tests: sync common testing infrastructure with ndn-cxx
Upgrade waf to version 2.0.21
Change-Id: I30615cc49416088e9c5e4d602fd11360c0ed9328
diff --git a/tests/unit/daemon/rrset-factory.t.cpp b/tests/unit/daemon/rrset-factory.t.cpp
new file mode 100644
index 0000000..6f2eb69
--- /dev/null
+++ b/tests/unit/daemon/rrset-factory.t.cpp
@@ -0,0 +1,195 @@
+/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
+/*
+ * Copyright (c) 2014-2020, Regents of the University of California.
+ *
+ * This file is part of NDNS (Named Data Networking Domain Name Service).
+ * See AUTHORS.md for complete list of NDNS authors and contributors.
+ *
+ * NDNS is free software: you can redistribute it and/or modify it under the terms
+ * of the GNU General Public License as published by the Free Software Foundation,
+ * either version 3 of the License, or (at your option) any later version.
+ *
+ * NDNS is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
+ * without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
+ * PURPOSE. See the GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License along with
+ * NDNS, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+#include "daemon/rrset-factory.hpp"
+#include "mgmt/management-tool.hpp"
+
+#include "boost-test.hpp"
+#include "key-chain-fixture.hpp"
+
+#include <boost/lexical_cast.hpp>
+
+#include <ndn-cxx/security/verification-helpers.hpp>
+
+namespace ndn {
+namespace ndns {
+namespace tests {
+
+NDNS_LOG_INIT(RrsetFactoryTest);
+
+const auto TEST_DATABASE2 = boost::filesystem::path(UNIT_TESTS_TMPDIR) / "test-ndns.db";
+const auto TEST_CERT = boost::filesystem::path(UNIT_TESTS_TMPDIR) / "anchors" / "root.cert";
+
+class RrsetFactoryFixture : public KeyChainFixture
+{
+public:
+ RrsetFactoryFixture()
+ : TEST_IDENTITY_NAME("/rrest/factory")
+ , m_session(TEST_DATABASE2.string())
+ , m_zoneName(TEST_IDENTITY_NAME)
+ {
+ Zone zone1;
+ zone1.setName(m_zoneName);
+ zone1.setTtl(time::seconds(4600));
+ BOOST_CHECK_NO_THROW(m_session.insert(zone1));
+
+ Name identityName = Name(TEST_IDENTITY_NAME).append("NDNS");
+
+ m_identity = m_keyChain.createIdentity(identityName);
+ m_cert = m_identity.getDefaultKey().getDefaultCertificate();
+ m_certName = m_cert.getName();
+ saveIdentityCert(m_identity, TEST_CERT.string());
+
+ NDNS_LOG_INFO("save test root cert " << m_certName << " to: " << TEST_CERT);
+ BOOST_CHECK_GT(m_certName.size(), 0);
+ NDNS_LOG_TRACE("test certName: " << m_certName);
+ }
+
+ ~RrsetFactoryFixture()
+ {
+ m_session.close();
+ NDNS_LOG_INFO("remove database " << TEST_DATABASE2);
+ boost::filesystem::remove(TEST_DATABASE2);
+ boost::filesystem::remove(TEST_CERT);
+ }
+
+public:
+ const Name TEST_IDENTITY_NAME;
+ ndns::DbMgr m_session;
+ Name m_zoneName;
+ Name m_certName;
+ Identity m_identity;
+ Certificate m_cert;
+};
+
+BOOST_FIXTURE_TEST_SUITE(RrsetFactoryTest, RrsetFactoryFixture)
+
+BOOST_AUTO_TEST_CASE(CheckZoneKey)
+{
+ // zone throws check: zone not exists
+ RrsetFactory rf1(TEST_DATABASE2, "/not/exist/zone", m_keyChain, m_certName);
+ BOOST_CHECK_THROW(rf1.checkZoneKey(), ndns::RrsetFactory::Error);
+
+ // cert throws check: !matchCertificate
+ RrsetFactory rf2(TEST_DATABASE2, m_zoneName, m_keyChain, "wrongCert");
+ BOOST_CHECK_THROW(rf2.checkZoneKey(), std::runtime_error);
+
+ RrsetFactory rf3(TEST_DATABASE2, m_zoneName, m_keyChain, m_certName);
+ BOOST_CHECK_NO_THROW(rf3.checkZoneKey());
+}
+
+BOOST_AUTO_TEST_CASE(GenerateNsRrset)
+{
+ Name label("/nstest");
+ name::Component type = label::NS_RR_TYPE;
+ uint64_t version = 1234;
+ time::seconds ttl(2000);
+ Zone zone(m_zoneName);
+ m_session.find(zone);
+
+ RrsetFactory rf(TEST_DATABASE2, m_zoneName, m_keyChain, m_certName);
+
+ // rf without checkZoneKey: throw.
+ ndn::DelegationList delegations;
+ BOOST_CHECK_THROW(rf.generateNsRrset(label, version, ttl, delegations),
+ ndns::RrsetFactory::Error);
+ rf.checkZoneKey();
+
+ for (int i = 1; i <= 4; i++) {
+ Name name("/delegation/" + std::to_string(i));
+ delegations.insert(i, name);
+ }
+
+ Rrset rrset = rf.generateNsRrset(label, version, ttl, delegations);
+
+ BOOST_CHECK_EQUAL(rrset.getId(), 0);
+ BOOST_REQUIRE(rrset.getZone() != nullptr);
+ BOOST_CHECK_EQUAL(*rrset.getZone(), zone);
+ BOOST_CHECK_EQUAL(rrset.getLabel(), label);
+ BOOST_CHECK_EQUAL(rrset.getType(), type);
+ BOOST_CHECK_EQUAL(rrset.getVersion().toVersion(), version);
+ BOOST_CHECK_EQUAL(rrset.getTtl(), ttl);
+
+ const Name linkName("/rrest/factory/NDNS/nstest/NS/%FD%04%D2");
+ Link link;
+ BOOST_CHECK_NO_THROW(link.wireDecode(rrset.getData()));
+
+ BOOST_CHECK_EQUAL(link.getName(), linkName);
+ BOOST_CHECK_EQUAL(link.getContentType(), NDNS_LINK);
+ BOOST_CHECK(link.getDelegationList() == delegations);
+
+ // BOOST_CHECK_EQUAL(Validator::verifySignature(link, m_cert.getPublicKeyInfo()), true);
+ security::verifySignature(link, m_cert);
+}
+
+BOOST_AUTO_TEST_CASE(GenerateTxtRrset)
+{
+ Name label("/txttest");
+ name::Component type = label::TXT_RR_TYPE;
+ uint64_t version = 1234;
+ time::seconds ttl(2000);
+ std::vector<std::string> txts;
+ Zone zone(m_zoneName);
+ m_session.find(zone);
+
+ RrsetFactory rf(TEST_DATABASE2, m_zoneName, m_keyChain, m_certName);
+
+ // rf without checkZoneKey: throw.
+ BOOST_CHECK_THROW(rf.generateTxtRrset(label, version, ttl, txts),
+ ndns::RrsetFactory::Error);
+ rf.checkZoneKey();
+ BOOST_CHECK_NO_THROW(rf.generateTxtRrset(label, version, ttl, txts));
+ rf.checkZoneKey();
+
+ for (int i = 1; i <= 4; i++) {
+ txts.push_back(std::to_string(i));
+ }
+
+ Rrset rrset = rf.generateTxtRrset(label, version, ttl, txts);
+
+ BOOST_CHECK_EQUAL(rrset.getId(), 0);
+ BOOST_CHECK_EQUAL(*rrset.getZone(), zone);
+ BOOST_CHECK_EQUAL(rrset.getLabel(), label);
+ BOOST_CHECK_EQUAL(rrset.getType(), type);
+ BOOST_CHECK_EQUAL(rrset.getVersion().toVersion(), version);
+ BOOST_CHECK_EQUAL(rrset.getTtl(), ttl);
+
+ Name dataName = m_zoneName.append(label::NDNS_ITERATIVE_QUERY)
+ .append(label)
+ .append(type)
+ .append(rrset.getVersion());
+
+ Data data;
+ BOOST_CHECK_NO_THROW(data.wireDecode(rrset.getData()));
+
+ BOOST_CHECK_EQUAL(data.getName(), dataName);
+ BOOST_CHECK_EQUAL(data.getContentType(), NDNS_RESP);
+
+ BOOST_CHECK(txts == RrsetFactory::wireDecodeTxt(data.getContent()));
+
+ // shared_ptr<IdentityCertificate> cert = m_keyChain.getCertificate(m_certName);
+ // BOOST_CHECK(Validator::verifySignature(data, cert->getPublicKeyInfo()));
+ security::verifySignature(data, m_cert);
+}
+
+BOOST_AUTO_TEST_SUITE_END()
+
+} // namespace tests
+} // namespace ndns
+} // namespace ndn