1 /* $NetBSD: t_master.c,v 1.6 2014/12/10 04:37:53 christos Exp $ */
2
3 /*
4 * Copyright (C) 2004, 2005, 2007, 2009, 2011, 2013 Internet Systems Consortium, Inc. ("ISC")
5 * Copyright (C) 1998-2001, 2003 Internet Software Consortium.
6 *
7 * Permission to use, copy, modify, and/or distribute this software for any
8 * purpose with or without fee is hereby granted, provided that the above
9 * copyright notice and this permission notice appear in all copies.
10 *
11 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
12 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
13 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
14 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
15 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
16 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
17 * PERFORMANCE OF THIS SOFTWARE.
18 */
19
20 /* Id: t_master.c,v 1.41 2011/03/12 04:59:46 tbox Exp */
21
22 #include <config.h>
23
24 #include <ctype.h>
25 #include <stdlib.h>
26
27 #include <isc/buffer.h>
28 #include <isc/mem.h>
29 #include <isc/string.h> /* Required for HP/UX (and others?) */
30 #include <isc/util.h>
31
32 #include <dns/callbacks.h>
33 #include <dns/master.h>
34 #include <dns/name.h>
35 #include <dns/rdataclass.h>
36 #include <dns/rdataset.h>
37 #include <dns/result.h>
38
39 #include <tests/t_api.h>
40
41 #define BUFLEN 255
42 #define BIGBUFLEN (64 * 1024)
43
44 static isc_result_t
45 t1_add_callback(void *arg, dns_name_t *owner, dns_rdataset_t *dataset);
46
47 isc_mem_t *T1_mctx;
48 char *Tokens[T_MAXTOKS + 1];
49
50 static isc_result_t
t1_add_callback(void * arg,dns_name_t * owner,dns_rdataset_t * dataset)51 t1_add_callback(void *arg, dns_name_t *owner, dns_rdataset_t *dataset) {
52 char buf[BIGBUFLEN];
53 isc_buffer_t target;
54 isc_result_t result;
55
56 UNUSED(arg);
57
58 isc_buffer_init(&target, buf, BIGBUFLEN);
59 result = dns_rdataset_totext(dataset, owner, ISC_FALSE, ISC_FALSE,
60 &target);
61 if (result != ISC_R_SUCCESS)
62 t_info("dns_rdataset_totext: %s\n", dns_result_totext(result));
63
64 return(result);
65 }
66
67 static int
test_master(char * testfile,char * origin,char * class,isc_result_t exp_result)68 test_master(char *testfile, char *origin, char *class, isc_result_t exp_result)
69 {
70 int result;
71 int len;
72 isc_result_t isc_result;
73 isc_result_t dns_result;
74 dns_name_t dns_origin;
75 isc_buffer_t source;
76 isc_buffer_t target;
77 unsigned char name_buf[BUFLEN];
78 dns_rdatacallbacks_t callbacks;
79 dns_rdataclass_t rdataclass;
80 isc_textregion_t textregion;
81
82 if (T1_mctx == NULL)
83 isc_result = isc_mem_create(0, 0, &T1_mctx);
84 else
85 isc_result = ISC_R_SUCCESS;
86 if (isc_result != ISC_R_SUCCESS) {
87 t_info("isc_mem_create failed %d\n", isc_result);
88 return(T_UNRESOLVED);
89 }
90
91 len = strlen(origin);
92 isc_buffer_init(&source, origin, len);
93 isc_buffer_add(&source, len);
94 isc_buffer_setactive(&source, len);
95 isc_buffer_init(&target, name_buf, BUFLEN);
96 dns_name_init(&dns_origin, NULL);
97 dns_result = dns_name_fromtext(&dns_origin, &source, dns_rootname,
98 0, &target);
99 if (dns_result != ISC_R_SUCCESS) {
100 t_info("dns_name_fromtext failed %s\n",
101 dns_result_totext(dns_result));
102 return(T_UNRESOLVED);
103 }
104
105 dns_rdatacallbacks_init_stdio(&callbacks);
106 callbacks.add = t1_add_callback;
107
108 textregion.base = class;
109 textregion.length = strlen(class);
110
111 dns_result = dns_rdataclass_fromtext(&rdataclass, &textregion);
112 if (dns_result != ISC_R_SUCCESS) {
113 t_info("dns_rdataclass_fromtext failed %s\n",
114 dns_result_totext(dns_result));
115 return(T_UNRESOLVED);
116 }
117
118 dns_result = dns_master_loadfile( testfile,
119 &dns_origin,
120 &dns_origin,
121 rdataclass,
122 ISC_TRUE,
123 &callbacks,
124 T1_mctx);
125
126 if (dns_result == exp_result)
127 result = T_PASS;
128 else {
129 t_info("dns_master_loadfile: got %s, expected %s\n",
130 dns_result_totext(dns_result),
131 dns_result_totext(exp_result));
132 result = T_FAIL;
133 }
134 return(result);
135 }
136
137 static int
test_master_x(const char * filename)138 test_master_x(const char *filename) {
139 FILE *fp;
140 char *p;
141 int line;
142 int cnt;
143 int result;
144
145 result = T_UNRESOLVED;
146
147 fp = fopen(filename, "r");
148 if (fp != NULL) {
149 line = 0;
150 while ((p = t_fgetbs(fp)) != NULL) {
151
152 ++line;
153
154 /*
155 * Skip comment lines.
156 */
157 if ((isspace(*p & 0xff)) || (*p == '#')) {
158 (void)free(p);
159 continue;
160 }
161
162 /*
163 * Name of data file, origin, zclass, expected result.
164 */
165 cnt = t_bustline(p, Tokens);
166 if (cnt == 4) {
167 result = test_master(Tokens[0], Tokens[1],
168 Tokens[2],
169 t_dns_result_fromtext(Tokens[3]));
170 } else {
171 t_info("bad format in %s at line %d\n",
172 filename, line);
173 }
174
175 (void)free(p);
176 }
177 (void)fclose(fp);
178 } else {
179 t_info("Missing datafile %s\n", filename);
180 }
181 return(result);
182 }
183
184 static const char *a1 = "dns_master_loadfile loads a valid master file and "
185 "returns ISC_R_SUCCESS";
186 static void
t1(void)187 t1(void) {
188 int result;
189 t_assert("dns_master_loadfile", 1, T_REQUIRED, "%s", a1);
190 result = test_master_x("dns_master_load_1_data");
191 t_result(result);
192 }
193
194 static const char *a2 =
195 "dns_master_loadfile returns ISC_R_UNEXPECTEDEND when the "
196 "masterfile input ends unexpectedly";
197
198 static void
t2(void)199 t2(void) {
200 int result;
201 t_assert("dns_master_loadfile", 2, T_REQUIRED, "%s", a2);
202 result = test_master_x("dns_master_load_2_data");
203 t_result(result);
204 }
205
206 static const char *a3 = "dns_master_loadfile returns DNS_R_NOOWNER when the "
207 "an ownername is not specified";
208
209 static void
t3()210 t3() {
211 int result;
212 t_assert("dns_master_loadfile", 3, T_REQUIRED, "%s", a3);
213 result = test_master_x("dns_master_load_3_data");
214 t_result(result);
215 }
216
217 static const char *a4 = "dns_master_loadfile accepts broken zone files "
218 "where the first record has an undefined TTL, "
219 "as long as it is a SOA";
220
221 static void
t4()222 t4() {
223 int result;
224 t_assert("dns_master_loadfile", 4, T_REQUIRED, "%s", a4);
225 result = test_master_x("dns_master_load_4_data");
226 t_result(result);
227 }
228
229 static const char *a5 = "dns_master_loadfile returns DNS_R_BADCLASS when the "
230 "the record class did not match the zone class";
231
232 static void
t5()233 t5() {
234 int result;
235
236 t_assert("dns_master_loadfile", 5, T_REQUIRED, "%s", a5);
237 result = test_master_x("dns_master_load_5_data");
238
239 t_result(result);
240 }
241
242 static const char *a6 =
243 "dns_master_loadfile understands DNSKEY RR specifications "
244 "containing key material";
245
246 static void
t6()247 t6() {
248 int result;
249
250 t_assert("dns_master_loadfile", 6, T_REQUIRED, "%s", a6);
251 result = test_master_x("dns_master_load_6_data");
252
253 t_result(result);
254 }
255
256 static const char *a7 =
257 "dns_master_loadfile understands DNSKEY RR specifications "
258 "containing no key material";
259
260 static void
t7()261 t7() {
262 int result;
263
264 t_assert("dns_master_loadfile", 7, T_REQUIRED, "%s", a7);
265 result = test_master_x("dns_master_load_7_data");
266
267 t_result(result);
268 }
269
270 static const char *a8 =
271 "dns_master_loadfile understands $INCLUDE";
272
273 static void
t8()274 t8() {
275 int result;
276
277 t_assert("dns_master_loadfile", 8, T_REQUIRED, "%s", a8);
278 result = test_master_x("dns_master_load_8_data");
279
280 t_result(result);
281 }
282
283 static const char *a9 =
284 "dns_master_loadfile understands $INCLUDE with failure";
285
286 static void
t9()287 t9() {
288 int result;
289
290 t_assert("dns_master_loadfile", 9, T_REQUIRED, "%s", a9);
291 result = test_master_x("dns_master_load_9_data");
292
293 t_result(result);
294 }
295
296 static const char *a10 =
297 "dns_master_loadfile non-empty blank lines";
298
299 static void
t10()300 t10() {
301 int result;
302
303 t_assert("dns_master_loadfile", 10, T_REQUIRED, "%s", a10);
304 result = test_master_x("dns_master_load_10_data");
305
306 t_result(result);
307 }
308
309 static const char *a11 =
310 "dns_master_loadfile allow leading zeros in SOA";
311
312 static void
t11()313 t11() {
314 int result;
315
316 t_assert("dns_master_loadfile", 11, T_REQUIRED, "%s", a11);
317 result = test_master_x("dns_master_load_11_data");
318
319 t_result(result);
320 }
321
322
323 testspec_t T_testlist[] = {
324 { (PFV) t1, "ISC_R_SUCCESS" },
325 { (PFV) t2, "ISC_R_UNEXPECTEDEND" },
326 { (PFV) t3, "DNS_NOOWNER" },
327 { (PFV) t4, "DNS_NOTTL" },
328 { (PFV) t5, "DNS_BADCLASS" },
329 { (PFV) t6, "DNSKEY RR 1" },
330 { (PFV) t7, "DNSKEY RR 2" },
331 { (PFV) t8, "$INCLUDE" },
332 { (PFV) t9, "$INCLUDE w/ DNS_BADCLASS" },
333 { (PFV) t10, "non empty blank lines" },
334 { (PFV) t11, "leading zeros in serial" },
335 { (PFV) 0, NULL }
336 };
337
338 #ifdef WIN32
339 int
main(int argc,char ** argv)340 main(int argc, char **argv) {
341 t_settests(T_testlist);
342 return (t_main(argc, argv));
343 }
344 #endif
345