| /src/external/mpl/bind/dist/bin/tests/system/bailiwick/ |
| tests_bailiwick.py | 26 servers["ns4"].rndc("flush") 36 def prime_cache(ns4: NamedInstance) -> None: 38 res = isctest.query.tcp(msg, ns4.ip) 50 def send_trigger_query(ns4: NamedInstance, qname: str) -> None: 52 isctest.query.tcp(msg, ns4.ip) 59 def check_domain_hijack(ns4: NamedInstance) -> None: 62 ns4.rndc("dumpdb -cache") 65 res = isctest.query.tcp(msg, ns4.ip) 69 res = isctest.query.tcp(msg, ns4.ip) 84 ns4 = servers["ns4" [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/expiredglue/ |
| tests_expiredglue.py | 17 def test_expiredglue(ns4): 19 res1 = isctest.query.udp(msg1, ns4.ip) 24 res2 = isctest.query.udp(msg2, ns4.ip) 28 res3 = isctest.query.udp(msg3, ns4.ip) 36 res1_2 = isctest.query.udp(msg1, ns4.ip) 40 res2_2 = isctest.query.udp(msg2, ns4.ip) 44 res3_2 = isctest.query.udp(msg3, ns4.ip) 48 def test_loopdetected(ns4): 50 with ns4.watch_log_from_here() as watcher: 51 res = isctest.query.udp(msg, ns4.ip [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/filters/ |
| setup.sh | 17 (cd ns4 && $SHELL -e sign.sh)
|
| /src/external/mpl/bind/dist/bin/tests/system/migrate2kasp/ |
| setup.sh | 25 cd ns4
|
| /src/external/mpl/bind/dist/bin/tests/system/multisigner/ |
| setup.sh | 24 cd ns4
|
| tests_multisigner.py | 506 def test_multisigner(ns3, ns4, default_algorithm): 516 isctest.kasp.wait_keymgr_done(ns4, zone) 525 keys4 = isctest.kasp.keydir_to_keylist(zone, ns4.identifier) 530 check_dnssec(ns4, zone, keys4, expected4) 539 check_add_zsk(ns4, zone, keys4, expected4, [zsks3[0]], extra) 540 check_no_dnssec_in_journal(ns4, zone) 544 check_remove_zsk(ns4, zone, keys4, expected4, [zsks3[0]], extra, check_fail=True) 545 check_no_dnssec_in_journal(ns4, zone) 554 check_add_cdnskey(ns4, zone, keys4, expected4, [ksks3[0]], extra) 555 check_no_dnssec_in_journal(ns4, zone [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/nta/ |
| tests_nta.py | 45 ns4 = servers["ns4"] 46 response = ns4.rndc("secroots -") 57 ns4 = servers["ns4"] 60 response = ns4.rndc("nta -l '' foo", raise_on_exception=False) 64 response = ns4.rndc("nta -l garbage foo", raise_on_exception=False) 68 response = ns4.rndc("nta -l 7d1h foo", raise_on_exception=False) 75 ns4 = servers["ns4"] [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/redirect/ |
| setup.sh | 20 cp ns4/example.db.in ns4/example.db
|
| tests.sh | 376 $DIG $DIGOPTS nonexist. @10.53.0.4 -b 10.53.0.2 a >dig.out.ns4.test$n || ret=1 377 grep "status: NOERROR" dig.out.ns4.test$n >/dev/null || ret=1 378 grep "nonexist. .*100.100.100.1" dig.out.ns4.test$n >/dev/null || ret=1 385 rm -f ns4/named.stats 2>/dev/null 387 PRE_RED=$(sed -n -e "s/[ ]*\([0-9]*\).queries resulted in NXDOMAIN that were redirected$/\1/p" ns4/named.stats) 388 PRE_SUC=$(sed -n -e "s/[ ]*\([0-9]*\).queries resulted in NXDOMAIN that were redirected and resulted in a successful remote lookup$/\1/p" ns4/named.stats) 389 $DIG $DIGOPTS nonexist. @10.53.0.4 -b 10.53.0.2 aaaa >dig.out.ns4.test$n || ret=1 390 grep "status: NOERROR" dig.out.ns4.test$n >/dev/null || ret=1 391 grep "nonexist. .*2001:ffff:ffff::6464:6401" dig.out.ns4.test$n >/dev/null || ret=1 398 rm -f ns4/named.stats 2>/dev/nul [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/resolver/ |
| setup.sh | 17 cp ns4/tld1.db ns4/tld.db
|
| tests.sh | 224 # ns5 is the recusor being tested. ns4 holds the sourcens zone containing 236 dig_with_opts +norecurse @10.53.0.4 target${nscount}.sourcens ns >dig.ns4.out.${nscount}.${n} 237 sourcerecs=$(grep NS dig.ns4.out.${nscount}.${n} | grep -cv ';') 255 stop_server ns4 256 touch ns4/named.noaa 257 start_server --noclean --restart --port ${PORT} ns4 || ret=1 263 dig_with_opts +tcp . @10.53.0.4 soa >dig.ns4.out.${n} || ret=1 264 grep 'flags: qr rd;' dig.ns4.out.${n} >/dev/null || ret=1 295 stop_server ns4 296 rm ns4/named.noa [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/xfer_servers_list/ |
| tests_xfer_servers_list.py | 42 def test_xfer_servers_list(ns1, ns2, ns3, ns4, templates): 43 # First, wait for ns2, ns3 and ns4 to xfrin foo.fr and answer it 46 wait_for_initial_xfrin(ns4) 55 seq = [(ns2, "notifykey2"), (ns3, "notifykey3"), (ns4, "notifykey4")] 59 # Then, ns1 update foo.fr. It notifies ns2, ns3 and ns4 about it 61 with ns2.watch_log_from_here() as ns2_watcher, ns3.watch_log_from_here() as ns3_watcher, ns4.watch_log_from_here() as ns4_watcher: 68 check_soa(ns4, 2)
|
| /src/external/mpl/bind/dist/bin/tests/system/kasp/ |
| setup.sh | 32 cd ns4
|
| /src/external/mpl/bind/dist/bin/tests/system/dnssec/ |
| tests.sh | 122 $DIG +tcp +dnssec -p "$PORT" a.insecure.example. @10.53.0.4 a >dig.out.ns4.test$n || ret=1 123 grep "ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 2" dig.out.ns4.test$n >/dev/null || ret=1 124 grep "ns\\.insecure\\.example\\..*A.10\\.53\\.0\\.3" dig.out.ns4.test$n >/dev/null || ret=1 150 dig_with_opts +noauth +noadd +nodnssec +adflag a.example. @10.53.0.4 a >dig.out.ns4.test$n || ret=1 151 digcomp dig.out.ns2.test$n dig.out.ns4.test$n || ret=1 152 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n >/dev/null || ret=1 162 dig_with_opts +noauth +noadd +nodnssec +noadflag a.example. @10.53.0.4 a >dig.out.ns4.test$n || ret=1 163 digcomp dig.out.ns2.test$n dig.out.ns4.test$n || ret=1 164 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n >/dev/null && ret=1 180 dig_with_opts +noauth a.example. @10.53.0.4 a >dig.out.ns4.test$n || ret= [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/mkeys/ |
| setup.sh | 23 (cd ns4 && $SHELL sign.sh) 28 cd ns4
|
| /src/external/mpl/bind/dist/bin/tests/system/rootkeysentinel/ |
| tests.sh | 187 $DIG $DIGOPTS @10.53.0.4 example SOA >dig.out.ns4.test$n 188 grep "status: NOERROR" dig.out.ns4.test$n >/dev/null || ret=1 193 $DIG $DIGOPTS @10.53.0.4 root-key-sentinel-is-ta-${oldid}.example A >dig.out.ns4.test$n || ret=1 194 grep "status: NOERROR" dig.out.ns4.test$n >/dev/null || ret=1 199 $DIG $DIGOPTS @10.53.0.4 root-key-sentinel-not-ta-${oldid}.example A >dig.out.ns4.test$n || ret=1 200 grep "status: NOERROR" dig.out.ns4.test$n >/dev/null || ret=1 205 $DIG $DIGOPTS @10.53.0.4 root-key-sentinel-is-ta-${newid}.example A >dig.out.ns4.test$n || ret=1 206 grep "status: NOERROR" dig.out.ns4.test$n >/dev/null || ret=1 211 $DIG $DIGOPTS @10.53.0.4 root-key-sentinel-not-ta-${newid}.example A >dig.out.ns4.test$n || ret=1 212 grep "status: NOERROR" dig.out.ns4.test$n >/dev/null || ret= [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/rndc/ |
| setup.sh | 20 $SHELL ${TOP_SRCDIR}/bin/tests/system/genzone.sh 2 >ns4/example.db 39 >ns4/key${1}.conf 2>/dev/null 40 grep -E -v '(^# Start|^# End|^# Use|^[^#])' ns4/key$1.conf | cut -c3- \ 41 | sed 's/allow { 10.53.0.4/allow { any/' >>ns4/named.conf 53 cat >>ns4/named.conf <<-EOF
|
| /src/external/mpl/bind/dist/bin/tests/system/autosign/ |
| tests.sh | 272 $DIG $DIGOPTS +noauth a.oldsigs.example. @10.53.0.4 a >dig.out.ns4.test$n || ret=1 273 digcomp dig.out.ns3.test$n dig.out.ns4.test$n || ret=1 274 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n >/dev/null || ret=1 293 $DIG $DIGOPTS +noauth q.nsec3.example. @10.53.0.4 a >dig.out.ns4.test$n || ret=1 294 digcomp dig.out.ns3.test$n dig.out.ns4.test$n || ret=1 295 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n >/dev/null || ret=1 296 grep "status: NXDOMAIN" dig.out.ns4.test$n >/dev/null || ret=1 307 $DIG $DIGOPTS +noauth q.autonsec3.example. @10.53.0.4 a >dig.out.ns4.test$n || ret=1 308 digcomp dig.out.ns3.test$n dig.out.ns4.test$n || ret=1 309 grep "flags:.*ad.*QUERY" dig.out.ns4.test$n >/dev/null || ret= [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/nsprocessinglimit/ |
| tests_nsprocessinglimit.py | 55 def test_selfpointedglue_nslimit(ns4): 57 res = isctest.query.tcp(msg, ns4.ip) 62 ips_and_queries = extract_dnstap(ns4, 24)
|
| /src/external/mpl/bind/dist/bin/tests/system/catz/ |
| setup.sh | 25 cp -f ns4/catalog.example.db.in ns4/catalog-self.example.db
|
| /src/external/mpl/bind/dist/bin/tests/system/staticstub/ns3/ |
| sign.sh | 20 (cd ../ns4 && $SHELL -e sign.sh) 22 cp ../ns4/dsset-sub.example. .
|
| /src/external/mpl/bind/dist/bin/tests/system/nta/ns1/ |
| sign.sh | 36 cp trusted.conf ../ns4/trusted.conf
|
| /src/external/mpl/bind/dist/bin/tests/system/xfer/ |
| tests_xfer.py | 50 def after_servers_start(templates, ns4): 54 with ns4.watch_log_from_here() as watcher: 55 templates.render("ns4/named.conf", {"ns4_as_secondary_for_nil": True}) 56 ns4.reconfigure() 59 with ns4.watch_log_from_here() as watcher_retransfer_nil_success: 60 ns4.rndc("retransfer nil.") 282 # Initially, ns4 is not authoritative for anything. 283 # Now that ans is up and running with the right data, we make ns4 307 def test_handle_ixfr_notimp(ns4): 309 with ns4.watch_log_from_here() as watcher_transfer_success [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/dnssec/ns1/ |
| sign.sh | 51 cp trusted.conf ../ns4/trusted.conf 60 cp managed.conf ../ns4/managed.conf
|
| /src/external/mpl/bind/dist/bin/tests/system/ixfr/ |
| tests.sh | 173 # ns3 is primary; ns4 is secondary 184 nextpart ns4/named.run >/dev/null 203 wait_for_log 10 'got incremental' ns4/named.run || ret=1 217 nextpart ns4/named.run >/dev/null 232 wait_for_log 10 'got nonincremental response' ns4/named.run || ret=1 241 nextpart ns4/named.run >/dev/null 256 wait_for_log 10 'got incremental response' ns4/named.run || ret=1 286 nextpart ns4/named.run >/dev/null 300 nextpart ns4/named.run | grep "IXFR delta size (306 bytes)" >/dev/null || ret=1 362 # Note: in the next two tests, we use ns4 logs for checking both incoming an [all...] |