auth_srv_unittest.cc 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643
  1. // Copyright (C) 2010 Internet Systems Consortium, Inc. ("ISC")
  2. //
  3. // Permission to use, copy, modify, and/or distribute this software for any
  4. // purpose with or without fee is hereby granted, provided that the above
  5. // copyright notice and this permission notice appear in all copies.
  6. //
  7. // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
  8. // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
  9. // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
  10. // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
  11. // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
  12. // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
  13. // PERFORMANCE OF THIS SOFTWARE.
  14. // $Id$
  15. #include <config.h>
  16. #include <vector>
  17. #include <gtest/gtest.h>
  18. #include <dns/message.h>
  19. #include <dns/messagerenderer.h>
  20. #include <dns/name.h>
  21. #include <dns/rrclass.h>
  22. #include <dns/rrtype.h>
  23. #include <dns/rrttl.h>
  24. #include <dns/rdataclass.h>
  25. #include <datasrc/memory_datasrc.h>
  26. #include <auth/auth_srv.h>
  27. #include <auth/statistics.h>
  28. #include <dns/tests/unittest_util.h>
  29. #include <testutils/srv_test.h>
  30. using namespace std;
  31. using namespace isc::cc;
  32. using namespace isc::dns;
  33. using namespace isc::dns::rdata;
  34. using namespace isc::data;
  35. using namespace isc::xfr;
  36. using namespace asiolink;
  37. using namespace isc::testutils;
  38. using isc::UnitTestUtil;
  39. namespace {
  40. const char* const CONFIG_TESTDB =
  41. "{\"database_file\": \"" TEST_DATA_DIR "/example.sqlite3\"}";
  42. // The following file must be non existent and must be non"creatable" (see
  43. // the sqlite3 test).
  44. const char* const BADCONFIG_TESTDB =
  45. "{ \"database_file\": \"" TEST_DATA_DIR "/nodir/notexist\"}";
  46. class AuthSrvTest : public SrvTestBase {
  47. protected:
  48. AuthSrvTest() : server(true, xfrout), rrclass(RRClass::IN()) {
  49. server.setXfrinSession(&notify_session);
  50. server.setStatisticsSession(&statistics_session);
  51. }
  52. virtual void processMessage() {
  53. server.processMessage(*io_message, parse_message, response_obuffer,
  54. &dnsserv);
  55. }
  56. MockSession statistics_session;
  57. MockXfroutClient xfrout;
  58. AuthSrv server;
  59. const RRClass rrclass;
  60. vector<uint8_t> response_data;
  61. };
  62. // A helper function that builds a response to version.bind/TXT/CH that
  63. // should be identical to the response from our builtin (static) data source
  64. // by default. The resulting wire-format data will be stored in 'data'.
  65. void
  66. createBuiltinVersionResponse(const qid_t qid, vector<uint8_t>& data) {
  67. const Name version_name("version.bind");
  68. Message message(Message::RENDER);
  69. UnitTestUtil::createRequestMessage(message, Opcode::QUERY(),
  70. qid, version_name,
  71. RRClass::CH(), RRType::TXT());
  72. message.setHeaderFlag(Message::HEADERFLAG_QR);
  73. message.setHeaderFlag(Message::HEADERFLAG_AA);
  74. RRsetPtr rrset_version = RRsetPtr(new RRset(version_name, RRClass::CH(),
  75. RRType::TXT(), RRTTL(0)));
  76. rrset_version->addRdata(generic::TXT(PACKAGE_STRING));
  77. message.addRRset(Message::SECTION_ANSWER, rrset_version);
  78. RRsetPtr rrset_version_ns = RRsetPtr(new RRset(version_name, RRClass::CH(),
  79. RRType::NS(), RRTTL(0)));
  80. rrset_version_ns->addRdata(generic::NS(version_name));
  81. message.addRRset(Message::SECTION_AUTHORITY, rrset_version_ns);
  82. OutputBuffer obuffer(0);
  83. MessageRenderer renderer(obuffer);
  84. message.toWire(renderer);
  85. data.clear();
  86. data.assign(static_cast<const uint8_t*>(renderer.getData()),
  87. static_cast<const uint8_t*>(renderer.getData()) +
  88. renderer.getLength());
  89. }
  90. // In the following tests we confirm the response data is rendered in
  91. // wire format in the expected way.
  92. // The most primitive check: checking the result of the processMessage()
  93. // method
  94. TEST_F(AuthSrvTest, builtInQuery) {
  95. UnitTestUtil::createRequestMessage(request_message, Opcode::QUERY(),
  96. default_qid, Name("version.bind"),
  97. RRClass::CH(), RRType::TXT());
  98. createRequestPacket(request_message, IPPROTO_UDP);
  99. server.processMessage(*io_message, parse_message, response_obuffer,
  100. &dnsserv);
  101. createBuiltinVersionResponse(default_qid, response_data);
  102. EXPECT_PRED_FORMAT4(UnitTestUtil::matchWireData,
  103. response_obuffer->getData(),
  104. response_obuffer->getLength(),
  105. &response_data[0], response_data.size());
  106. }
  107. // Same test emulating the UDPServer class behavior (defined in libasiolink).
  108. // This is not a good test in that it assumes internal implementation details
  109. // of UDPServer, but we've encountered a regression due to the introduction
  110. // of that class, so we add a test for that case to prevent such a regression
  111. // in future.
  112. // Besides, the generalization of UDPServer is probably too much for the
  113. // authoritative only server in terms of performance, and it's quite likely
  114. // we need to drop it for the authoritative server implementation.
  115. // At that point we can drop this test, too.
  116. TEST_F(AuthSrvTest, builtInQueryViaDNSServer) {
  117. UnitTestUtil::createRequestMessage(request_message, Opcode::QUERY(),
  118. default_qid, Name("version.bind"),
  119. RRClass::CH(), RRType::TXT());
  120. createRequestPacket(request_message, IPPROTO_UDP);
  121. (*server.getDNSLookupProvider())(*io_message, parse_message,
  122. response_obuffer, &dnsserv);
  123. (*server.getDNSAnswerProvider())(*io_message, parse_message,
  124. response_obuffer);
  125. createBuiltinVersionResponse(default_qid, response_data);
  126. EXPECT_PRED_FORMAT4(UnitTestUtil::matchWireData,
  127. response_obuffer->getData(),
  128. response_obuffer->getLength(),
  129. &response_data[0], response_data.size());
  130. }
  131. // Same type of test as builtInQueryViaDNSServer but for an error response.
  132. TEST_F(AuthSrvTest, iqueryViaDNSServer) {
  133. createDataFromFile("iquery_fromWire.wire");
  134. (*server.getDNSLookupProvider())(*io_message, parse_message,
  135. response_obuffer, &dnsserv);
  136. (*server.getDNSAnswerProvider())(*io_message, parse_message,
  137. response_obuffer);
  138. UnitTestUtil::readWireData("iquery_response_fromWire.wire",
  139. response_data);
  140. EXPECT_PRED_FORMAT4(UnitTestUtil::matchWireData,
  141. response_obuffer->getData(),
  142. response_obuffer->getLength(),
  143. &response_data[0], response_data.size());
  144. }
  145. // Unsupported requests. Should result in NOTIMP.
  146. TEST_F(AuthSrvTest, unsupportedRequest) {
  147. unsupportedRequest();
  148. }
  149. // Simple API check
  150. TEST_F(AuthSrvTest, verbose) {
  151. EXPECT_FALSE(server.getVerbose());
  152. server.setVerbose(true);
  153. EXPECT_TRUE(server.getVerbose());
  154. server.setVerbose(false);
  155. EXPECT_FALSE(server.getVerbose());
  156. }
  157. // Multiple questions. Should result in FORMERR.
  158. TEST_F(AuthSrvTest, multiQuestion) {
  159. multiQuestion();
  160. }
  161. // Incoming data doesn't even contain the complete header. Must be silently
  162. // dropped.
  163. TEST_F(AuthSrvTest, shortMessage) {
  164. shortMessage();
  165. }
  166. // Response messages. Must be silently dropped, whether it's a valid response
  167. // or malformed or could otherwise cause a protocol error.
  168. TEST_F(AuthSrvTest, response) {
  169. response();
  170. }
  171. // Query with a broken question
  172. TEST_F(AuthSrvTest, shortQuestion) {
  173. shortQuestion();
  174. }
  175. // Query with a broken answer section
  176. TEST_F(AuthSrvTest, shortAnswer) {
  177. shortAnswer();
  178. }
  179. // Query with unsupported version of EDNS.
  180. TEST_F(AuthSrvTest, ednsBadVers) {
  181. ednsBadVers();
  182. }
  183. TEST_F(AuthSrvTest, AXFROverUDP) {
  184. axfrOverUDP();
  185. }
  186. TEST_F(AuthSrvTest, AXFRSuccess) {
  187. EXPECT_FALSE(xfrout.isConnected());
  188. UnitTestUtil::createRequestMessage(request_message, opcode, default_qid,
  189. Name("example.com"), RRClass::IN(), RRType::AXFR());
  190. createRequestPacket(request_message, IPPROTO_TCP);
  191. // On success, the AXFR query has been passed to a separate process,
  192. // so we shouldn't have to respond.
  193. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  194. EXPECT_FALSE(dnsserv.hasAnswer());
  195. EXPECT_TRUE(xfrout.isConnected());
  196. }
  197. TEST_F(AuthSrvTest, AXFRConnectFail) {
  198. EXPECT_FALSE(xfrout.isConnected()); // check prerequisite
  199. xfrout.disableConnect();
  200. UnitTestUtil::createRequestMessage(request_message, opcode, default_qid,
  201. Name("example.com"), RRClass::IN(), RRType::AXFR());
  202. createRequestPacket(request_message, IPPROTO_TCP);
  203. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  204. EXPECT_TRUE(dnsserv.hasAnswer());
  205. headerCheck(*parse_message, default_qid, Rcode::SERVFAIL(),
  206. opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
  207. EXPECT_FALSE(xfrout.isConnected());
  208. }
  209. TEST_F(AuthSrvTest, AXFRSendFail) {
  210. // first send a valid query, making the connection with the xfr process
  211. // open.
  212. UnitTestUtil::createRequestMessage(request_message, opcode, default_qid,
  213. Name("example.com"), RRClass::IN(), RRType::AXFR());
  214. createRequestPacket(request_message, IPPROTO_TCP);
  215. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  216. EXPECT_TRUE(xfrout.isConnected());
  217. xfrout.disableSend();
  218. parse_message->clear(Message::PARSE);
  219. response_obuffer->clear();
  220. UnitTestUtil::createRequestMessage(request_message, opcode, default_qid,
  221. Name("example.com"), RRClass::IN(), RRType::AXFR());
  222. createRequestPacket(request_message, IPPROTO_TCP);
  223. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  224. EXPECT_TRUE(dnsserv.hasAnswer());
  225. headerCheck(*parse_message, default_qid, Rcode::SERVFAIL(),
  226. opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
  227. // The connection should have been closed due to the send failure.
  228. EXPECT_FALSE(xfrout.isConnected());
  229. }
  230. TEST_F(AuthSrvTest, AXFRDisconnectFail) {
  231. // In our usage disconnect() shouldn't fail. So we'll see the exception
  232. // should it be thrown.
  233. xfrout.disableSend();
  234. xfrout.disableDisconnect();
  235. UnitTestUtil::createRequestMessage(request_message, opcode, default_qid,
  236. Name("example.com"), RRClass::IN(), RRType::AXFR());
  237. createRequestPacket(request_message, IPPROTO_TCP);
  238. EXPECT_THROW(server.processMessage(*io_message, parse_message,
  239. response_obuffer, &dnsserv),
  240. XfroutError);
  241. EXPECT_TRUE(xfrout.isConnected());
  242. // XXX: we need to re-enable disconnect. otherwise an exception would be
  243. // thrown via the destructor of the server.
  244. xfrout.enableDisconnect();
  245. }
  246. TEST_F(AuthSrvTest, notify) {
  247. UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
  248. Name("example.com"), RRClass::IN(), RRType::SOA());
  249. request_message.setHeaderFlag(Message::HEADERFLAG_AA);
  250. createRequestPacket(request_message, IPPROTO_UDP);
  251. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  252. EXPECT_TRUE(dnsserv.hasAnswer());
  253. // An internal command message should have been created and sent to an
  254. // external module. Check them.
  255. EXPECT_EQ("Zonemgr", notify_session.getMessageDest());
  256. EXPECT_EQ("notify",
  257. notify_session.getSentMessage()->get("command")->get(0)->stringValue());
  258. ConstElementPtr notify_args =
  259. notify_session.getSentMessage()->get("command")->get(1);
  260. EXPECT_EQ("example.com.", notify_args->get("zone_name")->stringValue());
  261. EXPECT_EQ(DEFAULT_REMOTE_ADDRESS,
  262. notify_args->get("master")->stringValue());
  263. EXPECT_EQ("IN", notify_args->get("zone_class")->stringValue());
  264. // On success, the server should return a response to the notify.
  265. headerCheck(*parse_message, default_qid, Rcode::NOERROR(),
  266. Opcode::NOTIFY().getCode(), QR_FLAG | AA_FLAG, 1, 0, 0, 0);
  267. // The question must be identical to that of the received notify
  268. ConstQuestionPtr question = *parse_message->beginQuestion();
  269. EXPECT_EQ(Name("example.com"), question->getName());
  270. EXPECT_EQ(RRClass::IN(), question->getClass());
  271. EXPECT_EQ(RRType::SOA(), question->getType());
  272. }
  273. TEST_F(AuthSrvTest, notifyForCHClass) {
  274. // Same as the previous test, but for the CH RRClass.
  275. UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
  276. Name("example.com"), RRClass::CH(), RRType::SOA());
  277. request_message.setHeaderFlag(Message::HEADERFLAG_AA);
  278. createRequestPacket(request_message, IPPROTO_UDP);
  279. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  280. EXPECT_TRUE(dnsserv.hasAnswer());
  281. // Other conditions should be the same, so simply confirm the RR class is
  282. // set correctly.
  283. ConstElementPtr notify_args =
  284. notify_session.getSentMessage()->get("command")->get(1);
  285. EXPECT_EQ("CH", notify_args->get("zone_class")->stringValue());
  286. }
  287. TEST_F(AuthSrvTest, notifyEmptyQuestion) {
  288. request_message.clear(Message::RENDER);
  289. request_message.setOpcode(Opcode::NOTIFY());
  290. request_message.setRcode(Rcode::NOERROR());
  291. request_message.setHeaderFlag(Message::HEADERFLAG_AA);
  292. request_message.setQid(default_qid);
  293. request_message.toWire(request_renderer);
  294. createRequestPacket(request_message, IPPROTO_UDP);
  295. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  296. EXPECT_TRUE(dnsserv.hasAnswer());
  297. headerCheck(*parse_message, default_qid, Rcode::FORMERR(),
  298. Opcode::NOTIFY().getCode(), QR_FLAG, 0, 0, 0, 0);
  299. }
  300. TEST_F(AuthSrvTest, notifyMultiQuestions) {
  301. UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
  302. Name("example.com"), RRClass::IN(), RRType::SOA());
  303. // add one more SOA question
  304. request_message.addQuestion(Question(Name("example.com"), RRClass::IN(),
  305. RRType::SOA()));
  306. request_message.setHeaderFlag(Message::HEADERFLAG_AA);
  307. createRequestPacket(request_message, IPPROTO_UDP);
  308. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  309. EXPECT_TRUE(dnsserv.hasAnswer());
  310. headerCheck(*parse_message, default_qid, Rcode::FORMERR(),
  311. Opcode::NOTIFY().getCode(), QR_FLAG, 2, 0, 0, 0);
  312. }
  313. TEST_F(AuthSrvTest, notifyNonSOAQuestion) {
  314. UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
  315. Name("example.com"), RRClass::IN(), RRType::NS());
  316. request_message.setHeaderFlag(Message::HEADERFLAG_AA);
  317. createRequestPacket(request_message, IPPROTO_UDP);
  318. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  319. EXPECT_TRUE(dnsserv.hasAnswer());
  320. headerCheck(*parse_message, default_qid, Rcode::FORMERR(),
  321. Opcode::NOTIFY().getCode(), QR_FLAG, 1, 0, 0, 0);
  322. }
  323. TEST_F(AuthSrvTest, notifyWithoutAA) {
  324. // implicitly leave the AA bit off. our implementation will accept it.
  325. UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
  326. Name("example.com"), RRClass::IN(), RRType::SOA());
  327. createRequestPacket(request_message, IPPROTO_UDP);
  328. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  329. EXPECT_TRUE(dnsserv.hasAnswer());
  330. headerCheck(*parse_message, default_qid, Rcode::NOERROR(),
  331. Opcode::NOTIFY().getCode(), QR_FLAG | AA_FLAG, 1, 0, 0, 0);
  332. }
  333. TEST_F(AuthSrvTest, notifyWithErrorRcode) {
  334. UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
  335. Name("example.com"), RRClass::IN(), RRType::SOA());
  336. request_message.setHeaderFlag(Message::HEADERFLAG_AA);
  337. request_message.setRcode(Rcode::SERVFAIL());
  338. createRequestPacket(request_message, IPPROTO_UDP);
  339. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  340. EXPECT_TRUE(dnsserv.hasAnswer());
  341. headerCheck(*parse_message, default_qid, Rcode::NOERROR(),
  342. Opcode::NOTIFY().getCode(), QR_FLAG | AA_FLAG, 1, 0, 0, 0);
  343. }
  344. TEST_F(AuthSrvTest, notifyWithoutSession) {
  345. server.setXfrinSession(NULL);
  346. UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
  347. Name("example.com"), RRClass::IN(), RRType::SOA());
  348. request_message.setHeaderFlag(Message::HEADERFLAG_AA);
  349. createRequestPacket(request_message, IPPROTO_UDP);
  350. // we simply ignore the notify and let it be resent if an internal error
  351. // happens.
  352. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  353. EXPECT_FALSE(dnsserv.hasAnswer());
  354. }
  355. TEST_F(AuthSrvTest, notifySendFail) {
  356. notify_session.disableSend();
  357. UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
  358. Name("example.com"), RRClass::IN(), RRType::SOA());
  359. request_message.setHeaderFlag(Message::HEADERFLAG_AA);
  360. createRequestPacket(request_message, IPPROTO_UDP);
  361. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  362. EXPECT_FALSE(dnsserv.hasAnswer());
  363. }
  364. TEST_F(AuthSrvTest, notifyReceiveFail) {
  365. notify_session.disableReceive();
  366. UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
  367. Name("example.com"), RRClass::IN(), RRType::SOA());
  368. request_message.setHeaderFlag(Message::HEADERFLAG_AA);
  369. createRequestPacket(request_message, IPPROTO_UDP);
  370. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  371. EXPECT_FALSE(dnsserv.hasAnswer());
  372. }
  373. TEST_F(AuthSrvTest, notifyWithBogusSessionMessage) {
  374. notify_session.setMessage(Element::fromJSON("{\"foo\": 1}"));
  375. UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
  376. Name("example.com"), RRClass::IN(), RRType::SOA());
  377. request_message.setHeaderFlag(Message::HEADERFLAG_AA);
  378. createRequestPacket(request_message, IPPROTO_UDP);
  379. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  380. EXPECT_FALSE(dnsserv.hasAnswer());
  381. }
  382. TEST_F(AuthSrvTest, notifyWithSessionMessageError) {
  383. notify_session.setMessage(
  384. Element::fromJSON("{\"result\": [1, \"FAIL\"]}"));
  385. UnitTestUtil::createRequestMessage(request_message, Opcode::NOTIFY(), default_qid,
  386. Name("example.com"), RRClass::IN(), RRType::SOA());
  387. request_message.setHeaderFlag(Message::HEADERFLAG_AA);
  388. createRequestPacket(request_message, IPPROTO_UDP);
  389. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  390. EXPECT_FALSE(dnsserv.hasAnswer());
  391. }
  392. void
  393. updateConfig(AuthSrv* server, const char* const config_data,
  394. const bool expect_success)
  395. {
  396. ConstElementPtr config_answer =
  397. server->updateConfig(Element::fromJSON(config_data));
  398. EXPECT_EQ(Element::map, config_answer->getType());
  399. EXPECT_TRUE(config_answer->contains("result"));
  400. ConstElementPtr result = config_answer->get("result");
  401. EXPECT_EQ(Element::list, result->getType());
  402. EXPECT_EQ(expect_success ? 0 : 1, result->get(0)->intValue());
  403. }
  404. // Install a Sqlite3 data source with testing data.
  405. TEST_F(AuthSrvTest, updateConfig) {
  406. updateConfig(&server, CONFIG_TESTDB, true);
  407. // query for existent data in the installed data source. The resulting
  408. // response should have the AA flag on, and have an RR in each answer
  409. // and authority section.
  410. createDataFromFile("examplequery_fromWire.wire");
  411. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  412. EXPECT_TRUE(dnsserv.hasAnswer());
  413. headerCheck(*parse_message, default_qid, Rcode::NOERROR(), opcode.getCode(),
  414. QR_FLAG | AA_FLAG, 1, 1, 1, 0);
  415. }
  416. TEST_F(AuthSrvTest, datasourceFail) {
  417. updateConfig(&server, CONFIG_TESTDB, true);
  418. // This query will hit a corrupted entry of the data source (the zoneload
  419. // tool and the data source itself naively accept it). This will result
  420. // in a SERVFAIL response, and the answer and authority sections should
  421. // be empty.
  422. createDataFromFile("badExampleQuery_fromWire.wire");
  423. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  424. EXPECT_TRUE(dnsserv.hasAnswer());
  425. headerCheck(*parse_message, default_qid, Rcode::SERVFAIL(),
  426. opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
  427. }
  428. TEST_F(AuthSrvTest, updateConfigFail) {
  429. // First, load a valid data source.
  430. updateConfig(&server, CONFIG_TESTDB, true);
  431. // Next, try to update it with a non-existent one. This should fail.
  432. updateConfig(&server, BADCONFIG_TESTDB, false);
  433. // The original data source should still exist.
  434. createDataFromFile("examplequery_fromWire.wire");
  435. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  436. EXPECT_TRUE(dnsserv.hasAnswer());
  437. headerCheck(*parse_message, default_qid, Rcode::NOERROR(), opcode.getCode(),
  438. QR_FLAG | AA_FLAG, 1, 1, 1, 0);
  439. }
  440. TEST_F(AuthSrvTest, updateWithMemoryDataSrc) {
  441. // Test configuring memory data source. Detailed test cases are covered
  442. // in the configuration tests. We only check the AuthSrv interface here.
  443. // By default memory data source isn't enabled
  444. EXPECT_EQ(AuthSrv::MemoryDataSrcPtr(), server.getMemoryDataSrc(rrclass));
  445. updateConfig(&server,
  446. "{\"datasources\": [{\"type\": \"memory\"}]}", true);
  447. // after successful configuration, we should have one (with empty zoneset).
  448. ASSERT_NE(AuthSrv::MemoryDataSrcPtr(), server.getMemoryDataSrc(rrclass));
  449. EXPECT_EQ(0, server.getMemoryDataSrc(rrclass)->getZoneCount());
  450. // The memory data source is empty, should return REFUSED rcode.
  451. createDataFromFile("examplequery_fromWire.wire");
  452. server.processMessage(*io_message, parse_message, response_obuffer,
  453. &dnsserv);
  454. EXPECT_TRUE(dnsserv.hasAnswer());
  455. headerCheck(*parse_message, default_qid, Rcode::REFUSED(),
  456. opcode.getCode(), QR_FLAG, 1, 0, 0, 0);
  457. }
  458. TEST_F(AuthSrvTest, chQueryWithMemoryDataSrc) {
  459. // Configure memory data source for class IN
  460. updateConfig(&server, "{\"datasources\": "
  461. "[{\"class\": \"IN\", \"type\": \"memory\"}]}", true);
  462. // This shouldn't affect the result of class CH query
  463. UnitTestUtil::createRequestMessage(request_message, Opcode::QUERY(),
  464. default_qid, Name("version.bind"),
  465. RRClass::CH(), RRType::TXT());
  466. createRequestPacket(request_message, IPPROTO_UDP);
  467. server.processMessage(*io_message, parse_message, response_obuffer,
  468. &dnsserv);
  469. EXPECT_TRUE(dnsserv.hasAnswer());
  470. headerCheck(*parse_message, default_qid, Rcode::NOERROR(),
  471. opcode.getCode(), QR_FLAG | AA_FLAG, 1, 1, 1, 0);
  472. }
  473. TEST_F(AuthSrvTest, cacheSlots) {
  474. // simple check for the get/set operations
  475. server.setCacheSlots(10); // 10 = arbitrary choice
  476. EXPECT_EQ(10, server.getCacheSlots());
  477. // 0 is a valid size
  478. server.setCacheSlots(0);
  479. EXPECT_EQ(00, server.getCacheSlots());
  480. }
  481. // Submit UDP normal query and check query counter
  482. TEST_F(AuthSrvTest, queryCounterUDPNormal) {
  483. // The counter should be initialized to 0.
  484. EXPECT_EQ(0, server.getCounter(AuthCounters::COUNTER_UDP_QUERY));
  485. // Create UDP message and process.
  486. UnitTestUtil::createRequestMessage(request_message, Opcode::QUERY(),
  487. default_qid, Name("example.com"),
  488. RRClass::IN(), RRType::NS());
  489. createRequestPacket(request_message, IPPROTO_UDP);
  490. server.processMessage(*io_message, parse_message, response_obuffer,
  491. &dnsserv);
  492. // After processing UDP query, the counter should be 1.
  493. EXPECT_EQ(1, server.getCounter(AuthCounters::COUNTER_UDP_QUERY));
  494. }
  495. // Submit TCP normal query and check query counter
  496. TEST_F(AuthSrvTest, queryCounterTCPNormal) {
  497. // The counter should be initialized to 0.
  498. EXPECT_EQ(0, server.getCounter(AuthCounters::COUNTER_TCP_QUERY));
  499. // Create TCP message and process.
  500. UnitTestUtil::createRequestMessage(request_message, Opcode::QUERY(),
  501. default_qid, Name("example.com"),
  502. RRClass::IN(), RRType::NS());
  503. createRequestPacket(request_message, IPPROTO_TCP);
  504. server.processMessage(*io_message, parse_message, response_obuffer,
  505. &dnsserv);
  506. // After processing TCP query, the counter should be 1.
  507. EXPECT_EQ(1, server.getCounter(AuthCounters::COUNTER_TCP_QUERY));
  508. }
  509. // Submit TCP AXFR query and check query counter
  510. TEST_F(AuthSrvTest, queryCounterTCPAXFR) {
  511. // The counter should be initialized to 0.
  512. EXPECT_EQ(0, server.getCounter(AuthCounters::COUNTER_TCP_QUERY));
  513. UnitTestUtil::createRequestMessage(request_message, opcode, default_qid,
  514. Name("example.com"), RRClass::IN(), RRType::AXFR());
  515. createRequestPacket(request_message, IPPROTO_TCP);
  516. // On success, the AXFR query has been passed to a separate process,
  517. // so we shouldn't have to respond.
  518. server.processMessage(*io_message, parse_message, response_obuffer, &dnsserv);
  519. // After processing TCP AXFR query, the counter should be 1.
  520. EXPECT_EQ(1, server.getCounter(AuthCounters::COUNTER_TCP_QUERY));
  521. }
  522. // class for queryCounterUnexpected test
  523. // getProtocol() returns IPPROTO_IP
  524. class DummyUnknownSocket : public IOSocket {
  525. public:
  526. DummyUnknownSocket() {}
  527. virtual int getNative() const { return (0); }
  528. virtual int getProtocol() const { return (IPPROTO_IP); }
  529. };
  530. // function for queryCounterUnexpected test
  531. // returns a reference to a static object of DummyUnknownSocket
  532. IOSocket&
  533. getDummyUnknownSocket() {
  534. static DummyUnknownSocket socket;
  535. return (socket);
  536. }
  537. // Submit unexpected type of query and check it throws isc::Unexpected
  538. TEST_F(AuthSrvTest, queryCounterUnexpected) {
  539. // This code isn't exception safe, but we'd rather keep the code
  540. // simpler and more readable as this is only for tests and if it throws
  541. // the program would immediately terminate anyway.
  542. // Create UDP query packet.
  543. UnitTestUtil::createRequestMessage(request_message, Opcode::QUERY(),
  544. default_qid, Name("example.com"),
  545. RRClass::IN(), RRType::NS());
  546. createRequestPacket(request_message, IPPROTO_UDP);
  547. // Modify the message.
  548. delete io_message;
  549. endpoint = IOEndpoint::create(IPPROTO_UDP,
  550. IOAddress(DEFAULT_REMOTE_ADDRESS), 5300);
  551. io_message = new IOMessage(request_renderer.getData(),
  552. request_renderer.getLength(),
  553. getDummyUnknownSocket(), *endpoint);
  554. EXPECT_THROW(server.processMessage(*io_message, parse_message,
  555. response_obuffer, &dnsserv),
  556. isc::Unexpected);
  557. }
  558. }