source: trunk/server/lib/dnspython/tests/message.py

Last change on this file was 745, checked in by Silvan Scherrer, 13 years ago

Samba Server: updated trunk to 3.6.0

File size: 5.6 KB
Line 
1# Copyright (C) 2003-2007, 2009, 2010 Nominum, Inc.
2#
3# Permission to use, copy, modify, and distribute this software and its
4# documentation for any purpose with or without fee is hereby granted,
5# provided that the above copyright notice and this permission notice
6# appear in all copies.
7#
8# THE SOFTWARE IS PROVIDED "AS IS" AND NOMINUM DISCLAIMS ALL WARRANTIES
9# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL NOMINUM BE LIABLE FOR
11# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
14# OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15
16import cStringIO
17import os
18import unittest
19
20import dns.exception
21import dns.message
22
23query_text = """id 1234
24opcode QUERY
25rcode NOERROR
26flags RD
27edns 0
28eflags DO
29payload 4096
30;QUESTION
31wwww.dnspython.org. IN A
32;ANSWER
33;AUTHORITY
34;ADDITIONAL"""
35
36goodhex = '04d201000001000000000001047777777709646e73707974686f6e' \
37 '036f726700000100010000291000000080000000'
38
39goodwire = goodhex.decode('hex_codec')
40
41answer_text = """id 1234
42opcode QUERY
43rcode NOERROR
44flags QR AA RD
45;QUESTION
46dnspython.org. IN SOA
47;ANSWER
48dnspython.org. 3600 IN SOA woof.dnspython.org. hostmaster.dnspython.org. 2003052700 3600 1800 604800 3600
49;AUTHORITY
50dnspython.org. 3600 IN NS ns1.staff.nominum.org.
51dnspython.org. 3600 IN NS ns2.staff.nominum.org.
52dnspython.org. 3600 IN NS woof.play-bow.org.
53;ADDITIONAL
54woof.play-bow.org. 3600 IN A 204.152.186.150
55"""
56
57goodhex2 = '04d2 8500 0001 0001 0003 0001' \
58 '09646e73707974686f6e036f726700 0006 0001' \
59 'c00c 0006 0001 00000e10 0028 ' \
60 '04776f6f66c00c 0a686f73746d6173746572c00c' \
61 '7764289c 00000e10 00000708 00093a80 00000e10' \
62 'c00c 0002 0001 00000e10 0014' \
63 '036e7331057374616666076e6f6d696e756dc016' \
64 'c00c 0002 0001 00000e10 0006 036e7332c063' \
65 'c00c 0002 0001 00000e10 0010 04776f6f6608706c61792d626f77c016' \
66 'c091 0001 0001 00000e10 0004 cc98ba96'
67
68
69goodwire2 = goodhex2.replace(' ', '').decode('hex_codec')
70
71query_text_2 = """id 1234
72opcode QUERY
73rcode 4095
74flags RD
75edns 0
76eflags DO
77payload 4096
78;QUESTION
79wwww.dnspython.org. IN A
80;ANSWER
81;AUTHORITY
82;ADDITIONAL"""
83
84goodhex3 = '04d2010f0001000000000001047777777709646e73707974686f6e' \
85 '036f726700000100010000291000ff0080000000'
86
87goodwire3 = goodhex3.decode('hex_codec')
88
89class MessageTestCase(unittest.TestCase):
90
91 def test_comparison_eq1(self):
92 q1 = dns.message.from_text(query_text)
93 q2 = dns.message.from_text(query_text)
94 self.failUnless(q1 == q2)
95
96 def test_comparison_ne1(self):
97 q1 = dns.message.from_text(query_text)
98 q2 = dns.message.from_text(query_text)
99 q2.id = 10
100 self.failUnless(q1 != q2)
101
102 def test_comparison_ne2(self):
103 q1 = dns.message.from_text(query_text)
104 q2 = dns.message.from_text(query_text)
105 q2.question = []
106 self.failUnless(q1 != q2)
107
108 def test_comparison_ne3(self):
109 q1 = dns.message.from_text(query_text)
110 self.failUnless(q1 != 1)
111
112 def test_EDNS_to_wire1(self):
113 q = dns.message.from_text(query_text)
114 w = q.to_wire()
115 self.failUnless(w == goodwire)
116
117 def test_EDNS_from_wire1(self):
118 m = dns.message.from_wire(goodwire)
119 self.failUnless(str(m) == query_text)
120
121 def test_EDNS_to_wire2(self):
122 q = dns.message.from_text(query_text_2)
123 w = q.to_wire()
124 self.failUnless(w == goodwire3)
125
126 def test_EDNS_from_wire2(self):
127 m = dns.message.from_wire(goodwire3)
128 self.failUnless(str(m) == query_text_2)
129
130 def test_TooBig(self):
131 def bad():
132 q = dns.message.from_text(query_text)
133 for i in xrange(0, 25):
134 rrset = dns.rrset.from_text('foo%d.' % i, 3600,
135 dns.rdataclass.IN,
136 dns.rdatatype.A,
137 '10.0.0.%d' % i)
138 q.additional.append(rrset)
139 w = q.to_wire(max_size=512)
140 self.failUnlessRaises(dns.exception.TooBig, bad)
141
142 def test_answer1(self):
143 a = dns.message.from_text(answer_text)
144 wire = a.to_wire(want_shuffle=False)
145 self.failUnless(wire == goodwire2)
146
147 def test_TrailingJunk(self):
148 def bad():
149 badwire = goodwire + '\x00'
150 m = dns.message.from_wire(badwire)
151 self.failUnlessRaises(dns.message.TrailingJunk, bad)
152
153 def test_ShortHeader(self):
154 def bad():
155 badwire = '\x00' * 11
156 m = dns.message.from_wire(badwire)
157 self.failUnlessRaises(dns.message.ShortHeader, bad)
158
159 def test_RespondingToResponse(self):
160 def bad():
161 q = dns.message.make_query('foo', 'A')
162 r1 = dns.message.make_response(q)
163 r2 = dns.message.make_response(r1)
164 self.failUnlessRaises(dns.exception.FormError, bad)
165
166 def test_ExtendedRcodeSetting(self):
167 m = dns.message.make_query('foo', 'A')
168 m.set_rcode(4095)
169 self.failUnless(m.rcode() == 4095)
170 m.set_rcode(2)
171 self.failUnless(m.rcode() == 2)
172
173 def test_EDNSVersionCoherence(self):
174 m = dns.message.make_query('foo', 'A')
175 m.use_edns(1)
176 self.failUnless((m.ednsflags >> 16) & 0xFF == 1)
177
178if __name__ == '__main__':
179 unittest.main()
Note: See TracBrowser for help on using the repository browser.