Blame SOURCES/0004-krb5-locator-add-unit-tests.patch

ca1eb8
From 3d6b8b306cdbd4ec15b36a1e7936d219204e08dc Mon Sep 17 00:00:00 2001
ca1eb8
From: Sumit Bose <sbose@redhat.com>
ca1eb8
Date: Thu, 24 May 2018 17:14:42 +0200
ca1eb8
Subject: [PATCH] krb5 locator: add unit tests
ca1eb8
ca1eb8
Unit test for existing and new functionality of the Kerberos locator
ca1eb8
plugin.
ca1eb8
ca1eb8
Related to https://pagure.io/SSSD/sssd/issue/941
ca1eb8
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
ca1eb8
ca1eb8
(cherry picked from commit 2124275fe494a0241a552538c70f40c2291f3795)
ca1eb8
---
ca1eb8
 Makefile.am                                   |  20 +
ca1eb8
 src/krb5_plugin/sssd_krb5_locator_plugin.c    |  16 +
ca1eb8
 .../cmocka/test_sssd_krb5_locator_plugin.c    | 631 ++++++++++++++++++
ca1eb8
 3 files changed, 667 insertions(+)
ca1eb8
 create mode 100644 src/tests/cmocka/test_sssd_krb5_locator_plugin.c
ca1eb8
ca1eb8
diff --git a/Makefile.am b/Makefile.am
ca1eb8
index 9539b3cff8544cf406e3e19ab23e76e9cc8234ee..9055130ed74057987795285c243ff47584cf8316 100644
ca1eb8
--- a/Makefile.am
ca1eb8
+++ b/Makefile.am
ca1eb8
@@ -288,6 +288,7 @@ if HAVE_CMOCKA
ca1eb8
         krb5_common_test \
ca1eb8
         test_iobuf \
ca1eb8
         sss_certmap_test \
ca1eb8
+        test_sssd_krb5_locator_plugin \
ca1eb8
         $(NULL)
ca1eb8
 
ca1eb8
 
ca1eb8
@@ -3518,6 +3519,25 @@ sss_certmap_test_LDADD = \
ca1eb8
     libsss_certmap.la \
ca1eb8
     $(NULL)
ca1eb8
 
ca1eb8
+test_sssd_krb5_locator_plugin_SOURCES = \
ca1eb8
+    src/tests/cmocka/test_sssd_krb5_locator_plugin.c \
ca1eb8
+    src/krb5_plugin/sssd_krb5_locator_plugin.c \
ca1eb8
+    $(NULL)
ca1eb8
+test_sssd_krb5_locator_plugin_CFLAGS = \
ca1eb8
+    $(AM_CFLAGS) \
ca1eb8
+    $(POPT_CFLAGS) \
ca1eb8
+    $(TALLOC_CFLAGS) \
ca1eb8
+    $(KRB5_CFLAGS) \
ca1eb8
+    -DTEST_PUBCONF_PATH=\"$(abs_builddir)/src/tests/cmocka/pubconf\" \
ca1eb8
+    $(NULL)
ca1eb8
+test_sssd_krb5_locator_plugin_LDADD = \
ca1eb8
+    $(CMOCKA_LIBS) \
ca1eb8
+    $(POPT_LIBS) \
ca1eb8
+    $(TALLOC_LIBS) \
ca1eb8
+    $(KRB5_LIBS) \
ca1eb8
+    libsss_test_common.la \
ca1eb8
+    $(NULL)
ca1eb8
+
ca1eb8
 if BUILD_KCM
ca1eb8
 test_kcm_json_SOURCES = \
ca1eb8
     src/tests/cmocka/test_kcm_json_marshalling.c \
ca1eb8
diff --git a/src/krb5_plugin/sssd_krb5_locator_plugin.c b/src/krb5_plugin/sssd_krb5_locator_plugin.c
ca1eb8
index 9874fd2d1ce63b69099f057dd05f6e353a12ce75..952d487c276ed51e0c3a018b0d0af59ca214525f 100644
ca1eb8
--- a/src/krb5_plugin/sssd_krb5_locator_plugin.c
ca1eb8
+++ b/src/krb5_plugin/sssd_krb5_locator_plugin.c
ca1eb8
@@ -38,6 +38,22 @@
ca1eb8
 
ca1eb8
 #include "providers/krb5/krb5_common.h"
ca1eb8
 
ca1eb8
+/* The following override of KDCINFO_TMPL and KPASSWDINFO_TMPL is not very
ca1eb8
+ * elegant but since they are defined in krb5_common.h with the help of
ca1eb8
+ * PUBCONF_PATH from config.h and PUBCONF_PATH can by set by a configure
ca1eb8
+ * options I didn't found another way to change the path for a unit test. */
ca1eb8
+#ifdef TEST_PUBCONF_PATH
ca1eb8
+#ifdef KDCINFO_TMPL
ca1eb8
+#undef KDCINFO_TMPL
ca1eb8
+#endif
ca1eb8
+#define KDCINFO_TMPL TEST_PUBCONF_PATH"/kdcinfo.%s"
ca1eb8
+
ca1eb8
+#ifdef KPASSWDINFO_TMPL
ca1eb8
+#undef KPASSWDINFO_TMPL
ca1eb8
+#endif
ca1eb8
+#define KPASSWDINFO_TMPL TEST_PUBCONF_PATH"/kpasswdinfo.%s"
ca1eb8
+#endif /* TEST_PUBCONF_PATH */
ca1eb8
+
ca1eb8
 #define DEFAULT_KERBEROS_PORT 88
ca1eb8
 #define DEFAULT_KADMIN_PORT 749
ca1eb8
 #define DEFAULT_KPASSWD_PORT 464
ca1eb8
diff --git a/src/tests/cmocka/test_sssd_krb5_locator_plugin.c b/src/tests/cmocka/test_sssd_krb5_locator_plugin.c
ca1eb8
new file mode 100644
ca1eb8
index 0000000000000000000000000000000000000000..3e7d00632ddb59da5474c0544eee6fc67edc5570
ca1eb8
--- /dev/null
ca1eb8
+++ b/src/tests/cmocka/test_sssd_krb5_locator_plugin.c
ca1eb8
@@ -0,0 +1,631 @@
ca1eb8
+/*
ca1eb8
+    SSSD
ca1eb8
+
ca1eb8
+    Unit test for SSSD's MIT Kerberos locator plugin
ca1eb8
+
ca1eb8
+    Authors:
ca1eb8
+        Sumit Bose <sbose@redhat.com>
ca1eb8
+
ca1eb8
+    Copyright (C) 2018 Red Hat
ca1eb8
+
ca1eb8
+    This program is free software; you can redistribute it and/or modify
ca1eb8
+    it under the terms of the GNU General Public License as published by
ca1eb8
+    the Free Software Foundation; either version 3 of the License, or
ca1eb8
+    (at your option) any later version.
ca1eb8
+
ca1eb8
+    This program is distributed in the hope that it will be useful,
ca1eb8
+    but WITHOUT ANY WARRANTY; without even the implied warranty of
ca1eb8
+    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
ca1eb8
+    GNU General Public License for more details.
ca1eb8
+
ca1eb8
+    You should have received a copy of the GNU General Public License
ca1eb8
+    along with this program.  If not, see <http://www.gnu.org/licenses/>.
ca1eb8
+*/
ca1eb8
+#include "config.h"
ca1eb8
+
ca1eb8
+#include <popt.h>
ca1eb8
+#include <sys/types.h>
ca1eb8
+#include <sys/socket.h>
ca1eb8
+#include <sys/stat.h>
ca1eb8
+#include <string.h>
ca1eb8
+#include <fcntl.h>
ca1eb8
+#include <netdb.h>
ca1eb8
+#include <krb5/krb5.h>
ca1eb8
+#include <krb5/locate_plugin.h>
ca1eb8
+
ca1eb8
+#include "tests/cmocka/common_mock.h"
ca1eb8
+
ca1eb8
+#define TEST_REALM "TEST.REALM"
ca1eb8
+#define TEST_IP_1 "123.231.132.213"
ca1eb8
+#define TEST_IPV6_1_PURE "7025:4d2d:2b06:e321:d971:16c0:6eeb:cc41"
ca1eb8
+#define TEST_IPV6_1 "["TEST_IPV6_1_PURE"]"
ca1eb8
+#define TEST_SERVICE_1 "22334"
ca1eb8
+#define TEST_SERVICE_2 "54321"
ca1eb8
+#define TEST_IP_1_WITH_SERVICE TEST_IP_1":"TEST_SERVICE_1
ca1eb8
+#define TEST_IPV6_1_WITH_SERVICE TEST_IPV6_1":"TEST_SERVICE_2
ca1eb8
+
ca1eb8
+struct test_state {
ca1eb8
+    void *dummy;
ca1eb8
+};
ca1eb8
+
ca1eb8
+static int setup(void **state)
ca1eb8
+{
ca1eb8
+    struct test_state *ts = NULL;
ca1eb8
+
ca1eb8
+    assert_true(leak_check_setup());
ca1eb8
+
ca1eb8
+    ts = talloc(global_talloc_context, struct test_state);
ca1eb8
+    assert_non_null(ts);
ca1eb8
+
ca1eb8
+    check_leaks_push(ts);
ca1eb8
+    *state = (void *)ts;
ca1eb8
+
ca1eb8
+    unlink(TEST_PUBCONF_PATH"/kdcinfo."TEST_REALM);
ca1eb8
+    rmdir(TEST_PUBCONF_PATH);
ca1eb8
+
ca1eb8
+    return 0;
ca1eb8
+}
ca1eb8
+
ca1eb8
+static int teardown(void **state)
ca1eb8
+{
ca1eb8
+    struct test_state *ts = talloc_get_type_abort(*state, struct test_state);
ca1eb8
+
ca1eb8
+    assert_non_null(ts);
ca1eb8
+
ca1eb8
+    assert_true(check_leaks_pop(ts));
ca1eb8
+    talloc_free(ts);
ca1eb8
+    assert_true(leak_check_teardown());
ca1eb8
+    return 0;
ca1eb8
+}
ca1eb8
+
ca1eb8
+/* Taken from MIT Kerberos src/lib/krb5/os/locate_kdc.c and
ca1eb8
+ * lib/krb5/os/os-proto.h */
ca1eb8
+
ca1eb8
+typedef enum {
ca1eb8
+    TCP_OR_UDP = 0,
ca1eb8
+    TCP,
ca1eb8
+    UDP,
ca1eb8
+    HTTPS,
ca1eb8
+} k5_transport;
ca1eb8
+
ca1eb8
+/* A single server hostname or address. */
ca1eb8
+struct server_entry {
ca1eb8
+    char *hostname;             /* NULL -> use addrlen/addr instead */
ca1eb8
+    int port;                   /* Used only if hostname set */
ca1eb8
+    k5_transport transport;     /* May be 0 for UDP/TCP if hostname set */
ca1eb8
+    char *uri_path;             /* Used only if transport is HTTPS */
ca1eb8
+    int family;                 /* May be 0 (aka AF_UNSPEC) if hostname set */
ca1eb8
+    int master;                 /* True, false, or -1 for unknown. */
ca1eb8
+    size_t addrlen;
ca1eb8
+    struct sockaddr_storage addr;
ca1eb8
+};
ca1eb8
+
ca1eb8
+/* A list of server hostnames/addresses. */
ca1eb8
+struct serverlist {
ca1eb8
+    struct server_entry *servers;
ca1eb8
+    size_t nservers;
ca1eb8
+};
ca1eb8
+#define SERVERLIST_INIT { NULL, 0 }
ca1eb8
+
ca1eb8
+/* Free up everything pointed to by the serverlist structure, but don't
ca1eb8
+ *  * free the structure itself. */
ca1eb8
+void
ca1eb8
+k5_free_serverlist (struct serverlist *list)
ca1eb8
+{
ca1eb8
+    size_t i;
ca1eb8
+
ca1eb8
+    for (i = 0; i < list->nservers; i++) {
ca1eb8
+        free(list->servers[i].hostname);
ca1eb8
+        free(list->servers[i].uri_path);
ca1eb8
+    }
ca1eb8
+    free(list->servers);
ca1eb8
+    list->servers = NULL;
ca1eb8
+    list->nservers = 0;
ca1eb8
+}
ca1eb8
+
ca1eb8
+/* Make room for a new server entry in list and return a pointer to the new
ca1eb8
+ * entry.  (Do not increment list->nservers.) */
ca1eb8
+static struct server_entry *
ca1eb8
+new_server_entry(struct serverlist *list)
ca1eb8
+{
ca1eb8
+    struct server_entry *newservers, *entry;
ca1eb8
+    size_t newspace = (list->nservers + 1) * sizeof(struct server_entry);
ca1eb8
+
ca1eb8
+    newservers = realloc(list->servers, newspace);
ca1eb8
+    if (newservers == NULL)
ca1eb8
+        return NULL;
ca1eb8
+    list->servers = newservers;
ca1eb8
+    entry = &newservers[list->nservers];
ca1eb8
+    memset(entry, 0, sizeof(*entry));
ca1eb8
+    entry->master = -1;
ca1eb8
+    return entry;
ca1eb8
+}
ca1eb8
+
ca1eb8
+/* Add an address entry to list. */
ca1eb8
+static int
ca1eb8
+add_addr_to_list(struct serverlist *list, k5_transport transport, int family,
ca1eb8
+                 size_t addrlen, struct sockaddr *addr)
ca1eb8
+{
ca1eb8
+    struct server_entry *entry;
ca1eb8
+
ca1eb8
+    entry = new_server_entry(list);
ca1eb8
+    if (entry == NULL)
ca1eb8
+        return ENOMEM;
ca1eb8
+    entry->transport = transport;
ca1eb8
+    entry->family = family;
ca1eb8
+    entry->hostname = NULL;
ca1eb8
+    entry->uri_path = NULL;
ca1eb8
+    entry->addrlen = addrlen;
ca1eb8
+    memcpy(&entry->addr, addr, addrlen);
ca1eb8
+    list->nservers++;
ca1eb8
+    return 0;
ca1eb8
+}
ca1eb8
+
ca1eb8
+struct module_callback_data {
ca1eb8
+    int out_of_mem;
ca1eb8
+    struct serverlist *list;
ca1eb8
+};
ca1eb8
+
ca1eb8
+static int
ca1eb8
+module_callback(void *cbdata, int socktype, struct sockaddr *sa)
ca1eb8
+{
ca1eb8
+    struct module_callback_data *d = cbdata;
ca1eb8
+    size_t addrlen;
ca1eb8
+    k5_transport transport;
ca1eb8
+
ca1eb8
+    if (socktype != SOCK_STREAM && socktype != SOCK_DGRAM)
ca1eb8
+        return 0;
ca1eb8
+    if (sa->sa_family == AF_INET)
ca1eb8
+        addrlen = sizeof(struct sockaddr_in);
ca1eb8
+    else if (sa->sa_family == AF_INET6)
ca1eb8
+        addrlen = sizeof(struct sockaddr_in6);
ca1eb8
+    else
ca1eb8
+        return 0;
ca1eb8
+    transport = (socktype == SOCK_STREAM) ? TCP : UDP;
ca1eb8
+    if (add_addr_to_list(d->list, transport, sa->sa_family, addrlen,
ca1eb8
+                         sa) != 0) {
ca1eb8
+        /* Assumes only error is ENOMEM.  */
ca1eb8
+        d->out_of_mem = 1;
ca1eb8
+        return 1;
ca1eb8
+    }
ca1eb8
+    return 0;
ca1eb8
+}
ca1eb8
+
ca1eb8
+krb5_error_code sssd_krb5_locator_init(krb5_context context,
ca1eb8
+                                       void **private_data);
ca1eb8
+void sssd_krb5_locator_close(void *private_data);
ca1eb8
+
ca1eb8
+krb5_error_code sssd_krb5_locator_lookup(void *private_data,
ca1eb8
+                    enum locate_service_type svc,
ca1eb8
+                    const char *realm,
ca1eb8
+                    int socktype,
ca1eb8
+                    int family,
ca1eb8
+                    int (*cbfunc)(void *, int, struct sockaddr *),
ca1eb8
+                    void *cbdata);
ca1eb8
+
ca1eb8
+void test_init(void **state)
ca1eb8
+{
ca1eb8
+    krb5_context ctx;
ca1eb8
+    krb5_error_code kerr;
ca1eb8
+    void *priv;
ca1eb8
+
ca1eb8
+    kerr = krb5_init_context (&ctx;;
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_init(ctx, &priv;;
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    sssd_krb5_locator_close(priv);
ca1eb8
+
ca1eb8
+    krb5_free_context(ctx);
ca1eb8
+}
ca1eb8
+
ca1eb8
+void test_failed_lookup(void **state)
ca1eb8
+{
ca1eb8
+    krb5_context ctx;
ca1eb8
+    krb5_error_code kerr;
ca1eb8
+    void *priv;
ca1eb8
+    struct module_callback_data cbdata = { 0 };
ca1eb8
+
ca1eb8
+
ca1eb8
+    kerr = krb5_init_context (&ctx;;
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_init(ctx, &priv;;
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(NULL, -1, NULL, -1, -1, NULL, NULL);
ca1eb8
+    assert_int_equal(kerr, KRB5_PLUGIN_NO_HANDLE);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(priv, -1, NULL, -1, -1, NULL, NULL);
ca1eb8
+    assert_int_equal(kerr, KRB5_PLUGIN_NO_HANDLE);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(priv, locate_service_kdc , NULL, -1, -1,
ca1eb8
+                                    NULL, NULL);
ca1eb8
+    assert_int_equal(kerr, KRB5_PLUGIN_NO_HANDLE);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(priv, locate_service_kdc , TEST_REALM, -1,
ca1eb8
+                                    -1, NULL, NULL);
ca1eb8
+    assert_int_equal(kerr, KRB5_PLUGIN_NO_HANDLE);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(priv, locate_service_kdc , TEST_REALM,
ca1eb8
+                                    SOCK_DGRAM, -1, NULL, NULL);
ca1eb8
+    assert_int_equal(kerr, KRB5_PLUGIN_NO_HANDLE);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(priv, locate_service_kdc , TEST_REALM,
ca1eb8
+                                    SOCK_DGRAM, AF_INET6, NULL, NULL);
ca1eb8
+    assert_int_equal(kerr, KRB5_PLUGIN_NO_HANDLE);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(priv, locate_service_kdc , TEST_REALM,
ca1eb8
+                                    SOCK_DGRAM, AF_INET6, module_callback,
ca1eb8
+                                    NULL);
ca1eb8
+    assert_int_equal(kerr, KRB5_PLUGIN_NO_HANDLE);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(priv, locate_service_kdc , TEST_REALM,
ca1eb8
+                                    SOCK_DGRAM, AF_INET6, module_callback,
ca1eb8
+                                    &cbdata);
ca1eb8
+    assert_int_equal(kerr, KRB5_PLUGIN_NO_HANDLE);
ca1eb8
+
ca1eb8
+    sssd_krb5_locator_close(priv);
ca1eb8
+
ca1eb8
+    krb5_free_context(ctx);
ca1eb8
+}
ca1eb8
+
ca1eb8
+void test_empty(void **state)
ca1eb8
+{
ca1eb8
+    krb5_context ctx;
ca1eb8
+    krb5_error_code kerr;
ca1eb8
+    void *priv;
ca1eb8
+    int fd;
ca1eb8
+    struct module_callback_data cbdata = { 0 };
ca1eb8
+
ca1eb8
+    kerr = krb5_init_context (&ctx;;
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_init(ctx, &priv;;
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    mkdir(TEST_PUBCONF_PATH, 0777);
ca1eb8
+    fd = open(TEST_PUBCONF_PATH"/kdcinfo."TEST_REALM, O_CREAT, 0777);
ca1eb8
+    assert_int_not_equal(fd, -1);
ca1eb8
+    close(fd);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(priv, locate_service_kdc , TEST_REALM,
ca1eb8
+                                    SOCK_DGRAM, AF_INET6, module_callback,
ca1eb8
+                                    &cbdata);
ca1eb8
+    assert_int_equal(kerr, KRB5_PLUGIN_NO_HANDLE);
ca1eb8
+    unlink(TEST_PUBCONF_PATH"/kdcinfo."TEST_REALM);
ca1eb8
+    rmdir(TEST_PUBCONF_PATH);
ca1eb8
+
ca1eb8
+    sssd_krb5_locator_close(priv);
ca1eb8
+
ca1eb8
+    krb5_free_context(ctx);
ca1eb8
+}
ca1eb8
+
ca1eb8
+void test_single(void **state)
ca1eb8
+{
ca1eb8
+    krb5_context ctx;
ca1eb8
+    krb5_error_code kerr;
ca1eb8
+    void *priv;
ca1eb8
+    int fd;
ca1eb8
+    struct serverlist list = SERVERLIST_INIT;
ca1eb8
+    struct module_callback_data cbdata = { 0 };
ca1eb8
+    ssize_t s;
ca1eb8
+    int ret;
ca1eb8
+    char host[NI_MAXHOST];
ca1eb8
+    char service[NI_MAXSERV];
ca1eb8
+
ca1eb8
+    cbdata.list = &list;
ca1eb8
+
ca1eb8
+    kerr = krb5_init_context (&ctx;;
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_init(ctx, &priv;;
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    mkdir(TEST_PUBCONF_PATH, 0777);
ca1eb8
+    fd = open(TEST_PUBCONF_PATH"/kdcinfo."TEST_REALM, O_CREAT|O_RDWR, 0777);
ca1eb8
+    assert_int_not_equal(fd, -1);
ca1eb8
+    s = write(fd, TEST_IP_1, sizeof(TEST_IP_1));
ca1eb8
+    assert_int_equal(s, sizeof(TEST_IP_1));
ca1eb8
+    close(fd);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(priv, locate_service_kdc , TEST_REALM,
ca1eb8
+                                    SOCK_DGRAM, AF_INET6, module_callback,
ca1eb8
+                                    &cbdata);
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    /* We asked for AF_INET6, but TEST_IP_1 is IPv4 */
ca1eb8
+    assert_int_equal(list.nservers, 0);
ca1eb8
+    assert_null(list.servers);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(priv, locate_service_kdc , TEST_REALM,
ca1eb8
+                                    SOCK_DGRAM, AF_INET, module_callback,
ca1eb8
+                                    &cbdata);
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+    assert_int_equal(list.nservers, 1);
ca1eb8
+    assert_non_null(list.servers);
ca1eb8
+    assert_int_equal(list.servers[0].addrlen, 16);
ca1eb8
+    ret = getnameinfo((struct sockaddr *) &list.servers[0].addr,
ca1eb8
+                      list.servers[0].addrlen,
ca1eb8
+                      host, sizeof(host), service, sizeof(service),
ca1eb8
+                      NI_NUMERICHOST|NI_NUMERICSERV);
ca1eb8
+    assert_int_equal(ret, 0);
ca1eb8
+    assert_string_equal(TEST_IP_1, host);
ca1eb8
+    assert_string_equal("88", service);
ca1eb8
+
ca1eb8
+    k5_free_serverlist(&list);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(priv, locate_service_kdc , TEST_REALM,
ca1eb8
+                                    SOCK_DGRAM, AF_UNSPEC, module_callback,
ca1eb8
+                                    &cbdata);
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+    assert_int_equal(list.nservers, 1);
ca1eb8
+    assert_non_null(list.servers);
ca1eb8
+    assert_int_equal(list.servers[0].addrlen, 16);
ca1eb8
+    ret = getnameinfo((struct sockaddr *) &list.servers[0].addr,
ca1eb8
+                      list.servers[0].addrlen,
ca1eb8
+                      host, sizeof(host), service, sizeof(service),
ca1eb8
+                      NI_NUMERICHOST|NI_NUMERICSERV);
ca1eb8
+    assert_int_equal(ret, 0);
ca1eb8
+    assert_string_equal(TEST_IP_1, host);
ca1eb8
+    assert_string_equal("88", service);
ca1eb8
+
ca1eb8
+    k5_free_serverlist(&list);
ca1eb8
+
ca1eb8
+    unlink(TEST_PUBCONF_PATH"/kdcinfo."TEST_REALM);
ca1eb8
+    rmdir(TEST_PUBCONF_PATH);
ca1eb8
+    sssd_krb5_locator_close(priv);
ca1eb8
+
ca1eb8
+    krb5_free_context(ctx);
ca1eb8
+}
ca1eb8
+
ca1eb8
+struct test_data {
ca1eb8
+    const char *ip;
ca1eb8
+    bool found;
ca1eb8
+};
ca1eb8
+
ca1eb8
+void test_multi_check_results(struct test_data *test_data,
ca1eb8
+                              struct serverlist *list,
ca1eb8
+                              const char *exp_service)
ca1eb8
+{
ca1eb8
+    int ret;
ca1eb8
+    char host[NI_MAXHOST];
ca1eb8
+    char service[NI_MAXSERV];
ca1eb8
+    size_t c;
ca1eb8
+    size_t d;
ca1eb8
+
ca1eb8
+    /* To make sure each result from list has a matching entry in test_data we
ca1eb8
+     * use a flag to mark found entries, this way we can properly detect is
ca1eb8
+     * the same address is used multiple times. */
ca1eb8
+    for (d = 0; test_data[d].ip != NULL; d++) {
ca1eb8
+        test_data[d].found = false;
ca1eb8
+    }
ca1eb8
+
ca1eb8
+    for (c = 0; c < list->nservers; c++) {
ca1eb8
+        ret = getnameinfo((struct sockaddr *) &list->servers[c].addr,
ca1eb8
+                          list->servers[c].addrlen,
ca1eb8
+                          host, sizeof(host), service, sizeof(service),
ca1eb8
+                          NI_NUMERICHOST|NI_NUMERICSERV);
ca1eb8
+        assert_int_equal(ret, 0);
ca1eb8
+        assert_string_equal(exp_service, service);
ca1eb8
+        for (d = 0; test_data[d].ip != NULL; d++) {
ca1eb8
+            /* Compare result with test_data, be aware that the test_data has
ca1eb8
+             * '[]' around IPv& addresses */
ca1eb8
+            if (strncmp(host,
ca1eb8
+                        test_data[d].ip + (test_data[d].ip[0] == '[' ? 1 : 0),
ca1eb8
+                        strlen(host)) == 0 && !test_data[d].found) {
ca1eb8
+                test_data[d].found = true;
ca1eb8
+                break;
ca1eb8
+            }
ca1eb8
+        }
ca1eb8
+        /* Make sure we found the result in the list */
ca1eb8
+        assert_non_null(test_data[d].ip);
ca1eb8
+    }
ca1eb8
+}
ca1eb8
+
ca1eb8
+void test_multi(void **state)
ca1eb8
+{
ca1eb8
+    krb5_context ctx;
ca1eb8
+    krb5_error_code kerr;
ca1eb8
+    void *priv;
ca1eb8
+    int fd;
ca1eb8
+    struct serverlist list = SERVERLIST_INIT;
ca1eb8
+    struct module_callback_data cbdata = { 0 };
ca1eb8
+    ssize_t s;
ca1eb8
+    size_t c;
ca1eb8
+    struct test_data test_data[] = {
ca1eb8
+                           {TEST_IP_1, false},
ca1eb8
+                           {TEST_IPV6_1, false},
ca1eb8
+                           {"[c89a:565b:4510:5b9f:41fe:ea81:87a0:f21b]", false},
ca1eb8
+                           {"155.42.66.53", false},
ca1eb8
+                           {"[f812:5941:ba69:2bae:e806:3b68:770d:d75e]", false},
ca1eb8
+                           {"[3ad3:9dda:50e4:3c82:548f:eaa1:e120:6dd]", false},
ca1eb8
+                           {"55.116.79.183", false},
ca1eb8
+                           {"[ce8a:ee99:98cd:d8cd:218d:393e:d5a9:dc52]", false},
ca1eb8
+                           /* the following address is added twice to check if
ca1eb8
+                            * an address can be added more than once. */
ca1eb8
+                           {"37.230.88.162", false},
ca1eb8
+                           {"37.230.88.162", false},
ca1eb8
+                           {NULL, false} };
ca1eb8
+
ca1eb8
+    cbdata.list = &list;
ca1eb8
+
ca1eb8
+    kerr = krb5_init_context (&ctx;;
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_init(ctx, &priv;;
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    mkdir(TEST_PUBCONF_PATH, 0777);
ca1eb8
+    fd = open(TEST_PUBCONF_PATH"/kdcinfo."TEST_REALM, O_CREAT|O_RDWR, 0777);
ca1eb8
+    assert_int_not_equal(fd, -1);
ca1eb8
+    for (c = 0; test_data[c].ip != NULL; c++) {
ca1eb8
+        s = write(fd, test_data[c].ip, strlen(test_data[c].ip));
ca1eb8
+        assert_int_equal(s, strlen(test_data[c].ip));
ca1eb8
+        s = write(fd, "\n", 1);
ca1eb8
+        assert_int_equal(s, 1);
ca1eb8
+    }
ca1eb8
+    close(fd);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(priv, locate_service_kdc , TEST_REALM,
ca1eb8
+                                    SOCK_DGRAM, AF_INET6, module_callback,
ca1eb8
+                                    &cbdata);
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    assert_int_equal(list.nservers, 5);
ca1eb8
+    assert_non_null(list.servers);
ca1eb8
+    test_multi_check_results(test_data, &list, "88");
ca1eb8
+
ca1eb8
+    k5_free_serverlist(&list);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(priv, locate_service_kdc , TEST_REALM,
ca1eb8
+                                    SOCK_DGRAM, AF_INET, module_callback,
ca1eb8
+                                    &cbdata);
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    assert_int_equal(list.nservers, 5);
ca1eb8
+    assert_non_null(list.servers);
ca1eb8
+    test_multi_check_results(test_data, &list, "88");
ca1eb8
+
ca1eb8
+
ca1eb8
+    k5_free_serverlist(&list);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(priv, locate_service_kdc , TEST_REALM,
ca1eb8
+                                    SOCK_DGRAM, AF_UNSPEC, module_callback,
ca1eb8
+                                    &cbdata);
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    assert_int_equal(list.nservers, 10);
ca1eb8
+    assert_non_null(list.servers);
ca1eb8
+    test_multi_check_results(test_data, &list, "88");
ca1eb8
+
ca1eb8
+    k5_free_serverlist(&list);
ca1eb8
+
ca1eb8
+    unlink(TEST_PUBCONF_PATH"/kdcinfo."TEST_REALM);
ca1eb8
+    rmdir(TEST_PUBCONF_PATH);
ca1eb8
+    sssd_krb5_locator_close(priv);
ca1eb8
+
ca1eb8
+    krb5_free_context(ctx);
ca1eb8
+}
ca1eb8
+
ca1eb8
+void test_service(void **state)
ca1eb8
+{
ca1eb8
+    krb5_context ctx;
ca1eb8
+    krb5_error_code kerr;
ca1eb8
+    void *priv;
ca1eb8
+    int fd;
ca1eb8
+    struct serverlist list = SERVERLIST_INIT;
ca1eb8
+    struct module_callback_data cbdata = { 0 };
ca1eb8
+    ssize_t s;
ca1eb8
+    int ret;
ca1eb8
+    char host[NI_MAXHOST];
ca1eb8
+    char service[NI_MAXSERV];
ca1eb8
+
ca1eb8
+    cbdata.list = &list;
ca1eb8
+
ca1eb8
+    kerr = krb5_init_context (&ctx;;
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_init(ctx, &priv;;
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    mkdir(TEST_PUBCONF_PATH, 0777);
ca1eb8
+    fd = open(TEST_PUBCONF_PATH"/kdcinfo."TEST_REALM, O_CREAT|O_RDWR, 0777);
ca1eb8
+    assert_int_not_equal(fd, -1);
ca1eb8
+    s = write(fd, TEST_IP_1_WITH_SERVICE, sizeof(TEST_IP_1_WITH_SERVICE));
ca1eb8
+    assert_int_equal(s, sizeof(TEST_IP_1_WITH_SERVICE));
ca1eb8
+    s = write(fd, "\n", 1);
ca1eb8
+    assert_int_equal(s, 1);
ca1eb8
+    s = write(fd, TEST_IPV6_1_WITH_SERVICE, sizeof(TEST_IPV6_1_WITH_SERVICE));
ca1eb8
+    assert_int_equal(s, sizeof(TEST_IPV6_1_WITH_SERVICE));
ca1eb8
+    close(fd);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(priv, locate_service_kdc , TEST_REALM,
ca1eb8
+                                    SOCK_DGRAM, AF_INET6, module_callback,
ca1eb8
+                                    &cbdata);
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+
ca1eb8
+    assert_int_equal(list.nservers, 1);
ca1eb8
+    assert_non_null(list.servers);
ca1eb8
+    ret = getnameinfo((struct sockaddr *) &list.servers[0].addr,
ca1eb8
+                      list.servers[0].addrlen,
ca1eb8
+                      host, sizeof(host), service, sizeof(service),
ca1eb8
+                      NI_NUMERICHOST|NI_NUMERICSERV);
ca1eb8
+    assert_int_equal(ret, 0);
ca1eb8
+    assert_string_equal(TEST_IPV6_1_PURE, host);
ca1eb8
+    assert_string_equal(TEST_SERVICE_2, service);
ca1eb8
+
ca1eb8
+    k5_free_serverlist(&list);
ca1eb8
+
ca1eb8
+    kerr = sssd_krb5_locator_lookup(priv, locate_service_kdc , TEST_REALM,
ca1eb8
+                                    SOCK_DGRAM, AF_INET, module_callback,
ca1eb8
+                                    &cbdata);
ca1eb8
+    assert_int_equal(kerr, 0);
ca1eb8
+    assert_int_equal(list.nservers, 1);
ca1eb8
+    assert_non_null(list.servers);
ca1eb8
+    ret = getnameinfo((struct sockaddr *) &list.servers[0].addr,
ca1eb8
+                      list.servers[0].addrlen,
ca1eb8
+                      host, sizeof(host), service, sizeof(service),
ca1eb8
+                      NI_NUMERICHOST|NI_NUMERICSERV);
ca1eb8
+    assert_int_equal(ret, 0);
ca1eb8
+    assert_string_equal(TEST_IP_1, host);
ca1eb8
+    assert_string_equal(TEST_SERVICE_1, service);
ca1eb8
+
ca1eb8
+    k5_free_serverlist(&list);
ca1eb8
+
ca1eb8
+
ca1eb8
+    unlink(TEST_PUBCONF_PATH"/kdcinfo."TEST_REALM);
ca1eb8
+    rmdir(TEST_PUBCONF_PATH);
ca1eb8
+    sssd_krb5_locator_close(priv);
ca1eb8
+
ca1eb8
+    krb5_free_context(ctx);
ca1eb8
+}
ca1eb8
+
ca1eb8
+int main(int argc, const char *argv[])
ca1eb8
+{
ca1eb8
+    poptContext pc;
ca1eb8
+    int opt;
ca1eb8
+    int ret;
ca1eb8
+    struct poptOption long_options[] = {
ca1eb8
+        POPT_AUTOHELP
ca1eb8
+        SSSD_DEBUG_OPTS
ca1eb8
+        POPT_TABLEEND
ca1eb8
+    };
ca1eb8
+
ca1eb8
+    const struct CMUnitTest tests[] = {
ca1eb8
+        cmocka_unit_test_setup_teardown(test_init,
ca1eb8
+                                        setup, teardown),
ca1eb8
+        cmocka_unit_test_setup_teardown(test_failed_lookup,
ca1eb8
+                                        setup, teardown),
ca1eb8
+        cmocka_unit_test_setup_teardown(test_empty,
ca1eb8
+                                        setup, teardown),
ca1eb8
+        cmocka_unit_test_setup_teardown(test_single,
ca1eb8
+                                        setup, teardown),
ca1eb8
+        cmocka_unit_test_setup_teardown(test_multi,
ca1eb8
+                                        setup, teardown),
ca1eb8
+        cmocka_unit_test_setup_teardown(test_service,
ca1eb8
+                                        setup, teardown),
ca1eb8
+    };
ca1eb8
+
ca1eb8
+    /* Set debug level to invalid value so we can decide if -d 0 was used. */
ca1eb8
+    debug_level = SSSDBG_INVALID;
ca1eb8
+
ca1eb8
+    pc = poptGetContext(argv[0], argc, argv, long_options, 0);
ca1eb8
+    while((opt = poptGetNextOpt(pc)) != -1) {
ca1eb8
+        switch(opt) {
ca1eb8
+        default:
ca1eb8
+            fprintf(stderr, "\nInvalid option %s: %s\n\n",
ca1eb8
+                    poptBadOption(pc, 0), poptStrerror(opt));
ca1eb8
+            poptPrintUsage(pc, stderr, 0);
ca1eb8
+            return 1;
ca1eb8
+        }
ca1eb8
+    }
ca1eb8
+    poptFreeContext(pc);
ca1eb8
+
ca1eb8
+    DEBUG_CLI_INIT(debug_level);
ca1eb8
+
ca1eb8
+    ret = cmocka_run_group_tests(tests, NULL, NULL);
ca1eb8
+
ca1eb8
+    return ret;
ca1eb8
+}
ca1eb8
-- 
ca1eb8
2.17.1
ca1eb8