self.assertNoRRSIGsInAnswer(res)
self.assertRcodeEqual(res, dns.rcode.NOERROR)
+ # now we request the DS for insecure.example., which does not exist,
+ # to check that we correctly get the SOA and not just the denial proof
+ # that the recursor received on the delegation from example. to insecure.example.
+ res = self.sendQuery('insecure.example.', 'DS')
+ self.assertRcodeEqual(res, dns.rcode.NOERROR)
+ self.assertMessageIsAuthenticated(res)
+ self.assertAuthorityHasSOA(res)
+
def testBogusAnswer(self):
res = self.sendQuery('ted.bogus.example.', 'A')
def testSecureCNAMEWildCardNXDOMAIN(self):
# the answer to this query reaches the UDP truncation threshold, so let's use TCP
res = self.sendQuery('something.cnamewildcardnxdomain.secure.example.', 'A', useTCP=True)
- expectedCNAME = dns.rrset.from_text('something.cnamewildcardnxdomain.secure.example.', 0, dns.rdataclass.IN, 'CNAME', 'doesntexist.secure.example.')
+ expectedCNAME = dns.rrset.from_text('something.cnamewildcardnxdomain.secure.example.', 0, dns.rdataclass.IN, 'CNAME', 'doesnotexist.secure.example.')
self.assertRcodeEqual(res, dns.rcode.NXDOMAIN)
self.assertMatchingRRSIGInAnswer(res, expectedCNAME)
self.assertMessageHasFlags(res, ['QR', 'RD', 'RA'], ['DO'])
self.assertRRsetInAnswer(res, expectedCNAME)
self.assertRRsetInAnswer(res, expectedDNAME)
- self.assertMatchingRRSIGInAnswer(res, expectedDNAME)