
  939. expected_rdatas_, expected_sig_rdatas_);
  940. expected_rdatas_.clear();
  941. expected_sig_rdatas_.clear();
  942. expected_rdatas_.push_back("www.example.org.");
  943. expected_sig_rdatas_.push_back("CNAME 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  944. doFindTest(*finder, isc::dns::Name("signedcname2.example.org."),
  945. isc::dns::RRType::A(), isc::dns::RRType::CNAME(),
  946. isc::dns::RRTTL(3600),
  947. ZoneFinder::CNAME,
  948. expected_rdatas_, expected_sig_rdatas_);
  949. expected_rdatas_.clear();
  950. expected_sig_rdatas_.clear();
  951. expected_rdatas_.push_back("192.0.2.1");
  952. expected_sig_rdatas_.push_back("A 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  953. doFindTest(*finder, isc::dns::Name("acnamesig1.example.org."),
  954. isc::dns::RRType::A(), isc::dns::RRType::A(),
  955. isc::dns::RRTTL(3600),
  956. ZoneFinder::SUCCESS,
  957. expected_rdatas_, expected_sig_rdatas_);
  958. expected_rdatas_.clear();
  959. expected_sig_rdatas_.clear();
  960. expected_rdatas_.push_back("192.0.2.1");
  961. expected_sig_rdatas_.push_back("A 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  962. doFindTest(*finder, isc::dns::Name("acnamesig2.example.org."),
  963. isc::dns::RRType::A(), isc::dns::RRType::A(),
  964. isc::dns::RRTTL(3600),
  965. ZoneFinder::SUCCESS,
  966. expected_rdatas_, expected_sig_rdatas_);
  967. expected_rdatas_.clear();
  968. expected_sig_rdatas_.clear();
  969. expected_rdatas_.push_back("192.0.2.1");
  970. expected_sig_rdatas_.push_back("A 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  971. doFindTest(*finder, isc::dns::Name("acnamesig3.example.org."),
  972. isc::dns::RRType::A(), isc::dns::RRType::A(),
  973. isc::dns::RRTTL(3600),
  974. ZoneFinder::SUCCESS,
  975. expected_rdatas_, expected_sig_rdatas_);
  976. expected_rdatas_.clear();
  977. expected_sig_rdatas_.clear();
  978. expected_rdatas_.push_back("192.0.2.1");
  979. expected_rdatas_.push_back("192.0.2.2");
  980. doFindTest(*finder, isc::dns::Name("ttldiff1.example.org."),
  981. isc::dns::RRType::A(), isc::dns::RRType::A(),
  982. isc::dns::RRTTL(360),
  983. ZoneFinder::SUCCESS,
  984. expected_rdatas_, expected_sig_rdatas_);
  985. expected_rdatas_.clear();
  986. expected_sig_rdatas_.clear();
  987. expected_rdatas_.push_back("192.0.2.1");
  988. expected_rdatas_.push_back("192.0.2.2");
  989. doFindTest(*finder, isc::dns::Name("ttldiff2.example.org."),
  990. isc::dns::RRType::A(), isc::dns::RRType::A(),
  991. isc::dns::RRTTL(360),
  992. ZoneFinder::SUCCESS,
  993. expected_rdatas_, expected_sig_rdatas_);
  994. EXPECT_THROW(finder->find(isc::dns::Name("badcname1.example.org."),
  995. isc::dns::RRType::A(),
  996. NULL, ZoneFinder::FIND_DEFAULT),
  997. DataSourceError);
  998. EXPECT_THROW(finder->find(isc::dns::Name("badcname2.example.org."),
  999. isc::dns::RRType::A(),
  1000. NULL, ZoneFinder::FIND_DEFAULT),
  1001. DataSourceError);
  1002. EXPECT_THROW(finder->find(isc::dns::Name("badcname3.example.org."),
  1003. isc::dns::RRType::A(),
  1004. NULL, ZoneFinder::FIND_DEFAULT),
  1005. DataSourceError);
  1006. EXPECT_THROW(finder->find(isc::dns::Name("badrdata.example.org."),
  1007. isc::dns::RRType::A(),
  1008. NULL, ZoneFinder::FIND_DEFAULT),
  1009. DataSourceError);
  1010. EXPECT_THROW(finder->find(isc::dns::Name("badtype.example.org."),
  1011. isc::dns::RRType::A(),
  1012. NULL, ZoneFinder::FIND_DEFAULT),
  1013. DataSourceError);
  1014. EXPECT_THROW(finder->find(isc::dns::Name("badttl.example.org."),
  1015. isc::dns::RRType::A(),
  1016. NULL, ZoneFinder::FIND_DEFAULT),
  1017. DataSourceError);
  1018. EXPECT_THROW(finder->find(isc::dns::Name("badsig.example.org."),
  1019. isc::dns::RRType::A(),
  1020. NULL, ZoneFinder::FIND_DEFAULT),
  1021. DataSourceError);
  1022. // Trigger the hardcoded exceptions and see if find() has cleaned up
  1023. EXPECT_THROW(finder->find(isc::dns::Name("dsexception.in.search."),
  1024. isc::dns::RRType::A(),
  1025. NULL, ZoneFinder::FIND_DEFAULT),
  1026. DataSourceError);
  1027. EXPECT_THROW(finder->find(isc::dns::Name("iscexception.in.search."),
  1028. isc::dns::RRType::A(),
  1029. NULL, ZoneFinder::FIND_DEFAULT),
  1030. isc::Exception);
  1031. EXPECT_THROW(finder->find(isc::dns::Name("basicexception.in.search."),
  1032. isc::dns::RRType::A(),
  1033. NULL, ZoneFinder::FIND_DEFAULT),
  1034. std::exception);
  1035. EXPECT_THROW(finder->find(isc::dns::Name("dsexception.in.getnext."),
  1036. isc::dns::RRType::A(),
  1037. NULL, ZoneFinder::FIND_DEFAULT),
  1038. DataSourceError);
  1039. EXPECT_THROW(finder->find(isc::dns::Name("iscexception.in.getnext."),
  1040. isc::dns::RRType::A(),
  1041. NULL, ZoneFinder::FIND_DEFAULT),
  1042. isc::Exception);
  1043. EXPECT_THROW(finder->find(isc::dns::Name("basicexception.in.getnext."),
  1044. isc::dns::RRType::A(),
  1045. NULL, ZoneFinder::FIND_DEFAULT),
  1046. std::exception);
  1047. // This RRSIG has the wrong sigtype field, which should be
  1048. // an error if we decide to keep using that field
  1049. // Right now the field is ignored, so it does not error
  1050. expected_rdatas_.clear();
  1051. expected_sig_rdatas_.clear();
  1052. expected_rdatas_.push_back("192.0.2.1");
  1053. expected_sig_rdatas_.push_back("A 5 3 3600 20000101000000 20000201000000 12345 example.org. FAKEFAKEFAKE");
  1054. doFindTest(*finder, isc::dns::Name("badsigtype.example.org."),
  1055. isc::dns::RRType::A(), isc::dns::RRType::A(),
  1056. isc::dns::RRTTL(3600),
  1057. ZoneFinder::SUCCESS,
  1058. expected_rdatas_, expected_sig_rdatas_);
  1059. }
  1060. TEST_F(DatabaseClientTest, findDelegation) {
  1061. shared_ptr<DatabaseClient::Finder> finder(getFinder());
  1062. // The apex should not be considered delegation point and we can access
  1063. // data
  1064. expected_rdatas_.clear();
  1065. expected_sig_rdatas_.clear();
  1066. expected_rdatas_.push_back("192.0.2.1");
  1067. doFindTest(*finder, isc::dns::Name("example.org."),
  1068. isc::dns::RRType::A(), isc::dns::RRType::A(),
  1069. isc::dns::RRTTL(3600), ZoneFinder::SUCCESS, expected_rdatas_,
  1070. expected_sig_rdatas_);
  1071. expected_rdatas_.clear();
  1072. expected_rdatas_.push_back("ns.example.com.");
  1073. expected_sig_rdatas_.push_back("NS 5 3 3600 20000101000000 20000201000000 "
  1074. "12345 example.org. FAKEFAKEFAKE");
  1075. doFindTest(*finder, isc::dns::Name("example.org."),
  1076. isc::dns::RRType::NS(), isc::dns::RRType::NS(),
  1077. isc::dns::RRTTL(3600), ZoneFinder::SUCCESS, expected_rdatas_,
  1078. expected_sig_rdatas_);
  1079. // Check when we ask for something below delegation point, we get the NS
  1080. // (Both when the RRset there exists and doesn't)
  1081. expected_rdatas_.clear();
  1082. expected_sig_rdatas_.clear();
  1083. expected_rdatas_.push_back("ns.example.com.");
  1084. expected_rdatas_.push_back("ns.delegation.example.org.");
  1085. expected_sig_rdatas_.push_back("NS 5 3 3600 20000101000000 20000201000000 "
  1086. "12345 example.org. FAKEFAKEFAKE");
  1087. doFindTest(*finder, isc::dns::Name("ns.delegation.example.org."),
  1088. isc::dns::RRType::A(), isc::dns::RRType::NS(),
  1089. isc::dns::RRTTL(3600), ZoneFinder::DELEGATION, expected_rdatas_,
  1090. expected_sig_rdatas_,
  1091. isc::dns::Name("delegation.example.org."));
  1092. doFindTest(*finder, isc::dns::Name("ns.delegation.example.org."),
  1093. isc::dns::RRType::AAAA(), isc::dns::RRType::NS(),
  1094. isc::dns::RRTTL(3600), ZoneFinder::DELEGATION, expected_rdatas_,
  1095. expected_sig_rdatas_,
  1096. isc::dns::Name("delegation.example.org."));
  1097. doFindTest(*finder, isc::dns::Name("deep.below.delegation.example.org."),
  1098. isc::dns::RRType::AAAA(), isc::dns::RRType::NS(),
  1099. isc::dns::RRTTL(3600), ZoneFinder::DELEGATION, expected_rdatas_,
  1100. expected_sig_rdatas_,
  1101. isc::dns::Name("delegation.example.org."));
  1102. // Even when we check directly at the delegation point, we should get
  1103. // the NS
  1104. doFindTest(*finder, isc::dns::Name("delegation.example.org."),
  1105. isc::dns::RRType::AAAA(), isc::dns::RRType::NS(),
  1106. isc::dns::RRTTL(3600), ZoneFinder::DELEGATION, expected_rdatas_,
  1107. expected_sig_rdatas_);
  1108. // And when we ask direcly for the NS, we should still get delegation
  1109. doFindTest(*finder, isc::dns::Name("delegation.example.org."),
  1110. isc::dns::RRType::NS(), isc::dns::RRType::NS(),
  1111. isc::dns::RRTTL(3600), ZoneFinder::DELEGATION, expected_rdatas_,
  1112. expected_sig_rdatas_);
  1113. // Now test delegation. If it is below the delegation point, we should get
  1114. // the DNAME (the one with data under DNAME is invalid zone, but we test
  1115. // the behaviour anyway just to make sure)
  1116. expected_rdatas_.clear();
  1117. expected_rdatas_.push_back("dname.example.com.");
  1118. expected_sig_rdatas_.clear();
  1119. expected_sig_rdatas_.push_back("DNAME 5 3 3600 20000101000000 "
  1120. "20000201000000 12345 example.org. "
  1121. "FAKEFAKEFAKE");
  1122. doFindTest(*finder, isc::dns::Name("below.dname.example.org."),
  1123. isc::dns::RRType::A(), isc::dns::RRType::DNAME(),
  1124. isc::dns::RRTTL(3600), ZoneFinder::DNAME, expected_rdatas_,
  1125. expected_sig_rdatas_, isc::dns::Name("dname.example.org."));
  1126. doFindTest(*finder, isc::dns::Name("below.dname.example.org."),
  1127. isc::dns::RRType::AAAA(), isc::dns::RRType::DNAME(),
  1128. isc::dns::RRTTL(3600), ZoneFinder::DNAME, expected_rdatas_,
  1129. expected_sig_rdatas_, isc::dns::Name("dname.example.org."));
  1130. doFindTest(*finder, isc::dns::Name("really.deep.below.dname.example.org."),
  1131. isc::dns::RRType::AAAA(), isc::dns::RRType::DNAME(),
  1132. isc::dns::RRTTL(3600), ZoneFinder::DNAME, expected_rdatas_,
  1133. expected_sig_rdatas_, isc::dns::Name("dname.example.org."));
  1134. // Asking direcly for DNAME should give SUCCESS
  1135. doFindTest(*finder, isc::dns::Name("dname.example.org."),
  1136. isc::dns::RRType::DNAME(), isc::dns::RRType::DNAME(),
  1137. isc::dns::RRTTL(3600), ZoneFinder::SUCCESS, expected_rdatas_,
  1138. expected_sig_rdatas_);
  1139. // But we don't delegate at DNAME point
  1140. expected_rdatas_.clear();
  1141. expected_rdatas_.push_back("192.0.2.1");
  1142. expected_sig_rdatas_.clear();
  1143. doFindTest(*finder, isc::dns::Name("dname.example.org."),
  1144. isc::dns::RRType::A(), isc::dns::RRType::A(),
  1145. isc::dns::RRTTL(3600), ZoneFinder::SUCCESS, expected_rdatas_,
  1146. expected_sig_rdatas_);
  1147. expected_rdatas_.clear();
  1148. doFindTest(*finder, isc::dns::Name("dname.example.org."),
  1149. isc::dns::RRType::AAAA(), isc::dns::RRType::AAAA(),
  1150. isc::dns::RRTTL(3600), ZoneFinder::NXRRSET, expected_rdatas_,
  1151. expected_sig_rdatas_);
  1152. // This is broken dname, it contains two targets
  1153. EXPECT_THROW(finder->find(isc::dns::Name("below.baddname.example.org."),
  1154. isc::dns::RRType::A(), NULL,
  1155. ZoneFinder::FIND_DEFAULT),
  1156. DataSourceError);
  1157. // Broken NS - it lives together with something else
  1158. EXPECT_THROW(finder->find(isc::dns::Name("brokenns1.example.org."),
  1159. isc::dns::RRType::A(), NULL,
  1160. ZoneFinder::FIND_DEFAULT),
  1161. DataSourceError);
  1162. EXPECT_THROW(finder->find(isc::dns::Name("brokenns2.example.org."),
  1163. isc::dns::RRType::A(), NULL,
  1164. ZoneFinder::FIND_DEFAULT),
  1165. DataSourceError);
  1166. }
  1167. TEST_F(DatabaseClientTest, emptyDomain) {
  1168. shared_ptr<DatabaseClient::Finder> finder(getFinder());
  1169. // This domain doesn't exist, but a subdomain of it does.
  1170. // Therefore we should pretend the domain is there, but contains no RRsets
  1171. doFindTest(*finder, isc::dns::Name("b.example.org."), isc::dns::RRType::A(),
  1172. isc::dns::RRType::A(), isc::dns::RRTTL(3600),
  1173. ZoneFinder::NXRRSET, expected_rdatas_, expected_sig_rdatas_);
  1174. }
  1175. // Glue-OK mode. Just go trough NS delegations down (but not trough
  1176. // DNAME) and pretend it is not there.
  1177. TEST_F(DatabaseClientTest, glueOK) {
  1178. shared_ptr<DatabaseClient::Finder> finder(getFinder());
  1179. expected_rdatas_.clear();
  1180. expected_sig_rdatas_.clear();
  1181. doFindTest(*finder, isc::dns::Name("ns.delegation.example.org."),
  1182. isc::dns::RRType::AAAA(), isc::dns::RRType::AAAA(),
  1183. isc::dns::RRTTL(3600), ZoneFinder::NXRRSET,
  1184. expected_rdatas_, expected_sig_rdatas_,
  1185. isc::dns::Name("ns.delegation.example.org."),
  1186. ZoneFinder::FIND_GLUE_OK);
  1187. doFindTest(*finder, isc::dns::Name("nothere.delegation.example.org."),
  1188. isc::dns::RRType::AAAA(), isc::dns::RRType::AAAA(),
  1189. isc::dns::RRTTL(3600), ZoneFinder::NXDOMAIN,
  1190. expected_rdatas_, expected_sig_rdatas_,
  1191. isc::dns::Name("nothere.delegation.example.org."),
  1192. ZoneFinder::FIND_GLUE_OK);
  1193. expected_rdatas_.push_back("192.0.2.1");
  1194. doFindTest(*finder, isc::dns::Name("ns.delegation.example.org."),
  1195. isc::dns::RRType::A(), isc::dns::RRType::A(),
  1196. isc::dns::RRTTL(3600), ZoneFinder::SUCCESS,
  1197. expected_rdatas_, expected_sig_rdatas_,
  1198. isc::dns::Name("ns.delegation.example.org."),
  1199. ZoneFinder::FIND_GLUE_OK);
  1200. expected_rdatas_.clear();
  1201. expected_rdatas_.push_back("ns.example.com.");
  1202. expected_rdatas_.push_back("ns.delegation.example.org.");
  1203. expected_sig_rdatas_.clear();
  1204. expected_sig_rdatas_.push_back("NS 5 3 3600 20000101000000 "
  1205. "20000201000000 12345 example.org. "
  1206. "FAKEFAKEFAKE");
  1207. // When we request the NS, it should be SUCCESS, not DELEGATION
  1208. // (different in GLUE_OK)
  1209. doFindTest(*finder, isc::dns::Name("delegation.example.org."),
  1210. isc::dns::RRType::NS(), isc::dns::RRType::NS(),
  1211. isc::dns::RRTTL(3600), ZoneFinder::SUCCESS,
  1212. expected_rdatas_, expected_sig_rdatas_,
  1213. isc::dns::Name("delegation.example.org."),
  1214. ZoneFinder::FIND_GLUE_OK);
  1215. expected_rdatas_.clear();
  1216. expected_rdatas_.push_back("dname.example.com.");
  1217. expected_sig_rdatas_.clear();
  1218. expected_sig_rdatas_.push_back("DNAME 5 3 3600 20000101000000 "
  1219. "20000201000000 12345 example.org. "
  1220. "FAKEFAKEFAKE");
  1221. doFindTest(*finder, isc::dns::Name("below.dname.example.org."),
  1222. isc::dns::RRType::A(), isc::dns::RRType::DNAME(),
  1223. isc::dns::RRTTL(3600), ZoneFinder::DNAME, expected_rdatas_,
  1224. expected_sig_rdatas_, isc::dns::Name("dname.example.org."),
  1225. ZoneFinder::FIND_GLUE_OK);
  1226. doFindTest(*finder, isc::dns::Name("below.dname.example.org."),
  1227. isc::dns::RRType::AAAA(), isc::dns::RRType::DNAME(),
  1228. isc::dns::RRTTL(3600), ZoneFinder::DNAME, expected_rdatas_,
  1229. expected_sig_rdatas_, isc::dns::Name("dname.example.org."),
  1230. ZoneFinder::FIND_GLUE_OK);
  1231. }
  1232. TEST_F(DatabaseClientTest, wildcard) {
  1233. shared_ptr<DatabaseClient::Finder> finder(getFinder());
  1234. // First, simple wildcard match
  1235. expected_rdatas_.push_back("192.0.2.5");
  1236. doFindTest(*finder, isc::dns::Name("a.wild.example.org"),
  1237. isc::dns::RRType::A(), isc::dns::RRType::A(),
  1238. isc::dns::RRTTL(3600), ZoneFinder::SUCCESS, expected_rdatas_,
  1239. expected_sig_rdatas_);
  1240. doFindTest(*finder, isc::dns::Name("b.a.wild.example.org"),
  1241. isc::dns::RRType::A(), isc::dns::RRType::A(),
  1242. isc::dns::RRTTL(3600), ZoneFinder::SUCCESS, expected_rdatas_,
  1243. expected_sig_rdatas_);
  1244. expected_rdatas_.clear();
  1245. doFindTest(*finder, isc::dns::Name("a.wild.example.org"),
  1246. isc::dns::RRType::AAAA(), isc::dns::RRType::AAAA(),
  1247. isc::dns::RRTTL(3600), ZoneFinder::NXRRSET, expected_rdatas_,
  1248. expected_sig_rdatas_);
  1249. doFindTest(*finder, isc::dns::Name("b.a.wild.example.org"),
  1250. isc::dns::RRType::AAAA(), isc::dns::RRType::AAAA(),
  1251. isc::dns::RRTTL(3600), ZoneFinder::NXRRSET, expected_rdatas_,
  1252. expected_sig_rdatas_);
  1253. // Direct request for thi wildcard
  1254. expected_rdatas_.push_back("192.0.2.5");
  1255. doFindTest(*finder, isc::dns::Name("*.wild.example.org"),
  1256. isc::dns::RRType::A(), isc::dns::RRType::A(),
  1257. isc::dns::RRTTL(3600), ZoneFinder::SUCCESS, expected_rdatas_,
  1258. expected_sig_rdatas_);
  1259. expected_rdatas_.clear();
  1260. doFindTest(*finder, isc::dns::Name("*.wild.example.org"),
  1261. isc::dns::RRType::AAAA(), isc::dns::RRType::AAAA(),
  1262. isc::dns::RRTTL(3600), ZoneFinder::NXRRSET, expected_rdatas_,
  1263. expected_sig_rdatas_);
  1264. // This is nonsense, but check it doesn't match by some stupid accident
  1265. doFindTest(*finder, isc::dns::Name("a.*.wild.example.org"),
  1266. isc::dns::RRType::A(), isc::dns::RRType::A(),
  1267. isc::dns::RRTTL(3600), ZoneFinder::NXDOMAIN,
  1268. expected_rdatas_, expected_sig_rdatas_);
  1269. // These should be canceled, since it is below a domain which exitsts
  1270. doFindTest(*finder, isc::dns::Name("nothing.here.wild.example.org"),
  1271. isc::dns::RRType::A(), isc::dns::RRType::A(),
  1272. isc::dns::RRTTL(3600), ZoneFinder::NXDOMAIN,
  1273. expected_rdatas_, expected_sig_rdatas_);
  1274. doFindTest(*finder, isc::dns::Name("cancel.here.wild.example.org"),
  1275. isc::dns::RRType::A(), isc::dns::RRType::A(),
  1276. isc::dns::RRTTL(3600), ZoneFinder::NXRRSET,
  1277. expected_rdatas_, expected_sig_rdatas_);
  1278. doFindTest(*finder,
  1279. isc::dns::Name("below.cancel.here.wild.example.org"),
  1280. isc::dns::RRType::A(), isc::dns::RRType::A(),
  1281. isc::dns::RRTTL(3600), ZoneFinder::NXDOMAIN,
  1282. expected_rdatas_, expected_sig_rdatas_);
  1283. // And this should be just plain empty non-terminal domain, check
  1284. // the wildcard doesn't hurt it
  1285. doFindTest(*finder, isc::dns::Name("here.wild.example.org"),
  1286. isc::dns::RRType::A(), isc::dns::RRType::A(),
  1287. isc::dns::RRTTL(3600), ZoneFinder::NXRRSET, expected_rdatas_,
  1288. expected_sig_rdatas_);
  1289. // Also make sure that the wildcard doesn't hurt the original data
  1290. // below the wildcard
  1291. expected_rdatas_.push_back("2001:db8::5");
  1292. doFindTest(*finder, isc::dns::Name("cancel.here.wild.example.org"),
  1293. isc::dns::RRType::AAAA(), isc::dns::RRType::AAAA(),
  1294. isc::dns::RRTTL(3600), ZoneFinder::SUCCESS,
  1295. expected_rdatas_, expected_sig_rdatas_);
  1296. expected_rdatas_.clear();
  1297. // How wildcard go together with delegation
  1298. expected_rdatas_.push_back("ns.example.com.");
  1299. doFindTest(*finder, isc::dns::Name("below.delegatedwild.example.org"),
  1300. isc::dns::RRType::A(), isc::dns::RRType::NS(),
  1301. isc::dns::RRTTL(3600), ZoneFinder::DELEGATION, expected_rdatas_,
  1302. expected_sig_rdatas_,
  1303. isc::dns::Name("delegatedwild.example.org"));
  1304. // FIXME: This doesn't look logically OK, GLUE_OK should make it transparent,
  1305. // so the match should either work or be canceled, but return NXDOMAIN
  1306. doFindTest(*finder, isc::dns::Name("below.delegatedwild.example.org"),
  1307. isc::dns::RRType::A(), isc::dns::RRType::NS(),
  1308. isc::dns::RRTTL(3600), ZoneFinder::DELEGATION, expected_rdatas_,
  1309. expected_sig_rdatas_,
  1310. isc::dns::Name("delegatedwild.example.org"),
  1311. ZoneFinder::FIND_GLUE_OK);
  1312. expected_rdatas_.clear();
  1313. expected_rdatas_.push_back("192.0.2.5");
  1314. // These are direct matches
  1315. const char* positive_names[] = {
  1316. "wild.*.foo.example.org.",
  1317. "wild.*.foo.*.bar.example.org.",
  1318. NULL
  1319. };
  1320. for (const char** name(positive_names); *name != NULL; ++ name) {
  1321. doFindTest(*finder, isc::dns::Name(*name), isc::dns::RRType::A(),
  1322. isc::dns::RRType::A(), isc::dns::RRTTL(3600),
  1323. ZoneFinder::SUCCESS, expected_rdatas_,
  1324. expected_sig_rdatas_);
  1325. }
  1326. // These are wildcard matches against empty nonterminal asterisk
  1327. expected_rdatas_.clear();
  1328. const char* negative_names[] = {
  1329. "a.foo.example.org.",
  1330. "*.foo.example.org.",
  1331. "foo.example.org.",
  1332. "wild.bar.foo.example.org.",
  1333. "baz.foo.*.bar.example.org",
  1334. "baz.foo.baz.bar.example.org",
  1335. "*.foo.baz.bar.example.org",
  1336. "*.foo.*.bar.example.org",
  1337. "foo.*.bar.example.org",
  1338. "*.bar.example.org",
  1339. "bar.example.org",
  1340. NULL
  1341. };
  1342. for (const char** name(negative_names); *name != NULL; ++ name) {
  1343. doFindTest(*finder, isc::dns::Name(*name), isc::dns::RRType::A(),
  1344. isc::dns::RRType::A(), isc::dns::RRTTL(3600),
  1345. ZoneFinder::NXRRSET, expected_rdatas_,
  1346. expected_sig_rdatas_);
  1347. }
  1348. }
  1349. TEST_F(DatabaseClientTest, getOrigin) {
  1350. DataSourceClient::FindResult zone(client_->findZone(Name("example.org")));
  1351. ASSERT_EQ(result::SUCCESS, zone.code);
  1352. shared_ptr<DatabaseClient::Finder> finder(
  1353. dynamic_pointer_cast<DatabaseClient::Finder>(zone.zone_finder));
  1354. EXPECT_EQ(READONLY_ZONE_ID, finder->zone_id());
  1355. EXPECT_EQ(isc::dns::Name("example.org"), finder->getOrigin());
  1356. }
  1357. TEST_F(DatabaseClientTest, updaterFinder) {
  1358. updater_ = client_->getUpdater(zname_, false);
  1359. ASSERT_TRUE(updater_);
  1360. // If this update isn't replacing the zone, the finder should work
  1361. // just like the normal find() case.
  1362. EXPECT_EQ(WRITABLE_ZONE_ID, dynamic_cast<DatabaseClient::Finder&>(
  1363. updater_->getFinder()).zone_id());
  1364. expected_rdatas_.clear();
  1365. expected_rdatas_.push_back("192.0.2.1");
  1366. doFindTest(updater_->getFinder(), qname_,
  1367. qtype_, qtype_, rrttl_, ZoneFinder::SUCCESS,
  1368. expected_rdatas_, empty_rdatas_);
  1369. // When replacing the zone, the updater's finder shouldn't see anything
  1370. // in the zone until something is added.
  1371. updater_.reset();
  1372. updater_ = client_->getUpdater(zname_, true);
  1373. ASSERT_TRUE(updater_);
  1374. EXPECT_EQ(WRITABLE_ZONE_ID, dynamic_cast<DatabaseClient::Finder&>(
  1375. updater_->getFinder()).zone_id());
  1376. doFindTest(updater_->getFinder(), qname_, qtype_, qtype_, rrttl_,
  1377. ZoneFinder::NXDOMAIN, empty_rdatas_, empty_rdatas_);
  1378. }
  1379. TEST_F(DatabaseClientTest, flushZone) {
  1380. // A simple update case: flush the entire zone
  1381. shared_ptr<DatabaseClient::Finder> finder(getFinder());
  1382. // Before update, the name exists.
  1383. EXPECT_EQ(ZoneFinder::SUCCESS, finder->find(qname_, qtype_).code);
  1384. // start update in the replace mode. the normal finder should still
  1385. // be able to see the record, but the updater's finder shouldn't.
  1386. updater_ = client_->getUpdater(zname_, true);
  1387. setUpdateAccessor();
  1388. EXPECT_EQ(ZoneFinder::SUCCESS,
  1389. finder->find(qname_, qtype_).code);
  1390. EXPECT_EQ(ZoneFinder::NXDOMAIN,
  1391. updater_->getFinder().find(qname_, qtype_).code);
  1392. // commit the update. now the normal finder shouldn't see it.
  1393. updater_->commit();
  1394. EXPECT_EQ(ZoneFinder::NXDOMAIN, finder->find(qname_, qtype_).code);
  1395. // Check rollback wasn't accidentally performed.
  1396. EXPECT_FALSE(isRollbacked());
  1397. }
  1398. TEST_F(DatabaseClientTest, updateCancel) {
  1399. // similar to the previous test, but destruct the updater before commit.
  1400. ZoneFinderPtr finder = client_->findZone(zname_).zone_finder;
  1401. EXPECT_EQ(ZoneFinder::SUCCESS, finder->find(qname_, qtype_).code);
  1402. updater_ = client_->getUpdater(zname_, true);
  1403. setUpdateAccessor();
  1404. EXPECT_EQ(ZoneFinder::NXDOMAIN,
  1405. updater_->getFinder().find(qname_, qtype_).code);
  1406. // DB should not have been rolled back yet.
  1407. EXPECT_FALSE(isRollbacked());
  1408. updater_.reset(); // destruct without commit
  1409. // reset() should have triggered rollback (although it doesn't affect
  1410. // anything to the mock accessor implementation except for the result of
  1411. // isRollbacked())
  1412. EXPECT_TRUE(isRollbacked());
  1413. EXPECT_EQ(ZoneFinder::SUCCESS, finder->find(qname_, qtype_).code);
  1414. }
  1415. TEST_F(DatabaseClientTest, exceptionFromRollback) {
  1416. updater_ = client_->getUpdater(zname_, true);
  1417. rrset_.reset(new RRset(Name("throw.example.org"), qclass_, qtype_,
  1418. rrttl_));
  1419. rrset_->addRdata(rdata::createRdata(rrset_->getType(),
  1420. rrset_->getClass(), "192.0.2.1"));
  1421. updater_->addRRset(*rrset_);
  1422. // destruct without commit. The added name will result in an exception
  1423. // in the MockAccessor's rollback method. It shouldn't be propagated.
  1424. EXPECT_NO_THROW(updater_.reset());
  1425. }
  1426. TEST_F(DatabaseClientTest, duplicateCommit) {
  1427. // duplicate commit. should result in exception.
  1428. updater_ = client_->getUpdater(zname_, true);
  1429. updater_->commit();
  1430. EXPECT_THROW(updater_->commit(), DataSourceError);
  1431. }
  1432. TEST_F(DatabaseClientTest, addRRsetToNewZone) {
  1433. // Add a single RRset to a fresh empty zone
  1434. updater_ = client_->getUpdater(zname_, true);
  1435. updater_->addRRset(*rrset_);
  1436. expected_rdatas_.clear();
  1437. expected_rdatas_.push_back("192.0.2.2");
  1438. {
  1439. SCOPED_TRACE("add RRset");
  1440. doFindTest(updater_->getFinder(), qname_, qtype_,
  1441. qtype_, rrttl_, ZoneFinder::SUCCESS,
  1442. expected_rdatas_, empty_rdatas_);
  1443. }
  1444. // Similar to the previous case, but with RRSIG
  1445. updater_.reset();
  1446. updater_ = client_->getUpdater(zname_, true);
  1447. updater_->addRRset(*rrset_);
  1448. updater_->addRRset(*rrsigset_);
  1449. // confirm the expected columns were passed to the accessor (if checkable).
  1450. const char* const rrsig_added[] = {
  1451. "www.example.org.", "org.example.www.", "3600", "RRSIG", "A",
  1452. "A 5 3 0 20000101000000 20000201000000 0 example.org. FAKEFAKEFAKE"
  1453. };
  1454. checkLastAdded(rrsig_added);
  1455. expected_sig_rdatas_.clear();
  1456. expected_sig_rdatas_.push_back(rrsig_added[DatabaseAccessor::ADD_RDATA]);
  1457. {
  1458. SCOPED_TRACE("add RRset with RRSIG");
  1459. doFindTest(updater_->getFinder(), qname_, qtype_,
  1460. qtype_, rrttl_, ZoneFinder::SUCCESS,
  1461. expected_rdatas_, expected_sig_rdatas_);
  1462. }
  1463. // Add the non RRSIG RRset again, to see the attempt of adding RRSIG
  1464. // causes any unexpected effect, in particular, whether the SIGTYPE
  1465. // field might remain.
  1466. updater_->addRRset(*rrset_);
  1467. const char* const rrset_added[] = {
  1468. "www.example.org.", "org.example.www.", "3600", "A", "", "192.0.2.2"
  1469. };
  1470. checkLastAdded(rrset_added);
  1471. }
  1472. TEST_F(DatabaseClientTest, addRRsetToCurrentZone) {
  1473. // Similar to the previous test, but not replacing the existing data.
  1474. shared_ptr<DatabaseClient::Finder> finder(getFinder());
  1475. updater_ = client_->getUpdater(zname_, false);
  1476. updater_->addRRset(*rrset_);
  1477. // We should see both old and new data.
  1478. expected_rdatas_.clear();
  1479. expected_rdatas_.push_back("192.0.2.1");
  1480. expected_rdatas_.push_back("192.0.2.2");
  1481. {
  1482. SCOPED_TRACE("add RRset");
  1483. doFindTest(updater_->getFinder(), qname_, qtype_,
  1484. qtype_, rrttl_, ZoneFinder::SUCCESS,
  1485. expected_rdatas_, empty_rdatas_);
  1486. }
  1487. updater_->commit();
  1488. {
  1489. SCOPED_TRACE("add RRset after commit");
  1490. doFindTest(*finder, qname_, qtype_, qtype_,
  1491. rrttl_, ZoneFinder::SUCCESS, expected_rdatas_,
  1492. empty_rdatas_);
  1493. }
  1494. }
  1495. TEST_F(DatabaseClientTest, addMultipleRRs) {
  1496. // Similar to the previous case, but the added RRset contains multiple
  1497. // RRs.
  1498. updater_ = client_->getUpdater(zname_, false);
  1499. rrset_->addRdata(rdata::createRdata(rrset_->getType(), rrset_->getClass(),
  1500. "192.0.2.3"));
  1501. updater_->addRRset(*rrset_);
  1502. expected_rdatas_.clear();
  1503. expected_rdatas_.push_back("192.0.2.1");
  1504. expected_rdatas_.push_back("192.0.2.2");
  1505. expected_rdatas_.push_back("192.0.2.3");
  1506. {
  1507. SCOPED_TRACE("add multiple RRs");
  1508. doFindTest(updater_->getFinder(), qname_, qtype_,
  1509. qtype_, rrttl_, ZoneFinder::SUCCESS,
  1510. expected_rdatas_, empty_rdatas_);
  1511. }
  1512. }
  1513. TEST_F(DatabaseClientTest, addRRsetOfLargerTTL) {
  1514. // Similar to the previous one, but the TTL of the added RRset is larger
  1515. // than that of the existing record. The finder should use the smaller
  1516. // one.
  1517. updater_ = client_->getUpdater(zname_, false);
  1518. rrset_->setTTL(RRTTL(7200));
  1519. updater_->addRRset(*rrset_);
  1520. expected_rdatas_.clear();
  1521. expected_rdatas_.push_back("192.0.2.1");
  1522. expected_rdatas_.push_back("192.0.2.2");
  1523. {
  1524. SCOPED_TRACE("add RRset of larger TTL");
  1525. doFindTest(updater_->getFinder(), qname_, qtype_,
  1526. qtype_, rrttl_, ZoneFinder::SUCCESS,
  1527. expected_rdatas_, empty_rdatas_);
  1528. }
  1529. }
  1530. TEST_F(DatabaseClientTest, addRRsetOfSmallerTTL) {
  1531. // Similar to the previous one, but the added RRset has a smaller TTL.
  1532. // The added TTL should be used by the finder.
  1533. updater_ = client_->getUpdater(zname_, false);
  1534. rrset_->setTTL(RRTTL(1800));
  1535. updater_->addRRset(*rrset_);
  1536. expected_rdatas_.clear();
  1537. expected_rdatas_.push_back("192.0.2.1");
  1538. expected_rdatas_.push_back("192.0.2.2");
  1539. {
  1540. SCOPED_TRACE("add RRset of smaller TTL");
  1541. doFindTest(updater_->getFinder(), qname_, qtype_,
  1542. qtype_, RRTTL(1800), ZoneFinder::SUCCESS,
  1543. expected_rdatas_, empty_rdatas_);
  1544. }
  1545. }
  1546. TEST_F(DatabaseClientTest, addSameRR) {
  1547. // Add the same RR as that is already in the data source.
  1548. // Currently the add interface doesn't try to suppress the duplicate,
  1549. // neither does the finder. We may want to revisit it in future versions.
  1550. updater_ = client_->getUpdater(zname_, false);
  1551. rrset_.reset(new RRset(qname_, qclass_, qtype_, rrttl_));
  1552. rrset_->addRdata(rdata::createRdata(rrset_->getType(), rrset_->getClass(),
  1553. "192.0.2.1"));
  1554. updater_->addRRset(*rrset_);
  1555. expected_rdatas_.clear();
  1556. expected_rdatas_.push_back("192.0.2.1");
  1557. expected_rdatas_.push_back("192.0.2.1");
  1558. {
  1559. SCOPED_TRACE("add same RR");
  1560. doFindTest(updater_->getFinder(), qname_, qtype_,
  1561. qtype_, rrttl_, ZoneFinder::SUCCESS,
  1562. expected_rdatas_, empty_rdatas_);
  1563. }
  1564. }
  1565. TEST_F(DatabaseClientTest, addDeviantRR) {
  1566. updater_ = client_->getUpdater(zname_, false);
  1567. // RR class mismatch. This should be detected and rejected.
  1568. rrset_.reset(new RRset(qname_, RRClass::CH(), RRType::TXT(), rrttl_));
  1569. rrset_->addRdata(rdata::createRdata(rrset_->getType(), rrset_->getClass(),
  1570. "test text"));
  1571. EXPECT_THROW(updater_->addRRset(*rrset_), DataSourceError);
  1572. // Out-of-zone owner name. At a higher level this should be rejected,
  1573. // but it doesn't happen in this interface.
  1574. rrset_.reset(new RRset(Name("example.com"), qclass_, qtype_, rrttl_));
  1575. rrset_->addRdata(rdata::createRdata(rrset_->getType(), rrset_->getClass(),
  1576. "192.0.2.100"));
  1577. updater_->addRRset(*rrset_);
  1578. expected_rdatas_.clear();
  1579. expected_rdatas_.push_back("192.0.2.100");
  1580. {
  1581. // Note: with the find() implementation being more strict about
  1582. // zone cuts, this test may fail. Then the test should be updated.
  1583. SCOPED_TRACE("add out-of-zone RR");
  1584. doFindTest(updater_->getFinder(), Name("example.com"),
  1585. qtype_, qtype_, rrttl_, ZoneFinder::SUCCESS,
  1586. expected_rdatas_, empty_rdatas_);
  1587. }
  1588. }
  1589. TEST_F(DatabaseClientTest, addEmptyRRset) {
  1590. updater_ = client_->getUpdater(zname_, false);
  1591. rrset_.reset(new RRset(qname_, qclass_, qtype_, rrttl_));
  1592. EXPECT_THROW(updater_->addRRset(*rrset_), DataSourceError);
  1593. }
  1594. TEST_F(DatabaseClientTest, addRRsetWithRRSIG) {
  1595. updater_ = client_->getUpdater(zname_, false);
  1596. rrset_->addRRsig(*rrsigset_);
  1597. EXPECT_THROW(updater_->addRRset(*rrset_), DataSourceError);
  1598. }
  1599. TEST_F(DatabaseClientTest, addAfterCommit) {
  1600. updater_ = client_->getUpdater(zname_, false);
  1601. updater_->commit();
  1602. EXPECT_THROW(updater_->addRRset(*rrset_), DataSourceError);
  1603. }
  1604. TEST_F(DatabaseClientTest, deleteRRset) {
  1605. shared_ptr<DatabaseClient::Finder> finder(getFinder());
  1606. rrset_.reset(new RRset(qname_, qclass_, qtype_, rrttl_));
  1607. rrset_->addRdata(rdata::createRdata(rrset_->getType(), rrset_->getClass(),
  1608. "192.0.2.1"));
  1609. // Delete one RR from an RRset
  1610. updater_ = client_->getUpdater(zname_, false);
  1611. updater_->deleteRRset(*rrset_);
  1612. // Delete the only RR of a name
  1613. rrset_.reset(new RRset(Name("cname.example.org"), qclass_,
  1614. RRType::CNAME(), rrttl_));
  1615. rrset_->addRdata(rdata::createRdata(rrset_->getType(), rrset_->getClass(),
  1616. "www.example.org"));
  1617. updater_->deleteRRset(*rrset_);
  1618. // The updater_ finder should immediately see the deleted results.
  1619. {
  1620. SCOPED_TRACE("delete RRset");
  1621. doFindTest(updater_->getFinder(), qname_, qtype_,
  1622. qtype_, rrttl_, ZoneFinder::NXRRSET,
  1623. empty_rdatas_, empty_rdatas_);
  1624. doFindTest(updater_->getFinder(), Name("cname.example.org"),
  1625. qtype_, qtype_, rrttl_, ZoneFinder::NXDOMAIN,
  1626. empty_rdatas_, empty_rdatas_);
  1627. }
  1628. // before committing the change, the original finder should see the
  1629. // original record.
  1630. {
  1631. SCOPED_TRACE("delete RRset before commit");
  1632. expected_rdatas_.push_back("192.0.2.1");
  1633. doFindTest(*finder, qname_, qtype_, qtype_,
  1634. rrttl_, ZoneFinder::SUCCESS, expected_rdatas_,
  1635. empty_rdatas_);
  1636. expected_rdatas_.clear();
  1637. expected_rdatas_.push_back("www.example.org.");
  1638. doFindTest(*finder, Name("cname.example.org"), qtype_,
  1639. RRType::CNAME(), rrttl_, ZoneFinder::CNAME,
  1640. expected_rdatas_, empty_rdatas_);
  1641. }
  1642. // once committed, the record should be removed from the original finder's
  1643. // view, too.
  1644. updater_->commit();
  1645. {
  1646. SCOPED_TRACE("delete RRset after commit");
  1647. doFindTest(*finder, qname_, qtype_, qtype_,
  1648. rrttl_, ZoneFinder::NXRRSET, empty_rdatas_,
  1649. empty_rdatas_);
  1650. doFindTest(*finder, Name("cname.example.org"),
  1651. qtype_, qtype_, rrttl_, ZoneFinder::NXDOMAIN,
  1652. empty_rdatas_, empty_rdatas_);
  1653. }
  1654. }
  1655. TEST_F(DatabaseClientTest, deleteRRsetToNXDOMAIN) {
  1656. // similar to the previous case, but it removes the only record of the
  1657. // given name. a subsequent find() should result in NXDOMAIN.
  1658. rrset_.reset(new RRset(Name("cname.example.org"), qclass_,
  1659. RRType::CNAME(), rrttl_));
  1660. rrset_->addRdata(rdata::createRdata(rrset_->getType(), rrset_->getClass(),
  1661. "www.example.org"));
  1662. updater_ = client_->getUpdater(zname_, false);
  1663. updater_->deleteRRset(*rrset_);
  1664. {
  1665. SCOPED_TRACE("delete RRset to NXDOMAIN");
  1666. doFindTest(updater_->getFinder(), Name("cname.example.org"),
  1667. qtype_, qtype_, rrttl_, ZoneFinder::NXDOMAIN,
  1668. empty_rdatas_, empty_rdatas_);
  1669. }
  1670. }
  1671. TEST_F(DatabaseClientTest, deleteMultipleRRs) {
  1672. rrset_.reset(new RRset(qname_, qclass_, RRType::AAAA(), rrttl_));
  1673. rrset_->addRdata(rdata::createRdata(rrset_->getType(), rrset_->getClass(),
  1674. "2001:db8::1"));
  1675. rrset_->addRdata(rdata::createRdata(rrset_->getType(), rrset_->getClass(),
  1676. "2001:db8::2"));
  1677. updater_ = client_->getUpdater(zname_, false);
  1678. updater_->deleteRRset(*rrset_);
  1679. {
  1680. SCOPED_TRACE("delete multiple RRs");
  1681. doFindTest(updater_->getFinder(), qname_, RRType::AAAA(),
  1682. qtype_, rrttl_, ZoneFinder::NXRRSET,
  1683. empty_rdatas_, empty_rdatas_);
  1684. }
  1685. }
  1686. TEST_F(DatabaseClientTest, partialDelete) {
  1687. rrset_.reset(new RRset(qname_, qclass_, RRType::AAAA(), rrttl_));
  1688. rrset_->addRdata(rdata::createRdata(rrset_->getType(), rrset_->getClass(),
  1689. "2001:db8::1"));
  1690. // This does not exist in the test data source:
  1691. rrset_->addRdata(rdata::createRdata(rrset_->getType(), rrset_->getClass(),
  1692. "2001:db8::3"));
  1693. // deleteRRset should succeed "silently", and subsequent find() should
  1694. // find the remaining RR.
  1695. updater_ = client_->getUpdater(zname_, false);
  1696. updater_->deleteRRset(*rrset_);
  1697. {
  1698. SCOPED_TRACE("partial delete");
  1699. expected_rdatas_.push_back("2001:db8::2");
  1700. doFindTest(updater_->getFinder(), qname_, RRType::AAAA(),
  1701. RRType::AAAA(), rrttl_, ZoneFinder::SUCCESS,
  1702. expected_rdatas_, empty_rdatas_);
  1703. }
  1704. }
  1705. TEST_F(DatabaseClientTest, deleteNoMatch) {
  1706. // similar to the previous test, but there's not even a match in the
  1707. // specified RRset. Essentially there's no difference in the result.
  1708. updater_ = client_->getUpdater(zname_, false);
  1709. updater_->deleteRRset(*rrset_);
  1710. {
  1711. SCOPED_TRACE("delete no match");
  1712. expected_rdatas_.push_back("192.0.2.1");
  1713. doFindTest(updater_->getFinder(), qname_, qtype_,
  1714. qtype_, rrttl_, ZoneFinder::SUCCESS,
  1715. expected_rdatas_, empty_rdatas_);
  1716. }
  1717. }
  1718. TEST_F(DatabaseClientTest, deleteWithDifferentTTL) {
  1719. // Our delete interface simply ignores TTL (may change in a future version)
  1720. rrset_.reset(new RRset(qname_, qclass_, qtype_, RRTTL(1800)));
  1721. rrset_->addRdata(rdata::createRdata(rrset_->getType(), rrset_->getClass(),
  1722. "192.0.2.1"));
  1723. updater_ = client_->getUpdater(zname_, false);
  1724. updater_->deleteRRset(*rrset_);
  1725. {
  1726. SCOPED_TRACE("delete RRset with a different TTL");
  1727. doFindTest(updater_->getFinder(), qname_, qtype_,
  1728. qtype_, rrttl_, ZoneFinder::NXRRSET,
  1729. empty_rdatas_, empty_rdatas_);
  1730. }
  1731. }
  1732. TEST_F(DatabaseClientTest, deleteDeviantRR) {
  1733. updater_ = client_->getUpdater(zname_, false);
  1734. // RR class mismatch. This should be detected and rejected.
  1735. rrset_.reset(new RRset(qname_, RRClass::CH(), RRType::TXT(), rrttl_));
  1736. rrset_->addRdata(rdata::createRdata(rrset_->getType(), rrset_->getClass(),
  1737. "test text"));
  1738. EXPECT_THROW(updater_->deleteRRset(*rrset_), DataSourceError);
  1739. // Out-of-zone owner name. At a higher level this should be rejected,
  1740. // but it doesn't happen in this interface.
  1741. rrset_.reset(new RRset(Name("example.com"), qclass_, qtype_, rrttl_));
  1742. rrset_->addRdata(rdata::createRdata(rrset_->getType(), rrset_->getClass(),
  1743. "192.0.2.100"));
  1744. EXPECT_NO_THROW(updater_->deleteRRset(*rrset_));
  1745. }
  1746. TEST_F(DatabaseClientTest, deleteAfterCommit) {
  1747. updater_ = client_->getUpdater(zname_, false);
  1748. updater_->commit();
  1749. EXPECT_THROW(updater_->deleteRRset(*rrset_), DataSourceError);
  1750. }
  1751. TEST_F(DatabaseClientTest, deleteEmptyRRset) {
  1752. updater_ = client_->getUpdater(zname_, false);
  1753. rrset_.reset(new RRset(qname_, qclass_, qtype_, rrttl_));
  1754. EXPECT_THROW(updater_->deleteRRset(*rrset_), DataSourceError);
  1755. }
  1756. TEST_F(DatabaseClientTest, deleteRRsetWithRRSIG) {
  1757. updater_ = client_->getUpdater(zname_, false);
  1758. rrset_->addRRsig(*rrsigset_);
  1759. EXPECT_THROW(updater_->deleteRRset(*rrset_), DataSourceError);
  1760. }
  1761. }