OLD | NEW |
1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "components/certificate_transparency/log_dns_client.h" | 5 #include "components/certificate_transparency/log_dns_client.h" |
6 | 6 |
7 #include <algorithm> | 7 #include <memory> |
8 #include <numeric> | 8 #include <string> |
9 #include <utility> | 9 #include <utility> |
10 #include <vector> | 10 #include <vector> |
11 | 11 |
12 #include "base/big_endian.h" | |
13 #include "base/macros.h" | |
14 #include "base/message_loop/message_loop.h" | 12 #include "base/message_loop/message_loop.h" |
15 #include "base/run_loop.h" | 13 #include "base/run_loop.h" |
16 #include "base/sys_byteorder.h" | 14 #include "components/certificate_transparency/mock_log_dns_traffic.h" |
17 #include "base/test/test_timeouts.h" | |
18 #include "crypto/sha2.h" | 15 #include "crypto/sha2.h" |
19 #include "net/base/net_errors.h" | 16 #include "net/base/net_errors.h" |
20 #include "net/cert/merkle_audit_proof.h" | 17 #include "net/cert/merkle_audit_proof.h" |
21 #include "net/cert/merkle_tree_leaf.h" | |
22 #include "net/cert/signed_certificate_timestamp.h" | 18 #include "net/cert/signed_certificate_timestamp.h" |
23 #include "net/dns/dns_client.h" | 19 #include "net/dns/dns_client.h" |
24 #include "net/dns/dns_config_service.h" | |
25 #include "net/dns/dns_protocol.h" | 20 #include "net/dns/dns_protocol.h" |
26 #include "net/log/net_log.h" | 21 #include "net/log/net_log.h" |
27 #include "net/socket/socket_test_util.h" | |
28 #include "net/test/gtest_util.h" | 22 #include "net/test/gtest_util.h" |
29 #include "testing/gmock/include/gmock/gmock.h" | 23 #include "testing/gmock/include/gmock/gmock.h" |
30 #include "testing/gtest/include/gtest/gtest.h" | 24 #include "testing/gtest/include/gtest/gtest.h" |
31 | 25 |
32 namespace certificate_transparency { | 26 namespace certificate_transparency { |
33 namespace { | 27 namespace { |
34 | 28 |
35 using ::testing::IsNull; | 29 using ::testing::IsNull; |
36 using ::testing::NotNull; | 30 using ::testing::NotNull; |
37 using net::test::IsError; | 31 using net::test::IsError; |
38 using net::test::IsOk; | 32 using net::test::IsOk; |
39 | 33 |
40 constexpr char kLeafHash[] = | 34 constexpr char kLeafHash[] = |
41 "\x1f\x25\xe1\xca\xba\x4f\xf9\xb8\x27\x24\x83\x0f\xca\x60\xe4\xc2\xbe\xa8" | 35 "\x1f\x25\xe1\xca\xba\x4f\xf9\xb8\x27\x24\x83\x0f\xca\x60\xe4\xc2\xbe\xa8" |
42 "\xc3\xa9\x44\x1c\x27\xb0\xb4\x3e\x6a\x96\x94\xc7\xb8\x04"; | 36 "\xc3\xa9\x44\x1c\x27\xb0\xb4\x3e\x6a\x96\x94\xc7\xb8\x04"; |
43 | 37 |
44 // Always return min, to simplify testing. | |
45 // This should result in the DNS query ID always being 0. | |
46 int FakeRandInt(int min, int max) { | |
47 return min; | |
48 } | |
49 | |
50 std::vector<char> CreateDnsTxtRequest(base::StringPiece qname) { | |
51 std::string encoded_qname; | |
52 EXPECT_TRUE(net::DNSDomainFromDot(qname, &encoded_qname)); | |
53 | |
54 const size_t query_section_size = encoded_qname.size() + 4; | |
55 | |
56 std::vector<char> request(sizeof(net::dns_protocol::Header) + | |
57 query_section_size); | |
58 base::BigEndianWriter writer(request.data(), request.size()); | |
59 | |
60 // Header | |
61 net::dns_protocol::Header header = {}; | |
62 header.flags = base::HostToNet16(net::dns_protocol::kFlagRD); | |
63 header.qdcount = base::HostToNet16(1); | |
64 EXPECT_TRUE(writer.WriteBytes(&header, sizeof(header))); | |
65 // Query section | |
66 EXPECT_TRUE(writer.WriteBytes(encoded_qname.data(), encoded_qname.size())); | |
67 EXPECT_TRUE(writer.WriteU16(net::dns_protocol::kTypeTXT)); | |
68 EXPECT_TRUE(writer.WriteU16(net::dns_protocol::kClassIN)); | |
69 EXPECT_EQ(0, writer.remaining()); | |
70 | |
71 return request; | |
72 } | |
73 | |
74 std::vector<char> CreateDnsTxtResponse(const std::vector<char>& request, | |
75 base::StringPiece answer) { | |
76 const size_t answers_section_size = 12 + answer.size(); | |
77 constexpr uint32_t ttl = 86400; // seconds | |
78 | |
79 std::vector<char> response(request.size() + answers_section_size); | |
80 std::copy(request.begin(), request.end(), response.begin()); | |
81 // Modify the header | |
82 net::dns_protocol::Header* header = | |
83 reinterpret_cast<net::dns_protocol::Header*>(response.data()); | |
84 header->ancount = base::HostToNet16(1); | |
85 header->flags |= base::HostToNet16(net::dns_protocol::kFlagResponse); | |
86 | |
87 // Write the answer section | |
88 base::BigEndianWriter writer(response.data() + request.size(), | |
89 response.size() - request.size()); | |
90 EXPECT_TRUE(writer.WriteU8(0xc0)); // qname is a pointer | |
91 EXPECT_TRUE(writer.WriteU8( | |
92 sizeof(*header))); // address of qname (start of query section) | |
93 EXPECT_TRUE(writer.WriteU16(net::dns_protocol::kTypeTXT)); | |
94 EXPECT_TRUE(writer.WriteU16(net::dns_protocol::kClassIN)); | |
95 EXPECT_TRUE(writer.WriteU32(ttl)); | |
96 EXPECT_TRUE(writer.WriteU16(answer.size())); | |
97 EXPECT_TRUE(writer.WriteBytes(answer.data(), answer.size())); | |
98 EXPECT_EQ(0, writer.remaining()); | |
99 | |
100 return response; | |
101 } | |
102 | |
103 std::vector<char> CreateDnsErrorResponse(const std::vector<char>& request, | |
104 uint8_t rcode) { | |
105 std::vector<char> response(request); | |
106 // Modify the header | |
107 net::dns_protocol::Header* header = | |
108 reinterpret_cast<net::dns_protocol::Header*>(response.data()); | |
109 header->ancount = base::HostToNet16(1); | |
110 header->flags |= base::HostToNet16(net::dns_protocol::kFlagResponse | rcode); | |
111 | |
112 return response; | |
113 } | |
114 | |
115 std::vector<std::string> GetSampleAuditProof(size_t length) { | 38 std::vector<std::string> GetSampleAuditProof(size_t length) { |
116 std::vector<std::string> audit_proof(length); | 39 std::vector<std::string> audit_proof(length); |
117 // Makes each node of the audit proof different, so that tests are able to | 40 // Makes each node of the audit proof different, so that tests are able to |
118 // confirm that the audit proof is reconstructed in the correct order. | 41 // confirm that the audit proof is reconstructed in the correct order. |
119 for (size_t i = 0; i < length; ++i) { | 42 for (size_t i = 0; i < length; ++i) { |
120 std::string node(crypto::kSHA256Length, '\0'); | 43 std::string node(crypto::kSHA256Length, '\0'); |
121 // Each node is 32 bytes, with each byte having a different value. | 44 // Each node is 32 bytes, with each byte having a different value. |
122 for (size_t j = 0; j < crypto::kSHA256Length; ++j) { | 45 for (size_t j = 0; j < crypto::kSHA256Length; ++j) { |
123 node[j] = static_cast<char>((-127 + i + j) % 128); | 46 node[j] = static_cast<char>((-127 + i + j) % 128); |
124 } | 47 } |
(...skipping 54 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
179 | 102 |
180 void WaitUntilRun() { run_loop_.Run(); } | 103 void WaitUntilRun() { run_loop_.Run(); } |
181 | 104 |
182 private: | 105 private: |
183 bool called_; | 106 bool called_; |
184 int net_error_; | 107 int net_error_; |
185 std::unique_ptr<net::ct::MerkleAuditProof> proof_; | 108 std::unique_ptr<net::ct::MerkleAuditProof> proof_; |
186 base::RunLoop run_loop_; | 109 base::RunLoop run_loop_; |
187 }; | 110 }; |
188 | 111 |
189 // A container for all of the data we need to keep alive for a mock socket. | |
190 // This is useful because Mock{Read,Write}, SequencedSocketData and | |
191 // MockClientSocketFactory all do not take ownership of or copy their arguments, | |
192 // so we have to manage the lifetime of those arguments ourselves. Wrapping all | |
193 // of that up in a single class simplifies this. | |
194 class MockSocketData { | |
195 public: | |
196 // A socket that expects one write and one read operation. | |
197 MockSocketData(const std::vector<char>& write, const std::vector<char>& read) | |
198 : expected_write_payload_(write), | |
199 expected_read_payload_(read), | |
200 expected_write_(net::SYNCHRONOUS, | |
201 expected_write_payload_.data(), | |
202 expected_write_payload_.size(), | |
203 0), | |
204 expected_reads_{net::MockRead(net::ASYNC, | |
205 expected_read_payload_.data(), | |
206 expected_read_payload_.size(), | |
207 1), | |
208 eof_}, | |
209 socket_data_(expected_reads_, 2, &expected_write_, 1) {} | |
210 | |
211 // A socket that expects one write and a read error. | |
212 MockSocketData(const std::vector<char>& write, int net_error) | |
213 : expected_write_payload_(write), | |
214 expected_write_(net::SYNCHRONOUS, | |
215 expected_write_payload_.data(), | |
216 expected_write_payload_.size(), | |
217 0), | |
218 expected_reads_{net::MockRead(net::ASYNC, net_error, 1), eof_}, | |
219 socket_data_(expected_reads_, 2, &expected_write_, 1) {} | |
220 | |
221 // A socket that expects one write and no response. | |
222 explicit MockSocketData(const std::vector<char>& write) | |
223 : expected_write_payload_(write), | |
224 expected_write_(net::SYNCHRONOUS, | |
225 expected_write_payload_.data(), | |
226 expected_write_payload_.size(), | |
227 0), | |
228 expected_reads_{net::MockRead(net::SYNCHRONOUS, net::ERR_IO_PENDING, 1), | |
229 eof_}, | |
230 socket_data_(expected_reads_, 2, &expected_write_, 1) {} | |
231 | |
232 void SetWriteMode(net::IoMode mode) { expected_write_.mode = mode; } | |
233 void SetReadMode(net::IoMode mode) { expected_reads_[0].mode = mode; } | |
234 | |
235 void AddToFactory(net::MockClientSocketFactory* socket_factory) { | |
236 socket_factory->AddSocketDataProvider(&socket_data_); | |
237 } | |
238 | |
239 private: | |
240 // Prevents read overruns and makes a socket timeout the default behaviour. | |
241 static const net::MockRead eof_; | |
242 | |
243 const std::vector<char> expected_write_payload_; | |
244 const std::vector<char> expected_read_payload_; | |
245 // Encapsulates the data that is expected to be written to a socket. | |
246 net::MockWrite expected_write_; | |
247 // Encapsulates the data/error that should be returned when reading from a | |
248 // socket. The expected response is followed by |eof_|, to catch further, | |
249 // unexpected read attempts. | |
250 net::MockRead expected_reads_[2]; | |
251 net::SequencedSocketData socket_data_; | |
252 | |
253 DISALLOW_COPY_AND_ASSIGN(MockSocketData); | |
254 }; | |
255 | |
256 const net::MockRead MockSocketData::eof_(net::SYNCHRONOUS, | |
257 net::ERR_IO_PENDING, | |
258 2); | |
259 | |
260 class LogDnsClientTest : public ::testing::TestWithParam<net::IoMode> { | 112 class LogDnsClientTest : public ::testing::TestWithParam<net::IoMode> { |
261 protected: | 113 protected: |
262 LogDnsClientTest() { | 114 LogDnsClientTest() { mock_dns_.SetSocketReadMode(GetParam()); } |
263 // Use an invalid nameserver address. This prevents the tests accidentally | |
264 // sending real DNS queries. The mock sockets don't care that the address | |
265 // is invalid. | |
266 dns_config_.nameservers.push_back(net::IPEndPoint()); | |
267 // Don't attempt retransmissions - just fail. | |
268 dns_config_.attempts = 1; | |
269 // This ensures timeouts are long enough for memory tests. | |
270 dns_config_.timeout = TestTimeouts::action_timeout(); | |
271 // Simplify testing - don't require random numbers for the source port. | |
272 // This means our FakeRandInt function should only be called to get query | |
273 // IDs. | |
274 dns_config_.randomize_ports = false; | |
275 } | |
276 | |
277 void ExpectRequestAndErrorResponse(base::StringPiece qname, uint8_t rcode) { | |
278 std::vector<char> request = CreateDnsTxtRequest(qname); | |
279 std::vector<char> response = CreateDnsErrorResponse(request, rcode); | |
280 | |
281 mock_socket_data_.emplace_back(new MockSocketData(request, response)); | |
282 mock_socket_data_.back()->SetReadMode(GetParam()); | |
283 mock_socket_data_.back()->AddToFactory(&socket_factory_); | |
284 } | |
285 | |
286 void ExpectRequestAndSocketError(base::StringPiece qname, int net_error) { | |
287 std::vector<char> request = CreateDnsTxtRequest(qname); | |
288 | |
289 mock_socket_data_.emplace_back(new MockSocketData(request, net_error)); | |
290 mock_socket_data_.back()->SetReadMode(GetParam()); | |
291 mock_socket_data_.back()->AddToFactory(&socket_factory_); | |
292 } | |
293 | |
294 void ExpectRequestAndTimeout(base::StringPiece qname) { | |
295 std::vector<char> request = CreateDnsTxtRequest(qname); | |
296 | |
297 mock_socket_data_.emplace_back(new MockSocketData(request)); | |
298 mock_socket_data_.back()->SetReadMode(GetParam()); | |
299 mock_socket_data_.back()->AddToFactory(&socket_factory_); | |
300 | |
301 // Speed up timeout tests. | |
302 dns_config_.timeout = TestTimeouts::tiny_timeout(); | |
303 } | |
304 | |
305 void ExpectLeafIndexRequestAndResponse(base::StringPiece qname, | |
306 base::StringPiece leaf_index) { | |
307 // Prepend size to leaf_index to create the query answer (rdata) | |
308 ASSERT_LE(leaf_index.size(), 0xFFul); // size must fit into a single byte | |
309 std::string answer = leaf_index.as_string(); | |
310 answer.insert(answer.begin(), static_cast<char>(leaf_index.size())); | |
311 | |
312 ExpectRequestAndResponse(qname, answer); | |
313 } | |
314 | |
315 void ExpectAuditProofRequestAndResponse( | |
316 base::StringPiece qname, | |
317 std::vector<std::string>::const_iterator audit_path_start, | |
318 std::vector<std::string>::const_iterator audit_path_end) { | |
319 // Join nodes in the audit path into a single string. | |
320 std::string proof = | |
321 std::accumulate(audit_path_start, audit_path_end, std::string()); | |
322 | |
323 // Prepend size to proof to create the query answer (rdata) | |
324 ASSERT_LE(proof.size(), 0xFFul); // size must fit into a single byte | |
325 proof.insert(proof.begin(), static_cast<char>(proof.size())); | |
326 | |
327 ExpectRequestAndResponse(qname, proof); | |
328 } | |
329 | 115 |
330 void QueryLeafIndex(base::StringPiece log_domain, | 116 void QueryLeafIndex(base::StringPiece log_domain, |
331 base::StringPiece leaf_hash, | 117 base::StringPiece leaf_hash, |
332 MockLeafIndexCallback* callback) { | 118 MockLeafIndexCallback* callback) { |
333 std::unique_ptr<net::DnsClient> dns_client = CreateDnsClient(); | 119 std::unique_ptr<net::DnsClient> dns_client = mock_dns_.CreateDnsClient(); |
334 LogDnsClient log_client(std::move(dns_client), net::BoundNetLog()); | 120 LogDnsClient log_client(std::move(dns_client), net::BoundNetLog()); |
335 | 121 |
336 log_client.QueryLeafIndex(log_domain, leaf_hash, callback->AsCallback()); | 122 log_client.QueryLeafIndex(log_domain, leaf_hash, callback->AsCallback()); |
337 callback->WaitUntilRun(); | 123 callback->WaitUntilRun(); |
338 } | 124 } |
339 | 125 |
340 void QueryAuditProof(base::StringPiece log_domain, | 126 void QueryAuditProof(base::StringPiece log_domain, |
341 uint64_t leaf_index, | 127 uint64_t leaf_index, |
342 uint64_t tree_size, | 128 uint64_t tree_size, |
343 MockAuditProofCallback* callback) { | 129 MockAuditProofCallback* callback) { |
344 std::unique_ptr<net::DnsClient> dns_client = CreateDnsClient(); | 130 std::unique_ptr<net::DnsClient> dns_client = mock_dns_.CreateDnsClient(); |
345 LogDnsClient log_client(std::move(dns_client), net::BoundNetLog()); | 131 LogDnsClient log_client(std::move(dns_client), net::BoundNetLog()); |
346 | 132 |
347 log_client.QueryAuditProof(log_domain, leaf_index, tree_size, | 133 log_client.QueryAuditProof(log_domain, leaf_index, tree_size, |
348 callback->AsCallback()); | 134 callback->AsCallback()); |
349 callback->WaitUntilRun(); | 135 callback->WaitUntilRun(); |
350 } | 136 } |
351 | 137 |
352 private: | 138 MockLogDnsTraffic mock_dns_; |
353 std::unique_ptr<net::DnsClient> CreateDnsClient() { | |
354 std::unique_ptr<net::DnsClient> client = | |
355 net::DnsClient::CreateClientForTesting(nullptr, &socket_factory_, | |
356 base::Bind(&FakeRandInt)); | |
357 client->SetConfig(dns_config_); | |
358 return client; | |
359 } | |
360 | |
361 void ExpectRequestAndResponse(base::StringPiece qname, | |
362 base::StringPiece answer) { | |
363 std::vector<char> request = CreateDnsTxtRequest(qname); | |
364 std::vector<char> response = CreateDnsTxtResponse(request, answer); | |
365 | |
366 mock_socket_data_.emplace_back(new MockSocketData(request, response)); | |
367 mock_socket_data_.back()->SetReadMode(GetParam()); | |
368 mock_socket_data_.back()->AddToFactory(&socket_factory_); | |
369 } | |
370 | |
371 net::DnsConfig dns_config_; | |
372 base::MessageLoopForIO message_loop_; | 139 base::MessageLoopForIO message_loop_; |
373 std::vector<std::unique_ptr<MockSocketData>> mock_socket_data_; | |
374 net::MockClientSocketFactory socket_factory_; | |
375 }; | 140 }; |
376 | 141 |
377 TEST_P(LogDnsClientTest, QueryLeafIndex) { | 142 TEST_P(LogDnsClientTest, QueryLeafIndex) { |
378 ExpectLeafIndexRequestAndResponse( | 143 mock_dns_.ExpectLeafIndexRequestAndResponse( |
379 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 144 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
380 "123456"); | 145 "123456"); |
381 | 146 |
382 MockLeafIndexCallback callback; | 147 MockLeafIndexCallback callback; |
383 QueryLeafIndex("ct.test", kLeafHash, &callback); | 148 QueryLeafIndex("ct.test", kLeafHash, &callback); |
384 ASSERT_TRUE(callback.called()); | 149 ASSERT_TRUE(callback.called()); |
385 EXPECT_THAT(callback.net_error(), IsOk()); | 150 EXPECT_THAT(callback.net_error(), IsOk()); |
386 EXPECT_THAT(callback.leaf_index(), 123456); | 151 EXPECT_THAT(callback.leaf_index(), 123456); |
387 } | 152 } |
388 | 153 |
389 TEST_P(LogDnsClientTest, QueryLeafIndexReportsThatLogDomainDoesNotExist) { | 154 TEST_P(LogDnsClientTest, QueryLeafIndexReportsThatLogDomainDoesNotExist) { |
390 ExpectRequestAndErrorResponse( | 155 mock_dns_.ExpectRequestAndErrorResponse( |
391 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 156 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
392 net::dns_protocol::kRcodeNXDOMAIN); | 157 net::dns_protocol::kRcodeNXDOMAIN); |
393 | 158 |
394 MockLeafIndexCallback callback; | 159 MockLeafIndexCallback callback; |
395 QueryLeafIndex("ct.test", kLeafHash, &callback); | 160 QueryLeafIndex("ct.test", kLeafHash, &callback); |
396 ASSERT_TRUE(callback.called()); | 161 ASSERT_TRUE(callback.called()); |
397 EXPECT_THAT(callback.net_error(), IsError(net::ERR_NAME_NOT_RESOLVED)); | 162 EXPECT_THAT(callback.net_error(), IsError(net::ERR_NAME_NOT_RESOLVED)); |
398 EXPECT_THAT(callback.leaf_index(), 0); | 163 EXPECT_THAT(callback.leaf_index(), 0); |
399 } | 164 } |
400 | 165 |
401 TEST_P(LogDnsClientTest, QueryLeafIndexReportsServerFailure) { | 166 TEST_P(LogDnsClientTest, QueryLeafIndexReportsServerFailure) { |
402 ExpectRequestAndErrorResponse( | 167 mock_dns_.ExpectRequestAndErrorResponse( |
403 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 168 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
404 net::dns_protocol::kRcodeSERVFAIL); | 169 net::dns_protocol::kRcodeSERVFAIL); |
405 | 170 |
406 MockLeafIndexCallback callback; | 171 MockLeafIndexCallback callback; |
407 QueryLeafIndex("ct.test", kLeafHash, &callback); | 172 QueryLeafIndex("ct.test", kLeafHash, &callback); |
408 ASSERT_TRUE(callback.called()); | 173 ASSERT_TRUE(callback.called()); |
409 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); | 174 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); |
410 EXPECT_THAT(callback.leaf_index(), 0); | 175 EXPECT_THAT(callback.leaf_index(), 0); |
411 } | 176 } |
412 | 177 |
413 TEST_P(LogDnsClientTest, QueryLeafIndexReportsServerRefusal) { | 178 TEST_P(LogDnsClientTest, QueryLeafIndexReportsServerRefusal) { |
414 ExpectRequestAndErrorResponse( | 179 mock_dns_.ExpectRequestAndErrorResponse( |
415 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 180 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
416 net::dns_protocol::kRcodeREFUSED); | 181 net::dns_protocol::kRcodeREFUSED); |
417 | 182 |
418 MockLeafIndexCallback callback; | 183 MockLeafIndexCallback callback; |
419 QueryLeafIndex("ct.test", kLeafHash, &callback); | 184 QueryLeafIndex("ct.test", kLeafHash, &callback); |
420 ASSERT_TRUE(callback.called()); | 185 ASSERT_TRUE(callback.called()); |
421 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); | 186 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); |
422 EXPECT_THAT(callback.leaf_index(), 0); | 187 EXPECT_THAT(callback.leaf_index(), 0); |
423 } | 188 } |
424 | 189 |
425 TEST_P(LogDnsClientTest, | 190 TEST_P(LogDnsClientTest, |
426 QueryLeafIndexReportsMalformedResponseIfLeafIndexIsNotNumeric) { | 191 QueryLeafIndexReportsMalformedResponseIfLeafIndexIsNotNumeric) { |
427 ExpectLeafIndexRequestAndResponse( | 192 mock_dns_.ExpectLeafIndexRequestAndResponse( |
428 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 193 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
429 "foo"); | 194 "foo"); |
430 | 195 |
431 MockLeafIndexCallback callback; | 196 MockLeafIndexCallback callback; |
432 QueryLeafIndex("ct.test", kLeafHash, &callback); | 197 QueryLeafIndex("ct.test", kLeafHash, &callback); |
433 ASSERT_TRUE(callback.called()); | 198 ASSERT_TRUE(callback.called()); |
434 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 199 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
435 EXPECT_THAT(callback.leaf_index(), 0); | 200 EXPECT_THAT(callback.leaf_index(), 0); |
436 } | 201 } |
437 | 202 |
438 TEST_P(LogDnsClientTest, | 203 TEST_P(LogDnsClientTest, |
439 QueryLeafIndexReportsMalformedResponseIfLeafIndexIsFloatingPoint) { | 204 QueryLeafIndexReportsMalformedResponseIfLeafIndexIsFloatingPoint) { |
440 ExpectLeafIndexRequestAndResponse( | 205 mock_dns_.ExpectLeafIndexRequestAndResponse( |
441 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 206 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
442 "123456.0"); | 207 "123456.0"); |
443 | 208 |
444 MockLeafIndexCallback callback; | 209 MockLeafIndexCallback callback; |
445 QueryLeafIndex("ct.test", kLeafHash, &callback); | 210 QueryLeafIndex("ct.test", kLeafHash, &callback); |
446 ASSERT_TRUE(callback.called()); | 211 ASSERT_TRUE(callback.called()); |
447 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 212 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
448 EXPECT_THAT(callback.leaf_index(), 0); | 213 EXPECT_THAT(callback.leaf_index(), 0); |
449 } | 214 } |
450 | 215 |
451 TEST_P(LogDnsClientTest, | 216 TEST_P(LogDnsClientTest, |
452 QueryLeafIndexReportsMalformedResponseIfLeafIndexIsEmpty) { | 217 QueryLeafIndexReportsMalformedResponseIfLeafIndexIsEmpty) { |
453 ExpectLeafIndexRequestAndResponse( | 218 mock_dns_.ExpectLeafIndexRequestAndResponse( |
454 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", ""); | 219 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", ""); |
455 | 220 |
456 MockLeafIndexCallback callback; | 221 MockLeafIndexCallback callback; |
457 QueryLeafIndex("ct.test", kLeafHash, &callback); | 222 QueryLeafIndex("ct.test", kLeafHash, &callback); |
458 ASSERT_TRUE(callback.called()); | 223 ASSERT_TRUE(callback.called()); |
459 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 224 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
460 EXPECT_THAT(callback.leaf_index(), 0); | 225 EXPECT_THAT(callback.leaf_index(), 0); |
461 } | 226 } |
462 | 227 |
463 TEST_P(LogDnsClientTest, | 228 TEST_P(LogDnsClientTest, |
464 QueryLeafIndexReportsMalformedResponseIfLeafIndexHasNonNumericPrefix) { | 229 QueryLeafIndexReportsMalformedResponseIfLeafIndexHasNonNumericPrefix) { |
465 ExpectLeafIndexRequestAndResponse( | 230 mock_dns_.ExpectLeafIndexRequestAndResponse( |
466 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 231 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
467 "foo123456"); | 232 "foo123456"); |
468 | 233 |
469 MockLeafIndexCallback callback; | 234 MockLeafIndexCallback callback; |
470 QueryLeafIndex("ct.test", kLeafHash, &callback); | 235 QueryLeafIndex("ct.test", kLeafHash, &callback); |
471 ASSERT_TRUE(callback.called()); | 236 ASSERT_TRUE(callback.called()); |
472 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 237 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
473 EXPECT_THAT(callback.leaf_index(), 0); | 238 EXPECT_THAT(callback.leaf_index(), 0); |
474 } | 239 } |
475 | 240 |
476 TEST_P(LogDnsClientTest, | 241 TEST_P(LogDnsClientTest, |
477 QueryLeafIndexReportsMalformedResponseIfLeafIndexHasNonNumericSuffix) { | 242 QueryLeafIndexReportsMalformedResponseIfLeafIndexHasNonNumericSuffix) { |
478 ExpectLeafIndexRequestAndResponse( | 243 mock_dns_.ExpectLeafIndexRequestAndResponse( |
479 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 244 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
480 "123456foo"); | 245 "123456foo"); |
481 | 246 |
482 MockLeafIndexCallback callback; | 247 MockLeafIndexCallback callback; |
483 QueryLeafIndex("ct.test", kLeafHash, &callback); | 248 QueryLeafIndex("ct.test", kLeafHash, &callback); |
484 ASSERT_TRUE(callback.called()); | 249 ASSERT_TRUE(callback.called()); |
485 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 250 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
486 EXPECT_THAT(callback.leaf_index(), 0); | 251 EXPECT_THAT(callback.leaf_index(), 0); |
487 } | 252 } |
488 | 253 |
(...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
520 | 285 |
521 TEST_P(LogDnsClientTest, QueryLeafIndexReportsInvalidArgIfLeafHashIsNull) { | 286 TEST_P(LogDnsClientTest, QueryLeafIndexReportsInvalidArgIfLeafHashIsNull) { |
522 MockLeafIndexCallback callback; | 287 MockLeafIndexCallback callback; |
523 QueryLeafIndex("ct.test", nullptr, &callback); | 288 QueryLeafIndex("ct.test", nullptr, &callback); |
524 ASSERT_TRUE(callback.called()); | 289 ASSERT_TRUE(callback.called()); |
525 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); | 290 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); |
526 EXPECT_THAT(callback.leaf_index(), 0); | 291 EXPECT_THAT(callback.leaf_index(), 0); |
527 } | 292 } |
528 | 293 |
529 TEST_P(LogDnsClientTest, QueryLeafIndexReportsSocketError) { | 294 TEST_P(LogDnsClientTest, QueryLeafIndexReportsSocketError) { |
530 ExpectRequestAndSocketError( | 295 mock_dns_.ExpectRequestAndSocketError( |
531 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", | 296 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test.", |
532 net::ERR_CONNECTION_REFUSED); | 297 net::ERR_CONNECTION_REFUSED); |
533 | 298 |
534 MockLeafIndexCallback callback; | 299 MockLeafIndexCallback callback; |
535 QueryLeafIndex("ct.test", kLeafHash, &callback); | 300 QueryLeafIndex("ct.test", kLeafHash, &callback); |
536 ASSERT_TRUE(callback.called()); | 301 ASSERT_TRUE(callback.called()); |
537 EXPECT_THAT(callback.net_error(), IsError(net::ERR_CONNECTION_REFUSED)); | 302 EXPECT_THAT(callback.net_error(), IsError(net::ERR_CONNECTION_REFUSED)); |
538 EXPECT_THAT(callback.leaf_index(), 0); | 303 EXPECT_THAT(callback.leaf_index(), 0); |
539 } | 304 } |
540 | 305 |
541 TEST_P(LogDnsClientTest, QueryLeafIndexReportsTimeout) { | 306 TEST_P(LogDnsClientTest, QueryLeafIndexReportsTimeout) { |
542 ExpectRequestAndTimeout( | 307 mock_dns_.ExpectRequestAndTimeout( |
543 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test."); | 308 "D4S6DSV2J743QJZEQMH4UYHEYK7KRQ5JIQOCPMFUHZVJNFGHXACA.hash.ct.test."); |
544 | 309 |
545 MockLeafIndexCallback callback; | 310 MockLeafIndexCallback callback; |
546 QueryLeafIndex("ct.test", kLeafHash, &callback); | 311 QueryLeafIndex("ct.test", kLeafHash, &callback); |
547 ASSERT_TRUE(callback.called()); | 312 ASSERT_TRUE(callback.called()); |
548 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_TIMED_OUT)); | 313 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_TIMED_OUT)); |
549 EXPECT_THAT(callback.leaf_index(), 0); | 314 EXPECT_THAT(callback.leaf_index(), 0); |
550 } | 315 } |
551 | 316 |
552 TEST_P(LogDnsClientTest, QueryAuditProof) { | 317 TEST_P(LogDnsClientTest, QueryAuditProof) { |
553 const std::vector<std::string> audit_proof = GetSampleAuditProof(20); | 318 const std::vector<std::string> audit_proof = GetSampleAuditProof(20); |
554 | 319 |
555 // It should require 3 queries to collect the entire audit proof, as there is | 320 // It should require 3 queries to collect the entire audit proof, as there is |
556 // only space for 7 nodes per UDP packet. | 321 // only space for 7 nodes per UDP packet. |
557 ExpectAuditProofRequestAndResponse("0.123456.999999.tree.ct.test.", | 322 mock_dns_.ExpectAuditProofRequestAndResponse("0.123456.999999.tree.ct.test.", |
558 audit_proof.begin(), | 323 audit_proof.begin(), |
559 audit_proof.begin() + 7); | 324 audit_proof.begin() + 7); |
560 ExpectAuditProofRequestAndResponse("7.123456.999999.tree.ct.test.", | 325 mock_dns_.ExpectAuditProofRequestAndResponse("7.123456.999999.tree.ct.test.", |
561 audit_proof.begin() + 7, | 326 audit_proof.begin() + 7, |
562 audit_proof.begin() + 14); | 327 audit_proof.begin() + 14); |
563 ExpectAuditProofRequestAndResponse("14.123456.999999.tree.ct.test.", | 328 mock_dns_.ExpectAuditProofRequestAndResponse("14.123456.999999.tree.ct.test.", |
564 audit_proof.begin() + 14, | 329 audit_proof.begin() + 14, |
565 audit_proof.end()); | 330 audit_proof.end()); |
566 | 331 |
567 MockAuditProofCallback callback; | 332 MockAuditProofCallback callback; |
568 QueryAuditProof("ct.test", 123456, 999999, &callback); | 333 QueryAuditProof("ct.test", 123456, 999999, &callback); |
569 ASSERT_TRUE(callback.called()); | 334 ASSERT_TRUE(callback.called()); |
570 EXPECT_THAT(callback.net_error(), IsOk()); | 335 EXPECT_THAT(callback.net_error(), IsOk()); |
571 ASSERT_THAT(callback.proof(), NotNull()); | 336 ASSERT_THAT(callback.proof(), NotNull()); |
572 EXPECT_THAT(callback.proof()->leaf_index, 123456); | 337 EXPECT_THAT(callback.proof()->leaf_index, 123456); |
573 // EXPECT_THAT(callback.proof()->tree_size, 999999); | 338 // EXPECT_THAT(callback.proof()->tree_size, 999999); |
574 EXPECT_THAT(callback.proof()->nodes, audit_proof); | 339 EXPECT_THAT(callback.proof()->nodes, audit_proof); |
575 } | 340 } |
576 | 341 |
577 TEST_P(LogDnsClientTest, QueryAuditProofHandlesResponsesWithShortAuditPaths) { | 342 TEST_P(LogDnsClientTest, QueryAuditProofHandlesResponsesWithShortAuditPaths) { |
578 const std::vector<std::string> audit_proof = GetSampleAuditProof(20); | 343 const std::vector<std::string> audit_proof = GetSampleAuditProof(20); |
579 | 344 |
580 // Make some of the responses contain fewer proof nodes than they can hold. | 345 // Make some of the responses contain fewer proof nodes than they can hold. |
581 ExpectAuditProofRequestAndResponse("0.123456.999999.tree.ct.test.", | 346 mock_dns_.ExpectAuditProofRequestAndResponse("0.123456.999999.tree.ct.test.", |
582 audit_proof.begin(), | 347 audit_proof.begin(), |
583 audit_proof.begin() + 1); | 348 audit_proof.begin() + 1); |
584 ExpectAuditProofRequestAndResponse("1.123456.999999.tree.ct.test.", | 349 mock_dns_.ExpectAuditProofRequestAndResponse("1.123456.999999.tree.ct.test.", |
585 audit_proof.begin() + 1, | 350 audit_proof.begin() + 1, |
586 audit_proof.begin() + 3); | 351 audit_proof.begin() + 3); |
587 ExpectAuditProofRequestAndResponse("3.123456.999999.tree.ct.test.", | 352 mock_dns_.ExpectAuditProofRequestAndResponse("3.123456.999999.tree.ct.test.", |
588 audit_proof.begin() + 3, | 353 audit_proof.begin() + 3, |
589 audit_proof.begin() + 6); | 354 audit_proof.begin() + 6); |
590 ExpectAuditProofRequestAndResponse("6.123456.999999.tree.ct.test.", | 355 mock_dns_.ExpectAuditProofRequestAndResponse("6.123456.999999.tree.ct.test.", |
591 audit_proof.begin() + 6, | 356 audit_proof.begin() + 6, |
592 audit_proof.begin() + 10); | 357 audit_proof.begin() + 10); |
593 ExpectAuditProofRequestAndResponse("10.123456.999999.tree.ct.test.", | 358 mock_dns_.ExpectAuditProofRequestAndResponse("10.123456.999999.tree.ct.test.", |
594 audit_proof.begin() + 10, | 359 audit_proof.begin() + 10, |
595 audit_proof.begin() + 13); | 360 audit_proof.begin() + 13); |
596 ExpectAuditProofRequestAndResponse("13.123456.999999.tree.ct.test.", | 361 mock_dns_.ExpectAuditProofRequestAndResponse("13.123456.999999.tree.ct.test.", |
597 audit_proof.begin() + 13, | 362 audit_proof.begin() + 13, |
598 audit_proof.end()); | 363 audit_proof.end()); |
599 | 364 |
600 MockAuditProofCallback callback; | 365 MockAuditProofCallback callback; |
601 QueryAuditProof("ct.test", 123456, 999999, &callback); | 366 QueryAuditProof("ct.test", 123456, 999999, &callback); |
602 ASSERT_TRUE(callback.called()); | 367 ASSERT_TRUE(callback.called()); |
603 EXPECT_THAT(callback.net_error(), IsOk()); | 368 EXPECT_THAT(callback.net_error(), IsOk()); |
604 ASSERT_THAT(callback.proof(), NotNull()); | 369 ASSERT_THAT(callback.proof(), NotNull()); |
605 EXPECT_THAT(callback.proof()->leaf_index, 123456); | 370 EXPECT_THAT(callback.proof()->leaf_index, 123456); |
606 // EXPECT_THAT(callback.proof()->tree_size, 999999); | 371 // EXPECT_THAT(callback.proof()->tree_size, 999999); |
607 EXPECT_THAT(callback.proof()->nodes, audit_proof); | 372 EXPECT_THAT(callback.proof()->nodes, audit_proof); |
608 } | 373 } |
609 | 374 |
610 TEST_P(LogDnsClientTest, QueryAuditProofReportsThatLogDomainDoesNotExist) { | 375 TEST_P(LogDnsClientTest, QueryAuditProofReportsThatLogDomainDoesNotExist) { |
611 ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", | 376 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", |
612 net::dns_protocol::kRcodeNXDOMAIN); | 377 net::dns_protocol::kRcodeNXDOMAIN); |
613 | 378 |
614 MockAuditProofCallback callback; | 379 MockAuditProofCallback callback; |
615 QueryAuditProof("ct.test", 123456, 999999, &callback); | 380 QueryAuditProof("ct.test", 123456, 999999, &callback); |
616 ASSERT_TRUE(callback.called()); | 381 ASSERT_TRUE(callback.called()); |
617 EXPECT_THAT(callback.net_error(), IsError(net::ERR_NAME_NOT_RESOLVED)); | 382 EXPECT_THAT(callback.net_error(), IsError(net::ERR_NAME_NOT_RESOLVED)); |
618 EXPECT_THAT(callback.proof(), IsNull()); | 383 EXPECT_THAT(callback.proof(), IsNull()); |
619 } | 384 } |
620 | 385 |
621 TEST_P(LogDnsClientTest, QueryAuditProofReportsServerFailure) { | 386 TEST_P(LogDnsClientTest, QueryAuditProofReportsServerFailure) { |
622 ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", | 387 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", |
623 net::dns_protocol::kRcodeSERVFAIL); | 388 net::dns_protocol::kRcodeSERVFAIL); |
624 | 389 |
625 MockAuditProofCallback callback; | 390 MockAuditProofCallback callback; |
626 QueryAuditProof("ct.test", 123456, 999999, &callback); | 391 QueryAuditProof("ct.test", 123456, 999999, &callback); |
627 ASSERT_TRUE(callback.called()); | 392 ASSERT_TRUE(callback.called()); |
628 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); | 393 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); |
629 EXPECT_THAT(callback.proof(), IsNull()); | 394 EXPECT_THAT(callback.proof(), IsNull()); |
630 } | 395 } |
631 | 396 |
632 TEST_P(LogDnsClientTest, QueryAuditProofReportsServerRefusal) { | 397 TEST_P(LogDnsClientTest, QueryAuditProofReportsServerRefusal) { |
633 ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", | 398 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", |
634 net::dns_protocol::kRcodeREFUSED); | 399 net::dns_protocol::kRcodeREFUSED); |
635 | 400 |
636 MockAuditProofCallback callback; | 401 MockAuditProofCallback callback; |
637 QueryAuditProof("ct.test", 123456, 999999, &callback); | 402 QueryAuditProof("ct.test", 123456, 999999, &callback); |
638 ASSERT_TRUE(callback.called()); | 403 ASSERT_TRUE(callback.called()); |
639 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); | 404 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); |
640 EXPECT_THAT(callback.proof(), IsNull()); | 405 EXPECT_THAT(callback.proof(), IsNull()); |
641 } | 406 } |
642 | 407 |
643 TEST_P(LogDnsClientTest, | 408 TEST_P(LogDnsClientTest, |
644 QueryAuditProofReportsResponseMalformedIfNodeTooShort) { | 409 QueryAuditProofReportsResponseMalformedIfNodeTooShort) { |
645 // node is shorter than a SHA-256 hash (31 vs 32 bytes) | 410 // node is shorter than a SHA-256 hash (31 vs 32 bytes) |
646 const std::vector<std::string> audit_proof(1, std::string(31, 'a')); | 411 const std::vector<std::string> audit_proof(1, std::string(31, 'a')); |
647 | 412 |
648 ExpectAuditProofRequestAndResponse("0.123456.999999.tree.ct.test.", | 413 mock_dns_.ExpectAuditProofRequestAndResponse( |
649 audit_proof.begin(), audit_proof.end()); | 414 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); |
650 | 415 |
651 MockAuditProofCallback callback; | 416 MockAuditProofCallback callback; |
652 QueryAuditProof("ct.test", 123456, 999999, &callback); | 417 QueryAuditProof("ct.test", 123456, 999999, &callback); |
653 ASSERT_TRUE(callback.called()); | 418 ASSERT_TRUE(callback.called()); |
654 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 419 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
655 EXPECT_THAT(callback.proof(), IsNull()); | 420 EXPECT_THAT(callback.proof(), IsNull()); |
656 } | 421 } |
657 | 422 |
658 TEST_P(LogDnsClientTest, QueryAuditProofReportsResponseMalformedIfNodeTooLong) { | 423 TEST_P(LogDnsClientTest, QueryAuditProofReportsResponseMalformedIfNodeTooLong) { |
659 // node is longer than a SHA-256 hash (33 vs 32 bytes) | 424 // node is longer than a SHA-256 hash (33 vs 32 bytes) |
660 const std::vector<std::string> audit_proof(1, std::string(33, 'a')); | 425 const std::vector<std::string> audit_proof(1, std::string(33, 'a')); |
661 | 426 |
662 ExpectAuditProofRequestAndResponse("0.123456.999999.tree.ct.test.", | 427 mock_dns_.ExpectAuditProofRequestAndResponse( |
663 audit_proof.begin(), audit_proof.end()); | 428 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); |
664 | 429 |
665 MockAuditProofCallback callback; | 430 MockAuditProofCallback callback; |
666 QueryAuditProof("ct.test", 123456, 999999, &callback); | 431 QueryAuditProof("ct.test", 123456, 999999, &callback); |
667 ASSERT_TRUE(callback.called()); | 432 ASSERT_TRUE(callback.called()); |
668 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 433 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
669 EXPECT_THAT(callback.proof(), IsNull()); | 434 EXPECT_THAT(callback.proof(), IsNull()); |
670 } | 435 } |
671 | 436 |
672 TEST_P(LogDnsClientTest, QueryAuditProofReportsResponseMalformedIfEmpty) { | 437 TEST_P(LogDnsClientTest, QueryAuditProofReportsResponseMalformedIfEmpty) { |
673 const std::vector<std::string> audit_proof; | 438 const std::vector<std::string> audit_proof; |
674 | 439 |
675 ExpectAuditProofRequestAndResponse("0.123456.999999.tree.ct.test.", | 440 mock_dns_.ExpectAuditProofRequestAndResponse( |
676 audit_proof.begin(), audit_proof.end()); | 441 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); |
677 | 442 |
678 MockAuditProofCallback callback; | 443 MockAuditProofCallback callback; |
679 QueryAuditProof("ct.test", 123456, 999999, &callback); | 444 QueryAuditProof("ct.test", 123456, 999999, &callback); |
680 ASSERT_TRUE(callback.called()); | 445 ASSERT_TRUE(callback.called()); |
681 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 446 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
682 EXPECT_THAT(callback.proof(), IsNull()); | 447 EXPECT_THAT(callback.proof(), IsNull()); |
683 } | 448 } |
684 | 449 |
685 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLogDomainIsEmpty) { | 450 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLogDomainIsEmpty) { |
686 MockAuditProofCallback callback; | 451 MockAuditProofCallback callback; |
(...skipping 23 matching lines...) Expand all Loading... |
710 TEST_P(LogDnsClientTest, | 475 TEST_P(LogDnsClientTest, |
711 QueryAuditProofReportsInvalidArgIfLeafIndexGreaterThanTreeSize) { | 476 QueryAuditProofReportsInvalidArgIfLeafIndexGreaterThanTreeSize) { |
712 MockAuditProofCallback callback; | 477 MockAuditProofCallback callback; |
713 QueryAuditProof("ct.test", 999999, 123456, &callback); | 478 QueryAuditProof("ct.test", 999999, 123456, &callback); |
714 ASSERT_TRUE(callback.called()); | 479 ASSERT_TRUE(callback.called()); |
715 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); | 480 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); |
716 EXPECT_THAT(callback.proof(), IsNull()); | 481 EXPECT_THAT(callback.proof(), IsNull()); |
717 } | 482 } |
718 | 483 |
719 TEST_P(LogDnsClientTest, QueryAuditProofReportsSocketError) { | 484 TEST_P(LogDnsClientTest, QueryAuditProofReportsSocketError) { |
720 ExpectRequestAndSocketError("0.123456.999999.tree.ct.test.", | 485 mock_dns_.ExpectRequestAndSocketError("0.123456.999999.tree.ct.test.", |
721 net::ERR_CONNECTION_REFUSED); | 486 net::ERR_CONNECTION_REFUSED); |
722 | 487 |
723 MockAuditProofCallback callback; | 488 MockAuditProofCallback callback; |
724 QueryAuditProof("ct.test", 123456, 999999, &callback); | 489 QueryAuditProof("ct.test", 123456, 999999, &callback); |
725 ASSERT_TRUE(callback.called()); | 490 ASSERT_TRUE(callback.called()); |
726 EXPECT_THAT(callback.net_error(), IsError(net::ERR_CONNECTION_REFUSED)); | 491 EXPECT_THAT(callback.net_error(), IsError(net::ERR_CONNECTION_REFUSED)); |
727 EXPECT_THAT(callback.proof(), IsNull()); | 492 EXPECT_THAT(callback.proof(), IsNull()); |
728 } | 493 } |
729 | 494 |
730 TEST_P(LogDnsClientTest, QueryAuditProofReportsTimeout) { | 495 TEST_P(LogDnsClientTest, QueryAuditProofReportsTimeout) { |
731 ExpectRequestAndTimeout("0.123456.999999.tree.ct.test."); | 496 mock_dns_.ExpectRequestAndTimeout("0.123456.999999.tree.ct.test."); |
732 | 497 |
733 MockAuditProofCallback callback; | 498 MockAuditProofCallback callback; |
734 QueryAuditProof("ct.test", 123456, 999999, &callback); | 499 QueryAuditProof("ct.test", 123456, 999999, &callback); |
735 ASSERT_TRUE(callback.called()); | 500 ASSERT_TRUE(callback.called()); |
736 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_TIMED_OUT)); | 501 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_TIMED_OUT)); |
737 EXPECT_THAT(callback.proof(), IsNull()); | 502 EXPECT_THAT(callback.proof(), IsNull()); |
738 } | 503 } |
739 | 504 |
740 INSTANTIATE_TEST_CASE_P(ReadMode, | 505 INSTANTIATE_TEST_CASE_P(ReadMode, |
741 LogDnsClientTest, | 506 LogDnsClientTest, |
742 ::testing::Values(net::IoMode::ASYNC, | 507 ::testing::Values(net::IoMode::ASYNC, |
743 net::IoMode::SYNCHRONOUS)); | 508 net::IoMode::SYNCHRONOUS)); |
744 | 509 |
745 } // namespace | 510 } // namespace |
746 } // namespace certificate_transparency | 511 } // namespace certificate_transparency |
OLD | NEW |