summaryrefslogtreecommitdiff
path: root/testcode/testbound.c
diff options
context:
space:
mode:
Diffstat (limited to 'testcode/testbound.c')
-rw-r--r--testcode/testbound.c445
1 files changed, 445 insertions, 0 deletions
diff --git a/testcode/testbound.c b/testcode/testbound.c
new file mode 100644
index 000000000000..05982849cc29
--- /dev/null
+++ b/testcode/testbound.c
@@ -0,0 +1,445 @@
+/*
+ * testcode/testbound.c - test program for unbound.
+ *
+ * Copyright (c) 2007, NLnet Labs. All rights reserved.
+ *
+ * This software is open source.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ *
+ * Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ *
+ * Redistributions in binary form must reproduce the above copyright notice,
+ * this list of conditions and the following disclaimer in the documentation
+ * and/or other materials provided with the distribution.
+ *
+ * Neither the name of the NLNET LABS nor the names of its contributors may
+ * be used to endorse or promote products derived from this software without
+ * specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+ * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+ * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+ * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE
+ * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ *
+ */
+/**
+ * \file
+ * Exits with code 1 on a failure. 0 if all unit tests are successfull.
+ */
+
+#include "config.h"
+#include "testcode/ldns-testpkts.h"
+#include "testcode/replay.h"
+#include "testcode/fake_event.h"
+#include "daemon/remote.h"
+#include "util/config_file.h"
+
+/** signal that this is a testbound compile */
+#define unbound_testbound 1
+/**
+ * include the main program from the unbound daemon.
+ * rename main to daemon_main to call it
+ */
+#define main daemon_main
+#include "daemon/unbound.c"
+#undef main
+
+/** maximum line length for lines in the replay file. */
+#define MAX_LINE_LEN 1024
+/** config files (removed at exit) */
+static struct config_strlist* cfgfiles = NULL;
+
+/** give commandline usage for testbound. */
+static void
+testbound_usage()
+{
+ printf("usage: testbound [options]\n");
+ printf("\ttest the unbound daemon.\n");
+ printf("-h this help\n");
+ printf("-p file playback text file\n");
+ printf("-2 detect SHA256 support (exit code 0 or 1)\n");
+ printf("-g detect GOST support (exit code 0 or 1)\n");
+ printf("-e detect ECDSA support (exit code 0 or 1)\n");
+ printf("-s testbound self-test - unit test of testbound parts.\n");
+ printf("-o str unbound commandline options separated by spaces.\n");
+ printf("Version %s\n", PACKAGE_VERSION);
+ printf("BSD licensed, see LICENSE file in source package.\n");
+ printf("Report bugs to %s.\n", PACKAGE_BUGREPORT);
+}
+
+/** Max number of arguments to pass to unbound. */
+#define MAXARG 100
+
+/**
+ * Add options from string to passed argc. splits on whitespace.
+ * @param args: the option argument, "-v -p 12345" or so.
+ * @param pass_argc: ptr to the argc for unbound. Modified.
+ * @param pass_argv: the argv to pass to unbound. Modified.
+ */
+static void
+add_opts(const char* args, int* pass_argc, char* pass_argv[])
+{
+ const char *p = args, *np;
+ size_t len;
+ while(p && isspace((int)*p))
+ p++;
+ while(p && *p) {
+ /* find location of next string and length of this one */
+ if((np = strchr(p, ' ')))
+ len = (size_t)(np-p);
+ else len = strlen(p);
+ /* allocate and copy option */
+ if(*pass_argc >= MAXARG-1)
+ fatal_exit("too many arguments: '%s'", p);
+ pass_argv[*pass_argc] = (char*)malloc(len+1);
+ if(!pass_argv[*pass_argc])
+ fatal_exit("add_opts: out of memory");
+ memcpy(pass_argv[*pass_argc], p, len);
+ pass_argv[*pass_argc][len] = 0;
+ (*pass_argc)++;
+ /* go to next option */
+ p = np;
+ while(p && isspace((int)*p))
+ p++;
+ }
+}
+
+/** pretty print commandline for unbound in this test */
+static void
+echo_cmdline(int argc, char* argv[])
+{
+ int i;
+ fprintf(stderr, "testbound is starting:");
+ for(i=0; i<argc; i++) {
+ fprintf(stderr, " [%s]", argv[i]);
+ }
+ fprintf(stderr, "\n");
+}
+
+/** spool autotrust file */
+static void
+spool_auto_file(FILE* in, int* lineno, FILE* cfg, char* id)
+{
+ char line[MAX_LINE_LEN];
+ char* parse;
+ FILE* spool;
+ /* find filename for new file */
+ while(isspace((int)*id))
+ id++;
+ if(strlen(id)==0)
+ fatal_exit("AUTROTRUST_FILE must have id, line %d", *lineno);
+ id[strlen(id)-1]=0; /* remove newline */
+ fake_temp_file("_auto_", id, line, sizeof(line));
+ /* add option for the file */
+ fprintf(cfg, "server: auto-trust-anchor-file: \"%s\"\n", line);
+ /* open file and spool to it */
+ spool = fopen(line, "w");
+ if(!spool) fatal_exit("could not open %s: %s", line, strerror(errno));
+ fprintf(stderr, "testbound is spooling key file: %s\n", line);
+ if(!cfg_strlist_insert(&cfgfiles, strdup(line)))
+ fatal_exit("out of memory");
+ line[sizeof(line)-1] = 0;
+ while(fgets(line, MAX_LINE_LEN-1, in)) {
+ parse = line;
+ (*lineno)++;
+ while(isspace((int)*parse))
+ parse++;
+ if(strncmp(parse, "AUTOTRUST_END", 13) == 0) {
+ fclose(spool);
+ return;
+ }
+ fputs(line, spool);
+ }
+ fatal_exit("no AUTOTRUST_END in input file");
+}
+
+/** process config elements */
+static void
+setup_config(FILE* in, int* lineno, int* pass_argc, char* pass_argv[])
+{
+ char configfile[MAX_LINE_LEN];
+ char line[MAX_LINE_LEN];
+ char* parse;
+ FILE* cfg;
+ fake_temp_file("_cfg", "", configfile, sizeof(configfile));
+ add_opts("-c", pass_argc, pass_argv);
+ add_opts(configfile, pass_argc, pass_argv);
+ cfg = fopen(configfile, "w");
+ if(!cfg) fatal_exit("could not open %s: %s",
+ configfile, strerror(errno));
+ if(!cfg_strlist_insert(&cfgfiles, strdup(configfile)))
+ fatal_exit("out of memory");
+ line[sizeof(line)-1] = 0;
+ /* some basic settings to not pollute the host system */
+ fprintf(cfg, "server: use-syslog: no\n");
+ fprintf(cfg, " directory: \"\"\n");
+ fprintf(cfg, " chroot: \"\"\n");
+ fprintf(cfg, " username: \"\"\n");
+ fprintf(cfg, " pidfile: \"\"\n");
+ fprintf(cfg, " val-log-level: 2\n");
+ while(fgets(line, MAX_LINE_LEN-1, in)) {
+ parse = line;
+ (*lineno)++;
+ while(isspace((int)*parse))
+ parse++;
+ if(!*parse || parse[0] == ';')
+ continue;
+ if(strncmp(parse, "COMMANDLINE", 11) == 0) {
+ parse[strlen(parse)-1] = 0; /* strip off \n */
+ add_opts(parse+11, pass_argc, pass_argv);
+ continue;
+ }
+ if(strncmp(parse, "AUTOTRUST_FILE", 14) == 0) {
+ spool_auto_file(in, lineno, cfg, parse+14);
+ continue;
+ }
+ if(strncmp(parse, "CONFIG_END", 10) == 0) {
+ fclose(cfg);
+ return;
+ }
+ fputs(line, cfg);
+ }
+ fatal_exit("No CONFIG_END in input file");
+
+}
+
+/** read playback file */
+static struct replay_scenario*
+setup_playback(const char* filename, int* pass_argc, char* pass_argv[])
+{
+ struct replay_scenario* scen = NULL;
+ int lineno = 0;
+
+ if(filename) {
+ FILE *in = fopen(filename, "rb");
+ if(!in) {
+ perror(filename);
+ exit(1);
+ }
+ setup_config(in, &lineno, pass_argc, pass_argv);
+ scen = replay_scenario_read(in, filename, &lineno);
+ fclose(in);
+ if(!scen)
+ fatal_exit("Could not read: %s", filename);
+ }
+ else fatal_exit("need a playback file (-p)");
+ log_info("Scenario: %s", scen->title);
+ return scen;
+}
+
+/** remove config file at exit */
+void remove_configfile(void)
+{
+ struct config_strlist* p;
+ for(p=cfgfiles; p; p=p->next)
+ unlink(p->str);
+ config_delstrlist(cfgfiles);
+ cfgfiles = NULL;
+}
+
+/**
+ * Main fake event test program. Setup, teardown and report errors.
+ * @param argc: arg count.
+ * @param argv: array of commandline arguments.
+ * @return program failure if test fails.
+ */
+int
+main(int argc, char* argv[])
+{
+ int c, res;
+ int pass_argc = 0;
+ char* pass_argv[MAXARG];
+ char* playback_file = NULL;
+ int init_optind = optind;
+ char* init_optarg = optarg;
+ struct replay_scenario* scen = NULL;
+
+ /* we do not want the test to depend on the timezone */
+ (void)putenv("TZ=UTC");
+
+ log_init(NULL, 0, NULL);
+ /* determine commandline options for the daemon */
+ pass_argc = 1;
+ pass_argv[0] = "unbound";
+ add_opts("-d", &pass_argc, pass_argv);
+ while( (c=getopt(argc, argv, "2egho:p:s")) != -1) {
+ switch(c) {
+ case 's':
+ free(pass_argv[1]);
+ testbound_selftest();
+ printf("selftest successful\n");
+ exit(0);
+ case '2':
+#if defined(HAVE_EVP_SHA256) && defined(USE_SHA2)
+ printf("SHA256 supported\n");
+ exit(0);
+#else
+ printf("SHA256 not supported\n");
+ exit(1);
+#endif
+ break;
+ case 'e':
+#if defined(USE_ECDSA)
+ printf("ECDSA supported\n");
+ exit(0);
+#else
+ printf("ECDSA not supported\n");
+ exit(1);
+#endif
+ break;
+ case 'g':
+#ifdef USE_GOST
+ if(ldns_key_EVP_load_gost_id()) {
+ printf("GOST supported\n");
+ exit(0);
+ } else {
+ printf("GOST not supported\n");
+ exit(1);
+ }
+#else
+ printf("GOST not supported\n");
+ exit(1);
+#endif
+ break;
+ case 'p':
+ playback_file = optarg;
+ break;
+ case 'o':
+ add_opts(optarg, &pass_argc, pass_argv);
+ break;
+ case '?':
+ case 'h':
+ default:
+ testbound_usage();
+ return 1;
+ }
+ }
+ argc -= optind;
+ argv += optind;
+ if(argc != 0) {
+ testbound_usage();
+ return 1;
+ }
+ log_info("Start of %s testbound program.", PACKAGE_STRING);
+ if(atexit(&remove_configfile) != 0)
+ fatal_exit("atexit() failed: %s", strerror(errno));
+
+ /* setup test environment */
+ scen = setup_playback(playback_file, &pass_argc, pass_argv);
+ /* init fake event backend */
+ fake_event_init(scen);
+
+ pass_argv[pass_argc] = NULL;
+ echo_cmdline(pass_argc, pass_argv);
+
+ /* reset getopt processing */
+ optind = init_optind;
+ optarg = init_optarg;
+
+ /* run the normal daemon */
+ res = daemon_main(pass_argc, pass_argv);
+
+ fake_event_cleanup();
+ for(c=1; c<pass_argc; c++)
+ free(pass_argv[c]);
+ if(res == 0) {
+ log_info("Testbound Exit Success");
+#ifdef HAVE_PTHREAD
+ /* dlopen frees its thread state (dlopen of gost engine) */
+ pthread_exit(NULL);
+#endif
+ }
+ return res;
+}
+
+/* fake remote control */
+struct listen_port* daemon_remote_open_ports(struct config_file*
+ ATTR_UNUSED(cfg))
+{
+ return NULL;
+}
+
+struct daemon_remote* daemon_remote_create(struct config_file* ATTR_UNUSED(cfg))
+{
+ return (struct daemon_remote*)calloc(1,1);
+}
+
+void daemon_remote_delete(struct daemon_remote* rc)
+{
+ free(rc);
+}
+
+void daemon_remote_clear(struct daemon_remote* ATTR_UNUSED(rc))
+{
+ /* nothing */
+}
+
+int daemon_remote_open_accept(struct daemon_remote* ATTR_UNUSED(rc),
+ struct listen_port* ATTR_UNUSED(ports),
+ struct worker* ATTR_UNUSED(worker))
+{
+ return 1;
+}
+
+int remote_accept_callback(struct comm_point* ATTR_UNUSED(c),
+ void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
+ struct comm_reply* ATTR_UNUSED(repinfo))
+{
+ log_assert(0);
+ return 0;
+}
+
+int remote_control_callback(struct comm_point* ATTR_UNUSED(c),
+ void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
+ struct comm_reply* ATTR_UNUSED(repinfo))
+{
+ log_assert(0);
+ return 0;
+}
+
+void remote_get_opt_ssl(char* ATTR_UNUSED(str), void* ATTR_UNUSED(arg))
+{
+ log_assert(0);
+}
+
+void wsvc_command_option(const char* ATTR_UNUSED(wopt),
+ const char* ATTR_UNUSED(cfgfile), int ATTR_UNUSED(v),
+ int ATTR_UNUSED(c))
+{
+ log_assert(0);
+}
+
+void wsvc_setup_worker(struct worker* ATTR_UNUSED(worker))
+{
+ /* do nothing */
+}
+
+void wsvc_desetup_worker(struct worker* ATTR_UNUSED(worker))
+{
+ /* do nothing */
+}
+
+#ifdef UB_ON_WINDOWS
+void worker_win_stop_cb(int ATTR_UNUSED(fd), short ATTR_UNUSED(ev),
+ void* ATTR_UNUSED(arg))
+{
+ log_assert(0);
+}
+
+void wsvc_cron_cb(void* ATTR_UNUSED(arg))
+{
+ log_assert(0);
+}
+#endif /* UB_ON_WINDOWS */
+