Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "components/certificate_transparency/log_dns_client.h" | 5 #include "components/certificate_transparency/log_dns_client.h" |
| 6 | 6 |
| 7 #include <memory> | 7 #include <memory> |
| 8 #include <string> | 8 #include <string> |
| 9 #include <utility> | 9 #include <utility> |
| 10 #include <vector> | 10 #include <vector> |
| 11 | 11 |
| 12 #include "base/format_macros.h" | 12 #include "base/format_macros.h" |
| 13 #include "base/memory/ptr_util.h" | 13 #include "base/memory/ptr_util.h" |
| 14 #include "base/message_loop/message_loop.h" | 14 #include "base/message_loop/message_loop.h" |
| 15 #include "base/run_loop.h" | 15 #include "base/run_loop.h" |
| 16 #include "base/strings/string_number_conversions.h" | 16 #include "base/strings/string_number_conversions.h" |
| 17 #include "base/strings/stringprintf.h" | 17 #include "base/strings/stringprintf.h" |
| 18 #include "base/test/test_timeouts.h" | |
| 18 #include "components/certificate_transparency/mock_log_dns_traffic.h" | 19 #include "components/certificate_transparency/mock_log_dns_traffic.h" |
| 19 #include "crypto/sha2.h" | 20 #include "crypto/sha2.h" |
| 20 #include "net/base/net_errors.h" | 21 #include "net/base/net_errors.h" |
| 21 #include "net/cert/merkle_audit_proof.h" | 22 #include "net/cert/merkle_audit_proof.h" |
| 22 #include "net/cert/signed_certificate_timestamp.h" | 23 #include "net/cert/signed_certificate_timestamp.h" |
| 23 #include "net/dns/dns_client.h" | 24 #include "net/dns/dns_client.h" |
| 24 #include "net/dns/dns_config_service.h" | 25 #include "net/dns/dns_config_service.h" |
| 25 #include "net/dns/dns_protocol.h" | 26 #include "net/dns/dns_protocol.h" |
| 26 #include "net/log/net_log.h" | 27 #include "net/log/net_log.h" |
| 27 #include "net/test/gtest_util.h" | 28 #include "net/test/gtest_util.h" |
| (...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 63 const uint64_t kLeafIndices[] = {0, 1, 2}; | 64 const uint64_t kLeafIndices[] = {0, 1, 2}; |
| 64 const uint64_t kTreeSizes[] = {100, 10000, 1000000}; | 65 const uint64_t kTreeSizes[] = {100, 10000, 1000000}; |
| 65 | 66 |
| 66 // Only 7 audit proof nodes can fit into a DNS response, because they are sent | 67 // Only 7 audit proof nodes can fit into a DNS response, because they are sent |
| 67 // in a TXT RDATA string, which has a maximum size of 255 bytes, and each node | 68 // in a TXT RDATA string, which has a maximum size of 255 bytes, and each node |
| 68 // is a SHA-256 hash (32 bytes), i.e. (255 / 32) == 7. | 69 // is a SHA-256 hash (32 bytes), i.e. (255 / 32) == 7. |
| 69 // This means audit proofs consisting of more than 7 nodes require multiple DNS | 70 // This means audit proofs consisting of more than 7 nodes require multiple DNS |
| 70 // requests to retrieve. | 71 // requests to retrieve. |
| 71 const size_t kMaxProofNodesPerDnsResponse = 7; | 72 const size_t kMaxProofNodesPerDnsResponse = 7; |
| 72 | 73 |
| 74 // Returns an example Merkle audit proof containing |length| nodes. | |
| 75 // The proof cannot be used for cryptographic purposes; it is merely a | |
| 76 // placeholder. | |
| 73 std::vector<std::string> GetSampleAuditProof(size_t length) { | 77 std::vector<std::string> GetSampleAuditProof(size_t length) { |
| 74 std::vector<std::string> audit_proof(length); | 78 std::vector<std::string> audit_proof(length); |
| 75 // Makes each node of the audit proof different, so that tests are able to | 79 // Makes each node of the audit proof different, so that tests are able to |
| 76 // confirm that the audit proof is reconstructed in the correct order. | 80 // confirm that the audit proof is reconstructed in the correct order. |
| 77 for (size_t i = 0; i < length; ++i) { | 81 for (size_t i = 0; i < length; ++i) { |
| 78 std::string node(crypto::kSHA256Length, '\0'); | 82 std::string node(crypto::kSHA256Length, '\0'); |
| 79 // Each node is 32 bytes, with each byte having a different value. | 83 // Each node is 32 bytes, with each byte having a different value. |
| 80 for (size_t j = 0; j < crypto::kSHA256Length; ++j) { | 84 for (size_t j = 0; j < crypto::kSHA256Length; ++j) { |
| 81 node[j] = static_cast<char>((-127 + i + j) % 128); | 85 node[j] = static_cast<char>((-127 + i + j) % 128); |
| 82 } | 86 } |
| 83 audit_proof[i].assign(std::move(node)); | 87 audit_proof[i].assign(std::move(node)); |
| 84 } | 88 } |
| 85 | 89 |
| 86 return audit_proof; | 90 return audit_proof; |
| 87 } | 91 } |
| 88 | 92 |
| 93 // MockAuditProofCallback can be used as an AuditProofCallback. | |
| 94 // It will record the arguments it is invoked with and provides a helpful | |
| 95 // method for pumping the message loop until it is invoked. | |
| 89 class MockAuditProofCallback { | 96 class MockAuditProofCallback { |
| 90 public: | 97 public: |
| 91 MockAuditProofCallback() : called_(false) {} | 98 MockAuditProofCallback() : called_(false) {} |
| 92 | 99 |
| 93 bool called() const { return called_; } | 100 bool called() const { return called_; } |
| 94 int net_error() const { return net_error_; } | 101 int net_error() const { return net_error_; } |
| 95 const net::ct::MerkleAuditProof* proof() const { return proof_.get(); } | 102 const net::ct::MerkleAuditProof* proof() const { return proof_.get(); } |
| 96 | 103 |
| 104 // Get this callback as an AuditProofCallback. | |
| 105 LogDnsClient::AuditProofCallback AsCallback() { | |
| 106 return base::Bind(&MockAuditProofCallback::Run, base::Unretained(this)); | |
| 107 } | |
| 108 | |
| 109 // Wait until either the callback is invoked or the message loop goes idle | |
| 110 // (after a specified |timeout|). Returns immediately if the callback has | |
| 111 // already been invoked. | |
| 112 void WaitUntilRun(base::TimeDelta timeout) { | |
| 113 if (called_) { | |
| 114 return; | |
| 115 } | |
| 116 | |
| 117 // Pump the message loop until the the callback is invoked, which quits the | |
| 118 // RunLoop, or a timeout expires and the message loop goes idle. | |
| 119 run_loop_.reset(new base::RunLoop()); | |
| 120 base::Closure quit_closure = run_loop_->QuitWhenIdleClosure(); | |
| 121 base::ThreadTaskRunnerHandle::Get()->PostDelayedTask(FROM_HERE, | |
| 122 quit_closure, timeout); | |
| 123 run_loop_->Run(); | |
| 124 run_loop_.reset(); | |
| 125 } | |
| 126 | |
| 127 private: | |
| 97 void Run(int net_error, std::unique_ptr<net::ct::MerkleAuditProof> proof) { | 128 void Run(int net_error, std::unique_ptr<net::ct::MerkleAuditProof> proof) { |
| 98 EXPECT_TRUE(!called_) << "Callback invoked more than once"; | 129 EXPECT_TRUE(!called_) << "Callback invoked more than once"; |
|
Eran Messeri
2016/09/30 09:26:51
nit: EXPECT_FALSE ?
Rob Percival
2016/09/30 12:03:21
Done.
| |
| 99 called_ = true; | 130 called_ = true; |
| 100 net_error_ = net_error; | 131 net_error_ = net_error; |
| 101 proof_ = std::move(proof); | 132 proof_ = std::move(proof); |
| 102 run_loop_.Quit(); | 133 if (run_loop_) { |
| 134 run_loop_->Quit(); | |
| 135 } | |
| 103 } | 136 } |
| 104 | 137 |
| 105 LogDnsClient::AuditProofCallback AsCallback() { | 138 // True if the callback has been invoked. |
| 106 return base::Bind(&MockAuditProofCallback::Run, base::Unretained(this)); | |
| 107 } | |
| 108 | |
| 109 void WaitUntilRun() { run_loop_.Run(); } | |
| 110 | |
| 111 private: | |
| 112 bool called_; | 139 bool called_; |
| 140 // The arguments that the callback was invoked with. | |
| 113 int net_error_; | 141 int net_error_; |
| 114 std::unique_ptr<net::ct::MerkleAuditProof> proof_; | 142 std::unique_ptr<net::ct::MerkleAuditProof> proof_; |
| 115 base::RunLoop run_loop_; | 143 // The RunLoop currently being used to pump the message loop, as a means to |
| 144 // execute this callback. | |
| 145 std::unique_ptr<base::RunLoop> run_loop_; | |
| 116 }; | 146 }; |
| 117 | 147 |
| 118 class LogDnsClientTest : public ::testing::TestWithParam<net::IoMode> { | 148 class LogDnsClientTest : public ::testing::TestWithParam<net::IoMode> { |
| 119 protected: | 149 protected: |
| 120 LogDnsClientTest() | 150 LogDnsClientTest() |
| 121 : network_change_notifier_(net::NetworkChangeNotifier::CreateMock()) { | 151 : network_change_notifier_(net::NetworkChangeNotifier::CreateMock()) { |
| 122 mock_dns_.SetSocketReadMode(GetParam()); | 152 mock_dns_.SetSocketReadMode(GetParam()); |
| 123 mock_dns_.InitializeDnsConfig(); | 153 mock_dns_.InitializeDnsConfig(); |
| 124 } | 154 } |
| 125 | 155 |
| 126 std::unique_ptr<LogDnsClient> CreateLogDnsClient( | 156 std::unique_ptr<LogDnsClient> CreateLogDnsClient( |
| 127 size_t kMaxConcurrentQueries) { | 157 size_t kMaxConcurrentQueries) { |
| 128 return base::MakeUnique<LogDnsClient>(mock_dns_.CreateDnsClient(), | 158 return base::MakeUnique<LogDnsClient>(mock_dns_.CreateDnsClient(), |
| 129 net::NetLogWithSource(), | 159 net::NetLogWithSource(), |
| 130 kMaxConcurrentQueries); | 160 kMaxConcurrentQueries); |
| 131 } | 161 } |
| 132 | 162 |
| 133 void QueryAuditProofAsync(LogDnsClient* log_client, | 163 net::Error QueryAuditProofAsync( |
|
Eran Messeri
2016/09/30 09:26:52
Seems like this method is not justified anymore, a
Rob Percival
2016/09/30 12:03:21
Done.
| |
| 134 const std::string& log_domain, | 164 LogDnsClient* log_client, |
| 135 const char leaf_hash[crypto::kSHA256Length], | 165 const std::string& log_domain, |
| 136 uint64_t tree_size, | 166 const char leaf_hash[crypto::kSHA256Length], |
| 137 const LogDnsClient::AuditProofCallback& callback) { | 167 uint64_t tree_size, |
| 138 log_client->QueryAuditProof(log_domain, leaf_hash, tree_size, callback); | 168 const LogDnsClient::AuditProofCallback& callback) { |
| 169 return log_client->QueryAuditProof(log_domain, leaf_hash, tree_size, | |
| 170 callback); | |
| 139 } | 171 } |
| 140 | 172 |
| 141 // Convenience function for calling QueryAuditProofAsync synchronously. | 173 // Convenience function for calling ASSERT_THAT(QueryAuditProofAsync |
| 142 void QueryAuditProof(const std::string& log_domain, | 174 // synchronously. |
| 143 const char leaf_hash[crypto::kSHA256Length], | 175 net::Error QueryAuditProof(const std::string& log_domain, |
| 144 uint64_t tree_size, | 176 const char leaf_hash[crypto::kSHA256Length], |
| 145 MockAuditProofCallback* callback) { | 177 uint64_t tree_size, |
| 178 MockAuditProofCallback* callback) { | |
| 146 std::unique_ptr<LogDnsClient> log_client = CreateLogDnsClient(0); | 179 std::unique_ptr<LogDnsClient> log_client = CreateLogDnsClient(0); |
| 147 QueryAuditProofAsync(log_client.get(), log_domain, leaf_hash, tree_size, | 180 net::Error result = |
| 148 callback->AsCallback()); | 181 QueryAuditProofAsync(log_client.get(), log_domain, leaf_hash, tree_size, |
| 149 callback->WaitUntilRun(); | 182 callback->AsCallback()); |
| 183 | |
| 184 if (result == net::ERR_IO_PENDING) { | |
| 185 callback->WaitUntilRun(TestTimeouts::action_max_timeout()); | |
| 186 } else { | |
| 187 // The callback isn't expected to be invoked, but pump the message loop | |
| 188 // anyway to confirm that it indeed isn't run. Give up as soon as the | |
| 189 // message loop is empty (zero timeout). | |
| 190 callback->WaitUntilRun(base::TimeDelta()); | |
| 191 } | |
| 192 | |
| 193 return result; | |
| 150 } | 194 } |
| 151 | 195 |
| 152 // This will be the NetworkChangeNotifier singleton for the duration of the | 196 // This will be the NetworkChangeNotifier singleton for the duration of the |
| 153 // test. It is accessed statically by LogDnsClient. | 197 // test. It is accessed statically by LogDnsClient. |
| 154 std::unique_ptr<net::NetworkChangeNotifier> network_change_notifier_; | 198 std::unique_ptr<net::NetworkChangeNotifier> network_change_notifier_; |
| 155 // Queues and handles asynchronous DNS tasks. Indirectly used by LogDnsClient, | 199 // Queues and handles asynchronous DNS tasks. Indirectly used by LogDnsClient, |
| 156 // the underlying net::DnsClient, and NetworkChangeNotifier. | 200 // the underlying net::DnsClient, and NetworkChangeNotifier. |
| 157 base::MessageLoopForIO message_loop_; | 201 base::MessageLoopForIO message_loop_; |
| 158 // Allows mock DNS sockets to be setup. | 202 // Allows mock DNS sockets to be setup. |
| 159 MockLogDnsTraffic mock_dns_; | 203 MockLogDnsTraffic mock_dns_; |
| 160 }; | 204 }; |
| 161 | 205 |
| 162 TEST_P(LogDnsClientTest, QueryAuditProofReportsThatLogDomainDoesNotExist) { | 206 TEST_P(LogDnsClientTest, QueryAuditProofReportsThatLogDomainDoesNotExist) { |
| 163 mock_dns_.ExpectRequestAndErrorResponse(kLeafIndexQnames[0], | 207 mock_dns_.ExpectRequestAndErrorResponse(kLeafIndexQnames[0], |
| 164 net::dns_protocol::kRcodeNXDOMAIN); | 208 net::dns_protocol::kRcodeNXDOMAIN); |
| 165 | 209 |
| 166 MockAuditProofCallback callback; | 210 MockAuditProofCallback callback; |
| 167 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 211 ASSERT_THAT( |
| 212 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), | |
| 213 IsError(net::ERR_IO_PENDING)); | |
| 168 ASSERT_TRUE(callback.called()); | 214 ASSERT_TRUE(callback.called()); |
| 169 EXPECT_THAT(callback.net_error(), IsError(net::ERR_NAME_NOT_RESOLVED)); | 215 EXPECT_THAT(callback.net_error(), IsError(net::ERR_NAME_NOT_RESOLVED)); |
| 170 EXPECT_THAT(callback.proof(), IsNull()); | 216 EXPECT_THAT(callback.proof(), IsNull()); |
| 171 } | 217 } |
| 172 | 218 |
| 173 TEST_P(LogDnsClientTest, | 219 TEST_P(LogDnsClientTest, |
| 174 QueryAuditProofReportsServerFailuresDuringLeafIndexRequests) { | 220 QueryAuditProofReportsServerFailuresDuringLeafIndexRequests) { |
| 175 mock_dns_.ExpectRequestAndErrorResponse(kLeafIndexQnames[0], | 221 mock_dns_.ExpectRequestAndErrorResponse(kLeafIndexQnames[0], |
| 176 net::dns_protocol::kRcodeSERVFAIL); | 222 net::dns_protocol::kRcodeSERVFAIL); |
| 177 | 223 |
| 178 MockAuditProofCallback callback; | 224 MockAuditProofCallback callback; |
| 179 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 225 ASSERT_THAT( |
| 226 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), | |
| 227 IsError(net::ERR_IO_PENDING)); | |
| 180 ASSERT_TRUE(callback.called()); | 228 ASSERT_TRUE(callback.called()); |
| 181 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); | 229 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); |
| 182 EXPECT_THAT(callback.proof(), IsNull()); | 230 EXPECT_THAT(callback.proof(), IsNull()); |
| 183 } | 231 } |
| 184 | 232 |
| 185 TEST_P(LogDnsClientTest, | 233 TEST_P(LogDnsClientTest, |
| 186 QueryAuditProofReportsServerRefusalsDuringLeafIndexRequests) { | 234 QueryAuditProofReportsServerRefusalsDuringLeafIndexRequests) { |
| 187 mock_dns_.ExpectRequestAndErrorResponse(kLeafIndexQnames[0], | 235 mock_dns_.ExpectRequestAndErrorResponse(kLeafIndexQnames[0], |
| 188 net::dns_protocol::kRcodeREFUSED); | 236 net::dns_protocol::kRcodeREFUSED); |
| 189 | 237 |
| 190 MockAuditProofCallback callback; | 238 MockAuditProofCallback callback; |
| 191 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 239 ASSERT_THAT( |
| 240 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), | |
| 241 IsError(net::ERR_IO_PENDING)); | |
| 192 ASSERT_TRUE(callback.called()); | 242 ASSERT_TRUE(callback.called()); |
| 193 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); | 243 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); |
| 194 EXPECT_THAT(callback.proof(), IsNull()); | 244 EXPECT_THAT(callback.proof(), IsNull()); |
| 195 } | 245 } |
| 196 | 246 |
| 197 TEST_P(LogDnsClientTest, | 247 TEST_P(LogDnsClientTest, |
| 198 QueryAuditProofReportsMalformedResponseIfLeafIndexIsNotNumeric) { | 248 QueryAuditProofReportsMalformedResponseIfLeafIndexIsNotNumeric) { |
| 199 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "foo"); | 249 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "foo"); |
| 200 | 250 |
| 201 MockAuditProofCallback callback; | 251 MockAuditProofCallback callback; |
| 202 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 252 ASSERT_THAT( |
| 253 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), | |
| 254 IsError(net::ERR_IO_PENDING)); | |
| 203 ASSERT_TRUE(callback.called()); | 255 ASSERT_TRUE(callback.called()); |
| 204 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 256 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 205 EXPECT_THAT(callback.proof(), IsNull()); | 257 EXPECT_THAT(callback.proof(), IsNull()); |
| 206 } | 258 } |
| 207 | 259 |
| 208 TEST_P(LogDnsClientTest, | 260 TEST_P(LogDnsClientTest, |
| 209 QueryAuditProofReportsMalformedResponseIfLeafIndexIsFloatingPoint) { | 261 QueryAuditProofReportsMalformedResponseIfLeafIndexIsFloatingPoint) { |
| 210 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456.0"); | 262 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456.0"); |
| 211 | 263 |
| 212 MockAuditProofCallback callback; | 264 MockAuditProofCallback callback; |
| 213 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 265 ASSERT_THAT( |
| 266 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), | |
| 267 IsError(net::ERR_IO_PENDING)); | |
| 214 ASSERT_TRUE(callback.called()); | 268 ASSERT_TRUE(callback.called()); |
| 215 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 269 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 216 EXPECT_THAT(callback.proof(), IsNull()); | 270 EXPECT_THAT(callback.proof(), IsNull()); |
| 217 } | 271 } |
| 218 | 272 |
| 219 TEST_P(LogDnsClientTest, | 273 TEST_P(LogDnsClientTest, |
| 220 QueryAuditProofReportsMalformedResponseIfLeafIndexIsEmpty) { | 274 QueryAuditProofReportsMalformedResponseIfLeafIndexIsEmpty) { |
| 221 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], ""); | 275 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], ""); |
| 222 | 276 |
| 223 MockAuditProofCallback callback; | 277 MockAuditProofCallback callback; |
| 224 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 278 ASSERT_THAT( |
| 279 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), | |
| 280 IsError(net::ERR_IO_PENDING)); | |
| 225 ASSERT_TRUE(callback.called()); | 281 ASSERT_TRUE(callback.called()); |
| 226 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 282 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 227 EXPECT_THAT(callback.proof(), IsNull()); | 283 EXPECT_THAT(callback.proof(), IsNull()); |
| 228 } | 284 } |
| 229 | 285 |
| 230 TEST_P(LogDnsClientTest, | 286 TEST_P(LogDnsClientTest, |
| 231 QueryAuditProofReportsMalformedResponseIfLeafIndexHasNonNumericPrefix) { | 287 QueryAuditProofReportsMalformedResponseIfLeafIndexHasNonNumericPrefix) { |
| 232 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "foo123456"); | 288 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "foo123456"); |
| 233 | 289 |
| 234 MockAuditProofCallback callback; | 290 MockAuditProofCallback callback; |
| 235 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 291 ASSERT_THAT( |
| 292 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), | |
| 293 IsError(net::ERR_IO_PENDING)); | |
| 236 ASSERT_TRUE(callback.called()); | 294 ASSERT_TRUE(callback.called()); |
| 237 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 295 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 238 EXPECT_THAT(callback.proof(), IsNull()); | 296 EXPECT_THAT(callback.proof(), IsNull()); |
| 239 } | 297 } |
| 240 | 298 |
| 241 TEST_P(LogDnsClientTest, | 299 TEST_P(LogDnsClientTest, |
| 242 QueryAuditProofReportsMalformedResponseIfLeafIndexHasNonNumericSuffix) { | 300 QueryAuditProofReportsMalformedResponseIfLeafIndexHasNonNumericSuffix) { |
| 243 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456foo"); | 301 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456foo"); |
| 244 | 302 |
| 245 MockAuditProofCallback callback; | 303 MockAuditProofCallback callback; |
| 246 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 304 ASSERT_THAT( |
| 305 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), | |
| 306 IsError(net::ERR_IO_PENDING)); | |
| 247 ASSERT_TRUE(callback.called()); | 307 ASSERT_TRUE(callback.called()); |
| 248 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 308 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 249 EXPECT_THAT(callback.proof(), IsNull()); | 309 EXPECT_THAT(callback.proof(), IsNull()); |
| 250 } | 310 } |
| 251 | 311 |
| 252 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLogDomainIsEmpty) { | 312 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLogDomainIsEmpty) { |
| 253 MockAuditProofCallback callback; | 313 MockAuditProofCallback callback; |
| 254 QueryAuditProof("", kLeafHashes[0], kTreeSizes[0], &callback); | 314 ASSERT_THAT(QueryAuditProof("", kLeafHashes[0], kTreeSizes[0], &callback), |
| 255 ASSERT_TRUE(callback.called()); | 315 IsError(net::ERR_INVALID_ARGUMENT)); |
| 256 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); | 316 ASSERT_FALSE(callback.called()); |
| 257 EXPECT_THAT(callback.proof(), IsNull()); | |
| 258 } | 317 } |
| 259 | 318 |
| 260 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLeafHashIsInvalid) { | 319 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLeafHashIsInvalid) { |
| 261 MockAuditProofCallback callback; | 320 MockAuditProofCallback callback; |
| 262 QueryAuditProof("ct.test", "foo", kTreeSizes[0], &callback); | 321 ASSERT_THAT(QueryAuditProof("ct.test", "foo", kTreeSizes[0], &callback), |
| 263 ASSERT_TRUE(callback.called()); | 322 IsError(net::ERR_INVALID_ARGUMENT)); |
| 264 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); | 323 ASSERT_FALSE(callback.called()); |
| 265 EXPECT_THAT(callback.proof(), IsNull()); | |
| 266 } | 324 } |
| 267 | 325 |
| 268 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLeafHashIsEmpty) { | 326 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLeafHashIsEmpty) { |
| 269 MockAuditProofCallback callback; | 327 MockAuditProofCallback callback; |
| 270 QueryAuditProof("ct.test", "", kTreeSizes[0], &callback); | 328 ASSERT_THAT(QueryAuditProof("ct.test", "", kTreeSizes[0], &callback), |
| 271 ASSERT_TRUE(callback.called()); | 329 IsError(net::ERR_INVALID_ARGUMENT)); |
| 272 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); | 330 ASSERT_FALSE(callback.called()); |
| 273 EXPECT_THAT(callback.proof(), IsNull()); | |
| 274 } | 331 } |
| 275 | 332 |
| 276 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLeafHashIsNull) { | 333 TEST_P(LogDnsClientTest, QueryAuditProofReportsInvalidArgIfLeafHashIsNull) { |
| 277 MockAuditProofCallback callback; | 334 MockAuditProofCallback callback; |
| 278 QueryAuditProof("ct.test", nullptr, kTreeSizes[0], &callback); | 335 ASSERT_THAT(QueryAuditProof("ct.test", nullptr, kTreeSizes[0], &callback), |
| 279 ASSERT_TRUE(callback.called()); | 336 IsError(net::ERR_INVALID_ARGUMENT)); |
| 280 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); | 337 ASSERT_FALSE(callback.called()); |
| 281 EXPECT_THAT(callback.proof(), IsNull()); | |
| 282 } | 338 } |
| 283 | 339 |
| 284 TEST_P(LogDnsClientTest, | 340 TEST_P(LogDnsClientTest, |
| 285 QueryAuditProofReportsSocketErrorsDuringLeafIndexRequests) { | 341 QueryAuditProofReportsSocketErrorsDuringLeafIndexRequests) { |
| 286 mock_dns_.ExpectRequestAndSocketError(kLeafIndexQnames[0], | 342 mock_dns_.ExpectRequestAndSocketError(kLeafIndexQnames[0], |
| 287 net::ERR_CONNECTION_REFUSED); | 343 net::ERR_CONNECTION_REFUSED); |
| 288 | 344 |
| 289 MockAuditProofCallback callback; | 345 MockAuditProofCallback callback; |
| 290 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 346 ASSERT_THAT( |
| 347 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), | |
| 348 IsError(net::ERR_IO_PENDING)); | |
| 291 ASSERT_TRUE(callback.called()); | 349 ASSERT_TRUE(callback.called()); |
| 292 EXPECT_THAT(callback.net_error(), IsError(net::ERR_CONNECTION_REFUSED)); | 350 EXPECT_THAT(callback.net_error(), IsError(net::ERR_CONNECTION_REFUSED)); |
| 293 EXPECT_THAT(callback.proof(), IsNull()); | 351 EXPECT_THAT(callback.proof(), IsNull()); |
| 294 } | 352 } |
| 295 | 353 |
| 296 TEST_P(LogDnsClientTest, | 354 TEST_P(LogDnsClientTest, |
| 297 QueryAuditProofReportsTimeoutsDuringLeafIndexRequests) { | 355 QueryAuditProofReportsTimeoutsDuringLeafIndexRequests) { |
| 298 mock_dns_.ExpectRequestAndTimeout(kLeafIndexQnames[0]); | 356 mock_dns_.ExpectRequestAndTimeout(kLeafIndexQnames[0]); |
| 299 | 357 |
| 300 MockAuditProofCallback callback; | 358 MockAuditProofCallback callback; |
| 301 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback); | 359 ASSERT_THAT( |
| 360 QueryAuditProof("ct.test", kLeafHashes[0], kTreeSizes[0], &callback), | |
| 361 IsError(net::ERR_IO_PENDING)); | |
| 362 | |
| 363 callback.WaitUntilRun(TestTimeouts::action_max_timeout()); | |
| 302 ASSERT_TRUE(callback.called()); | 364 ASSERT_TRUE(callback.called()); |
| 303 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_TIMED_OUT)); | 365 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_TIMED_OUT)); |
| 304 EXPECT_THAT(callback.proof(), IsNull()); | 366 EXPECT_THAT(callback.proof(), IsNull()); |
| 305 } | 367 } |
| 306 | 368 |
| 307 TEST_P(LogDnsClientTest, QueryAuditProof) { | 369 TEST_P(LogDnsClientTest, QueryAuditProof) { |
| 308 const std::vector<std::string> audit_proof = GetSampleAuditProof(20); | 370 const std::vector<std::string> audit_proof = GetSampleAuditProof(20); |
| 309 | 371 |
| 310 // Expect a leaf index query first, to map the leaf hash to a leaf index. | 372 // Expect a leaf index query first, to map the leaf hash to a leaf index. |
| 311 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); | 373 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); |
| 312 | 374 |
| 313 // It takes a number of DNS requests to retrieve the entire |audit_proof| | 375 // It takes a number of DNS requests to retrieve the entire |audit_proof| |
| 314 // (see |kMaxProofNodesPerDnsResponse|). | 376 // (see |kMaxProofNodesPerDnsResponse|). |
| 315 for (size_t nodes_begin = 0; nodes_begin < audit_proof.size(); | 377 for (size_t nodes_begin = 0; nodes_begin < audit_proof.size(); |
| 316 nodes_begin += kMaxProofNodesPerDnsResponse) { | 378 nodes_begin += kMaxProofNodesPerDnsResponse) { |
| 317 const size_t nodes_end = std::min( | 379 const size_t nodes_end = std::min( |
| 318 nodes_begin + kMaxProofNodesPerDnsResponse, audit_proof.size()); | 380 nodes_begin + kMaxProofNodesPerDnsResponse, audit_proof.size()); |
| 319 | 381 |
| 320 mock_dns_.ExpectAuditProofRequestAndResponse( | 382 mock_dns_.ExpectAuditProofRequestAndResponse( |
| 321 base::StringPrintf("%zu.123456.999999.tree.ct.test.", nodes_begin), | 383 base::StringPrintf("%zu.123456.999999.tree.ct.test.", nodes_begin), |
| 322 audit_proof.begin() + nodes_begin, audit_proof.begin() + nodes_end); | 384 audit_proof.begin() + nodes_begin, audit_proof.begin() + nodes_end); |
| 323 } | 385 } |
| 324 | 386 |
| 325 MockAuditProofCallback callback; | 387 MockAuditProofCallback callback; |
| 326 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 388 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 389 IsError(net::ERR_IO_PENDING)); | |
| 327 ASSERT_TRUE(callback.called()); | 390 ASSERT_TRUE(callback.called()); |
| 328 EXPECT_THAT(callback.net_error(), IsOk()); | 391 EXPECT_THAT(callback.net_error(), IsOk()); |
| 329 ASSERT_THAT(callback.proof(), NotNull()); | 392 ASSERT_THAT(callback.proof(), NotNull()); |
| 330 EXPECT_THAT(callback.proof()->leaf_index, Eq(123456u)); | 393 EXPECT_THAT(callback.proof()->leaf_index, Eq(123456u)); |
| 331 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. | 394 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. |
| 332 // EXPECT_THAT(callback.proof()->tree_size, Eq(999999)); | 395 // EXPECT_THAT(callback.proof()->tree_size, Eq(999999)); |
| 333 EXPECT_THAT(callback.proof()->nodes, Eq(audit_proof)); | 396 EXPECT_THAT(callback.proof()->nodes, Eq(audit_proof)); |
| 334 } | 397 } |
| 335 | 398 |
| 336 TEST_P(LogDnsClientTest, QueryAuditProofHandlesResponsesWithShortAuditPaths) { | 399 TEST_P(LogDnsClientTest, QueryAuditProofHandlesResponsesWithShortAuditPaths) { |
| (...skipping 16 matching lines...) Expand all Loading... | |
| 353 audit_proof.begin() + 6, | 416 audit_proof.begin() + 6, |
| 354 audit_proof.begin() + 10); | 417 audit_proof.begin() + 10); |
| 355 mock_dns_.ExpectAuditProofRequestAndResponse("10.123456.999999.tree.ct.test.", | 418 mock_dns_.ExpectAuditProofRequestAndResponse("10.123456.999999.tree.ct.test.", |
| 356 audit_proof.begin() + 10, | 419 audit_proof.begin() + 10, |
| 357 audit_proof.begin() + 13); | 420 audit_proof.begin() + 13); |
| 358 mock_dns_.ExpectAuditProofRequestAndResponse("13.123456.999999.tree.ct.test.", | 421 mock_dns_.ExpectAuditProofRequestAndResponse("13.123456.999999.tree.ct.test.", |
| 359 audit_proof.begin() + 13, | 422 audit_proof.begin() + 13, |
| 360 audit_proof.end()); | 423 audit_proof.end()); |
| 361 | 424 |
| 362 MockAuditProofCallback callback; | 425 MockAuditProofCallback callback; |
| 363 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 426 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 427 IsError(net::ERR_IO_PENDING)); | |
| 364 ASSERT_TRUE(callback.called()); | 428 ASSERT_TRUE(callback.called()); |
| 365 EXPECT_THAT(callback.net_error(), IsOk()); | 429 EXPECT_THAT(callback.net_error(), IsOk()); |
| 366 ASSERT_THAT(callback.proof(), NotNull()); | 430 ASSERT_THAT(callback.proof(), NotNull()); |
| 367 EXPECT_THAT(callback.proof()->leaf_index, Eq(123456u)); | 431 EXPECT_THAT(callback.proof()->leaf_index, Eq(123456u)); |
| 368 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. | 432 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. |
| 369 // EXPECT_THAT(callback.proof()->tree_size, Eq(999999)); | 433 // EXPECT_THAT(callback.proof()->tree_size, Eq(999999)); |
| 370 EXPECT_THAT(callback.proof()->nodes, Eq(audit_proof)); | 434 EXPECT_THAT(callback.proof()->nodes, Eq(audit_proof)); |
| 371 } | 435 } |
| 372 | 436 |
| 373 TEST_P(LogDnsClientTest, | 437 TEST_P(LogDnsClientTest, |
| 374 QueryAuditProofReportsThatAuditProofQnameDoesNotExist) { | 438 QueryAuditProofReportsThatAuditProofQnameDoesNotExist) { |
| 375 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); | 439 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); |
| 376 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", | 440 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", |
| 377 net::dns_protocol::kRcodeNXDOMAIN); | 441 net::dns_protocol::kRcodeNXDOMAIN); |
| 378 | 442 |
| 379 MockAuditProofCallback callback; | 443 MockAuditProofCallback callback; |
| 380 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 444 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 445 IsError(net::ERR_IO_PENDING)); | |
| 381 ASSERT_TRUE(callback.called()); | 446 ASSERT_TRUE(callback.called()); |
| 382 EXPECT_THAT(callback.net_error(), IsError(net::ERR_NAME_NOT_RESOLVED)); | 447 EXPECT_THAT(callback.net_error(), IsError(net::ERR_NAME_NOT_RESOLVED)); |
| 383 EXPECT_THAT(callback.proof(), IsNull()); | 448 EXPECT_THAT(callback.proof(), IsNull()); |
| 384 } | 449 } |
| 385 | 450 |
| 386 TEST_P(LogDnsClientTest, | 451 TEST_P(LogDnsClientTest, |
| 387 QueryAuditProofReportsServerFailureDuringAuditProofRequests) { | 452 QueryAuditProofReportsServerFailuresDuringAuditProofRequests) { |
| 388 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); | 453 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); |
| 389 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", | 454 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", |
| 390 net::dns_protocol::kRcodeSERVFAIL); | 455 net::dns_protocol::kRcodeSERVFAIL); |
| 391 | 456 |
| 392 MockAuditProofCallback callback; | 457 MockAuditProofCallback callback; |
| 393 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 458 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 459 IsError(net::ERR_IO_PENDING)); | |
| 394 ASSERT_TRUE(callback.called()); | 460 ASSERT_TRUE(callback.called()); |
| 395 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); | 461 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); |
| 396 EXPECT_THAT(callback.proof(), IsNull()); | 462 EXPECT_THAT(callback.proof(), IsNull()); |
| 397 } | 463 } |
| 398 | 464 |
| 399 TEST_P(LogDnsClientTest, | 465 TEST_P(LogDnsClientTest, |
| 400 QueryAuditProofReportsServerRefusalDuringAuditProofRequests) { | 466 QueryAuditProofReportsServerRefusalsDuringAuditProofRequests) { |
| 401 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); | 467 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); |
| 402 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", | 468 mock_dns_.ExpectRequestAndErrorResponse("0.123456.999999.tree.ct.test.", |
| 403 net::dns_protocol::kRcodeREFUSED); | 469 net::dns_protocol::kRcodeREFUSED); |
| 404 | 470 |
| 405 MockAuditProofCallback callback; | 471 MockAuditProofCallback callback; |
| 406 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 472 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 473 IsError(net::ERR_IO_PENDING)); | |
| 407 ASSERT_TRUE(callback.called()); | 474 ASSERT_TRUE(callback.called()); |
| 408 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); | 475 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_SERVER_FAILED)); |
| 409 EXPECT_THAT(callback.proof(), IsNull()); | 476 EXPECT_THAT(callback.proof(), IsNull()); |
| 410 } | 477 } |
| 411 | 478 |
| 412 TEST_P(LogDnsClientTest, | 479 TEST_P(LogDnsClientTest, |
| 413 QueryAuditProofReportsResponseMalformedIfNodeTooShort) { | 480 QueryAuditProofReportsResponseMalformedIfNodeTooShort) { |
| 414 // node is shorter than a SHA-256 hash (31 vs 32 bytes) | 481 // node is shorter than a SHA-256 hash (31 vs 32 bytes) |
| 415 const std::vector<std::string> audit_proof(1, std::string(31, 'a')); | 482 const std::vector<std::string> audit_proof(1, std::string(31, 'a')); |
| 416 | 483 |
| 417 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); | 484 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); |
| 418 mock_dns_.ExpectAuditProofRequestAndResponse( | 485 mock_dns_.ExpectAuditProofRequestAndResponse( |
| 419 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); | 486 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); |
| 420 | 487 |
| 421 MockAuditProofCallback callback; | 488 MockAuditProofCallback callback; |
| 422 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 489 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 490 IsError(net::ERR_IO_PENDING)); | |
| 423 ASSERT_TRUE(callback.called()); | 491 ASSERT_TRUE(callback.called()); |
| 424 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 492 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 425 EXPECT_THAT(callback.proof(), IsNull()); | 493 EXPECT_THAT(callback.proof(), IsNull()); |
| 426 } | 494 } |
| 427 | 495 |
| 428 TEST_P(LogDnsClientTest, QueryAuditProofReportsResponseMalformedIfNodeTooLong) { | 496 TEST_P(LogDnsClientTest, QueryAuditProofReportsResponseMalformedIfNodeTooLong) { |
| 429 // node is longer than a SHA-256 hash (33 vs 32 bytes) | 497 // node is longer than a SHA-256 hash (33 vs 32 bytes) |
| 430 const std::vector<std::string> audit_proof(1, std::string(33, 'a')); | 498 const std::vector<std::string> audit_proof(1, std::string(33, 'a')); |
| 431 | 499 |
| 432 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); | 500 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); |
| 433 mock_dns_.ExpectAuditProofRequestAndResponse( | 501 mock_dns_.ExpectAuditProofRequestAndResponse( |
| 434 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); | 502 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); |
| 435 | 503 |
| 436 MockAuditProofCallback callback; | 504 MockAuditProofCallback callback; |
| 437 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 505 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 506 IsError(net::ERR_IO_PENDING)); | |
| 438 ASSERT_TRUE(callback.called()); | 507 ASSERT_TRUE(callback.called()); |
| 439 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 508 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 440 EXPECT_THAT(callback.proof(), IsNull()); | 509 EXPECT_THAT(callback.proof(), IsNull()); |
| 441 } | 510 } |
| 442 | 511 |
| 443 TEST_P(LogDnsClientTest, QueryAuditProofReportsResponseMalformedIfEmpty) { | 512 TEST_P(LogDnsClientTest, QueryAuditProofReportsResponseMalformedIfEmpty) { |
| 444 const std::vector<std::string> audit_proof; | 513 const std::vector<std::string> audit_proof; |
| 445 | 514 |
| 446 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); | 515 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); |
| 447 mock_dns_.ExpectAuditProofRequestAndResponse( | 516 mock_dns_.ExpectAuditProofRequestAndResponse( |
| 448 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); | 517 "0.123456.999999.tree.ct.test.", audit_proof.begin(), audit_proof.end()); |
| 449 | 518 |
| 450 MockAuditProofCallback callback; | 519 MockAuditProofCallback callback; |
| 451 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 520 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 521 IsError(net::ERR_IO_PENDING)); | |
| 452 ASSERT_TRUE(callback.called()); | 522 ASSERT_TRUE(callback.called()); |
| 453 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); | 523 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_MALFORMED_RESPONSE)); |
| 454 EXPECT_THAT(callback.proof(), IsNull()); | 524 EXPECT_THAT(callback.proof(), IsNull()); |
| 455 } | 525 } |
| 456 | 526 |
| 457 TEST_P(LogDnsClientTest, | 527 TEST_P(LogDnsClientTest, |
| 458 QueryAuditProofReportsInvalidArgIfLeafIndexEqualToTreeSize) { | 528 QueryAuditProofReportsInvalidArgIfLeafIndexEqualToTreeSize) { |
| 459 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); | 529 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); |
| 460 | 530 |
| 461 MockAuditProofCallback callback; | 531 MockAuditProofCallback callback; |
| 462 QueryAuditProof("ct.test", kLeafHashes[0], 123456, &callback); | 532 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 123456, &callback), |
| 533 IsError(net::ERR_IO_PENDING)); | |
| 463 ASSERT_TRUE(callback.called()); | 534 ASSERT_TRUE(callback.called()); |
| 464 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); | 535 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); |
| 465 EXPECT_THAT(callback.proof(), IsNull()); | 536 EXPECT_THAT(callback.proof(), IsNull()); |
| 466 } | 537 } |
| 467 | 538 |
| 468 TEST_P(LogDnsClientTest, | 539 TEST_P(LogDnsClientTest, |
| 469 QueryAuditProofReportsInvalidArgIfLeafIndexGreaterThanTreeSize) { | 540 QueryAuditProofReportsInvalidArgIfLeafIndexGreaterThanTreeSize) { |
| 470 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "999999"); | 541 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "999999"); |
| 471 | 542 |
| 472 MockAuditProofCallback callback; | 543 MockAuditProofCallback callback; |
| 473 QueryAuditProof("ct.test", kLeafHashes[0], 123456, &callback); | 544 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 123456, &callback), |
| 545 IsError(net::ERR_IO_PENDING)); | |
| 474 ASSERT_TRUE(callback.called()); | 546 ASSERT_TRUE(callback.called()); |
| 475 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); | 547 EXPECT_THAT(callback.net_error(), IsError(net::ERR_INVALID_ARGUMENT)); |
| 476 EXPECT_THAT(callback.proof(), IsNull()); | 548 EXPECT_THAT(callback.proof(), IsNull()); |
| 477 } | 549 } |
| 478 | 550 |
| 479 TEST_P(LogDnsClientTest, | 551 TEST_P(LogDnsClientTest, |
| 480 QueryAuditProofReportsSocketErrorsDuringAuditProofRequests) { | 552 QueryAuditProofReportsSocketErrorsDuringAuditProofRequests) { |
| 481 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); | 553 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); |
| 482 mock_dns_.ExpectRequestAndSocketError("0.123456.999999.tree.ct.test.", | 554 mock_dns_.ExpectRequestAndSocketError("0.123456.999999.tree.ct.test.", |
| 483 net::ERR_CONNECTION_REFUSED); | 555 net::ERR_CONNECTION_REFUSED); |
| 484 | 556 |
| 485 MockAuditProofCallback callback; | 557 MockAuditProofCallback callback; |
| 486 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 558 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 559 IsError(net::ERR_IO_PENDING)); | |
| 487 ASSERT_TRUE(callback.called()); | 560 ASSERT_TRUE(callback.called()); |
| 488 EXPECT_THAT(callback.net_error(), IsError(net::ERR_CONNECTION_REFUSED)); | 561 EXPECT_THAT(callback.net_error(), IsError(net::ERR_CONNECTION_REFUSED)); |
| 489 EXPECT_THAT(callback.proof(), IsNull()); | 562 EXPECT_THAT(callback.proof(), IsNull()); |
| 490 } | 563 } |
| 491 | 564 |
| 492 TEST_P(LogDnsClientTest, | 565 TEST_P(LogDnsClientTest, |
| 493 QueryAuditProofReportsTimeoutsDuringAuditProofRequests) { | 566 QueryAuditProofReportsTimeoutsDuringAuditProofRequests) { |
| 494 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); | 567 mock_dns_.ExpectLeafIndexRequestAndResponse(kLeafIndexQnames[0], "123456"); |
| 495 mock_dns_.ExpectRequestAndTimeout("0.123456.999999.tree.ct.test."); | 568 mock_dns_.ExpectRequestAndTimeout("0.123456.999999.tree.ct.test."); |
| 496 | 569 |
| 497 MockAuditProofCallback callback; | 570 MockAuditProofCallback callback; |
| 498 QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback); | 571 ASSERT_THAT(QueryAuditProof("ct.test", kLeafHashes[0], 999999, &callback), |
| 572 IsError(net::ERR_IO_PENDING)); | |
| 573 | |
| 574 callback.WaitUntilRun(TestTimeouts::action_max_timeout()); | |
| 499 ASSERT_TRUE(callback.called()); | 575 ASSERT_TRUE(callback.called()); |
| 500 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_TIMED_OUT)); | 576 EXPECT_THAT(callback.net_error(), IsError(net::ERR_DNS_TIMED_OUT)); |
| 501 EXPECT_THAT(callback.proof(), IsNull()); | 577 EXPECT_THAT(callback.proof(), IsNull()); |
| 502 } | 578 } |
| 503 | 579 |
| 504 TEST_P(LogDnsClientTest, AdoptsLatestDnsConfigIfValid) { | 580 TEST_P(LogDnsClientTest, AdoptsLatestDnsConfigIfValid) { |
| 505 std::unique_ptr<net::DnsClient> tmp = mock_dns_.CreateDnsClient(); | 581 std::unique_ptr<net::DnsClient> tmp = mock_dns_.CreateDnsClient(); |
| 506 net::DnsClient* dns_client = tmp.get(); | 582 net::DnsClient* dns_client = tmp.get(); |
| 507 LogDnsClient log_client(std::move(tmp), net::NetLogWithSource(), 0); | 583 LogDnsClient log_client(std::move(tmp), net::NetLogWithSource(), 0); |
| 508 | 584 |
| (...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 552 base::StringPrintf("%zu.123456.999999.tree.ct.test.", nodes_begin), | 628 base::StringPrintf("%zu.123456.999999.tree.ct.test.", nodes_begin), |
| 553 audit_proof.begin() + nodes_begin, audit_proof.begin() + nodes_end); | 629 audit_proof.begin() + nodes_begin, audit_proof.begin() + nodes_end); |
| 554 } | 630 } |
| 555 | 631 |
| 556 std::unique_ptr<net::DnsClient> tmp = mock_dns_.CreateDnsClient(); | 632 std::unique_ptr<net::DnsClient> tmp = mock_dns_.CreateDnsClient(); |
| 557 net::DnsClient* dns_client = tmp.get(); | 633 net::DnsClient* dns_client = tmp.get(); |
| 558 LogDnsClient log_client(std::move(tmp), net::NetLogWithSource(), 0); | 634 LogDnsClient log_client(std::move(tmp), net::NetLogWithSource(), 0); |
| 559 | 635 |
| 560 // Start query. | 636 // Start query. |
| 561 MockAuditProofCallback callback; | 637 MockAuditProofCallback callback; |
| 562 QueryAuditProofAsync(&log_client, "ct.test", kLeafHashes[0], 999999, | 638 ASSERT_THAT(QueryAuditProofAsync(&log_client, "ct.test", kLeafHashes[0], |
| 563 callback.AsCallback()); | 639 999999, callback.AsCallback()), |
| 640 IsError(net::ERR_IO_PENDING)); | |
| 564 | 641 |
| 565 // Get the current DNS config, modify it and broadcast the update. | 642 // Get the current DNS config, modify it and broadcast the update. |
| 566 net::DnsConfig config(*dns_client->GetConfig()); | 643 net::DnsConfig config(*dns_client->GetConfig()); |
| 567 ASSERT_NE(123, config.attempts); | 644 ASSERT_NE(123, config.attempts); |
| 568 config.attempts = 123; | 645 config.attempts = 123; |
| 569 mock_dns_.SetDnsConfig(config); | 646 mock_dns_.SetDnsConfig(config); |
| 570 | 647 |
| 571 callback.WaitUntilRun(); | 648 callback.WaitUntilRun(TestTimeouts::action_max_timeout()); |
| 572 // Check that the DNS changes propogated before the query completed. | 649 // Check that the DNS changes propogated before the query completed. |
| 573 EXPECT_EQ(123, dns_client->GetConfig()->attempts); | 650 EXPECT_EQ(123, dns_client->GetConfig()->attempts); |
| 574 | 651 |
| 575 ASSERT_TRUE(callback.called()); | 652 ASSERT_TRUE(callback.called()); |
| 576 EXPECT_THAT(callback.net_error(), IsOk()); | 653 EXPECT_THAT(callback.net_error(), IsOk()); |
| 577 ASSERT_THAT(callback.proof(), NotNull()); | 654 ASSERT_THAT(callback.proof(), NotNull()); |
| 578 EXPECT_THAT(callback.proof()->leaf_index, Eq(123456u)); | 655 EXPECT_THAT(callback.proof()->leaf_index, Eq(123456u)); |
| 579 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. | 656 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. |
| 580 // EXPECT_THAT(callback.proof()->tree_size, Eq(999999)); | 657 // EXPECT_THAT(callback.proof()->tree_size, Eq(999999)); |
| 581 EXPECT_THAT(callback.proof()->nodes, Eq(audit_proof)); | 658 EXPECT_THAT(callback.proof()->nodes, Eq(audit_proof)); |
| (...skipping 52 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 634 base::StringPrintf("%zu.%" PRIu64 ".%" PRIu64 ".tree.ct.test.", | 711 base::StringPrintf("%zu.%" PRIu64 ".%" PRIu64 ".tree.ct.test.", |
| 635 start_node, kLeafIndices[query_i], | 712 start_node, kLeafIndices[query_i], |
| 636 kTreeSizes[query_i]), | 713 kTreeSizes[query_i]), |
| 637 proof.begin() + start_node, proof.begin() + end_node); | 714 proof.begin() + start_node, proof.begin() + end_node); |
| 638 } | 715 } |
| 639 } | 716 } |
| 640 } | 717 } |
| 641 | 718 |
| 642 // Start the queries. | 719 // Start the queries. |
| 643 for (size_t i = 0; i < kNumOfParallelQueries; ++i) { | 720 for (size_t i = 0; i < kNumOfParallelQueries; ++i) { |
| 644 QueryAuditProofAsync(log_client.get(), "ct.test", kLeafHashes[i], | 721 ASSERT_THAT( |
| 645 kTreeSizes[i], callbacks[i].AsCallback()); | 722 QueryAuditProofAsync(log_client.get(), "ct.test", kLeafHashes[i], |
| 723 kTreeSizes[i], callbacks[i].AsCallback()), | |
| 724 IsError(net::ERR_IO_PENDING)) | |
| 725 << "query #" << i; | |
| 646 } | 726 } |
| 647 | 727 |
| 648 // Wait for each query to complete and check its results. | 728 // Wait for each query to complete and check its results. |
| 649 for (size_t i = 0; i < kNumOfParallelQueries; ++i) { | 729 for (size_t i = 0; i < kNumOfParallelQueries; ++i) { |
| 650 MockAuditProofCallback& callback = callbacks[i]; | 730 MockAuditProofCallback& callback = callbacks[i]; |
| 651 callbacks[i].WaitUntilRun(); | 731 callbacks[i].WaitUntilRun(TestTimeouts::action_max_timeout()); |
| 652 | 732 |
| 653 SCOPED_TRACE(testing::Message() << "callbacks[" << i << "]"); | 733 SCOPED_TRACE(testing::Message() << "callbacks[" << i << "]"); |
| 654 ASSERT_TRUE(callback.called()); | 734 ASSERT_TRUE(callback.called()); |
| 655 EXPECT_THAT(callback.net_error(), IsOk()); | 735 EXPECT_THAT(callback.net_error(), IsOk()); |
| 656 ASSERT_THAT(callback.proof(), NotNull()); | 736 ASSERT_THAT(callback.proof(), NotNull()); |
| 657 EXPECT_THAT(callback.proof()->leaf_index, Eq(kLeafIndices[i])); | 737 EXPECT_THAT(callback.proof()->leaf_index, Eq(kLeafIndices[i])); |
| 658 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. | 738 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. |
| 659 // EXPECT_THAT(callback.proof()->tree_size, kTreeSizes[i]); | 739 // EXPECT_THAT(callback.proof()->tree_size, kTreeSizes[i]); |
| 660 EXPECT_THAT(callback.proof()->nodes, Eq(audit_proofs[i])); | 740 EXPECT_THAT(callback.proof()->nodes, Eq(audit_proofs[i])); |
| 661 } | 741 } |
| (...skipping 19 matching lines...) Expand all Loading... | |
| 681 audit_proof.begin() + 7, | 761 audit_proof.begin() + 7, |
| 682 audit_proof.begin() + 14); | 762 audit_proof.begin() + 14); |
| 683 mock_dns_.ExpectAuditProofRequestAndResponse("14.123456.999999.tree.ct.test.", | 763 mock_dns_.ExpectAuditProofRequestAndResponse("14.123456.999999.tree.ct.test.", |
| 684 audit_proof.begin() + 14, | 764 audit_proof.begin() + 14, |
| 685 audit_proof.end()); | 765 audit_proof.end()); |
| 686 | 766 |
| 687 const size_t kMaxConcurrentQueries = 1; | 767 const size_t kMaxConcurrentQueries = 1; |
| 688 std::unique_ptr<LogDnsClient> log_client = | 768 std::unique_ptr<LogDnsClient> log_client = |
| 689 CreateLogDnsClient(kMaxConcurrentQueries); | 769 CreateLogDnsClient(kMaxConcurrentQueries); |
| 690 | 770 |
| 691 // Start the queries. | 771 // Try to start the queries. |
| 692 MockAuditProofCallback callback1; | 772 MockAuditProofCallback callback1; |
| 693 QueryAuditProofAsync(log_client.get(), "ct.test", kLeafHashes[0], 999999, | 773 ASSERT_THAT(QueryAuditProofAsync(log_client.get(), "ct.test", kLeafHashes[0], |
| 694 callback1.AsCallback()); | 774 999999, callback1.AsCallback()), |
| 775 IsError(net::ERR_IO_PENDING)); | |
| 776 | |
| 695 MockAuditProofCallback callback2; | 777 MockAuditProofCallback callback2; |
| 696 QueryAuditProofAsync(log_client.get(), "ct.test", kLeafHashes[1], 999999, | 778 ASSERT_THAT(QueryAuditProofAsync(log_client.get(), "ct.test", kLeafHashes[1], |
| 697 callback2.AsCallback()); | 779 999999, callback2.AsCallback()), |
| 780 IsError(net::ERR_TEMPORARILY_THROTTLED)); | |
| 698 | 781 |
| 699 callback1.WaitUntilRun(); | 782 // Give the queries a chance to run. |
| 700 callback2.WaitUntilRun(); | 783 callback1.WaitUntilRun(TestTimeouts::action_max_timeout()); |
| 784 // This callback shouldn't run, so don't wait much longer for it. | |
| 785 callback2.WaitUntilRun(TestTimeouts::tiny_timeout()); | |
|
Eran Messeri
2016/09/30 09:26:52
Nit: Would it make sense to move that to line 795,
Rob Percival
2016/09/30 12:03:21
Done.
| |
| 701 | 786 |
| 702 // Check that the first query succeeded. | 787 // Check that the first query succeeded. |
| 703 ASSERT_TRUE(callback1.called()); | 788 ASSERT_TRUE(callback1.called()); |
| 704 EXPECT_THAT(callback1.net_error(), IsOk()); | 789 EXPECT_THAT(callback1.net_error(), IsOk()); |
| 705 ASSERT_THAT(callback1.proof(), NotNull()); | 790 ASSERT_THAT(callback1.proof(), NotNull()); |
| 706 EXPECT_THAT(callback1.proof()->leaf_index, Eq(123456u)); | 791 EXPECT_THAT(callback1.proof()->leaf_index, Eq(123456u)); |
| 707 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. | 792 // TODO(robpercival): Enable this once MerkleAuditProof has tree_size. |
| 708 // EXPECT_THAT(callback1.proof()->tree_size, Eq(999999)); | 793 // EXPECT_THAT(callback1.proof()->tree_size, Eq(999999)); |
| 709 EXPECT_THAT(callback1.proof()->nodes, Eq(audit_proof)); | 794 EXPECT_THAT(callback1.proof()->nodes, Eq(audit_proof)); |
| 710 | 795 |
| 711 // Check that the second query failed. | 796 // Check that the second query did not run. |
| 712 ASSERT_TRUE(callback2.called()); | 797 ASSERT_FALSE(callback2.called()); |
| 713 EXPECT_THAT(callback2.net_error(), IsError(net::ERR_TEMPORARILY_THROTTLED)); | |
| 714 EXPECT_THAT(callback2.proof(), IsNull()); | |
| 715 } | 798 } |
| 716 | 799 |
| 717 INSTANTIATE_TEST_CASE_P(ReadMode, | 800 INSTANTIATE_TEST_CASE_P(ReadMode, |
| 718 LogDnsClientTest, | 801 LogDnsClientTest, |
| 719 ::testing::Values(net::IoMode::ASYNC, | 802 ::testing::Values(net::IoMode::ASYNC, |
| 720 net::IoMode::SYNCHRONOUS)); | 803 net::IoMode::SYNCHRONOUS)); |
| 721 | 804 |
| 722 } // namespace | 805 } // namespace |
| 723 } // namespace certificate_transparency | 806 } // namespace certificate_transparency |
| OLD | NEW |