Skip to content
GitLab
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
Menu
Open sidebar
Sebastian Schrader
Kea
Commits
52f4e6fa
Commit
52f4e6fa
authored
Nov 21, 2011
by
Jelte Jansen
Browse files
[1390] indentation fixes
parent
33a956b0
Changes
2
Hide whitespace changes
Inline
Side-by-side
src/bin/auth/auth_srv.cc
View file @
52f4e6fa
...
...
@@ -473,10 +473,10 @@ AuthSrv::processMessage(const IOMessage& io_message, MessagePtr message,
const
RRType
&
qtype
=
question
->
getType
();
if
(
qtype
==
RRType
::
AXFR
())
{
sendAnswer
=
impl_
->
processXfrQuery
(
io_message
,
message
,
buffer
,
tsig_context
);
tsig_context
);
}
else
if
(
qtype
==
RRType
::
IXFR
())
{
sendAnswer
=
impl_
->
processXfrQuery
(
io_message
,
message
,
buffer
,
tsig_context
);
tsig_context
);
}
else
{
sendAnswer
=
impl_
->
processNormalQuery
(
io_message
,
message
,
buffer
,
tsig_context
);
...
...
src/bin/auth/tests/auth_srv_unittest.cc
View file @
52f4e6fa
...
...
@@ -229,7 +229,8 @@ TEST_F(AuthSrvTest, AXFROverUDP) {
TEST_F
(
AuthSrvTest
,
AXFRSuccess
)
{
EXPECT_FALSE
(
xfrout
.
isConnected
());
UnitTestUtil
::
createRequestMessage
(
request_message
,
opcode
,
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
AXFR
());
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
AXFR
());
createRequestPacket
(
request_message
,
IPPROTO_TCP
);
// On success, the AXFR query has been passed to a separate process,
// so we shouldn't have to respond.
...
...
@@ -245,7 +246,8 @@ TEST_F(AuthSrvTest, TSIGSigned) {
const
TSIGKey
key
(
"key:c2VjcmV0Cg==:hmac-sha1"
);
TSIGContext
context
(
key
);
UnitTestUtil
::
createRequestMessage
(
request_message
,
opcode
,
default_qid
,
Name
(
"version.bind"
),
RRClass
::
CH
(),
RRType
::
TXT
());
Name
(
"version.bind"
),
RRClass
::
CH
(),
RRType
::
TXT
());
createRequestPacket
(
request_message
,
IPPROTO_UDP
,
&
context
);
// Run the message through the server
...
...
@@ -278,7 +280,8 @@ TEST_F(AuthSrvTest, TSIGSignedBadKey) {
TSIGKey
key
(
"key:c2VjcmV0Cg==:hmac-sha1"
);
TSIGContext
context
(
key
);
UnitTestUtil
::
createRequestMessage
(
request_message
,
opcode
,
default_qid
,
Name
(
"version.bind"
),
RRClass
::
CH
(),
RRType
::
TXT
());
Name
(
"version.bind"
),
RRClass
::
CH
(),
RRType
::
TXT
());
createRequestPacket
(
request_message
,
IPPROTO_UDP
,
&
context
);
// Process the message, but use a different key there
...
...
@@ -309,7 +312,8 @@ TEST_F(AuthSrvTest, TSIGBadSig) {
TSIGKey
key
(
"key:c2VjcmV0Cg==:hmac-sha1"
);
TSIGContext
context
(
key
);
UnitTestUtil
::
createRequestMessage
(
request_message
,
opcode
,
default_qid
,
Name
(
"version.bind"
),
RRClass
::
CH
(),
RRType
::
TXT
());
Name
(
"version.bind"
),
RRClass
::
CH
(),
RRType
::
TXT
());
createRequestPacket
(
request_message
,
IPPROTO_UDP
,
&
context
);
// Process the message, but use a different key there
...
...
@@ -375,7 +379,8 @@ TEST_F(AuthSrvTest, AXFRConnectFail) {
EXPECT_FALSE
(
xfrout
.
isConnected
());
// check prerequisite
xfrout
.
disableConnect
();
UnitTestUtil
::
createRequestMessage
(
request_message
,
opcode
,
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
AXFR
());
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
AXFR
());
createRequestPacket
(
request_message
,
IPPROTO_TCP
);
server
.
processMessage
(
*
io_message
,
parse_message
,
response_obuffer
,
&
dnsserv
);
EXPECT_TRUE
(
dnsserv
.
hasAnswer
());
...
...
@@ -388,7 +393,8 @@ TEST_F(AuthSrvTest, AXFRSendFail) {
// first send a valid query, making the connection with the xfr process
// open.
UnitTestUtil
::
createRequestMessage
(
request_message
,
opcode
,
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
AXFR
());
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
AXFR
());
createRequestPacket
(
request_message
,
IPPROTO_TCP
);
server
.
processMessage
(
*
io_message
,
parse_message
,
response_obuffer
,
&
dnsserv
);
EXPECT_TRUE
(
xfrout
.
isConnected
());
...
...
@@ -397,7 +403,8 @@ TEST_F(AuthSrvTest, AXFRSendFail) {
parse_message
->
clear
(
Message
::
PARSE
);
response_obuffer
->
clear
();
UnitTestUtil
::
createRequestMessage
(
request_message
,
opcode
,
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
AXFR
());
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
AXFR
());
createRequestPacket
(
request_message
,
IPPROTO_TCP
);
server
.
processMessage
(
*
io_message
,
parse_message
,
response_obuffer
,
&
dnsserv
);
EXPECT_TRUE
(
dnsserv
.
hasAnswer
());
...
...
@@ -414,7 +421,8 @@ TEST_F(AuthSrvTest, AXFRDisconnectFail) {
xfrout
.
disableSend
();
xfrout
.
disableDisconnect
();
UnitTestUtil
::
createRequestMessage
(
request_message
,
opcode
,
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
AXFR
());
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
AXFR
());
createRequestPacket
(
request_message
,
IPPROTO_TCP
);
EXPECT_THROW
(
server
.
processMessage
(
*
io_message
,
parse_message
,
response_obuffer
,
&
dnsserv
),
...
...
@@ -429,7 +437,8 @@ TEST_F(AuthSrvTest, IXFRConnectFail) {
EXPECT_FALSE
(
xfrout
.
isConnected
());
// check prerequisite
xfrout
.
disableConnect
();
UnitTestUtil
::
createRequestMessage
(
request_message
,
opcode
,
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
IXFR
());
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
IXFR
());
createRequestPacket
(
request_message
,
IPPROTO_TCP
);
server
.
processMessage
(
*
io_message
,
parse_message
,
response_obuffer
,
&
dnsserv
);
EXPECT_TRUE
(
dnsserv
.
hasAnswer
());
...
...
@@ -442,7 +451,8 @@ TEST_F(AuthSrvTest, IXFRSendFail) {
// first send a valid query, making the connection with the xfr process
// open.
UnitTestUtil
::
createRequestMessage
(
request_message
,
opcode
,
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
IXFR
());
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
IXFR
());
createRequestPacket
(
request_message
,
IPPROTO_TCP
);
server
.
processMessage
(
*
io_message
,
parse_message
,
response_obuffer
,
&
dnsserv
);
EXPECT_TRUE
(
xfrout
.
isConnected
());
...
...
@@ -451,7 +461,8 @@ TEST_F(AuthSrvTest, IXFRSendFail) {
parse_message
->
clear
(
Message
::
PARSE
);
response_obuffer
->
clear
();
UnitTestUtil
::
createRequestMessage
(
request_message
,
opcode
,
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
IXFR
());
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
IXFR
());
createRequestPacket
(
request_message
,
IPPROTO_TCP
);
server
.
processMessage
(
*
io_message
,
parse_message
,
response_obuffer
,
&
dnsserv
);
EXPECT_TRUE
(
dnsserv
.
hasAnswer
());
...
...
@@ -468,7 +479,8 @@ TEST_F(AuthSrvTest, IXFRDisconnectFail) {
xfrout
.
disableSend
();
xfrout
.
disableDisconnect
();
UnitTestUtil
::
createRequestMessage
(
request_message
,
opcode
,
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
IXFR
());
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
IXFR
());
createRequestPacket
(
request_message
,
IPPROTO_TCP
);
EXPECT_THROW
(
server
.
processMessage
(
*
io_message
,
parse_message
,
response_obuffer
,
&
dnsserv
),
...
...
@@ -480,8 +492,9 @@ TEST_F(AuthSrvTest, IXFRDisconnectFail) {
}
TEST_F
(
AuthSrvTest
,
notify
)
{
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
request_message
.
setHeaderFlag
(
Message
::
HEADERFLAG_AA
);
createRequestPacket
(
request_message
,
IPPROTO_UDP
);
server
.
processMessage
(
*
io_message
,
parse_message
,
response_obuffer
,
&
dnsserv
);
...
...
@@ -512,8 +525,9 @@ TEST_F(AuthSrvTest, notify) {
TEST_F
(
AuthSrvTest
,
notifyForCHClass
)
{
// Same as the previous test, but for the CH RRClass.
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
CH
(),
RRType
::
SOA
());
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
CH
(),
RRType
::
SOA
());
request_message
.
setHeaderFlag
(
Message
::
HEADERFLAG_AA
);
createRequestPacket
(
request_message
,
IPPROTO_UDP
);
server
.
processMessage
(
*
io_message
,
parse_message
,
response_obuffer
,
&
dnsserv
);
...
...
@@ -541,8 +555,9 @@ TEST_F(AuthSrvTest, notifyEmptyQuestion) {
}
TEST_F
(
AuthSrvTest
,
notifyMultiQuestions
)
{
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
// add one more SOA question
request_message
.
addQuestion
(
Question
(
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
()));
...
...
@@ -555,8 +570,9 @@ TEST_F(AuthSrvTest, notifyMultiQuestions) {
}
TEST_F
(
AuthSrvTest
,
notifyNonSOAQuestion
)
{
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
NS
());
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
NS
());
request_message
.
setHeaderFlag
(
Message
::
HEADERFLAG_AA
);
createRequestPacket
(
request_message
,
IPPROTO_UDP
);
server
.
processMessage
(
*
io_message
,
parse_message
,
response_obuffer
,
&
dnsserv
);
...
...
@@ -567,8 +583,9 @@ TEST_F(AuthSrvTest, notifyNonSOAQuestion) {
TEST_F
(
AuthSrvTest
,
notifyWithoutAA
)
{
// implicitly leave the AA bit off. our implementation will accept it.
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
createRequestPacket
(
request_message
,
IPPROTO_UDP
);
server
.
processMessage
(
*
io_message
,
parse_message
,
response_obuffer
,
&
dnsserv
);
EXPECT_TRUE
(
dnsserv
.
hasAnswer
());
...
...
@@ -577,8 +594,9 @@ TEST_F(AuthSrvTest, notifyWithoutAA) {
}
TEST_F
(
AuthSrvTest
,
notifyWithErrorRcode
)
{
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
request_message
.
setHeaderFlag
(
Message
::
HEADERFLAG_AA
);
request_message
.
setRcode
(
Rcode
::
SERVFAIL
());
createRequestPacket
(
request_message
,
IPPROTO_UDP
);
...
...
@@ -591,8 +609,9 @@ TEST_F(AuthSrvTest, notifyWithErrorRcode) {
TEST_F
(
AuthSrvTest
,
notifyWithoutSession
)
{
server
.
setXfrinSession
(
NULL
);
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
request_message
.
setHeaderFlag
(
Message
::
HEADERFLAG_AA
);
createRequestPacket
(
request_message
,
IPPROTO_UDP
);
...
...
@@ -605,8 +624,9 @@ TEST_F(AuthSrvTest, notifyWithoutSession) {
TEST_F
(
AuthSrvTest
,
notifySendFail
)
{
notify_session
.
disableSend
();
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
request_message
.
setHeaderFlag
(
Message
::
HEADERFLAG_AA
);
createRequestPacket
(
request_message
,
IPPROTO_UDP
);
...
...
@@ -617,8 +637,9 @@ TEST_F(AuthSrvTest, notifySendFail) {
TEST_F
(
AuthSrvTest
,
notifyReceiveFail
)
{
notify_session
.
disableReceive
();
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
request_message
.
setHeaderFlag
(
Message
::
HEADERFLAG_AA
);
createRequestPacket
(
request_message
,
IPPROTO_UDP
);
server
.
processMessage
(
*
io_message
,
parse_message
,
response_obuffer
,
&
dnsserv
);
...
...
@@ -628,8 +649,9 @@ TEST_F(AuthSrvTest, notifyReceiveFail) {
TEST_F
(
AuthSrvTest
,
notifyWithBogusSessionMessage
)
{
notify_session
.
setMessage
(
Element
::
fromJSON
(
"{
\"
foo
\"
: 1}"
));
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
request_message
.
setHeaderFlag
(
Message
::
HEADERFLAG_AA
);
createRequestPacket
(
request_message
,
IPPROTO_UDP
);
server
.
processMessage
(
*
io_message
,
parse_message
,
response_obuffer
,
&
dnsserv
);
...
...
@@ -640,8 +662,9 @@ TEST_F(AuthSrvTest, notifyWithSessionMessageError) {
notify_session
.
setMessage
(
Element
::
fromJSON
(
"{
\"
result
\"
: [1,
\"
FAIL
\"
]}"
));
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
UnitTestUtil
::
createRequestMessage
(
request_message
,
Opcode
::
NOTIFY
(),
default_qid
,
Name
(
"example.com"
),
RRClass
::
IN
(),
RRType
::
SOA
());
request_message
.
setHeaderFlag
(
Message
::
HEADERFLAG_AA
);
createRequestPacket
(
request_message
,
IPPROTO_UDP
);
server
.
processMessage
(
*
io_message
,
parse_message
,
response_obuffer
,
&
dnsserv
);
...
...
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment