summaryrefslogtreecommitdiffstats
path: root/bin/tests/master/t_master.c
diff options
context:
space:
mode:
Diffstat (limited to 'bin/tests/master/t_master.c')
-rw-r--r--bin/tests/master/t_master.c336
1 files changed, 336 insertions, 0 deletions
diff --git a/bin/tests/master/t_master.c b/bin/tests/master/t_master.c
new file mode 100644
index 0000000..4693114
--- /dev/null
+++ b/bin/tests/master/t_master.c
@@ -0,0 +1,336 @@
+/*
+ * Copyright (C) 2004, 2005, 2007 Internet Systems Consortium, Inc. ("ISC")
+ * Copyright (C) 1998-2001, 2003 Internet Software Consortium.
+ *
+ * Permission to use, copy, modify, and/or distribute this software for any
+ * purpose with or without fee is hereby granted, provided that the above
+ * copyright notice and this permission notice appear in all copies.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
+ * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
+ * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
+ * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
+ * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
+ * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
+ * PERFORMANCE OF THIS SOFTWARE.
+ */
+
+/* $Id: t_master.c,v 1.36 2007/06/19 23:47:00 tbox Exp $ */
+
+#include <config.h>
+
+#include <ctype.h>
+#include <stdlib.h>
+
+#include <isc/buffer.h>
+#include <isc/mem.h>
+#include <isc/string.h> /* Required for HP/UX (and others?) */
+#include <isc/util.h>
+
+#include <dns/callbacks.h>
+#include <dns/master.h>
+#include <dns/name.h>
+#include <dns/rdataclass.h>
+#include <dns/rdataset.h>
+#include <dns/result.h>
+
+#include <tests/t_api.h>
+
+#define BUFLEN 255
+#define BIGBUFLEN (64 * 1024)
+
+static isc_result_t
+t1_add_callback(void *arg, dns_name_t *owner, dns_rdataset_t *dataset);
+
+isc_mem_t *T1_mctx;
+char *Tokens[T_MAXTOKS + 1];
+
+static isc_result_t
+t1_add_callback(void *arg, dns_name_t *owner, dns_rdataset_t *dataset) {
+ char buf[BIGBUFLEN];
+ isc_buffer_t target;
+ isc_result_t result;
+
+ UNUSED(arg);
+
+ isc_buffer_init(&target, buf, BIGBUFLEN);
+ result = dns_rdataset_totext(dataset, owner, ISC_FALSE, ISC_FALSE,
+ &target);
+ if (result != ISC_R_SUCCESS)
+ t_info("dns_rdataset_totext: %s\n", dns_result_totext(result));
+
+ return(result);
+}
+
+static int
+test_master(char *testfile, char *origin, char *class, isc_result_t exp_result)
+{
+ int result;
+ int len;
+ isc_result_t isc_result;
+ isc_result_t dns_result;
+ dns_name_t dns_origin;
+ isc_buffer_t source;
+ isc_buffer_t target;
+ unsigned char name_buf[BUFLEN];
+ dns_rdatacallbacks_t callbacks;
+ dns_rdataclass_t rdataclass;
+ isc_textregion_t textregion;
+
+ result = T_UNRESOLVED;
+ if (T1_mctx == NULL)
+ isc_result = isc_mem_create(0, 0, &T1_mctx);
+ else
+ isc_result = ISC_R_SUCCESS;
+ if (isc_result != ISC_R_SUCCESS) {
+ t_info("isc_mem_create failed %d\n", isc_result);
+ return(T_UNRESOLVED);
+ }
+
+ len = strlen(origin);
+ isc_buffer_init(&source, origin, len);
+ isc_buffer_add(&source, len);
+ isc_buffer_setactive(&source, len);
+ isc_buffer_init(&target, name_buf, BUFLEN);
+ dns_name_init(&dns_origin, NULL);
+ dns_result = dns_name_fromtext(&dns_origin, &source, dns_rootname,
+ ISC_FALSE, &target);
+ if (dns_result != ISC_R_SUCCESS) {
+ t_info("dns_name_fromtext failed %s\n",
+ dns_result_totext(dns_result));
+ return(T_UNRESOLVED);
+ }
+
+ dns_rdatacallbacks_init_stdio(&callbacks);
+ callbacks.add = t1_add_callback;
+
+ textregion.base = class;
+ textregion.length = strlen(class);
+
+ dns_result = dns_rdataclass_fromtext(&rdataclass, &textregion);
+ if (dns_result != ISC_R_SUCCESS) {
+ t_info("dns_rdataclass_fromtext failed %s\n",
+ dns_result_totext(dns_result));
+ return(T_UNRESOLVED);
+ }
+
+ dns_result = dns_master_loadfile( testfile,
+ &dns_origin,
+ &dns_origin,
+ rdataclass,
+ ISC_TRUE,
+ &callbacks,
+ T1_mctx);
+
+ if (dns_result == exp_result)
+ result = T_PASS;
+ else {
+ t_info("dns_master_loadfile: got %s, expected %s\n",
+ dns_result_totext(dns_result),
+ dns_result_totext(exp_result));
+ result = T_FAIL;
+ }
+ return(result);
+}
+
+static int
+test_master_x(const char *filename) {
+ FILE *fp;
+ char *p;
+ int line;
+ int cnt;
+ int result;
+
+ result = T_UNRESOLVED;
+
+ fp = fopen(filename, "r");
+ if (fp != NULL) {
+ line = 0;
+ while ((p = t_fgetbs(fp)) != NULL) {
+
+ ++line;
+
+ /*
+ * Skip comment lines.
+ */
+ if ((isspace(*p & 0xff)) || (*p == '#')) {
+ (void)free(p);
+ continue;
+ }
+
+ /*
+ * Name of data file, origin, zclass, expected result.
+ */
+ cnt = t_bustline(p, Tokens);
+ if (cnt == 4) {
+ result = test_master(Tokens[0], Tokens[1],
+ Tokens[2],
+ t_dns_result_fromtext(Tokens[3]));
+ } else {
+ t_info("bad format in %s at line %d\n",
+ filename, line);
+ }
+
+ (void)free(p);
+ }
+ (void)fclose(fp);
+ } else {
+ t_info("Missing datafile %s\n", filename);
+ }
+ return(result);
+}
+
+static const char *a1 = "dns_master_loadfile loads a valid master file and "
+ "returns ISC_R_SUCCESS";
+static void
+t1(void) {
+ int result;
+ t_assert("dns_master_loadfile", 1, T_REQUIRED, a1);
+ result = test_master_x("dns_master_load_1_data");
+ t_result(result);
+}
+
+static const char *a2 =
+ "dns_master_loadfile returns ISC_R_UNEXPECTEDEND when the "
+ "masterfile input ends unexpectedly";
+
+static void
+t2(void) {
+ int result;
+ t_assert("dns_master_loadfile", 2, T_REQUIRED, a2);
+ result = test_master_x("dns_master_load_2_data");
+ t_result(result);
+}
+
+static const char *a3 = "dns_master_loadfile returns DNS_R_NOOWNER when the "
+ "an ownername is not specified";
+
+static void
+t3() {
+ int result;
+ t_assert("dns_master_loadfile", 3, T_REQUIRED, a3);
+ result = test_master_x("dns_master_load_3_data");
+ t_result(result);
+}
+
+static const char *a4 = "dns_master_loadfile accepts broken zone files "
+ "where the first record has an undefined TTL, "
+ "as long as it is a SOA";
+
+static void
+t4() {
+ int result;
+ t_assert("dns_master_loadfile", 4, T_REQUIRED, a4);
+ result = test_master_x("dns_master_load_4_data");
+ t_result(result);
+}
+
+static const char *a5 = "dns_master_loadfile returns DNS_R_BADCLASS when the "
+ "the record class did not match the zone class";
+
+static void
+t5() {
+ int result;
+
+ t_assert("dns_master_loadfile", 5, T_REQUIRED, a5);
+ result = test_master_x("dns_master_load_5_data");
+
+ t_result(result);
+}
+
+static const char *a6 =
+ "dns_master_loadfile understands DNSKEY RR specifications "
+ "containing key material";
+
+static void
+t6() {
+ int result;
+
+ t_assert("dns_master_loadfile", 6, T_REQUIRED, a6);
+ result = test_master_x("dns_master_load_6_data");
+
+ t_result(result);
+}
+
+static const char *a7 =
+ "dns_master_loadfile understands DNSKEY RR specifications "
+ "containing no key material";
+
+static void
+t7() {
+ int result;
+
+ t_assert("dns_master_loadfile", 7, T_REQUIRED, a7);
+ result = test_master_x("dns_master_load_7_data");
+
+ t_result(result);
+}
+
+static const char *a8 =
+ "dns_master_loadfile understands $INCLUDE";
+
+static void
+t8() {
+ int result;
+
+ t_assert("dns_master_loadfile", 8, T_REQUIRED, a8);
+ result = test_master_x("dns_master_load_8_data");
+
+ t_result(result);
+}
+
+static const char *a9 =
+ "dns_master_loadfile understands $INCLUDE with failure";
+
+static void
+t9() {
+ int result;
+
+ t_assert("dns_master_loadfile", 9, T_REQUIRED, a9);
+ result = test_master_x("dns_master_load_9_data");
+
+ t_result(result);
+}
+
+static const char *a10 =
+ "dns_master_loadfile non-empty blank lines";
+
+static void
+t10() {
+ int result;
+
+ t_assert("dns_master_loadfile", 10, T_REQUIRED, a10);
+ result = test_master_x("dns_master_load_10_data");
+
+ t_result(result);
+}
+
+static const char *a11 =
+ "dns_master_loadfile allow leading zeros in SOA";
+
+static void
+t11() {
+ int result;
+
+ t_assert("dns_master_loadfile", 11, T_REQUIRED, a11);
+ result = test_master_x("dns_master_load_11_data");
+
+ t_result(result);
+}
+
+
+testspec_t T_testlist[] = {
+ { t1, "ISC_R_SUCCESS" },
+ { t2, "ISC_R_UNEXPECTEDEND" },
+ { t3, "DNS_NOOWNER" },
+ { t4, "DNS_NOTTL" },
+ { t5, "DNS_BADCLASS" },
+ { t6, "DNSKEY RR 1" },
+ { t7, "DNSKEY RR 2" },
+ { t8, "$INCLUDE" },
+ { t9, "$INCLUDE w/ DNS_BADCLASS" },
+ { t10, "non empty blank lines" },
+ { t11, "leading zeros in serial" },
+ { NULL, NULL }
+};
+