auth_srv_unittest.cc 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746
  1. // Copyright (C) 2010 Internet Systems Consortium, Inc. ("ISC")
  2. //
  3. // Permission to use, copy, modify, and/or distribute this software for any
  4. // purpose with or without fee is hereby granted, provided that the above
  5. // copyright notice and this permission notice appear in all copies.
  6. //
  7. // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
  8. // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
  9. // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
  10. // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
  11. // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
  12. // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  13. // PERFORMANCE OF THIS SOFTWARE.
  14. // $Id$
  15. #include <config.h>
  16. #include <gtest/gtest.h>
  17. #include <dns/buffer.h>
  18. #include <dns/name.h>
  19. #include <dns/message.h>
  20. #include <dns/messagerenderer.h>
  21. #include <dns/rrclass.h>
  22. #include <dns/rrtype.h>
  23. #include <cc/data.h>
  24. #include <cc/session.h>
  25. #include <xfr/xfrout_client.h>
  26. #include <auth/auth_srv.h>
  27. #include <auth/asio_link.h>
  28. #include <dns/tests/unittest_util.h>
  29. using isc::UnitTestUtil;
  30. using namespace std;
  31. using namespace isc::cc;
  32. using namespace isc::dns;
  33. using namespace isc::data;
  34. using namespace isc::xfr;
  35. using namespace asio_link;
  36. namespace {
  37. const char* const CONFIG_TESTDB =
  38. "{\"database_file\": \"" TEST_DATA_DIR "/example.sqlite3\"}";
  39. // The following file must be non existent and must be non"creatable" (see
  40. // the sqlite3 test).
  41. const char* const BADCONFIG_TESTDB =
  42. "{ \"database_file\": \"" TEST_DATA_DIR "/nodir/notexist\"}";
  43. const char* const DEFAULT_REMOTE_ADDRESS = "192.0.2.1";
  44. class AuthSrvTest : public ::testing::Test {
  45. private:
  46. class MockXfroutClient : public AbstractXfroutClient {
  47. public:
  48. MockXfroutClient() :
  49. is_connected_(false), connect_ok_(true), send_ok_(true),
  50. disconnect_ok_(true)
  51. {}
  52. virtual void connect();
  53. virtual void disconnect();
  54. virtual int sendXfroutRequestInfo(int tcp_sock, const void* msg_data,
  55. uint16_t msg_len);
  56. bool isConnected() const { return (is_connected_); }
  57. void disableConnect() { connect_ok_ = false; }
  58. void disableDisconnect() { disconnect_ok_ = false; }
  59. void enableDisconnect() { disconnect_ok_ = true; }
  60. void disableSend() { send_ok_ = false; }
  61. private:
  62. bool is_connected_;
  63. bool connect_ok_;
  64. bool send_ok_;
  65. bool disconnect_ok_;
  66. };
  67. class MockSession : public AbstractSession {
  68. public:
  69. MockSession() :
  70. // by default we return a simple "success" message.
  71. msg_(Element::fromJSON("{\"result\": [0, \"SUCCESS\"]}")),
  72. send_ok_(true), receive_ok_(true)
  73. {}
  74. virtual void establish(const char* socket_file);
  75. virtual void disconnect();
  76. virtual int group_sendmsg(ElementPtr msg, string group,
  77. string instance, string to);
  78. virtual bool group_recvmsg(ElementPtr& envelope, ElementPtr& msg,
  79. bool nonblock, int seq);
  80. virtual void subscribe(string group, string instance);
  81. virtual void unsubscribe(string group, string instance);
  82. virtual void startRead(boost::function<void()> read_callback);
  83. virtual int reply(ElementPtr& envelope, ElementPtr& newmsg);
  84. virtual bool hasQueuedMsgs();
  85. void setMessage(ElementPtr msg) { msg_ = msg; }
  86. void disableSend() { send_ok_ = false; }
  87. void disableReceive() { receive_ok_ = false; }
  88. ElementPtr sent_msg;
  89. string msg_destination;
  90. private:
  91. ElementPtr msg_;
  92. bool send_ok_;
  93. bool receive_ok_;
  94. };
  95. protected:
  96. AuthSrvTest() : server(true, xfrout),
  97. request_message(Message::RENDER),
  98. parse_message(Message::PARSE), default_qid(0x1035),
  99. opcode(Opcode(Opcode::QUERY())), qname("www.example.com"),
  100. qclass(RRClass::IN()), qtype(RRType::A()),
  101. io_message(NULL), endpoint(NULL), request_obuffer(0),
  102. request_renderer(request_obuffer),
  103. response_obuffer(0), response_renderer(response_obuffer)
  104. {
  105. server.setXfrinSession(&notify_session);
  106. }
  107. ~AuthSrvTest() {
  108. delete io_message;
  109. delete endpoint;
  110. }
  111. MockSession notify_session;
  112. MockXfroutClient xfrout;
  113. AuthSrv server;
  114. Message request_message;
  115. Message parse_message;
  116. const qid_t default_qid;
  117. const Opcode opcode;
  118. const Name qname;
  119. const RRClass qclass;
  120. const RRType qtype;
  121. IOMessage* io_message;
  122. const IOEndpoint* endpoint;
  123. OutputBuffer request_obuffer;
  124. MessageRenderer request_renderer;
  125. OutputBuffer response_obuffer;
  126. MessageRenderer response_renderer;
  127. vector<uint8_t> data;
  128. void createDataFromFile(const char* const datafile, int protocol);
  129. void createRequestMessage(const Opcode& opcode, const Name& request_name,
  130. const RRClass& rrclass, const RRType& rrtype);
  131. void createRequestPacket(const Opcode& opcode, const Name& request_name,
  132. const RRClass& rrclass, const RRType& rrtype,
  133. int protocol);
  134. void createRequestPacket(int protocol);
  135. };
  136. void
  137. AuthSrvTest::MockSession::establish(const char* socket_file UNUSED_PARAM) {}
  138. void
  139. AuthSrvTest::MockSession::disconnect() {}
  140. void
  141. AuthSrvTest::MockSession::subscribe(string group UNUSED_PARAM,
  142. string instance UNUSED_PARAM)
  143. {}
  144. void
  145. AuthSrvTest::MockSession::unsubscribe(string group UNUSED_PARAM,
  146. string instance UNUSED_PARAM)
  147. {}
  148. void
  149. AuthSrvTest::MockSession::startRead(
  150. boost::function<void()> read_callback UNUSED_PARAM)
  151. {}
  152. int
  153. AuthSrvTest::MockSession::reply(ElementPtr& envelope UNUSED_PARAM,
  154. ElementPtr& newmsg UNUSED_PARAM)
  155. {
  156. return (-1);
  157. }
  158. bool
  159. AuthSrvTest::MockSession::hasQueuedMsgs() {
  160. return (false);
  161. }
  162. int
  163. AuthSrvTest::MockSession::group_sendmsg(ElementPtr msg, string group,
  164. string instance UNUSED_PARAM,
  165. string to UNUSED_PARAM)
  166. {
  167. if (!send_ok_) {
  168. isc_throw(XfroutError, "mock session send is disabled for test");
  169. }
  170. sent_msg = msg;
  171. msg_destination = group;
  172. return (0);
  173. }
  174. bool
  175. AuthSrvTest::MockSession::group_recvmsg(ElementPtr& envelope UNUSED_PARAM,
  176. ElementPtr& msg,
  177. bool nonblock UNUSED_PARAM,
  178. int seq UNUSED_PARAM)
  179. {
  180. if (!receive_ok_) {
  181. isc_throw(XfroutError, "mock session receive is disabled for test");
  182. }
  183. msg = msg_;
  184. return (true);
  185. }
  186. void
  187. AuthSrvTest::MockXfroutClient::connect() {
  188. if (!connect_ok_) {
  189. isc_throw(XfroutError, "xfrout connection disabled for test");
  190. }
  191. is_connected_ = true;
  192. }
  193. void
  194. AuthSrvTest::MockXfroutClient::disconnect() {
  195. if (!disconnect_ok_) {
  196. isc_throw(XfroutError,
  197. "closing xfrout connection is disabled for test");
  198. }
  199. is_connected_ = false;
  200. }
  201. int
  202. AuthSrvTest::MockXfroutClient::sendXfroutRequestInfo(
  203. const int tcp_sock UNUSED_PARAM,
  204. const void* msg_data UNUSED_PARAM,
  205. const uint16_t msg_len UNUSED_PARAM)
  206. {
  207. if (!send_ok_) {
  208. isc_throw(XfroutError, "xfrout connection send is disabled for test");
  209. }
  210. return (0);
  211. }
  212. // These are flags to indicate whether the corresponding flag bit of the
  213. // DNS header is to be set in the test cases. (Note that the flag values
  214. // is irrelevant to their wire-format values)
  215. const unsigned int QR_FLAG = 0x1;
  216. const unsigned int AA_FLAG = 0x2;
  217. const unsigned int TC_FLAG = 0x4;
  218. const unsigned int RD_FLAG = 0x8;
  219. const unsigned int RA_FLAG = 0x10;
  220. const unsigned int AD_FLAG = 0x20;
  221. const unsigned int CD_FLAG = 0x40;
  222. void
  223. AuthSrvTest::createDataFromFile(const char* const datafile,
  224. const int protocol = IPPROTO_UDP)
  225. {
  226. delete io_message;
  227. data.clear();
  228. delete endpoint;
  229. endpoint = IOEndpoint::create(protocol,
  230. IOAddress(DEFAULT_REMOTE_ADDRESS), 5300);
  231. UnitTestUtil::readWireData(datafile, data);
  232. io_message = new IOMessage(&data[0], data.size(),
  233. protocol == IPPROTO_UDP ?
  234. IOSocket::getDummyUDPSocket() :
  235. IOSocket::getDummyTCPSocket(), *endpoint);
  236. }
  237. void
  238. AuthSrvTest::createRequestMessage(const Opcode& opcode,
  239. const Name& request_name,
  240. const RRClass& rrclass,
  241. const RRType& rrtype)
  242. {
  243. request_message.clear(Message::RENDER);
  244. request_message.setOpcode(opcode);
  245. request_message.setQid(default_qid);
  246. request_message.addQuestion(Question(request_name, rrclass, rrtype));
  247. }
  248. void
  249. AuthSrvTest::createRequestPacket(const Opcode& opcode,
  250. const Name& request_name,
  251. const RRClass& rrclass, const RRType& rrtype,
  252. const int protocol = IPPROTO_UDP)
  253. {
  254. createRequestMessage(opcode, request_name, rrclass, rrtype);
  255. createRequestPacket(protocol);
  256. }
  257. void
  258. AuthSrvTest::createRequestPacket(const int protocol = IPPROTO_UDP) {
  259. request_message.toWire(request_renderer);
  260. delete io_message;
  261. endpoint = IOEndpoint::create(protocol,
  262. IOAddress(DEFAULT_REMOTE_ADDRESS), 5300);
  263. io_message = new IOMessage(request_renderer.getData(),
  264. request_renderer.getLength(),
  265. protocol == IPPROTO_UDP ?
  266. IOSocket::getDummyUDPSocket() :
  267. IOSocket::getDummyTCPSocket(), *endpoint);
  268. }
  269. void
  270. headerCheck(const Message& message, const qid_t qid, const Rcode& rcode,
  271. const uint16_t opcodeval, const unsigned int flags,
  272. const unsigned int qdcount,
  273. const unsigned int ancount, const unsigned int nscount,
  274. const unsigned int arcount)
  275. {
  276. EXPECT_EQ(qid, message.getQid());
  277. EXPECT_EQ(rcode, message.getRcode());
  278. EXPECT_EQ(opcodeval, message.getOpcode().getCode());
  279. EXPECT_EQ((flags & QR_FLAG) != 0, message.getHeaderFlag(MessageFlag::QR()));
  280. EXPECT_EQ((flags & AA_FLAG) != 0, message.getHeaderFlag(MessageFlag::AA()));
  281. EXPECT_EQ((flags & TC_FLAG) != 0, message.getHeaderFlag(MessageFlag::TC()));
  282. EXPECT_EQ((flags & RA_FLAG) != 0, message.getHeaderFlag(MessageFlag::RA()));
  283. EXPECT_EQ((flags & RD_FLAG) != 0, message.getHeaderFlag(MessageFlag::RD()));
  284. EXPECT_EQ((flags & AD_FLAG) != 0, message.getHeaderFlag(MessageFlag::AD()));
  285. EXPECT_EQ((flags & CD_FLAG) != 0, message.getHeaderFlag(MessageFlag::CD()));
  286. EXPECT_EQ(qdcount, message.getRRCount(Section::QUESTION()));
  287. EXPECT_EQ(ancount, message.getRRCount(Section::ANSWER()));
  288. EXPECT_EQ(nscount, message.getRRCount(Section::AUTHORITY()));
  289. EXPECT_EQ(arcount, message.getRRCount(Section::ADDITIONAL()));
  290. }
  291. // Unsupported requests. Should result in NOTIMP.
  292. TEST_F(AuthSrvTest, unsupportedRequest) {
  293. for (unsigned int i = 0; i < 16; ++i) {
  294. // set Opcode to 'i', which iterators over all possible codes except
  295. // the standard query and notify
  296. if (i == Opcode::QUERY().getCode() ||
  297. i == Opcode::NOTIFY().getCode()) {
  298. continue;
  299. }
  300. createDataFromFile("simplequery_fromWire");
  301. data[2] = ((i << 3) & 0xff);
  302. parse_message.clear(Message::PARSE);
  303. EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
  304. response_renderer));
  305. headerCheck(parse_message, default_qid, Rcode::NOTIMP(), i, QR_FLAG,
  306. 0, 0, 0, 0);
  307. }
  308. }
  309. // Simple API check
  310. TEST_F(AuthSrvTest, verbose) {
  311. EXPECT_FALSE(server.getVerbose());
  312. server.setVerbose(true);
  313. EXPECT_TRUE(server.getVerbose());
  314. server.setVerbose(false);
  315. EXPECT_FALSE(server.getVerbose());
  316. }
  317. // Multiple questions. Should result in FORMERR.
  318. TEST_F(AuthSrvTest, multiQuestion) {
  319. createDataFromFile("multiquestion_fromWire");
  320. EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
  321. response_renderer));
  322. headerCheck(parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
  323. QR_FLAG, 2, 0, 0, 0);
  324. QuestionIterator qit = parse_message.beginQuestion();
  325. EXPECT_EQ(Name("example.com"), (*qit)->getName());
  326. EXPECT_EQ(RRClass::IN(), (*qit)->getClass());
  327. EXPECT_EQ(RRType::A(), (*qit)->getType());
  328. ++qit;
  329. EXPECT_EQ(Name("example.com"), (*qit)->getName());
  330. EXPECT_EQ(RRClass::IN(), (*qit)->getClass());
  331. EXPECT_EQ(RRType::AAAA(), (*qit)->getType());
  332. ++qit;
  333. EXPECT_TRUE(qit == parse_message.endQuestion());
  334. }
  335. // Incoming data doesn't even contain the complete header. Must be silently
  336. // dropped.
  337. TEST_F(AuthSrvTest, shortMessage) {
  338. createDataFromFile("shortmessage_fromWire");
  339. EXPECT_EQ(false, server.processMessage(*io_message, parse_message,
  340. response_renderer));
  341. }
  342. // Response messages. Must be silently dropped, whether it's a valid response
  343. // or malformed or could otherwise cause a protocol error.
  344. TEST_F(AuthSrvTest, response) {
  345. // A valid (although unusual) response
  346. createDataFromFile("simpleresponse_fromWire");
  347. EXPECT_EQ(false, server.processMessage(*io_message, parse_message,
  348. response_renderer));
  349. // A response with a broken question section. must be dropped rather than
  350. // returning FORMERR.
  351. createDataFromFile("shortresponse_fromWire");
  352. EXPECT_EQ(false, server.processMessage(*io_message, parse_message,
  353. response_renderer));
  354. // A response to iquery. must be dropped rather than returning NOTIMP.
  355. createDataFromFile("iqueryresponse_fromWire");
  356. EXPECT_EQ(false, server.processMessage(*io_message, parse_message,
  357. response_renderer));
  358. }
  359. // Query with a broken question
  360. TEST_F(AuthSrvTest, shortQuestion) {
  361. createDataFromFile("shortquestion_fromWire");
  362. EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
  363. response_renderer));
  364. // Since the query's question is broken, the question section of the
  365. // response should be empty.
  366. headerCheck(parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
  367. QR_FLAG, 0, 0, 0, 0);
  368. }
  369. // Query with a broken answer section
  370. TEST_F(AuthSrvTest, shortAnswer) {
  371. createDataFromFile("shortanswer_fromWire");
  372. EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
  373. response_renderer));
  374. // This is a bogus query, but question section is valid. So the response
  375. // should copy the question section.
  376. headerCheck(parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
  377. QR_FLAG, 1, 0, 0, 0);
  378. QuestionIterator qit = parse_message.beginQuestion();
  379. EXPECT_EQ(Name("example.com"), (*qit)->getName());
  380. EXPECT_EQ(RRClass::IN(), (*qit)->getClass());
  381. EXPECT_EQ(RRType::A(), (*qit)->getType());
  382. ++qit;
  383. EXPECT_TRUE(qit == parse_message.endQuestion());
  384. }
  385. // Query with unsupported version of EDNS.
  386. TEST_F(AuthSrvTest, ednsBadVers) {
  387. createDataFromFile("queryBadEDNS_fromWire");
  388. EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
  389. response_renderer));
  390. // The response must have an EDNS OPT RR in the additional section.
  391. // Note that the DNSSEC DO bit is cleared even if this bit in the query
  392. // is set. This is a limitation of the current implementation.
  393. headerCheck(parse_message, default_qid, Rcode::BADVERS(), opcode.getCode(),
  394. QR_FLAG, 1, 0, 0, 1);
  395. EXPECT_EQ(4096, parse_message.getUDPSize());
  396. EXPECT_FALSE(parse_message.isDNSSECSupported());
  397. }
  398. TEST_F(AuthSrvTest, AXFROverUDP) {
  399. // AXFR over UDP is invalid and should result in FORMERR.
  400. createRequestPacket(opcode, Name("example.com"), RRClass::IN(),
  401. RRType::AXFR(), IPPROTO_UDP);
  402. EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
  403. response_renderer));
  404. headerCheck(parse_message, default_qid, Rcode::FORMERR(), opcode.getCode(),
  405. QR_FLAG, 1, 0, 0, 0);
  406. }
  407. TEST_F(AuthSrvTest, AXFRSuccess) {
  408. EXPECT_FALSE(xfrout.isConnected());
  409. createRequestPacket(opcode, Name("example.com"), RRClass::IN(),
  410. RRType::AXFR(), IPPROTO_TCP);
  411. // On success, the AXFR query has been passed to a separate process,
  412. // so we shouldn't have to respond.
  413. EXPECT_EQ(false, server.processMessage(*io_message, parse_message,
  414. response_renderer));
  415. EXPECT_TRUE(xfrout.isConnected());
  416. }
  417. TEST_F(AuthSrvTest, AXFRConnectFail) {
  418. EXPECT_FALSE(xfrout.isConnected()); // check prerequisite
  419. xfrout.disableConnect();
  420. createRequestPacket(opcode, Name("example.com"), RRClass::IN(),
  421. RRType::AXFR(), IPPROTO_TCP);
  422. EXPECT_TRUE(server.processMessage(*io_message, parse_message,
  423. response_renderer));
  424. headerCheck(parse_message, default_qid, Rcode::SERVFAIL(),
  425. opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
  426. EXPECT_FALSE(xfrout.isConnected());
  427. }
  428. TEST_F(AuthSrvTest, AXFRSendFail) {
  429. // first send a valid query, making the connection with the xfr process
  430. // open.
  431. createRequestPacket(opcode, Name("example.com"), RRClass::IN(),
  432. RRType::AXFR(), IPPROTO_TCP);
  433. server.processMessage(*io_message, parse_message, response_renderer);
  434. EXPECT_TRUE(xfrout.isConnected());
  435. xfrout.disableSend();
  436. parse_message.clear(Message::PARSE);
  437. response_renderer.clear();
  438. createRequestPacket(opcode, Name("example.com"), RRClass::IN(),
  439. RRType::AXFR(), IPPROTO_TCP);
  440. EXPECT_TRUE(server.processMessage(*io_message, parse_message,
  441. response_renderer));
  442. headerCheck(parse_message, default_qid, Rcode::SERVFAIL(),
  443. opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
  444. // The connection should have been closed due to the send failure.
  445. EXPECT_FALSE(xfrout.isConnected());
  446. }
  447. TEST_F(AuthSrvTest, AXFRDisconnectFail) {
  448. // In our usage disconnect() shouldn't fail. So we'll see the exception
  449. // should it be thrown.
  450. xfrout.disableSend();
  451. xfrout.disableDisconnect();
  452. createRequestPacket(opcode, Name("example.com"), RRClass::IN(),
  453. RRType::AXFR(), IPPROTO_TCP);
  454. EXPECT_THROW(server.processMessage(*io_message, parse_message,
  455. response_renderer),
  456. XfroutError);
  457. EXPECT_TRUE(xfrout.isConnected());
  458. // XXX: we need to re-enable disconnect. otherwise an exception would be
  459. // thrown via the destructor of the server.
  460. xfrout.enableDisconnect();
  461. }
  462. TEST_F(AuthSrvTest, notify) {
  463. createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
  464. RRType::SOA());
  465. request_message.setHeaderFlag(MessageFlag::AA());
  466. createRequestPacket(IPPROTO_UDP);
  467. EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
  468. response_renderer));
  469. // An internal command message should have been created and sent to an
  470. // external module. Check them.
  471. EXPECT_EQ("Xfrin", notify_session.msg_destination);
  472. EXPECT_EQ("notify",
  473. notify_session.sent_msg->get("command")->get(0)->stringValue());
  474. ElementPtr notify_args = notify_session.sent_msg->get("command")->get(1);
  475. EXPECT_EQ("example.com.", notify_args->get("zone_name")->stringValue());
  476. EXPECT_EQ(DEFAULT_REMOTE_ADDRESS,
  477. notify_args->get("master")->stringValue());
  478. EXPECT_EQ("IN", notify_args->get("rrclass")->stringValue());
  479. // On success, the server should return a response to the notify.
  480. headerCheck(parse_message, default_qid, Rcode::NOERROR(),
  481. Opcode::NOTIFY().getCode(), QR_FLAG | AA_FLAG, 1, 0, 0, 0);
  482. // The question must be identical to that of the received notify
  483. ConstQuestionPtr question = *parse_message.beginQuestion();
  484. EXPECT_EQ(Name("example.com"), question->getName());
  485. EXPECT_EQ(RRClass::IN(), question->getClass());
  486. EXPECT_EQ(RRType::SOA(), question->getType());
  487. }
  488. TEST_F(AuthSrvTest, notifyForCHClass) {
  489. // Same as the previous test, but for the CH RRClass.
  490. createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::CH(),
  491. RRType::SOA());
  492. request_message.setHeaderFlag(MessageFlag::AA());
  493. createRequestPacket(IPPROTO_UDP);
  494. EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
  495. response_renderer));
  496. // Other conditions should be the same, so simply confirm the RR class is
  497. // set correctly.
  498. ElementPtr notify_args = notify_session.sent_msg->get("command")->get(1);
  499. EXPECT_EQ("CH", notify_args->get("rrclass")->stringValue());
  500. }
  501. TEST_F(AuthSrvTest, notifyEmptyQuestion) {
  502. request_message.clear(Message::RENDER);
  503. request_message.setOpcode(Opcode::NOTIFY());
  504. request_message.setHeaderFlag(MessageFlag::AA());
  505. request_message.setQid(default_qid);
  506. request_message.toWire(request_renderer);
  507. createRequestPacket(IPPROTO_UDP);
  508. EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
  509. response_renderer));
  510. headerCheck(parse_message, default_qid, Rcode::FORMERR(),
  511. Opcode::NOTIFY().getCode(), QR_FLAG, 0, 0, 0, 0);
  512. }
  513. TEST_F(AuthSrvTest, notifyMultiQuestions) {
  514. createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
  515. RRType::SOA());
  516. // add one more SOA question
  517. request_message.addQuestion(Question(Name("example.com"), RRClass::IN(),
  518. RRType::SOA()));
  519. request_message.setHeaderFlag(MessageFlag::AA());
  520. createRequestPacket(IPPROTO_UDP);
  521. EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
  522. response_renderer));
  523. headerCheck(parse_message, default_qid, Rcode::FORMERR(),
  524. Opcode::NOTIFY().getCode(), QR_FLAG, 2, 0, 0, 0);
  525. }
  526. TEST_F(AuthSrvTest, notifyNonSOAQuestion) {
  527. createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
  528. RRType::NS());
  529. request_message.setHeaderFlag(MessageFlag::AA());
  530. createRequestPacket(IPPROTO_UDP);
  531. EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
  532. response_renderer));
  533. headerCheck(parse_message, default_qid, Rcode::FORMERR(),
  534. Opcode::NOTIFY().getCode(), QR_FLAG, 1, 0, 0, 0);
  535. }
  536. TEST_F(AuthSrvTest, notifyWithoutAA) {
  537. // implicitly leave the AA bit off. our implementation will accept it.
  538. createRequestPacket(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
  539. RRType::SOA());
  540. EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
  541. response_renderer));
  542. headerCheck(parse_message, default_qid, Rcode::NOERROR(),
  543. Opcode::NOTIFY().getCode(), QR_FLAG | AA_FLAG, 1, 0, 0, 0);
  544. }
  545. TEST_F(AuthSrvTest, notifyWithErrorRcode) {
  546. createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
  547. RRType::SOA());
  548. request_message.setHeaderFlag(MessageFlag::AA());
  549. request_message.setRcode(Rcode::SERVFAIL());
  550. createRequestPacket(IPPROTO_UDP);
  551. EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
  552. response_renderer));
  553. headerCheck(parse_message, default_qid, Rcode::NOERROR(),
  554. Opcode::NOTIFY().getCode(), QR_FLAG | AA_FLAG, 1, 0, 0, 0);
  555. }
  556. TEST_F(AuthSrvTest, notifyWithoutSession) {
  557. server.setXfrinSession(NULL);
  558. createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
  559. RRType::SOA());
  560. request_message.setHeaderFlag(MessageFlag::AA());
  561. createRequestPacket(IPPROTO_UDP);
  562. // we simply ignore the notify and let it be resent if an internal error
  563. // happens.
  564. EXPECT_FALSE(server.processMessage(*io_message, parse_message,
  565. response_renderer));
  566. }
  567. TEST_F(AuthSrvTest, notifySendFail) {
  568. notify_session.disableSend();
  569. createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
  570. RRType::SOA());
  571. request_message.setHeaderFlag(MessageFlag::AA());
  572. createRequestPacket(IPPROTO_UDP);
  573. EXPECT_FALSE(server.processMessage(*io_message, parse_message,
  574. response_renderer));
  575. }
  576. TEST_F(AuthSrvTest, notifyReceiveFail) {
  577. notify_session.disableReceive();
  578. createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
  579. RRType::SOA());
  580. request_message.setHeaderFlag(MessageFlag::AA());
  581. createRequestPacket(IPPROTO_UDP);
  582. EXPECT_FALSE(server.processMessage(*io_message, parse_message,
  583. response_renderer));
  584. }
  585. TEST_F(AuthSrvTest, notifyWithBogusSessionMessage) {
  586. notify_session.setMessage(Element::fromJSON("{\"foo\": 1}"));
  587. createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
  588. RRType::SOA());
  589. request_message.setHeaderFlag(MessageFlag::AA());
  590. createRequestPacket(IPPROTO_UDP);
  591. EXPECT_FALSE(server.processMessage(*io_message, parse_message,
  592. response_renderer));
  593. }
  594. TEST_F(AuthSrvTest, notifyWithSessionMessageError) {
  595. notify_session.setMessage(
  596. Element::fromJSON("{\"result\": [1, \"FAIL\"]}"));
  597. createRequestMessage(Opcode::NOTIFY(), Name("example.com"), RRClass::IN(),
  598. RRType::SOA());
  599. request_message.setHeaderFlag(MessageFlag::AA());
  600. createRequestPacket(IPPROTO_UDP);
  601. EXPECT_FALSE(server.processMessage(*io_message, parse_message,
  602. response_renderer));
  603. }
  604. void
  605. updateConfig(AuthSrv* server, const char* const dbfile,
  606. const bool expect_success)
  607. {
  608. const ElementPtr config_answer =
  609. server->updateConfig(Element::fromJSON(dbfile));
  610. EXPECT_EQ(Element::map, config_answer->getType());
  611. EXPECT_TRUE(config_answer->contains("result"));
  612. const ElementPtr result = config_answer->get("result");
  613. EXPECT_EQ(Element::list, result->getType());
  614. EXPECT_EQ(expect_success ? 0 : 1, result->get(0)->intValue());
  615. }
  616. // Install a Sqlite3 data source with testing data.
  617. TEST_F(AuthSrvTest, updateConfig) {
  618. updateConfig(&server, CONFIG_TESTDB, true);
  619. // query for existent data in the installed data source. The resulting
  620. // response should have the AA flag on, and have an RR in each answer
  621. // and authority section.
  622. createDataFromFile("examplequery_fromWire");
  623. EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
  624. response_renderer));
  625. headerCheck(parse_message, default_qid, Rcode::NOERROR(), opcode.getCode(),
  626. QR_FLAG | AA_FLAG, 1, 1, 1, 0);
  627. }
  628. TEST_F(AuthSrvTest, datasourceFail) {
  629. updateConfig(&server, CONFIG_TESTDB, true);
  630. // This query will hit a corrupted entry of the data source (the zoneload
  631. // tool and the data source itself naively accept it). This will result
  632. // in a SERVFAIL response, and the answer and authority sections should
  633. // be empty.
  634. createDataFromFile("badExampleQuery_fromWire");
  635. EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
  636. response_renderer));
  637. headerCheck(parse_message, default_qid, Rcode::SERVFAIL(),
  638. opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
  639. }
  640. TEST_F(AuthSrvTest, updateConfigFail) {
  641. // First, load a valid data source.
  642. updateConfig(&server, CONFIG_TESTDB, true);
  643. // Next, try to update it with a non-existent one. This should fail.
  644. updateConfig(&server, BADCONFIG_TESTDB, false);
  645. // The original data source should still exist.
  646. createDataFromFile("examplequery_fromWire");
  647. EXPECT_EQ(true, server.processMessage(*io_message, parse_message,
  648. response_renderer));
  649. headerCheck(parse_message, default_qid, Rcode::NOERROR(), opcode.getCode(),
  650. QR_FLAG | AA_FLAG, 1, 1, 1, 0);
  651. }
  652. }