auth_srv_unittest.cc 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290
  1. // Copyright (C) 2010 Internet Systems Consortium, Inc. ("ISC")
  2. //
  3. // Permission to use, copy, modify, and/or distribute this software for any
  4. // purpose with or without fee is hereby granted, provided that the above
  5. // copyright notice and this permission notice appear in all copies.
  6. //
  7. // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
  8. // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
  9. // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
  10. // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
  11. // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
  12. // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  13. // PERFORMANCE OF THIS SOFTWARE.
  14. // $Id$
  15. #include <gtest/gtest.h>
  16. #include <dns/buffer.h>
  17. #include <dns/name.h>
  18. #include <dns/message.h>
  19. #include <dns/messagerenderer.h>
  20. #include <dns/rrclass.h>
  21. #include <dns/rrtype.h>
  22. #include <cc/data.h>
  23. #include <auth/auth_srv.h>
  24. #include <dns/tests/unittest_util.h>
  25. using isc::UnitTestUtil;
  26. using namespace std;
  27. using namespace isc::dns;
  28. using namespace isc::data;
  29. namespace {
  30. const char* CONFIG_TESTDB =
  31. "{\"database_file\": \"" TEST_DATA_DIR "/example.sqlite3\"}";
  32. // The following file must be non existent and must be non"creatable" (see
  33. // the sqlite3 test).
  34. const char* BADCONFIG_TESTDB =
  35. "{ \"database_file\": \"" TEST_DATA_DIR "/nodir/notexist\"}";
  36. class AuthSrvTest : public ::testing::Test {
  37. protected:
  38. AuthSrvTest() : request_message(Message::RENDER),
  39. parse_message(Message::PARSE), default_qid(0x1035),
  40. opcode(Opcode(Opcode::QUERY())), qname("www.example.com"),
  41. qclass(RRClass::IN()), qtype(RRType::A()), ibuffer(NULL),
  42. request_obuffer(0), request_renderer(request_obuffer),
  43. response_obuffer(0), response_renderer(response_obuffer)
  44. {}
  45. AuthSrv server;
  46. Message request_message;
  47. Message parse_message;
  48. const qid_t default_qid;
  49. const Opcode opcode;
  50. const Name qname;
  51. const RRClass qclass;
  52. const RRType qtype;
  53. InputBuffer* ibuffer;
  54. OutputBuffer request_obuffer;
  55. MessageRenderer request_renderer;
  56. OutputBuffer response_obuffer;
  57. MessageRenderer response_renderer;
  58. vector<uint8_t> data;
  59. void createDataFromFile(const char* const datafile);
  60. };
  61. // These are flags to indicate whether the corresponding flag bit of the
  62. // DNS header is to be set in the test cases. (Note that the flag values
  63. // is irrelevant to their wire-format values)
  64. const unsigned int QR_FLAG = 0x1;
  65. const unsigned int AA_FLAG = 0x2;
  66. const unsigned int TC_FLAG = 0x4;
  67. const unsigned int RD_FLAG = 0x8;
  68. const unsigned int RA_FLAG = 0x10;
  69. const unsigned int AD_FLAG = 0x20;
  70. const unsigned int CD_FLAG = 0x40;
  71. void
  72. AuthSrvTest::createDataFromFile(const char* const datafile) {
  73. delete ibuffer;
  74. data.clear();
  75. UnitTestUtil::readWireData(datafile, data);
  76. ibuffer = new InputBuffer(&data[0], data.size());
  77. }
  78. void
  79. headerCheck(const Message& message, const qid_t qid, const Rcode& rcode,
  80. const uint16_t opcodeval, const unsigned int flags,
  81. const unsigned int qdcount,
  82. const unsigned int ancount, const unsigned int nscount,
  83. const unsigned int arcount)
  84. {
  85. EXPECT_EQ(qid, message.getQid());
  86. EXPECT_EQ(rcode, message.getRcode());
  87. EXPECT_EQ(opcodeval, message.getOpcode().getCode());
  88. EXPECT_EQ((flags & QR_FLAG) != 0, message.getHeaderFlag(MessageFlag::QR()));
  89. EXPECT_EQ((flags & AA_FLAG) != 0, message.getHeaderFlag(MessageFlag::AA()));
  90. EXPECT_EQ((flags & TC_FLAG) != 0, message.getHeaderFlag(MessageFlag::TC()));
  91. EXPECT_EQ((flags & RA_FLAG) != 0, message.getHeaderFlag(MessageFlag::RA()));
  92. EXPECT_EQ((flags & RD_FLAG) != 0, message.getHeaderFlag(MessageFlag::RD()));
  93. EXPECT_EQ((flags & AD_FLAG) != 0, message.getHeaderFlag(MessageFlag::AD()));
  94. EXPECT_EQ((flags & CD_FLAG) != 0, message.getHeaderFlag(MessageFlag::CD()));
  95. EXPECT_EQ(qdcount, message.getRRCount(Section::QUESTION()));
  96. EXPECT_EQ(ancount, message.getRRCount(Section::ANSWER()));
  97. EXPECT_EQ(nscount, message.getRRCount(Section::AUTHORITY()));
  98. EXPECT_EQ(arcount, message.getRRCount(Section::ADDITIONAL()));
  99. }
  100. // Unsupported requests. Should result in NOTIMP.
  101. TEST_F(AuthSrvTest, unsupportedRequest) {
  102. for (unsigned int i = 1; i < 16; ++i) {
  103. // set Opcode to 'i', which iterators over all possible codes except
  104. // the standard query (0)
  105. createDataFromFile("simplequery_fromWire");
  106. data[2] = ((i << 3) & 0xff);
  107. parse_message.clear(Message::PARSE);
  108. EXPECT_EQ(true, server.processMessage(*ibuffer, parse_message,
  109. response_renderer, true));
  110. headerCheck(parse_message, default_qid, Rcode::NOTIMP(), i, QR_FLAG,
  111. 0, 0, 0, 0);
  112. }
  113. }
  114. // Simple API check
  115. TEST_F(AuthSrvTest, verbose) {
  116. EXPECT_FALSE(server.getVerbose());
  117. server.setVerbose(true);
  118. EXPECT_TRUE(server.getVerbose());
  119. server.setVerbose(false);
  120. EXPECT_FALSE(server.getVerbose());
  121. }
  122. // Multiple questions. Should result in FORMERR.
  123. TEST_F(AuthSrvTest, multiQuestion) {
  124. createDataFromFile("multiquestion_fromWire");
  125. EXPECT_EQ(true, server.processMessage(*ibuffer, parse_message,
  126. response_renderer, true));
  127. headerCheck(parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
  128. QR_FLAG, 2, 0, 0, 0);
  129. QuestionIterator qit = parse_message.beginQuestion();
  130. EXPECT_EQ(Name("example.com"), (*qit)->getName());
  131. EXPECT_EQ(RRClass::IN(), (*qit)->getClass());
  132. EXPECT_EQ(RRType::A(), (*qit)->getType());
  133. ++qit;
  134. EXPECT_EQ(Name("example.com"), (*qit)->getName());
  135. EXPECT_EQ(RRClass::IN(), (*qit)->getClass());
  136. EXPECT_EQ(RRType::AAAA(), (*qit)->getType());
  137. ++qit;
  138. EXPECT_TRUE(qit == parse_message.endQuestion());
  139. }
  140. // Incoming data doesn't even contain the complete header. Must be silently
  141. // dropped.
  142. TEST_F(AuthSrvTest, shortMessage) {
  143. createDataFromFile("shortmessage_fromWire");
  144. EXPECT_EQ(false, server.processMessage(*ibuffer, parse_message,
  145. response_renderer, true));
  146. }
  147. // Response messages. Must be silently dropped, whether it's a valid response
  148. // or malformed or could otherwise cause a protocol error.
  149. TEST_F(AuthSrvTest, response) {
  150. // A valid (although unusual) response
  151. createDataFromFile("simpleresponse_fromWire");
  152. EXPECT_EQ(false, server.processMessage(*ibuffer, parse_message,
  153. response_renderer, true));
  154. // A response with a broken question section. must be dropped rather than
  155. // returning FORMERR.
  156. createDataFromFile("shortresponse_fromWire");
  157. EXPECT_EQ(false, server.processMessage(*ibuffer, parse_message,
  158. response_renderer, true));
  159. // A response to iquery. must be dropped rather than returning NOTIMP.
  160. createDataFromFile("iqueryresponse_fromWire");
  161. EXPECT_EQ(false, server.processMessage(*ibuffer, parse_message,
  162. response_renderer, true));
  163. }
  164. // Query with a broken question
  165. TEST_F(AuthSrvTest, shortQuestion) {
  166. createDataFromFile("shortquestion_fromWire");
  167. EXPECT_EQ(true, server.processMessage(*ibuffer, parse_message,
  168. response_renderer, true));
  169. // Since the query's question is broken, the question section of the
  170. // response should be empty.
  171. headerCheck(parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
  172. QR_FLAG, 0, 0, 0, 0);
  173. }
  174. // Query with a broken answer section
  175. TEST_F(AuthSrvTest, shortAnswer) {
  176. createDataFromFile("shortanswer_fromWire");
  177. EXPECT_EQ(true, server.processMessage(*ibuffer, parse_message,
  178. response_renderer, true));
  179. // This is a bogus query, but question section is valid. So the response
  180. // should copy the question section.
  181. headerCheck(parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
  182. QR_FLAG, 1, 0, 0, 0);
  183. QuestionIterator qit = parse_message.beginQuestion();
  184. EXPECT_EQ(Name("example.com"), (*qit)->getName());
  185. EXPECT_EQ(RRClass::IN(), (*qit)->getClass());
  186. EXPECT_EQ(RRType::A(), (*qit)->getType());
  187. ++qit;
  188. EXPECT_TRUE(qit == parse_message.endQuestion());
  189. }
  190. // Query with unsupported version of EDNS.
  191. TEST_F(AuthSrvTest, ednsBadVers) {
  192. createDataFromFile("queryBadEDNS_fromWire");
  193. EXPECT_EQ(true, server.processMessage(*ibuffer, parse_message,
  194. response_renderer, true));
  195. // The response must have an EDNS OPT RR in the additional section.
  196. // Note that the DNSSEC DO bit is cleared even if this bit in the query
  197. // is set. This is a limitation of the current implementation.
  198. headerCheck(parse_message, default_qid, Rcode::BADVERS(), opcode.getCode(),
  199. QR_FLAG, 1, 0, 0, 1);
  200. EXPECT_EQ(4096, parse_message.getUDPSize());
  201. EXPECT_FALSE(parse_message.isDNSSECSupported());
  202. }
  203. void
  204. updateConfig(AuthSrv* server, const char* const dbfile,
  205. const bool expect_success)
  206. {
  207. const ElementPtr config_answer =
  208. server->updateConfig(Element::createFromString(dbfile));
  209. EXPECT_EQ(Element::map, config_answer->getType());
  210. EXPECT_TRUE(config_answer->contains("result"));
  211. const ElementPtr result = config_answer->get("result");
  212. EXPECT_EQ(Element::list, result->getType());
  213. EXPECT_EQ(expect_success ? 0 : 1, result->get(0)->intValue());
  214. }
  215. // Install a Sqlite3 data source with testing data.
  216. TEST_F(AuthSrvTest, updateConfig) {
  217. updateConfig(&server, CONFIG_TESTDB, true);
  218. // query for existent data in the installed data source. The resulting
  219. // response should have the AA flag on, and have an RR in each answer
  220. // and authority section.
  221. createDataFromFile("examplequery_fromWire");
  222. EXPECT_EQ(true, server.processMessage(*ibuffer, parse_message,
  223. response_renderer, true));
  224. headerCheck(parse_message, default_qid, Rcode::NOERROR(), opcode.getCode(),
  225. QR_FLAG | AA_FLAG, 1, 1, 1, 0);
  226. }
  227. TEST_F(AuthSrvTest, datasourceFail) {
  228. updateConfig(&server, CONFIG_TESTDB, true);
  229. // This query will hit a corrupted entry of the data source (the zoneload
  230. // tool and the data source itself naively accept it). This will result
  231. // in a SERVFAIL response, and the answer and authority sections should
  232. // be empty.
  233. createDataFromFile("badExampleQuery_fromWire");
  234. EXPECT_EQ(true, server.processMessage(*ibuffer, parse_message,
  235. response_renderer, true));
  236. headerCheck(parse_message, default_qid, Rcode::SERVFAIL(), opcode.getCode(),
  237. QR_FLAG, 1, 0, 0, 0);
  238. }
  239. TEST_F(AuthSrvTest, updateConfigFail) {
  240. // First, load a valid data source.
  241. updateConfig(&server, CONFIG_TESTDB, true);
  242. // Next, try to update it with a non-existent one. This should fail.
  243. updateConfig(&server, BADCONFIG_TESTDB, false);
  244. // The original data source should still exist.
  245. createDataFromFile("examplequery_fromWire");
  246. EXPECT_EQ(true, server.processMessage(*ibuffer, parse_message,
  247. response_renderer, true));
  248. headerCheck(parse_message, default_qid, Rcode::NOERROR(), opcode.getCode(),
  249. QR_FLAG | AA_FLAG, 1, 1, 1, 0);
  250. }
  251. }