nc_trans_unittests.cc 42 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057
  1. // Copyright (C) 2013 Internet Systems Consortium, Inc. ("ISC")
  2. //
  3. // Permission to use, copy, modify, and/or distribute this software for any
  4. // purpose with or without fee is hereby granted, provided that the above
  5. // copyright notice and this permission notice appear in all copies.
  6. //
  7. // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
  8. // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
  9. // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
  10. // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
  11. // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
  12. // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  13. // PERFORMANCE OF THIS SOFTWARE.
  14. #include <asiolink/interval_timer.h>
  15. #include <d2/nc_trans.h>
  16. #include <dns/opcode.h>
  17. #include <dns/messagerenderer.h>
  18. #include <log/logger_support.h>
  19. #include <log/macros.h>
  20. #include <util/buffer.h>
  21. #include <nc_test_utils.h>
  22. #include <asio/ip/udp.hpp>
  23. #include <asio/socket_base.hpp>
  24. #include <asio.hpp>
  25. #include <asio/error_code.hpp>
  26. #include <boost/function.hpp>
  27. #include <boost/bind.hpp>
  28. #include <gtest/gtest.h>
  29. using namespace std;
  30. using namespace isc;
  31. using namespace isc::d2;
  32. namespace {
  33. /// @brief Test derivation of NameChangeTransaction for exercising state
  34. /// model mechanics.
  35. ///
  36. /// This class facilitates testing by making non-public methods accessible so
  37. /// they can be invoked directly in test routines. It implements a very
  38. /// rudimentary state model, sufficient to test the state model mechanics
  39. /// supplied by the base class.
  40. class NameChangeStub : public NameChangeTransaction {
  41. public:
  42. // NameChangeStub states
  43. static const int DOING_UPDATE_ST = NCT_DERIVED_STATE_MIN + 1;
  44. // NameChangeStub events
  45. static const int SEND_UPDATE_EVT = NCT_DERIVED_EVENT_MIN + 2;
  46. bool use_stub_callback_;
  47. /// @brief Constructor
  48. ///
  49. /// Parameters match those needed by NameChangeTransaction.
  50. NameChangeStub(IOServicePtr& io_service,
  51. dhcp_ddns::NameChangeRequestPtr& ncr,
  52. DdnsDomainPtr forward_domain,
  53. DdnsDomainPtr reverse_domain)
  54. : NameChangeTransaction(io_service, ncr, forward_domain,
  55. reverse_domain),
  56. use_stub_callback_(false) {
  57. }
  58. /// @brief Destructor
  59. virtual ~NameChangeStub() {
  60. }
  61. /// @brief DNSClient callback
  62. /// Overrides the callback in NameChangeTranscation to allow testing
  63. /// sendUpdate without incorporating exectution of the state model
  64. /// into the test.
  65. /// It sets the DNS status update and posts IO_COMPLETED_EVT as does
  66. /// the normal callback, but rather than invoking runModel it stops
  67. /// the IO service. This allows tests to be constructed that consisted
  68. /// of generating a DNS request and invoking sendUpdate to post it and
  69. /// wait for response.
  70. virtual void operator()(DNSClient::Status status) {
  71. if (use_stub_callback_) {
  72. setDnsUpdateStatus(status);
  73. postNextEvent(IO_COMPLETED_EVT);
  74. getIOService()->stop();
  75. } else {
  76. // For tests which need to use the real callback.
  77. NameChangeTransaction::operator()(status);
  78. }
  79. }
  80. /// @brief Some tests require a server to be selected. This method
  81. /// selects the first server in the forward domain without involving
  82. /// state model execution to do so.
  83. bool selectFwdServer() {
  84. if (getForwardDomain()) {
  85. initServerSelection(getForwardDomain());
  86. selectNextServer();
  87. return (getCurrentServer());
  88. }
  89. return (false);
  90. }
  91. /// @brief Empty handler used to satisfy map verification.
  92. void dummyHandler() {
  93. isc_throw(NameChangeTransactionError,
  94. "dummyHandler - invalid event: " << getContextStr());
  95. }
  96. /// @brief State handler for the READY_ST.
  97. ///
  98. /// Serves as the starting state handler, it consumes the
  99. /// START_EVT "transitioning" to the state, DOING_UPDATE_ST and
  100. /// sets the next event to SEND_UPDATE_EVT.
  101. void readyHandler() {
  102. switch(getNextEvent()) {
  103. case START_EVT:
  104. transition(DOING_UPDATE_ST, SEND_UPDATE_EVT);
  105. break;
  106. default:
  107. // its bogus
  108. isc_throw(NameChangeTransactionError,
  109. "readyHandler - invalid event: " << getContextStr());
  110. }
  111. }
  112. /// @brief State handler for the DOING_UPDATE_ST.
  113. ///
  114. /// Simulates a state that starts some form of asynchronous work.
  115. /// When next event is SEND_UPDATE_EVT it sets the status to pending
  116. /// and signals the state model must "wait" for an event by setting
  117. /// next event to NOP_EVT.
  118. ///
  119. /// When next event is IO_COMPLETED_EVT, it transitions to the state,
  120. /// PROCESS_TRANS_OK_ST, and sets the next event to UPDATE_OK_EVT.
  121. void doingUpdateHandler() {
  122. switch(getNextEvent()) {
  123. case SEND_UPDATE_EVT:
  124. setNcrStatus(dhcp_ddns::ST_PENDING);
  125. postNextEvent(NOP_EVT);
  126. break;
  127. case IO_COMPLETED_EVT:
  128. if (getDnsUpdateStatus() == DNSClient::SUCCESS) {
  129. setForwardChangeCompleted(true);
  130. transition(PROCESS_TRANS_OK_ST, UPDATE_OK_EVT);
  131. } else {
  132. transition(PROCESS_TRANS_FAILED_ST, UPDATE_FAILED_EVT);
  133. }
  134. break;
  135. default:
  136. // its bogus
  137. isc_throw(NameChangeTransactionError,
  138. "doingUpdateHandler - invalid event: "
  139. << getContextStr());
  140. }
  141. }
  142. /// @brief State handler for the PROCESS_TRANS_OK_ST.
  143. ///
  144. /// This is the last state in the model. Note that it sets the
  145. /// status to completed and next event to NOP_EVT.
  146. void processTransDoneHandler() {
  147. switch(getNextEvent()) {
  148. case UPDATE_OK_EVT:
  149. setNcrStatus(dhcp_ddns::ST_COMPLETED);
  150. endModel();
  151. break;
  152. case UPDATE_FAILED_EVT:
  153. setNcrStatus(dhcp_ddns::ST_FAILED);
  154. endModel();
  155. break;
  156. default:
  157. // its bogus
  158. isc_throw(NameChangeTransactionError,
  159. "processTransDoneHandler - invalid event: "
  160. << getContextStr());
  161. }
  162. }
  163. /// @brief Construct the event dictionary.
  164. virtual void defineEvents() {
  165. // Invoke the base call implementation first.
  166. NameChangeTransaction::defineEvents();
  167. // Define our events.
  168. defineEvent(SEND_UPDATE_EVT, "SEND_UPDATE_EVT");
  169. }
  170. /// @brief Verify the event dictionary.
  171. virtual void verifyEvents() {
  172. // Invoke the base call implementation first.
  173. NameChangeTransaction::verifyEvents();
  174. // Define our events.
  175. getEvent(SEND_UPDATE_EVT);
  176. }
  177. /// @brief Construct the state dictionary.
  178. virtual void defineStates() {
  179. // Invoke the base call implementation first.
  180. NameChangeTransaction::defineStates();
  181. // Define our states.
  182. defineState(READY_ST, "READY_ST",
  183. boost::bind(&NameChangeStub::readyHandler, this));
  184. defineState(SELECTING_FWD_SERVER_ST, "SELECTING_FWD_SERVER_ST",
  185. boost::bind(&NameChangeStub::dummyHandler, this));
  186. defineState(SELECTING_REV_SERVER_ST, "SELECTING_REV_SERVER_ST",
  187. boost::bind(&NameChangeStub::dummyHandler, this));
  188. defineState(DOING_UPDATE_ST, "DOING_UPDATE_ST",
  189. boost::bind(&NameChangeStub::doingUpdateHandler,
  190. this));
  191. defineState(PROCESS_TRANS_OK_ST, "PROCESS_TRANS_OK_ST",
  192. boost::bind(&NameChangeStub::
  193. processTransDoneHandler, this));
  194. defineState(PROCESS_TRANS_FAILED_ST, "PROCESS_TRANS_FAILED_ST",
  195. boost::bind(&NameChangeStub::
  196. processTransDoneHandler, this));
  197. }
  198. /// @brief Verify the event dictionary.
  199. virtual void verifyStates() {
  200. // Invoke the base call implementation first.
  201. NameChangeTransaction::verifyStates();
  202. // Check our states.
  203. getState(DOING_UPDATE_ST);
  204. }
  205. // Expose the protected methods to be tested.
  206. using StateModel::runModel;
  207. using StateModel::postNextEvent;
  208. using StateModel::setState;
  209. using StateModel::initDictionaries;
  210. using NameChangeTransaction::initServerSelection;
  211. using NameChangeTransaction::selectNextServer;
  212. using NameChangeTransaction::getCurrentServer;
  213. using NameChangeTransaction::getDNSClient;
  214. using NameChangeTransaction::setNcrStatus;
  215. using NameChangeTransaction::setDnsUpdateRequest;
  216. using NameChangeTransaction::clearDnsUpdateRequest;
  217. using NameChangeTransaction::setDnsUpdateStatus;
  218. using NameChangeTransaction::getDnsUpdateResponse;
  219. using NameChangeTransaction::setDnsUpdateResponse;
  220. using NameChangeTransaction::clearDnsUpdateResponse;
  221. using NameChangeTransaction::getForwardChangeCompleted;
  222. using NameChangeTransaction::getReverseChangeCompleted;
  223. using NameChangeTransaction::setForwardChangeCompleted;
  224. using NameChangeTransaction::setReverseChangeCompleted;
  225. using NameChangeTransaction::setUpdateAttempts;
  226. using NameChangeTransaction::transition;
  227. using NameChangeTransaction::retryTransition;
  228. using NameChangeTransaction::sendUpdate;
  229. using NameChangeTransaction::prepNewRequest;
  230. using NameChangeTransaction::addLeaseAddressRdata;
  231. using NameChangeTransaction::addDhcidRdata;
  232. using NameChangeTransaction::addPtrRdata;
  233. };
  234. // Declare them so Gtest can see them.
  235. const int NameChangeStub::DOING_UPDATE_ST;
  236. const int NameChangeStub::SEND_UPDATE_EVT;
  237. /// @brief Defines a pointer to a NameChangeStubPtr instance.
  238. typedef boost::shared_ptr<NameChangeStub> NameChangeStubPtr;
  239. /// @brief Test fixture for testing NameChangeTransaction
  240. ///
  241. /// Note this class uses NameChangeStub class to exercise non-public
  242. /// aspects of NameChangeTransaction.
  243. class NameChangeTransactionTest : public ::testing::Test {
  244. public:
  245. IOServicePtr io_service_;
  246. DdnsDomainPtr forward_domain_;
  247. DdnsDomainPtr reverse_domain_;
  248. asiolink::IntervalTimer timer_;
  249. int run_time_;
  250. NameChangeTransactionTest()
  251. : io_service_(new isc::asiolink::IOService()), timer_(*io_service_),
  252. run_time_(0) {
  253. }
  254. virtual ~NameChangeTransactionTest() {
  255. }
  256. /// @brief Run the IO service for no more than a given amount of time.
  257. ///
  258. /// Uses an IntervalTimer to interrupt the invocation of IOService run(),
  259. /// after the given number of milliseconds elapse. The timer executes
  260. /// the timesUp() method if it expires.
  261. ///
  262. /// @param run_time amount of time in milliseconds to allow run to execute.
  263. void runTimedIO(int run_time) {
  264. run_time_ = run_time;
  265. timer_.setup(boost::bind(&NameChangeTransactionTest::timesUp, this),
  266. run_time_);
  267. io_service_->run();
  268. }
  269. /// @brief IO Timer expiration handler
  270. ///
  271. /// Stops the IOSerivce and fails the current test.
  272. void timesUp() {
  273. io_service_->stop();
  274. FAIL() << "Test Time: " << run_time_ << " expired";
  275. }
  276. /// @brief Instantiates a NameChangeStub test transaction
  277. /// The transaction is constructed around a predefined (i.e "canned")
  278. /// NameChangeRequest. The request has both forward and reverse DNS
  279. /// changes requested, and both forward and reverse domains are populated.
  280. NameChangeStubPtr makeCannedTransaction() {
  281. // NCR in JSON form.
  282. const char* msg_str =
  283. "{"
  284. " \"change_type\" : 0 , "
  285. " \"forward_change\" : true , "
  286. " \"reverse_change\" : true , "
  287. " \"fqdn\" : \"my.example.com.\" , "
  288. " \"ip_address\" : \"192.168.2.1\" , "
  289. " \"dhcid\" : \"0102030405060708\" , "
  290. " \"lease_expires_on\" : \"20130121132405\" , "
  291. " \"lease_length\" : 1300 "
  292. "}";
  293. // Create the request from JSON.
  294. dhcp_ddns::NameChangeRequestPtr ncr = dhcp_ddns::NameChangeRequest::
  295. fromJSON(msg_str);
  296. // Make forward DdnsDomain with 2 forward servers.
  297. forward_domain_ = makeDomain("example.com.");
  298. addDomainServer(forward_domain_, "forward.example.com",
  299. "127.0.0.1", 5301);
  300. addDomainServer(forward_domain_, "forward2.example.com",
  301. "127.0.0.1", 5302);
  302. // Make reverse DdnsDomain with one reverse server.
  303. reverse_domain_ = makeDomain("2.168.192.in.addr.arpa.");
  304. addDomainServer(reverse_domain_, "reverse.example.com",
  305. "127.0.0.1", 5301);
  306. // Instantiate the transaction as would be done by update manager.
  307. return (NameChangeStubPtr(new NameChangeStub(io_service_, ncr,
  308. forward_domain_, reverse_domain_)));
  309. }
  310. };
  311. /// @brief Tests NameChangeTransaction construction.
  312. /// This test verifies that:
  313. /// 1. Construction with null NameChangeRequest
  314. /// 2. Construction with null forward domain is not allowed when the request
  315. /// requires forward change.
  316. /// 3. Construction with null reverse domain is not allowed when the request
  317. /// requires reverse change.
  318. /// 4. Valid construction functions properly
  319. TEST(NameChangeTransaction, construction) {
  320. IOServicePtr io_service(new isc::asiolink::IOService());
  321. const char* msg_str =
  322. "{"
  323. " \"change_type\" : 0 , "
  324. " \"forward_change\" : true , "
  325. " \"reverse_change\" : true , "
  326. " \"fqdn\" : \"example.com.\" , "
  327. " \"ip_address\" : \"192.168.2.1\" , "
  328. " \"dhcid\" : \"0102030405060708\" , "
  329. " \"lease_expires_on\" : \"20130121132405\" , "
  330. " \"lease_length\" : 1300 "
  331. "}";
  332. dhcp_ddns::NameChangeRequestPtr ncr;
  333. dhcp_ddns::NameChangeRequestPtr empty_ncr;
  334. DnsServerInfoStoragePtr servers;
  335. DdnsDomainPtr forward_domain;
  336. DdnsDomainPtr reverse_domain;
  337. DdnsDomainPtr empty_domain;
  338. ASSERT_NO_THROW(ncr = dhcp_ddns::NameChangeRequest::fromJSON(msg_str));
  339. ASSERT_NO_THROW(forward_domain.reset(new DdnsDomain("*", "", servers)));
  340. ASSERT_NO_THROW(reverse_domain.reset(new DdnsDomain("*", "", servers)));
  341. // Verify that construction with a null IOServicePtr fails.
  342. // @todo Subject to change if multi-threading is implemented.
  343. IOServicePtr empty;
  344. EXPECT_THROW(NameChangeTransaction(empty, ncr,
  345. forward_domain, reverse_domain),
  346. NameChangeTransactionError);
  347. // Verify that construction with an empty NameChangeRequest throws.
  348. EXPECT_THROW(NameChangeTransaction(io_service, empty_ncr,
  349. forward_domain, reverse_domain),
  350. NameChangeTransactionError);
  351. // Verify that construction with an empty forward domain when the
  352. // NameChangeRequest calls for a forward change throws.
  353. EXPECT_THROW(NameChangeTransaction(io_service, ncr,
  354. empty_domain, reverse_domain),
  355. NameChangeTransactionError);
  356. // Verify that construction with an empty reverse domain when the
  357. // NameChangeRequest calls for a reverse change throws.
  358. EXPECT_THROW(NameChangeTransaction(io_service, ncr,
  359. forward_domain, empty_domain),
  360. NameChangeTransactionError);
  361. // Verify that a valid construction attempt works.
  362. EXPECT_NO_THROW(NameChangeTransaction(io_service, ncr,
  363. forward_domain, reverse_domain));
  364. // Verify that an empty forward domain is allowed when the requests does
  365. // not include a forward change.
  366. ncr->setForwardChange(false);
  367. ncr->setReverseChange(true);
  368. EXPECT_NO_THROW(NameChangeTransaction(io_service, ncr,
  369. empty_domain, reverse_domain));
  370. // Verify that an empty reverse domain is allowed when the requests does
  371. // not include a reverse change.
  372. ncr->setForwardChange(true);
  373. ncr->setReverseChange(false);
  374. EXPECT_NO_THROW(NameChangeTransaction(io_service, ncr,
  375. forward_domain, empty_domain));
  376. }
  377. /// @brief General testing of member accessors.
  378. /// Most if not all of these are also tested as a byproduct off larger tests.
  379. TEST_F(NameChangeTransactionTest, accessors) {
  380. NameChangeStubPtr name_change;
  381. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  382. // Verify that fetching the NameChangeRequest works.
  383. dhcp_ddns::NameChangeRequestPtr ncr = name_change->getNcr();
  384. ASSERT_TRUE(ncr);
  385. // Verify that getTransactionKey works.
  386. EXPECT_EQ(ncr->getDhcid(), name_change->getTransactionKey());
  387. // Verify that NcrStatus can be set and retrieved.
  388. EXPECT_NO_THROW(name_change->setNcrStatus(dhcp_ddns::ST_FAILED));
  389. EXPECT_EQ(dhcp_ddns::ST_FAILED, ncr->getStatus());
  390. // Verify that the forward domain can be retrieved.
  391. ASSERT_TRUE(name_change->getForwardDomain());
  392. EXPECT_EQ(forward_domain_, name_change->getForwardDomain());
  393. // Verify that the reverse domain can be retrieved.
  394. ASSERT_TRUE(name_change->getReverseDomain());
  395. EXPECT_EQ(reverse_domain_, name_change->getReverseDomain());
  396. // Neither of these have direct setters, but are tested under server
  397. // selection.
  398. EXPECT_FALSE(name_change->getDNSClient());
  399. EXPECT_FALSE(name_change->getCurrentServer());
  400. // Verify that DNS update status can be set and retrieved.
  401. EXPECT_NO_THROW(name_change->setDnsUpdateStatus(DNSClient::TIMEOUT));
  402. EXPECT_EQ(DNSClient::TIMEOUT, name_change->getDnsUpdateStatus());
  403. // Verify that the forward change complete flag can be set and fetched.
  404. EXPECT_NO_THROW(name_change->setForwardChangeCompleted(true));
  405. EXPECT_TRUE(name_change->getForwardChangeCompleted());
  406. // Verify that the reverse change complete flag can be set and fetched.
  407. EXPECT_NO_THROW(name_change->setReverseChangeCompleted(true));
  408. EXPECT_TRUE(name_change->getReverseChangeCompleted());
  409. }
  410. /// @brief Tests DNS update request accessor methods.
  411. TEST_F(NameChangeTransactionTest, dnsUpdateRequestAccessors) {
  412. // Create a transaction.
  413. NameChangeStubPtr name_change;
  414. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  415. // Post transaction construction, there should not be an update request.
  416. EXPECT_FALSE(name_change->getDnsUpdateRequest());
  417. // Create a request.
  418. D2UpdateMessagePtr req;
  419. ASSERT_NO_THROW(req.reset(new D2UpdateMessage(D2UpdateMessage::OUTBOUND)));
  420. // Use the setter and then verify we can fetch the request.
  421. ASSERT_NO_THROW(name_change->setDnsUpdateRequest(req));
  422. // Post set, we should be able to fetch it.
  423. ASSERT_TRUE(name_change->getDnsUpdateRequest());
  424. // Should be able to clear it.
  425. ASSERT_NO_THROW(name_change->clearDnsUpdateRequest());
  426. // Should be empty again.
  427. EXPECT_FALSE(name_change->getDnsUpdateRequest());
  428. }
  429. /// @brief Tests DNS update request accessor methods.
  430. TEST_F(NameChangeTransactionTest, dnsUpdateResponseAccessors) {
  431. // Create a transaction.
  432. NameChangeStubPtr name_change;
  433. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  434. // Post transaction construction, there should not be an update response.
  435. EXPECT_FALSE(name_change->getDnsUpdateResponse());
  436. // Create a response.
  437. D2UpdateMessagePtr resp;
  438. ASSERT_NO_THROW(resp.reset(new D2UpdateMessage(D2UpdateMessage::INBOUND)));
  439. // Use the setter and then verify we can fetch the response.
  440. ASSERT_NO_THROW(name_change->setDnsUpdateResponse(resp));
  441. // Post set, we should be able to fetch it.
  442. EXPECT_TRUE(name_change->getDnsUpdateResponse());
  443. // Should be able to clear it.
  444. ASSERT_NO_THROW(name_change->clearDnsUpdateResponse());
  445. // Should be empty again.
  446. EXPECT_FALSE(name_change->getDnsUpdateResponse());
  447. }
  448. /// @brief Tests event and state dictionary construction and verification.
  449. TEST_F(NameChangeTransactionTest, dictionaryCheck) {
  450. NameChangeStubPtr name_change;
  451. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  452. // Verify that the event and state dictionary validation fails prior
  453. // dictionary construction.
  454. ASSERT_THROW(name_change->verifyEvents(), StateModelError);
  455. ASSERT_THROW(name_change->verifyStates(), StateModelError);
  456. // Construct both dictionaries.
  457. ASSERT_NO_THROW(name_change->defineEvents());
  458. ASSERT_NO_THROW(name_change->defineStates());
  459. // Verify both event and state dictionaries now pass validation.
  460. ASSERT_NO_THROW(name_change->verifyEvents());
  461. ASSERT_NO_THROW(name_change->verifyStates());
  462. }
  463. /// @brief Tests server selection methods.
  464. /// Each transaction has a list of one or more servers for each DNS direction
  465. /// it is required to update. The transaction must be able to start at the
  466. /// beginning of a server list and cycle through them one at time, as needed,
  467. /// when a DNS exchange fails due to an IO error. This test verifies the
  468. /// ability to iteratively select a server from the list as the current server.
  469. TEST_F(NameChangeTransactionTest, serverSelectionTest) {
  470. NameChangeStubPtr name_change;
  471. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  472. // Verify that the forward domain and its list of servers can be retrieved.
  473. DdnsDomainPtr& domain = name_change->getForwardDomain();
  474. ASSERT_TRUE(domain);
  475. DnsServerInfoStoragePtr servers = domain->getServers();
  476. ASSERT_TRUE(servers);
  477. // Get the number of entries in the server list.
  478. int num_servers = servers->size();
  479. ASSERT_TRUE(num_servers > 0);
  480. // Verify that we can initialize server selection. This "resets" the
  481. // selection process to start over using the list of servers in the
  482. // given domain.
  483. ASSERT_NO_THROW(name_change->initServerSelection(domain));
  484. // The server selection process determines the current server,
  485. // instantiates a new DNSClient, and a DNS response message buffer.
  486. // We need to save the values before each selection, so we can verify
  487. // they are correct after each selection.
  488. DnsServerInfoPtr prev_server = name_change->getCurrentServer();
  489. DNSClientPtr prev_client = name_change->getDNSClient();
  490. D2UpdateMessagePtr prev_response = name_change->getDnsUpdateResponse();
  491. // Iteratively select through the list of servers.
  492. int passes = 0;
  493. while (name_change->selectNextServer()) {
  494. // Get the new values after the selection has been made.
  495. DnsServerInfoPtr server = name_change->getCurrentServer();
  496. DNSClientPtr client = name_change->getDNSClient();
  497. D2UpdateMessagePtr response = name_change->getDnsUpdateResponse();
  498. // Verify that the new values are not empty.
  499. EXPECT_TRUE(server);
  500. EXPECT_TRUE(client);
  501. EXPECT_TRUE(response);
  502. // Verify that the new values are indeed new.
  503. EXPECT_NE(server, prev_server);
  504. EXPECT_NE(client, prev_client);
  505. EXPECT_NE(response, prev_response);
  506. // Remember the selected values for the next pass.
  507. prev_server = server;
  508. prev_client = client;
  509. prev_response = response;
  510. ++passes;
  511. }
  512. // Verify that the number of passes made equal the number of servers.
  513. EXPECT_EQ (passes, num_servers);
  514. // Repeat the same test using the reverse domain.
  515. // Verify that the reverse domain and its list of servers can be retrieved.
  516. domain = name_change->getReverseDomain();
  517. ASSERT_TRUE(domain);
  518. servers = domain->getServers();
  519. ASSERT_TRUE(servers);
  520. // Get the number of entries in the server list.
  521. num_servers = servers->size();
  522. ASSERT_TRUE(num_servers > 0);
  523. // Verify that we can initialize server selection. This "resets" the
  524. // selection process to start over using the list of servers in the
  525. // given domain.
  526. ASSERT_NO_THROW(name_change->initServerSelection(domain));
  527. // The server selection process determines the current server,
  528. // instantiates a new DNSClient, and a DNS response message buffer.
  529. // We need to save the values before each selection, so we can verify
  530. // they are correct after each selection.
  531. prev_server = name_change->getCurrentServer();
  532. prev_client = name_change->getDNSClient();
  533. prev_response = name_change->getDnsUpdateResponse();
  534. // Iteratively select through the list of servers.
  535. passes = 0;
  536. while (name_change->selectNextServer()) {
  537. // Get the new values after the selection has been made.
  538. DnsServerInfoPtr server = name_change->getCurrentServer();
  539. DNSClientPtr client = name_change->getDNSClient();
  540. D2UpdateMessagePtr response = name_change->getDnsUpdateResponse();
  541. // Verify that the new values are not empty.
  542. EXPECT_TRUE(server);
  543. EXPECT_TRUE(client);
  544. EXPECT_TRUE(response);
  545. // Verify that the new values are indeed new.
  546. EXPECT_NE(server, prev_server);
  547. EXPECT_NE(client, prev_client);
  548. EXPECT_NE(response, prev_response);
  549. // Remember the selected values for the next pass.
  550. prev_server = server;
  551. prev_client = client;
  552. prev_response = response;
  553. ++passes;
  554. }
  555. // Verify that the number of passes made equal the number of servers.
  556. EXPECT_EQ (passes, num_servers);
  557. }
  558. /// @brief Tests that the transaction will be "failed" upon model errors.
  559. TEST_F(NameChangeTransactionTest, modelFailure) {
  560. NameChangeStubPtr name_change;
  561. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  562. // Now call runModel() with an undefined event which should not throw,
  563. // but should result in a failed model and failed transaction.
  564. EXPECT_NO_THROW(name_change->runModel(9999));
  565. // Verify that the model reports are done but failed.
  566. EXPECT_TRUE(name_change->isModelDone());
  567. EXPECT_TRUE(name_change->didModelFail());
  568. // Verify that the transaction has failed.
  569. EXPECT_EQ(dhcp_ddns::ST_FAILED, name_change->getNcrStatus());
  570. }
  571. /// @brief Tests the ability to use startTransaction to initiate the state
  572. /// model execution, and DNSClient callback, operator(), to resume the
  573. /// model with a update successful outcome.
  574. TEST_F(NameChangeTransactionTest, successfulUpdateTest) {
  575. NameChangeStubPtr name_change;
  576. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  577. ASSERT_TRUE(name_change->selectFwdServer());
  578. EXPECT_TRUE(name_change->isModelNew());
  579. EXPECT_FALSE(name_change->getForwardChangeCompleted());
  580. // Launch the transaction by calling startTransaction. The state model
  581. // should run up until the "IO" operation is initiated in DOING_UPDATE_ST.
  582. ASSERT_NO_THROW(name_change->startTransaction());
  583. // Verify that the model is running but waiting, and that forward change
  584. // completion is still false.
  585. EXPECT_TRUE(name_change->isModelRunning());
  586. EXPECT_TRUE(name_change->isModelWaiting());
  587. EXPECT_FALSE(name_change->getForwardChangeCompleted());
  588. // Simulate completion of DNSClient exchange by invoking the callback, as
  589. // DNSClient would. This should cause the state model to progress through
  590. // completion.
  591. EXPECT_NO_THROW((*name_change)(DNSClient::SUCCESS));
  592. // The model should have worked through to completion.
  593. // Verify that the model is done and not failed.
  594. EXPECT_TRUE(name_change->isModelDone());
  595. EXPECT_FALSE(name_change->didModelFail());
  596. // Verify that NCR status is completed, and that the forward change
  597. // was completed.
  598. EXPECT_EQ(dhcp_ddns::ST_COMPLETED, name_change->getNcrStatus());
  599. EXPECT_TRUE(name_change->getForwardChangeCompleted());
  600. }
  601. /// @brief Tests the ability to use startTransaction to initate the state
  602. /// model execution, and DNSClient callback, operator(), to resume the
  603. /// model with a update failure outcome.
  604. TEST_F(NameChangeTransactionTest, failedUpdateTest) {
  605. NameChangeStubPtr name_change;
  606. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  607. ASSERT_TRUE(name_change->selectFwdServer());
  608. // Launch the transaction by calling startTransaction. The state model
  609. // should run up until the "IO" operation is initiated in DOING_UPDATE_ST.
  610. ASSERT_NO_THROW(name_change->startTransaction());
  611. // Vefity that the model is running but waiting, and that the forward
  612. // change has not been completed.
  613. EXPECT_TRUE(name_change->isModelRunning());
  614. EXPECT_TRUE(name_change->isModelWaiting());
  615. EXPECT_FALSE(name_change->getForwardChangeCompleted());
  616. // Simulate completion of DNSClient exchange by invoking the callback, as
  617. // DNSClient would. This should cause the state model to progress through
  618. // to completion.
  619. EXPECT_NO_THROW((*name_change)(DNSClient::TIMEOUT));
  620. // The model should have worked through to completion.
  621. // Verify that the model is done and not failed.
  622. EXPECT_TRUE(name_change->isModelDone());
  623. EXPECT_FALSE(name_change->didModelFail());
  624. // Verify that the NCR status is failed and that the forward change
  625. // was not completed.
  626. EXPECT_EQ(dhcp_ddns::ST_FAILED, name_change->getNcrStatus());
  627. EXPECT_FALSE(name_change->getForwardChangeCompleted());
  628. }
  629. /// @brief Tests update attempt accessors.
  630. TEST_F(NameChangeTransactionTest, updateAttempts) {
  631. NameChangeStubPtr name_change;
  632. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  633. // Post transaction construction, update attempts should be 0.
  634. EXPECT_EQ(0, name_change->getUpdateAttempts());
  635. // Set it to a known value.
  636. name_change->setUpdateAttempts(5);
  637. // Verify that the value is as expected.
  638. EXPECT_EQ(5, name_change->getUpdateAttempts());
  639. }
  640. /// @brief Tests retryTransition method
  641. ///
  642. /// Verifies that while the maximum number of update attempts has not
  643. /// been exceeded, the method will leave the state unchanged but post a
  644. /// SERVER_SELECTED_EVT. Once the maximum is exceeded, the method should
  645. /// transition to the state given with a next event of SERVER_IO_ERROR_EVT.
  646. TEST_F(NameChangeTransactionTest, retryTransition) {
  647. // Create the transaction.
  648. NameChangeStubPtr name_change;
  649. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  650. // Define dictionaries.
  651. ASSERT_NO_THROW(name_change->initDictionaries());
  652. // Transition to a known spot.
  653. ASSERT_NO_THROW(name_change->transition(
  654. NameChangeStub::DOING_UPDATE_ST,
  655. NameChangeStub::SEND_UPDATE_EVT));
  656. // Verify we are at the known spot.
  657. ASSERT_EQ(NameChangeStub::DOING_UPDATE_ST,
  658. name_change->getCurrState());
  659. ASSERT_EQ(NameChangeStub::SEND_UPDATE_EVT,
  660. name_change->getNextEvent());
  661. // Verify that we have not exceeded maximum number of attempts.
  662. ASSERT_LT(name_change->getUpdateAttempts(),
  663. NameChangeTransaction::MAX_UPDATE_TRIES_PER_SERVER);
  664. // Call retryTransition.
  665. ASSERT_NO_THROW(name_change->retryTransition(
  666. NameChangeTransaction::PROCESS_TRANS_FAILED_ST));
  667. // Since the number of update attempts is less than the maximum allowed
  668. // we should remain in our current state but with next event of
  669. // SERVER_SELECTED_EVT posted.
  670. ASSERT_EQ(NameChangeStub::DOING_UPDATE_ST,
  671. name_change->getCurrState());
  672. ASSERT_EQ(NameChangeTransaction::SERVER_SELECTED_EVT,
  673. name_change->getNextEvent());
  674. // Now set the number of attempts to the maximum.
  675. name_change->setUpdateAttempts(NameChangeTransaction::
  676. MAX_UPDATE_TRIES_PER_SERVER);
  677. // Call retryTransition.
  678. ASSERT_NO_THROW(name_change->retryTransition(
  679. NameChangeTransaction::PROCESS_TRANS_FAILED_ST));
  680. // Since we have exceeded maximum attempts, we should transition to
  681. // PROCESS_UPDATE_FAILED_ST with a next event of SERVER_IO_ERROR_EVT.
  682. ASSERT_EQ(NameChangeTransaction::PROCESS_TRANS_FAILED_ST,
  683. name_change->getCurrState());
  684. ASSERT_EQ(NameChangeTransaction::SERVER_IO_ERROR_EVT,
  685. name_change->getNextEvent());
  686. }
  687. /// @brief Tests sendUpdate method when underlying doUpdate throws.
  688. ///
  689. /// DNSClient::doUpdate can throw for a variety of reasons. This tests
  690. /// sendUpdate handling of such a throw by passing doUpdate a request
  691. /// that will not render.
  692. TEST_F(NameChangeTransactionTest, sendUpdateDoUpdateFailure) {
  693. NameChangeStubPtr name_change;
  694. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  695. ASSERT_NO_THROW(name_change->initDictionaries());
  696. ASSERT_TRUE(name_change->selectFwdServer());
  697. // Set the transaction's request to an empty DNS update.
  698. D2UpdateMessagePtr req;
  699. ASSERT_NO_THROW(req.reset(new D2UpdateMessage(D2UpdateMessage::OUTBOUND)));
  700. ASSERT_NO_THROW(name_change->setDnsUpdateRequest(req));
  701. // Verify that sendUpdate does not throw, but it should fail because
  702. // the request won't render.
  703. ASSERT_NO_THROW(name_change->sendUpdate());
  704. // Verify that we transition to failed state and event.
  705. ASSERT_EQ(NameChangeTransaction::PROCESS_TRANS_FAILED_ST,
  706. name_change->getCurrState());
  707. ASSERT_EQ(NameChangeTransaction::UPDATE_FAILED_EVT,
  708. name_change->getNextEvent());
  709. }
  710. /// @brief Tests sendUpdate method when underlying doUpdate times out.
  711. TEST_F(NameChangeTransactionTest, sendUpdateTimeout) {
  712. NameChangeStubPtr name_change;
  713. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  714. ASSERT_NO_THROW(name_change->initDictionaries());
  715. ASSERT_TRUE(name_change->selectFwdServer());
  716. // Create a valid request.
  717. D2UpdateMessagePtr req;
  718. ASSERT_NO_THROW(req.reset(new D2UpdateMessage(D2UpdateMessage::OUTBOUND)));
  719. ASSERT_NO_THROW(name_change->setDnsUpdateRequest(req));
  720. req->setZone(dns::Name("request.example.com"), dns::RRClass::ANY());
  721. req->setRcode(dns::Rcode(dns::Rcode::NOERROR_CODE));
  722. // Set the flag to use the NameChangeStub's DNSClient callback.
  723. name_change->use_stub_callback_ = true;
  724. // Invoke sendUpdate.
  725. ASSERT_NO_THROW(name_change->sendUpdate());
  726. // Update attempt count should be 1, next event should be NOP_EVT.
  727. EXPECT_EQ(1, name_change->getUpdateAttempts());
  728. ASSERT_EQ(NameChangeTransaction::NOP_EVT,
  729. name_change->getNextEvent());
  730. // Run IO a bit longer than maximum allowed to permit timeout logic to
  731. // execute.
  732. runTimedIO(NameChangeTransaction::DNS_UPDATE_DEFAULT_TIMEOUT + 100);
  733. // Verify that next event is IO_COMPLETED_EVT and DNS status is TIMEOUT.
  734. ASSERT_EQ(NameChangeTransaction::IO_COMPLETED_EVT,
  735. name_change->getNextEvent());
  736. ASSERT_EQ(DNSClient::TIMEOUT, name_change->getDnsUpdateStatus());
  737. }
  738. /// @brief Tests sendUpdate method when it receives a corrupt response from
  739. /// the server.
  740. TEST_F(NameChangeTransactionTest, sendUpdateCorruptResponse) {
  741. NameChangeStubPtr name_change;
  742. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  743. ASSERT_NO_THROW(name_change->initDictionaries());
  744. ASSERT_TRUE(name_change->selectFwdServer());
  745. // Create a server and start it listening.
  746. FauxServer server(*io_service_, *(name_change->getCurrentServer()));
  747. server.receive(FauxServer::CORRUPT_RESP);
  748. // Create a valid request for the transaction.
  749. D2UpdateMessagePtr req;
  750. ASSERT_NO_THROW(req.reset(new D2UpdateMessage(D2UpdateMessage::OUTBOUND)));
  751. ASSERT_NO_THROW(name_change->setDnsUpdateRequest(req));
  752. req->setZone(dns::Name("request.example.com"), dns::RRClass::ANY());
  753. req->setRcode(dns::Rcode(dns::Rcode::NOERROR_CODE));
  754. // Set the flag to use the NameChangeStub's DNSClient callback.
  755. name_change->use_stub_callback_ = true;
  756. // Invoke sendUpdate.
  757. ASSERT_NO_THROW(name_change->sendUpdate());
  758. // Update attempt count should be 1, next event should be NOP_EVT.
  759. EXPECT_EQ(1, name_change->getUpdateAttempts());
  760. ASSERT_EQ(NameChangeTransaction::NOP_EVT,
  761. name_change->getNextEvent());
  762. // Run the IO for 500 ms. This should be more than enough time.
  763. runTimedIO(500);
  764. // Verify that next event is IO_COMPLETED_EVT and DNS status is INVALID.
  765. ASSERT_EQ(NameChangeTransaction::IO_COMPLETED_EVT,
  766. name_change->getNextEvent());
  767. ASSERT_EQ(DNSClient::INVALID_RESPONSE, name_change->getDnsUpdateStatus());
  768. }
  769. /// @brief Tests sendUpdate method when the exchange succeeds.
  770. TEST_F(NameChangeTransactionTest, sendUpdate) {
  771. NameChangeStubPtr name_change;
  772. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  773. ASSERT_NO_THROW(name_change->initDictionaries());
  774. ASSERT_TRUE(name_change->selectFwdServer());
  775. // Create a server and start it listening.
  776. FauxServer server(*io_service_, *(name_change->getCurrentServer()));
  777. server.receive (FauxServer::USE_RCODE, dns::Rcode::NOERROR());
  778. // Create a valid request for the transaction.
  779. D2UpdateMessagePtr req;
  780. ASSERT_NO_THROW(req.reset(new D2UpdateMessage(D2UpdateMessage::OUTBOUND)));
  781. ASSERT_NO_THROW(name_change->setDnsUpdateRequest(req));
  782. req->setZone(dns::Name("request.example.com"), dns::RRClass::ANY());
  783. req->setRcode(dns::Rcode(dns::Rcode::NOERROR_CODE));
  784. // Set the flag to use the NameChangeStub's DNSClient callback.
  785. name_change->use_stub_callback_ = true;
  786. // Invoke sendUpdate.
  787. ASSERT_NO_THROW(name_change->sendUpdate());
  788. // Update attempt count should be 1, next event should be NOP_EVT.
  789. EXPECT_EQ(1, name_change->getUpdateAttempts());
  790. ASSERT_EQ(NameChangeTransaction::NOP_EVT,
  791. name_change->getNextEvent());
  792. // Run the IO for 500 ms. This should be more than enough time.
  793. runTimedIO(500);
  794. // Verify that next event is IO_COMPLETED_EVT and DNS status is SUCCESS.
  795. ASSERT_EQ(NameChangeTransaction::IO_COMPLETED_EVT,
  796. name_change->getNextEvent());
  797. ASSERT_EQ(DNSClient::SUCCESS, name_change->getDnsUpdateStatus());
  798. // Verify that we have a response and it's Rcode is NOERROR,
  799. // and the zone is as expected.
  800. D2UpdateMessagePtr response = name_change->getDnsUpdateResponse();
  801. ASSERT_TRUE(response);
  802. ASSERT_EQ(dns::Rcode::NOERROR().getCode(), response->getRcode().getCode());
  803. D2ZonePtr zone = response->getZone();
  804. EXPECT_TRUE(zone);
  805. EXPECT_EQ("response.example.com.", zone->getName().toText());
  806. }
  807. /// @brief Tests the prepNewRequest method
  808. TEST_F(NameChangeTransactionTest, prepNewRequest) {
  809. NameChangeStubPtr name_change;
  810. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  811. D2UpdateMessagePtr request;
  812. // prepNewRequest should fail on empty domain.
  813. ASSERT_THROW(request = name_change->prepNewRequest(DdnsDomainPtr()),
  814. NameChangeTransactionError);
  815. // Verify that prepNewRequest fails on invalid zone name.
  816. // @todo This test becomes obsolete if/when DdnsDomain enforces valid
  817. // names as is done in dns::Name.
  818. DdnsDomainPtr bsDomain = makeDomain(".badname","");
  819. ASSERT_THROW(request = name_change->prepNewRequest(bsDomain),
  820. NameChangeTransactionError);
  821. // Verify that prepNewRequest properly constructs a message given
  822. // valid input.
  823. ASSERT_NO_THROW(request = name_change->prepNewRequest(forward_domain_));
  824. checkZone(request, forward_domain_->getName());
  825. }
  826. /// @brief Tests the addLeaseAddressRData method
  827. TEST_F(NameChangeTransactionTest, addLeaseAddressRData) {
  828. NameChangeStubPtr name_change;
  829. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  830. dhcp_ddns::NameChangeRequestPtr ncr = name_change->getNcr();
  831. // Verify we can add a lease RData to an valid RRset.
  832. dns::RRsetPtr rrset(new dns::RRset(dns::Name("bs"), dns::RRClass::IN(),
  833. name_change->getAddressRRType(),
  834. dns::RRTTL(0)));
  835. ASSERT_NO_THROW(name_change->addLeaseAddressRdata(rrset));
  836. // Verify the Rdata was added and the value is correct.
  837. ASSERT_EQ(1, rrset->getRdataCount());
  838. dns::RdataIteratorPtr rdata_it = rrset->getRdataIterator();
  839. ASSERT_TRUE(rdata_it);
  840. EXPECT_EQ(ncr->getIpAddress(), rdata_it->getCurrent().toText());
  841. }
  842. /// @brief Tests the addDhcidRData method
  843. TEST_F(NameChangeTransactionTest, addDhcidRdata) {
  844. NameChangeStubPtr name_change;
  845. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  846. dhcp_ddns::NameChangeRequestPtr ncr = name_change->getNcr();
  847. // Verify we can add a lease RData to an valid RRset.
  848. dns::RRsetPtr rrset(new dns::RRset(dns::Name("bs"), dns::RRClass::IN(),
  849. dns::RRType::DHCID(), dns::RRTTL(0)));
  850. ASSERT_NO_THROW(name_change->addDhcidRdata(rrset));
  851. // Verify the Rdata was added and the value is correct.
  852. ASSERT_EQ(1, rrset->getRdataCount());
  853. dns::RdataIteratorPtr rdata_it = rrset->getRdataIterator();
  854. ASSERT_TRUE(rdata_it);
  855. const std::vector<uint8_t>& ncr_dhcid = ncr->getDhcid().getBytes();
  856. util::InputBuffer buffer(ncr_dhcid.data(), ncr_dhcid.size());
  857. dns::rdata::in::DHCID rdata_ref(buffer, ncr_dhcid.size());
  858. EXPECT_EQ(0, rdata_ref.compare(rdata_it->getCurrent()));
  859. }
  860. /// @brief Tests the addPtrData method
  861. TEST_F(NameChangeTransactionTest, addPtrRdata) {
  862. NameChangeStubPtr name_change;
  863. ASSERT_NO_THROW(name_change = makeCannedTransaction());
  864. dhcp_ddns::NameChangeRequestPtr ncr = name_change->getNcr();
  865. // Verify we can add a PTR RData to an valid RRset.
  866. dns::RRsetPtr rrset (new dns::RRset(dns::Name("bs"), dns::RRClass::IN(),
  867. dns::RRType::PTR(), dns::RRTTL(0)));
  868. ASSERT_NO_THROW(name_change->addPtrRdata(rrset));
  869. // Verify the Rdata was added and the value is correct.
  870. ASSERT_EQ(1, rrset->getRdataCount());
  871. dns::RdataIteratorPtr rdata_it = rrset->getRdataIterator();
  872. ASSERT_TRUE(rdata_it);
  873. EXPECT_EQ(ncr->getFqdn(), rdata_it->getCurrent().toText());
  874. }
  875. }; // anonymous namespace