2017-09-08 13:39:09 -07:00
|
|
|
/*
|
2018-02-23 09:53:12 +01:00
|
|
|
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
2017-09-08 13:39:09 -07:00
|
|
|
*
|
|
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
2020-09-14 16:20:40 -07:00
|
|
|
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
|
2018-02-23 09:53:12 +01:00
|
|
|
*
|
|
|
|
* See the COPYRIGHT file distributed with this work for additional
|
|
|
|
* information regarding copyright ownership.
|
2017-09-08 13:39:09 -07:00
|
|
|
*/
|
|
|
|
|
|
|
|
/*! \file */
|
|
|
|
|
2018-03-28 14:19:37 +02:00
|
|
|
#include <inttypes.h>
|
2018-04-17 08:29:14 -07:00
|
|
|
#include <stdbool.h>
|
2017-09-08 13:39:09 -07:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <time.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
#include <isc/app.h>
|
|
|
|
#include <isc/buffer.h>
|
|
|
|
#include <isc/file.h>
|
|
|
|
#include <isc/hash.h>
|
2021-04-27 00:07:43 +02:00
|
|
|
#include <isc/managers.h>
|
2017-09-08 13:39:09 -07:00
|
|
|
#include <isc/mem.h>
|
2019-11-05 15:34:35 -08:00
|
|
|
#include <isc/netmgr.h>
|
2017-09-08 13:39:09 -07:00
|
|
|
#include <isc/os.h>
|
|
|
|
#include <isc/print.h>
|
2017-10-11 15:02:50 -07:00
|
|
|
#include <isc/random.h>
|
2021-10-05 16:01:56 +11:00
|
|
|
#include <isc/resource.h>
|
2021-10-04 17:14:53 +02:00
|
|
|
#include <isc/result.h>
|
2017-09-08 13:39:09 -07:00
|
|
|
#include <isc/stdio.h>
|
2020-02-12 13:59:18 +01:00
|
|
|
#include <isc/string.h>
|
2017-09-08 13:39:09 -07:00
|
|
|
#include <isc/task.h>
|
|
|
|
#include <isc/timer.h>
|
|
|
|
#include <isc/util.h>
|
|
|
|
|
2017-10-11 15:02:50 -07:00
|
|
|
#include <dns/cache.h>
|
2017-09-08 13:39:09 -07:00
|
|
|
#include <dns/db.h>
|
|
|
|
#include <dns/dispatch.h>
|
|
|
|
#include <dns/fixedname.h>
|
|
|
|
#include <dns/log.h>
|
|
|
|
#include <dns/name.h>
|
|
|
|
#include <dns/view.h>
|
|
|
|
#include <dns/zone.h>
|
|
|
|
|
|
|
|
#include <ns/client.h>
|
2018-08-03 14:16:41 -07:00
|
|
|
#include <ns/hooks.h>
|
2017-09-08 13:39:09 -07:00
|
|
|
#include <ns/interfacemgr.h>
|
|
|
|
#include <ns/server.h>
|
|
|
|
|
Use the TLS context cache for server-side contexts
Using the TLS context cache for server-side contexts could reduce the
number of contexts to initialise in the configurations when e.g. the
same 'tls' entry is used in multiple 'listen-on' statements for the
same DNS transport, binding to multiple IP addresses.
In such a case, only one TLS context will be created, instead of a
context per IP address, which could reduce the initialisation time, as
initialising even a non-ephemeral TLS context introduces some delay,
which can be *visually* noticeable by log activity.
Also, this change lays down a foundation for Mutual TLS (when the
server validates a client certificate, additionally to a client
validating the server), as the TLS context cache can be extended to
store additional data required for validation (like intermediates CA
chain).
Additionally to the above, the change ensures that the contexts are
not being changed after initialisation, as such a practice is frowned
upon. Previously we would set the supported ALPN tags within
isc_nm_listenhttp() and isc_nm_listentlsdns(). We do not do that for
client-side contexts, so that appears to be an overlook. Now we set
the supported ALPN tags right after server-side contexts creation,
similarly how we do for client-side ones.
2021-12-23 12:01:34 +02:00
|
|
|
#include "nstest.h"
|
|
|
|
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_mem_t *mctx = NULL;
|
|
|
|
isc_log_t *lctx = NULL;
|
Refactor taskmgr to run on top of netmgr
This commit changes the taskmgr to run the individual tasks on the
netmgr internal workers. While an effort has been put into keeping the
taskmgr interface intact, couple of changes have been made:
* The taskmgr has no concept of universal privileged mode - rather the
tasks are either privileged or unprivileged (normal). The privileged
tasks are run as a first thing when the netmgr is unpaused. There
are now four different queues in in the netmgr:
1. priority queue - netievent on the priority queue are run even when
the taskmgr enter exclusive mode and netmgr is paused. This is
needed to properly start listening on the interfaces, free
resources and resume.
2. privileged task queue - only privileged tasks are queued here and
this is the first queue that gets processed when network manager
is unpaused using isc_nm_resume(). All netmgr workers need to
clean the privileged task queue before they all proceed normal
operation. Both task queues are processed when the workers are
finished.
3. task queue - only (traditional) task are scheduled here and this
queue along with privileged task queues are process when the
netmgr workers are finishing. This is needed to process the task
shutdown events.
4. normal queue - this is the queue with netmgr events, e.g. reading,
sending, callbacks and pretty much everything is processed here.
* The isc_taskmgr_create() now requires initialized netmgr (isc_nm_t)
object.
* The isc_nm_destroy() function now waits for indefinite time, but it
will print out the active objects when in tracing mode
(-DNETMGR_TRACE=1 and -DNETMGR_TRACE_VERBOSE=1), the netmgr has been
made a little bit more asynchronous and it might take longer time to
shutdown all the active networking connections.
* Previously, the isc_nm_stoplistening() was a synchronous operation.
This has been changed and the isc_nm_stoplistening() just schedules
the child sockets to stop listening and exits. This was needed to
prevent a deadlock as the the (traditional) tasks are now executed on
the netmgr threads.
* The socket selection logic in isc__nm_udp_send() was flawed, but
fortunatelly, it was broken, so we never hit the problem where we
created uvreq_t on a socket from nmhandle_t, but then a different
socket could be picked up and then we were trying to run the send
callback on a socket that had different threadid than currently
running.
2021-04-09 11:31:19 +02:00
|
|
|
isc_nm_t *netmgr = NULL;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_taskmgr_t *taskmgr = NULL;
|
|
|
|
isc_task_t *maintask = NULL;
|
|
|
|
isc_timermgr_t *timermgr = NULL;
|
|
|
|
dns_zonemgr_t *zonemgr = NULL;
|
2017-09-08 13:39:09 -07:00
|
|
|
dns_dispatchmgr_t *dispatchmgr = NULL;
|
2020-02-13 14:44:37 -08:00
|
|
|
ns_clientmgr_t *clientmgr = NULL;
|
2017-09-08 13:39:09 -07:00
|
|
|
ns_interfacemgr_t *interfacemgr = NULL;
|
2020-02-13 14:44:37 -08:00
|
|
|
ns_server_t *sctx = NULL;
|
|
|
|
bool app_running = false;
|
|
|
|
int ncpus;
|
|
|
|
bool debug_mem_record = true;
|
2019-07-04 15:45:06 +02:00
|
|
|
static atomic_bool run_managers = ATOMIC_VAR_INIT(false);
|
2017-09-08 13:39:09 -07:00
|
|
|
|
2018-04-17 08:29:14 -07:00
|
|
|
static bool dst_active = false;
|
2018-10-25 17:02:46 -07:00
|
|
|
static bool test_running = false;
|
2017-09-08 13:39:09 -07:00
|
|
|
|
2017-10-11 15:02:50 -07:00
|
|
|
static dns_zone_t *served_zone = NULL;
|
|
|
|
|
2019-11-05 15:34:35 -08:00
|
|
|
/*
|
|
|
|
* We don't want to use netmgr-based client accounting, we need to emulate it.
|
|
|
|
*/
|
2019-12-09 14:39:38 +01:00
|
|
|
atomic_uint_fast32_t client_refs[32];
|
2020-02-13 14:44:37 -08:00
|
|
|
atomic_uintptr_t client_addrs[32];
|
2019-11-05 15:34:35 -08:00
|
|
|
|
2020-02-14 08:14:03 +01:00
|
|
|
void
|
2020-12-17 11:40:29 +01:00
|
|
|
isc__nmhandle_attach(isc_nmhandle_t *source, isc_nmhandle_t **targetp FLARG) {
|
2020-09-03 13:31:27 -07:00
|
|
|
ns_client_t *client = (ns_client_t *)source;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < 32; i++) {
|
|
|
|
if (atomic_load(&client_addrs[i]) == (uintptr_t)client) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
INSIST(i < 32);
|
|
|
|
INSIST(atomic_load(&client_refs[i]) > 0);
|
|
|
|
|
|
|
|
atomic_fetch_add(&client_refs[i], 1);
|
|
|
|
|
|
|
|
*targetp = source;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2020-12-17 11:40:29 +01:00
|
|
|
isc__nmhandle_detach(isc_nmhandle_t **handlep FLARG) {
|
2020-09-03 13:31:27 -07:00
|
|
|
isc_nmhandle_t *handle = *handlep;
|
2019-11-05 15:34:35 -08:00
|
|
|
ns_client_t *client = (ns_client_t *)handle;
|
2020-02-13 14:44:37 -08:00
|
|
|
int i;
|
2019-11-05 15:34:35 -08:00
|
|
|
|
2020-09-14 11:02:33 +10:00
|
|
|
*handlep = NULL;
|
|
|
|
|
2019-12-09 14:39:38 +01:00
|
|
|
for (i = 0; i < 32; i++) {
|
2020-02-12 13:59:18 +01:00
|
|
|
if (atomic_load(&client_addrs[i]) == (uintptr_t)client) {
|
2019-11-05 15:34:35 -08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2020-09-03 13:31:27 -07:00
|
|
|
INSIST(i < 32);
|
2019-11-05 15:34:35 -08:00
|
|
|
|
|
|
|
if (atomic_fetch_sub(&client_refs[i], 1) == 1) {
|
|
|
|
dns_view_detach(&client->view);
|
|
|
|
client->state = 4;
|
|
|
|
ns__client_reset_cb(client);
|
|
|
|
ns__client_put_cb(client);
|
|
|
|
isc_mem_put(mctx, client, sizeof(ns_client_t));
|
2020-09-16 15:26:22 -07:00
|
|
|
atomic_store(&client_addrs[i], (uintptr_t)NULL);
|
2019-11-05 15:34:35 -08:00
|
|
|
}
|
2020-09-03 13:31:27 -07:00
|
|
|
|
2019-11-05 15:34:35 -08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-09-08 13:39:09 -07:00
|
|
|
/*
|
|
|
|
* Logging categories: this needs to match the list in lib/ns/log.c.
|
|
|
|
*/
|
2020-02-12 13:59:18 +01:00
|
|
|
static isc_logcategory_t categories[] = { { "", 0 },
|
|
|
|
{ "client", 0 },
|
|
|
|
{ "network", 0 },
|
|
|
|
{ "update", 0 },
|
|
|
|
{ "queries", 0 },
|
|
|
|
{ "unmatched", 0 },
|
|
|
|
{ "update-security", 0 },
|
|
|
|
{ "query-errors", 0 },
|
|
|
|
{ NULL, 0 } };
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
static isc_result_t
|
|
|
|
matchview(isc_netaddr_t *srcaddr, isc_netaddr_t *destaddr,
|
2020-02-12 13:59:18 +01:00
|
|
|
dns_message_t *message, dns_aclenv_t *env, isc_result_t *sigresultp,
|
2020-02-13 14:44:37 -08:00
|
|
|
dns_view_t **viewp) {
|
2017-09-08 13:39:09 -07:00
|
|
|
UNUSED(srcaddr);
|
|
|
|
UNUSED(destaddr);
|
|
|
|
UNUSED(message);
|
2018-02-05 20:24:14 +01:00
|
|
|
UNUSED(env);
|
2017-09-08 13:39:09 -07:00
|
|
|
UNUSED(sigresultp);
|
|
|
|
UNUSED(viewp);
|
|
|
|
|
|
|
|
return (ISC_R_NOTIMPLEMENTED);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* These need to be shut down from a running task.
|
|
|
|
*/
|
2019-07-04 15:45:06 +02:00
|
|
|
static atomic_bool shutdown_done = ATOMIC_VAR_INIT(false);
|
2017-09-08 13:39:09 -07:00
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
shutdown_managers(isc_task_t *task, isc_event_t *event) {
|
2017-09-08 13:39:09 -07:00
|
|
|
UNUSED(task);
|
|
|
|
|
|
|
|
if (interfacemgr != NULL) {
|
|
|
|
ns_interfacemgr_shutdown(interfacemgr);
|
|
|
|
ns_interfacemgr_detach(&interfacemgr);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (dispatchmgr != NULL) {
|
2021-05-25 22:54:17 -07:00
|
|
|
dns_dispatchmgr_detach(&dispatchmgr);
|
2017-09-08 13:39:09 -07:00
|
|
|
}
|
|
|
|
|
2019-07-04 15:45:06 +02:00
|
|
|
atomic_store(&shutdown_done, true);
|
|
|
|
atomic_store(&run_managers, false);
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
isc_event_free(&event);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
cleanup_managers(void) {
|
2019-07-04 15:45:06 +02:00
|
|
|
atomic_store(&shutdown_done, false);
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
if (maintask != NULL) {
|
|
|
|
isc_task_shutdown(maintask);
|
|
|
|
isc_task_destroy(&maintask);
|
|
|
|
}
|
|
|
|
|
2019-07-04 15:45:06 +02:00
|
|
|
while (atomic_load(&run_managers) && !atomic_load(&shutdown_done)) {
|
2017-09-08 13:39:09 -07:00
|
|
|
/*
|
|
|
|
* There's no straightforward way to determine
|
|
|
|
* whether all the clients have shut down, so
|
|
|
|
* we'll just sleep for a bit and hope.
|
|
|
|
*/
|
|
|
|
ns_test_nap(500000);
|
|
|
|
}
|
|
|
|
|
2018-10-25 17:02:46 -07:00
|
|
|
if (sctx != NULL) {
|
2017-09-08 13:39:09 -07:00
|
|
|
ns_server_detach(&sctx);
|
2018-10-25 17:02:46 -07:00
|
|
|
}
|
2019-11-05 15:34:35 -08:00
|
|
|
if (interfacemgr != NULL) {
|
|
|
|
ns_interfacemgr_detach(&interfacemgr);
|
|
|
|
}
|
2021-04-27 00:07:43 +02:00
|
|
|
|
2021-04-27 10:28:40 +02:00
|
|
|
isc_managers_destroy(netmgr == NULL ? NULL : &netmgr,
|
|
|
|
taskmgr == NULL ? NULL : &taskmgr,
|
2021-10-03 00:27:52 -07:00
|
|
|
timermgr == NULL ? NULL : &timermgr);
|
2021-04-27 00:07:43 +02:00
|
|
|
|
2018-10-25 17:02:46 -07:00
|
|
|
if (app_running) {
|
|
|
|
isc_app_finish();
|
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2020-02-13 14:44:37 -08:00
|
|
|
scan_interfaces(isc_task_t *task, isc_event_t *event) {
|
2017-09-08 13:39:09 -07:00
|
|
|
UNUSED(task);
|
|
|
|
|
2021-12-14 09:28:01 +00:00
|
|
|
ns_interfacemgr_scan(interfacemgr, true, false);
|
2017-09-08 13:39:09 -07:00
|
|
|
isc_event_free(&event);
|
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
2020-02-13 14:44:37 -08:00
|
|
|
create_managers(void) {
|
|
|
|
isc_result_t result;
|
|
|
|
in_port_t port = 5300 + isc_random8();
|
2017-09-08 13:39:09 -07:00
|
|
|
ns_listenlist_t *listenon = NULL;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_event_t *event = NULL;
|
2017-09-08 13:39:09 -07:00
|
|
|
ncpus = isc_os_ncpus();
|
|
|
|
|
2021-10-03 00:27:52 -07:00
|
|
|
isc_managers_create(mctx, ncpus, 0, &netmgr, &taskmgr, &timermgr);
|
2021-05-06 16:11:43 +02:00
|
|
|
CHECK(isc_task_create_bound(taskmgr, 0, &maintask, 0));
|
2017-09-08 13:39:09 -07:00
|
|
|
isc_taskmgr_setexcltask(taskmgr, maintask);
|
|
|
|
CHECK(isc_task_onshutdown(maintask, shutdown_managers, NULL));
|
|
|
|
|
2018-04-22 14:56:28 +02:00
|
|
|
CHECK(ns_server_create(mctx, matchview, &sctx));
|
2017-09-08 13:39:09 -07:00
|
|
|
|
2021-01-14 13:02:57 -08:00
|
|
|
CHECK(dns_dispatchmgr_create(mctx, netmgr, &dispatchmgr));
|
2017-09-08 13:39:09 -07:00
|
|
|
|
2021-10-03 00:27:52 -07:00
|
|
|
CHECK(ns_interfacemgr_create(mctx, sctx, taskmgr, timermgr, netmgr,
|
2021-10-03 01:01:40 -07:00
|
|
|
dispatchmgr, maintask, NULL, ncpus, false,
|
2020-12-09 19:44:41 -08:00
|
|
|
&interfacemgr));
|
2017-09-08 13:39:09 -07:00
|
|
|
|
Use the TLS context cache for server-side contexts
Using the TLS context cache for server-side contexts could reduce the
number of contexts to initialise in the configurations when e.g. the
same 'tls' entry is used in multiple 'listen-on' statements for the
same DNS transport, binding to multiple IP addresses.
In such a case, only one TLS context will be created, instead of a
context per IP address, which could reduce the initialisation time, as
initialising even a non-ephemeral TLS context introduces some delay,
which can be *visually* noticeable by log activity.
Also, this change lays down a foundation for Mutual TLS (when the
server validates a client certificate, additionally to a client
validating the server), as the TLS context cache can be extended to
store additional data required for validation (like intermediates CA
chain).
Additionally to the above, the change ensures that the contexts are
not being changed after initialisation, as such a practice is frowned
upon. Previously we would set the supported ALPN tags within
isc_nm_listenhttp() and isc_nm_listentlsdns(). We do not do that for
client-side contexts, so that appears to be an overlook. Now we set
the supported ALPN tags right after server-side contexts creation,
similarly how we do for client-side ones.
2021-12-23 12:01:34 +02:00
|
|
|
CHECK(ns_listenlist_default(mctx, port, -1, true, AF_INET, &listenon));
|
2017-09-08 13:39:09 -07:00
|
|
|
ns_interfacemgr_setlistenon4(interfacemgr, listenon);
|
|
|
|
ns_listenlist_detach(&listenon);
|
|
|
|
|
|
|
|
event = isc_event_allocate(mctx, maintask, ISC_TASKEVENT_TEST,
|
2020-02-12 13:59:18 +01:00
|
|
|
scan_interfaces, NULL, sizeof(isc_event_t));
|
2017-09-08 13:39:09 -07:00
|
|
|
isc_task_send(maintask, &event);
|
2018-10-25 17:02:46 -07:00
|
|
|
|
2021-05-22 18:12:11 +02:00
|
|
|
clientmgr = ns_interfacemgr_getclientmgr(interfacemgr);
|
2017-09-08 13:39:09 -07:00
|
|
|
|
2019-07-04 15:45:06 +02:00
|
|
|
atomic_store(&run_managers, true);
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
|
2020-02-12 13:59:18 +01:00
|
|
|
cleanup:
|
2017-09-08 13:39:09 -07:00
|
|
|
cleanup_managers();
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
isc_result_t
|
2020-02-13 14:44:37 -08:00
|
|
|
ns_test_begin(FILE *logfile, bool start_managers) {
|
2017-09-08 13:39:09 -07:00
|
|
|
isc_result_t result;
|
|
|
|
|
2018-10-25 17:02:46 -07:00
|
|
|
INSIST(!test_running);
|
|
|
|
test_running = true;
|
|
|
|
|
|
|
|
if (start_managers) {
|
2021-10-05 16:01:56 +11:00
|
|
|
isc_resourcevalue_t files;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The 'listenlist_test', 'notify_test', and 'query_test'
|
|
|
|
* tests need more than 256 descriptors with 8 cpus.
|
|
|
|
* Bump up to at least 1024.
|
|
|
|
*/
|
|
|
|
result = isc_resource_getcurlimit(isc_resource_openfiles,
|
|
|
|
&files);
|
|
|
|
if (result == ISC_R_SUCCESS) {
|
|
|
|
if (files < 1024) {
|
|
|
|
files = 1024;
|
|
|
|
(void)isc_resource_setlimit(
|
|
|
|
isc_resource_openfiles, files);
|
|
|
|
}
|
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
CHECK(isc_app_start());
|
2018-10-25 17:02:46 -07:00
|
|
|
}
|
|
|
|
if (debug_mem_record) {
|
2017-09-08 13:39:09 -07:00
|
|
|
isc_mem_debugging |= ISC_MEM_DEBUGRECORD;
|
2018-10-25 17:02:46 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
INSIST(mctx == NULL);
|
2019-09-05 18:40:57 +02:00
|
|
|
isc_mem_create(&mctx);
|
2017-09-08 13:39:09 -07:00
|
|
|
|
2018-10-25 17:02:46 -07:00
|
|
|
if (!dst_active) {
|
|
|
|
CHECK(dst_lib_init(mctx, NULL));
|
|
|
|
dst_active = true;
|
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
if (logfile != NULL) {
|
|
|
|
isc_logdestination_t destination;
|
2020-02-13 14:44:37 -08:00
|
|
|
isc_logconfig_t *logconfig = NULL;
|
2017-09-08 13:39:09 -07:00
|
|
|
|
2018-10-25 17:02:46 -07:00
|
|
|
INSIST(lctx == NULL);
|
2020-03-18 14:17:55 +11:00
|
|
|
isc_log_create(mctx, &lctx, &logconfig);
|
2018-10-25 17:02:46 -07:00
|
|
|
|
2017-09-08 13:39:09 -07:00
|
|
|
isc_log_registercategories(lctx, categories);
|
|
|
|
isc_log_setcontext(lctx);
|
|
|
|
dns_log_init(lctx);
|
|
|
|
dns_log_setcontext(lctx);
|
|
|
|
|
|
|
|
destination.file.stream = logfile;
|
|
|
|
destination.file.name = NULL;
|
|
|
|
destination.file.versions = ISC_LOG_ROLLNEVER;
|
|
|
|
destination.file.maximum_size = 0;
|
2020-03-18 14:17:55 +11:00
|
|
|
isc_log_createchannel(logconfig, "stderr", ISC_LOG_TOFILEDESC,
|
|
|
|
ISC_LOG_DYNAMIC, &destination, 0);
|
2017-09-08 13:39:09 -07:00
|
|
|
CHECK(isc_log_usechannel(logconfig, "stderr", NULL, NULL));
|
|
|
|
}
|
|
|
|
|
2018-10-25 17:02:46 -07:00
|
|
|
if (start_managers) {
|
2017-09-08 13:39:09 -07:00
|
|
|
CHECK(create_managers());
|
2018-10-25 17:02:46 -07:00
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* atf-run changes us to a /tmp directory, so tests
|
|
|
|
* that access test data files must first chdir to the proper
|
|
|
|
* location.
|
|
|
|
*/
|
2020-06-02 18:21:13 +02:00
|
|
|
if (chdir(TESTS_DIR) == -1) {
|
2017-09-08 13:39:09 -07:00
|
|
|
CHECK(ISC_R_FAILURE);
|
2018-10-25 17:02:46 -07:00
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
|
2020-02-12 13:59:18 +01:00
|
|
|
cleanup:
|
2017-09-08 13:39:09 -07:00
|
|
|
ns_test_end();
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
ns_test_end(void) {
|
2018-08-24 11:21:27 +02:00
|
|
|
cleanup_managers();
|
|
|
|
|
2018-10-25 17:02:46 -07:00
|
|
|
dst_lib_destroy();
|
|
|
|
dst_active = false;
|
2017-09-08 13:39:09 -07:00
|
|
|
|
2018-10-25 17:02:46 -07:00
|
|
|
if (lctx != NULL) {
|
2017-09-08 13:39:09 -07:00
|
|
|
isc_log_destroy(&lctx);
|
2018-10-25 17:02:46 -07:00
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
|
2018-10-25 17:02:46 -07:00
|
|
|
if (mctx != NULL) {
|
2017-09-08 13:39:09 -07:00
|
|
|
isc_mem_destroy(&mctx);
|
2018-10-25 17:02:46 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
test_running = false;
|
2017-09-08 13:39:09 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
isc_result_t
|
2020-02-13 14:44:37 -08:00
|
|
|
ns_test_makeview(const char *name, bool with_cache, dns_view_t **viewp) {
|
2017-10-11 15:02:50 -07:00
|
|
|
dns_cache_t *cache = NULL;
|
2020-02-13 14:44:37 -08:00
|
|
|
dns_view_t *view = NULL;
|
2017-10-11 15:02:50 -07:00
|
|
|
isc_result_t result;
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
CHECK(dns_view_create(mctx, dns_rdataclass_in, name, &view));
|
2017-10-11 15:02:50 -07:00
|
|
|
|
|
|
|
if (with_cache) {
|
2018-04-03 13:10:15 +02:00
|
|
|
CHECK(dns_cache_create(mctx, mctx, taskmgr, timermgr,
|
|
|
|
dns_rdataclass_in, "", "rbt", 0, NULL,
|
2017-10-11 15:02:50 -07:00
|
|
|
&cache));
|
2018-04-17 08:29:14 -07:00
|
|
|
dns_view_setcache(view, cache, false);
|
2017-10-11 15:02:50 -07:00
|
|
|
/*
|
|
|
|
* Reference count for "cache" is now at 2, so decrement it in
|
|
|
|
* order for the cache to be automatically freed when "view"
|
|
|
|
* gets freed.
|
|
|
|
*/
|
|
|
|
dns_cache_detach(&cache);
|
|
|
|
}
|
|
|
|
|
2017-09-08 13:39:09 -07:00
|
|
|
*viewp = view;
|
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
|
2020-02-12 13:59:18 +01:00
|
|
|
cleanup:
|
2020-02-13 21:48:23 +01:00
|
|
|
if (view != NULL) {
|
2017-09-08 13:39:09 -07:00
|
|
|
dns_view_detach(&view);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create a zone with origin 'name', return a pointer to the zone object in
|
|
|
|
* 'zonep'. If 'view' is set, add the zone to that view; otherwise, create
|
|
|
|
* a new view for the purpose.
|
|
|
|
*
|
|
|
|
* If the created view is going to be needed by the caller subsequently,
|
|
|
|
* then 'keepview' should be set to true; this will prevent the view
|
|
|
|
* from being detached. In this case, the caller is responsible for
|
|
|
|
* detaching the view.
|
|
|
|
*/
|
|
|
|
isc_result_t
|
|
|
|
ns_test_makezone(const char *name, dns_zone_t **zonep, dns_view_t *view,
|
2020-02-13 14:44:37 -08:00
|
|
|
bool keepview) {
|
|
|
|
isc_result_t result;
|
|
|
|
dns_zone_t *zone = NULL;
|
|
|
|
isc_buffer_t buffer;
|
2017-09-08 13:39:09 -07:00
|
|
|
dns_fixedname_t fixorigin;
|
2020-02-13 14:44:37 -08:00
|
|
|
dns_name_t *origin;
|
2017-09-08 13:39:09 -07:00
|
|
|
|
2020-02-13 21:48:23 +01:00
|
|
|
if (view == NULL) {
|
2017-09-08 13:39:09 -07:00
|
|
|
CHECK(dns_view_create(mctx, dns_rdataclass_in, "view", &view));
|
2020-02-13 21:48:23 +01:00
|
|
|
} else if (!keepview) {
|
2018-04-17 08:29:14 -07:00
|
|
|
keepview = true;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
zone = *zonep;
|
2020-02-13 21:48:23 +01:00
|
|
|
if (zone == NULL) {
|
2017-09-08 13:39:09 -07:00
|
|
|
CHECK(dns_zone_create(&zone, mctx));
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
isc_buffer_constinit(&buffer, name, strlen(name));
|
|
|
|
isc_buffer_add(&buffer, strlen(name));
|
2018-03-28 14:38:09 +02:00
|
|
|
origin = dns_fixedname_initname(&fixorigin);
|
2017-09-08 13:39:09 -07:00
|
|
|
CHECK(dns_name_fromtext(origin, &buffer, dns_rootname, 0, NULL));
|
|
|
|
CHECK(dns_zone_setorigin(zone, origin));
|
|
|
|
dns_zone_setview(zone, view);
|
2021-08-25 22:29:25 -07:00
|
|
|
dns_zone_settype(zone, dns_zone_primary);
|
2017-09-08 13:39:09 -07:00
|
|
|
dns_zone_setclass(zone, view->rdclass);
|
|
|
|
dns_view_addzone(view, zone);
|
|
|
|
|
2020-02-13 21:48:23 +01:00
|
|
|
if (!keepview) {
|
2017-09-08 13:39:09 -07:00
|
|
|
dns_view_detach(&view);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
*zonep = zone;
|
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
|
2020-02-12 13:59:18 +01:00
|
|
|
cleanup:
|
2020-02-13 21:48:23 +01:00
|
|
|
if (zone != NULL) {
|
2017-09-08 13:39:09 -07:00
|
|
|
dns_zone_detach(&zone);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
|
|
|
if (view != NULL) {
|
2017-09-08 13:39:09 -07:00
|
|
|
dns_view_detach(&view);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
isc_result_t
|
2020-02-13 14:44:37 -08:00
|
|
|
ns_test_setupzonemgr(void) {
|
2017-09-08 13:39:09 -07:00
|
|
|
isc_result_t result;
|
|
|
|
REQUIRE(zonemgr == NULL);
|
|
|
|
|
2021-08-04 13:14:11 -07:00
|
|
|
result = dns_zonemgr_create(mctx, taskmgr, timermgr, NULL, &zonemgr);
|
2017-09-08 13:39:09 -07:00
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
isc_result_t
|
2020-02-13 14:44:37 -08:00
|
|
|
ns_test_managezone(dns_zone_t *zone) {
|
2017-09-08 13:39:09 -07:00
|
|
|
isc_result_t result;
|
|
|
|
REQUIRE(zonemgr != NULL);
|
|
|
|
|
|
|
|
result = dns_zonemgr_setsize(zonemgr, 1);
|
2020-02-13 21:48:23 +01:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
2017-09-08 13:39:09 -07:00
|
|
|
return (result);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
result = dns_zonemgr_managezone(zonemgr, zone);
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
ns_test_releasezone(dns_zone_t *zone) {
|
2017-09-08 13:39:09 -07:00
|
|
|
REQUIRE(zonemgr != NULL);
|
|
|
|
dns_zonemgr_releasezone(zonemgr, zone);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
ns_test_closezonemgr(void) {
|
2017-09-08 13:39:09 -07:00
|
|
|
REQUIRE(zonemgr != NULL);
|
|
|
|
|
|
|
|
dns_zonemgr_shutdown(zonemgr);
|
|
|
|
dns_zonemgr_detach(&zonemgr);
|
|
|
|
}
|
|
|
|
|
2017-10-11 15:02:50 -07:00
|
|
|
isc_result_t
|
2020-02-13 14:44:37 -08:00
|
|
|
ns_test_serve_zone(const char *zonename, const char *filename,
|
|
|
|
dns_view_t *view) {
|
2017-10-11 15:02:50 -07:00
|
|
|
isc_result_t result;
|
2020-02-13 14:44:37 -08:00
|
|
|
dns_db_t *db = NULL;
|
2017-10-11 15:02:50 -07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Prepare zone structure for further processing.
|
|
|
|
*/
|
2018-04-17 08:29:14 -07:00
|
|
|
result = ns_test_makezone(zonename, &served_zone, view, true);
|
2017-10-11 15:02:50 -07:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Start zone manager.
|
|
|
|
*/
|
|
|
|
result = ns_test_setupzonemgr();
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto free_zone;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Add the zone to the zone manager.
|
|
|
|
*/
|
|
|
|
result = ns_test_managezone(served_zone);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto close_zonemgr;
|
|
|
|
}
|
|
|
|
|
|
|
|
view->nocookieudp = 512;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Set path to the master file for the zone and then load it.
|
|
|
|
*/
|
2018-04-03 16:34:41 +02:00
|
|
|
dns_zone_setfile(served_zone, filename, dns_masterformat_text,
|
|
|
|
&dns_master_style_default);
|
2018-07-10 18:43:55 +02:00
|
|
|
result = dns_zone_load(served_zone, false);
|
2017-10-11 15:02:50 -07:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto release_zone;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The zone should now be loaded; test it.
|
|
|
|
*/
|
|
|
|
result = dns_zone_getdb(served_zone, &db);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto release_zone;
|
|
|
|
}
|
|
|
|
if (db != NULL) {
|
|
|
|
dns_db_detach(&db);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
|
|
|
|
release_zone:
|
|
|
|
ns_test_releasezone(served_zone);
|
|
|
|
close_zonemgr:
|
|
|
|
ns_test_closezonemgr();
|
|
|
|
free_zone:
|
|
|
|
dns_zone_detach(&served_zone);
|
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
ns_test_cleanup_zone(void) {
|
2017-10-11 15:02:50 -07:00
|
|
|
ns_test_releasezone(served_zone);
|
|
|
|
ns_test_closezonemgr();
|
|
|
|
|
|
|
|
dns_zone_detach(&served_zone);
|
|
|
|
}
|
|
|
|
|
2017-09-08 13:39:09 -07:00
|
|
|
isc_result_t
|
2020-02-13 14:44:37 -08:00
|
|
|
ns_test_getclient(ns_interface_t *ifp0, bool tcp, ns_client_t **clientp) {
|
2017-09-08 13:39:09 -07:00
|
|
|
isc_result_t result;
|
2019-11-05 15:34:35 -08:00
|
|
|
ns_client_t *client = isc_mem_get(mctx, sizeof(ns_client_t));
|
2020-02-13 14:44:37 -08:00
|
|
|
int i;
|
2017-09-08 13:39:09 -07:00
|
|
|
|
2019-11-05 15:34:35 -08:00
|
|
|
UNUSED(ifp0);
|
|
|
|
UNUSED(tcp);
|
|
|
|
|
|
|
|
result = ns__client_setup(client, clientmgr, true);
|
|
|
|
|
2019-12-09 14:39:38 +01:00
|
|
|
for (i = 0; i < 32; i++) {
|
2020-02-12 13:59:18 +01:00
|
|
|
if (atomic_load(&client_addrs[i]) == (uintptr_t)NULL ||
|
2020-02-13 14:44:37 -08:00
|
|
|
atomic_load(&client_addrs[i]) == (uintptr_t)client)
|
|
|
|
{
|
2019-11-05 15:34:35 -08:00
|
|
|
break;
|
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
}
|
2019-12-09 14:39:38 +01:00
|
|
|
REQUIRE(i < 32);
|
2019-11-05 15:34:35 -08:00
|
|
|
|
|
|
|
atomic_store(&client_refs[i], 2);
|
2020-02-12 13:59:18 +01:00
|
|
|
atomic_store(&client_addrs[i], (uintptr_t)client);
|
|
|
|
client->handle = (isc_nmhandle_t *)client; /* Hack */
|
2019-11-05 15:34:35 -08:00
|
|
|
*clientp = client;
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
2017-10-11 15:02:50 -07:00
|
|
|
/*%
|
|
|
|
* Synthesize a DNS message based on supplied QNAME, QTYPE and flags, then
|
|
|
|
* parse it and store the results in client->message.
|
|
|
|
*/
|
|
|
|
static isc_result_t
|
|
|
|
attach_query_msg_to_client(ns_client_t *client, const char *qnamestr,
|
2020-02-13 14:44:37 -08:00
|
|
|
dns_rdatatype_t qtype, unsigned int qflags) {
|
2017-10-11 15:02:50 -07:00
|
|
|
dns_rdataset_t *qrdataset = NULL;
|
2020-02-13 14:44:37 -08:00
|
|
|
dns_message_t *message = NULL;
|
|
|
|
unsigned char query[65536];
|
|
|
|
dns_name_t *qname = NULL;
|
|
|
|
isc_buffer_t querybuf;
|
|
|
|
dns_compress_t cctx;
|
|
|
|
isc_result_t result;
|
2017-10-11 15:02:50 -07:00
|
|
|
|
|
|
|
REQUIRE(client != NULL);
|
|
|
|
REQUIRE(qnamestr != NULL);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create a new DNS message holding a query.
|
|
|
|
*/
|
2020-09-25 11:51:36 +02:00
|
|
|
dns_message_create(mctx, DNS_MESSAGE_INTENTRENDER, &message);
|
2017-10-11 15:02:50 -07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Set query ID to a random value.
|
|
|
|
*/
|
2018-05-28 15:22:23 +02:00
|
|
|
message->id = isc_random16();
|
2017-10-11 15:02:50 -07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Set query flags as requested by the caller.
|
|
|
|
*/
|
|
|
|
message->flags = qflags;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Allocate structures required to construct the query.
|
|
|
|
*/
|
|
|
|
result = dns_message_gettemprdataset(message, &qrdataset);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto destroy_message;
|
|
|
|
}
|
|
|
|
result = dns_message_gettempname(message, &qname);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto put_rdataset;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Convert "qnamestr" to a DNS name, create a question rdataset of
|
|
|
|
* class IN and type "qtype", link the two and add the result to the
|
|
|
|
* QUESTION section of the query.
|
|
|
|
*/
|
|
|
|
result = dns_name_fromstring(qname, qnamestr, 0, mctx);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto put_name;
|
|
|
|
}
|
|
|
|
dns_rdataset_makequestion(qrdataset, dns_rdataclass_in, qtype);
|
|
|
|
ISC_LIST_APPEND(qname->list, qrdataset, link);
|
|
|
|
dns_message_addname(message, qname, DNS_SECTION_QUESTION);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Render the query.
|
|
|
|
*/
|
|
|
|
dns_compress_init(&cctx, -1, mctx);
|
|
|
|
isc_buffer_init(&querybuf, query, sizeof(query));
|
|
|
|
result = dns_message_renderbegin(message, &cctx, &querybuf);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto destroy_message;
|
|
|
|
}
|
|
|
|
result = dns_message_rendersection(message, DNS_SECTION_QUESTION, 0);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto destroy_message;
|
|
|
|
}
|
|
|
|
result = dns_message_renderend(message);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto destroy_message;
|
|
|
|
}
|
|
|
|
dns_compress_invalidate(&cctx);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Destroy the created message as it was rendered into "querybuf" and
|
|
|
|
* the latter is all we are going to need from now on.
|
|
|
|
*/
|
2020-09-21 16:16:15 -03:00
|
|
|
dns_message_detach(&message);
|
2017-10-11 15:02:50 -07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Parse the rendered query, storing results in client->message.
|
|
|
|
*/
|
|
|
|
isc_buffer_first(&querybuf);
|
|
|
|
return (dns_message_parse(client->message, &querybuf, 0));
|
|
|
|
|
|
|
|
put_name:
|
|
|
|
dns_message_puttempname(message, &qname);
|
|
|
|
put_rdataset:
|
|
|
|
dns_message_puttemprdataset(message, &qrdataset);
|
|
|
|
destroy_message:
|
2020-09-21 16:16:15 -03:00
|
|
|
dns_message_detach(&message);
|
2017-10-11 15:02:50 -07:00
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*%
|
2018-08-13 21:08:08 -07:00
|
|
|
* A hook action which stores the query context pointed to by "arg" at
|
|
|
|
* "data". Causes execution to be interrupted at hook insertion
|
2017-10-11 15:02:50 -07:00
|
|
|
* point.
|
|
|
|
*/
|
2018-12-06 11:36:30 +01:00
|
|
|
static ns_hookresult_t
|
2020-02-13 14:44:37 -08:00
|
|
|
extract_qctx(void *arg, void *data, isc_result_t *resultp) {
|
2017-10-11 15:02:50 -07:00
|
|
|
query_ctx_t **qctxp;
|
2020-02-13 14:44:37 -08:00
|
|
|
query_ctx_t *qctx;
|
2017-10-11 15:02:50 -07:00
|
|
|
|
2018-08-13 21:08:08 -07:00
|
|
|
REQUIRE(arg != NULL);
|
|
|
|
REQUIRE(data != NULL);
|
2017-10-11 15:02:50 -07:00
|
|
|
REQUIRE(resultp != NULL);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* qctx is a stack variable in lib/ns/query.c. Its contents need to be
|
|
|
|
* duplicated or otherwise they will become invalidated once the stack
|
|
|
|
* gets unwound.
|
|
|
|
*/
|
|
|
|
qctx = isc_mem_get(mctx, sizeof(*qctx));
|
|
|
|
if (qctx != NULL) {
|
2018-08-13 21:08:08 -07:00
|
|
|
memmove(qctx, (query_ctx_t *)arg, sizeof(*qctx));
|
2017-10-11 15:02:50 -07:00
|
|
|
}
|
|
|
|
|
2018-08-13 21:08:08 -07:00
|
|
|
qctxp = (query_ctx_t **)data;
|
2017-10-11 15:02:50 -07:00
|
|
|
/*
|
|
|
|
* If memory allocation failed, the supplied pointer will simply be set
|
|
|
|
* to NULL. We rely on the user of this hook to react properly.
|
|
|
|
*/
|
|
|
|
*qctxp = qctx;
|
|
|
|
*resultp = ISC_R_UNSET;
|
|
|
|
|
2018-12-06 11:36:30 +01:00
|
|
|
return (NS_HOOK_RETURN);
|
2017-10-11 15:02:50 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*%
|
|
|
|
* Initialize a query context for "client" and store it in "qctxp".
|
|
|
|
*
|
|
|
|
* Requires:
|
|
|
|
*
|
|
|
|
* \li "client->message" to hold a parsed DNS query.
|
|
|
|
*/
|
|
|
|
static isc_result_t
|
2020-02-13 14:44:37 -08:00
|
|
|
create_qctx_for_client(ns_client_t *client, query_ctx_t **qctxp) {
|
2018-09-19 23:38:23 -07:00
|
|
|
ns_hooktable_t *saved_hook_table = NULL, *query_hooks = NULL;
|
|
|
|
const ns_hook_t hook = {
|
2018-08-13 21:08:08 -07:00
|
|
|
.action = extract_qctx,
|
|
|
|
.action_data = qctxp,
|
2017-10-11 15:02:50 -07:00
|
|
|
};
|
|
|
|
|
|
|
|
REQUIRE(client != NULL);
|
|
|
|
REQUIRE(qctxp != NULL);
|
|
|
|
REQUIRE(*qctxp == NULL);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Call ns_query_start() to initialize a query context for given
|
|
|
|
* client, but first hook into query_setup() so that we can just
|
|
|
|
* extract an initialized query context, without kicking off any
|
|
|
|
* further processing. Make sure we do not overwrite any previously
|
|
|
|
* set hooks.
|
|
|
|
*/
|
2018-08-03 14:16:41 -07:00
|
|
|
|
2018-09-19 23:38:23 -07:00
|
|
|
ns_hooktable_create(mctx, &query_hooks);
|
|
|
|
ns_hook_add(query_hooks, mctx, NS_QUERY_SETUP, &hook);
|
2018-08-03 14:16:41 -07:00
|
|
|
|
2018-08-12 11:19:36 -07:00
|
|
|
saved_hook_table = ns__hook_table;
|
2018-09-19 23:38:23 -07:00
|
|
|
ns__hook_table = query_hooks;
|
2018-08-03 14:16:41 -07:00
|
|
|
|
2020-09-03 13:31:27 -07:00
|
|
|
ns_query_start(client, client->handle);
|
2018-08-12 11:19:36 -07:00
|
|
|
|
|
|
|
ns__hook_table = saved_hook_table;
|
2018-09-19 23:38:23 -07:00
|
|
|
ns_hooktable_free(mctx, (void **)&query_hooks);
|
2017-10-11 15:02:50 -07:00
|
|
|
|
2020-09-03 13:31:27 -07:00
|
|
|
isc_nmhandle_detach(&client->reqhandle);
|
|
|
|
|
2017-10-11 15:02:50 -07:00
|
|
|
if (*qctxp == NULL) {
|
|
|
|
return (ISC_R_NOMEMORY);
|
|
|
|
} else {
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
isc_result_t
|
|
|
|
ns_test_qctx_create(const ns_test_qctx_create_params_t *params,
|
2020-02-13 14:44:37 -08:00
|
|
|
query_ctx_t **qctxp) {
|
2017-10-11 15:02:50 -07:00
|
|
|
ns_client_t *client = NULL;
|
|
|
|
isc_result_t result;
|
2020-09-03 13:31:27 -07:00
|
|
|
isc_nmhandle_t *handle = NULL;
|
2017-10-11 15:02:50 -07:00
|
|
|
|
|
|
|
REQUIRE(params != NULL);
|
|
|
|
REQUIRE(params->qname != NULL);
|
|
|
|
REQUIRE(qctxp != NULL);
|
|
|
|
REQUIRE(*qctxp == NULL);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Allocate and initialize a client structure.
|
|
|
|
*/
|
2018-04-17 08:29:14 -07:00
|
|
|
result = ns_test_getclient(NULL, false, &client);
|
2017-10-11 15:02:50 -07:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
TIME_NOW(&client->tnow);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Every client needs to belong to a view.
|
|
|
|
*/
|
|
|
|
result = ns_test_makeview("view", params->with_cache, &client->view);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto detach_client;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Synthesize a DNS query using given QNAME, QTYPE and flags, storing
|
|
|
|
* it in client->message.
|
|
|
|
*/
|
|
|
|
result = attach_query_msg_to_client(client, params->qname,
|
|
|
|
params->qtype, params->qflags);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
2019-05-22 10:58:41 +02:00
|
|
|
goto detach_view;
|
2017-10-11 15:02:50 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Allow recursion for the client. As NS_CLIENTATTR_RA normally gets
|
|
|
|
* set in ns__client_request(), i.e. earlier than the unit tests hook
|
|
|
|
* into the call chain, just set it manually.
|
|
|
|
*/
|
|
|
|
client->attributes |= NS_CLIENTATTR_RA;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create a query context for a client sending the previously
|
|
|
|
* synthesized query.
|
|
|
|
*/
|
|
|
|
result = create_qctx_for_client(client, qctxp);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
2020-09-21 16:16:15 -03:00
|
|
|
goto detach_query;
|
2017-10-11 15:02:50 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2020-09-03 13:31:27 -07:00
|
|
|
* The reference count for "client" is now at 2, so we need to
|
|
|
|
* decrement it in order for it to drop to zero when "qctx" gets
|
|
|
|
* destroyed.
|
2017-10-11 15:02:50 -07:00
|
|
|
*/
|
2020-09-03 13:31:27 -07:00
|
|
|
handle = client->handle;
|
|
|
|
isc_nmhandle_detach(&handle);
|
2017-10-11 15:02:50 -07:00
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
|
2020-09-21 16:16:15 -03:00
|
|
|
detach_query:
|
|
|
|
dns_message_detach(&client->message);
|
2019-05-22 10:58:41 +02:00
|
|
|
detach_view:
|
|
|
|
dns_view_detach(&client->view);
|
2017-10-11 15:02:50 -07:00
|
|
|
detach_client:
|
2020-09-03 13:31:27 -07:00
|
|
|
isc_nmhandle_detach(&client->handle);
|
2017-10-11 15:02:50 -07:00
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
ns_test_qctx_destroy(query_ctx_t **qctxp) {
|
2017-10-11 15:02:50 -07:00
|
|
|
query_ctx_t *qctx;
|
|
|
|
|
|
|
|
REQUIRE(qctxp != NULL);
|
|
|
|
REQUIRE(*qctxp != NULL);
|
|
|
|
|
|
|
|
qctx = *qctxp;
|
2020-02-08 04:37:54 -08:00
|
|
|
*qctxp = NULL;
|
2017-10-11 15:02:50 -07:00
|
|
|
|
|
|
|
if (qctx->zone != NULL) {
|
|
|
|
dns_zone_detach(&qctx->zone);
|
|
|
|
}
|
|
|
|
if (qctx->db != NULL) {
|
|
|
|
dns_db_detach(&qctx->db);
|
|
|
|
}
|
2019-11-05 15:34:35 -08:00
|
|
|
if (qctx->client != NULL) {
|
2020-09-03 13:31:27 -07:00
|
|
|
isc_nmhandle_detach(&qctx->client->handle);
|
2019-11-05 15:34:35 -08:00
|
|
|
}
|
2017-10-11 15:02:50 -07:00
|
|
|
|
|
|
|
isc_mem_put(mctx, qctx, sizeof(*qctx));
|
|
|
|
}
|
|
|
|
|
2018-12-06 11:36:30 +01:00
|
|
|
ns_hookresult_t
|
2020-02-13 14:44:37 -08:00
|
|
|
ns_test_hook_catch_call(void *arg, void *data, isc_result_t *resultp) {
|
2018-08-13 21:08:08 -07:00
|
|
|
UNUSED(arg);
|
|
|
|
UNUSED(data);
|
2017-10-11 15:02:50 -07:00
|
|
|
|
|
|
|
*resultp = ISC_R_UNSET;
|
|
|
|
|
2018-12-06 11:36:30 +01:00
|
|
|
return (NS_HOOK_RETURN);
|
2017-10-11 15:02:50 -07:00
|
|
|
}
|
|
|
|
|
2017-09-08 13:39:09 -07:00
|
|
|
/*
|
|
|
|
* Sleep for 'usec' microseconds.
|
|
|
|
*/
|
|
|
|
void
|
2020-02-13 14:44:37 -08:00
|
|
|
ns_test_nap(uint32_t usec) {
|
2017-09-08 13:39:09 -07:00
|
|
|
struct timespec ts;
|
|
|
|
|
|
|
|
ts.tv_sec = usec / 1000000;
|
|
|
|
ts.tv_nsec = (usec % 1000000) * 1000;
|
|
|
|
nanosleep(&ts, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
isc_result_t
|
|
|
|
ns_test_loaddb(dns_db_t **db, dns_dbtype_t dbtype, const char *origin,
|
2020-02-13 14:44:37 -08:00
|
|
|
const char *testfile) {
|
|
|
|
isc_result_t result;
|
2020-02-12 13:59:18 +01:00
|
|
|
dns_fixedname_t fixed;
|
2020-02-13 14:44:37 -08:00
|
|
|
dns_name_t *name;
|
2017-09-08 13:39:09 -07:00
|
|
|
|
2018-03-28 14:38:09 +02:00
|
|
|
name = dns_fixedname_initname(&fixed);
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
result = dns_name_fromstring(name, origin, 0, NULL);
|
2020-02-13 21:48:23 +01:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
2020-02-12 13:59:18 +01:00
|
|
|
return (result);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
|
2020-02-12 13:59:18 +01:00
|
|
|
result = dns_db_create(mctx, "rbt", name, dbtype, dns_rdataclass_in, 0,
|
|
|
|
NULL, db);
|
2020-02-13 21:48:23 +01:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
2017-09-08 13:39:09 -07:00
|
|
|
return (result);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
|
2018-04-03 13:22:09 +02:00
|
|
|
result = dns_db_load(*db, testfile, dns_masterformat_text, 0);
|
2017-09-08 13:39:09 -07:00
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2020-02-13 14:44:37 -08:00
|
|
|
fromhex(char c) {
|
2020-02-13 21:48:23 +01:00
|
|
|
if (c >= '0' && c <= '9') {
|
2017-09-08 13:39:09 -07:00
|
|
|
return (c - '0');
|
2020-02-13 21:48:23 +01:00
|
|
|
} else if (c >= 'a' && c <= 'f') {
|
2017-09-08 13:39:09 -07:00
|
|
|
return (c - 'a' + 10);
|
2020-02-13 21:48:23 +01:00
|
|
|
} else if (c >= 'A' && c <= 'F') {
|
2017-09-08 13:39:09 -07:00
|
|
|
return (c - 'A' + 10);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
printf("bad input format: %02x\n", c);
|
|
|
|
exit(3);
|
|
|
|
/* NOTREACHED */
|
|
|
|
}
|
|
|
|
|
|
|
|
isc_result_t
|
2020-02-12 13:59:18 +01:00
|
|
|
ns_test_getdata(const char *file, unsigned char *buf, size_t bufsiz,
|
2020-02-13 14:44:37 -08:00
|
|
|
size_t *sizep) {
|
|
|
|
isc_result_t result;
|
2017-09-08 13:39:09 -07:00
|
|
|
unsigned char *bp;
|
2020-02-13 14:44:37 -08:00
|
|
|
char *rp, *wp;
|
|
|
|
char s[BUFSIZ];
|
|
|
|
size_t len, i;
|
|
|
|
FILE *f = NULL;
|
|
|
|
int n;
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
result = isc_stdio_open(file, "r", &f);
|
2020-02-13 21:48:23 +01:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
2017-09-08 13:39:09 -07:00
|
|
|
return (result);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
|
|
|
|
bp = buf;
|
|
|
|
while (fgets(s, sizeof(s), f) != NULL) {
|
|
|
|
rp = s;
|
|
|
|
wp = s;
|
|
|
|
len = 0;
|
|
|
|
while (*rp != '\0') {
|
2020-02-13 21:48:23 +01:00
|
|
|
if (*rp == '#') {
|
2017-09-08 13:39:09 -07:00
|
|
|
break;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2020-02-12 13:59:18 +01:00
|
|
|
if (*rp != ' ' && *rp != '\t' && *rp != '\r' &&
|
|
|
|
*rp != '\n') {
|
2017-09-08 13:39:09 -07:00
|
|
|
*wp++ = *rp;
|
|
|
|
len++;
|
|
|
|
}
|
|
|
|
rp++;
|
|
|
|
}
|
2020-02-13 21:48:23 +01:00
|
|
|
if (len == 0U) {
|
2017-09-08 13:39:09 -07:00
|
|
|
continue;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
|
|
|
if (len % 2 != 0U) {
|
2017-09-08 13:39:09 -07:00
|
|
|
CHECK(ISC_R_UNEXPECTEDEND);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
|
|
|
if (len > bufsiz * 2) {
|
2017-09-08 13:39:09 -07:00
|
|
|
CHECK(ISC_R_NOSPACE);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2017-09-08 13:39:09 -07:00
|
|
|
rp = s;
|
|
|
|
for (i = 0; i < len; i += 2) {
|
|
|
|
n = fromhex(*rp++);
|
|
|
|
n *= 16;
|
|
|
|
n += fromhex(*rp++);
|
|
|
|
*bp++ = n;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
*sizep = bp - buf;
|
|
|
|
|
|
|
|
result = ISC_R_SUCCESS;
|
|
|
|
|
2020-02-12 13:59:18 +01:00
|
|
|
cleanup:
|
2017-09-08 13:39:09 -07:00
|
|
|
isc_stdio_close(f);
|
|
|
|
return (result);
|
|
|
|
}
|