$SHELL ${TOP_SRCDIR}/bin/tests/system/genzone.sh 2 3 >ns2/example.db
$SHELL ${TOP_SRCDIR}/bin/tests/system/genzone.sh 2 3 >ns2/tsigzone.db
-copy_setports ns2/named1.conf.in ns2/named.conf
-copy_setports ns3/named.conf.in ns3/named.conf
-copy_setports ns4/named.conf.in ns4/named.conf
status=1
}
-copy_setports ns2/named2.conf.in ns2/named.conf
+cp ns2/named2.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
sleep 5
echo_i "testing nested ACL processing"
# all combinations of 10.53.0.{1|2} with key {one|two}, should succeed
-copy_setports ns2/named3.conf.in ns2/named.conf
+cp ns2/named3.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
sleep 5
}
# now we only allow 10.53.0.1 *and* key one, or 10.53.0.2 *and* key two
-copy_setports ns2/named4.conf.in ns2/named.conf
+cp ns2/named4.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
sleep 5
}
echo_i "testing allow-query-on ACL processing"
-copy_setports ns2/named5.conf.in ns2/named.conf
+cp ns2/named5.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
sleep 5
t=$((t + 1))
+++ /dev/null
-#!/bin/sh
-
-# Copyright (C) Internet Systems Consortium, Inc. ("ISC")
-#
-# SPDX-License-Identifier: MPL-2.0
-#
-# This Source Code Form is subject to the terms of the Mozilla Public
-# License, v. 2.0. If a copy of the MPL was not distributed with this
-# file, you can obtain one at https://mozilla.org/MPL/2.0/.
-#
-# See the COPYRIGHT file distributed with this work for additional
-# information regarding copyright ownership.
-
-. ../conf.sh
-
-copy_setports ns1/named1.conf.in ns1/named.conf
-copy_setports ns2/named.conf.in ns2/named.conf
-copy_setports ns3/named.conf.in ns3/named.conf
dotests
echo_i "reconfiguring server: minimal-responses no"
-copy_setports ns1/named2.conf.in ns1/named.conf
+cp ns1/named2.conf ns1/named.conf
rndc_reconfig ns1 10.53.0.1
echo_i "testing with 'minimal-responses no;'"
fi
echo_i "reconfiguring server: minimal-any yes"
-copy_setports ns1/named3.conf.in ns1/named.conf
+cp ns1/named3.conf ns1/named.conf
rndc_reconfig ns1 10.53.0.1
n=$((n + 1))
dotests
echo_i "reconfiguring server: minimal-responses no-auth-recursive"
-copy_setports ns1/named4.conf.in ns1/named.conf
+cp ns1/named4.conf ns1/named.conf
rndc_reconfig ns1 10.53.0.1
echo_i "testing with 'minimal-responses no-auth-recursive;'"
fi
echo_i "reconfiguring server: minimal-responses no"
-copy_setports ns1/named2.conf.in ns1/named.conf
+cp ns1/named2.conf ns1/named.conf
rndc_reconfig ns1 10.53.0.1
n=$((n + 1))
cp -f ns2/redirect.db.1 ns2/redirect.db
cp -f ns3/redirect.db.1 ns3/redirect.db
-copy_setports ns2/named1.conf.in ns2/named.conf
-copy_setports ns3/named1.conf.in ns3/named.conf
-
cp -f ns2/default.nzf.in ns2/3bf305731dd26307.nzf
mkdir ns2/new-zones
status=$((status + ret))
echo_i "reconfiguring server with multiple views"
-rm -f ns2/named.conf
-copy_setports ns2/named2.conf.in ns2/named.conf
+cp ns2/named2.conf ns2/named.conf
rndc_reconfig ns2 10.53.0.2
echo_i "adding new zone to external view ($n)"
status=$((status + ret))
echo_i "reconfiguring server with multiple views and new-zones-directory"
-rm -f ns2/named.conf
-copy_setports ns2/named3.conf.in ns2/named.conf
+cp ns2/named3.conf ns2/named.conf
rndc_reconfig ns2 10.53.0.2
echo_i "checking new zone is still loaded after dir change ($n)"
echo_i "check delzone after reconfig failure ($n)"
ret=0
$RNDCCMD 10.53.0.3 addzone 'inlinesec.example. IN { type secondary; file "inlinesec.db"; masterfile-format text; primaries { test; }; };' >/dev/null 2>&1 || ret=1
-copy_setports ns3/named2.conf.in ns3/named.conf
+cp ns3/named2.conf ns3/named.conf
rndc_reconfig ns3 10.53.0.3
$RNDCCMD 10.53.0.3 delzone inlinesec.example >/dev/null 2>&1 || ret=1
n=$((n + 1))
--- /dev/null
+../../_common/controls.conf.in
\ No newline at end of file
+++ /dev/null
-#!/bin/sh -e
-
-# Copyright (C) Internet Systems Consortium, Inc. ("ISC")
-#
-# SPDX-License-Identifier: MPL-2.0
-#
-# This Source Code Form is subject to the terms of the Mozilla Public
-# License, v. 2.0. If a copy of the MPL was not distributed with this
-# file, you can obtain one at https://mozilla.org/MPL/2.0/.
-#
-# See the COPYRIGHT file distributed with this work for additional
-# information regarding copyright ownership.
-
-. ../conf.sh
-
-copy_setports ../_common/controls.conf.in ns2/controls.conf
-copy_setports ns1/named.conf.in ns1/named.conf
-copy_setports ns2/named01.conf.in ns2/named.conf
-copy_setports ns3/named1.conf.in ns3/named.conf
# Test 2 - explicit any, query allowed
n=$((n + 1))
-copy_setports ns2/named02.conf.in ns2/named.conf
+cp ns2/named02.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: explicit any - query allowed"
# Test 3 - none, query refused
n=$((n + 1))
-copy_setports ns2/named03.conf.in ns2/named.conf
+cp ns2/named03.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: none - query refused"
# Test 4 - address allowed, query allowed
n=$((n + 1))
-copy_setports ns2/named04.conf.in ns2/named.conf
+cp ns2/named04.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: address allowed - query allowed"
# Test 5 - address not allowed, query refused
n=$((n + 1))
-copy_setports ns2/named05.conf.in ns2/named.conf
+cp ns2/named05.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: address not allowed - query refused"
# Test 6 - address disallowed, query refused
n=$((n + 1))
-copy_setports ns2/named06.conf.in ns2/named.conf
+cp ns2/named06.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: address disallowed - query refused"
# Test 7 - acl allowed, query allowed
n=$((n + 1))
-copy_setports ns2/named07.conf.in ns2/named.conf
+cp ns2/named07.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: acl allowed - query allowed"
# Test 8 - acl not allowed, query refused
n=$((n + 1))
-copy_setports ns2/named08.conf.in ns2/named.conf
+cp ns2/named08.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: acl not allowed - query refused"
# Test 9 - acl disallowed, query refused
n=$((n + 1))
-copy_setports ns2/named09.conf.in ns2/named.conf
+cp ns2/named09.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: acl disallowed - query refused"
# Test 10 - key allowed, query allowed
n=$((n + 1))
-copy_setports ns2/named10.conf.in ns2/named.conf
+cp ns2/named10.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: key allowed - query allowed"
# Test 11 - key not allowed, query refused
n=$((n + 1))
-copy_setports ns2/named11.conf.in ns2/named.conf
+cp ns2/named11.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: key not allowed - query refused"
# Test 12 - key disallowed, query refused
n=$((n + 1))
-copy_setports ns2/named12.conf.in ns2/named.conf
+cp ns2/named12.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: key disallowed - query refused"
n=20
# Test 21 - views default, query allowed
n=$((n + 1))
-copy_setports ns2/named21.conf.in ns2/named.conf
+cp ns2/named21.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: views default - query allowed"
# Test 22 - views explicit any, query allowed
n=$((n + 1))
-copy_setports ns2/named22.conf.in ns2/named.conf
+cp ns2/named22.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: views explicit any - query allowed"
# Test 23 - views none, query refused
n=$((n + 1))
-copy_setports ns2/named23.conf.in ns2/named.conf
+cp ns2/named23.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: views none - query refused"
# Test 24 - views address allowed, query allowed
n=$((n + 1))
-copy_setports ns2/named24.conf.in ns2/named.conf
+cp ns2/named24.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: views address allowed - query allowed"
# Test 25 - views address not allowed, query refused
n=$((n + 1))
-copy_setports ns2/named25.conf.in ns2/named.conf
+cp ns2/named25.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: views address not allowed - query refused"
# Test 26 - views address disallowed, query refused
n=$((n + 1))
-copy_setports ns2/named26.conf.in ns2/named.conf
+cp ns2/named26.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: views address disallowed - query refused"
# Test 27 - views acl allowed, query allowed
n=$((n + 1))
-copy_setports ns2/named27.conf.in ns2/named.conf
+cp ns2/named27.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: views acl allowed - query allowed"
# Test 28 - views acl not allowed, query refused
n=$((n + 1))
-copy_setports ns2/named28.conf.in ns2/named.conf
+cp ns2/named28.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: views acl not allowed - query refused"
# Test 29 - views acl disallowed, query refused
n=$((n + 1))
-copy_setports ns2/named29.conf.in ns2/named.conf
+cp ns2/named29.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: views acl disallowed - query refused"
# Test 30 - views key allowed, query allowed
n=$((n + 1))
-copy_setports ns2/named30.conf.in ns2/named.conf
+cp ns2/named30.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: views key allowed - query allowed"
# Test 31 - views key not allowed, query refused
n=$((n + 1))
-copy_setports ns2/named31.conf.in ns2/named.conf
+cp ns2/named31.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: views key not allowed - query refused"
# Test 32 - views key disallowed, query refused
n=$((n + 1))
-copy_setports ns2/named32.conf.in ns2/named.conf
+cp ns2/named32.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: views key disallowed - query refused"
# Test 33 - views over options, views allow, query allowed
n=$((n + 1))
-copy_setports ns2/named33.conf.in ns2/named.conf
+cp ns2/named33.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: views over options, views allow - query allowed"
# Test 34 - views over options, views disallow, query refused
n=$((n + 1))
-copy_setports ns2/named34.conf.in ns2/named.conf
+cp ns2/named34.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: views over options, views disallow - query refused"
# Test 41 - zone default, query allowed
n=$((n + 1))
-copy_setports ns2/named40.conf.in ns2/named.conf
+cp ns2/named40.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: zone default - query allowed"
# Test 53 - zones over options, zones allow, query allowed
n=$((n + 1))
-copy_setports ns2/named53.conf.in ns2/named.conf
+cp ns2/named53.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: views over options, views allow - query allowed"
# Test 54 - zones over options, zones disallow, query refused
n=$((n + 1))
-copy_setports ns2/named54.conf.in ns2/named.conf
+cp ns2/named54.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: views over options, views disallow - query refused"
# Test 55 - zones over views, zones allow, query allowed
n=$((n + 1))
-copy_setports ns2/named55.conf.in ns2/named.conf
+cp ns2/named55.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: zones over views, views allow - query allowed"
# Test 56 - zones over views, zones disallow, query refused
n=$((n + 1))
-copy_setports ns2/named56.conf.in ns2/named.conf
+cp ns2/named56.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: zones over views, views disallow - query refused"
# Test 57 - zones over views, zones disallow, query refused (allow-query-on)
n=$((n + 1))
-copy_setports ns2/named57.conf.in ns2/named.conf
+cp ns2/named57.conf ns2/named.conf
rndc_reload ns2 10.53.0.2
echo_i "test $n: zones over views, allow-query-on"
# Test 60 - block recursion-on, allow query-cache-on
n=$((n + 1))
-copy_setports ns3/named2.conf.in ns3/named.conf
+cp ns3/named2.conf ns3/named.conf
rndc_reload ns3 10.53.0.3
echo_i "test $n: block recursion-on, allow query-cache-on"
# Test 61 - inheritance of allow-query-cache-on from allow-recursion-on
n=$((n + 1))
-copy_setports ns3/named3.conf.in ns3/named.conf
+cp ns3/named3.conf ns3/named.conf
rndc_reload ns3 10.53.0.3
echo_i "test $n: inheritance of allow-query-cache-on"
# Test 62 - inheritance of allow-recursion-on from allow-query-cache-on
n=$((n + 1))
-copy_setports ns3/named4.conf.in ns3/named.conf
+cp ns3/named4.conf ns3/named.conf
rndc_reload ns3 10.53.0.3
echo_i "test $n: inheritance of allow-recursion-on"
# Test 63 - allow-query-cache inheritance from allow-recursion
n=$((n + 1))
-copy_setports ns3/named5.conf.in ns3/named.conf
+cp ns3/named5.conf ns3/named.conf
rndc_reload ns3 10.53.0.3
echo_i "test $n: inheritance of allow-query-cache from allow-recursion"
# Test 64 - allow-query-cache no inheritance from allow-recursion as it is
# defined in the options
n=$((n + 1))
-copy_setports ns3/named6.conf.in ns3/named.conf
+cp ns3/named6.conf ns3/named.conf
rndc_reload ns3 10.53.0.3
echo_i "test $n: allow-query-cache defined in options, so it does not inherit from allow-recursion"
# Test 65 - allow-query-cache inherits from allow-recursion before allow-query
n=$((n + 1))
-copy_setports ns3/named7.conf.in ns3/named.conf
+cp ns3/named7.conf ns3/named.conf
rndc_reload ns3 10.53.0.3
echo_i "test $n: allow-query-cache inherits from allow-recursion before allow-query"
# Test 66 - allow-recursion inheritance from allow-query
n=$((n + 1))
-copy_setports ns3/named8.conf.in ns3/named.conf
+cp ns3/named8.conf ns3/named.conf
rndc_reload ns3 10.53.0.3
echo_i "test $n: inheritance of allow-query-cache from allow-recursion"
. ../conf.sh
-copy_setports ns1/named.conf1.in ns1/named.conf
-copy_setports ns2/named.conf.in ns2/named.conf
-copy_setports ns3/named.conf.in ns3/named.conf
-copy_setports ns4/named.conf.in ns4/named.conf
-
cd ns1 && $SHELL sign.sh
if [ $ret != 0 ]; then echo_i "failed"; fi
status=$((status + ret))
-copy_setports ns1/named.conf2.in ns1/named.conf
+cp ns1/named2.conf ns1/named.conf
rndc_reload ns1 10.53.0.1
echo_i "checking 'dig +dns64prefix' with multiple prefixes ($n)"
if [ $ret != 0 ]; then echo_i "failed"; fi
status=$((status + ret))
-copy_setports ns1/named.conf3.in ns1/named.conf
+cp ns1/named3.conf ns1/named.conf
rndc_reload ns1 10.53.0.1
echo_i "checking 'dig +dns64prefix' with no prefixes ($n)"
+++ /dev/null
-#!/bin/sh
-
-# Copyright (C) Internet Systems Consortium, Inc. ("ISC")
-#
-# SPDX-License-Identifier: MPL-2.0
-#
-# This Source Code Form is subject to the terms of the Mozilla Public
-# License, v. 2.0. If a copy of the MPL was not distributed with this
-# file, you can obtain one at https://mozilla.org/MPL/2.0/.
-#
-# See the COPYRIGHT file distributed with this work for additional
-# information regarding copyright ownership.
-
-. ../conf.sh
-
-copy_setports ns1/named.conf.in ns1/named.conf
-copy_setports ns2/named.conf.in ns2/named.conf
-copy_setports ns3/named1.conf.in ns3/named.conf
-copy_setports ns5/named1.conf.in ns5/named.conf
if [ $ret != 0 ]; then echo_i "failed"; fi
status=$((status + ret))
-copy_setports ns3/named2.conf.in ns3/named.conf
+cp ns3/named2.conf ns3/named.conf
rndc_reconfig ns3 10.53.0.3
n=$((n + 1))
if [ $ret != 0 ]; then echo_i "failed"; fi
status=$((status + ret))
-copy_setports ns3/named3.conf.in ns3/named.conf
+cp ns3/named3.conf ns3/named.conf
rndc_reconfig ns3 10.53.0.3
n=$((n + 1))
echo_i "stop ns5"
stop_server --use-rndc --port ${CONTROLPORT} ns5
-copy_setports ns5/named2.conf.in ns5/named.conf
+cp ns5/named2.conf ns5/named.conf
echo_i "start ns5"
start_server --noclean --restart --port ${PORT} ns5
n=$((n + 1))
echo_i "checking a warning is logged if max-clients-per-query < clients-per-query ($n)"
ret=0
-copy_setports ns5/named3.conf.in ns5/named.conf
+cp ns5/named3.conf ns5/named.conf
rndc_reconfig ns5 10.53.0.5
wait_for_message ns5/named.run "configured clients-per-query (10) exceeds max-clients-per-query (5); automatically adjusting max-clients-per-query to (10)" || ret=1
if [ $ret != 0 ]; then echo_i "failed"; fi
. ../conf.sh
-copy_setports ns2/named1.conf.in ns2/named.conf
-
for i in 1 2 3 4 5 6 7 other bogus; do
cp ns2/example.db.in ns2/example${i}.db
echo "@ IN TXT \"$i\"" >>ns2/example$i.db
fi
echo_i "reloading server"
-copy_setports ns2/named2.conf.in ns2/named.conf
+cp ns2/named2.conf ns2/named.conf
$CHECKCONF ns2/named.conf | cat_i
rndc_reload ns2 10.53.0.2
sleep 3
fi
echo_i "reloading server"
-copy_setports ns2/named3.conf.in ns2/named.conf
+cp ns2/named3.conf ns2/named.conf
$CHECKCONF ns2/named.conf | cat_i
rndc_reload ns2 10.53.0.2
sleep 3
fi
echo_i "reloading server"
-copy_setports ns2/named4.conf.in ns2/named.conf
+cp ns2/named4.conf ns2/named.conf
$CHECKCONF ns2/named.conf | cat_i
rndc_reload ns2 10.53.0.2
sleep 3
fi
echo_i "reloading server"
-copy_setports ns2/named5.conf.in ns2/named.conf
+cp ns2/named5.conf ns2/named.conf
$CHECKCONF ns2/named.conf | cat_i
rndc_reload ns2 10.53.0.2
sleep 3
n=$((n + 1))
echo_i "reloading server"
-copy_setports ns2/named6.conf.in ns2/named.conf
+cp ns2/named6.conf ns2/named.conf
$CHECKCONF ns2/named.conf | cat_i
rndc_reload ns2 10.53.0.2
sleep 3
fi
echo_i "reloading server"
-copy_setports ns2/named7.conf.in ns2/named.conf
+cp ns2/named7.conf ns2/named.conf
$CHECKCONF ns2/named.conf | cat_i
rndc_reload ns2 10.53.0.2
sleep 3
fi
echo_i "reloading server"
-copy_setports ns2/named8.conf.in ns2/named.conf
+cp ns2/named8.conf ns2/named.conf
$CHECKCONF ns2/named.conf | cat_i
rndc_reload ns2 10.53.0.2
sleep 3
fi
echo_i "reloading server"
-copy_setports ns2/named9.conf.in ns2/named.conf
+cp ns2/named9.conf ns2/named.conf
$CHECKCONF ns2/named.conf | cat_i
rndc_reload ns2 10.53.0.2
sleep 3
fi
echo_i "reloading server"
-copy_setports ns2/named10.conf.in ns2/named.conf
+cp ns2/named10.conf ns2/named.conf
$CHECKCONF ns2/named.conf | cat_i
rndc_reload ns2 10.53.0.2
sleep 3
fi
echo_i "reloading server"
-copy_setports ns2/named11.conf.in ns2/named.conf
+cp ns2/named11.conf ns2/named.conf
$CHECKCONF ns2/named.conf | cat_i
rndc_reload ns2 10.53.0.2
sleep 3
fi
echo_i "reloading server"
-copy_setports ns2/named12.conf.in ns2/named.conf
+cp ns2/named12.conf ns2/named.conf
$CHECKCONF ns2/named.conf | cat_i
rndc_reload ns2 10.53.0.2
sleep 3
touch ns4/trusted.conf
cp ns4/noixfr.db.in ns4/noixfr.db
-copy_setports ns1/named.conf.in ns1/named.conf
-copy_setports ns2/named.conf.in ns2/named.conf
-copy_setports ns3/named.conf.in ns3/named.conf
cp ns3/delayedkeys.conf.1 ns3/delayedkeys.conf
-copy_setports ns4/named.conf.in ns4/named.conf
-copy_setports ns5/named.conf.pre ns5/named.conf
-copy_setports ns6/named.conf.in ns6/named.conf
-copy_setports ns7/named.conf.in ns7/named.conf
-copy_setports ns8/named.conf.in ns8/named.conf
(
cd ns3
grep "ANSWER: 1," dig.out.ns5.test$n >/dev/null || ret=1
if [ $ret != 0 ]; then echo_i "setup broken"; fi
status=$((status + ret))
-copy_setports ns5/named.conf.post ns5/named.conf
+cp ns5/named2.conf ns5/named.conf
(
cd ns5
$KEYGEN -q -a ${DEFAULT_ALGORITHM} bits
# shellcheck source=conf.sh
. ../conf.sh
-copy_setports ns1/named.conf.in ns1/named.conf
-copy_setports ns2/named.conf.in ns2/named.conf
-copy_setports ns3/named.conf.in ns3/named.conf
-copy_setports ns4/named1.conf.in ns4/named.conf
-
cp ns1/example.db ns2/
cp ns2/formerly-text.db.in ns2/formerly-text.db
cp ns1/empty.db.in ns1/under-limit.db
# Reconfigure ns4
echo_i "reconfigure ns4"
stop_server ns4
-copy_setports ns4/named2.conf.in ns4/named.conf
+cp ns4/named2.conf ns4/named.conf
# Recompile zone
$CHECKZONE -D -F raw -o ns4/kasp.db.raw kasp-max-types-per-name ns4/template.db >/dev/null 2>&1
start_server --noclean --restart --port "${PORT}" ns4
. ../conf.sh
-copy_setports ns1/named1.conf.in ns1/named.conf
-copy_setports ns2/named.conf.in ns2/named.conf
-copy_setports ns3/named.conf.in ns3/named.conf
-copy_setports ns4/named.conf.in ns4/named.conf
-copy_setports ns5/named.conf.in ns5/named.conf
-copy_setports ns6/named.conf.in ns6/named.conf
-copy_setports ns7/named.conf.in ns7/named.conf
-
cp ns5/named1.args ns5/named.args
(cd ns1 && $SHELL sign.sh)
$SETTIME -D now -K ns1 "$standby2" >/dev/null
sleep 1 # ensure modification time changes
$SIGNER -Sg -K ns1 -N unixtime -o . ns1/root.db >/dev/null 2>/dev/null
-copy_setports ns1/named2.conf.in ns1/named.conf
+cp ns1/named2.conf ns1/named.conf
rm -f ns1/root.db.signed.jnl
mkeys_reconfig_on 1 || ret=1
mkeys_reload_on 1 || ret=1
grep "example..*.RRSIG..*TXT" dig.out.ns5.a.test$n >/dev/null && ret=1
grep "status: SERVFAIL" dig.out.ns5.a.test$n >/dev/null || ret=1
# Allow queries from ns5 to ns1
-copy_setports ns1/named3.conf.in ns1/named.conf
+cp ns1/named3.conf ns1/named.conf
rm -f ns1/root.db.signed.jnl
nextpart ns5/named.run >/dev/null
mkeys_reconfig_on 1 || ret=1
. ../conf.sh
-copy_setports ns1/named.conf.in ns1/named.conf
-copy_setports ns3/named1.conf.in ns3/named.conf
-
sed -e s/big[.]/signed./g <ns1/big.db >ns1/signed.db
$KEYGEN -K ns1 -q -a "$DEFAULT_ALGORITHM" -b "$DEFAULT_BITS" -f KSK signed >/dev/null 2>&1
$KEYGEN -K ns1 -q -a "$DEFAULT_ALGORITHM" -b "$DEFAULT_BITS" signed >/dev/null 2>&1
n=0
ns3_reset() {
- copy_setports $1 ns3/named.conf
$RNDC -c ../_common/rndc.conf -s 10.53.0.3 -p ${CONTROLPORT} reconfig 2>&1 | sed 's/^/I:ns3 /'
$RNDC -c ../_common/rndc.conf -s 10.53.0.3 -p ${CONTROLPORT} flush | sed 's/^/I:ns3 /'
}
ret=0
echo "12" >ans2/ans.limit
echo "12" >ans4/ans.limit
-ns3_reset ns3/named1.conf.in
+ns3_reset
dig_with_opts @10.53.0.2 reset >/dev/null || ret=1
dig_with_opts @10.53.0.4 reset >/dev/null || ret=1
dig_with_opts @10.53.0.3 indirect2.example.org >dig.out.1.test$n || ret=1
echo_i "attempt excessive-depth lookup ($n)"
ret=0
echo "12" >ans2/ans.limit
-ns3_reset ns3/named2.conf.in
+cp ns3/named2.conf ns3/named.conf
+ns3_reset
dig_with_opts @10.53.0.2 reset >/dev/null || ret=1
dig_with_opts @10.53.0.4 reset >/dev/null || ret=1
dig_with_opts @10.53.0.3 indirect3.example.org >dig.out.1.test$n || ret=1
ret=0
echo "5" >ans2/ans.limit
echo "5" >ans4/ans.limit
-ns3_reset ns3/named2.conf.in
+ns3_reset
dig_with_opts @10.53.0.2 reset >/dev/null || ret=1
dig_with_opts @10.53.0.4 reset >/dev/null || ret=1
dig_with_opts @10.53.0.3 indirect4.example.org >dig.out.1.test$n || ret=1
ret=0
echo "13" >ans2/ans.limit
echo "13" >ans4/ans.limit
-ns3_reset ns3/named3.conf.in
+cp ns3/named3.conf ns3/named.conf
+ns3_reset
dig_with_opts @10.53.0.2 reset >/dev/null || ret=1
dig_with_opts @10.53.0.4 reset >/dev/null || ret=1
dig_with_opts @10.53.0.3 indirect5.example.org >dig.out.1.test$n || ret=1
echo_i "attempt permissible lookup ($n)"
ret=0
echo "12" >ans2/ans.limit
-ns3_reset ns3/named3.conf.in
+ns3_reset
dig_with_opts @10.53.0.2 reset >/dev/null || ret=1
dig_with_opts @10.53.0.3 indirect6.example.org >dig.out.1.test$n || ret=1
grep "status: NOERROR" dig.out.1.test$n >/dev/null || ret=1
echo_i "attempt excessive-queries lookup ($n)"
ret=0
echo "11" >ans2/ans.limit
-ns3_reset ns3/named4.conf.in
+cp ns3/named4.conf ns3/named.conf
+ns3_reset
dig_with_opts @10.53.0.2 reset >/dev/null || ret=1
dig_with_opts @10.53.0.3 indirect7.example.org >dig.out.1.test$n || ret=1
if ns3_sends_aaaa_queries; then
echo_i "attempt permissible lookup ($n)"
ret=0
echo "9" >ans2/ans.limit
-ns3_reset ns3/named4.conf.in
+ns3_reset
dig_with_opts @10.53.0.2 reset >/dev/null || ret=1
dig_with_opts @10.53.0.3 indirect8.example.org >dig.out.1.test$n || ret=1
grep "status: NOERROR" dig.out.1.test$n >/dev/null || ret=1
n=$((n + 1))
echo_i "attempting NS explosion ($n)"
ret=0
-ns3_reset ns3/named4.conf.in
+ns3_reset
dig_with_opts @10.53.0.2 reset >/dev/null || ret=1
dig_with_opts +short @10.53.0.3 ns1.1.example.net >dig.out.1.test$n || ret=1
dig_with_opts +short @10.53.0.2 count txt >dig.out.2.test$n || ret=1
if [ $ret != 0 ]; then echo_i "failed"; fi
status=$((status + ret))
-ns3_reset ns3/named5.conf.in
+cp ns3/named5.conf ns3/named.conf
+ns3_reset
dig_with_opts @10.53.0.3 biganswer.big >dig.out.2.test$n || ret=1
grep 'status: NOERROR' dig.out.2.test$n >/dev/null || ret=1
if [ $ret != 0 ]; then echo_i "failed"; fi
echo_i "checking that lifting the limit will allow everything to get cached ($n)"
# Lift the limit
-ns3_reset ns3/named6.conf.in
+cp ns3/named6.conf ns3/named.conf
+ns3_reset
for ntype in $(seq 65280 65534); do
check_manytypes 1 manytypes.big "TYPE${ntype}" NOERROR manytypes.big "TYPE${ntype}" 120 || ret=1
# shellcheck source=conf.sh
. ../conf.sh
-for conf in ns*/named.conf.in; do
- copy_setports "$conf" "$(dirname "$conf")/$(basename "$conf" .in)"
-done
-
(cd ns2 && $SHELL sign.sh)
# Test sign operations after dnssec-policy change (removing keys).
ret=0
-copy_setports ns2/named2.conf.in ns2/named.conf
+cp ns2/named2.conf ns2/named.conf
$RNDCCMD 10.53.0.2 reload 2>&1 | sed 's/^/I:ns2 /'
# This should trigger the resign of DNSKEY, CDS, and CDNSKEY (+3 ksk),
# and SOA, NSEC, TYPE65534 (+3 zsk). The dnssec-sign statistics for the
cp -f ns1/example3.db.in ns1/example3.db
cp -f ns3/noprimary.db ns3/noprimary1.db
-copy_setports ns1/named.conf.in ns1/named.conf
-copy_setports ns2/named.conf.in ns2/named.conf
-copy_setports ns3/named1.conf.in ns3/named.conf
-
if $FEATURETEST --enable-dnstap; then
cat <<'EOF' >ns3/dnstap.conf
dnstap-identity "ns3";
ret=0
echo_i "attempting updates that should exceed quota ($n)"
# lower the update quota to 1.
-copy_setports ns3/named2.conf.in ns3/named.conf
+cp ns3/named2.conf ns3/named.conf
rndc_reconfig ns3 10.53.0.3
nextpart ns3/named.run >/dev/null
for loop in 1 2 3 4 5 6 7 8 9 10; do
cp -f ns4/root.db.in ns4/root.db
$PERL -e 'for ($i=0;$i<10000;$i++){ printf("x%u 0 in a 10.53.0.1\n", $i);}' >>ns4/root.db
-copy_setports ns1/named1.conf.in ns1/named.conf
-copy_setports ns2/named.conf.in ns2/named.conf
-copy_setports ns3/named.conf.in ns3/named.conf
-copy_setports ns6/named.conf.in ns6/named.conf
-copy_setports ns7/named.conf.in ns7/named.conf
-copy_setports ns8/named.conf.in ns8/named.conf
-
-copy_setports ns4/named.conf.base.in ns4/named.conf
-
cp ns1/dot-fallback.db.in ns1/dot-fallback.db
cp ns2/sec.db.in ns2/sec.db
# Restart ns1 with -T transferslowly
stop_server ns1
-copy_setports ns1/named2.conf.in ns1/named.conf
+cp ns1/named2.conf ns1/named.conf
start_server --noclean --restart --port ${PORT} ns1 -- "-D xfer-ns1 $NS_PARAMS -T transferinsecs -T transferslowly"
sleep 1
# Restart ns1 with -T transferstuck
stop_server ns1
-copy_setports ns1/named3.conf.in ns1/named.conf
+cp ns1/named3.conf ns1/named.conf
start_server --noclean --restart --port ${PORT} ns1 -- "-D xfer-ns1 $NS_PARAMS -T transferinsecs -T transferstuck"
sleep 1