mirror of
https://github.com/monero-project/monero.git
synced 2024-10-01 11:49:47 -04:00
5ef0607da6
Update copyright year to 2020
176 lines
6.2 KiB
C++
176 lines
6.2 KiB
C++
// Copyright (c) 2014-2020, The Monero Project
|
|
//
|
|
// All rights reserved.
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
// permitted provided that the following conditions are met:
|
|
//
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
// conditions and the following disclaimer.
|
|
//
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
// materials provided with the distribution.
|
|
//
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
// used to endorse or promote products derived from this software without specific
|
|
// prior written permission.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
#include <iostream>
|
|
#include <vector>
|
|
|
|
#include "gtest/gtest.h"
|
|
|
|
#include "common/dns_utils.h"
|
|
|
|
TEST(DNSResolver, IPv4Success)
|
|
{
|
|
tools::DNSResolver resolver = tools::DNSResolver::create();
|
|
|
|
bool avail, valid;
|
|
|
|
auto ips = resolver.get_ipv4("example.com", avail, valid);
|
|
|
|
ASSERT_EQ(1, ips.size());
|
|
|
|
//ASSERT_STREQ("93.184.216.119", ips[0].c_str());
|
|
|
|
ips = tools::DNSResolver::instance().get_ipv4("example.com", avail, valid);
|
|
|
|
ASSERT_EQ(1, ips.size());
|
|
|
|
//ASSERT_STREQ("93.184.216.119", ips[0].c_str());
|
|
}
|
|
|
|
TEST(DNSResolver, IPv4Failure)
|
|
{
|
|
// guaranteed by IANA/ICANN/RFC to be invalid
|
|
tools::DNSResolver resolver = tools::DNSResolver::create();
|
|
|
|
bool avail, valid;
|
|
|
|
auto ips = resolver.get_ipv4("example.invalid", avail, valid);
|
|
|
|
ASSERT_EQ(0, ips.size());
|
|
|
|
ips = tools::DNSResolver::instance().get_ipv4("example.invalid", avail, valid);
|
|
|
|
ASSERT_EQ(0, ips.size());
|
|
}
|
|
|
|
TEST(DNSResolver, DNSSECSuccess)
|
|
{
|
|
tools::DNSResolver resolver = tools::DNSResolver::create();
|
|
|
|
bool avail, valid;
|
|
|
|
auto ips = resolver.get_ipv4("example.com", avail, valid);
|
|
|
|
ASSERT_EQ(1, ips.size());
|
|
|
|
//ASSERT_STREQ("93.184.216.119", ips[0].c_str());
|
|
|
|
ASSERT_TRUE(avail);
|
|
ASSERT_TRUE(valid);
|
|
}
|
|
|
|
TEST(DNSResolver, DNSSECFailure)
|
|
{
|
|
tools::DNSResolver resolver = tools::DNSResolver::create();
|
|
|
|
bool avail, valid;
|
|
|
|
auto ips = resolver.get_ipv4("dnssec-failed.org", avail, valid);
|
|
|
|
ASSERT_EQ(1, ips.size());
|
|
|
|
//ASSERT_STREQ("93.184.216.119", ips[0].c_str());
|
|
|
|
ASSERT_TRUE(avail);
|
|
ASSERT_FALSE(valid);
|
|
}
|
|
|
|
// It would be great to include an IPv6 test and assume it'll pass, but not every ISP / resolver plays nicely with IPv6;)
|
|
/*TEST(DNSResolver, IPv6Success)
|
|
{
|
|
tools::DNSResolver resolver = tools::DNSResolver::create();
|
|
|
|
bool avail, valid;
|
|
|
|
auto ips = resolver.get_ipv6("example.com", avail, valid);
|
|
|
|
ASSERT_EQ(1, ips.size());
|
|
|
|
ASSERT_STREQ("2606:2800:220:6d:26bf:1447:1097:aa7", ips[0].c_str());
|
|
|
|
ips = tools::DNSResolver::instance().get_ipv6("example.com", avail, valid);
|
|
|
|
ASSERT_EQ(1, ips.size());
|
|
|
|
ASSERT_STREQ("2606:2800:220:6d:26bf:1447:1097:aa7", ips[0].c_str());
|
|
}*/
|
|
|
|
TEST(DNSResolver, IPv6Failure)
|
|
{
|
|
// guaranteed by IANA/ICANN/RFC to be invalid
|
|
tools::DNSResolver resolver = tools::DNSResolver::create();
|
|
|
|
bool avail, valid;
|
|
|
|
auto ips = resolver.get_ipv6("example.invalid", avail, valid);
|
|
|
|
ASSERT_EQ(0, ips.size());
|
|
|
|
ips = tools::DNSResolver::instance().get_ipv6("example.invalid", avail, valid);
|
|
|
|
ASSERT_EQ(0, ips.size());
|
|
}
|
|
|
|
TEST(DNSResolver, GetTXTRecord)
|
|
{
|
|
bool avail, valid;
|
|
|
|
std::vector<std::string> records = tools::DNSResolver::instance().get_txt_record("donate.getmonero.org", avail, valid);
|
|
|
|
EXPECT_NE(0, records.size());
|
|
|
|
for (auto& rec : records)
|
|
{
|
|
std::cout << "TXT record for donate.getmonero.org: " << rec << std::endl;
|
|
}
|
|
|
|
// replace first @ with .
|
|
std::string addr = tools::DNSResolver::instance().get_dns_format_from_oa_address("donate@getmonero.org");
|
|
EXPECT_STREQ("donate.getmonero.org", addr.c_str());
|
|
|
|
// no change
|
|
addr = tools::DNSResolver::instance().get_dns_format_from_oa_address("donate.getmonero.org");
|
|
EXPECT_STREQ("donate.getmonero.org", addr.c_str());
|
|
}
|
|
|
|
bool is_equal(const char *s, const std::vector<std::string> &v) { return v.size() == 1 && v[0] == s; }
|
|
|
|
TEST(DNS_PUBLIC, empty) { EXPECT_TRUE(tools::dns_utils::parse_dns_public("").empty()); }
|
|
TEST(DNS_PUBLIC, default) { EXPECT_TRUE(tools::dns_utils::parse_dns_public("tcp").size() > 0); }
|
|
TEST(DNS_PUBLIC, invalid_scheme) { EXPECT_TRUE(tools::dns_utils::parse_dns_public("invalid").empty()); }
|
|
TEST(DNS_PUBLIC, invalid_ip_alpha) { EXPECT_TRUE(tools::dns_utils::parse_dns_public("tcp://invalid").empty()); }
|
|
TEST(DNS_PUBLIC, invalid_ip_num1) { EXPECT_TRUE(tools::dns_utils::parse_dns_public("tcp://3").empty()); }
|
|
TEST(DNS_PUBLIC, invalid_ip_num3) { EXPECT_TRUE(tools::dns_utils::parse_dns_public("tcp://3.4.5").empty()); }
|
|
TEST(DNS_PUBLIC, invalid_ip_num4_extra) { EXPECT_TRUE(tools::dns_utils::parse_dns_public("tcp://3.4.5.6x").empty()); }
|
|
TEST(DNS_PUBLIC, invalid_ip_num4_range) { EXPECT_TRUE(tools::dns_utils::parse_dns_public("tcp://3.4.542.6").empty()); }
|
|
TEST(DNS_PUBLIC, invalid_ip_dot) { EXPECT_TRUE(tools::dns_utils::parse_dns_public("tcp://3.4.5.6.").empty()); }
|
|
TEST(DNS_PUBLIC, invalid_ip_num5) { EXPECT_TRUE(tools::dns_utils::parse_dns_public("tcp://3.4.5.6.7").empty()); }
|
|
TEST(DNS_PUBLIC, invalid_ip_4_missing) { EXPECT_TRUE(tools::dns_utils::parse_dns_public("tcp://3.4..7").empty()); }
|
|
TEST(DNS_PUBLIC, valid_ip_lo) { EXPECT_TRUE(is_equal("127.0.0.1", tools::dns_utils::parse_dns_public("tcp://127.0.0.1"))); }
|
|
TEST(DNS_PUBLIC, valid_ip) { EXPECT_TRUE(is_equal("3.4.5.6", tools::dns_utils::parse_dns_public("tcp://3.4.5.6"))); }
|