diff options
Diffstat (limited to 'testcode/testbound.c')
| -rw-r--r-- | testcode/testbound.c | 445 | 
1 files changed, 445 insertions, 0 deletions
| diff --git a/testcode/testbound.c b/testcode/testbound.c new file mode 100644 index 000000000000..05982849cc29 --- /dev/null +++ b/testcode/testbound.c @@ -0,0 +1,445 @@ +/* + * testcode/testbound.c - test program for unbound. + * + * Copyright (c) 2007, NLnet Labs. All rights reserved. + * + * This software is open source. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * + * Redistributions of source code must retain the above copyright notice, + * this list of conditions and the following disclaimer. + * + * Redistributions in binary form must reproduce the above copyright notice, + * this list of conditions and the following disclaimer in the documentation + * and/or other materials provided with the distribution. + * + * Neither the name of the NLNET LABS nor the names of its contributors may + * be used to endorse or promote products derived from this software without + * specific prior written permission. + * + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED + * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE + * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + * POSSIBILITY OF SUCH DAMAGE. + * + */ +/** + * \file + * Exits with code 1 on a failure. 0 if all unit tests are successfull. + */ + +#include "config.h" +#include "testcode/ldns-testpkts.h" +#include "testcode/replay.h" +#include "testcode/fake_event.h" +#include "daemon/remote.h" +#include "util/config_file.h" + +/** signal that this is a testbound compile */ +#define unbound_testbound 1 +/**  + * include the main program from the unbound daemon. + * rename main to daemon_main to call it + */ +#define main daemon_main +#include "daemon/unbound.c" +#undef main + +/** maximum line length for lines in the replay file. */ +#define MAX_LINE_LEN 1024 +/** config files (removed at exit) */ +static struct config_strlist* cfgfiles = NULL; + +/** give commandline usage for testbound. */ +static void +testbound_usage() +{ +	printf("usage: testbound [options]\n"); +	printf("\ttest the unbound daemon.\n"); +	printf("-h      this help\n"); +	printf("-p file	playback text file\n"); +	printf("-2 	detect SHA256 support (exit code 0 or 1)\n"); +	printf("-g 	detect GOST support (exit code 0 or 1)\n"); +	printf("-e 	detect ECDSA support (exit code 0 or 1)\n"); +	printf("-s 	testbound self-test - unit test of testbound parts.\n"); +	printf("-o str  unbound commandline options separated by spaces.\n"); +	printf("Version %s\n", PACKAGE_VERSION); +	printf("BSD licensed, see LICENSE file in source package.\n"); +	printf("Report bugs to %s.\n", PACKAGE_BUGREPORT); +} + +/** Max number of arguments to pass to unbound. */ +#define MAXARG 100 + +/**  + * Add options from string to passed argc. splits on whitespace. + * @param args: the option argument, "-v -p 12345" or so. + * @param pass_argc: ptr to the argc for unbound. Modified. + * @param pass_argv: the argv to pass to unbound. Modified. + */ +static void +add_opts(const char* args, int* pass_argc, char* pass_argv[]) +{ +	const char *p = args, *np; +	size_t len; +	while(p && isspace((int)*p))  +		p++; +	while(p && *p) { +		/* find location of next string and length of this one */ +		if((np = strchr(p, ' '))) +			len = (size_t)(np-p); +		else	len = strlen(p); +		/* allocate and copy option */ +		if(*pass_argc >= MAXARG-1) +			fatal_exit("too many arguments: '%s'", p); +		pass_argv[*pass_argc] = (char*)malloc(len+1); +		if(!pass_argv[*pass_argc]) +			fatal_exit("add_opts: out of memory"); +		memcpy(pass_argv[*pass_argc], p, len); +		pass_argv[*pass_argc][len] = 0; +		(*pass_argc)++; +		/* go to next option */ +	        p = np; +		while(p && isspace((int)*p))  +			p++; +	} +} + +/** pretty print commandline for unbound in this test */ +static void +echo_cmdline(int argc, char* argv[]) +{ +	int i; +	fprintf(stderr, "testbound is starting:"); +	for(i=0; i<argc; i++) { +		fprintf(stderr, " [%s]", argv[i]); +	} +	fprintf(stderr, "\n"); +} + +/** spool autotrust file */ +static void +spool_auto_file(FILE* in, int* lineno, FILE* cfg, char* id) +{ +	char line[MAX_LINE_LEN]; +	char* parse; +	FILE* spool; +	/* find filename for new file */ +	while(isspace((int)*id)) +		id++; +	if(strlen(id)==0)  +		fatal_exit("AUTROTRUST_FILE must have id, line %d", *lineno); +	id[strlen(id)-1]=0; /* remove newline */ +	fake_temp_file("_auto_", id, line, sizeof(line)); +	/* add option for the file */ +	fprintf(cfg, "server:	auto-trust-anchor-file: \"%s\"\n", line); +	/* open file and spool to it */ +	spool = fopen(line, "w"); +	if(!spool) fatal_exit("could not open %s: %s", line, strerror(errno)); +	fprintf(stderr, "testbound is spooling key file: %s\n", line); +	if(!cfg_strlist_insert(&cfgfiles, strdup(line)))  +		fatal_exit("out of memory"); +	line[sizeof(line)-1] = 0; +	while(fgets(line, MAX_LINE_LEN-1, in)) { +		parse = line; +		(*lineno)++; +		while(isspace((int)*parse)) +			parse++; +		if(strncmp(parse, "AUTOTRUST_END", 13) == 0) { +			fclose(spool); +			return; +		} +		fputs(line, spool); +	} +	fatal_exit("no AUTOTRUST_END in input file"); +} + +/** process config elements */ +static void +setup_config(FILE* in, int* lineno, int* pass_argc, char* pass_argv[]) +{ +	char configfile[MAX_LINE_LEN]; +	char line[MAX_LINE_LEN]; +	char* parse; +	FILE* cfg; +	fake_temp_file("_cfg", "", configfile, sizeof(configfile)); +	add_opts("-c", pass_argc, pass_argv); +	add_opts(configfile, pass_argc, pass_argv); +	cfg = fopen(configfile, "w"); +	if(!cfg) fatal_exit("could not open %s: %s",  +			configfile, strerror(errno)); +	if(!cfg_strlist_insert(&cfgfiles, strdup(configfile)))  +		fatal_exit("out of memory"); +	line[sizeof(line)-1] = 0; +	/* some basic settings to not pollute the host system */ +	fprintf(cfg, "server:	use-syslog: no\n"); +	fprintf(cfg, "		directory: \"\"\n"); +	fprintf(cfg, "		chroot: \"\"\n"); +	fprintf(cfg, "		username: \"\"\n"); +	fprintf(cfg, "		pidfile: \"\"\n"); +	fprintf(cfg, "		val-log-level: 2\n"); +	while(fgets(line, MAX_LINE_LEN-1, in)) { +		parse = line; +		(*lineno)++; +		while(isspace((int)*parse)) +			parse++; +		if(!*parse || parse[0] == ';') +			continue; +		if(strncmp(parse, "COMMANDLINE", 11) == 0) { +			parse[strlen(parse)-1] = 0; /* strip off \n */ +			add_opts(parse+11, pass_argc, pass_argv); +			continue; +		} +		if(strncmp(parse, "AUTOTRUST_FILE", 14) == 0) { +			spool_auto_file(in, lineno, cfg, parse+14); +			continue; +		} +		if(strncmp(parse, "CONFIG_END", 10) == 0) { +			fclose(cfg); +			return; +		} +		fputs(line, cfg); +	} +	fatal_exit("No CONFIG_END in input file"); + +} + +/** read playback file */ +static struct replay_scenario*  +setup_playback(const char* filename, int* pass_argc, char* pass_argv[]) +{ +	struct replay_scenario* scen = NULL; +	int lineno = 0; + +	if(filename) { +		FILE *in = fopen(filename, "rb"); +		if(!in) { +			perror(filename); +			exit(1); +		} +		setup_config(in, &lineno, pass_argc, pass_argv); +		scen = replay_scenario_read(in, filename, &lineno); +		fclose(in); +		if(!scen) +			fatal_exit("Could not read: %s", filename); +	} +	else fatal_exit("need a playback file (-p)"); +	log_info("Scenario: %s", scen->title); +	return scen; +} + +/** remove config file at exit */ +void remove_configfile(void) +{ +	struct config_strlist* p; +	for(p=cfgfiles; p; p=p->next) +		unlink(p->str); +	config_delstrlist(cfgfiles); +	cfgfiles = NULL; +} + +/** + * Main fake event test program. Setup, teardown and report errors. + * @param argc: arg count. + * @param argv: array of commandline arguments. + * @return program failure if test fails. + */ +int  +main(int argc, char* argv[]) +{ +	int c, res; +	int pass_argc = 0; +	char* pass_argv[MAXARG]; +	char* playback_file = NULL; +	int init_optind = optind; +	char* init_optarg = optarg; +	struct replay_scenario* scen = NULL; + +	/* we do not want the test to depend on the timezone */ +	(void)putenv("TZ=UTC"); + +	log_init(NULL, 0, NULL); +	/* determine commandline options for the daemon */ +	pass_argc = 1; +	pass_argv[0] = "unbound"; +	add_opts("-d", &pass_argc, pass_argv); +	while( (c=getopt(argc, argv, "2egho:p:s")) != -1) { +		switch(c) { +		case 's': +			free(pass_argv[1]); +			testbound_selftest(); +			printf("selftest successful\n"); +			exit(0); +		case '2': +#if defined(HAVE_EVP_SHA256) && defined(USE_SHA2) +			printf("SHA256 supported\n"); +			exit(0); +#else +			printf("SHA256 not supported\n"); +			exit(1); +#endif +			break; +		case 'e': +#if defined(USE_ECDSA) +			printf("ECDSA supported\n"); +			exit(0); +#else +			printf("ECDSA not supported\n"); +			exit(1); +#endif +			break; +		case 'g': +#ifdef USE_GOST +			if(ldns_key_EVP_load_gost_id()) { +				printf("GOST supported\n"); +				exit(0); +			} else { +				printf("GOST not supported\n"); +				exit(1); +			} +#else +			printf("GOST not supported\n"); +			exit(1); +#endif +			break; +		case 'p': +			playback_file = optarg; +			break; +		case 'o': +			add_opts(optarg, &pass_argc, pass_argv); +			break; +		case '?': +		case 'h': +		default: +			testbound_usage(); +			return 1; +		} +	} +	argc -= optind; +	argv += optind; +	if(argc != 0) { +		testbound_usage(); +		return 1; +	} +	log_info("Start of %s testbound program.", PACKAGE_STRING); +	if(atexit(&remove_configfile) != 0) +		fatal_exit("atexit() failed: %s", strerror(errno)); + +	/* setup test environment */ +	scen = setup_playback(playback_file, &pass_argc, pass_argv); +	/* init fake event backend */ +	fake_event_init(scen); + +	pass_argv[pass_argc] = NULL; +	echo_cmdline(pass_argc, pass_argv); + +	/* reset getopt processing */ +	optind = init_optind; +	optarg = init_optarg; + +	/* run the normal daemon */ +	res = daemon_main(pass_argc, pass_argv); + +	fake_event_cleanup(); +	for(c=1; c<pass_argc; c++) +		free(pass_argv[c]); +	if(res == 0) { +		log_info("Testbound Exit Success"); +#ifdef HAVE_PTHREAD +		/* dlopen frees its thread state (dlopen of gost engine) */ +		pthread_exit(NULL); +#endif +	} +	return res; +} + +/* fake remote control */ +struct listen_port* daemon_remote_open_ports(struct config_file*  +	ATTR_UNUSED(cfg)) +{ +	return NULL; +} + +struct daemon_remote* daemon_remote_create(struct config_file* ATTR_UNUSED(cfg)) +{ +	return (struct daemon_remote*)calloc(1,1); +} + +void daemon_remote_delete(struct daemon_remote* rc) +{ +	free(rc); +} + +void daemon_remote_clear(struct daemon_remote* ATTR_UNUSED(rc)) +{ +	/* nothing */ +} + +int daemon_remote_open_accept(struct daemon_remote* ATTR_UNUSED(rc), +        struct listen_port* ATTR_UNUSED(ports),  +	struct worker* ATTR_UNUSED(worker)) +{ +	return 1; +} + +int remote_accept_callback(struct comm_point* ATTR_UNUSED(c),  +	void* ATTR_UNUSED(arg), int ATTR_UNUSED(error), +        struct comm_reply* ATTR_UNUSED(repinfo)) +{ +	log_assert(0); +	return 0; +} + +int remote_control_callback(struct comm_point* ATTR_UNUSED(c),  +	void* ATTR_UNUSED(arg), int ATTR_UNUSED(error), +        struct comm_reply* ATTR_UNUSED(repinfo)) +{ +	log_assert(0); +	return 0; +} + +void remote_get_opt_ssl(char* ATTR_UNUSED(str), void* ATTR_UNUSED(arg)) +{ +        log_assert(0); +} + +void wsvc_command_option(const char* ATTR_UNUSED(wopt),  +	const char* ATTR_UNUSED(cfgfile), int ATTR_UNUSED(v),  +	int ATTR_UNUSED(c)) +{ +	log_assert(0); +} + +void wsvc_setup_worker(struct worker* ATTR_UNUSED(worker)) +{ +	/* do nothing */ +} + +void wsvc_desetup_worker(struct worker* ATTR_UNUSED(worker)) +{ +	/* do nothing */ +} + +#ifdef UB_ON_WINDOWS +void worker_win_stop_cb(int ATTR_UNUSED(fd), short ATTR_UNUSED(ev), +	void* ATTR_UNUSED(arg)) +{ +	log_assert(0); +} + +void wsvc_cron_cb(void* ATTR_UNUSED(arg)) +{ +	log_assert(0); +} +#endif /* UB_ON_WINDOWS */ + | 
