| OLD | NEW |
| 1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "components/certificate_transparency/log_dns_client.h" | 5 #include "components/certificate_transparency/log_dns_client.h" |
| 6 | 6 |
| 7 #include <memory> | 7 #include <memory> |
| 8 #include <numeric> | 8 #include <numeric> |
| 9 #include <string> | 9 #include <string> |
| 10 #include <utility> | 10 #include <utility> |
| 11 #include <vector> | 11 #include <vector> |
| 12 | 12 |
| 13 #include "base/format_macros.h" | 13 #include "base/format_macros.h" |
| 14 #include "base/memory/ptr_util.h" | 14 #include "base/memory/ptr_util.h" |
| 15 #include "base/message_loop/message_loop.h" | 15 #include "base/message_loop/message_loop.h" |
| 16 #include "base/run_loop.h" | 16 #include "base/run_loop.h" |
| 17 #include "base/strings/string_number_conversions.h" | 17 #include "base/strings/string_number_conversions.h" |
| 18 #include "base/strings/stringprintf.h" | 18 #include "base/strings/stringprintf.h" |
| 19 #include "base/test/test_timeouts.h" |
| 19 #include "components/certificate_transparency/mock_log_dns_traffic.h" | 20 #include "components/certificate_transparency/mock_log_dns_traffic.h" |
| 20 #include "crypto/sha2.h" | 21 #include "crypto/sha2.h" |
| 21 #include "net/base/net_errors.h" | 22 #include "net/base/net_errors.h" |
| 22 #include "net/cert/merkle_audit_proof.h" | 23 #include "net/cert/merkle_audit_proof.h" |
| 23 #include "net/cert/signed_certificate_timestamp.h" | 24 #include "net/cert/signed_certificate_timestamp.h" |
| 24 #include "net/dns/dns_client.h" | 25 #include "net/dns/dns_client.h" |
| 25 #include "net/dns/dns_config_service.h" | 26 #include "net/dns/dns_config_service.h" |
| 26 #include "net/dns/dns_protocol.h" | 27 #include "net/dns/dns_protocol.h" |
| 28 #include "net/log/net_log.h" |
| 27 #include "net/test/gtest_util.h" | 29 #include "net/test/gtest_util.h" |
| 28 #include "testing/gmock/include/gmock/gmock.h" | 30 #include "testing/gmock/include/gmock/gmock.h" |
| 29 #include "testing/gtest/include/gtest/gtest.h" | 31 #include "testing/gtest/include/gtest/gtest.h" |
| 30 | 32 |
| 31 namespace certificate_transparency { | 33 namespace certificate_transparency { |
| 32 namespace { | 34 namespace { |
| 33 | 35 |
| 34 using ::testing::AllOf; | 36 using ::testing::AllOf; |
| 35 using ::testing::Eq; | 37 using ::testing::Eq; |
| 36 using ::testing::IsEmpty; | 38 using ::testing::IsEmpty; |
| (...skipping 26 matching lines...) Expand all Loading... |
| 63 const uint64_t kLeafIndices[] = {0, 1, 2}; | 65 const uint64_t kLeafIndices[] = {0, 1, 2}; |
| 64 const uint64_t kTreeSizes[] = {100, 10000, 1000000}; | 66 const uint64_t kTreeSizes[] = {100, 10000, 1000000}; |
| 65 | 67 |
| 66 // Only 7 audit proof nodes can fit into a DNS response, because they are sent | 68 // Only 7 audit proof nodes can fit into a DNS response, because they are sent |
| 67 // in a TXT RDATA string, which has a maximum size of 255 bytes, and each node | 69 // in a TXT RDATA string, which has a maximum size of 255 bytes, and each node |
| 68 // is a SHA-256 hash (32 bytes), i.e. (255 / 32) == 7. | 70 // is a SHA-256 hash (32 bytes), i.e. (255 / 32) == 7. |
| 69 // This means audit proofs consisting of more than 7 nodes require multiple DNS | 71 // This means audit proofs consisting of more than 7 nodes require multiple DNS |
| 70 // requests to retrieve. | 72 // requests to retrieve. |
| 71 const size_t kMaxProofNodesPerDnsResponse = 7; | 73 const size_t kMaxProofNodesPerDnsResponse = 7; |
| 72 | 74 |
| 75 // Returns an example Merkle audit proof containing |length| nodes. |
| 76 // The proof cannot be used for cryptographic purposes; it is merely a |
| 77 // placeholder. |
| 73 std::vector<std::string> GetSampleAuditProof(size_t length) { | 78 std::vector<std::string> GetSampleAuditProof(size_t length) { |
| 74 std::vector<std::string> audit_proof(length); | 79 std::vector<std::string> audit_proof(length); |
| 75 // Makes each node of the audit proof different, so that tests are able to | 80 // Makes each node of the audit proof different, so that tests are able to |
| 76 // confirm that the audit proof is reconstructed in the correct order. | 81 // confirm that the audit proof is reconstructed in the correct order. |
| 77 for (size_t i = 0; i < length; ++i) { | 82 for (size_t i = 0; i < length; ++i) { |
| 78 std::string node(crypto::kSHA256Length, '\0'); | 83 std::string node(crypto::kSHA256Length, '\0'); |
| 79 // Each node is 32 bytes, with each byte having a different value. | 84 // Each node is 32 bytes, with each byte having a different value. |
| 80 for (size_t j = 0; j < crypto::kSHA256Length; ++j) { | 85 for (size_t j = 0; j < crypto::kSHA256Length; ++j) { |
| 81 node[j] = static_cast<char>((-127 + i + j) % 128); | 86 node[j] = static_cast<char>((-127 + i + j) % 128); |
| 82 } | 87 } |
| 83 audit_proof[i].assign(std::move(node)); | 88 audit_proof[i].assign(std::move(node)); |
| 84 } | 89 } |
| 85 | 90 |
| 86 return audit_proof; | 91 return audit_proof; |
| 87 } | 92 } |
| 88 | 93 |
| 94 // MockAuditProofCallback can be used as an AuditProofCallback. |
| 95 // It will record the arguments it is invoked with and provides a helpful |
| 96 // method for pumping the message loop until it is invoked. |
| 89 class MockAuditProofCallback { | 97 class MockAuditProofCallback { |
| 90 public: | 98 public: |
| 91 MockAuditProofCallback() : called_(false) {} | 99 MockAuditProofCallback() : called_(false) {} |
| 92 | 100 |
| 93 bool called() const { return called_; } | 101 bool called() const { return called_; } |
| 94 int net_error() const { return net_error_; } | 102 net::Error result() const { return result_; } |
| 95 const net::ct::MerkleAuditProof* proof() const { return proof_.get(); } | 103 const net::ct::MerkleAuditProof* proof() const { return proof_.get(); } |
| 96 | 104 |
| 97 void Run(int net_error, std::unique_ptr<net::ct::MerkleAuditProof> proof) { | 105 // Get this callback as an AuditProofCallback. |
| 98 EXPECT_FALSE(called_); | |
| 99 called_ = true; | |
| 100 net_error_ = net_error; | |
| 101 proof_ = std::move(proof); | |
| 102 run_loop_.Quit(); | |
| 103 } | |
| 104 | |
| 105 LogDnsClient::AuditProofCallback AsCallback() { | 106 LogDnsClient::AuditProofCallback AsCallback() { |
| 106 return base::Bind(&MockAuditProofCallback::Run, base::Unretained(this)); | 107 return base::Bind(&MockAuditProofCallback::Run, base::Unretained(this)); |
| 107 } | 108 } |
| 108 | 109 |
| 109 void WaitUntilRun() { run_loop_.Run(); } | 110 // Wait until either the callback is invoked or the message loop goes idle |
| 111 // (after a specified |timeout|). Returns immediately if the callback has |
| 112 // already been invoked. |
| 113 void WaitUntilRun(base::TimeDelta timeout) { |
| 114 if (called_) { |
| 115 return; |
| 116 } |
| 117 |
| 118 // Pump the message loop until the the callback is invoked, which quits the |
| 119 // RunLoop, or a timeout expires and the message loop goes idle. |
| 120 run_loop_.reset(new base::RunLoop()); |
| 121 base::Closure quit_closure = run_loop_->QuitWhenIdleClosure(); |
| 122 base::ThreadTaskRunnerHandle::Get()->PostDelayedTask(FROM_HERE, |
| 123 quit_closure, timeout); |
| 124 run_loop_->Run(); |
| 125 run_loop_.reset(); |
| 126 } |
| 110 | 127 |
| 111 private: | 128 private: |
| 129 void Run(net::Error result, |
| 130 std::unique_ptr<net::ct::MerkleAuditProof> proof) { |
| 131 EXPECT_FALSE(called_); |
| 132 called_ = true; |
| 133 result_ = result; |
| 134 proof_ = std::move(proof); |
| 135 if (run_loop_) { |
| 136 run_loop_->Quit(); |
| 137 } |
| 138 } |
| 139 |
| 140 // True if the callback has been invoked. |
| 112 bool called_; | 141 bool called_; |
| 113 int net_error_; | 142 // The arguments that the callback was invoked with. |
| 143 net::Error result_; |
| 114 std::unique_ptr<net::ct::MerkleAuditProof> proof_; | 144 std::unique_ptr<net::ct::MerkleAuditProof> proof_; |
| 115 base::RunLoop run_loop_; | 145 // The RunLoop currently being used to pump the message loop, as a means to |
| 146 // execute this callback. |
| 147 std::unique_ptr<base::RunLoop> run_loop_; |
| 116 }; | 148 }; |
| 117 | 149 |
| 118 class LogDnsClientTest : public ::testing::TestWithParam<net::IoMode> { | 150 class LogDnsClientTest : public ::testing::TestWithParam<net::IoMode> { |
| 119 protected: | 151 protected: |
| 120 LogDnsClientTest() | 152 LogDnsClientTest() |
| 121 : network_change_notifier_(net::NetworkChangeNotifier::CreateMock()) { | 153 : network_change_notifier_(net::NetworkChangeNotifier::CreateMock()) { |
| 122 mock_dns_.SetSocketReadMode(GetParam()); | 154 mock_dns_.SetSocketReadMode(GetParam()); |
| 123 mock_dns_.InitializeDnsConfig(); | 155 mock_dns_.InitializeDnsConfig(); |
| 124 } | 156 } |
| 125 | 157 |
| 126 std::unique_ptr<LogDnsClient> CreateLogDnsClient( | 158 std::unique_ptr<LogDnsClient> CreateLogDnsClient( |
| 127 size_t max_concurrent_queries) { | 159 size_t max_concurrent_queries) { |
| 128 return base::MakeUnique<LogDnsClient>(mock_dns_.CreateDnsClient(), | 160 return base::MakeUnique<LogDnsClient>(mock_dns_.CreateDnsClient(), |
| 129 net::NetLogWithSource(), | 161 net::NetLogWithSource(), |
| 130 max_concurrent_queries); | 162 max_concurrent_queries); |
| 131 } | 163 } |
| 132 | 164 |
| 133 void QueryAuditProofAsync(LogDnsClient* log_client, | 165 // Convenience function for calling QueryAuditProof synchronously. |
| 134 const std::string& log_domain, | 166 net::Error QueryAuditProof(const std::string& log_domain, |
| 135 const char leaf_hash[crypto::kSHA256Length], | 167 const char leaf_hash[crypto::kSHA256Length], |
| 136 uint64_t tree_size, | 168 uint64_t tree_size, |
| 137 const LogDnsClient::AuditProofCallback& callback) { | 169 MockAuditProofCallback* callback) { |
| 138 log_client->QueryAuditProof(log_domain, leaf_hash, tree_size, callback); | 170 std::unique_ptr<LogDnsClient> log_client = CreateLogDnsClient(0); |
| 139 } | 171 net::Error result = log_client->QueryAuditProof( |
| 172 log_domain, leaf_hash, tree_size, callback->AsCallback()); |
| 140 | 173 |
| 141 // Convenience function for calling QueryAuditProofAsync synchronously. | 174 if (result == net::ERR_IO_PENDING) { |
| 142 void QueryAuditProof(const std::string& log_domain, | 175 callback->WaitUntilRun(TestTimeouts::action_max_timeout()); |
| 143 const char leaf_hash[crypto::kSHA256Length], | 176 } else { |
| 144 uint64_t tree_size, | 177 // The callback isn't expected to be invoked, but pump the message loop |
| 145 MockAuditProofCallback* callback) { | 178 // anyway to confirm that it indeed isn't run. Give up as soon as the |
| 146 std::unique_ptr<LogDnsClient> log_client = CreateLogDnsClient(0); | 179 // message loop is empty (zero timeout). |
| 147 QueryAuditProofAsync(log_client.get(), log_domain, leaf_hash, tree_size, | 180 callback->WaitUntilRun(base::TimeDelta()); |
| 148 callback->AsCallback()); | 181 } |
| 149 callback->WaitUntilRun(); | 182 |
| 183 return result; |
| 150 } | 184 } |
| 151 | 185 |
| 152 // This will be the NetworkChangeNotifier singleton for the duration of the | 186 // This will be the NetworkChangeNotifier singleton for the duration of the |
| 153 // test. It is accessed statically by LogDnsClient. | 187 // test. It is accessed statically by LogDnsClient. |
| 154 std::unique_ptr<net::NetworkChangeNotifier> network_change_notifier_; | 188 std::unique_ptr<net::NetworkChangeNotifier> network_change_notifier_; |
| 155 // Queues and handles asynchronous DNS tasks. Indirectly used by LogDnsClient, | 189 // Queues and handles asynchronous DNS tasks. Indirectly used by LogDnsClient, |
| 156 // the underlying net::DnsClient, and NetworkChangeNotifier. | 190 // the underlying net::DnsClient, and NetworkChangeNotifier. |
| 157 base::MessageLoopForIO message_loop_; | 191 base::MessageLoopForIO message_loop_; |
| 158 // Allows mock DNS sockets to be setup. | 192 // Allows mock DNS sockets to be setup. |
| 159 MockLogDnsTraffic mock_dns_; | 193 MockLogDnsTraffic mock_dns_; |
| 160 }; | 194 }; |
| 161 | 195 |
| 162 TEST_P(LogDnsClientTest, QueryAuditProofReportsThatLogDomainDoesNotExist) { | 196 TEST_P(LogDnsClientTest, QueryAuditProofReportsThatLogDomainDoesNotExist) { |
| 163 mock_dns_.ExpectRequestAndErrorResponse(kLeafIndexQnames[0], | 197 mock_dns_.ExpectRequestAndErrorResponse(kLeafIndexQnames[0], |
| 164 net::dns_protocol::kRcodeNXDOMAIN); | 198 net::dns_protocol::kRcodeNXDOMAIN); |
| 165 | 199 |
| 166 MockAuditProofCallback callback; | 200 MockAuditProofCallback callback; |
| 167 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 201 ASSERT_THAT( |
| 202 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), |
| 203 IsError(net::ERR_IO_PENDING)); |
| 168 ASSERT_TRUE(callback.called()); | 204 ASSERT_TRUE(callback.called()); |
| 169 EXPECT_THAT(callback.net_error(), IsError(net::ERR_NAME_NOT_RESOLVED)); | 205 EXPECT_THAT(callback.result(), IsError(net::ERR_NAME_NOT_RESOLVED)); |
| 170 EXPECT_THAT(callback.proof(), IsNull()); | 206 EXPECT_THAT(callback.proof(), IsNull()); |
| 171 } | 207 } |
| 172 | 208 |
| 173 TEST_P(LogDnsClientTest, | 209 TEST_P(LogDnsClientTest, |
| 174 QueryAuditProofReportsServerFailuresDuringLeafIndexRequests) { | 210 QueryAuditProofReportsServerFailuresDuringLeafIndexRequests) { |
| 175 mock_dns_.ExpectRequestAndErrorResponse(kLeafIndexQnames[0], | 211 mock_dns_.ExpectRequestAndErrorResponse(kLeafIndexQnames[0], |
| 176 net::dns_protocol::kRcodeSERVFAIL); | 212 net::dns_protocol::kRcodeSERVFAIL); |
| 177 | 213 |
| 178 MockAuditProofCallback callback; | 214 MockAuditProofCallback callback; |
| 179 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 215 ASSERT_THAT( |
| 216 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), |
| 217 IsError(net::ERR_IO_PENDING)); |
| 180 ASSERT_TRUE(callback.called()); | 218 ASSERT_TRUE(callback.called()); |
| 181 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); | 219 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_SERVER_FAILED)); |
| 182 EXPECT_THAT(callback.proof(), IsNull()); | 220 EXPECT_THAT(callback.proof(), IsNull()); |
| 183 } | 221 } |
| 184 | 222 |
| 185 TEST_P(LogDnsClientTest, | 223 TEST_P(LogDnsClientTest, |
| 186 QueryAuditProofReportsServerRefusalsDuringLeafIndexRequests) { | 224 QueryAuditProofReportsServerRefusalsDuringLeafIndexRequests) { |
| 187 mock_dns_.ExpectRequestAndErrorResponse(kLeafIndexQnames[0], | 225 mock_dns_.ExpectRequestAndErrorResponse(kLeafIndexQnames[0], |
| 188 net::dns_protocol::kRcodeREFUSED); | 226 net::dns_protocol::kRcodeREFUSED); |
| 189 | 227 |
| 190 MockAuditProofCallback callback; | 228 MockAuditProofCallback callback; |
| 191 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 229 ASSERT_THAT( |
| 230 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), |
| 231 IsError(net::ERR_IO_PENDING)); |
| 192 ASSERT_TRUE(callback.called()); | 232 ASSERT_TRUE(callback.called()); |
| 193 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); | 233 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_SERVER_FAILED)); |
| 194 EXPECT_THAT(callback.proof(), IsNull()); | 234 EXPECT_THAT(callback.proof(), IsNull()); |
| 195 } | 235 } |
| 196 | 236 |
| 197 TEST_P(LogDnsClientTest, | 237 TEST_P(LogDnsClientTest, |
| 198 QueryAuditProofReportsMalformedResponseIfLeafIndexResponseContainsNoStrin
gs) { | 238 QueryAuditProofReportsMalformedResponseIfLeafIndexResponseContainsNoStrin
gs) { |
| 199 mock_dns_.ExpectRequestAndResponse(kLeafIndexQnames[0], | 239 mock_dns_.ExpectRequestAndResponse(kLeafIndexQnames[0], |
| 200 std::vector<base::StringPiece>()); | 240 std::vector<base::StringPiece>()); |
| 201 | 241 |
| 202 MockAuditProofCallback callback; | 242 MockAuditProofCallback callback; |
| 203 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 243 ASSERT_THAT( |
| 244 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), |
| 245 IsError(net::ERR_IO_PENDING)); |
| 204 ASSERT_TRUE(callback.called()); | 246 ASSERT_TRUE(callback.called()); |
| 205 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 247 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 206 EXPECT_THAT(callback.proof(), IsNull()); | 248 EXPECT_THAT(callback.proof(), IsNull()); |
| 207 } | 249 } |
| 208 | 250 |
| 209 TEST_P(LogDnsClientTest, | 251 TEST_P(LogDnsClientTest, |
| 210 QueryAuditProofReportsMalformedResponseIfLeafIndexResponseContainsMoreTha
nOneString) { | 252 QueryAuditProofReportsMalformedResponseIfLeafIndexResponseContainsMoreTha
nOneString) { |
| 211 mock_dns_.ExpectRequestAndResponse(kLeafIndexQnames[0], {"123456", "7"}); | 253 mock_dns_.ExpectRequestAndResponse(kLeafIndexQnames[0], {"123456", "7"}); |
| 212 | 254 |
| 213 MockAuditProofCallback callback; | 255 MockAuditProofCallback callback; |
| 214 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 256 ASSERT_THAT( |
| 257 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), |
| 258 IsError(net::ERR_IO_PENDING)); |
| 215 ASSERT_TRUE(callback.called()); | 259 ASSERT_TRUE(callback.called()); |
| 216 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 260 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 217 EXPECT_THAT(callback.proof(), IsNull()); | 261 EXPECT_THAT(callback.proof(), IsNull()); |
| 218 } | 262 } |
| 219 | 263 |
| 220 TEST_P(LogDnsClientTest, | 264 TEST_P(LogDnsClientTest, |
| 221 QueryAuditProofReportsMalformedResponseIfLeafIndexIsNotNumeric) { | 265 QueryAuditProofReportsMalformedResponseIfLeafIndexIsNotNumeric) { |
| 222 mock_dns_.ExpectRequestAndResponse(kLeafIndexQnames[0], {"foo"}); | 266 mock_dns_.ExpectRequestAndResponse(kLeafIndexQnames[0], {"foo"}); |
| 223 | 267 |
| 224 MockAuditProofCallback callback; | 268 MockAuditProofCallback callback; |
| 225 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 269 ASSERT_THAT( |
| 270 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), |
| 271 IsError(net::ERR_IO_PENDING)); |
| 226 ASSERT_TRUE(callback.called()); | 272 ASSERT_TRUE(callback.called()); |
| 227 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 273 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 228 EXPECT_THAT(callback.proof(), IsNull()); | 274 EXPECT_THAT(callback.proof(), IsNull()); |
| 229 } | 275 } |
| 230 | 276 |
| 231 TEST_P(LogDnsClientTest, | 277 TEST_P(LogDnsClientTest, |
| 232 QueryAuditProofReportsMalformedResponseIfLeafIndexIsFloatingPoint) { | 278 QueryAuditProofReportsMalformedResponseIfLeafIndexIsFloatingPoint) { |
| 233 mock_dns_.ExpectRequestAndResponse(kLeafIndexQnames[0], {"123456.0"}); | 279 mock_dns_.ExpectRequestAndResponse(kLeafIndexQnames[0], {"123456.0"}); |
| 234 | 280 |
| 235 MockAuditProofCallback callback; | 281 MockAuditProofCallback callback; |
| 236 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 282 ASSERT_THAT( |
| 283 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), |
| 284 IsError(net::ERR_IO_PENDING)); |
| 237 ASSERT_TRUE(callback.called()); | 285 ASSERT_TRUE(callback.called()); |
| 238 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 286 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 239 EXPECT_THAT(callback.proof(), IsNull()); | 287 EXPECT_THAT(callback.proof(), IsNull()); |
| 240 } | 288 } |
| 241 | 289 |
| 242 TEST_P(LogDnsClientTest, | 290 TEST_P(LogDnsClientTest, |
| 243 QueryAuditProofReportsMalformedResponseIfLeafIndexIsEmpty) { | 291 QueryAuditProofReportsMalformedResponseIfLeafIndexIsEmpty) { |
| 244 mock_dns_.ExpectRequestAndResponse(kLeafIndexQnames[0], {""}); | 292 mock_dns_.ExpectRequestAndResponse(kLeafIndexQnames[0], {""}); |
| 245 | 293 |
| 246 MockAuditProofCallback callback; | 294 MockAuditProofCallback callback; |
| 247 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 295 ASSERT_THAT( |
| 296 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), |
| 297 IsError(net::ERR_IO_PENDING)); |
| 248 ASSERT_TRUE(callback.called()); | 298 ASSERT_TRUE(callback.called()); |
| 249 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 299 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 250 EXPECT_THAT(callback.proof(), IsNull()); | 300 EXPECT_THAT(callback.proof(), IsNull()); |
| 251 } | 301 } |
| 252 | 302 |
| 253 TEST_P(LogDnsClientTest, | 303 TEST_P(LogDnsClientTest, |
| 254 QueryAuditProofReportsMalformedResponseIfLeafIndexHasNonNumericPrefix) { | 304 QueryAuditProofReportsMalformedResponseIfLeafIndexHasNonNumericPrefix) { |
| 255 mock_dns_.ExpectRequestAndResponse(kLeafIndexQnames[0], {"foo123456"}); | 305 mock_dns_.ExpectRequestAndResponse(kLeafIndexQnames[0], {"foo123456"}); |
| 256 | 306 |
| 257 MockAuditProofCallback callback; | 307 MockAuditProofCallback callback; |
| 258 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 308 ASSERT_THAT( |
| 309 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), |
| 310 IsError(net::ERR_IO_PENDING)); |
| 259 ASSERT_TRUE(callback.called()); | 311 ASSERT_TRUE(callback.called()); |
| 260 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 312 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 261 EXPECT_THAT(callback.proof(), IsNull()); | 313 EXPECT_THAT(callback.proof(), IsNull()); |
| 262 } | 314 } |
| 263 | 315 |
| 264 TEST_P(LogDnsClientTest, | 316 TEST_P(LogDnsClientTest, |
| 265 QueryAuditProofReportsMalformedResponseIfLeafIndexHasNonNumericSuffix) { | 317 QueryAuditProofReportsMalformedResponseIfLeafIndexHasNonNumericSuffix) { |
| 266 mock_dns_.ExpectRequestAndResponse(kLeafIndexQnames[0], {"123456foo"}); | 318 mock_dns_.ExpectRequestAndResponse(kLeafIndexQnames[0], {"123456foo"}); |
| 267 | 319 |
| 268 MockAuditProofCallback callback; | 320 MockAuditProofCallback callback; |
| 269 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 321 ASSERT_THAT( |
| 322 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), |
| 323 IsError(net::ERR_IO_PENDING)); |
| 270 ASSERT_TRUE(callback.called()); | 324 ASSERT_TRUE(callback.called()); |
| 271 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 325 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 272 EXPECT_THAT(callback.proof(), IsNull()); | 326 EXPECT_THAT(callback.proof(), IsNull()); |
| 273 } | 327 } |
| 274 | 328 |
| 275 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLogDomainIsEmpty) { | 329 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLogDomainIsEmpty) { |
| 276 MockAuditProofCallback callback; | 330 MockAuditProofCallback callback; |
| 277 QueryAuditProof("", kLeafHashes[0], kTreeSizes[0], &callback); | 331 ASSERT_THAT(QueryAuditProof("", kLeafHashes[0], kTreeSizes[0], &callback), |
| 278 ASSERT_TRUE(callback.called()); | 332 IsError(net::ERR_INVALID_ARGUMENT)); |
| 279 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); | 333 ASSERT_FALSE(callback.called()); |
| 280 EXPECT_THAT(callback.proof(), IsNull()); | |
| 281 } | 334 } |
| 282 | 335 |
| 283 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLeafHashIsInvalid) { | 336 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLeafHashIsInvalid) { |
| 284 MockAuditProofCallback callback; | 337 MockAuditProofCallback callback; |
| 285 QueryAuditProof("ct.test", "foo", kTreeSizes[0], &callback); | 338 ASSERT_THAT(QueryAuditProof("ct.test", "foo", kTreeSizes[0], &callback), |
| 286 ASSERT_TRUE(callback.called()); | 339 IsError(net::ERR_INVALID_ARGUMENT)); |
| 287 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); | 340 ASSERT_FALSE(callback.called()); |
| 288 EXPECT_THAT(callback.proof(), IsNull()); | |
| 289 } | 341 } |
| 290 | 342 |
| 291 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLeafHashIsEmpty) { | 343 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLeafHashIsEmpty) { |
| 292 MockAuditProofCallback callback; | 344 MockAuditProofCallback callback; |
| 293 QueryAuditProof("ct.test", "", kTreeSizes[0], &callback); | 345 ASSERT_THAT(QueryAuditProof("ct.test", "", kTreeSizes[0], &callback), |
| 294 ASSERT_TRUE(callback.called()); | 346 IsError(net::ERR_INVALID_ARGUMENT)); |
| 295 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); | 347 ASSERT_FALSE(callback.called()); |
| 296 EXPECT_THAT(callback.proof(), IsNull()); | |
| 297 } | 348 } |
| 298 | 349 |
| 299 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLeafHashIsNull) { | 350 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLeafHashIsNull) { |
| 300 MockAuditProofCallback callback; | 351 MockAuditProofCallback callback; |
| 301 QueryAuditProof("ct.test", nullptr, kTreeSizes[0], &callback); | 352 ASSERT_THAT(QueryAuditProof("ct.test", nullptr, kTreeSizes[0], &callback), |
| 302 ASSERT_TRUE(callback.called()); | 353 IsError(net::ERR_INVALID_ARGUMENT)); |
| 303 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); | 354 ASSERT_FALSE(callback.called()); |
| 304 EXPECT_THAT(callback.proof(), IsNull()); | |
| 305 } | 355 } |
| 306 | 356 |
| 307 TEST_P(LogDnsClientTest, | 357 TEST_P(LogDnsClientTest, |
| 308 QueryAuditProofReportsSocketErrorsDuringLeafIndexRequests) { | 358 QueryAuditProofReportsSocketErrorsDuringLeafIndexRequests) { |
| 309 mock_dns_.ExpectRequestAndSocketError(kLeafIndexQnames[0], | 359 mock_dns_.ExpectRequestAndSocketError(kLeafIndexQnames[0], |
| 310 net::ERR_CONNECTION_REFUSED); | 360 net::ERR_CONNECTION_REFUSED); |
| 311 | 361 |
| 312 MockAuditProofCallback callback; | 362 MockAuditProofCallback callback; |
| 313 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 363 ASSERT_THAT( |
| 364 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), |
| 365 IsError(net::ERR_IO_PENDING)); |
| 314 ASSERT_TRUE(callback.called()); | 366 ASSERT_TRUE(callback.called()); |
| 315 EXPECT_THAT(callback.net_error(), IsError(net::ERR_CONNECTION_REFUSED)); | 367 EXPECT_THAT(callback.result(), IsError(net::ERR_CONNECTION_REFUSED)); |
| 316 EXPECT_THAT(callback.proof(), IsNull()); | 368 EXPECT_THAT(callback.proof(), IsNull()); |
| 317 } | 369 } |
| 318 | 370 |
| 319 TEST_P(LogDnsClientTest, | 371 TEST_P(LogDnsClientTest, |
| 320 QueryAuditProofReportsTimeoutsDuringLeafIndexRequests) { | 372 QueryAuditProofReportsTimeoutsDuringLeafIndexRequests) { |
| 321 mock_dns_.ExpectRequestAndTimeout(kLeafIndexQnames[0]); | 373 mock_dns_.ExpectRequestAndTimeout(kLeafIndexQnames[0]); |
| 322 | 374 |
| 323 MockAuditProofCallback callback; | 375 MockAuditProofCallback callback; |
| 324 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 376 ASSERT_THAT( |
| 377 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), |
| 378 IsError(net::ERR_IO_PENDING)); |
| 379 |
| 380 callback.WaitUntilRun(TestTimeouts::action_max_timeout()); |
| 325 ASSERT_TRUE(callback.called()); | 381 ASSERT_TRUE(callback.called()); |
| 326 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_TIMED_OUT)); | 382 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_TIMED_OUT)); |
| 327 EXPECT_THAT(callback.proof(), IsNull()); | 383 EXPECT_THAT(callback.proof(), IsNull()); |
| 328 } | 384 } |
| 329 | 385 |
| 330 TEST_P(LogDnsClientTest, QueryAuditProof) { | 386 TEST_P(LogDnsClientTest, QueryAuditProof) { |
| 331 const std::vector<std::string> audit_proof = GetSampleAuditProof(20); | 387 const std::vector<std::string> audit_proof = GetSampleAuditProof(20); |
| 332 | 388 |
| 333 // Expect a leaf index query first, to map the leaf hash to a leaf index. | 389 // Expect a leaf index query first, to map the leaf hash to a leaf index. |
| 334 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); | 390 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); |
| 335 | 391 |
| 336 // It takes a number of DNS requests to retrieve the entire |audit_proof| | 392 // It takes a number of DNS requests to retrieve the entire |audit_proof| |
| 337 // (see |kMaxProofNodesPerDnsResponse|). | 393 // (see |kMaxProofNodesPerDnsResponse|). |
| 338 for (size_t nodes_begin = 0; nodes_begin < audit_proof.size(); | 394 for (size_t nodes_begin = 0; nodes_begin < audit_proof.size(); |
| 339 nodes_begin += kMaxProofNodesPerDnsResponse) { | 395 nodes_begin += kMaxProofNodesPerDnsResponse) { |
| 340 const size_t nodes_end = std::min( | 396 const size_t nodes_end = std::min( |
| 341 nodes_begin + kMaxProofNodesPerDnsResponse, audit_proof.size()); | 397 nodes_begin + kMaxProofNodesPerDnsResponse, audit_proof.size()); |
| 342 | 398 |
| 343 mock_dns_.ExpectAuditProofRequestAndResponse( | 399 mock_dns_.ExpectAuditProofRequestAndResponse( |
| 344 base::StringPrintf("%zu.123456.999999.tree.ct.test.", nodes_begin), | 400 base::StringPrintf("%zu.123456.999999.tree.ct.test.", nodes_begin), |
| 345 audit_proof.begin() + nodes_begin, audit_proof.begin() + nodes_end); | 401 audit_proof.begin() + nodes_begin, audit_proof.begin() + nodes_end); |
| 346 } | 402 } |
| 347 | 403 |
| 348 MockAuditProofCallback callback; | 404 MockAuditProofCallback callback; |
| 349 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 405 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 406 IsError(net::ERR_IO_PENDING)); |
| 350 ASSERT_TRUE(callback.called()); | 407 ASSERT_TRUE(callback.called()); |
| 351 EXPECT_THAT(callback.net_error(), IsOk()); | 408 EXPECT_THAT(callback.result(), IsOk()); |
| 352 ASSERT_THAT(callback.proof(), NotNull()); | 409 ASSERT_THAT(callback.proof(), NotNull()); |
| 353 EXPECT_THAT(callback.proof()->leaf_index, Eq(123456u)); | 410 EXPECT_THAT(callback.proof()->leaf_index, Eq(123456u)); |
| 354 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. | 411 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. |
| 355 // EXPECT_THAT(callback.proof()->tree_size, Eq(999999)); | 412 // EXPECT_THAT(callback.proof()->tree_size, Eq(999999)); |
| 356 EXPECT_THAT(callback.proof()->nodes, Eq(audit_proof)); | 413 EXPECT_THAT(callback.proof()->nodes, Eq(audit_proof)); |
| 357 } | 414 } |
| 358 | 415 |
| 359 TEST_P(LogDnsClientTest, QueryAuditProofHandlesResponsesWithShortAuditPaths) { | 416 TEST_P(LogDnsClientTest, QueryAuditProofHandlesResponsesWithShortAuditPaths) { |
| 360 const std::vector<std::string> audit_proof = GetSampleAuditProof(20); | 417 const std::vector<std::string> audit_proof = GetSampleAuditProof(20); |
| 361 | 418 |
| (...skipping 14 matching lines...) Expand all Loading... |
| 376 audit_proof.begin() + 6, | 433 audit_proof.begin() + 6, |
| 377 audit_proof.begin() + 10); | 434 audit_proof.begin() + 10); |
| 378 mock_dns_.ExpectAuditProofRequestAndResponse("10.123456.999999.tree.ct.test.", | 435 mock_dns_.ExpectAuditProofRequestAndResponse("10.123456.999999.tree.ct.test.", |
| 379 audit_proof.begin() + 10, | 436 audit_proof.begin() + 10, |
| 380 audit_proof.begin() + 13); | 437 audit_proof.begin() + 13); |
| 381 mock_dns_.ExpectAuditProofRequestAndResponse("13.123456.999999.tree.ct.test.", | 438 mock_dns_.ExpectAuditProofRequestAndResponse("13.123456.999999.tree.ct.test.", |
| 382 audit_proof.begin() + 13, | 439 audit_proof.begin() + 13, |
| 383 audit_proof.end()); | 440 audit_proof.end()); |
| 384 | 441 |
| 385 MockAuditProofCallback callback; | 442 MockAuditProofCallback callback; |
| 386 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 443 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 444 IsError(net::ERR_IO_PENDING)); |
| 387 ASSERT_TRUE(callback.called()); | 445 ASSERT_TRUE(callback.called()); |
| 388 EXPECT_THAT(callback.net_error(), IsOk()); | 446 EXPECT_THAT(callback.result(), IsOk()); |
| 389 ASSERT_THAT(callback.proof(), NotNull()); | 447 ASSERT_THAT(callback.proof(), NotNull()); |
| 390 EXPECT_THAT(callback.proof()->leaf_index, Eq(123456u)); | 448 EXPECT_THAT(callback.proof()->leaf_index, Eq(123456u)); |
| 391 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. | 449 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. |
| 392 // EXPECT_THAT(callback.proof()->tree_size, Eq(999999)); | 450 // EXPECT_THAT(callback.proof()->tree_size, Eq(999999)); |
| 393 EXPECT_THAT(callback.proof()->nodes, Eq(audit_proof)); | 451 EXPECT_THAT(callback.proof()->nodes, Eq(audit_proof)); |
| 394 } | 452 } |
| 395 | 453 |
| 396 TEST_P(LogDnsClientTest, | 454 TEST_P(LogDnsClientTest, |
| 397 QueryAuditProofReportsThatAuditProofQnameDoesNotExist) { | 455 QueryAuditProofReportsThatAuditProofQnameDoesNotExist) { |
| 398 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); | 456 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); |
| 399 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", | 457 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", |
| 400 net::dns_protocol::kRcodeNXDOMAIN); | 458 net::dns_protocol::kRcodeNXDOMAIN); |
| 401 | 459 |
| 402 MockAuditProofCallback callback; | 460 MockAuditProofCallback callback; |
| 403 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 461 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 462 IsError(net::ERR_IO_PENDING)); |
| 404 ASSERT_TRUE(callback.called()); | 463 ASSERT_TRUE(callback.called()); |
| 405 EXPECT_THAT(callback.net_error(), IsError(net::ERR_NAME_NOT_RESOLVED)); | 464 EXPECT_THAT(callback.result(), IsError(net::ERR_NAME_NOT_RESOLVED)); |
| 406 EXPECT_THAT(callback.proof(), IsNull()); | 465 EXPECT_THAT(callback.proof(), IsNull()); |
| 407 } | 466 } |
| 408 | 467 |
| 409 TEST_P(LogDnsClientTest, | 468 TEST_P(LogDnsClientTest, |
| 410 QueryAuditProofReportsServerFailureDuringAuditProofRequests) { | 469 QueryAuditProofReportsServerFailuresDuringAuditProofRequests) { |
| 411 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); | 470 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); |
| 412 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", | 471 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", |
| 413 net::dns_protocol::kRcodeSERVFAIL); | 472 net::dns_protocol::kRcodeSERVFAIL); |
| 414 | 473 |
| 415 MockAuditProofCallback callback; | 474 MockAuditProofCallback callback; |
| 416 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 475 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 476 IsError(net::ERR_IO_PENDING)); |
| 417 ASSERT_TRUE(callback.called()); | 477 ASSERT_TRUE(callback.called()); |
| 418 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); | 478 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_SERVER_FAILED)); |
| 419 EXPECT_THAT(callback.proof(), IsNull()); | 479 EXPECT_THAT(callback.proof(), IsNull()); |
| 420 } | 480 } |
| 421 | 481 |
| 422 TEST_P(LogDnsClientTest, | 482 TEST_P(LogDnsClientTest, |
| 423 QueryAuditProofReportsServerRefusalDuringAuditProofRequests) { | 483 QueryAuditProofReportsServerRefusalsDuringAuditProofRequests) { |
| 424 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); | 484 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); |
| 425 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", | 485 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", |
| 426 net::dns_protocol::kRcodeREFUSED); | 486 net::dns_protocol::kRcodeREFUSED); |
| 427 | 487 |
| 428 MockAuditProofCallback callback; | 488 MockAuditProofCallback callback; |
| 429 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 489 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 490 IsError(net::ERR_IO_PENDING)); |
| 430 ASSERT_TRUE(callback.called()); | 491 ASSERT_TRUE(callback.called()); |
| 431 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); | 492 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_SERVER_FAILED)); |
| 432 EXPECT_THAT(callback.proof(), IsNull()); | 493 EXPECT_THAT(callback.proof(), IsNull()); |
| 433 } | 494 } |
| 434 | 495 |
| 435 TEST_P(LogDnsClientTest, | 496 TEST_P(LogDnsClientTest, |
| 436 QueryAuditProofReportsResponseMalformedIfProofNodesResponseContainsNoStri
ngs) { | 497 QueryAuditProofReportsResponseMalformedIfProofNodesResponseContainsNoStri
ngs) { |
| 437 // Expect a leaf index query first, to map the leaf hash to a leaf index. | 498 // Expect a leaf index query first, to map the leaf hash to a leaf index. |
| 438 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); | 499 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); |
| 439 | 500 |
| 440 mock_dns_.ExpectRequestAndResponse("0.123456.999999.tree.ct.test.", | 501 mock_dns_.ExpectRequestAndResponse("0.123456.999999.tree.ct.test.", |
| 441 std::vector<base::StringPiece>()); | 502 std::vector<base::StringPiece>()); |
| 442 | 503 |
| 443 MockAuditProofCallback callback; | 504 MockAuditProofCallback callback; |
| 444 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 505 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 506 IsError(net::ERR_IO_PENDING)); |
| 445 ASSERT_TRUE(callback.called()); | 507 ASSERT_TRUE(callback.called()); |
| 446 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 508 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 447 EXPECT_THAT(callback.proof(), IsNull()); | 509 EXPECT_THAT(callback.proof(), IsNull()); |
| 448 } | 510 } |
| 449 | 511 |
| 450 TEST_P(LogDnsClientTest, | 512 TEST_P(LogDnsClientTest, |
| 451 QueryAuditProofReportsResponseMalformedIfProofNodesResponseContainsMoreTh
anOneString) { | 513 QueryAuditProofReportsResponseMalformedIfProofNodesResponseContainsMoreTh
anOneString) { |
| 452 // The CT-over-DNS draft RFC states that the response will contain "exactly | 514 // The CT-over-DNS draft RFC states that the response will contain "exactly |
| 453 // one character-string." | 515 // one character-string." |
| 454 const std::vector<std::string> audit_proof = GetSampleAuditProof(10); | 516 const std::vector<std::string> audit_proof = GetSampleAuditProof(10); |
| 455 | 517 |
| 456 std::string first_chunk_of_proof = std::accumulate( | 518 std::string first_chunk_of_proof = std::accumulate( |
| 457 audit_proof.begin(), audit_proof.begin() + 7, std::string()); | 519 audit_proof.begin(), audit_proof.begin() + 7, std::string()); |
| 458 std::string second_chunk_of_proof = std::accumulate( | 520 std::string second_chunk_of_proof = std::accumulate( |
| 459 audit_proof.begin() + 7, audit_proof.end(), std::string()); | 521 audit_proof.begin() + 7, audit_proof.end(), std::string()); |
| 460 | 522 |
| 461 // Expect a leaf index query first, to map the leaf hash to a leaf index. | 523 // Expect a leaf index query first, to map the leaf hash to a leaf index. |
| 462 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); | 524 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); |
| 463 | 525 |
| 464 mock_dns_.ExpectRequestAndResponse( | 526 mock_dns_.ExpectRequestAndResponse( |
| 465 "0.123456.999999.tree.ct.test.", | 527 "0.123456.999999.tree.ct.test.", |
| 466 {first_chunk_of_proof, second_chunk_of_proof}); | 528 {first_chunk_of_proof, second_chunk_of_proof}); |
| 467 | 529 |
| 468 MockAuditProofCallback callback; | 530 MockAuditProofCallback callback; |
| 469 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 531 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 532 IsError(net::ERR_IO_PENDING)); |
| 470 ASSERT_TRUE(callback.called()); | 533 ASSERT_TRUE(callback.called()); |
| 471 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 534 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 472 EXPECT_THAT(callback.proof(), IsNull()); | 535 EXPECT_THAT(callback.proof(), IsNull()); |
| 473 } | 536 } |
| 474 | 537 |
| 475 TEST_P(LogDnsClientTest, | 538 TEST_P(LogDnsClientTest, |
| 476 QueryAuditProofReportsResponseMalformedIfNodeTooShort) { | 539 QueryAuditProofReportsResponseMalformedIfNodeTooShort) { |
| 477 // node is shorter than a SHA-256 hash (31 vs 32 bytes) | 540 // node is shorter than a SHA-256 hash (31 vs 32 bytes) |
| 478 const std::vector<std::string> audit_proof(1, std::string(31, 'a')); | 541 const std::vector<std::string> audit_proof(1, std::string(31, 'a')); |
| 479 | 542 |
| 480 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); | 543 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); |
| 481 mock_dns_.ExpectAuditProofRequestAndResponse( | 544 mock_dns_.ExpectAuditProofRequestAndResponse( |
| 482 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); | 545 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); |
| 483 | 546 |
| 484 MockAuditProofCallback callback; | 547 MockAuditProofCallback callback; |
| 485 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 548 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 549 IsError(net::ERR_IO_PENDING)); |
| 486 ASSERT_TRUE(callback.called()); | 550 ASSERT_TRUE(callback.called()); |
| 487 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 551 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 488 EXPECT_THAT(callback.proof(), IsNull()); | 552 EXPECT_THAT(callback.proof(), IsNull()); |
| 489 } | 553 } |
| 490 | 554 |
| 491 TEST_P(LogDnsClientTest, QueryAuditProofReportsResponseMalformedIfNodeTooLong) { | 555 TEST_P(LogDnsClientTest, QueryAuditProofReportsResponseMalformedIfNodeTooLong) { |
| 492 // node is longer than a SHA-256 hash (33 vs 32 bytes) | 556 // node is longer than a SHA-256 hash (33 vs 32 bytes) |
| 493 const std::vector<std::string> audit_proof(1, std::string(33, 'a')); | 557 const std::vector<std::string> audit_proof(1, std::string(33, 'a')); |
| 494 | 558 |
| 495 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); | 559 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); |
| 496 mock_dns_.ExpectAuditProofRequestAndResponse( | 560 mock_dns_.ExpectAuditProofRequestAndResponse( |
| 497 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); | 561 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); |
| 498 | 562 |
| 499 MockAuditProofCallback callback; | 563 MockAuditProofCallback callback; |
| 500 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 564 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 565 IsError(net::ERR_IO_PENDING)); |
| 501 ASSERT_TRUE(callback.called()); | 566 ASSERT_TRUE(callback.called()); |
| 502 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 567 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 503 EXPECT_THAT(callback.proof(), IsNull()); | 568 EXPECT_THAT(callback.proof(), IsNull()); |
| 504 } | 569 } |
| 505 | 570 |
| 506 TEST_P(LogDnsClientTest, QueryAuditProofReportsResponseMalformedIfEmpty) { | 571 TEST_P(LogDnsClientTest, QueryAuditProofReportsResponseMalformedIfEmpty) { |
| 507 const std::vector<std::string> audit_proof; | 572 const std::vector<std::string> audit_proof; |
| 508 | 573 |
| 509 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); | 574 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); |
| 510 mock_dns_.ExpectAuditProofRequestAndResponse( | 575 mock_dns_.ExpectAuditProofRequestAndResponse( |
| 511 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); | 576 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); |
| 512 | 577 |
| 513 MockAuditProofCallback callback; | 578 MockAuditProofCallback callback; |
| 514 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 579 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 580 IsError(net::ERR_IO_PENDING)); |
| 515 ASSERT_TRUE(callback.called()); | 581 ASSERT_TRUE(callback.called()); |
| 516 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 582 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 517 EXPECT_THAT(callback.proof(), IsNull()); | 583 EXPECT_THAT(callback.proof(), IsNull()); |
| 518 } | 584 } |
| 519 | 585 |
| 520 TEST_P(LogDnsClientTest, | 586 TEST_P(LogDnsClientTest, |
| 521 QueryAuditProofReportsInvalidArgIfLeafIndexEqualToTreeSize) { | 587 QueryAuditProofReportsInvalidArgIfLeafIndexEqualToTreeSize) { |
| 522 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); | 588 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); |
| 523 | 589 |
| 524 MockAuditProofCallback callback; | 590 MockAuditProofCallback callback; |
| 525 QueryAuditProof("ct.test", kLeafHashes[0], 123456, &callback); | 591 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 123456, &callback), |
| 592 IsError(net::ERR_IO_PENDING)); |
| 526 ASSERT_TRUE(callback.called()); | 593 ASSERT_TRUE(callback.called()); |
| 527 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); | 594 EXPECT_THAT(callback.result(), IsError(net::ERR_INVALID_ARGUMENT)); |
| 528 EXPECT_THAT(callback.proof(), IsNull()); | 595 EXPECT_THAT(callback.proof(), IsNull()); |
| 529 } | 596 } |
| 530 | 597 |
| 531 TEST_P(LogDnsClientTest, | 598 TEST_P(LogDnsClientTest, |
| 532 QueryAuditProofReportsInvalidArgIfLeafIndexGreaterThanTreeSize) { | 599 QueryAuditProofReportsInvalidArgIfLeafIndexGreaterThanTreeSize) { |
| 533 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 999999); | 600 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 999999); |
| 534 | 601 |
| 535 MockAuditProofCallback callback; | 602 MockAuditProofCallback callback; |
| 536 QueryAuditProof("ct.test", kLeafHashes[0], 123456, &callback); | 603 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 123456, &callback), |
| 604 IsError(net::ERR_IO_PENDING)); |
| 537 ASSERT_TRUE(callback.called()); | 605 ASSERT_TRUE(callback.called()); |
| 538 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); | 606 EXPECT_THAT(callback.result(), IsError(net::ERR_INVALID_ARGUMENT)); |
| 539 EXPECT_THAT(callback.proof(), IsNull()); | 607 EXPECT_THAT(callback.proof(), IsNull()); |
| 540 } | 608 } |
| 541 | 609 |
| 542 TEST_P(LogDnsClientTest, | 610 TEST_P(LogDnsClientTest, |
| 543 QueryAuditProofReportsSocketErrorsDuringAuditProofRequests) { | 611 QueryAuditProofReportsSocketErrorsDuringAuditProofRequests) { |
| 544 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); | 612 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); |
| 545 mock_dns_.ExpectRequestAndSocketError("0.123456.999999.tree.ct.test.", | 613 mock_dns_.ExpectRequestAndSocketError("0.123456.999999.tree.ct.test.", |
| 546 net::ERR_CONNECTION_REFUSED); | 614 net::ERR_CONNECTION_REFUSED); |
| 547 | 615 |
| 548 MockAuditProofCallback callback; | 616 MockAuditProofCallback callback; |
| 549 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 617 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 618 IsError(net::ERR_IO_PENDING)); |
| 550 ASSERT_TRUE(callback.called()); | 619 ASSERT_TRUE(callback.called()); |
| 551 EXPECT_THAT(callback.net_error(), IsError(net::ERR_CONNECTION_REFUSED)); | 620 EXPECT_THAT(callback.result(), IsError(net::ERR_CONNECTION_REFUSED)); |
| 552 EXPECT_THAT(callback.proof(), IsNull()); | 621 EXPECT_THAT(callback.proof(), IsNull()); |
| 553 } | 622 } |
| 554 | 623 |
| 555 TEST_P(LogDnsClientTest, | 624 TEST_P(LogDnsClientTest, |
| 556 QueryAuditProofReportsTimeoutsDuringAuditProofRequests) { | 625 QueryAuditProofReportsTimeoutsDuringAuditProofRequests) { |
| 557 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); | 626 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], 123456); |
| 558 mock_dns_.ExpectRequestAndTimeout("0.123456.999999.tree.ct.test."); | 627 mock_dns_.ExpectRequestAndTimeout("0.123456.999999.tree.ct.test."); |
| 559 | 628 |
| 560 MockAuditProofCallback callback; | 629 MockAuditProofCallback callback; |
| 561 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 630 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 631 IsError(net::ERR_IO_PENDING)); |
| 632 |
| 633 callback.WaitUntilRun(TestTimeouts::action_max_timeout()); |
| 562 ASSERT_TRUE(callback.called()); | 634 ASSERT_TRUE(callback.called()); |
| 563 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_TIMED_OUT)); | 635 EXPECT_THAT(callback.result(), IsError(net::ERR_DNS_TIMED_OUT)); |
| 564 EXPECT_THAT(callback.proof(), IsNull()); | 636 EXPECT_THAT(callback.proof(), IsNull()); |
| 565 } | 637 } |
| 566 | 638 |
| 567 TEST_P(LogDnsClientTest, AdoptsLatestDnsConfigIfValid) { | 639 TEST_P(LogDnsClientTest, AdoptsLatestDnsConfigIfValid) { |
| 568 std::unique_ptr<net::DnsClient> tmp = mock_dns_.CreateDnsClient(); | 640 std::unique_ptr<net::DnsClient> tmp = mock_dns_.CreateDnsClient(); |
| 569 net::DnsClient* dns_client = tmp.get(); | 641 net::DnsClient* dns_client = tmp.get(); |
| 570 LogDnsClient log_client(std::move(tmp), net::NetLogWithSource(), 0); | 642 LogDnsClient log_client(std::move(tmp), net::NetLogWithSource(), 0); |
| 571 | 643 |
| 572 // Get the current DNS config, modify it and broadcast the update. | 644 // Get the current DNS config, modify it and broadcast the update. |
| 573 net::DnsConfig config(*dns_client->GetConfig()); | 645 net::DnsConfig config(*dns_client->GetConfig()); |
| (...skipping 41 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 615 base::StringPrintf("%zu.123456.999999.tree.ct.test.", nodes_begin), | 687 base::StringPrintf("%zu.123456.999999.tree.ct.test.", nodes_begin), |
| 616 audit_proof.begin() + nodes_begin, audit_proof.begin() + nodes_end); | 688 audit_proof.begin() + nodes_begin, audit_proof.begin() + nodes_end); |
| 617 } | 689 } |
| 618 | 690 |
| 619 std::unique_ptr<net::DnsClient> tmp = mock_dns_.CreateDnsClient(); | 691 std::unique_ptr<net::DnsClient> tmp = mock_dns_.CreateDnsClient(); |
| 620 net::DnsClient* dns_client = tmp.get(); | 692 net::DnsClient* dns_client = tmp.get(); |
| 621 LogDnsClient log_client(std::move(tmp), net::NetLogWithSource(), 0); | 693 LogDnsClient log_client(std::move(tmp), net::NetLogWithSource(), 0); |
| 622 | 694 |
| 623 // Start query. | 695 // Start query. |
| 624 MockAuditProofCallback callback; | 696 MockAuditProofCallback callback; |
| 625 QueryAuditProofAsync(&log_client, "ct.test", kLeafHashes[0], 999999, | 697 ASSERT_THAT(log_client.QueryAuditProof("ct.test", kLeafHashes[0], 999999, |
| 626 callback.AsCallback()); | 698 callback.AsCallback()), |
| 699 IsError(net::ERR_IO_PENDING)); |
| 627 | 700 |
| 628 // Get the current DNS config, modify it and broadcast the update. | 701 // Get the current DNS config, modify it and broadcast the update. |
| 629 net::DnsConfig config(*dns_client->GetConfig()); | 702 net::DnsConfig config(*dns_client->GetConfig()); |
| 630 ASSERT_NE(123, config.attempts); | 703 ASSERT_NE(123, config.attempts); |
| 631 config.attempts = 123; | 704 config.attempts = 123; |
| 632 mock_dns_.SetDnsConfig(config); | 705 mock_dns_.SetDnsConfig(config); |
| 633 | 706 |
| 634 callback.WaitUntilRun(); | 707 callback.WaitUntilRun(TestTimeouts::action_max_timeout()); |
| 635 // Check that the DNS changes propogated before the query completed. | 708 // Check that the DNS changes propogated before the query completed. |
| 636 EXPECT_EQ(123, dns_client->GetConfig()->attempts); | 709 EXPECT_EQ(123, dns_client->GetConfig()->attempts); |
| 637 | 710 |
| 638 ASSERT_TRUE(callback.called()); | 711 ASSERT_TRUE(callback.called()); |
| 639 EXPECT_THAT(callback.net_error(), IsOk()); | 712 EXPECT_THAT(callback.result(), IsOk()); |
| 640 ASSERT_THAT(callback.proof(), NotNull()); | 713 ASSERT_THAT(callback.proof(), NotNull()); |
| 641 EXPECT_THAT(callback.proof()->leaf_index, Eq(123456u)); | 714 EXPECT_THAT(callback.proof()->leaf_index, Eq(123456u)); |
| 642 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. | 715 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. |
| 643 // EXPECT_THAT(callback.proof()->tree_size, Eq(999999)); | 716 // EXPECT_THAT(callback.proof()->tree_size, Eq(999999)); |
| 644 EXPECT_THAT(callback.proof()->nodes, Eq(audit_proof)); | 717 EXPECT_THAT(callback.proof()->nodes, Eq(audit_proof)); |
| 645 } | 718 } |
| 646 | 719 |
| 647 TEST_P(LogDnsClientTest, CanPerformQueriesInParallel) { | 720 TEST_P(LogDnsClientTest, CanPerformQueriesInParallel) { |
| 648 // Check that 3 queries can be performed in parallel. | 721 // Check that 3 queries can be performed in parallel. |
| 649 constexpr size_t kNumOfParallelQueries = 3; | 722 constexpr size_t kNumOfParallelQueries = 3; |
| (...skipping 47 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 697 base::StringPrintf("%zu.%" PRIu64 ".%" PRIu64 ".tree.ct.test.", | 770 base::StringPrintf("%zu.%" PRIu64 ".%" PRIu64 ".tree.ct.test.", |
| 698 start_node, kLeafIndices[query_i], | 771 start_node, kLeafIndices[query_i], |
| 699 kTreeSizes[query_i]), | 772 kTreeSizes[query_i]), |
| 700 proof.begin() + start_node, proof.begin() + end_node); | 773 proof.begin() + start_node, proof.begin() + end_node); |
| 701 } | 774 } |
| 702 } | 775 } |
| 703 } | 776 } |
| 704 | 777 |
| 705 // Start the queries. | 778 // Start the queries. |
| 706 for (size_t i = 0; i < kNumOfParallelQueries; ++i) { | 779 for (size_t i = 0; i < kNumOfParallelQueries; ++i) { |
| 707 QueryAuditProofAsync(log_client.get(), "ct.test", kLeafHashes[i], | 780 ASSERT_THAT( |
| 708 kTreeSizes[i], callbacks[i].AsCallback()); | 781 log_client->QueryAuditProof("ct.test", kLeafHashes[i], kTreeSizes[i], |
| 782 callbacks[i].AsCallback()), |
| 783 IsError(net::ERR_IO_PENDING)) |
| 784 << "query #" << i; |
| 709 } | 785 } |
| 710 | 786 |
| 711 // Wait for each query to complete and check its results. | 787 // Wait for each query to complete and check its results. |
| 712 for (size_t i = 0; i < kNumOfParallelQueries; ++i) { | 788 for (size_t i = 0; i < kNumOfParallelQueries; ++i) { |
| 713 MockAuditProofCallback& callback = callbacks[i]; | 789 MockAuditProofCallback& callback = callbacks[i]; |
| 714 callbacks[i].WaitUntilRun(); | 790 callbacks[i].WaitUntilRun(TestTimeouts::action_max_timeout()); |
| 715 | 791 |
| 716 SCOPED_TRACE(testing::Message() << "callbacks[" << i << "]"); | 792 SCOPED_TRACE(testing::Message() << "callbacks[" << i << "]"); |
| 717 ASSERT_TRUE(callback.called()); | 793 ASSERT_TRUE(callback.called()); |
| 718 EXPECT_THAT(callback.net_error(), IsOk()); | 794 EXPECT_THAT(callback.result(), IsOk()); |
| 719 ASSERT_THAT(callback.proof(), NotNull()); | 795 ASSERT_THAT(callback.proof(), NotNull()); |
| 720 EXPECT_THAT(callback.proof()->leaf_index, Eq(kLeafIndices[i])); | 796 EXPECT_THAT(callback.proof()->leaf_index, Eq(kLeafIndices[i])); |
| 721 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. | 797 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. |
| 722 // EXPECT_THAT(callback.proof()->tree_size, kTreeSizes[i]); | 798 // EXPECT_THAT(callback.proof()->tree_size, kTreeSizes[i]); |
| 723 EXPECT_THAT(callback.proof()->nodes, Eq(audit_proofs[i])); | 799 EXPECT_THAT(callback.proof()->nodes, Eq(audit_proofs[i])); |
| 724 } | 800 } |
| 725 } | 801 } |
| 726 | 802 |
| 727 TEST_P(LogDnsClientTest, CanBeThrottledToOneQueryAtATime) { | 803 TEST_P(LogDnsClientTest, CanBeThrottledToOneQueryAtATime) { |
| 728 // Check that queries can be rate-limited to one at a time. | 804 // Check that queries can be rate-limited to one at a time. |
| (...skipping 15 matching lines...) Expand all Loading... |
| 744 audit_proof.begin() + 7, | 820 audit_proof.begin() + 7, |
| 745 audit_proof.begin() + 14); | 821 audit_proof.begin() + 14); |
| 746 mock_dns_.ExpectAuditProofRequestAndResponse("14.123456.999999.tree.ct.test.", | 822 mock_dns_.ExpectAuditProofRequestAndResponse("14.123456.999999.tree.ct.test.", |
| 747 audit_proof.begin() + 14, | 823 audit_proof.begin() + 14, |
| 748 audit_proof.end()); | 824 audit_proof.end()); |
| 749 | 825 |
| 750 const size_t kMaxConcurrentQueries = 1; | 826 const size_t kMaxConcurrentQueries = 1; |
| 751 std::unique_ptr<LogDnsClient> log_client = | 827 std::unique_ptr<LogDnsClient> log_client = |
| 752 CreateLogDnsClient(kMaxConcurrentQueries); | 828 CreateLogDnsClient(kMaxConcurrentQueries); |
| 753 | 829 |
| 754 // Start the queries. | 830 // Try to start the queries. |
| 755 MockAuditProofCallback callback1; | 831 MockAuditProofCallback callback1; |
| 756 QueryAuditProofAsync(log_client.get(), "ct.test", kLeafHashes[0], 999999, | 832 ASSERT_THAT(log_client->QueryAuditProof("ct.test", kLeafHashes[0], 999999, |
| 757 callback1.AsCallback()); | 833 callback1.AsCallback()), |
| 834 IsError(net::ERR_IO_PENDING)); |
| 835 |
| 758 MockAuditProofCallback callback2; | 836 MockAuditProofCallback callback2; |
| 759 QueryAuditProofAsync(log_client.get(), "ct.test", kLeafHashes[1], 999999, | 837 ASSERT_THAT(log_client->QueryAuditProof("ct.test", kLeafHashes[1], 999999, |
| 760 callback2.AsCallback()); | 838 callback2.AsCallback()), |
| 761 | 839 IsError(net::ERR_TEMPORARILY_THROTTLED)); |
| 762 callback1.WaitUntilRun(); | |
| 763 callback2.WaitUntilRun(); | |
| 764 | 840 |
| 765 // Check that the first query succeeded. | 841 // Check that the first query succeeded. |
| 842 callback1.WaitUntilRun(TestTimeouts::action_max_timeout()); |
| 766 ASSERT_TRUE(callback1.called()); | 843 ASSERT_TRUE(callback1.called()); |
| 767 EXPECT_THAT(callback1.net_error(), IsOk()); | 844 EXPECT_THAT(callback1.result(), IsOk()); |
| 768 ASSERT_THAT(callback1.proof(), NotNull()); | 845 ASSERT_THAT(callback1.proof(), NotNull()); |
| 769 EXPECT_THAT(callback1.proof()->leaf_index, Eq(123456u)); | 846 EXPECT_THAT(callback1.proof()->leaf_index, Eq(123456u)); |
| 770 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. | 847 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. |
| 771 // EXPECT_THAT(callback1.proof()->tree_size, Eq(999999)); | 848 // EXPECT_THAT(callback1.proof()->tree_size, Eq(999999)); |
| 772 EXPECT_THAT(callback1.proof()->nodes, Eq(audit_proof)); | 849 EXPECT_THAT(callback1.proof()->nodes, Eq(audit_proof)); |
| 773 | 850 |
| 774 // Check that the second query failed. | 851 // This callback isn't expected to be invoked, but pump the message loop |
| 775 ASSERT_TRUE(callback2.called()); | 852 // anyway to confirm that it indeed isn't run. Give up as soon as the |
| 776 EXPECT_THAT(callback2.net_error(), IsError(net::ERR_TEMPORARILY_THROTTLED)); | 853 // message loop is empty (zero timeout). |
| 777 EXPECT_THAT(callback2.proof(), IsNull()); | 854 callback2.WaitUntilRun(base::TimeDelta()); |
| 855 ASSERT_FALSE(callback2.called()); |
| 778 | 856 |
| 779 // Try a third query, which should succeed now that the first is finished. | 857 // Try a third query, which should succeed now that the first is finished. |
| 780 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[2], 666); | 858 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[2], 666); |
| 781 mock_dns_.ExpectAuditProofRequestAndResponse("0.666.999999.tree.ct.test.", | 859 mock_dns_.ExpectAuditProofRequestAndResponse("0.666.999999.tree.ct.test.", |
| 782 audit_proof.begin(), | 860 audit_proof.begin(), |
| 783 audit_proof.begin() + 7); | 861 audit_proof.begin() + 7); |
| 784 mock_dns_.ExpectAuditProofRequestAndResponse("7.666.999999.tree.ct.test.", | 862 mock_dns_.ExpectAuditProofRequestAndResponse("7.666.999999.tree.ct.test.", |
| 785 audit_proof.begin() + 7, | 863 audit_proof.begin() + 7, |
| 786 audit_proof.begin() + 14); | 864 audit_proof.begin() + 14); |
| 787 mock_dns_.ExpectAuditProofRequestAndResponse("14.666.999999.tree.ct.test.", | 865 mock_dns_.ExpectAuditProofRequestAndResponse("14.666.999999.tree.ct.test.", |
| 788 audit_proof.begin() + 14, | 866 audit_proof.begin() + 14, |
| 789 audit_proof.end()); | 867 audit_proof.end()); |
| 790 | 868 |
| 791 MockAuditProofCallback callback3; | 869 MockAuditProofCallback callback3; |
| 792 QueryAuditProofAsync(log_client.get(), "ct.test", kLeafHashes[2], 999999, | 870 ASSERT_THAT(log_client->QueryAuditProof("ct.test", kLeafHashes[2], 999999, |
| 793 callback3.AsCallback()); | 871 callback3.AsCallback()), |
| 794 | 872 IsError(net::ERR_IO_PENDING)); |
| 795 callback3.WaitUntilRun(); | |
| 796 | 873 |
| 797 // Check that the third query succeeded. | 874 // Check that the third query succeeded. |
| 875 callback3.WaitUntilRun(TestTimeouts::action_max_timeout()); |
| 798 ASSERT_TRUE(callback3.called()); | 876 ASSERT_TRUE(callback3.called()); |
| 799 EXPECT_THAT(callback3.net_error(), IsOk()); | 877 EXPECT_THAT(callback3.result(), IsOk()); |
| 800 ASSERT_THAT(callback3.proof(), NotNull()); | 878 ASSERT_THAT(callback3.proof(), NotNull()); |
| 801 EXPECT_THAT(callback3.proof()->leaf_index, Eq(666u)); | 879 EXPECT_THAT(callback3.proof()->leaf_index, Eq(666u)); |
| 802 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. | 880 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. |
| 803 // EXPECT_THAT(callback3.proof()->tree_size, Eq(999999)); | 881 // EXPECT_THAT(callback3.proof()->tree_size, Eq(999999)); |
| 804 EXPECT_THAT(callback3.proof()->nodes, Eq(audit_proof)); | 882 EXPECT_THAT(callback3.proof()->nodes, Eq(audit_proof)); |
| 805 } | 883 } |
| 806 | 884 |
| 807 INSTANTIATE_TEST_CASE_P(ReadMode, | 885 INSTANTIATE_TEST_CASE_P(ReadMode, |
| 808 LogDnsClientTest, | 886 LogDnsClientTest, |
| 809 ::testing::Values(net::IoMode::ASYNC, | 887 ::testing::Values(net::IoMode::ASYNC, |
| 810 net::IoMode::SYNCHRONOUS)); | 888 net::IoMode::SYNCHRONOUS)); |
| 811 | 889 |
| 812 } // namespace | 890 } // namespace |
| 813 } // namespace certificate_transparency | 891 } // namespace certificate_transparency |
| OLD | NEW |