xfrout_test.py.in 54 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239
  1. # Copyright (C) 2010 Internet Systems Consortium.
  2. #
  3. # Permission to use, copy, modify, and distribute this software for any
  4. # purpose with or without fee is hereby granted, provided that the above
  5. # copyright notice and this permission notice appear in all copies.
  6. #
  7. # THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SYSTEMS CONSORTIUM
  8. # DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL
  9. # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL
  10. # INTERNET SYSTEMS CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT,
  11. # INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
  12. # FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
  13. # NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
  14. # WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  15. '''Tests for the XfroutSession and UnixSockServer classes '''
  16. import unittest
  17. import os
  18. from isc.testutils.tsigctx_mock import MockTSIGContext
  19. from isc.cc.session import *
  20. import isc.config
  21. from isc.dns import *
  22. from isc.testutils.rrset_utils import *
  23. from xfrout import *
  24. import xfrout
  25. import isc.log
  26. import isc.acl.dns
  27. TESTDATA_SRCDIR = os.getenv("TESTDATASRCDIR")
  28. TSIG_KEY = TSIGKey("example.com:SFuWd/q99SzF8Yzd1QbB9g==")
  29. #
  30. # Commonly used (mostly constant) test parameters
  31. #
  32. TEST_ZONE_NAME_STR = "example.com."
  33. TEST_ZONE_NAME = Name(TEST_ZONE_NAME_STR)
  34. TEST_RRCLASS = RRClass.IN()
  35. IXFR_OK_VERSION = 2011111802
  36. IXFR_NG_VERSION = 2011112800
  37. SOA_CURRENT_VERSION = 2011112001
  38. # our fake socket, where we can read and insert messages
  39. class MySocket():
  40. def __init__(self, family, type):
  41. self.family = family
  42. self.type = type
  43. self.sendqueue = bytearray()
  44. def connect(self, to):
  45. pass
  46. def close(self):
  47. pass
  48. def send(self, data):
  49. self.sendqueue.extend(data);
  50. return len(data)
  51. def readsent(self):
  52. if len(self.sendqueue) >= 2:
  53. size = 2 + struct.unpack("!H", self.sendqueue[:2])[0]
  54. else:
  55. size = 0
  56. result = self.sendqueue[:size]
  57. self.sendqueue = self.sendqueue[size:]
  58. return result
  59. def read_msg(self, parse_options=Message.PARSE_DEFAULT):
  60. sent_data = self.readsent()
  61. get_msg = Message(Message.PARSE)
  62. get_msg.from_wire(bytes(sent_data[2:]), parse_options)
  63. return get_msg
  64. def clear_send(self):
  65. del self.sendqueue[:]
  66. class MockDataSrcClient:
  67. def __init__(self, type, config):
  68. pass
  69. def find_zone(self, zone_name):
  70. '''Mock version of find_zone().
  71. It returns itself (subsequently acting as a mock ZoneFinder) for
  72. some test zone names. For a special name it returns NOTFOUND to
  73. emulate the condition where the specified zone doen't exist.
  74. '''
  75. self._zone_name = zone_name
  76. if zone_name == Name('notauth.example.com'):
  77. return (isc.datasrc.DataSourceClient.NOTFOUND, None)
  78. return (isc.datasrc.DataSourceClient.SUCCESS, self)
  79. def find(self, name, rrtype, target, options):
  80. '''Mock ZoneFinder.find().
  81. (At the moment) this method only handles query for type SOA.
  82. By default it returns a normal SOA RR(set) whose owner name is
  83. the query name It also emulates some unusual cases for special
  84. zone names.
  85. '''
  86. if name == Name('nosoa.example.com') and rrtype == RRType.SOA():
  87. return (ZoneFinder.NXDOMAIN, None)
  88. elif name == Name('multisoa.example.com') and rrtype == RRType.SOA():
  89. soa_rrset = create_soa(SOA_CURRENT_VERSION)
  90. soa_rrset.add_rdata(soa_rrset.get_rdata()[0])
  91. return (ZoneFinder.SUCCESS, soa_rrset)
  92. elif rrtype == RRType.SOA():
  93. return (ZoneFinder.SUCCESS, create_soa(SOA_CURRENT_VERSION))
  94. raise ValueError('Unexpected input to mock finder: bug in test case?')
  95. def get_iterator(self, zone_name, adjust_ttl=False):
  96. if zone_name == Name('notauth.example.com'):
  97. raise isc.datasrc.Error('no such zone')
  98. self._zone_name = zone_name
  99. return self
  100. def get_soa(self): # emulate ZoneIterator.get_soa()
  101. if self._zone_name == Name('nosoa.example.com'):
  102. return None
  103. soa_rrset = create_soa(SOA_CURRENT_VERSION)
  104. if self._zone_name == Name('multisoa.example.com'):
  105. soa_rrset.add_rdata(soa_rrset.get_rdata()[0])
  106. return soa_rrset
  107. def get_journal_reader(self, zone_name, begin_serial, end_serial):
  108. if zone_name == Name('notauth2.example.com'):
  109. return isc.datasrc.ZoneJournalReader.NO_SUCH_ZONE, None
  110. if zone_name == Name('nojournal.example.com'):
  111. raise isc.datasrc.NotImplemented('journaling not supported')
  112. if begin_serial == IXFR_NG_VERSION:
  113. return isc.datasrc.ZoneJournalReader.NO_SUCH_VERSION, None
  114. return isc.datasrc.ZoneJournalReader.SUCCESS, self
  115. class MyCCSession(isc.config.ConfigData):
  116. def __init__(self):
  117. module_spec = isc.config.module_spec_from_file(
  118. xfrout.SPECFILE_LOCATION)
  119. ConfigData.__init__(self, module_spec)
  120. def get_remote_config_value(self, module_name, identifier):
  121. if module_name == "Auth" and identifier == "database_file":
  122. return "initdb.file", False
  123. else:
  124. return "unknown", False
  125. # This constant dictionary stores all default configuration parameters
  126. # defined in the xfrout spec file.
  127. DEFAULT_CONFIG = MyCCSession().get_full_config()
  128. # We subclass the Session class we're testing here, only overriding a few
  129. # methods
  130. class MyXfroutSession(XfroutSession):
  131. def _handle(self):
  132. pass
  133. def _close_socket(self):
  134. pass
  135. def _send_data(self, sock, data):
  136. size = len(data)
  137. total_count = 0
  138. while total_count < size:
  139. count = sock.send(data[total_count:])
  140. total_count += count
  141. class Dbserver:
  142. def __init__(self):
  143. self._shutdown_event = threading.Event()
  144. self.transfer_counter = 0
  145. self._max_transfers_out = DEFAULT_CONFIG['transfers_out']
  146. def get_db_file(self):
  147. return 'test.sqlite3'
  148. def increase_transfers_counter(self):
  149. self.transfer_counter += 1
  150. return True
  151. def decrease_transfers_counter(self):
  152. self.transfer_counter -= 1
  153. class TestXfroutSessionBase(unittest.TestCase):
  154. '''Base classs for tests related to xfrout sessions
  155. This class defines common setup/teadown and utility methods. Actual
  156. tests are delegated to subclasses.
  157. '''
  158. def getmsg(self):
  159. msg = Message(Message.PARSE)
  160. msg.from_wire(self.mdata)
  161. return msg
  162. def create_mock_tsig_ctx(self, error):
  163. # This helper function creates a MockTSIGContext for a given key
  164. # and TSIG error to be used as a result of verify (normally faked
  165. # one)
  166. mock_ctx = MockTSIGContext(TSIG_KEY)
  167. mock_ctx.error = error
  168. return mock_ctx
  169. def message_has_tsig(self, msg):
  170. return msg.get_tsig_record() is not None
  171. def create_request_data(self, with_question=True, with_tsig=False,
  172. ixfr=None, qtype=None, zone_name=TEST_ZONE_NAME,
  173. soa_class=TEST_RRCLASS, num_soa=1):
  174. '''Create a commonly used XFR request data.
  175. By default the request type is AXFR; if 'ixfr' is an integer,
  176. the request type will be IXFR and an SOA with the serial being
  177. the value of the parameter will be included in the authority
  178. section.
  179. This method has various minor parameters only for creating bad
  180. format requests for testing purposes:
  181. qtype: the RR type of the question section. By default automatically
  182. determined by the value of ixfr, but could be an invalid type
  183. for testing.
  184. zone_name: the query (zone) name. for IXFR, it's also used as
  185. the owner name of the SOA in the authority section.
  186. soa_class: IXFR only. The RR class of the SOA RR in the authority
  187. section.
  188. num_soa: IXFR only. The number of SOA RDATAs in the authority
  189. section.
  190. '''
  191. msg = Message(Message.RENDER)
  192. query_id = 0x1035
  193. msg.set_qid(query_id)
  194. msg.set_opcode(Opcode.QUERY())
  195. msg.set_rcode(Rcode.NOERROR())
  196. req_type = RRType.AXFR() if ixfr is None else RRType.IXFR()
  197. if with_question:
  198. msg.add_question(Question(zone_name, RRClass.IN(),
  199. req_type if qtype is None else qtype))
  200. if req_type == RRType.IXFR():
  201. soa = RRset(zone_name, soa_class, RRType.SOA(), RRTTL(0))
  202. # In the RDATA only the serial matters.
  203. for i in range(0, num_soa):
  204. soa.add_rdata(Rdata(RRType.SOA(), soa_class,
  205. 'm r ' + str(ixfr) + ' 1 1 1 1'))
  206. msg.add_rrset(Message.SECTION_AUTHORITY, soa)
  207. renderer = MessageRenderer()
  208. if with_tsig:
  209. tsig_ctx = MockTSIGContext(TSIG_KEY)
  210. msg.to_wire(renderer, tsig_ctx)
  211. else:
  212. msg.to_wire(renderer)
  213. request_data = renderer.get_data()
  214. return request_data
  215. def set_request_type(self, type):
  216. self.xfrsess._request_type = type
  217. if type == RRType.AXFR():
  218. self.xfrsess._request_typestr = 'AXFR'
  219. else:
  220. self.xfrsess._request_typestr = 'IXFR'
  221. def setUp(self):
  222. self.sock = MySocket(socket.AF_INET,socket.SOCK_STREAM)
  223. self.xfrsess = MyXfroutSession(self.sock, None, Dbserver(),
  224. TSIGKeyRing(),
  225. (socket.AF_INET, socket.SOCK_STREAM,
  226. ('127.0.0.1', 12345)),
  227. # When not testing ACLs, simply accept
  228. isc.acl.dns.REQUEST_LOADER.load(
  229. [{"action": "ACCEPT"}]),
  230. {})
  231. self.set_request_type(RRType.AXFR()) # test AXFR by default
  232. self.mdata = self.create_request_data()
  233. self.soa_rrset = create_soa(SOA_CURRENT_VERSION)
  234. # some test replaces a module-wide function. We should ensure the
  235. # original is used elsewhere.
  236. self.orig_get_rrset_len = xfrout.get_rrset_len
  237. def tearDown(self):
  238. xfrout.get_rrset_len = self.orig_get_rrset_len
  239. # transfer_counter must be always be reset no matter happens within
  240. # the XfroutSession object. We check the condition here.
  241. self.assertEqual(0, self.xfrsess._server.transfer_counter)
  242. class TestXfroutSession(TestXfroutSessionBase):
  243. def test_quota_error(self):
  244. '''Emulating the server being too busy.
  245. '''
  246. self.xfrsess._request_data = self.mdata
  247. self.xfrsess._server.increase_transfers_counter = lambda : False
  248. XfroutSession._handle(self.xfrsess)
  249. self.assertEqual(self.sock.read_msg().get_rcode(), Rcode.REFUSED())
  250. def test_quota_ok(self):
  251. '''The default case in terms of the xfrout quota.
  252. '''
  253. # set up a bogus request, which should result in FORMERR. (it only
  254. # has to be something that is different from the previous case)
  255. self.xfrsess._request_data = \
  256. self.create_request_data(ixfr=IXFR_OK_VERSION, num_soa=2)
  257. # Replace the data source client to avoid datasrc related exceptions
  258. self.xfrsess.ClientClass = MockDataSrcClient
  259. XfroutSession._handle(self.xfrsess)
  260. self.assertEqual(self.sock.read_msg().get_rcode(), Rcode.FORMERR())
  261. def test_exception_from_session(self):
  262. '''Test the case where the main processing raises an exception.
  263. We just check it doesn't any unexpected disruption and (in tearDown)
  264. transfer_counter is correctly reset to 0.
  265. '''
  266. def dns_xfrout_start(fd, msg, quota):
  267. raise ValueError('fake exception')
  268. self.xfrsess.dns_xfrout_start = dns_xfrout_start
  269. XfroutSession._handle(self.xfrsess)
  270. def test_parse_query_message(self):
  271. # Valid AXFR
  272. [get_rcode, get_msg] = self.xfrsess._parse_query_message(self.mdata)
  273. self.assertEqual(RRType.AXFR(), self.xfrsess._request_type)
  274. self.assertEqual(get_rcode.to_text(), "NOERROR")
  275. # Valid IXFR
  276. request_data = self.create_request_data(ixfr=2011111801)
  277. rcode, msg = self.xfrsess._parse_query_message(request_data)
  278. self.assertEqual(RRType.IXFR(), self.xfrsess._request_type)
  279. self.assertEqual(Rcode.NOERROR(), rcode)
  280. # Broken request: no question
  281. self.assertRaises(RuntimeError, self.xfrsess._parse_query_message,
  282. self.create_request_data(with_question=False))
  283. # Broken request: invalid RR type (neither AXFR nor IXFR)
  284. self.assertRaises(RuntimeError, self.xfrsess._parse_query_message,
  285. self.create_request_data(qtype=RRType.A()))
  286. # tsig signed query message
  287. request_data = self.create_request_data(with_tsig=True)
  288. # BADKEY
  289. [rcode, msg] = self.xfrsess._parse_query_message(request_data)
  290. self.assertEqual(rcode.to_text(), "NOTAUTH")
  291. self.assertTrue(self.xfrsess._tsig_ctx is not None)
  292. # NOERROR
  293. self.assertEqual(TSIGKeyRing.SUCCESS,
  294. self.xfrsess._tsig_key_ring.add(TSIG_KEY))
  295. [rcode, msg] = self.xfrsess._parse_query_message(request_data)
  296. self.assertEqual(rcode.to_text(), "NOERROR")
  297. self.assertTrue(self.xfrsess._tsig_ctx is not None)
  298. def check_transfer_acl(self, acl_setter):
  299. # ACL checks, put some ACL inside
  300. acl_setter(isc.acl.dns.REQUEST_LOADER.load([
  301. {
  302. "from": "127.0.0.1",
  303. "action": "ACCEPT"
  304. },
  305. {
  306. "from": "192.0.2.1",
  307. "action": "DROP"
  308. }
  309. ]))
  310. # Localhost (the default in this test) is accepted
  311. rcode, msg = self.xfrsess._parse_query_message(self.mdata)
  312. self.assertEqual(rcode.to_text(), "NOERROR")
  313. # This should be dropped completely, therefore returning None
  314. self.xfrsess._remote = (socket.AF_INET, socket.SOCK_STREAM,
  315. ('192.0.2.1', 12345))
  316. rcode, msg = self.xfrsess._parse_query_message(self.mdata)
  317. self.assertEqual(None, rcode)
  318. # This should be refused, therefore REFUSED
  319. self.xfrsess._remote = (socket.AF_INET, socket.SOCK_STREAM,
  320. ('192.0.2.2', 12345))
  321. rcode, msg = self.xfrsess._parse_query_message(self.mdata)
  322. self.assertEqual(rcode.to_text(), "REFUSED")
  323. # TSIG signed request
  324. request_data = self.create_request_data(with_tsig=True)
  325. # If the TSIG check fails, it should not check ACL
  326. # (If it checked ACL as well, it would just drop the request)
  327. self.xfrsess._remote = (socket.AF_INET, socket.SOCK_STREAM,
  328. ('192.0.2.1', 12345))
  329. self.xfrsess._tsig_key_ring = TSIGKeyRing()
  330. rcode, msg = self.xfrsess._parse_query_message(request_data)
  331. self.assertEqual(rcode.to_text(), "NOTAUTH")
  332. self.assertTrue(self.xfrsess._tsig_ctx is not None)
  333. # ACL using TSIG: successful case
  334. acl_setter(isc.acl.dns.REQUEST_LOADER.load([
  335. {"key": "example.com", "action": "ACCEPT"}, {"action": "REJECT"}
  336. ]))
  337. self.assertEqual(TSIGKeyRing.SUCCESS,
  338. self.xfrsess._tsig_key_ring.add(TSIG_KEY))
  339. [rcode, msg] = self.xfrsess._parse_query_message(request_data)
  340. self.assertEqual(rcode.to_text(), "NOERROR")
  341. # ACL using TSIG: key name doesn't match; should be rejected
  342. acl_setter(isc.acl.dns.REQUEST_LOADER.load([
  343. {"key": "example.org", "action": "ACCEPT"}, {"action": "REJECT"}
  344. ]))
  345. [rcode, msg] = self.xfrsess._parse_query_message(request_data)
  346. self.assertEqual(rcode.to_text(), "REFUSED")
  347. # ACL using TSIG: no TSIG; should be rejected
  348. acl_setter(isc.acl.dns.REQUEST_LOADER.load([
  349. {"key": "example.org", "action": "ACCEPT"}, {"action": "REJECT"}
  350. ]))
  351. [rcode, msg] = self.xfrsess._parse_query_message(self.mdata)
  352. self.assertEqual(rcode.to_text(), "REFUSED")
  353. #
  354. # ACL using IP + TSIG: both should match
  355. #
  356. acl_setter(isc.acl.dns.REQUEST_LOADER.load([
  357. {"ALL": [{"key": "example.com"}, {"from": "192.0.2.1"}],
  358. "action": "ACCEPT"},
  359. {"action": "REJECT"}
  360. ]))
  361. # both matches
  362. self.xfrsess._remote = (socket.AF_INET, socket.SOCK_STREAM,
  363. ('192.0.2.1', 12345))
  364. [rcode, msg] = self.xfrsess._parse_query_message(request_data)
  365. self.assertEqual(rcode.to_text(), "NOERROR")
  366. # TSIG matches, but address doesn't
  367. self.xfrsess._remote = (socket.AF_INET, socket.SOCK_STREAM,
  368. ('192.0.2.2', 12345))
  369. [rcode, msg] = self.xfrsess._parse_query_message(request_data)
  370. self.assertEqual(rcode.to_text(), "REFUSED")
  371. # Address matches, but TSIG doesn't (not included)
  372. self.xfrsess._remote = (socket.AF_INET, socket.SOCK_STREAM,
  373. ('192.0.2.1', 12345))
  374. [rcode, msg] = self.xfrsess._parse_query_message(self.mdata)
  375. self.assertEqual(rcode.to_text(), "REFUSED")
  376. # Neither address nor TSIG matches
  377. self.xfrsess._remote = (socket.AF_INET, socket.SOCK_STREAM,
  378. ('192.0.2.2', 12345))
  379. [rcode, msg] = self.xfrsess._parse_query_message(self.mdata)
  380. self.assertEqual(rcode.to_text(), "REFUSED")
  381. def test_transfer_acl(self):
  382. # ACL checks only with the default ACL
  383. def acl_setter(acl):
  384. self.xfrsess._acl = acl
  385. self.check_transfer_acl(acl_setter)
  386. def test_transfer_zoneacl(self):
  387. # ACL check with a per zone ACL + default ACL. The per zone ACL
  388. # should match the queryied zone, so it should be used.
  389. def acl_setter(acl):
  390. zone_key = ('IN', 'example.com.')
  391. self.xfrsess._zone_config[zone_key] = {}
  392. self.xfrsess._zone_config[zone_key]['transfer_acl'] = acl
  393. self.xfrsess._acl = isc.acl.dns.REQUEST_LOADER.load([
  394. {"from": "127.0.0.1", "action": "DROP"}])
  395. self.check_transfer_acl(acl_setter)
  396. def test_transfer_zoneacl_nomatch(self):
  397. # similar to the previous one, but the per zone doesn't match the
  398. # query. The default should be used.
  399. def acl_setter(acl):
  400. zone_key = ('IN', 'example.org.')
  401. self.xfrsess._zone_config[zone_key] = {}
  402. self.xfrsess._zone_config[zone_key]['transfer_acl'] = \
  403. isc.acl.dns.REQUEST_LOADER.load([
  404. {"from": "127.0.0.1", "action": "DROP"}])
  405. self.xfrsess._acl = acl
  406. self.check_transfer_acl(acl_setter)
  407. def test_get_transfer_acl(self):
  408. # set the default ACL. If there's no specific zone ACL, this one
  409. # should be used.
  410. self.xfrsess._acl = isc.acl.dns.REQUEST_LOADER.load([
  411. {"from": "127.0.0.1", "action": "ACCEPT"}])
  412. acl = self.xfrsess._get_transfer_acl(Name('example.com'), RRClass.IN())
  413. self.assertEqual(acl, self.xfrsess._acl)
  414. # install a per zone config with transfer ACL for example.com. Then
  415. # that ACL will be used for example.com; for others the default ACL
  416. # will still be used.
  417. com_acl = isc.acl.dns.REQUEST_LOADER.load([
  418. {"from": "127.0.0.1", "action": "REJECT"}])
  419. self.xfrsess._zone_config[('IN', 'example.com.')] = {}
  420. self.xfrsess._zone_config[('IN', 'example.com.')]['transfer_acl'] = \
  421. com_acl
  422. self.assertEqual(com_acl,
  423. self.xfrsess._get_transfer_acl(Name('example.com'),
  424. RRClass.IN()))
  425. self.assertEqual(self.xfrsess._acl,
  426. self.xfrsess._get_transfer_acl(Name('example.org'),
  427. RRClass.IN()))
  428. # Name matching should be case insensitive.
  429. self.assertEqual(com_acl,
  430. self.xfrsess._get_transfer_acl(Name('EXAMPLE.COM'),
  431. RRClass.IN()))
  432. def test_send_data(self):
  433. self.xfrsess._send_data(self.sock, self.mdata)
  434. senddata = self.sock.readsent()
  435. self.assertEqual(senddata, self.mdata)
  436. def test_reply_xfrout_query_with_error_rcode(self):
  437. msg = self.getmsg()
  438. self.xfrsess._reply_query_with_error_rcode(msg, self.sock, Rcode(3))
  439. get_msg = self.sock.read_msg()
  440. self.assertEqual(get_msg.get_rcode().to_text(), "NXDOMAIN")
  441. # tsig signed message
  442. msg = self.getmsg()
  443. self.xfrsess._tsig_ctx = self.create_mock_tsig_ctx(TSIGError.NOERROR)
  444. self.xfrsess._reply_query_with_error_rcode(msg, self.sock, Rcode(3))
  445. get_msg = self.sock.read_msg()
  446. self.assertEqual(get_msg.get_rcode().to_text(), "NXDOMAIN")
  447. self.assertTrue(self.message_has_tsig(get_msg))
  448. def test_send_message(self):
  449. msg = self.getmsg()
  450. msg.make_response()
  451. # SOA record data with different cases
  452. soa_rrset = RRset(Name('Example.com.'), RRClass.IN(), RRType.SOA(),
  453. RRTTL(3600))
  454. soa_rrset.add_rdata(Rdata(RRType.SOA(), RRClass.IN(),
  455. 'master.Example.com. admin.exAmple.com. ' +
  456. '2011112001 3600 1800 2419200 7200'))
  457. msg.add_rrset(Message.SECTION_ANSWER, soa_rrset)
  458. self.xfrsess._send_message(self.sock, msg)
  459. send_out_data = self.sock.readsent()[2:]
  460. # CASE_INSENSITIVE compression mode
  461. render = MessageRenderer();
  462. render.set_length_limit(XFROUT_MAX_MESSAGE_SIZE)
  463. msg.to_wire(render)
  464. self.assertNotEqual(render.get_data(), send_out_data)
  465. # CASE_SENSITIVE compression mode
  466. render.clear()
  467. render.set_compress_mode(MessageRenderer.CASE_SENSITIVE)
  468. render.set_length_limit(XFROUT_MAX_MESSAGE_SIZE)
  469. msg.to_wire(render)
  470. self.assertEqual(render.get_data(), send_out_data)
  471. def test_clear_message(self):
  472. msg = self.getmsg()
  473. qid = msg.get_qid()
  474. opcode = msg.get_opcode()
  475. rcode = msg.get_rcode()
  476. self.xfrsess._clear_message(msg)
  477. self.assertEqual(msg.get_qid(), qid)
  478. self.assertEqual(msg.get_opcode(), opcode)
  479. self.assertEqual(msg.get_rcode(), rcode)
  480. self.assertTrue(msg.get_header_flag(Message.HEADERFLAG_AA))
  481. def test_send_message_with_last_soa(self):
  482. msg = self.getmsg()
  483. msg.make_response()
  484. self.xfrsess._send_message_with_last_soa(msg, self.sock,
  485. self.soa_rrset, 0)
  486. get_msg = self.sock.read_msg()
  487. # tsig context does not exist
  488. self.assertFalse(self.message_has_tsig(get_msg))
  489. self.assertEqual(get_msg.get_rr_count(Message.SECTION_QUESTION), 1)
  490. self.assertEqual(get_msg.get_rr_count(Message.SECTION_ANSWER), 1)
  491. self.assertEqual(get_msg.get_rr_count(Message.SECTION_AUTHORITY), 0)
  492. answer = get_msg.get_section(Message.SECTION_ANSWER)[0]
  493. self.assertEqual(answer.get_name().to_text(), "example.com.")
  494. self.assertEqual(answer.get_class(), RRClass("IN"))
  495. self.assertEqual(answer.get_type().to_text(), "SOA")
  496. rdata = answer.get_rdata()
  497. self.assertEqual(rdata[0], self.soa_rrset.get_rdata()[0])
  498. # Sending the message with last soa together
  499. self.xfrsess._send_message_with_last_soa(msg, self.sock,
  500. self.soa_rrset, 0)
  501. get_msg = self.sock.read_msg()
  502. # tsig context does not exist
  503. self.assertFalse(self.message_has_tsig(get_msg))
  504. def test_send_message_with_last_soa_with_tsig(self):
  505. # create tsig context
  506. self.xfrsess._tsig_ctx = self.create_mock_tsig_ctx(TSIGError.NOERROR)
  507. msg = self.getmsg()
  508. msg.make_response()
  509. # Sending the message with last soa together
  510. self.xfrsess._send_message_with_last_soa(msg, self.sock,
  511. self.soa_rrset, 0)
  512. get_msg = self.sock.read_msg()
  513. self.assertTrue(self.message_has_tsig(get_msg))
  514. self.assertEqual(get_msg.get_rr_count(Message.SECTION_QUESTION), 1)
  515. self.assertEqual(get_msg.get_rr_count(Message.SECTION_ANSWER), 1)
  516. self.assertEqual(get_msg.get_rr_count(Message.SECTION_AUTHORITY), 0)
  517. def test_trigger_send_message_with_last_soa(self):
  518. rrset_a = RRset(Name("example.com"), RRClass.IN(), RRType.A(), RRTTL(3600))
  519. rrset_a.add_rdata(Rdata(RRType.A(), RRClass.IN(), "192.0.2.1"))
  520. msg = self.getmsg()
  521. msg.make_response()
  522. msg.add_rrset(Message.SECTION_ANSWER, rrset_a)
  523. # length larger than MAX-len(rrset)
  524. length_need_split = xfrout.XFROUT_MAX_MESSAGE_SIZE - \
  525. get_rrset_len(self.soa_rrset) + 1
  526. # give the function a value that is larger than MAX-len(rrset)
  527. # this should have triggered the sending of two messages
  528. # (1 with the rrset we added manually, and 1 that triggered
  529. # the sending in _with_last_soa)
  530. self.xfrsess._send_message_with_last_soa(msg, self.sock,
  531. self.soa_rrset,
  532. length_need_split)
  533. get_msg = self.sock.read_msg()
  534. self.assertFalse(self.message_has_tsig(get_msg))
  535. self.assertEqual(get_msg.get_rr_count(Message.SECTION_QUESTION), 1)
  536. self.assertEqual(get_msg.get_rr_count(Message.SECTION_ANSWER), 1)
  537. self.assertEqual(get_msg.get_rr_count(Message.SECTION_AUTHORITY), 0)
  538. answer = get_msg.get_section(Message.SECTION_ANSWER)[0]
  539. self.assertEqual(answer.get_name().to_text(), "example.com.")
  540. self.assertEqual(answer.get_class(), RRClass("IN"))
  541. self.assertEqual(answer.get_type().to_text(), "A")
  542. rdata = answer.get_rdata()
  543. self.assertEqual(rdata[0].to_text(), "192.0.2.1")
  544. get_msg = self.sock.read_msg()
  545. self.assertFalse(self.message_has_tsig(get_msg))
  546. self.assertEqual(get_msg.get_rr_count(Message.SECTION_QUESTION), 0)
  547. self.assertEqual(get_msg.get_rr_count(Message.SECTION_ANSWER), 1)
  548. self.assertEqual(get_msg.get_rr_count(Message.SECTION_AUTHORITY), 0)
  549. answer = get_msg.get_section(Message.SECTION_ANSWER)[0]
  550. self.assertEqual(answer.get_name().to_text(), "example.com.")
  551. self.assertEqual(answer.get_class(), RRClass("IN"))
  552. self.assertEqual(answer.get_type().to_text(), "SOA")
  553. rdata = answer.get_rdata()
  554. self.assertEqual(rdata[0], self.soa_rrset.get_rdata()[0])
  555. # and it should not have sent anything else
  556. self.assertEqual(0, len(self.sock.sendqueue))
  557. def test_trigger_send_message_with_last_soa_with_tsig(self):
  558. self.xfrsess._tsig_ctx = self.create_mock_tsig_ctx(TSIGError.NOERROR)
  559. msg = self.getmsg()
  560. msg.make_response()
  561. msg.add_rrset(Message.SECTION_ANSWER, self.soa_rrset)
  562. # length larger than MAX-len(rrset)
  563. length_need_split = xfrout.XFROUT_MAX_MESSAGE_SIZE - \
  564. get_rrset_len(self.soa_rrset) + 1
  565. # give the function a value that is larger than MAX-len(rrset)
  566. # this should have triggered the sending of two messages
  567. # (1 with the rrset we added manually, and 1 that triggered
  568. # the sending in _with_last_soa)
  569. self.xfrsess._send_message_with_last_soa(msg, self.sock,
  570. self.soa_rrset,
  571. length_need_split)
  572. # Both messages should have TSIG RRs
  573. get_msg = self.sock.read_msg()
  574. self.assertTrue(self.message_has_tsig(get_msg))
  575. get_msg = self.sock.read_msg()
  576. self.assertTrue(self.message_has_tsig(get_msg))
  577. # and it should not have sent anything else
  578. self.assertEqual(0, len(self.sock.sendqueue))
  579. def test_get_rrset_len(self):
  580. self.assertEqual(82, get_rrset_len(self.soa_rrset))
  581. def test_xfrout_axfr_setup(self):
  582. self.xfrsess.ClientClass = MockDataSrcClient
  583. # Successful case. A zone iterator should be set up.
  584. self.assertEqual(self.xfrsess._xfrout_setup(
  585. self.getmsg(), TEST_ZONE_NAME, TEST_RRCLASS), Rcode.NOERROR())
  586. self.assertNotEqual(None, self.xfrsess._iterator)
  587. # Failure cases
  588. self.assertEqual(self.xfrsess._xfrout_setup(
  589. self.getmsg(), Name('notauth.example.com'), TEST_RRCLASS),
  590. Rcode.NOTAUTH())
  591. self.assertEqual(self.xfrsess._xfrout_setup(
  592. self.getmsg(), Name('nosoa.example.com'), TEST_RRCLASS),
  593. Rcode.SERVFAIL())
  594. self.assertEqual(self.xfrsess._xfrout_setup(
  595. self.getmsg(), Name('multisoa.example.com'), TEST_RRCLASS),
  596. Rcode.SERVFAIL())
  597. def test_xfrout_ixfr_setup(self):
  598. self.xfrsess.ClientClass = MockDataSrcClient
  599. self.set_request_type(RRType.IXFR())
  600. # Successful case of pure IXFR. A zone journal reader should be set
  601. # up.
  602. self.mdata = self.create_request_data(ixfr=IXFR_OK_VERSION)
  603. self.assertEqual(self.xfrsess._xfrout_setup(
  604. self.getmsg(), TEST_ZONE_NAME, TEST_RRCLASS), Rcode.NOERROR())
  605. self.assertNotEqual(None, self.xfrsess._jnl_reader)
  606. # Successful case, but as a result of falling back to AXFR-style
  607. # IXFR. A zone iterator should be set up instead of a journal reader.
  608. self.mdata = self.create_request_data(ixfr=IXFR_NG_VERSION)
  609. self.assertEqual(self.xfrsess._xfrout_setup(
  610. self.getmsg(), TEST_ZONE_NAME, TEST_RRCLASS), Rcode.NOERROR())
  611. self.assertNotEqual(None, self.xfrsess._iterator)
  612. self.assertEqual(None, self.xfrsess._jnl_reader)
  613. # Successful case, but the requested SOA serial is equal to that of
  614. # the local SOA. Both iterator and jnl_reader should be None,
  615. # indicating that the response will contain just one SOA.
  616. self.mdata = self.create_request_data(ixfr=SOA_CURRENT_VERSION)
  617. self.assertEqual(self.xfrsess._xfrout_setup(
  618. self.getmsg(), TEST_ZONE_NAME, TEST_RRCLASS), Rcode.NOERROR())
  619. self.assertEqual(None, self.xfrsess._iterator)
  620. self.assertEqual(None, self.xfrsess._jnl_reader)
  621. # The data source doesn't support journaling. Should fallback to AXFR.
  622. zone_name = Name('nojournal.example.com')
  623. self.mdata = self.create_request_data(ixfr=IXFR_OK_VERSION,
  624. zone_name=zone_name)
  625. self.assertEqual(self.xfrsess._xfrout_setup(
  626. self.getmsg(), zone_name, TEST_RRCLASS), Rcode.NOERROR())
  627. self.assertNotEqual(None, self.xfrsess._iterator)
  628. # Failure cases
  629. zone_name = Name('notauth.example.com')
  630. self.mdata = self.create_request_data(ixfr=IXFR_OK_VERSION,
  631. zone_name=zone_name)
  632. self.assertEqual(self.xfrsess._xfrout_setup(
  633. self.getmsg(), zone_name, TEST_RRCLASS), Rcode.NOTAUTH())
  634. # this is a strange case: zone's SOA will be found but the journal
  635. # reader won't be created due to 'no such zone'.
  636. zone_name = Name('notauth2.example.com')
  637. self.mdata = self.create_request_data(ixfr=IXFR_OK_VERSION,
  638. zone_name=zone_name)
  639. self.assertEqual(self.xfrsess._xfrout_setup(
  640. self.getmsg(), zone_name, TEST_RRCLASS), Rcode.NOTAUTH())
  641. zone_name = Name('nosoa.example.com')
  642. self.mdata = self.create_request_data(ixfr=IXFR_OK_VERSION,
  643. zone_name=zone_name)
  644. self.assertEqual(self.xfrsess._xfrout_setup(
  645. self.getmsg(), zone_name, TEST_RRCLASS), Rcode.SERVFAIL())
  646. zone_name = Name('multisoa.example.com')
  647. self.mdata = self.create_request_data(ixfr=IXFR_OK_VERSION,
  648. zone_name=zone_name)
  649. self.assertEqual(self.xfrsess._xfrout_setup(
  650. self.getmsg(), zone_name, TEST_RRCLASS), Rcode.SERVFAIL())
  651. # query name doesn't match the SOA's owner
  652. self.mdata = self.create_request_data(ixfr=IXFR_OK_VERSION)
  653. self.assertEqual(self.xfrsess._xfrout_setup(
  654. self.getmsg(), zone_name, TEST_RRCLASS), Rcode.FORMERR())
  655. # query's RR class doesn't match the SOA's class
  656. zone_name = TEST_ZONE_NAME # make sure the name matches this time
  657. self.mdata = self.create_request_data(ixfr=IXFR_OK_VERSION,
  658. soa_class=RRClass.CH())
  659. self.assertEqual(self.xfrsess._xfrout_setup(
  660. self.getmsg(), zone_name, TEST_RRCLASS), Rcode.FORMERR())
  661. # multiple SOA RRs
  662. self.mdata = self.create_request_data(ixfr=IXFR_OK_VERSION,
  663. num_soa=2)
  664. self.assertEqual(self.xfrsess._xfrout_setup(
  665. self.getmsg(), zone_name, TEST_RRCLASS), Rcode.FORMERR())
  666. def test_dns_xfrout_start_formerror(self):
  667. # formerror
  668. self.xfrsess.dns_xfrout_start(self.sock, b"\xd6=\x00\x00\x00\x01\x00")
  669. sent_data = self.sock.readsent()
  670. self.assertEqual(len(sent_data), 0)
  671. def test_dns_xfrout_start_notauth(self):
  672. def notauth(msg, name, rrclass):
  673. return Rcode.NOTAUTH()
  674. self.xfrsess._xfrout_setup = notauth
  675. self.xfrsess.dns_xfrout_start(self.sock, self.mdata)
  676. get_msg = self.sock.read_msg()
  677. self.assertEqual(get_msg.get_rcode().to_text(), "NOTAUTH")
  678. def test_dns_xfrout_start_datasrc_servfail(self):
  679. def internal_raise(x, y):
  680. raise isc.datasrc.Error('exception for the sake of test')
  681. self.xfrsess.ClientClass = internal_raise
  682. self.xfrsess.dns_xfrout_start(self.sock, self.mdata)
  683. self.assertEqual(self.sock.read_msg().get_rcode(), Rcode.SERVFAIL())
  684. def test_dns_xfrout_start_noerror(self):
  685. def noerror(msg, name, rrclass):
  686. return Rcode.NOERROR()
  687. self.xfrsess._xfrout_setup = noerror
  688. def myreply(msg, sock):
  689. self.sock.send(b"success")
  690. self.xfrsess._reply_xfrout_query = myreply
  691. self.xfrsess.dns_xfrout_start(self.sock, self.mdata)
  692. self.assertEqual(self.sock.readsent(), b"success")
  693. def test_reply_xfrout_query_axfr(self):
  694. self.xfrsess._soa = self.soa_rrset
  695. self.xfrsess._iterator = [self.soa_rrset]
  696. self.xfrsess._reply_xfrout_query(self.getmsg(), self.sock)
  697. reply_msg = self.sock.read_msg()
  698. self.assertEqual(reply_msg.get_rr_count(Message.SECTION_ANSWER), 2)
  699. def test_reply_xfrout_query_axfr_with_tsig(self):
  700. rrset = RRset(Name('a.example.com'), RRClass.IN(), RRType.A(),
  701. RRTTL(3600))
  702. rrset.add_rdata(Rdata(RRType.A(), RRClass.IN(), '192.0.2.1'))
  703. global xfrout
  704. def get_rrset_len(rrset):
  705. return 65520
  706. self.xfrsess._soa = self.soa_rrset
  707. self.xfrsess._iterator = [rrset for i in range(0, 100)]
  708. xfrout.get_rrset_len = get_rrset_len
  709. self.xfrsess._tsig_ctx = self.create_mock_tsig_ctx(TSIGError.NOERROR)
  710. self.xfrsess._reply_xfrout_query(self.getmsg(), self.sock)
  711. # All messages must have TSIG as we don't support the feature of
  712. # skipping intermediate TSIG records (with bulk signing).
  713. for i in range(0, 102): # 102 = all 100 RRs from iterator and 2 SOAs
  714. reply_msg = self.sock.read_msg()
  715. # With the hack of get_rrset_len() above, every message must have
  716. # exactly one RR in the answer section.
  717. self.assertEqual(reply_msg.get_rr_count(Message.SECTION_ANSWER), 1)
  718. self.assertTrue(self.message_has_tsig(reply_msg))
  719. # and it should not have sent anything else
  720. self.assertEqual(0, len(self.sock.sendqueue))
  721. def test_reply_xfrout_query_ixfr(self):
  722. # Creating a pure (incremental) IXFR response. Intermediate SOA
  723. # RRs won't be skipped.
  724. self.xfrsess._soa = create_soa(SOA_CURRENT_VERSION)
  725. self.xfrsess._iterator = [create_soa(IXFR_OK_VERSION),
  726. create_a(Name('a.example.com'), '192.0.2.2'),
  727. create_soa(SOA_CURRENT_VERSION),
  728. create_aaaa(Name('a.example.com'),
  729. '2001:db8::1')]
  730. self.xfrsess._jnl_reader = self.xfrsess._iterator
  731. self.xfrsess._reply_xfrout_query(self.getmsg(), self.sock)
  732. reply_msg = self.sock.read_msg(Message.PRESERVE_ORDER)
  733. actual_records = reply_msg.get_section(Message.SECTION_ANSWER)
  734. expected_records = self.xfrsess._iterator[:]
  735. expected_records.insert(0, create_soa(SOA_CURRENT_VERSION))
  736. expected_records.append(create_soa(SOA_CURRENT_VERSION))
  737. self.assertEqual(len(expected_records), len(actual_records))
  738. for (expected_rr, actual_rr) in zip(expected_records, actual_records):
  739. self.assertTrue(expected_rr, actual_rr)
  740. def test_reply_xfrout_query_ixfr_soa_only(self):
  741. # Creating an IXFR response that contains only one RR, which is the
  742. # SOA of the current version.
  743. self.xfrsess._soa = create_soa(SOA_CURRENT_VERSION)
  744. self.xfrsess._iterator = None
  745. self.xfrsess._jnl_reader = None
  746. self.xfrsess._reply_xfrout_query(self.getmsg(), self.sock)
  747. reply_msg = self.sock.read_msg(Message.PRESERVE_ORDER)
  748. answer = reply_msg.get_section(Message.SECTION_ANSWER)
  749. self.assertEqual(1, len(answer))
  750. self.assertTrue(create_soa(SOA_CURRENT_VERSION), answer[0])
  751. class TestXfroutSessionWithSQLite3(TestXfroutSessionBase):
  752. '''Tests for XFR-out sessions using an SQLite3 DB.
  753. These are provided mainly to confirm the implementation actually works
  754. in an environment closer to actual operational environments. So we
  755. only check a few common cases; other details are tested using mock
  756. data sources.
  757. '''
  758. def setUp(self):
  759. super().setUp()
  760. self.xfrsess._request_data = self.mdata
  761. self.xfrsess._server.get_db_file = lambda : TESTDATA_SRCDIR + \
  762. 'test.sqlite3'
  763. self.ns_name = 'a.dns.example.com'
  764. def check_axfr_stream(self, response):
  765. '''Common checks for AXFR(-style) response for the test zone.
  766. '''
  767. # This zone contains two A RRs for the same name with different TTLs.
  768. # These TTLs should be preseved in the AXFR stream.
  769. actual_records = response.get_section(Message.SECTION_ANSWER)
  770. expected_records = [create_soa(2011112001),
  771. create_ns(self.ns_name),
  772. create_a(Name(self.ns_name), '192.0.2.1', 3600),
  773. create_a(Name(self.ns_name), '192.0.2.2', 7200),
  774. create_soa(2011112001)]
  775. self.assertEqual(len(expected_records), len(actual_records))
  776. for (expected_rr, actual_rr) in zip(expected_records, actual_records):
  777. self.assertTrue(expected_rr, actual_rr)
  778. def test_axfr_normal_session(self):
  779. XfroutSession._handle(self.xfrsess)
  780. response = self.sock.read_msg(Message.PRESERVE_ORDER);
  781. self.assertEqual(Rcode.NOERROR(), response.get_rcode())
  782. self.check_axfr_stream(response)
  783. def test_ixfr_to_axfr(self):
  784. self.xfrsess._request_data = \
  785. self.create_request_data(ixfr=IXFR_NG_VERSION)
  786. XfroutSession._handle(self.xfrsess)
  787. response = self.sock.read_msg(Message.PRESERVE_ORDER);
  788. self.assertEqual(Rcode.NOERROR(), response.get_rcode())
  789. # This is an AXFR-style IXFR. So the question section should indicate
  790. # that it's an IXFR resposne.
  791. self.assertEqual(RRType.IXFR(), response.get_question()[0].get_type())
  792. self.check_axfr_stream(response)
  793. def test_ixfr_normal_session(self):
  794. # See testdata/creatediff.py. There are 8 changes between two
  795. # versions. So the answer section should contain all of these and
  796. # two beginning and trailing SOAs.
  797. self.xfrsess._request_data = \
  798. self.create_request_data(ixfr=IXFR_OK_VERSION)
  799. XfroutSession._handle(self.xfrsess)
  800. response = self.sock.read_msg(Message.PRESERVE_ORDER);
  801. actual_records = response.get_section(Message.SECTION_ANSWER)
  802. expected_records = [create_soa(2011112001), create_soa(2011111802),
  803. create_soa(2011111900),
  804. create_a(Name(self.ns_name), '192.0.2.2', 7200),
  805. create_soa(2011111900),
  806. create_a(Name(self.ns_name), '192.0.2.53'),
  807. create_aaaa(Name(self.ns_name), '2001:db8::1'),
  808. create_soa(2011112001),
  809. create_a(Name(self.ns_name), '192.0.2.1'),
  810. create_soa(2011112001)]
  811. self.assertEqual(len(expected_records), len(actual_records))
  812. for (expected_rr, actual_rr) in zip(expected_records, actual_records):
  813. self.assertTrue(expected_rr, actual_rr)
  814. def test_ixfr_soa_only(self):
  815. # The requested SOA serial is the latest one. The response should
  816. # contain exactly one SOA of that serial.
  817. self.xfrsess._request_data = \
  818. self.create_request_data(ixfr=SOA_CURRENT_VERSION)
  819. XfroutSession._handle(self.xfrsess)
  820. response = self.sock.read_msg(Message.PRESERVE_ORDER);
  821. answers = response.get_section(Message.SECTION_ANSWER)
  822. self.assertEqual(1, len(answers))
  823. self.assertTrue(create_soa(SOA_CURRENT_VERSION), answers[0])
  824. class MyUnixSockServer(UnixSockServer):
  825. def __init__(self):
  826. self._shutdown_event = threading.Event()
  827. self._common_init()
  828. self._cc = MyCCSession()
  829. self.update_config_data(self._cc.get_full_config())
  830. class TestUnixSockServer(unittest.TestCase):
  831. def setUp(self):
  832. self.write_sock, self.read_sock = socket.socketpair()
  833. self.unix = MyUnixSockServer()
  834. def test_guess_remote(self):
  835. """Test we can guess the remote endpoint when we have only the
  836. file descriptor. This is needed, because we get only that one
  837. from auth."""
  838. # We test with UDP, as it can be "connected" without other
  839. # endpoint. Note that in the current implementation _guess_remote()
  840. # unconditionally returns SOCK_STREAM.
  841. sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
  842. sock.connect(('127.0.0.1', 12345))
  843. self.assertEqual((socket.AF_INET, socket.SOCK_STREAM,
  844. ('127.0.0.1', 12345)),
  845. self.unix._guess_remote(sock.fileno()))
  846. if socket.has_ipv6:
  847. # Don't check IPv6 address on hosts not supporting them
  848. sock = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM)
  849. sock.connect(('::1', 12345))
  850. self.assertEqual((socket.AF_INET6, socket.SOCK_STREAM,
  851. ('::1', 12345, 0, 0)),
  852. self.unix._guess_remote(sock.fileno()))
  853. # Try when pretending there's no IPv6 support
  854. # (No need to pretend when there's really no IPv6)
  855. xfrout.socket.has_ipv6 = False
  856. sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
  857. sock.connect(('127.0.0.1', 12345))
  858. self.assertEqual((socket.AF_INET, socket.SOCK_STREAM,
  859. ('127.0.0.1', 12345)),
  860. self.unix._guess_remote(sock.fileno()))
  861. # Return it back
  862. xfrout.socket.has_ipv6 = True
  863. def test_receive_query_message(self):
  864. send_msg = b"\xd6=\x00\x00\x00\x01\x00"
  865. msg_len = struct.pack('H', socket.htons(len(send_msg)))
  866. self.write_sock.send(msg_len)
  867. self.write_sock.send(send_msg)
  868. recv_msg = self.unix._receive_query_message(self.read_sock)
  869. self.assertEqual(recv_msg, send_msg)
  870. def check_default_ACL(self):
  871. context = isc.acl.dns.RequestContext(socket.getaddrinfo("127.0.0.1",
  872. 1234, 0, socket.SOCK_DGRAM,
  873. socket.IPPROTO_UDP,
  874. socket.AI_NUMERICHOST)[0][4])
  875. self.assertEqual(isc.acl.acl.ACCEPT, self.unix._acl.execute(context))
  876. def check_loaded_ACL(self, acl):
  877. context = isc.acl.dns.RequestContext(socket.getaddrinfo("127.0.0.1",
  878. 1234, 0, socket.SOCK_DGRAM,
  879. socket.IPPROTO_UDP,
  880. socket.AI_NUMERICHOST)[0][4])
  881. self.assertEqual(isc.acl.acl.ACCEPT, acl.execute(context))
  882. context = isc.acl.dns.RequestContext(socket.getaddrinfo("192.0.2.1",
  883. 1234, 0, socket.SOCK_DGRAM,
  884. socket.IPPROTO_UDP,
  885. socket.AI_NUMERICHOST)[0][4])
  886. self.assertEqual(isc.acl.acl.REJECT, acl.execute(context))
  887. def test_update_config_data(self):
  888. self.check_default_ACL()
  889. tsig_key_str = 'example.com:SFuWd/q99SzF8Yzd1QbB9g=='
  890. tsig_key_list = [tsig_key_str]
  891. bad_key_list = ['bad..example.com:SFuWd/q99SzF8Yzd1QbB9g==']
  892. self.unix.update_config_data({'transfers_out':10 })
  893. self.assertEqual(self.unix._max_transfers_out, 10)
  894. self.assertTrue(self.unix.tsig_key_ring is not None)
  895. self.check_default_ACL()
  896. self.unix.update_config_data({'transfers_out':9,
  897. 'tsig_key_ring':tsig_key_list})
  898. self.assertEqual(self.unix._max_transfers_out, 9)
  899. self.assertEqual(self.unix.tsig_key_ring.size(), 1)
  900. self.unix.tsig_key_ring.remove(Name("example.com."))
  901. self.assertEqual(self.unix.tsig_key_ring.size(), 0)
  902. # bad tsig key
  903. config_data = {'transfers_out':9, 'tsig_key_ring': bad_key_list}
  904. self.assertRaises(None, self.unix.update_config_data(config_data))
  905. self.assertEqual(self.unix.tsig_key_ring.size(), 0)
  906. # Load the ACL
  907. self.unix.update_config_data({'transfer_acl': [{'from': '127.0.0.1',
  908. 'action': 'ACCEPT'}]})
  909. self.check_loaded_ACL(self.unix._acl)
  910. # Pass a wrong data there and check it does not replace the old one
  911. self.assertRaises(XfroutConfigError,
  912. self.unix.update_config_data,
  913. {'transfer_acl': ['Something bad']})
  914. self.check_loaded_ACL(self.unix._acl)
  915. def test_zone_config_data(self):
  916. # By default, there's no specific zone config
  917. self.assertEqual({}, self.unix._zone_config)
  918. # Adding config for a specific zone. The config is empty unless
  919. # explicitly specified.
  920. self.unix.update_config_data({'zone_config':
  921. [{'origin': 'example.com',
  922. 'class': 'IN'}]})
  923. self.assertEqual({}, self.unix._zone_config[('IN', 'example.com.')])
  924. # zone class can be omitted
  925. self.unix.update_config_data({'zone_config':
  926. [{'origin': 'example.com'}]})
  927. self.assertEqual({}, self.unix._zone_config[('IN', 'example.com.')])
  928. # zone class, name are stored in the "normalized" form. class
  929. # strings are upper cased, names are down cased.
  930. self.unix.update_config_data({'zone_config':
  931. [{'origin': 'EXAMPLE.com'}]})
  932. self.assertEqual({}, self.unix._zone_config[('IN', 'example.com.')])
  933. # invalid zone class, name will result in exceptions
  934. self.assertRaises(EmptyLabel,
  935. self.unix.update_config_data,
  936. {'zone_config': [{'origin': 'bad..example'}]})
  937. self.assertRaises(InvalidRRClass,
  938. self.unix.update_config_data,
  939. {'zone_config': [{'origin': 'example.com',
  940. 'class': 'badclass'}]})
  941. # Configuring a couple of more zones
  942. self.unix.update_config_data({'zone_config':
  943. [{'origin': 'example.com'},
  944. {'origin': 'example.com',
  945. 'class': 'CH'},
  946. {'origin': 'example.org'}]})
  947. self.assertEqual({}, self.unix._zone_config[('IN', 'example.com.')])
  948. self.assertEqual({}, self.unix._zone_config[('CH', 'example.com.')])
  949. self.assertEqual({}, self.unix._zone_config[('IN', 'example.org.')])
  950. # Duplicate data: should be rejected with an exception
  951. self.assertRaises(XfroutConfigError,
  952. self.unix.update_config_data,
  953. {'zone_config': [{'origin': 'example.com'},
  954. {'origin': 'example.org'},
  955. {'origin': 'example.com'}]})
  956. def test_zone_config_data_with_acl(self):
  957. # Similar to the previous test, but with transfer_acl config
  958. self.unix.update_config_data({'zone_config':
  959. [{'origin': 'example.com',
  960. 'transfer_acl':
  961. [{'from': '127.0.0.1',
  962. 'action': 'ACCEPT'}]}]})
  963. acl = self.unix._zone_config[('IN', 'example.com.')]['transfer_acl']
  964. self.check_loaded_ACL(acl)
  965. # invalid ACL syntax will be rejected with exception
  966. self.assertRaises(XfroutConfigError,
  967. self.unix.update_config_data,
  968. {'zone_config': [{'origin': 'example.com',
  969. 'transfer_acl':
  970. [{'action': 'BADACTION'}]}]})
  971. def test_get_db_file(self):
  972. self.assertEqual(self.unix.get_db_file(), "initdb.file")
  973. def test_increase_transfers_counter(self):
  974. self.unix._max_transfers_out = 10
  975. count = self.unix._transfers_counter
  976. self.assertEqual(self.unix.increase_transfers_counter(), True)
  977. self.assertEqual(count + 1, self.unix._transfers_counter)
  978. self.unix._max_transfers_out = 0
  979. count = self.unix._transfers_counter
  980. self.assertEqual(self.unix.increase_transfers_counter(), False)
  981. self.assertEqual(count, self.unix._transfers_counter)
  982. def test_decrease_transfers_counter(self):
  983. count = self.unix._transfers_counter
  984. self.unix.decrease_transfers_counter()
  985. self.assertEqual(count - 1, self.unix._transfers_counter)
  986. def _remove_file(self, sock_file):
  987. try:
  988. os.remove(sock_file)
  989. except OSError:
  990. pass
  991. def test_sock_file_in_use_file_exist(self):
  992. sock_file = 'temp.sock.file'
  993. self._remove_file(sock_file)
  994. self.assertFalse(self.unix._sock_file_in_use(sock_file))
  995. self.assertFalse(os.path.exists(sock_file))
  996. def test_sock_file_in_use_file_not_exist(self):
  997. self.assertFalse(self.unix._sock_file_in_use('temp.sock.file'))
  998. def _start_unix_sock_server(self, sock_file):
  999. serv = ThreadingUnixStreamServer(sock_file, BaseRequestHandler)
  1000. serv_thread = threading.Thread(target=serv.serve_forever)
  1001. serv_thread.setDaemon(True)
  1002. serv_thread.start()
  1003. def test_sock_file_in_use(self):
  1004. sock_file = 'temp.sock.file'
  1005. self._remove_file(sock_file)
  1006. self.assertFalse(self.unix._sock_file_in_use(sock_file))
  1007. self._start_unix_sock_server(sock_file)
  1008. old_stdout = sys.stdout
  1009. sys.stdout = open(os.devnull, 'w')
  1010. self.assertTrue(self.unix._sock_file_in_use(sock_file))
  1011. sys.stdout = old_stdout
  1012. def test_remove_unused_sock_file_in_use(self):
  1013. sock_file = 'temp.sock.file'
  1014. self._remove_file(sock_file)
  1015. self.assertFalse(self.unix._sock_file_in_use(sock_file))
  1016. self._start_unix_sock_server(sock_file)
  1017. old_stdout = sys.stdout
  1018. sys.stdout = open(os.devnull, 'w')
  1019. try:
  1020. self.unix._remove_unused_sock_file(sock_file)
  1021. except SystemExit:
  1022. pass
  1023. else:
  1024. # This should never happen
  1025. self.assertTrue(False)
  1026. sys.stdout = old_stdout
  1027. def test_remove_unused_sock_file_dir(self):
  1028. import tempfile
  1029. dir_name = tempfile.mkdtemp()
  1030. old_stdout = sys.stdout
  1031. sys.stdout = open(os.devnull, 'w')
  1032. try:
  1033. self.unix._remove_unused_sock_file(dir_name)
  1034. except SystemExit:
  1035. pass
  1036. else:
  1037. # This should never happen
  1038. self.assertTrue(False)
  1039. sys.stdout = old_stdout
  1040. os.rmdir(dir_name)
  1041. class TestInitialization(unittest.TestCase):
  1042. def setEnv(self, name, value):
  1043. if value is None:
  1044. if name in os.environ:
  1045. del os.environ[name]
  1046. else:
  1047. os.environ[name] = value
  1048. def setUp(self):
  1049. self._oldSocket = os.getenv("BIND10_XFROUT_SOCKET_FILE")
  1050. self._oldFromBuild = os.getenv("B10_FROM_BUILD")
  1051. def tearDown(self):
  1052. self.setEnv("B10_FROM_BUILD", self._oldFromBuild)
  1053. self.setEnv("BIND10_XFROUT_SOCKET_FILE", self._oldSocket)
  1054. # Make sure even the computed values are back
  1055. xfrout.init_paths()
  1056. def testNoEnv(self):
  1057. self.setEnv("B10_FROM_BUILD", None)
  1058. self.setEnv("BIND10_XFROUT_SOCKET_FILE", None)
  1059. xfrout.init_paths()
  1060. self.assertEqual(xfrout.UNIX_SOCKET_FILE,
  1061. "@@LOCALSTATEDIR@@/@PACKAGE_NAME@/auth_xfrout_conn")
  1062. def testProvidedSocket(self):
  1063. self.setEnv("B10_FROM_BUILD", None)
  1064. self.setEnv("BIND10_XFROUT_SOCKET_FILE", "The/Socket/File")
  1065. xfrout.init_paths()
  1066. self.assertEqual(xfrout.UNIX_SOCKET_FILE, "The/Socket/File")
  1067. if __name__== "__main__":
  1068. isc.log.resetUnitTestRootLogger()
  1069. unittest.main()