diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-06 00:55:53 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-05-06 00:55:53 +0000 |
commit | 3d0386f27ca66379acf50199e1d1298386eeeeb8 (patch) | |
tree | f87bd4a126b3a843858eb447e8fd5893c3ee3882 /tests/deckard/deckard.py | |
parent | Initial commit. (diff) | |
download | knot-resolver-upstream.tar.xz knot-resolver-upstream.zip |
Adding upstream version 3.2.1.upstream/3.2.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'tests/deckard/deckard.py')
-rwxr-xr-x | tests/deckard/deckard.py | 432 |
1 files changed, 432 insertions, 0 deletions
diff --git a/tests/deckard/deckard.py b/tests/deckard/deckard.py new file mode 100755 index 0000000..6b75c70 --- /dev/null +++ b/tests/deckard/deckard.py @@ -0,0 +1,432 @@ +#!/usr/bin/env python3 +from datetime import datetime +import errno +import ipaddress +import logging +import logging.config +import os +import shutil +import socket +import subprocess +import tempfile +import time +from typing import Set # noqa + +import dpkt +import jinja2 + +from pydnstest import scenario, testserver + + +# path to Deckard files +INSTALLDIR = os.path.dirname(os.path.abspath(__file__)) +# relative to working directory +TRUST_ANCHOR_SUBDIR = 'ta' + + +class DeckardUnderLoadError(Exception): + pass + + +class IfaceManager: + """ + Network interface allocation manager + + Keeps mapping between 'name', interface number, and IP address. + """ + def __init__(self, sockfamily): + """ + Parameters: + sockfamily Address family used in given test scenatio + (a constant from socket module) + """ + if sockfamily not in {socket.AF_INET, socket.AF_INET6}: + raise NotImplementedError("address family not supported '%i'" % sockfamily) + self.sockfamily = sockfamily + self.free = list(range(40, 10, -1)) # range accepted by libswrap + self.name2iface = {} + + def allocate(self, name): + """ + Map name to a free interface number. + """ + if name in self.name2iface: + raise ValueError('duplicate interface name %s' % name) + iface = str(self.free.pop()) + self.name2iface[name] = iface + return iface + + def getiface(self, name): + """ + Map name to allocated interface number. + + Returns: + Interface number as string (so it can be assigned to os.environ) + """ + return self.name2iface[name] + + def getipaddr(self, name): + """ + Get default IP address assigned to interface allocated to given name. + + Returns: + Address from address family specified during IfaceManager init. + """ + iface = self.getiface(name) + if self.sockfamily == socket.AF_INET: + addr_local_pattern = "127.0.0.{}" + elif self.sockfamily == socket.AF_INET6: + addr_local_pattern = "fd00::5357:5f{:02X}" + return addr_local_pattern.format(int(iface)) + + def getalladdrs(self): + """ + Get mapping from all names to all IP addresses. + + Returns: + {name: IP address} + """ + return {name: self.getipaddr(name) + for name in self.name2iface} + + +def write_timestamp_file(path, tst): + time_file = open(path, 'w') + time_file.write(datetime.fromtimestamp(tst).strftime('@%Y-%m-%d %H:%M:%S')) + time_file.flush() + time_file.close() + + +def setup_common_env(ctx): + """ + Setup environment shared between Deckard and binaries under test. + + Environment for child processes must be based on on.environ as modified + by this function. + + Returns: + path to working directory + """ + # working directory + if "SOCKET_WRAPPER_DIR" in os.environ: + tmpdir = os.environ["SOCKET_WRAPPER_DIR"] + if os.path.lexists(tmpdir): + raise ValueError('SOCKET_WRAPPER_DIR "%s" must not exist' % tmpdir) + else: + tmpdir = tempfile.mkdtemp(suffix='', prefix='tmpdeckard') + + # Set up libfaketime + os.environ["FAKETIME_NO_CACHE"] = "1" + os.environ["FAKETIME_TIMESTAMP_FILE"] = '%s/.time' % tmpdir + # fake initial time + write_timestamp_file(os.environ["FAKETIME_TIMESTAMP_FILE"], + ctx.get('_OVERRIDE_TIMESTAMP', time.time())) + + # Set up socket_wrapper + os.environ["SOCKET_WRAPPER_DIR"] = tmpdir + os.environ["SOCKET_WRAPPER_PCAP_FILE"] = '%s/deckard.pcap' % tmpdir + + return tmpdir + + +def setup_daemon_env(prog_cfg, tmpdir): + """ Set up test environment and config """ + name = prog_cfg['name'] + log = logging.getLogger('deckard.daemon.%s.setup_env' % name) + # Set up child process env() to use socket wrapper interface + child_env = os.environ.copy() + child_env['SOCKET_WRAPPER_DEFAULT_IFACE'] = prog_cfg['iface'] + prog_cfg['dir'] = os.path.join(tmpdir, name) + log.debug('directory: %s', prog_cfg['dir']) + child_env['SOCKET_WRAPPER_PCAP_FILE'] = '%s/pcap' % prog_cfg['dir'] + + return child_env + + +def setup_network(sockfamily, prog_cfgs): + """Allocate fake interfaces and IP addresses to all entities. + + Returns: + - SOCKET_WRAPPER_DEFAULT_IFACE will be set in os.environ + - Dict suitable for usage in Jinja2 templates will be returned + { + ROOT_ADDR: <DeckardIP>, + IPADDRS: {name: <IPaddress>} + } + """ + net_config = {} + # assign interfaces and IP addresses to all involved programs + ifacemgr = IfaceManager(sockfamily) + # fake interface for Deckard itself + deckard_iface = ifacemgr.allocate('deckard') + os.environ['SOCKET_WRAPPER_DEFAULT_IFACE'] = deckard_iface + net_config['ROOT_ADDR'] = ifacemgr.getipaddr('deckard') + + for prog_cfg in prog_cfgs['programs']: + prog_cfg['iface'] = ifacemgr.allocate(prog_cfg['name']) + prog_cfg['ipaddr'] = ifacemgr.getipaddr(prog_cfg['name']) + net_config['IPADDRS'] = ifacemgr.getalladdrs() + + return net_config + + +def _fixme_prebind_hack(sockfamily, childaddr): + """ + Prebind to sockets to create necessary files + + @TODO: this is probably a workaround for socket_wrapper bug + """ + if 'NOPRELOAD' not in os.environ: + for sock_type in (socket.SOCK_STREAM, socket.SOCK_DGRAM): + sock = socket.socket(sockfamily, sock_type) + sock.setsockopt(sockfamily, socket.SO_REUSEADDR, 1) + sock.bind((childaddr, 53)) + if sock_type & socket.SOCK_STREAM: + sock.listen(5) + + +def create_trust_anchor_files(ta_files, work_dir): + """ + Write trust anchor files in specified working directory. + + Params: + ta_files Dict {domain name: [TA lines]} + Returns: + List of absolute filesystem paths to TA files. + """ + full_paths = [] + for domain, ta_lines in ta_files.items(): + file_name = u'{}.key'.format(domain) + full_path = os.path.realpath( + os.path.join(work_dir, TRUST_ANCHOR_SUBDIR, file_name)) + full_paths.append(full_path) + dir_path = os.path.dirname(full_path) + try: + os.makedirs(dir_path) + except OSError as ex: + if ex.errno != errno.EEXIST: + raise + with open(full_path, "w") as ta_file: + ta_file.writelines('{0}\n'.format(l) for l in ta_lines) + return full_paths + + +def setup_daemon_files(prog_cfg, template_ctx, ta_files): + name = prog_cfg['name'] + # add program-specific variables + subst = template_ctx.copy() + subst['DAEMON_NAME'] = name + + subst['WORKING_DIR'] = prog_cfg['dir'] + os.mkdir(prog_cfg['dir']) + subst['SELF_ADDR'] = prog_cfg['ipaddr'] + + # daemons might write to TA files so every daemon gets its own copy + subst['TRUST_ANCHOR_FILES'] = create_trust_anchor_files( + ta_files, prog_cfg['dir']) + + # generate configuration files + j2template_loader = jinja2.FileSystemLoader(searchpath=os.getcwd()) + print(os.path.abspath(os.getcwd())) + j2template_env = jinja2.Environment(loader=j2template_loader) + logging.getLogger('deckard.daemon.%s.template' % name).debug(subst) + + assert len(prog_cfg['templates']) == len(prog_cfg['configs']) + for template_name, config_name in zip(prog_cfg['templates'], prog_cfg['configs']): + j2template = j2template_env.get_template(template_name) + cfg_rendered = j2template.render(subst) + with open(os.path.join(prog_cfg['dir'], config_name), 'w') as output: + output.write(cfg_rendered) + + _fixme_prebind_hack(template_ctx['_SOCKET_FAMILY'], subst['SELF_ADDR']) + + +def run_daemon(cfg, environ): + """Start binary and return its process object""" + name = cfg['name'] + proc = None + cfg['log'] = os.path.join(cfg['dir'], 'server.log') + daemon_log_file = open(cfg['log'], 'w') + cfg['args'] = args = [cfg['binary']] + cfg['additional'] + logging.getLogger('deckard.daemon.%s.env' % name).debug('%s', environ) + logging.getLogger('deckard.daemon.%s.argv' % name).debug('%s', args) + try: + proc = subprocess.Popen(args, stdout=daemon_log_file, stderr=subprocess.STDOUT, + cwd=cfg['dir'], env=environ, start_new_session=True) + except subprocess.CalledProcessError: + logger = logging.getLogger('deckard.daemon_log.%s' % name) + logger.exception("Can't start '%s'", args) + raise + return proc + + +def conncheck_daemon(process, cfg, sockfamily): + """Wait until the server accepts TCP clients""" + sock = socket.socket(sockfamily, socket.SOCK_STREAM) + tstart = datetime.now() + while True: + time.sleep(0.1) + if (datetime.now() - tstart).total_seconds() > 5: + raise RuntimeError("Server took too long to respond") + # Check if the process is running + if process.poll() is not None: + msg = 'process died "%s", logs in "%s"' % (cfg['name'], cfg['dir']) + logger = logging.getLogger('deckard.daemon_log.%s' % cfg['name']) + logger.critical(msg) + logger.error(open(cfg['log']).read()) + raise subprocess.CalledProcessError(process.returncode, cfg['args'], msg) + try: + sock.connect((cfg['ipaddr'], 53)) + except socket.error: + continue + break + sock.close() + + +def process_file(path, qmin, prog_cfgs): + """Parse scenario from a file object and create workdir.""" + # Parse scenario + case, cfg_text = scenario.parse_file(os.path.realpath(path)) + cfg_ctx, ta_files = scenario.parse_config(cfg_text, qmin, INSTALLDIR) + template_ctx = setup_network(cfg_ctx['_SOCKET_FAMILY'], prog_cfgs) + # merge variables from scenario with generated network variables (scenario has priority) + template_ctx.update(cfg_ctx) + # Deckard will communicate with first program + prog_under_test = prog_cfgs['programs'][0]['name'] + prog_under_test_ip = template_ctx['IPADDRS'][prog_under_test] + + # get working directory and environment variables + tmpdir = setup_common_env(cfg_ctx) + shutil.copy2(path, os.path.join(tmpdir)) + try: + daemons = setup_daemons(tmpdir, prog_cfgs, template_ctx, ta_files) + run_testcase(daemons, + case, + template_ctx['ROOT_ADDR'], + template_ctx['_SOCKET_FAMILY'], + prog_under_test_ip) + if prog_cfgs.get('noclean'): + logging.getLogger('deckard.hint').info( + 'test working directory %s', tmpdir) + else: + shutil.rmtree(tmpdir) + except Exception: + logging.getLogger('deckard.hint').error( + 'test failed, inspect working directory %s', tmpdir) + raise + + +def setup_daemons(tmpdir, prog_cfgs, template_ctx, ta_files): + """Configure daemons and run the test""" + # Setup daemon environment + daemons = [] + for prog_cfg in prog_cfgs['programs']: + daemon_env = setup_daemon_env(prog_cfg, tmpdir) + setup_daemon_files(prog_cfg, template_ctx, ta_files) + daemon_proc = run_daemon(prog_cfg, daemon_env) + daemons.append({'proc': daemon_proc, 'cfg': prog_cfg}) + try: + conncheck_daemon(daemon_proc, prog_cfg, template_ctx['_SOCKET_FAMILY']) + except: # noqa -- bare except might be valid here? + daemon_proc.terminate() + raise + return daemons + + +def check_for_icmp(): + """ Checks Deckards's PCAP for ICMP packets """ + # Deckard's responses to resolvers might be delayed due to load which + # leads the resolver to close the port and to the test failing in the + # end. We partially detect these by checking the PCAP for ICMP packets. + path = os.environ["SOCKET_WRAPPER_PCAP_FILE"] + udp_seen = False + with open(path, "rb") as f: + pcap = dpkt.pcap.Reader(f) + for _, packet in pcap: + try: + ip = dpkt.ip.IP(packet) + except dpkt.dpkt.UnpackError: + ip = dpkt.ip6.IP6(packet) + if isinstance(ip.data, dpkt.udp.UDP): + udp_seen = True + + if udp_seen: + if isinstance(ip.data, (dpkt.icmp.ICMP, dpkt.icmp6.ICMP6)): + raise DeckardUnderLoadError("Deckard is under load. " + "Other errors might be false negatives. " + "Consider retrying the job later.") + return False + + +def check_for_reply_steps(case: scenario.Scenario) -> bool: + return any(s.type == "REPLY" for s in case.steps) + + +def check_for_unknown_servers(case: scenario.Scenario, daemon: dict) -> None: + """ Checks Deckards's PCAP for packets going to servers not present in scenario """ + path = os.path.join(daemon["cfg"]["dir"], "pcap") + asked_servers = set() + with open(path, "rb") as f: + pcap = dpkt.pcap.Reader(f) + for _, packet in pcap: + try: + ip = dpkt.ip.IP(packet) + except dpkt.dpkt.UnpackError: + ip = dpkt.ip6.IP6(packet) + # pylint: disable=no-member + dest = ipaddress.ip_address(int.from_bytes(ip.dst, byteorder="big")) + # pylint: enable=no-member + + # Socket wrapper asigns (random) link local addresses to the binary under test + # and Deckard itself. We have to filter them out of the pcap. + if dest.is_global: + asked_servers.add(dest) + + scenario_ips = set() # type: Set[str] + for r in case.ranges: + scenario_ips |= r.addresses + + scenario_servers = {ipaddress.ip_address(ip) for ip in scenario_ips} + + servers_not_in_scenario = asked_servers - scenario_servers + + if servers_not_in_scenario: + if not check_for_reply_steps(case): + raise RuntimeError("Binary in test asked an IP address not present in scenario %s" + % servers_not_in_scenario) + + +def run_testcase(daemons, case, root_addr, addr_family, prog_under_test_ip): + """Run actual test and raise exception if the test failed""" + server = testserver.TestServer(case, root_addr, addr_family) + server.start() + + try: + server.play(prog_under_test_ip) + except ValueError as e: + if not check_for_icmp(): + raise e + finally: + server.stop() + + if check_for_reply_steps(case): + logging.warning("%s has REPLY steps in it. These are known to fail randomly. " + "Errors might be false positives.", case.file) + + for daemon in daemons: + daemon['proc'].terminate() + daemon['proc'].wait() + daemon_logger_log = logging.getLogger('deckard.daemon_log.%s' % daemon['cfg']['name']) + with open(daemon['cfg']['log']) as logf: + for line in logf: + daemon_logger_log.debug(line.strip()) + ignore_exit = daemon["cfg"].get('ignore_exit_code', False) + if daemon['proc'].returncode != 0 and not ignore_exit: + raise ValueError('process %s terminated with return code %s' + % (daemon['cfg']['name'], daemon['proc'].returncode)) + check_for_unknown_servers(case, daemon) + + # Do not clear files if the server crashed (for analysis) + if server.undefined_answers > 0: + if not check_for_icmp(): + raise ValueError('the scenario does not define all necessary answers (see error log)') |