2014-10-05 21:44:31 +00:00
|
|
|
/*
|
|
|
|
* testcode/testbound.c - test program for unbound.
|
|
|
|
*
|
|
|
|
* Copyright (c) 2007, NLnet Labs. All rights reserved.
|
|
|
|
*
|
|
|
|
* This software is open source.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* Redistributions of source code must retain the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer.
|
|
|
|
*
|
|
|
|
* Redistributions in binary form must reproduce the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
|
|
* and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* Neither the name of the NLNET LABS nor the names of its contributors may
|
|
|
|
* be used to endorse or promote products derived from this software without
|
|
|
|
* specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
|
|
* HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
|
|
|
|
* TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
|
|
|
|
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
|
|
|
* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
|
|
|
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
|
|
|
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
/**
|
|
|
|
* \file
|
2015-12-30 10:57:50 +00:00
|
|
|
* Exits with code 1 on a failure. 0 if all unit tests are successful.
|
2014-10-05 21:44:31 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
#ifdef HAVE_TIME_H
|
|
|
|
# include <time.h>
|
|
|
|
#endif
|
|
|
|
#include "testcode/testpkts.h"
|
|
|
|
#include "testcode/replay.h"
|
|
|
|
#include "testcode/fake_event.h"
|
|
|
|
#include "daemon/remote.h"
|
|
|
|
#include "util/config_file.h"
|
2015-04-02 09:16:18 +00:00
|
|
|
#include "sldns/keyraw.h"
|
2014-10-05 21:44:31 +00:00
|
|
|
#include <ctype.h>
|
|
|
|
|
|
|
|
/** signal that this is a testbound compile */
|
|
|
|
#define unbound_testbound 1
|
|
|
|
/**
|
|
|
|
* include the main program from the unbound daemon.
|
|
|
|
* rename main to daemon_main to call it
|
|
|
|
*/
|
|
|
|
#define main daemon_main
|
|
|
|
#include "daemon/unbound.c"
|
|
|
|
#undef main
|
|
|
|
|
|
|
|
/** maximum line length for lines in the replay file. */
|
|
|
|
#define MAX_LINE_LEN 1024
|
|
|
|
/** config files (removed at exit) */
|
|
|
|
static struct config_strlist* cfgfiles = NULL;
|
|
|
|
|
|
|
|
/** give commandline usage for testbound. */
|
|
|
|
static void
|
2017-06-16 10:16:05 +00:00
|
|
|
testbound_usage(void)
|
2014-10-05 21:44:31 +00:00
|
|
|
{
|
|
|
|
printf("usage: testbound [options]\n");
|
|
|
|
printf("\ttest the unbound daemon.\n");
|
|
|
|
printf("-h this help\n");
|
|
|
|
printf("-p file playback text file\n");
|
2017-06-16 10:16:05 +00:00
|
|
|
printf("-1 detect SHA1 support (exit code 0 or 1)\n");
|
2014-10-05 21:44:31 +00:00
|
|
|
printf("-2 detect SHA256 support (exit code 0 or 1)\n");
|
|
|
|
printf("-g detect GOST support (exit code 0 or 1)\n");
|
|
|
|
printf("-e detect ECDSA support (exit code 0 or 1)\n");
|
2017-06-16 10:16:05 +00:00
|
|
|
printf("-c detect CLIENT_SUBNET support (exit code 0 or 1)\n");
|
2014-10-05 21:44:31 +00:00
|
|
|
printf("-s testbound self-test - unit test of testbound parts.\n");
|
|
|
|
printf("-o str unbound commandline options separated by spaces.\n");
|
|
|
|
printf("Version %s\n", PACKAGE_VERSION);
|
|
|
|
printf("BSD licensed, see LICENSE file in source package.\n");
|
|
|
|
printf("Report bugs to %s.\n", PACKAGE_BUGREPORT);
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Max number of arguments to pass to unbound. */
|
|
|
|
#define MAXARG 100
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Add options from string to passed argc. splits on whitespace.
|
|
|
|
* @param args: the option argument, "-v -p 12345" or so.
|
|
|
|
* @param pass_argc: ptr to the argc for unbound. Modified.
|
|
|
|
* @param pass_argv: the argv to pass to unbound. Modified.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
add_opts(const char* args, int* pass_argc, char* pass_argv[])
|
|
|
|
{
|
|
|
|
const char *p = args, *np;
|
|
|
|
size_t len;
|
2014-12-04 21:10:49 +00:00
|
|
|
while(p && isspace((unsigned char)*p))
|
2014-10-05 21:44:31 +00:00
|
|
|
p++;
|
|
|
|
while(p && *p) {
|
|
|
|
/* find location of next string and length of this one */
|
|
|
|
if((np = strchr(p, ' ')))
|
|
|
|
len = (size_t)(np-p);
|
|
|
|
else len = strlen(p);
|
|
|
|
/* allocate and copy option */
|
|
|
|
if(*pass_argc >= MAXARG-1)
|
|
|
|
fatal_exit("too many arguments: '%s'", p);
|
|
|
|
pass_argv[*pass_argc] = (char*)malloc(len+1);
|
|
|
|
if(!pass_argv[*pass_argc])
|
|
|
|
fatal_exit("add_opts: out of memory");
|
|
|
|
memcpy(pass_argv[*pass_argc], p, len);
|
|
|
|
pass_argv[*pass_argc][len] = 0;
|
|
|
|
(*pass_argc)++;
|
|
|
|
/* go to next option */
|
|
|
|
p = np;
|
2014-12-04 21:10:49 +00:00
|
|
|
while(p && isspace((unsigned char)*p))
|
2014-10-05 21:44:31 +00:00
|
|
|
p++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/** pretty print commandline for unbound in this test */
|
|
|
|
static void
|
|
|
|
echo_cmdline(int argc, char* argv[])
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
fprintf(stderr, "testbound is starting:");
|
|
|
|
for(i=0; i<argc; i++) {
|
|
|
|
fprintf(stderr, " [%s]", argv[i]);
|
|
|
|
}
|
|
|
|
fprintf(stderr, "\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
/** spool autotrust file */
|
|
|
|
static void
|
|
|
|
spool_auto_file(FILE* in, int* lineno, FILE* cfg, char* id)
|
|
|
|
{
|
|
|
|
char line[MAX_LINE_LEN];
|
|
|
|
char* parse;
|
|
|
|
FILE* spool;
|
|
|
|
/* find filename for new file */
|
2014-12-04 21:10:49 +00:00
|
|
|
while(isspace((unsigned char)*id))
|
2014-10-05 21:44:31 +00:00
|
|
|
id++;
|
2017-06-16 10:16:05 +00:00
|
|
|
if(*id == '\0')
|
2014-10-05 21:44:31 +00:00
|
|
|
fatal_exit("AUTROTRUST_FILE must have id, line %d", *lineno);
|
|
|
|
id[strlen(id)-1]=0; /* remove newline */
|
|
|
|
fake_temp_file("_auto_", id, line, sizeof(line));
|
|
|
|
/* add option for the file */
|
|
|
|
fprintf(cfg, "server: auto-trust-anchor-file: \"%s\"\n", line);
|
|
|
|
/* open file and spool to it */
|
|
|
|
spool = fopen(line, "w");
|
|
|
|
if(!spool) fatal_exit("could not open %s: %s", line, strerror(errno));
|
|
|
|
fprintf(stderr, "testbound is spooling key file: %s\n", line);
|
|
|
|
if(!cfg_strlist_insert(&cfgfiles, strdup(line)))
|
|
|
|
fatal_exit("out of memory");
|
|
|
|
line[sizeof(line)-1] = 0;
|
|
|
|
while(fgets(line, MAX_LINE_LEN-1, in)) {
|
|
|
|
parse = line;
|
|
|
|
(*lineno)++;
|
2014-12-04 21:10:49 +00:00
|
|
|
while(isspace((unsigned char)*parse))
|
2014-10-05 21:44:31 +00:00
|
|
|
parse++;
|
|
|
|
if(strncmp(parse, "AUTOTRUST_END", 13) == 0) {
|
|
|
|
fclose(spool);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
fputs(line, spool);
|
|
|
|
}
|
|
|
|
fatal_exit("no AUTOTRUST_END in input file");
|
|
|
|
}
|
|
|
|
|
|
|
|
/** process config elements */
|
|
|
|
static void
|
|
|
|
setup_config(FILE* in, int* lineno, int* pass_argc, char* pass_argv[])
|
|
|
|
{
|
|
|
|
char configfile[MAX_LINE_LEN];
|
|
|
|
char line[MAX_LINE_LEN];
|
|
|
|
char* parse;
|
|
|
|
FILE* cfg;
|
|
|
|
fake_temp_file("_cfg", "", configfile, sizeof(configfile));
|
|
|
|
add_opts("-c", pass_argc, pass_argv);
|
|
|
|
add_opts(configfile, pass_argc, pass_argv);
|
|
|
|
cfg = fopen(configfile, "w");
|
|
|
|
if(!cfg) fatal_exit("could not open %s: %s",
|
|
|
|
configfile, strerror(errno));
|
|
|
|
if(!cfg_strlist_insert(&cfgfiles, strdup(configfile)))
|
|
|
|
fatal_exit("out of memory");
|
|
|
|
line[sizeof(line)-1] = 0;
|
|
|
|
/* some basic settings to not pollute the host system */
|
|
|
|
fprintf(cfg, "server: use-syslog: no\n");
|
|
|
|
fprintf(cfg, " directory: \"\"\n");
|
|
|
|
fprintf(cfg, " chroot: \"\"\n");
|
|
|
|
fprintf(cfg, " username: \"\"\n");
|
|
|
|
fprintf(cfg, " pidfile: \"\"\n");
|
|
|
|
fprintf(cfg, " val-log-level: 2\n");
|
|
|
|
fprintf(cfg, "remote-control: control-enable: no\n");
|
|
|
|
while(fgets(line, MAX_LINE_LEN-1, in)) {
|
|
|
|
parse = line;
|
|
|
|
(*lineno)++;
|
2014-12-04 21:10:49 +00:00
|
|
|
while(isspace((unsigned char)*parse))
|
2014-10-05 21:44:31 +00:00
|
|
|
parse++;
|
|
|
|
if(!*parse || parse[0] == ';')
|
|
|
|
continue;
|
|
|
|
if(strncmp(parse, "COMMANDLINE", 11) == 0) {
|
|
|
|
parse[strlen(parse)-1] = 0; /* strip off \n */
|
|
|
|
add_opts(parse+11, pass_argc, pass_argv);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if(strncmp(parse, "AUTOTRUST_FILE", 14) == 0) {
|
|
|
|
spool_auto_file(in, lineno, cfg, parse+14);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if(strncmp(parse, "CONFIG_END", 10) == 0) {
|
|
|
|
fclose(cfg);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
fputs(line, cfg);
|
|
|
|
}
|
|
|
|
fatal_exit("No CONFIG_END in input file");
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/** read playback file */
|
|
|
|
static struct replay_scenario*
|
|
|
|
setup_playback(const char* filename, int* pass_argc, char* pass_argv[])
|
|
|
|
{
|
|
|
|
struct replay_scenario* scen = NULL;
|
|
|
|
int lineno = 0;
|
|
|
|
|
|
|
|
if(filename) {
|
|
|
|
FILE *in = fopen(filename, "rb");
|
|
|
|
if(!in) {
|
|
|
|
perror(filename);
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
setup_config(in, &lineno, pass_argc, pass_argv);
|
|
|
|
scen = replay_scenario_read(in, filename, &lineno);
|
|
|
|
fclose(in);
|
|
|
|
if(!scen)
|
|
|
|
fatal_exit("Could not read: %s", filename);
|
|
|
|
}
|
|
|
|
else fatal_exit("need a playback file (-p)");
|
|
|
|
log_info("Scenario: %s", scen->title);
|
|
|
|
return scen;
|
|
|
|
}
|
|
|
|
|
|
|
|
/** remove config file at exit */
|
|
|
|
void remove_configfile(void)
|
|
|
|
{
|
|
|
|
struct config_strlist* p;
|
|
|
|
for(p=cfgfiles; p; p=p->next)
|
|
|
|
unlink(p->str);
|
|
|
|
config_delstrlist(cfgfiles);
|
|
|
|
cfgfiles = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Main fake event test program. Setup, teardown and report errors.
|
|
|
|
* @param argc: arg count.
|
|
|
|
* @param argv: array of commandline arguments.
|
|
|
|
* @return program failure if test fails.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
main(int argc, char* argv[])
|
|
|
|
{
|
|
|
|
int c, res;
|
|
|
|
int pass_argc = 0;
|
|
|
|
char* pass_argv[MAXARG];
|
|
|
|
char* playback_file = NULL;
|
|
|
|
int init_optind = optind;
|
|
|
|
char* init_optarg = optarg;
|
|
|
|
struct replay_scenario* scen = NULL;
|
|
|
|
|
|
|
|
/* we do not want the test to depend on the timezone */
|
|
|
|
(void)putenv("TZ=UTC");
|
|
|
|
|
|
|
|
log_init(NULL, 0, NULL);
|
|
|
|
/* determine commandline options for the daemon */
|
|
|
|
pass_argc = 1;
|
|
|
|
pass_argv[0] = "unbound";
|
|
|
|
add_opts("-d", &pass_argc, pass_argv);
|
2017-06-16 10:16:05 +00:00
|
|
|
while( (c=getopt(argc, argv, "12egho:p:s")) != -1) {
|
2014-10-05 21:44:31 +00:00
|
|
|
switch(c) {
|
|
|
|
case 's':
|
|
|
|
free(pass_argv[1]);
|
|
|
|
testbound_selftest();
|
|
|
|
exit(0);
|
2017-06-16 10:16:05 +00:00
|
|
|
case '1':
|
|
|
|
#ifdef USE_SHA1
|
|
|
|
printf("SHA1 supported\n");
|
|
|
|
exit(0);
|
|
|
|
#else
|
|
|
|
printf("SHA1 not supported\n");
|
|
|
|
exit(1);
|
|
|
|
#endif
|
|
|
|
break;
|
2014-10-05 21:44:31 +00:00
|
|
|
case '2':
|
2015-12-30 10:57:50 +00:00
|
|
|
#if (defined(HAVE_EVP_SHA256) || defined(HAVE_NSS) || defined(HAVE_NETTLE)) && defined(USE_SHA2)
|
2014-10-05 21:44:31 +00:00
|
|
|
printf("SHA256 supported\n");
|
|
|
|
exit(0);
|
|
|
|
#else
|
|
|
|
printf("SHA256 not supported\n");
|
|
|
|
exit(1);
|
|
|
|
#endif
|
|
|
|
break;
|
|
|
|
case 'e':
|
|
|
|
#if defined(USE_ECDSA)
|
|
|
|
printf("ECDSA supported\n");
|
|
|
|
exit(0);
|
|
|
|
#else
|
|
|
|
printf("ECDSA not supported\n");
|
|
|
|
exit(1);
|
|
|
|
#endif
|
|
|
|
break;
|
|
|
|
case 'g':
|
|
|
|
#ifdef USE_GOST
|
|
|
|
if(sldns_key_EVP_load_gost_id()) {
|
|
|
|
printf("GOST supported\n");
|
|
|
|
exit(0);
|
|
|
|
} else {
|
|
|
|
printf("GOST not supported\n");
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
printf("GOST not supported\n");
|
|
|
|
exit(1);
|
2017-06-16 10:16:05 +00:00
|
|
|
#endif
|
|
|
|
break;
|
|
|
|
case 'c':
|
|
|
|
#ifdef CLIENT_SUBNET
|
|
|
|
printf("CLIENT_SUBNET supported\n");
|
|
|
|
exit(0);
|
|
|
|
#else
|
|
|
|
printf("CLIENT_SUBNET not supported\n");
|
|
|
|
exit(1);
|
2014-10-05 21:44:31 +00:00
|
|
|
#endif
|
|
|
|
break;
|
|
|
|
case 'p':
|
|
|
|
playback_file = optarg;
|
|
|
|
break;
|
|
|
|
case 'o':
|
|
|
|
add_opts(optarg, &pass_argc, pass_argv);
|
|
|
|
break;
|
|
|
|
case '?':
|
|
|
|
case 'h':
|
|
|
|
default:
|
|
|
|
testbound_usage();
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
argc -= optind;
|
|
|
|
argv += optind;
|
|
|
|
if(argc != 0) {
|
|
|
|
testbound_usage();
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
log_info("Start of %s testbound program.", PACKAGE_STRING);
|
|
|
|
if(atexit(&remove_configfile) != 0)
|
|
|
|
fatal_exit("atexit() failed: %s", strerror(errno));
|
|
|
|
|
|
|
|
/* setup test environment */
|
|
|
|
scen = setup_playback(playback_file, &pass_argc, pass_argv);
|
|
|
|
/* init fake event backend */
|
|
|
|
fake_event_init(scen);
|
|
|
|
|
|
|
|
pass_argv[pass_argc] = NULL;
|
|
|
|
echo_cmdline(pass_argc, pass_argv);
|
|
|
|
|
|
|
|
/* reset getopt processing */
|
|
|
|
optind = init_optind;
|
|
|
|
optarg = init_optarg;
|
|
|
|
|
|
|
|
/* run the normal daemon */
|
|
|
|
res = daemon_main(pass_argc, pass_argv);
|
|
|
|
|
|
|
|
fake_event_cleanup();
|
|
|
|
for(c=1; c<pass_argc; c++)
|
|
|
|
free(pass_argv[c]);
|
|
|
|
if(res == 0) {
|
|
|
|
log_info("Testbound Exit Success");
|
|
|
|
#ifdef HAVE_PTHREAD
|
|
|
|
/* dlopen frees its thread state (dlopen of gost engine) */
|
|
|
|
pthread_exit(NULL);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* fake remote control */
|
|
|
|
struct listen_port* daemon_remote_open_ports(struct config_file*
|
|
|
|
ATTR_UNUSED(cfg))
|
|
|
|
{
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct daemon_remote* daemon_remote_create(struct config_file* ATTR_UNUSED(cfg))
|
|
|
|
{
|
|
|
|
return (struct daemon_remote*)calloc(1,1);
|
|
|
|
}
|
|
|
|
|
|
|
|
void daemon_remote_delete(struct daemon_remote* rc)
|
|
|
|
{
|
|
|
|
free(rc);
|
|
|
|
}
|
|
|
|
|
|
|
|
void daemon_remote_clear(struct daemon_remote* ATTR_UNUSED(rc))
|
|
|
|
{
|
|
|
|
/* nothing */
|
|
|
|
}
|
|
|
|
|
|
|
|
int daemon_remote_open_accept(struct daemon_remote* ATTR_UNUSED(rc),
|
|
|
|
struct listen_port* ATTR_UNUSED(ports),
|
|
|
|
struct worker* ATTR_UNUSED(worker))
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int remote_accept_callback(struct comm_point* ATTR_UNUSED(c),
|
|
|
|
void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
|
|
|
|
struct comm_reply* ATTR_UNUSED(repinfo))
|
|
|
|
{
|
|
|
|
log_assert(0);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int remote_control_callback(struct comm_point* ATTR_UNUSED(c),
|
|
|
|
void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
|
|
|
|
struct comm_reply* ATTR_UNUSED(repinfo))
|
|
|
|
{
|
|
|
|
log_assert(0);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void remote_get_opt_ssl(char* ATTR_UNUSED(str), void* ATTR_UNUSED(arg))
|
|
|
|
{
|
|
|
|
log_assert(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
void wsvc_command_option(const char* ATTR_UNUSED(wopt),
|
|
|
|
const char* ATTR_UNUSED(cfgfile), int ATTR_UNUSED(v),
|
|
|
|
int ATTR_UNUSED(c))
|
|
|
|
{
|
|
|
|
log_assert(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
void wsvc_setup_worker(struct worker* ATTR_UNUSED(worker))
|
|
|
|
{
|
|
|
|
/* do nothing */
|
|
|
|
}
|
|
|
|
|
|
|
|
void wsvc_desetup_worker(struct worker* ATTR_UNUSED(worker))
|
|
|
|
{
|
|
|
|
/* do nothing */
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef UB_ON_WINDOWS
|
|
|
|
void worker_win_stop_cb(int ATTR_UNUSED(fd), short ATTR_UNUSED(ev),
|
|
|
|
void* ATTR_UNUSED(arg))
|
|
|
|
{
|
|
|
|
log_assert(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
void wsvc_cron_cb(void* ATTR_UNUSED(arg))
|
|
|
|
{
|
|
|
|
log_assert(0);
|
|
|
|
}
|
|
|
|
#endif /* UB_ON_WINDOWS */
|
|
|
|
|