aboutsummaryrefslogtreecommitdiff
path: root/tests/unit_tests/dns_resolver.cpp
diff options
context:
space:
mode:
authorThomas Winget <tewinget@gmail.com>2015-03-24 06:34:15 -0400
committerThomas Winget <tewinget@gmail.com>2015-03-24 06:34:15 -0400
commitdbf46a721af5d54792bca80fc1c439c1badc9069 (patch)
tree332d68d4ffb298f9f664e98392d82f42b76171d7 /tests/unit_tests/dns_resolver.cpp
parentMerge pull request #243 (diff)
downloadmonero-dbf46a721af5d54792bca80fc1c439c1badc9069.tar.xz
DNSSEC added (hardcoded key)
DNSSEC is now implemented with the hardcoded key from unbound. This will need to be not hardcoded in the future, but is okay for now. Unit tests updated for DNSSEC (as well as for the fact that, contrary to previous assumption, example.com does not have a static IP address).
Diffstat (limited to 'tests/unit_tests/dns_resolver.cpp')
-rw-r--r--tests/unit_tests/dns_resolver.cpp36
1 files changed, 34 insertions, 2 deletions
diff --git a/tests/unit_tests/dns_resolver.cpp b/tests/unit_tests/dns_resolver.cpp
index 680633778..6717e990a 100644
--- a/tests/unit_tests/dns_resolver.cpp
+++ b/tests/unit_tests/dns_resolver.cpp
@@ -43,13 +43,13 @@ TEST(DNSResolver, IPv4Success)
ASSERT_EQ(1, ips.size());
- ASSERT_STREQ("93.184.216.119", ips[0].c_str());
+ //ASSERT_STREQ("93.184.216.119", ips[0].c_str());
ips = tools::DNSResolver::instance().get_ipv4("example.com", avail, valid);
ASSERT_EQ(1, ips.size());
- ASSERT_STREQ("93.184.216.119", ips[0].c_str());
+ //ASSERT_STREQ("93.184.216.119", ips[0].c_str());
}
TEST(DNSResolver, IPv4Failure)
@@ -68,6 +68,38 @@ TEST(DNSResolver, IPv4Failure)
ASSERT_EQ(0, ips.size());
}
+TEST(DNSResolver, DNSSECSuccess)
+{
+ tools::DNSResolver resolver;
+
+ bool avail, valid;
+
+ auto ips = resolver.get_ipv4("example.com", avail, valid);
+
+ ASSERT_EQ(1, ips.size());
+
+ //ASSERT_STREQ("93.184.216.119", ips[0].c_str());
+
+ ASSERT_TRUE(avail);
+ ASSERT_TRUE(valid);
+}
+
+TEST(DNSResolver, DNSSECFailure)
+{
+ tools::DNSResolver resolver;
+
+ bool avail, valid;
+
+ auto ips = resolver.get_ipv4("dnssec-failed.org", avail, valid);
+
+ ASSERT_EQ(1, ips.size());
+
+ //ASSERT_STREQ("93.184.216.119", ips[0].c_str());
+
+ ASSERT_TRUE(avail);
+ ASSERT_FALSE(valid);
+}
+
// It would be great to include an IPv6 test and assume it'll pass, but not every ISP / resolver plays nicely with IPv6;)
/*TEST(DNSResolver, IPv6Success)
{