regression tests: Properly handle adnshost et al exit status
[adns] / client / adnstest.c
1 /*
2 * adnstest.c
3 * - simple test program, not part of the library
4 */
5 /*
6 * This file is part of adns, which is
7 * Copyright (C) 1997-2000,2003,2006,2014 Ian Jackson
8 * Copyright (C) 2014 Mark Wooding
9 * Copyright (C) 1999-2000,2003,2006 Tony Finch
10 * Copyright (C) 1991 Massachusetts Institute of Technology
11 * (See the file INSTALL for full details.)
12 *
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License as published by
15 * the Free Software Foundation; either version 3, or (at your option)
16 * any later version.
17 *
18 * This program is distributed in the hope that it will be useful,
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 * GNU General Public License for more details.
22 *
23 * You should have received a copy of the GNU General Public License
24 * along with this program; if not, write to the Free Software Foundation.
25 */
26
27 #include <stdio.h>
28 #include <sys/time.h>
29 #include <unistd.h>
30 #include <assert.h>
31 #include <stdlib.h>
32 #include <string.h>
33 #include <errno.h>
34
35 #define ADNS_FEATURE_MANYAF
36 #include "config.h"
37 #include "adns.h"
38
39 #ifdef ADNS_REGRESS_TEST
40 # include "hredirect.h"
41 # undef exit
42 # define exit Texit
43 #endif
44
45 struct myctx {
46 adns_query qu;
47 int doneyet, found;
48 const char *fdom;
49 };
50
51 static struct myctx *mcs;
52 static adns_state ads;
53 static adns_rrtype *types_a;
54
55 static void quitnow(int rc) NONRETURNING;
56 static void quitnow(int rc) {
57 free(mcs);
58 free(types_a);
59 if (ads) adns_finish(ads);
60
61 exit(rc);
62 }
63
64 #ifndef HAVE_POLL
65 #undef poll
66 int poll(struct pollfd *ufds, int nfds, int timeout) {
67 fputs("poll(2) not supported on this system\n",stderr);
68 quitnow(5);
69 }
70 #define adns_beforepoll(a,b,c,d,e) 0
71 #define adns_afterpoll(a,b,c,d) 0
72 #endif
73
74 static void failure_status(const char *what, adns_status st) NONRETURNING;
75 static void failure_status(const char *what, adns_status st) {
76 fprintf(stderr,"adns failure: %s: %s\n",what,adns_strerror(st));
77 quitnow(2);
78 }
79
80 static void failure_errno(const char *what, int errnoval) NONRETURNING;
81 static void failure_errno(const char *what, int errnoval) {
82 switch (errnoval) {
83 #define CE(e) \
84 case e: fprintf(stderr,"adns failure: %s: errno=" #e "\n",what); break
85 CE(EINVAL);
86 CE(EINTR);
87 CE(ESRCH);
88 CE(EAGAIN);
89 CE(ENOSYS);
90 CE(ERANGE);
91 #undef CE
92 default: fprintf(stderr,"adns failure: %s: errno=%d\n",what,errnoval); break;
93 }
94 quitnow(2);
95 }
96
97 static void usageerr(const char *why) NONRETURNING;
98 static void usageerr(const char *why) {
99 fprintf(stderr,
100 "bad usage: %s\n"
101 "usage: adnstest [-<initflagsnum>[,<owninitflags>]] [/<initstring>]\n"
102 " [ :<typenum>,... ]\n"
103 " [ [<queryflagsnum>[,<ownqueryflags>]/]<domain> ... ]\n"
104 "initflags: p use poll(2) instead of select(2)\n"
105 " s use adns_wait with specified query, instead of 0\n"
106 "queryflags: a print status abbrevs instead of strings\n"
107 "typenum: may be 0x<hex>|<dec>, or 0x<hex> or <dec>\n"
108 "exit status: 0 ok (though some queries may have failed)\n"
109 " 1 used by test harness to indicate test failed\n"
110 " 2 unable to submit or init or some such\n"
111 " 3 unexpected failure\n"
112 " 4 usage error\n"
113 " 5 operation not supported on this system\n",
114 why);
115 quitnow(4);
116 }
117
118 static const adns_rrtype defaulttypes[]= {
119 adns_r_a,
120 adns_r_ns_raw,
121 adns_r_cname,
122 adns_r_soa_raw,
123 adns_r_ptr_raw,
124 adns_r_hinfo,
125 adns_r_mx_raw,
126 adns_r_txt,
127 adns_r_rp_raw,
128
129 adns_r_addr,
130 adns_r_ns,
131 adns_r_ptr,
132 adns_r_mx,
133
134 adns_r_soa,
135 adns_r_rp,
136
137 adns_r_none
138 };
139
140 static void dumptype(adns_status ri, const char *rrtn, const char *fmtn) {
141 fprintf(stdout, "%s(%s)%s%s",
142 (!ri && rrtn) ? rrtn : "?", ri ? "?" : fmtn ? fmtn : "-",
143 ri ? " " : "", ri ? adns_strerror(ri) : "");
144 }
145
146 static void fdom_split(const char *fdom, const char **dom_r, int *qf_r,
147 char *ownflags, int ownflags_l) {
148 int qf;
149 char *ep;
150
151 qf= strtoul(fdom,&ep,0);
152 if (*ep == ',' && strchr(ep,'/')) {
153 ep++;
154 while (*ep != '/') {
155 if (--ownflags_l <= 0) { fputs("too many flags\n",stderr); quitnow(3); }
156 *ownflags++= *ep++;
157 }
158 }
159 if (*ep != '/') { *dom_r= fdom; *qf_r= 0; }
160 else { *dom_r= ep+1; *qf_r= qf; }
161 *ownflags= 0;
162 }
163
164 static int consistsof(const char *string, const char *accept) {
165 return strspn(string,accept) == strlen(string);
166 }
167
168 int main(int argc, char *const *argv) {
169 adns_query qu;
170 struct myctx *mc, *mcw;
171 void *mcr;
172 adns_answer *ans;
173 const char *initstring, *rrtn, *fmtn;
174 const char *const *fdomlist, *domain;
175 char *show, *cp;
176 int len, i, qc, qi, tc, ti, ch, qflags, initflagsnum;
177 adns_status ri;
178 int r;
179 const adns_rrtype *types;
180 struct timeval now;
181 char ownflags[10];
182 char *ep;
183 const char *initflags, *owninitflags;
184
185 if (argv[0] && argv[1] && argv[1][0] == '-') {
186 initflags= argv[1]+1;
187 argv++;
188 } else {
189 initflags= "";
190 }
191 if (argv[0] && argv[1] && argv[1][0] == '/') {
192 initstring= argv[1]+1;
193 argv++;
194 } else {
195 initstring= 0;
196 }
197
198 initflagsnum= strtoul(initflags,&ep,0);
199 if (*ep == ',') {
200 owninitflags= ep+1;
201 if (!consistsof(owninitflags,"ps")) usageerr("unknown owninitflag");
202 } else if (!*ep) {
203 owninitflags= "";
204 } else {
205 usageerr("bad <initflagsnum>[,<owninitflags>]");
206 }
207
208 if (argv[0] && argv[1] && argv[1][0] == ':') {
209 for (cp= argv[1]+1, tc=1; (ch= *cp); cp++)
210 if (ch==',') tc++;
211 types_a= malloc(sizeof(*types_a)*(tc+1));
212 if (!types_a) { perror("malloc types"); quitnow(3); }
213 for (cp= argv[1]+1, ti=0; ti<tc; ) {
214 types_a[ti]= 0;
215 for (;;) {
216 types_a[ti] |= strtoul(cp,&cp,0);
217 ch= *cp;
218 if (!ch) break;
219 cp++;
220 if (ch=='|') continue;
221 if (ch==',') break;
222 usageerr("unexpected char (not comma) in or between types");
223 }
224 ti++;
225 if (!ch) break;
226 }
227 types_a[ti]= adns_r_none;
228 types= types_a;
229 argv++;
230 } else {
231 types_a= 0;
232 types= defaulttypes;
233 }
234
235 if (!(argv[0] && argv[1])) usageerr("no query domains supplied");
236 fdomlist= (const char *const*)argv+1;
237
238 for (qc=0; fdomlist[qc]; qc++);
239 for (tc=0; types[tc] != adns_r_none; tc++);
240 mcs= malloc(tc ? sizeof(*mcs)*qc*tc : 1);
241 if (!mcs) { perror("malloc mcs"); quitnow(3); }
242
243 setvbuf(stdout,0,_IOLBF,0);
244
245 if (initstring) {
246 r= adns_init_strcfg(&ads,
247 (adns_if_debug|adns_if_noautosys|adns_if_checkc_freq)
248 ^initflagsnum,
249 stdout,initstring);
250 } else {
251 r= adns_init(&ads,
252 (adns_if_debug|adns_if_noautosys)^initflagsnum,
253 0);
254 }
255 if (r) failure_errno("init",r);
256
257 for (qi=0; qi<qc; qi++) {
258 fdom_split(fdomlist[qi],&domain,&qflags,ownflags,sizeof(ownflags));
259 if (!consistsof(ownflags,"a")) usageerr("unknown ownqueryflag");
260 for (ti=0; ti<tc; ti++) {
261 mc= &mcs[qi*tc+ti];
262 mc->doneyet= 0;
263 mc->fdom= fdomlist[qi];
264
265 fprintf(stdout,"%s flags %d type %d",
266 domain,qflags,types[ti]&adns_rrt_reprmask);
267 r= adns_submit(ads,domain,types[ti],qflags,mc,&mc->qu);
268 if (r == ENOSYS) {
269 fprintf(stdout," not implemented\n");
270 mc->qu= 0;
271 mc->doneyet= 1;
272 } else if (r) {
273 failure_errno("submit",r);
274 } else {
275 ri= adns_rr_info(types[ti], &rrtn,&fmtn,0, 0,0);
276 putc(' ',stdout);
277 dumptype(ri,rrtn,fmtn);
278 fprintf(stdout," submitted\n");
279 }
280 }
281 }
282
283 for (;;) {
284 for (qi=0; qi<qc; qi++) {
285 for (ti=0; ti<tc; ti++) {
286 mc= &mcs[qi*tc+ti];
287 mc->found= 0;
288 }
289 }
290 for (adns_forallqueries_begin(ads);
291 (qu= adns_forallqueries_next(ads,&mcr));
292 ) {
293 mc= mcr;
294 assert(qu == mc->qu);
295 assert(!mc->doneyet);
296 mc->found= 1;
297 }
298 mcw= 0;
299 for (qi=0; qi<qc; qi++) {
300 for (ti=0; ti<tc; ti++) {
301 mc= &mcs[qi*tc+ti];
302 if (mc->doneyet) continue;
303 assert(mc->found);
304 if (!mcw) mcw= mc;
305 }
306 }
307 if (!mcw) break;
308
309 if (strchr(owninitflags,'s')) {
310 qu= mcw->qu;
311 mc= mcw;
312 } else {
313 qu= 0;
314 mc= 0;
315 }
316
317 if (strchr(owninitflags,'p')) {
318 r= adns_wait_poll(ads,&qu,&ans,&mcr);
319 } else {
320 r= adns_wait(ads,&qu,&ans,&mcr);
321 }
322 if (r) failure_errno("wait/check",r);
323
324 if (mc) assert(mcr==mc);
325 else mc= mcr;
326 assert(qu==mc->qu);
327 assert(!mc->doneyet);
328
329 fdom_split(mc->fdom,&domain,&qflags,ownflags,sizeof(ownflags));
330
331 if (gettimeofday(&now,0)) { perror("gettimeofday"); quitnow(3); }
332
333 ri= adns_rr_info(ans->type, &rrtn,&fmtn,&len, 0,0);
334 fprintf(stdout, "%s flags %d type ",domain,qflags);
335 dumptype(ri,rrtn,fmtn);
336 fprintf(stdout, "%s%s: %s; nrrs=%d; cname=%s; owner=%s; ttl=%ld\n",
337 ownflags[0] ? " ownflags=" : "", ownflags,
338 strchr(ownflags,'a')
339 ? adns_errabbrev(ans->status)
340 : adns_strerror(ans->status),
341 ans->nrrs,
342 ans->cname ? ans->cname : "$",
343 ans->owner ? ans->owner : "$",
344 (long)ans->expires - (long)now.tv_sec);
345 if (ans->nrrs) {
346 assert(!ri);
347 for (i=0; i<ans->nrrs; i++) {
348 ri= adns_rr_info(ans->type, 0,0,0, ans->rrs.bytes + i*len, &show);
349 if (ri) failure_status("info",ri);
350 fprintf(stdout," %s\n",show);
351 free(show);
352 }
353 }
354 free(ans);
355
356 mc->doneyet= 1;
357 }
358
359 quitnow(0);
360 }