| OLD | NEW |
| 1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "components/certificate_transparency/log_dns_client.h" | 5 #include "components/certificate_transparency/log_dns_client.h" |
| 6 | 6 |
| 7 #include <algorithm> | 7 #include <memory> |
| 8 #include <numeric> | 8 #include <string> |
| 9 #include <utility> | 9 #include <utility> |
| 10 #include <vector> | 10 #include <vector> |
| 11 | 11 |
| 12 #include "base/big_endian.h" | |
| 13 #include "base/macros.h" | |
| 14 #include "base/message_loop/message_loop.h" | 12 #include "base/message_loop/message_loop.h" |
| 15 #include "base/run_loop.h" | 13 #include "base/run_loop.h" |
| 16 #include "base/sys_byteorder.h" | 14 #include "components/certificate_transparency/mock_log_dns_traffic.h" |
| 17 #include "base/test/test_timeouts.h" | |
| 18 #include "crypto/sha2.h" | 15 #include "crypto/sha2.h" |
| 19 #include "net/base/net_errors.h" | 16 #include "net/base/net_errors.h" |
| 20 #include "net/cert/merkle_audit_proof.h" | 17 #include "net/cert/merkle_audit_proof.h" |
| 21 #include "net/cert/merkle_tree_leaf.h" | |
| 22 #include "net/cert/signed_certificate_timestamp.h" | 18 #include "net/cert/signed_certificate_timestamp.h" |
| 23 #include "net/dns/dns_client.h" | 19 #include "net/dns/dns_client.h" |
| 24 #include "net/dns/dns_config_service.h" | 20 #include "net/dns/dns_config_service.h" |
| 25 #include "net/dns/dns_protocol.h" | 21 #include "net/dns/dns_protocol.h" |
| 26 #include "net/log/net_log.h" | 22 #include "net/log/net_log.h" |
| 27 #include "net/socket/socket_test_util.h" | |
| 28 #include "net/test/gtest_util.h" | 23 #include "net/test/gtest_util.h" |
| 29 #include "testing/gmock/include/gmock/gmock.h" | 24 #include "testing/gmock/include/gmock/gmock.h" |
| 30 #include "testing/gtest/include/gtest/gtest.h" | 25 #include "testing/gtest/include/gtest/gtest.h" |
| 31 | 26 |
| 32 namespace certificate_transparency { | 27 namespace certificate_transparency { |
| 33 namespace { | 28 namespace { |
| 34 | 29 |
| 35 using ::testing::IsEmpty; | 30 using ::testing::IsEmpty; |
| 36 using ::testing::IsNull; | 31 using ::testing::IsNull; |
| 37 using ::testing::Not; | 32 using ::testing::Not; |
| 38 using ::testing::NotNull; | 33 using ::testing::NotNull; |
| 39 using net::test::IsError; | 34 using net::test::IsError; |
| 40 using net::test::IsOk; | 35 using net::test::IsOk; |
| 41 | 36 |
| 42 constexpr char kLeafHash[] = | 37 constexpr char kLeafHash[] = |
| 43 "\x1f\x25\xe1\xca\xba\x4f\xf9\xb8\x27\x24\x83\x0f\xca\x60\xe4\xc2\xbe\xa8" | 38 "\x1f\x25\xe1\xca\xba\x4f\xf9\xb8\x27\x24\x83\x0f\xca\x60\xe4\xc2\xbe\xa8" |
| 44 "\xc3\xa9\x44\x1c\x27\xb0\xb4\x3e\x6a\x96\x94\xc7\xb8\x04"; | 39 "\xc3\xa9\x44\x1c\x27\xb0\xb4\x3e\x6a\x96\x94\xc7\xb8\x04"; |
| 45 | 40 |
| 46 // Necessary to expose SetDnsConfig for testing. | |
| 47 class DnsChangeNotifier : public net::NetworkChangeNotifier { | |
| 48 public: | |
| 49 static void SetInitialDnsConfig(const net::DnsConfig& config) { | |
| 50 net::NetworkChangeNotifier::SetInitialDnsConfig(config); | |
| 51 } | |
| 52 | |
| 53 static void SetDnsConfig(const net::DnsConfig& config) { | |
| 54 net::NetworkChangeNotifier::SetDnsConfig(config); | |
| 55 } | |
| 56 }; | |
| 57 | |
| 58 // Always return min, to simplify testing. | |
| 59 // This should result in the DNS query ID always being 0. | |
| 60 int FakeRandInt(int min, int max) { | |
| 61 return min; | |
| 62 } | |
| 63 | |
| 64 std::vector<char> CreateDnsTxtRequest(base::StringPiece qname) { | |
| 65 std::string encoded_qname; | |
| 66 EXPECT_TRUE(net::DNSDomainFromDot(qname, &encoded_qname)); | |
| 67 | |
| 68 const size_t query_section_size = encoded_qname.size() + 4; | |
| 69 | |
| 70 std::vector<char> request(sizeof(net::dns_protocol::Header) + | |
| 71 query_section_size); | |
| 72 base::BigEndianWriter writer(request.data(), request.size()); | |
| 73 | |
| 74 // Header | |
| 75 net::dns_protocol::Header header = {}; | |
| 76 header.flags = base::HostToNet16(net::dns_protocol::kFlagRD); | |
| 77 header.qdcount = base::HostToNet16(1); | |
| 78 EXPECT_TRUE(writer.WriteBytes(&header, sizeof(header))); | |
| 79 // Query section | |
| 80 EXPECT_TRUE(writer.WriteBytes(encoded_qname.data(), encoded_qname.size())); | |
| 81 EXPECT_TRUE(writer.WriteU16(net::dns_protocol::kTypeTXT)); | |
| 82 EXPECT_TRUE(writer.WriteU16(net::dns_protocol::kClassIN)); | |
| 83 EXPECT_EQ(0, writer.remaining()); | |
| 84 | |
| 85 return request; | |
| 86 } | |
| 87 | |
| 88 std::vector<char> CreateDnsTxtResponse(const std::vector<char>& request, | |
| 89 base::StringPiece answer) { | |
| 90 const size_t answers_section_size = 12 + answer.size(); | |
| 91 constexpr uint32_t ttl = 86400; // seconds | |
| 92 | |
| 93 std::vector<char> response(request.size() + answers_section_size); | |
| 94 std::copy(request.begin(), request.end(), response.begin()); | |
| 95 // Modify the header | |
| 96 net::dns_protocol::Header* header = | |
| 97 reinterpret_cast<net::dns_protocol::Header*>(response.data()); | |
| 98 header->ancount = base::HostToNet16(1); | |
| 99 header->flags |= base::HostToNet16(net::dns_protocol::kFlagResponse); | |
| 100 | |
| 101 // Write the answer section | |
| 102 base::BigEndianWriter writer(response.data() + request.size(), | |
| 103 response.size() - request.size()); | |
| 104 EXPECT_TRUE(writer.WriteU8(0xc0)); // qname is a pointer | |
| 105 EXPECT_TRUE(writer.WriteU8( | |
| 106 sizeof(*header))); // address of qname (start of query section) | |
| 107 EXPECT_TRUE(writer.WriteU16(net::dns_protocol::kTypeTXT)); | |
| 108 EXPECT_TRUE(writer.WriteU16(net::dns_protocol::kClassIN)); | |
| 109 EXPECT_TRUE(writer.WriteU32(ttl)); | |
| 110 EXPECT_TRUE(writer.WriteU16(answer.size())); | |
| 111 EXPECT_TRUE(writer.WriteBytes(answer.data(), answer.size())); | |
| 112 EXPECT_EQ(0, writer.remaining()); | |
| 113 | |
| 114 return response; | |
| 115 } | |
| 116 | |
| 117 std::vector<char> CreateDnsErrorResponse(const std::vector<char>& request, | |
| 118 uint8_t rcode) { | |
| 119 std::vector<char> response(request); | |
| 120 // Modify the header | |
| 121 net::dns_protocol::Header* header = | |
| 122 reinterpret_cast<net::dns_protocol::Header*>(response.data()); | |
| 123 header->ancount = base::HostToNet16(1); | |
| 124 header->flags |= base::HostToNet16(net::dns_protocol::kFlagResponse | rcode); | |
| 125 | |
| 126 return response; | |
| 127 } | |
| 128 | |
| 129 std::vector<std::string> GetSampleAuditProof(size_t length) { | 41 std::vector<std::string> GetSampleAuditProof(size_t length) { |
| 130 std::vector<std::string> audit_proof(length); | 42 std::vector<std::string> audit_proof(length); |
| 131 // Makes each node of the audit proof different, so that tests are able to | 43 // Makes each node of the audit proof different, so that tests are able to |
| 132 // confirm that the audit proof is reconstructed in the correct order. | 44 // confirm that the audit proof is reconstructed in the correct order. |
| 133 for (size_t i = 0; i < length; ++i) { | 45 for (size_t i = 0; i < length; ++i) { |
| 134 std::string node(crypto::kSHA256Length, '\0'); | 46 std::string node(crypto::kSHA256Length, '\0'); |
| 135 // Each node is 32 bytes, with each byte having a different value. | 47 // Each node is 32 bytes, with each byte having a different value. |
| 136 for (size_t j = 0; j < crypto::kSHA256Length; ++j) { | 48 for (size_t j = 0; j < crypto::kSHA256Length; ++j) { |
| 137 node[j] = static_cast<char>((-127 + i + j) % 128); | 49 node[j] = static_cast<char>((-127 + i + j) % 128); |
| 138 } | 50 } |
| (...skipping 54 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 193 | 105 |
| 194 void WaitUntilRun() { run_loop_.Run(); } | 106 void WaitUntilRun() { run_loop_.Run(); } |
| 195 | 107 |
| 196 private: | 108 private: |
| 197 bool called_; | 109 bool called_; |
| 198 int net_error_; | 110 int net_error_; |
| 199 std::unique_ptr<net::ct::MerkleAuditProof> proof_; | 111 std::unique_ptr<net::ct::MerkleAuditProof> proof_; |
| 200 base::RunLoop run_loop_; | 112 base::RunLoop run_loop_; |
| 201 }; | 113 }; |
| 202 | 114 |
| 203 // A container for all of the data we need to keep alive for a mock socket. | |
| 204 // This is useful because Mock{Read,Write}, SequencedSocketData and | |
| 205 // MockClientSocketFactory all do not take ownership of or copy their arguments, | |
| 206 // so we have to manage the lifetime of those arguments ourselves. Wrapping all | |
| 207 // of that up in a single class simplifies this. | |
| 208 class MockSocketData { | |
| 209 public: | |
| 210 // A socket that expects one write and one read operation. | |
| 211 MockSocketData(const std::vector<char>& write, const std::vector<char>& read) | |
| 212 : expected_write_payload_(write), | |
| 213 expected_read_payload_(read), | |
| 214 expected_write_(net::SYNCHRONOUS, | |
| 215 expected_write_payload_.data(), | |
| 216 expected_write_payload_.size(), | |
| 217 0), | |
| 218 expected_reads_{net::MockRead(net::ASYNC, | |
| 219 expected_read_payload_.data(), | |
| 220 expected_read_payload_.size(), | |
| 221 1), | |
| 222 eof_}, | |
| 223 socket_data_(expected_reads_, 2, &expected_write_, 1) {} | |
| 224 | |
| 225 // A socket that expects one write and a read error. | |
| 226 MockSocketData(const std::vector<char>& write, int net_error) | |
| 227 : expected_write_payload_(write), | |
| 228 expected_write_(net::SYNCHRONOUS, | |
| 229 expected_write_payload_.data(), | |
| 230 expected_write_payload_.size(), | |
| 231 0), | |
| 232 expected_reads_{net::MockRead(net::ASYNC, net_error, 1), eof_}, | |
| 233 socket_data_(expected_reads_, 2, &expected_write_, 1) {} | |
| 234 | |
| 235 // A socket that expects one write and no response. | |
| 236 explicit MockSocketData(const std::vector<char>& write) | |
| 237 : expected_write_payload_(write), | |
| 238 expected_write_(net::SYNCHRONOUS, | |
| 239 expected_write_payload_.data(), | |
| 240 expected_write_payload_.size(), | |
| 241 0), | |
| 242 expected_reads_{net::MockRead(net::SYNCHRONOUS, net::ERR_IO_PENDING, 1), | |
| 243 eof_}, | |
| 244 socket_data_(expected_reads_, 2, &expected_write_, 1) {} | |
| 245 | |
| 246 void SetWriteMode(net::IoMode mode) { expected_write_.mode = mode; } | |
| 247 void SetReadMode(net::IoMode mode) { expected_reads_[0].mode = mode; } | |
| 248 | |
| 249 void AddToFactory(net::MockClientSocketFactory* socket_factory) { | |
| 250 socket_factory->AddSocketDataProvider(&socket_data_); | |
| 251 } | |
| 252 | |
| 253 private: | |
| 254 // Prevents read overruns and makes a socket timeout the default behaviour. | |
| 255 static const net::MockRead eof_; | |
| 256 | |
| 257 const std::vector<char> expected_write_payload_; | |
| 258 const std::vector<char> expected_read_payload_; | |
| 259 // Encapsulates the data that is expected to be written to a socket. | |
| 260 net::MockWrite expected_write_; | |
| 261 // Encapsulates the data/error that should be returned when reading from a | |
| 262 // socket. The expected response is followed by |eof_|, to catch further, | |
| 263 // unexpected read attempts. | |
| 264 net::MockRead expected_reads_[2]; | |
| 265 net::SequencedSocketData socket_data_; | |
| 266 | |
| 267 DISALLOW_COPY_AND_ASSIGN(MockSocketData); | |
| 268 }; | |
| 269 | |
| 270 const net::MockRead MockSocketData::eof_(net::SYNCHRONOUS, | |
| 271 net::ERR_IO_PENDING, | |
| 272 2); | |
| 273 | |
| 274 class LogDnsClientTest : public ::testing::TestWithParam<net::IoMode> { | 115 class LogDnsClientTest : public ::testing::TestWithParam<net::IoMode> { |
| 275 protected: | 116 protected: |
| 276 LogDnsClientTest() : | 117 LogDnsClientTest() |
| 277 network_change_notifier_(net::NetworkChangeNotifier::CreateMock()) { | 118 : network_change_notifier_(net::NetworkChangeNotifier::CreateMock()) { |
| 278 net::DnsConfig dns_config; | 119 mock_dns_.SetSocketReadMode(GetParam()); |
| 279 // Use an invalid nameserver address. This prevents the tests accidentally | 120 mock_dns_.InitializeDnsConfig(); |
| 280 // sending real DNS queries. The mock sockets don't care that the address | |
| 281 // is invalid. | |
| 282 dns_config.nameservers.push_back(net::IPEndPoint()); | |
| 283 // Don't attempt retransmissions - just fail. | |
| 284 dns_config.attempts = 1; | |
| 285 // This ensures timeouts are long enough for memory tests. | |
| 286 dns_config.timeout = TestTimeouts::action_timeout(); | |
| 287 // Simplify testing - don't require random numbers for the source port. | |
| 288 // This means our FakeRandInt function should only be called to get query | |
| 289 // IDs. | |
| 290 dns_config.randomize_ports = false; | |
| 291 | |
| 292 DnsChangeNotifier::SetInitialDnsConfig(dns_config); | |
| 293 } | |
| 294 | |
| 295 void ExpectRequestAndErrorResponse(base::StringPiece qname, uint8_t rcode) { | |
| 296 std::vector<char> request = CreateDnsTxtRequest(qname); | |
| 297 std::vector<char> response = CreateDnsErrorResponse(request, rcode); | |
| 298 | |
| 299 mock_socket_data_.emplace_back(new MockSocketData(request, response)); | |
| 300 mock_socket_data_.back()->SetReadMode(GetParam()); | |
| 301 mock_socket_data_.back()->AddToFactory(&socket_factory_); | |
| 302 } | |
| 303 | |
| 304 void ExpectRequestAndSocketError(base::StringPiece qname, int net_error) { | |
| 305 std::vector<char> request = CreateDnsTxtRequest(qname); | |
| 306 | |
| 307 mock_socket_data_.emplace_back(new MockSocketData(request, net_error)); | |
| 308 mock_socket_data_.back()->SetReadMode(GetParam()); | |
| 309 mock_socket_data_.back()->AddToFactory(&socket_factory_); | |
| 310 } | |
| 311 | |
| 312 void ExpectRequestAndTimeout(base::StringPiece qname) { | |
| 313 std::vector<char> request = CreateDnsTxtRequest(qname); | |
| 314 | |
| 315 mock_socket_data_.emplace_back(new MockSocketData(request)); | |
| 316 mock_socket_data_.back()->SetReadMode(GetParam()); | |
| 317 mock_socket_data_.back()->AddToFactory(&socket_factory_); | |
| 318 | |
| 319 // Speed up timeout tests. | |
| 320 net::DnsConfig dns_config; | |
| 321 DnsChangeNotifier::GetDnsConfig(&dns_config); | |
| 322 dns_config.timeout = TestTimeouts::tiny_timeout(); | |
| 323 DnsChangeNotifier::SetDnsConfig(dns_config); | |
| 324 } | |
| 325 | |
| 326 void ExpectLeafIndexRequestAndResponse(base::StringPiece qname, | |
| 327 base::StringPiece leaf_index) { | |
| 328 // Prepend size to leaf_index to create the query answer (rdata) | |
| 329 ASSERT_LE(leaf_index.size(), 0xFFul); // size must fit into a single byte | |
| 330 std::string answer = leaf_index.as_string(); | |
| 331 answer.insert(answer.begin(), static_cast<char>(leaf_index.size())); | |
| 332 | |
| 333 ExpectRequestAndResponse(qname, answer); | |
| 334 } | |
| 335 | |
| 336 void ExpectAuditProofRequestAndResponse( | |
| 337 base::StringPiece qname, | |
| 338 std::vector<std::string>::const_iterator audit_path_start, | |
| 339 std::vector<std::string>::const_iterator audit_path_end) { | |
| 340 // Join nodes in the audit path into a single string. | |
| 341 std::string proof = | |
| 342 std::accumulate(audit_path_start, audit_path_end, std::string()); | |
| 343 | |
| 344 // Prepend size to proof to create the query answer (rdata) | |
| 345 ASSERT_LE(proof.size(), 0xFFul); // size must fit into a single byte | |
| 346 proof.insert(proof.begin(), static_cast<char>(proof.size())); | |
| 347 | |
| 348 ExpectRequestAndResponse(qname, proof); | |
| 349 } | 121 } |
| 350 | 122 |
| 351 void QueryLeafIndex(base::StringPiece log_domain, | 123 void QueryLeafIndex(base::StringPiece log_domain, |
| 352 base::StringPiece leaf_hash, | 124 base::StringPiece leaf_hash, |
| 353 MockLeafIndexCallback* callback) { | 125 MockLeafIndexCallback* callback) { |
| 354 std::unique_ptr<net::DnsClient> dns_client = CreateDnsClient(); | 126 LogDnsClient log_client(mock_dns_.CreateDnsClient(), net::BoundNetLog()); |
| 355 LogDnsClient log_client(std::move(dns_client), net::BoundNetLog()); | |
| 356 net::NetworkChangeNotifier::NotifyObserversOfInitialDNSConfigReadForTests(); | |
| 357 | |
| 358 log_client.QueryLeafIndex(log_domain, leaf_hash, callback->AsCallback()); | 127 log_client.QueryLeafIndex(log_domain, leaf_hash, callback->AsCallback()); |
| 359 callback->WaitUntilRun(); | 128 callback->WaitUntilRun(); |
| 360 } | 129 } |
| 361 | 130 |
| 362 void QueryAuditProof(base::StringPiece log_domain, | 131 void QueryAuditProof(base::StringPiece log_domain, |
| 363 uint64_t leaf_index, | 132 uint64_t leaf_index, |
| 364 uint64_t tree_size, | 133 uint64_t tree_size, |
| 365 MockAuditProofCallback* callback) { | 134 MockAuditProofCallback* callback) { |
| 366 std::unique_ptr<net::DnsClient> dns_client = CreateDnsClient(); | 135 LogDnsClient log_client(mock_dns_.CreateDnsClient(), net::BoundNetLog()); |
| 367 LogDnsClient log_client(std::move(dns_client), net::BoundNetLog()); | |
| 368 net::NetworkChangeNotifier::NotifyObserversOfInitialDNSConfigReadForTests(); | |
| 369 | |
| 370 log_client.QueryAuditProof(log_domain, leaf_index, tree_size, | 136 log_client.QueryAuditProof(log_domain, leaf_index, tree_size, |
| 371 callback->AsCallback()); | 137 callback->AsCallback()); |
| 372 callback->WaitUntilRun(); | 138 callback->WaitUntilRun(); |
| 373 } | 139 } |
| 374 | 140 |
| 375 std::unique_ptr<net::DnsClient> CreateDnsClient() { | |
| 376 return net::DnsClient::CreateClientForTesting(nullptr, &socket_factory_, | |
| 377 base::Bind(&FakeRandInt)); | |
| 378 } | |
| 379 | |
| 380 private: | |
| 381 | |
| 382 void ExpectRequestAndResponse(base::StringPiece qname, | |
| 383 base::StringPiece answer) { | |
| 384 std::vector<char> request = CreateDnsTxtRequest(qname); | |
| 385 std::vector<char> response = CreateDnsTxtResponse(request, answer); | |
| 386 | |
| 387 mock_socket_data_.emplace_back(new MockSocketData(request, response)); | |
| 388 mock_socket_data_.back()->SetReadMode(GetParam()); | |
| 389 mock_socket_data_.back()->AddToFactory(&socket_factory_); | |
| 390 } | |
| 391 | |
| 392 // This will be the NetworkChangeNotifier singleton for the duration of the | 141 // This will be the NetworkChangeNotifier singleton for the duration of the |
| 393 // test. It is accessed statically by LogDnsClient. | 142 // test. It is accessed statically by LogDnsClient. |
| 394 std::unique_ptr<net::NetworkChangeNotifier> network_change_notifier_; | 143 std::unique_ptr<net::NetworkChangeNotifier> network_change_notifier_; |
| 395 // Queues and handles asynchronous DNS tasks. Indirectly used by LogDnsClient, | 144 // Queues and handles asynchronous DNS tasks. Indirectly used by LogDnsClient, |
| 396 // the underlying net::DnsClient, and NetworkChangeNotifier. | 145 // the underlying net::DnsClient, and NetworkChangeNotifier. |
| 397 base::MessageLoopForIO message_loop_; | 146 base::MessageLoopForIO message_loop_; |
| 398 // One MockSocketData for each socket that is created. This corresponds to one | 147 // Allows mock DNS sockets to be setup. |
| 399 // for each DNS request sent. | 148 MockLogDnsTraffic mock_dns_; |
| 400 std::vector<std::unique_ptr<MockSocketData>> mock_socket_data_; | |
| 401 // Provides as many mock sockets as there are entries in |mock_socket_data_|. | |
| 402 net::MockClientSocketFactory socket_factory_; | |
| 403 }; | 149 }; |
| 404 | 150 |
| 405 TEST_P(LogDnsClientTest, QueryLeafIndex) { | 151 TEST_P(LogDnsClientTest, QueryLeafIndex) { |
| 406 ExpectLeafIndexRequestAndResponse( | 152 mock_dns_.ExpectLeafIndexRequestAndResponse( |
| 407 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 153 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
| 408 "123456"); | 154 "123456"); |
| 409 | 155 |
| 410 MockLeafIndexCallback callback; | 156 MockLeafIndexCallback callback; |
| 411 QueryLeafIndex("ct.test", kLeafHash, &callback); | 157 QueryLeafIndex("ct.test", kLeafHash, &callback); |
| 412 ASSERT_TRUE(callback.called()); | 158 ASSERT_TRUE(callback.called()); |
| 413 EXPECT_THAT(callback.net_error(), IsOk()); | 159 EXPECT_THAT(callback.net_error(), IsOk()); |
| 414 EXPECT_THAT(callback.leaf_index(), 123456); | 160 EXPECT_THAT(callback.leaf_index(), 123456); |
| 415 } | 161 } |
| 416 | 162 |
| 417 TEST_P(LogDnsClientTest, QueryLeafIndexReportsThatLogDomainDoesNotExist) { | 163 TEST_P(LogDnsClientTest, QueryLeafIndexReportsThatLogDomainDoesNotExist) { |
| 418 ExpectRequestAndErrorResponse( | 164 mock_dns_.ExpectRequestAndErrorResponse( |
| 419 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 165 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
| 420 net::dns_protocol::kRcodeNXDOMAIN); | 166 net::dns_protocol::kRcodeNXDOMAIN); |
| 421 | 167 |
| 422 MockLeafIndexCallback callback; | 168 MockLeafIndexCallback callback; |
| 423 QueryLeafIndex("ct.test", kLeafHash, &callback); | 169 QueryLeafIndex("ct.test", kLeafHash, &callback); |
| 424 ASSERT_TRUE(callback.called()); | 170 ASSERT_TRUE(callback.called()); |
| 425 EXPECT_THAT(callback.net_error(), IsError(net::ERR_NAME_NOT_RESOLVED)); | 171 EXPECT_THAT(callback.net_error(), IsError(net::ERR_NAME_NOT_RESOLVED)); |
| 426 EXPECT_THAT(callback.leaf_index(), 0); | 172 EXPECT_THAT(callback.leaf_index(), 0); |
| 427 } | 173 } |
| 428 | 174 |
| 429 TEST_P(LogDnsClientTest, QueryLeafIndexReportsServerFailure) { | 175 TEST_P(LogDnsClientTest, QueryLeafIndexReportsServerFailure) { |
| 430 ExpectRequestAndErrorResponse( | 176 mock_dns_.ExpectRequestAndErrorResponse( |
| 431 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 177 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
| 432 net::dns_protocol::kRcodeSERVFAIL); | 178 net::dns_protocol::kRcodeSERVFAIL); |
| 433 | 179 |
| 434 MockLeafIndexCallback callback; | 180 MockLeafIndexCallback callback; |
| 435 QueryLeafIndex("ct.test", kLeafHash, &callback); | 181 QueryLeafIndex("ct.test", kLeafHash, &callback); |
| 436 ASSERT_TRUE(callback.called()); | 182 ASSERT_TRUE(callback.called()); |
| 437 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); | 183 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); |
| 438 EXPECT_THAT(callback.leaf_index(), 0); | 184 EXPECT_THAT(callback.leaf_index(), 0); |
| 439 } | 185 } |
| 440 | 186 |
| 441 TEST_P(LogDnsClientTest, QueryLeafIndexReportsServerRefusal) { | 187 TEST_P(LogDnsClientTest, QueryLeafIndexReportsServerRefusal) { |
| 442 ExpectRequestAndErrorResponse( | 188 mock_dns_.ExpectRequestAndErrorResponse( |
| 443 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 189 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
| 444 net::dns_protocol::kRcodeREFUSED); | 190 net::dns_protocol::kRcodeREFUSED); |
| 445 | 191 |
| 446 MockLeafIndexCallback callback; | 192 MockLeafIndexCallback callback; |
| 447 QueryLeafIndex("ct.test", kLeafHash, &callback); | 193 QueryLeafIndex("ct.test", kLeafHash, &callback); |
| 448 ASSERT_TRUE(callback.called()); | 194 ASSERT_TRUE(callback.called()); |
| 449 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); | 195 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); |
| 450 EXPECT_THAT(callback.leaf_index(), 0); | 196 EXPECT_THAT(callback.leaf_index(), 0); |
| 451 } | 197 } |
| 452 | 198 |
| 453 TEST_P(LogDnsClientTest, | 199 TEST_P(LogDnsClientTest, |
| 454 QueryLeafIndexReportsMalformedResponseIfLeafIndexIsNotNumeric) { | 200 QueryLeafIndexReportsMalformedResponseIfLeafIndexIsNotNumeric) { |
| 455 ExpectLeafIndexRequestAndResponse( | 201 mock_dns_.ExpectLeafIndexRequestAndResponse( |
| 456 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 202 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
| 457 "foo"); | 203 "foo"); |
| 458 | 204 |
| 459 MockLeafIndexCallback callback; | 205 MockLeafIndexCallback callback; |
| 460 QueryLeafIndex("ct.test", kLeafHash, &callback); | 206 QueryLeafIndex("ct.test", kLeafHash, &callback); |
| 461 ASSERT_TRUE(callback.called()); | 207 ASSERT_TRUE(callback.called()); |
| 462 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 208 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 463 EXPECT_THAT(callback.leaf_index(), 0); | 209 EXPECT_THAT(callback.leaf_index(), 0); |
| 464 } | 210 } |
| 465 | 211 |
| 466 TEST_P(LogDnsClientTest, | 212 TEST_P(LogDnsClientTest, |
| 467 QueryLeafIndexReportsMalformedResponseIfLeafIndexIsFloatingPoint) { | 213 QueryLeafIndexReportsMalformedResponseIfLeafIndexIsFloatingPoint) { |
| 468 ExpectLeafIndexRequestAndResponse( | 214 mock_dns_.ExpectLeafIndexRequestAndResponse( |
| 469 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 215 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
| 470 "123456.0"); | 216 "123456.0"); |
| 471 | 217 |
| 472 MockLeafIndexCallback callback; | 218 MockLeafIndexCallback callback; |
| 473 QueryLeafIndex("ct.test", kLeafHash, &callback); | 219 QueryLeafIndex("ct.test", kLeafHash, &callback); |
| 474 ASSERT_TRUE(callback.called()); | 220 ASSERT_TRUE(callback.called()); |
| 475 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 221 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 476 EXPECT_THAT(callback.leaf_index(), 0); | 222 EXPECT_THAT(callback.leaf_index(), 0); |
| 477 } | 223 } |
| 478 | 224 |
| 479 TEST_P(LogDnsClientTest, | 225 TEST_P(LogDnsClientTest, |
| 480 QueryLeafIndexReportsMalformedResponseIfLeafIndexIsEmpty) { | 226 QueryLeafIndexReportsMalformedResponseIfLeafIndexIsEmpty) { |
| 481 ExpectLeafIndexRequestAndResponse( | 227 mock_dns_.ExpectLeafIndexRequestAndResponse( |
| 482 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", ""); | 228 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", ""); |
| 483 | 229 |
| 484 MockLeafIndexCallback callback; | 230 MockLeafIndexCallback callback; |
| 485 QueryLeafIndex("ct.test", kLeafHash, &callback); | 231 QueryLeafIndex("ct.test", kLeafHash, &callback); |
| 486 ASSERT_TRUE(callback.called()); | 232 ASSERT_TRUE(callback.called()); |
| 487 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 233 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 488 EXPECT_THAT(callback.leaf_index(), 0); | 234 EXPECT_THAT(callback.leaf_index(), 0); |
| 489 } | 235 } |
| 490 | 236 |
| 491 TEST_P(LogDnsClientTest, | 237 TEST_P(LogDnsClientTest, |
| 492 QueryLeafIndexReportsMalformedResponseIfLeafIndexHasNonNumericPrefix) { | 238 QueryLeafIndexReportsMalformedResponseIfLeafIndexHasNonNumericPrefix) { |
| 493 ExpectLeafIndexRequestAndResponse( | 239 mock_dns_.ExpectLeafIndexRequestAndResponse( |
| 494 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 240 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
| 495 "foo123456"); | 241 "foo123456"); |
| 496 | 242 |
| 497 MockLeafIndexCallback callback; | 243 MockLeafIndexCallback callback; |
| 498 QueryLeafIndex("ct.test", kLeafHash, &callback); | 244 QueryLeafIndex("ct.test", kLeafHash, &callback); |
| 499 ASSERT_TRUE(callback.called()); | 245 ASSERT_TRUE(callback.called()); |
| 500 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 246 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 501 EXPECT_THAT(callback.leaf_index(), 0); | 247 EXPECT_THAT(callback.leaf_index(), 0); |
| 502 } | 248 } |
| 503 | 249 |
| 504 TEST_P(LogDnsClientTest, | 250 TEST_P(LogDnsClientTest, |
| 505 QueryLeafIndexReportsMalformedResponseIfLeafIndexHasNonNumericSuffix) { | 251 QueryLeafIndexReportsMalformedResponseIfLeafIndexHasNonNumericSuffix) { |
| 506 ExpectLeafIndexRequestAndResponse( | 252 mock_dns_.ExpectLeafIndexRequestAndResponse( |
| 507 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 253 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
| 508 "123456foo"); | 254 "123456foo"); |
| 509 | 255 |
| 510 MockLeafIndexCallback callback; | 256 MockLeafIndexCallback callback; |
| 511 QueryLeafIndex("ct.test", kLeafHash, &callback); | 257 QueryLeafIndex("ct.test", kLeafHash, &callback); |
| 512 ASSERT_TRUE(callback.called()); | 258 ASSERT_TRUE(callback.called()); |
| 513 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 259 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 514 EXPECT_THAT(callback.leaf_index(), 0); | 260 EXPECT_THAT(callback.leaf_index(), 0); |
| 515 } | 261 } |
| 516 | 262 |
| (...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 548 | 294 |
| 549 TEST_P(LogDnsClientTest, QueryLeafIndexReportsInvalidArgIfLeafHashIsNull) { | 295 TEST_P(LogDnsClientTest, QueryLeafIndexReportsInvalidArgIfLeafHashIsNull) { |
| 550 MockLeafIndexCallback callback; | 296 MockLeafIndexCallback callback; |
| 551 QueryLeafIndex("ct.test", nullptr, &callback); | 297 QueryLeafIndex("ct.test", nullptr, &callback); |
| 552 ASSERT_TRUE(callback.called()); | 298 ASSERT_TRUE(callback.called()); |
| 553 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); | 299 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); |
| 554 EXPECT_THAT(callback.leaf_index(), 0); | 300 EXPECT_THAT(callback.leaf_index(), 0); |
| 555 } | 301 } |
| 556 | 302 |
| 557 TEST_P(LogDnsClientTest, QueryLeafIndexReportsSocketError) { | 303 TEST_P(LogDnsClientTest, QueryLeafIndexReportsSocketError) { |
| 558 ExpectRequestAndSocketError( | 304 mock_dns_.ExpectRequestAndSocketError( |
| 559 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 305 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
| 560 net::ERR_CONNECTION_REFUSED); | 306 net::ERR_CONNECTION_REFUSED); |
| 561 | 307 |
| 562 MockLeafIndexCallback callback; | 308 MockLeafIndexCallback callback; |
| 563 QueryLeafIndex("ct.test", kLeafHash, &callback); | 309 QueryLeafIndex("ct.test", kLeafHash, &callback); |
| 564 ASSERT_TRUE(callback.called()); | 310 ASSERT_TRUE(callback.called()); |
| 565 EXPECT_THAT(callback.net_error(), IsError(net::ERR_CONNECTION_REFUSED)); | 311 EXPECT_THAT(callback.net_error(), IsError(net::ERR_CONNECTION_REFUSED)); |
| 566 EXPECT_THAT(callback.leaf_index(), 0); | 312 EXPECT_THAT(callback.leaf_index(), 0); |
| 567 } | 313 } |
| 568 | 314 |
| 569 TEST_P(LogDnsClientTest, QueryLeafIndexReportsTimeout) { | 315 TEST_P(LogDnsClientTest, QueryLeafIndexReportsTimeout) { |
| 570 ExpectRequestAndTimeout( | 316 mock_dns_.ExpectRequestAndTimeout( |
| 571 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test."); | 317 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test."); |
| 572 | 318 |
| 573 MockLeafIndexCallback callback; | 319 MockLeafIndexCallback callback; |
| 574 QueryLeafIndex("ct.test", kLeafHash, &callback); | 320 QueryLeafIndex("ct.test", kLeafHash, &callback); |
| 575 ASSERT_TRUE(callback.called()); | 321 ASSERT_TRUE(callback.called()); |
| 576 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_TIMED_OUT)); | 322 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_TIMED_OUT)); |
| 577 EXPECT_THAT(callback.leaf_index(), 0); | 323 EXPECT_THAT(callback.leaf_index(), 0); |
| 578 } | 324 } |
| 579 | 325 |
| 580 TEST_P(LogDnsClientTest, QueryAuditProof) { | 326 TEST_P(LogDnsClientTest, QueryAuditProof) { |
| 581 const std::vector<std::string> audit_proof = GetSampleAuditProof(20); | 327 const std::vector<std::string> audit_proof = GetSampleAuditProof(20); |
| 582 | 328 |
| 583 // It should require 3 queries to collect the entire audit proof, as there is | 329 // It should require 3 queries to collect the entire audit proof, as there is |
| 584 // only space for 7 nodes per UDP packet. | 330 // only space for 7 nodes per UDP packet. |
| 585 ExpectAuditProofRequestAndResponse("0.123456.999999.tree.ct.test.", | 331 mock_dns_.ExpectAuditProofRequestAndResponse("0.123456.999999.tree.ct.test.", |
| 586 audit_proof.begin(), | 332 audit_proof.begin(), |
| 587 audit_proof.begin() + 7); | 333 audit_proof.begin() + 7); |
| 588 ExpectAuditProofRequestAndResponse("7.123456.999999.tree.ct.test.", | 334 mock_dns_.ExpectAuditProofRequestAndResponse("7.123456.999999.tree.ct.test.", |
| 589 audit_proof.begin() + 7, | 335 audit_proof.begin() + 7, |
| 590 audit_proof.begin() + 14); | 336 audit_proof.begin() + 14); |
| 591 ExpectAuditProofRequestAndResponse("14.123456.999999.tree.ct.test.", | 337 mock_dns_.ExpectAuditProofRequestAndResponse("14.123456.999999.tree.ct.test.", |
| 592 audit_proof.begin() + 14, | 338 audit_proof.begin() + 14, |
| 593 audit_proof.end()); | 339 audit_proof.end()); |
| 594 | 340 |
| 595 MockAuditProofCallback callback; | 341 MockAuditProofCallback callback; |
| 596 QueryAuditProof("ct.test", 123456, 999999, &callback); | 342 QueryAuditProof("ct.test", 123456, 999999, &callback); |
| 597 ASSERT_TRUE(callback.called()); | 343 ASSERT_TRUE(callback.called()); |
| 598 EXPECT_THAT(callback.net_error(), IsOk()); | 344 EXPECT_THAT(callback.net_error(), IsOk()); |
| 599 ASSERT_THAT(callback.proof(), NotNull()); | 345 ASSERT_THAT(callback.proof(), NotNull()); |
| 600 EXPECT_THAT(callback.proof()->leaf_index, 123456); | 346 EXPECT_THAT(callback.proof()->leaf_index, 123456); |
| 601 // EXPECT_THAT(callback.proof()->tree_size, 999999); | 347 // EXPECT_THAT(callback.proof()->tree_size, 999999); |
| 602 EXPECT_THAT(callback.proof()->nodes, audit_proof); | 348 EXPECT_THAT(callback.proof()->nodes, audit_proof); |
| 603 } | 349 } |
| 604 | 350 |
| 605 TEST_P(LogDnsClientTest, QueryAuditProofHandlesResponsesWithShortAuditPaths) { | 351 TEST_P(LogDnsClientTest, QueryAuditProofHandlesResponsesWithShortAuditPaths) { |
| 606 const std::vector<std::string> audit_proof = GetSampleAuditProof(20); | 352 const std::vector<std::string> audit_proof = GetSampleAuditProof(20); |
| 607 | 353 |
| 608 // Make some of the responses contain fewer proof nodes than they can hold. | 354 // Make some of the responses contain fewer proof nodes than they can hold. |
| 609 ExpectAuditProofRequestAndResponse("0.123456.999999.tree.ct.test.", | 355 mock_dns_.ExpectAuditProofRequestAndResponse("0.123456.999999.tree.ct.test.", |
| 610 audit_proof.begin(), | 356 audit_proof.begin(), |
| 611 audit_proof.begin() + 1); | 357 audit_proof.begin() + 1); |
| 612 ExpectAuditProofRequestAndResponse("1.123456.999999.tree.ct.test.", | 358 mock_dns_.ExpectAuditProofRequestAndResponse("1.123456.999999.tree.ct.test.", |
| 613 audit_proof.begin() + 1, | 359 audit_proof.begin() + 1, |
| 614 audit_proof.begin() + 3); | 360 audit_proof.begin() + 3); |
| 615 ExpectAuditProofRequestAndResponse("3.123456.999999.tree.ct.test.", | 361 mock_dns_.ExpectAuditProofRequestAndResponse("3.123456.999999.tree.ct.test.", |
| 616 audit_proof.begin() + 3, | 362 audit_proof.begin() + 3, |
| 617 audit_proof.begin() + 6); | 363 audit_proof.begin() + 6); |
| 618 ExpectAuditProofRequestAndResponse("6.123456.999999.tree.ct.test.", | 364 mock_dns_.ExpectAuditProofRequestAndResponse("6.123456.999999.tree.ct.test.", |
| 619 audit_proof.begin() + 6, | 365 audit_proof.begin() + 6, |
| 620 audit_proof.begin() + 10); | 366 audit_proof.begin() + 10); |
| 621 ExpectAuditProofRequestAndResponse("10.123456.999999.tree.ct.test.", | 367 mock_dns_.ExpectAuditProofRequestAndResponse("10.123456.999999.tree.ct.test.", |
| 622 audit_proof.begin() + 10, | 368 audit_proof.begin() + 10, |
| 623 audit_proof.begin() + 13); | 369 audit_proof.begin() + 13); |
| 624 ExpectAuditProofRequestAndResponse("13.123456.999999.tree.ct.test.", | 370 mock_dns_.ExpectAuditProofRequestAndResponse("13.123456.999999.tree.ct.test.", |
| 625 audit_proof.begin() + 13, | 371 audit_proof.begin() + 13, |
| 626 audit_proof.end()); | 372 audit_proof.end()); |
| 627 | 373 |
| 628 MockAuditProofCallback callback; | 374 MockAuditProofCallback callback; |
| 629 QueryAuditProof("ct.test", 123456, 999999, &callback); | 375 QueryAuditProof("ct.test", 123456, 999999, &callback); |
| 630 ASSERT_TRUE(callback.called()); | 376 ASSERT_TRUE(callback.called()); |
| 631 EXPECT_THAT(callback.net_error(), IsOk()); | 377 EXPECT_THAT(callback.net_error(), IsOk()); |
| 632 ASSERT_THAT(callback.proof(), NotNull()); | 378 ASSERT_THAT(callback.proof(), NotNull()); |
| 633 EXPECT_THAT(callback.proof()->leaf_index, 123456); | 379 EXPECT_THAT(callback.proof()->leaf_index, 123456); |
| 634 // EXPECT_THAT(callback.proof()->tree_size, 999999); | 380 // EXPECT_THAT(callback.proof()->tree_size, 999999); |
| 635 EXPECT_THAT(callback.proof()->nodes, audit_proof); | 381 EXPECT_THAT(callback.proof()->nodes, audit_proof); |
| 636 } | 382 } |
| 637 | 383 |
| 638 TEST_P(LogDnsClientTest, QueryAuditProofReportsThatLogDomainDoesNotExist) { | 384 TEST_P(LogDnsClientTest, QueryAuditProofReportsThatLogDomainDoesNotExist) { |
| 639 ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", | 385 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", |
| 640 net::dns_protocol::kRcodeNXDOMAIN); | 386 net::dns_protocol::kRcodeNXDOMAIN); |
| 641 | 387 |
| 642 MockAuditProofCallback callback; | 388 MockAuditProofCallback callback; |
| 643 QueryAuditProof("ct.test", 123456, 999999, &callback); | 389 QueryAuditProof("ct.test", 123456, 999999, &callback); |
| 644 ASSERT_TRUE(callback.called()); | 390 ASSERT_TRUE(callback.called()); |
| 645 EXPECT_THAT(callback.net_error(), IsError(net::ERR_NAME_NOT_RESOLVED)); | 391 EXPECT_THAT(callback.net_error(), IsError(net::ERR_NAME_NOT_RESOLVED)); |
| 646 EXPECT_THAT(callback.proof(), IsNull()); | 392 EXPECT_THAT(callback.proof(), IsNull()); |
| 647 } | 393 } |
| 648 | 394 |
| 649 TEST_P(LogDnsClientTest, QueryAuditProofReportsServerFailure) { | 395 TEST_P(LogDnsClientTest, QueryAuditProofReportsServerFailure) { |
| 650 ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", | 396 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", |
| 651 net::dns_protocol::kRcodeSERVFAIL); | 397 net::dns_protocol::kRcodeSERVFAIL); |
| 652 | 398 |
| 653 MockAuditProofCallback callback; | 399 MockAuditProofCallback callback; |
| 654 QueryAuditProof("ct.test", 123456, 999999, &callback); | 400 QueryAuditProof("ct.test", 123456, 999999, &callback); |
| 655 ASSERT_TRUE(callback.called()); | 401 ASSERT_TRUE(callback.called()); |
| 656 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); | 402 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); |
| 657 EXPECT_THAT(callback.proof(), IsNull()); | 403 EXPECT_THAT(callback.proof(), IsNull()); |
| 658 } | 404 } |
| 659 | 405 |
| 660 TEST_P(LogDnsClientTest, QueryAuditProofReportsServerRefusal) { | 406 TEST_P(LogDnsClientTest, QueryAuditProofReportsServerRefusal) { |
| 661 ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", | 407 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", |
| 662 net::dns_protocol::kRcodeREFUSED); | 408 net::dns_protocol::kRcodeREFUSED); |
| 663 | 409 |
| 664 MockAuditProofCallback callback; | 410 MockAuditProofCallback callback; |
| 665 QueryAuditProof("ct.test", 123456, 999999, &callback); | 411 QueryAuditProof("ct.test", 123456, 999999, &callback); |
| 666 ASSERT_TRUE(callback.called()); | 412 ASSERT_TRUE(callback.called()); |
| 667 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); | 413 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); |
| 668 EXPECT_THAT(callback.proof(), IsNull()); | 414 EXPECT_THAT(callback.proof(), IsNull()); |
| 669 } | 415 } |
| 670 | 416 |
| 671 TEST_P(LogDnsClientTest, | 417 TEST_P(LogDnsClientTest, |
| 672 QueryAuditProofReportsResponseMalformedIfNodeTooShort) { | 418 QueryAuditProofReportsResponseMalformedIfNodeTooShort) { |
| 673 // node is shorter than a SHA-256 hash (31 vs 32 bytes) | 419 // node is shorter than a SHA-256 hash (31 vs 32 bytes) |
| 674 const std::vector<std::string> audit_proof(1, std::string(31, 'a')); | 420 const std::vector<std::string> audit_proof(1, std::string(31, 'a')); |
| 675 | 421 |
| 676 ExpectAuditProofRequestAndResponse("0.123456.999999.tree.ct.test.", | 422 mock_dns_.ExpectAuditProofRequestAndResponse( |
| 677 audit_proof.begin(), audit_proof.end()); | 423 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); |
| 678 | 424 |
| 679 MockAuditProofCallback callback; | 425 MockAuditProofCallback callback; |
| 680 QueryAuditProof("ct.test", 123456, 999999, &callback); | 426 QueryAuditProof("ct.test", 123456, 999999, &callback); |
| 681 ASSERT_TRUE(callback.called()); | 427 ASSERT_TRUE(callback.called()); |
| 682 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 428 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 683 EXPECT_THAT(callback.proof(), IsNull()); | 429 EXPECT_THAT(callback.proof(), IsNull()); |
| 684 } | 430 } |
| 685 | 431 |
| 686 TEST_P(LogDnsClientTest, QueryAuditProofReportsResponseMalformedIfNodeTooLong) { | 432 TEST_P(LogDnsClientTest, QueryAuditProofReportsResponseMalformedIfNodeTooLong) { |
| 687 // node is longer than a SHA-256 hash (33 vs 32 bytes) | 433 // node is longer than a SHA-256 hash (33 vs 32 bytes) |
| 688 const std::vector<std::string> audit_proof(1, std::string(33, 'a')); | 434 const std::vector<std::string> audit_proof(1, std::string(33, 'a')); |
| 689 | 435 |
| 690 ExpectAuditProofRequestAndResponse("0.123456.999999.tree.ct.test.", | 436 mock_dns_.ExpectAuditProofRequestAndResponse( |
| 691 audit_proof.begin(), audit_proof.end()); | 437 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); |
| 692 | 438 |
| 693 MockAuditProofCallback callback; | 439 MockAuditProofCallback callback; |
| 694 QueryAuditProof("ct.test", 123456, 999999, &callback); | 440 QueryAuditProof("ct.test", 123456, 999999, &callback); |
| 695 ASSERT_TRUE(callback.called()); | 441 ASSERT_TRUE(callback.called()); |
| 696 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 442 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 697 EXPECT_THAT(callback.proof(), IsNull()); | 443 EXPECT_THAT(callback.proof(), IsNull()); |
| 698 } | 444 } |
| 699 | 445 |
| 700 TEST_P(LogDnsClientTest, QueryAuditProofReportsResponseMalformedIfEmpty) { | 446 TEST_P(LogDnsClientTest, QueryAuditProofReportsResponseMalformedIfEmpty) { |
| 701 const std::vector<std::string> audit_proof; | 447 const std::vector<std::string> audit_proof; |
| 702 | 448 |
| 703 ExpectAuditProofRequestAndResponse("0.123456.999999.tree.ct.test.", | 449 mock_dns_.ExpectAuditProofRequestAndResponse( |
| 704 audit_proof.begin(), audit_proof.end()); | 450 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); |
| 705 | 451 |
| 706 MockAuditProofCallback callback; | 452 MockAuditProofCallback callback; |
| 707 QueryAuditProof("ct.test", 123456, 999999, &callback); | 453 QueryAuditProof("ct.test", 123456, 999999, &callback); |
| 708 ASSERT_TRUE(callback.called()); | 454 ASSERT_TRUE(callback.called()); |
| 709 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 455 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 710 EXPECT_THAT(callback.proof(), IsNull()); | 456 EXPECT_THAT(callback.proof(), IsNull()); |
| 711 } | 457 } |
| 712 | 458 |
| 713 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLogDomainIsEmpty) { | 459 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLogDomainIsEmpty) { |
| 714 MockAuditProofCallback callback; | 460 MockAuditProofCallback callback; |
| (...skipping 23 matching lines...) Expand all Loading... |
| 738 TEST_P(LogDnsClientTest, | 484 TEST_P(LogDnsClientTest, |
| 739 QueryAuditProofReportsInvalidArgIfLeafIndexGreaterThanTreeSize) { | 485 QueryAuditProofReportsInvalidArgIfLeafIndexGreaterThanTreeSize) { |
| 740 MockAuditProofCallback callback; | 486 MockAuditProofCallback callback; |
| 741 QueryAuditProof("ct.test", 999999, 123456, &callback); | 487 QueryAuditProof("ct.test", 999999, 123456, &callback); |
| 742 ASSERT_TRUE(callback.called()); | 488 ASSERT_TRUE(callback.called()); |
| 743 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); | 489 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); |
| 744 EXPECT_THAT(callback.proof(), IsNull()); | 490 EXPECT_THAT(callback.proof(), IsNull()); |
| 745 } | 491 } |
| 746 | 492 |
| 747 TEST_P(LogDnsClientTest, QueryAuditProofReportsSocketError) { | 493 TEST_P(LogDnsClientTest, QueryAuditProofReportsSocketError) { |
| 748 ExpectRequestAndSocketError("0.123456.999999.tree.ct.test.", | 494 mock_dns_.ExpectRequestAndSocketError("0.123456.999999.tree.ct.test.", |
| 749 net::ERR_CONNECTION_REFUSED); | 495 net::ERR_CONNECTION_REFUSED); |
| 750 | 496 |
| 751 MockAuditProofCallback callback; | 497 MockAuditProofCallback callback; |
| 752 QueryAuditProof("ct.test", 123456, 999999, &callback); | 498 QueryAuditProof("ct.test", 123456, 999999, &callback); |
| 753 ASSERT_TRUE(callback.called()); | 499 ASSERT_TRUE(callback.called()); |
| 754 EXPECT_THAT(callback.net_error(), IsError(net::ERR_CONNECTION_REFUSED)); | 500 EXPECT_THAT(callback.net_error(), IsError(net::ERR_CONNECTION_REFUSED)); |
| 755 EXPECT_THAT(callback.proof(), IsNull()); | 501 EXPECT_THAT(callback.proof(), IsNull()); |
| 756 } | 502 } |
| 757 | 503 |
| 758 TEST_P(LogDnsClientTest, QueryAuditProofReportsTimeout) { | 504 TEST_P(LogDnsClientTest, QueryAuditProofReportsTimeout) { |
| 759 ExpectRequestAndTimeout("0.123456.999999.tree.ct.test."); | 505 mock_dns_.ExpectRequestAndTimeout("0.123456.999999.tree.ct.test."); |
| 760 | 506 |
| 761 MockAuditProofCallback callback; | 507 MockAuditProofCallback callback; |
| 762 QueryAuditProof("ct.test", 123456, 999999, &callback); | 508 QueryAuditProof("ct.test", 123456, 999999, &callback); |
| 763 ASSERT_TRUE(callback.called()); | 509 ASSERT_TRUE(callback.called()); |
| 764 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_TIMED_OUT)); | 510 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_TIMED_OUT)); |
| 765 EXPECT_THAT(callback.proof(), IsNull()); | 511 EXPECT_THAT(callback.proof(), IsNull()); |
| 766 } | 512 } |
| 767 | 513 |
| 768 TEST_P(LogDnsClientTest, AdoptsLatestDnsConfigIfValid) { | 514 TEST_P(LogDnsClientTest, AdoptsLatestDnsConfigIfValid) { |
| 769 std::unique_ptr<net::DnsClient> tmp = CreateDnsClient(); | 515 std::unique_ptr<net::DnsClient> tmp = mock_dns_.CreateDnsClient(); |
| 770 net::DnsClient* dns_client = tmp.get(); | 516 net::DnsClient* dns_client = tmp.get(); |
| 771 LogDnsClient log_client(std::move(tmp), net::BoundNetLog()); | 517 LogDnsClient log_client(std::move(tmp), net::BoundNetLog()); |
| 772 | 518 |
| 773 // Get the current DNS config, modify it and broadcast the update. | 519 // Get the current DNS config, modify it and broadcast the update. |
| 774 net::DnsConfig config(*dns_client->GetConfig()); | 520 net::DnsConfig config(*dns_client->GetConfig()); |
| 775 ASSERT_NE(123, config.attempts); | 521 ASSERT_NE(123, config.attempts); |
| 776 config.attempts = 123; | 522 config.attempts = 123; |
| 777 DnsChangeNotifier::SetDnsConfig(config); | 523 mock_dns_.SetDnsConfig(config); |
| 778 | 524 |
| 779 // Let the DNS config change propogate. | 525 // Let the DNS config change propogate. |
| 780 base::RunLoop().RunUntilIdle(); | 526 base::RunLoop().RunUntilIdle(); |
| 781 EXPECT_EQ(123, dns_client->GetConfig()->attempts); | 527 EXPECT_EQ(123, dns_client->GetConfig()->attempts); |
| 782 } | 528 } |
| 783 | 529 |
| 784 TEST_P(LogDnsClientTest, IgnoresLatestDnsConfigIfInvalid) { | 530 TEST_P(LogDnsClientTest, IgnoresLatestDnsConfigIfInvalid) { |
| 785 std::unique_ptr<net::DnsClient> tmp = CreateDnsClient(); | 531 std::unique_ptr<net::DnsClient> tmp = mock_dns_.CreateDnsClient(); |
| 786 net::DnsClient* dns_client = tmp.get(); | 532 net::DnsClient* dns_client = tmp.get(); |
| 787 LogDnsClient log_client(std::move(tmp), net::BoundNetLog()); | 533 LogDnsClient log_client(std::move(tmp), net::BoundNetLog()); |
| 788 | 534 |
| 789 // Get the current DNS config, modify it and broadcast the update. | 535 // Get the current DNS config, modify it and broadcast the update. |
| 790 net::DnsConfig config(*dns_client->GetConfig()); | 536 net::DnsConfig config(*dns_client->GetConfig()); |
| 791 ASSERT_THAT(config.nameservers, Not(IsEmpty())); | 537 ASSERT_THAT(config.nameservers, Not(IsEmpty())); |
| 792 config.nameservers.clear(); // Makes config invalid | 538 config.nameservers.clear(); // Makes config invalid |
| 793 DnsChangeNotifier::SetDnsConfig(config); | 539 mock_dns_.SetDnsConfig(config); |
| 794 | 540 |
| 795 // Let the DNS config change propogate. | 541 // Let the DNS config change propogate. |
| 796 base::RunLoop().RunUntilIdle(); | 542 base::RunLoop().RunUntilIdle(); |
| 797 EXPECT_THAT(dns_client->GetConfig()->nameservers, Not(IsEmpty())); | 543 EXPECT_THAT(dns_client->GetConfig()->nameservers, Not(IsEmpty())); |
| 798 } | 544 } |
| 799 | 545 |
| 800 INSTANTIATE_TEST_CASE_P(ReadMode, | 546 INSTANTIATE_TEST_CASE_P(ReadMode, |
| 801 LogDnsClientTest, | 547 LogDnsClientTest, |
| 802 ::testing::Values(net::IoMode::ASYNC, | 548 ::testing::Values(net::IoMode::ASYNC, |
| 803 net::IoMode::SYNCHRONOUS)); | 549 net::IoMode::SYNCHRONOUS)); |
| 804 | 550 |
| 805 } // namespace | 551 } // namespace |
| 806 } // namespace certificate_transparency | 552 } // namespace certificate_transparency |
| OLD | NEW |