]> git.saurik.com Git - apple/network_cmds.git/blob - unbound/testcode/testbound.c
daf8ddd41547dd6c57acf5d35cde586503cb1856
[apple/network_cmds.git] / unbound / testcode / testbound.c
1 /*
2 * testcode/testbound.c - test program for unbound.
3 *
4 * Copyright (c) 2007, NLnet Labs. All rights reserved.
5 *
6 * This software is open source.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
14 *
15 * Redistributions in binary form must reproduce the above copyright notice,
16 * this list of conditions and the following disclaimer in the documentation
17 * and/or other materials provided with the distribution.
18 *
19 * Neither the name of the NLNET LABS nor the names of its contributors may
20 * be used to endorse or promote products derived from this software without
21 * specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27 * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29 * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 *
35 */
36 /**
37 * \file
38 * Exits with code 1 on a failure. 0 if all unit tests are successfull.
39 */
40
41 #include "config.h"
42 #ifdef HAVE_TIME_H
43 # include <time.h>
44 #endif
45 #include "testcode/testpkts.h"
46 #include "testcode/replay.h"
47 #include "testcode/fake_event.h"
48 #include "daemon/remote.h"
49 #include "util/config_file.h"
50 #include "ldns/keyraw.h"
51 #include <ctype.h>
52
53 /** signal that this is a testbound compile */
54 #define unbound_testbound 1
55 /**
56 * include the main program from the unbound daemon.
57 * rename main to daemon_main to call it
58 */
59 #define main daemon_main
60 #include "daemon/unbound.c"
61 #undef main
62
63 /** maximum line length for lines in the replay file. */
64 #define MAX_LINE_LEN 1024
65 /** config files (removed at exit) */
66 static struct config_strlist* cfgfiles = NULL;
67
68 /** give commandline usage for testbound. */
69 static void
70 testbound_usage()
71 {
72 printf("usage: testbound [options]\n");
73 printf("\ttest the unbound daemon.\n");
74 printf("-h this help\n");
75 printf("-p file playback text file\n");
76 printf("-2 detect SHA256 support (exit code 0 or 1)\n");
77 printf("-g detect GOST support (exit code 0 or 1)\n");
78 printf("-e detect ECDSA support (exit code 0 or 1)\n");
79 printf("-s testbound self-test - unit test of testbound parts.\n");
80 printf("-o str unbound commandline options separated by spaces.\n");
81 printf("Version %s\n", PACKAGE_VERSION);
82 printf("BSD licensed, see LICENSE file in source package.\n");
83 printf("Report bugs to %s.\n", PACKAGE_BUGREPORT);
84 }
85
86 /** Max number of arguments to pass to unbound. */
87 #define MAXARG 100
88
89 /**
90 * Add options from string to passed argc. splits on whitespace.
91 * @param args: the option argument, "-v -p 12345" or so.
92 * @param pass_argc: ptr to the argc for unbound. Modified.
93 * @param pass_argv: the argv to pass to unbound. Modified.
94 */
95 static void
96 add_opts(const char* args, int* pass_argc, char* pass_argv[])
97 {
98 const char *p = args, *np;
99 size_t len;
100 while(p && isspace((unsigned char)*p))
101 p++;
102 while(p && *p) {
103 /* find location of next string and length of this one */
104 if((np = strchr(p, ' ')))
105 len = (size_t)(np-p);
106 else len = strlen(p);
107 /* allocate and copy option */
108 if(*pass_argc >= MAXARG-1)
109 fatal_exit("too many arguments: '%s'", p);
110 pass_argv[*pass_argc] = (char*)malloc(len+1);
111 if(!pass_argv[*pass_argc])
112 fatal_exit("add_opts: out of memory");
113 memcpy(pass_argv[*pass_argc], p, len);
114 pass_argv[*pass_argc][len] = 0;
115 (*pass_argc)++;
116 /* go to next option */
117 p = np;
118 while(p && isspace((unsigned char)*p))
119 p++;
120 }
121 }
122
123 /** pretty print commandline for unbound in this test */
124 static void
125 echo_cmdline(int argc, char* argv[])
126 {
127 int i;
128 fprintf(stderr, "testbound is starting:");
129 for(i=0; i<argc; i++) {
130 fprintf(stderr, " [%s]", argv[i]);
131 }
132 fprintf(stderr, "\n");
133 }
134
135 /** spool autotrust file */
136 static void
137 spool_auto_file(FILE* in, int* lineno, FILE* cfg, char* id)
138 {
139 char line[MAX_LINE_LEN];
140 char* parse;
141 FILE* spool;
142 /* find filename for new file */
143 while(isspace((unsigned char)*id))
144 id++;
145 if(strlen(id)==0)
146 fatal_exit("AUTROTRUST_FILE must have id, line %d", *lineno);
147 id[strlen(id)-1]=0; /* remove newline */
148 fake_temp_file("_auto_", id, line, sizeof(line));
149 /* add option for the file */
150 fprintf(cfg, "server: auto-trust-anchor-file: \"%s\"\n", line);
151 /* open file and spool to it */
152 spool = fopen(line, "w");
153 if(!spool) fatal_exit("could not open %s: %s", line, strerror(errno));
154 fprintf(stderr, "testbound is spooling key file: %s\n", line);
155 if(!cfg_strlist_insert(&cfgfiles, strdup(line)))
156 fatal_exit("out of memory");
157 line[sizeof(line)-1] = 0;
158 while(fgets(line, MAX_LINE_LEN-1, in)) {
159 parse = line;
160 (*lineno)++;
161 while(isspace((unsigned char)*parse))
162 parse++;
163 if(strncmp(parse, "AUTOTRUST_END", 13) == 0) {
164 fclose(spool);
165 return;
166 }
167 fputs(line, spool);
168 }
169 fatal_exit("no AUTOTRUST_END in input file");
170 }
171
172 /** process config elements */
173 static void
174 setup_config(FILE* in, int* lineno, int* pass_argc, char* pass_argv[])
175 {
176 char configfile[MAX_LINE_LEN];
177 char line[MAX_LINE_LEN];
178 char* parse;
179 FILE* cfg;
180 fake_temp_file("_cfg", "", configfile, sizeof(configfile));
181 add_opts("-c", pass_argc, pass_argv);
182 add_opts(configfile, pass_argc, pass_argv);
183 cfg = fopen(configfile, "w");
184 if(!cfg) fatal_exit("could not open %s: %s",
185 configfile, strerror(errno));
186 if(!cfg_strlist_insert(&cfgfiles, strdup(configfile)))
187 fatal_exit("out of memory");
188 line[sizeof(line)-1] = 0;
189 /* some basic settings to not pollute the host system */
190 fprintf(cfg, "server: use-syslog: no\n");
191 fprintf(cfg, " directory: \"\"\n");
192 fprintf(cfg, " chroot: \"\"\n");
193 fprintf(cfg, " username: \"\"\n");
194 fprintf(cfg, " pidfile: \"\"\n");
195 fprintf(cfg, " val-log-level: 2\n");
196 fprintf(cfg, "remote-control: control-enable: no\n");
197 while(fgets(line, MAX_LINE_LEN-1, in)) {
198 parse = line;
199 (*lineno)++;
200 while(isspace((unsigned char)*parse))
201 parse++;
202 if(!*parse || parse[0] == ';')
203 continue;
204 if(strncmp(parse, "COMMANDLINE", 11) == 0) {
205 parse[strlen(parse)-1] = 0; /* strip off \n */
206 add_opts(parse+11, pass_argc, pass_argv);
207 continue;
208 }
209 if(strncmp(parse, "AUTOTRUST_FILE", 14) == 0) {
210 spool_auto_file(in, lineno, cfg, parse+14);
211 continue;
212 }
213 if(strncmp(parse, "CONFIG_END", 10) == 0) {
214 fclose(cfg);
215 return;
216 }
217 fputs(line, cfg);
218 }
219 fatal_exit("No CONFIG_END in input file");
220
221 }
222
223 /** read playback file */
224 static struct replay_scenario*
225 setup_playback(const char* filename, int* pass_argc, char* pass_argv[])
226 {
227 struct replay_scenario* scen = NULL;
228 int lineno = 0;
229
230 if(filename) {
231 FILE *in = fopen(filename, "rb");
232 if(!in) {
233 perror(filename);
234 exit(1);
235 }
236 setup_config(in, &lineno, pass_argc, pass_argv);
237 scen = replay_scenario_read(in, filename, &lineno);
238 fclose(in);
239 if(!scen)
240 fatal_exit("Could not read: %s", filename);
241 }
242 else fatal_exit("need a playback file (-p)");
243 log_info("Scenario: %s", scen->title);
244 return scen;
245 }
246
247 /** remove config file at exit */
248 void remove_configfile(void)
249 {
250 struct config_strlist* p;
251 for(p=cfgfiles; p; p=p->next)
252 unlink(p->str);
253 config_delstrlist(cfgfiles);
254 cfgfiles = NULL;
255 }
256
257 /**
258 * Main fake event test program. Setup, teardown and report errors.
259 * @param argc: arg count.
260 * @param argv: array of commandline arguments.
261 * @return program failure if test fails.
262 */
263 int
264 main(int argc, char* argv[])
265 {
266 int c, res;
267 int pass_argc = 0;
268 char* pass_argv[MAXARG];
269 char* playback_file = NULL;
270 int init_optind = optind;
271 char* init_optarg = optarg;
272 struct replay_scenario* scen = NULL;
273
274 /* we do not want the test to depend on the timezone */
275 (void)putenv("TZ=UTC");
276
277 log_init(NULL, 0, NULL);
278 /* determine commandline options for the daemon */
279 pass_argc = 1;
280 pass_argv[0] = "unbound";
281 add_opts("-d", &pass_argc, pass_argv);
282 while( (c=getopt(argc, argv, "2egho:p:s")) != -1) {
283 switch(c) {
284 case 's':
285 free(pass_argv[1]);
286 testbound_selftest();
287 printf("selftest successful\n");
288 exit(0);
289 case '2':
290 #if (defined(HAVE_EVP_SHA256) || defined(HAVE_NSS)) && defined(USE_SHA2)
291 printf("SHA256 supported\n");
292 exit(0);
293 #else
294 printf("SHA256 not supported\n");
295 exit(1);
296 #endif
297 break;
298 case 'e':
299 #if defined(USE_ECDSA)
300 printf("ECDSA supported\n");
301 exit(0);
302 #else
303 printf("ECDSA not supported\n");
304 exit(1);
305 #endif
306 break;
307 case 'g':
308 #ifdef USE_GOST
309 if(sldns_key_EVP_load_gost_id()) {
310 printf("GOST supported\n");
311 exit(0);
312 } else {
313 printf("GOST not supported\n");
314 exit(1);
315 }
316 #else
317 printf("GOST not supported\n");
318 exit(1);
319 #endif
320 break;
321 case 'p':
322 playback_file = optarg;
323 break;
324 case 'o':
325 add_opts(optarg, &pass_argc, pass_argv);
326 break;
327 case '?':
328 case 'h':
329 default:
330 testbound_usage();
331 return 1;
332 }
333 }
334 argc -= optind;
335 argv += optind;
336 if(argc != 0) {
337 testbound_usage();
338 return 1;
339 }
340 log_info("Start of %s testbound program.", PACKAGE_STRING);
341 if(atexit(&remove_configfile) != 0)
342 fatal_exit("atexit() failed: %s", strerror(errno));
343
344 /* setup test environment */
345 scen = setup_playback(playback_file, &pass_argc, pass_argv);
346 /* init fake event backend */
347 fake_event_init(scen);
348
349 pass_argv[pass_argc] = NULL;
350 echo_cmdline(pass_argc, pass_argv);
351
352 /* reset getopt processing */
353 optind = init_optind;
354 optarg = init_optarg;
355
356 /* run the normal daemon */
357 res = daemon_main(pass_argc, pass_argv);
358
359 fake_event_cleanup();
360 for(c=1; c<pass_argc; c++)
361 free(pass_argv[c]);
362 if(res == 0) {
363 log_info("Testbound Exit Success");
364 #ifdef HAVE_PTHREAD
365 /* dlopen frees its thread state (dlopen of gost engine) */
366 pthread_exit(NULL);
367 #endif
368 }
369 return res;
370 }
371
372 /* fake remote control */
373 struct listen_port* daemon_remote_open_ports(struct config_file*
374 ATTR_UNUSED(cfg))
375 {
376 return NULL;
377 }
378
379 struct daemon_remote* daemon_remote_create(struct config_file* ATTR_UNUSED(cfg))
380 {
381 return (struct daemon_remote*)calloc(1,1);
382 }
383
384 void daemon_remote_delete(struct daemon_remote* rc)
385 {
386 free(rc);
387 }
388
389 void daemon_remote_clear(struct daemon_remote* ATTR_UNUSED(rc))
390 {
391 /* nothing */
392 }
393
394 int daemon_remote_open_accept(struct daemon_remote* ATTR_UNUSED(rc),
395 struct listen_port* ATTR_UNUSED(ports),
396 struct worker* ATTR_UNUSED(worker))
397 {
398 return 1;
399 }
400
401 int remote_accept_callback(struct comm_point* ATTR_UNUSED(c),
402 void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
403 struct comm_reply* ATTR_UNUSED(repinfo))
404 {
405 log_assert(0);
406 return 0;
407 }
408
409 int remote_control_callback(struct comm_point* ATTR_UNUSED(c),
410 void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
411 struct comm_reply* ATTR_UNUSED(repinfo))
412 {
413 log_assert(0);
414 return 0;
415 }
416
417 void remote_get_opt_ssl(char* ATTR_UNUSED(str), void* ATTR_UNUSED(arg))
418 {
419 log_assert(0);
420 }
421
422 void wsvc_command_option(const char* ATTR_UNUSED(wopt),
423 const char* ATTR_UNUSED(cfgfile), int ATTR_UNUSED(v),
424 int ATTR_UNUSED(c))
425 {
426 log_assert(0);
427 }
428
429 void wsvc_setup_worker(struct worker* ATTR_UNUSED(worker))
430 {
431 /* do nothing */
432 }
433
434 void wsvc_desetup_worker(struct worker* ATTR_UNUSED(worker))
435 {
436 /* do nothing */
437 }
438
439 #ifdef UB_ON_WINDOWS
440 void worker_win_stop_cb(int ATTR_UNUSED(fd), short ATTR_UNUSED(ev),
441 void* ATTR_UNUSED(arg))
442 {
443 log_assert(0);
444 }
445
446 void wsvc_cron_cb(void* ATTR_UNUSED(arg))
447 {
448 log_assert(0);
449 }
450 #endif /* UB_ON_WINDOWS */
451