# Force step.
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}", log=False)
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
# Check keys again, make sure the rollover has started.
keyprops = [
# Force step.
with ns6.watch_log_from_here() as watcher:
ns6.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/RSASHA256"
+ )
# Check state after step.
step = {
# Force step.
with ns6.watch_log_from_here() as watcher:
ns6.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
# Check logs.
tag = keys[0].key.tag
isctest.log.debug(
f"keymgr-manual-mode blocking transition CSK {zone}/RSASHA256/{tag} type DS state OMNIPRESENT to state UNRETENTIVE, step again"
)
+ tag = keys[1].key.tag
with ns6.watch_log_from_here() as watcher:
ns6.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
step = {
"zone": zone,
ns6.log.expect(msg)
# Force step.
+ tag = keys[1].key.tag
with ns6.watch_log_from_here() as watcher:
ns6.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
step = {
"zone": zone,
# Force step.
with ns6.watch_log_from_here() as watcher:
ns6.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {ktag}/RSASHA256"
+ )
step = {
"zone": zone,
# Force step.
with ns6.watch_log_from_here() as watcher:
ns6.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
# Check logs.
tag = keys[0].key.tag
isctest.log.debug(
f"keymgr-manual-mode blocking transition CSK {zone}/RSASHA256/{tag} type DS state OMNIPRESENT to state UNRETENTIVE, step again"
)
+ tag = keys[2].key.tag
with ns6.watch_log_from_here() as watcher:
ns6.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
step = {
"zone": zone,
ns6.log.expect(msg2)
# Force step.
+ ktag = keys[3].key.tag
with ns6.watch_log_from_here() as watcher:
ns6.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {ktag}/ECDSAP256SHA256"
+ )
step = {
"zone": zone,
# Force step.
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
step = {
# Successor CSK is prepublished (signs DNSKEY RRset, but not yet
# Force step.
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
# Check logs.
tag = keys[0].key.tag
)
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
step = {
# Successor CSK becomes omnipresent, meaning we can start signing
ns3.log.expect(msg)
# Force step.
+ tag = keys[1].key.tag
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
step = {
"zone": zone,
# Force step.
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
step = {
# Successor CSK is prepublished (signs DNSKEY RRset, but not yet
# Force step.
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
# Check logs.
tag = keys[0].key.tag
)
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
step = {
# Successor CSK becomes omnipresent, meaning we can start signing
ns3.log.expect(msg2)
# Force step.
+ tag = keys[1].key.tag
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
step = {
"zone": zone,
# Force step.
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
step = {
"zone": zone,
# Force step.
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
step = {
# Successor KSK is prepublished (and signs DNSKEY RRset).
# Force step.
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
# Check logs.
tag = keys[1].key.tag
)
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
step = {
# The successor DNSKEY RRset has become omnipresent. The
ns3.log.expect(msg2)
# Force step.
+ tag = keys[2].key.tag
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
step = {
# The predecessor DNSKEY may be removed, the successor DS is
# Force step.
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
step = {
# it is time to pre-publish the successor zsk.
# Force step.
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
# Check logs.
tag = keys[1].key.tag
)
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
step = {
# predecessor zsk is no longer actively signing. successor zsk is
ns3.log.expect(msg)
# Force step.
+ tag = keys[2].key.tag
with ns3.watch_log_from_here() as watcher:
ns3.rndc(f"dnssec -step {zone}")
- watcher.wait_for_line(f"keymgr: {zone} done")
+ watcher.wait_for_line(
+ f"zone {zone}/IN (signed): zone_rekey done: key {tag}/ECDSAP256SHA256"
+ )
step = {
# predecessor zsk is no longer needed. all rrsets are signed with