cmdline = [rndc, "-c", "../_common/rndc.conf", "-p", port, "-s", server]
cmdline.extend(rndc_command)
- isctest.run.cmd(cmdline, log_stdout=True)
+ isctest.run.cmd(cmdline)
def test_dnstap_dispatch_socket_addresses():
# Read the contents of the dnstap file using dnstap-read.
run = isctest.run.cmd(
[isctest.vars.ALL["DNSTAPREAD"], "dnstap.out.resolver_addresses"],
- log_stdout=True,
)
# Check whether all frames contain the expected addresses.
str(self.keyfile),
]
- out = isctest.run.cmd(dsfromkey_command, log_stdout=True)
+ out = isctest.run.cmd(dsfromkey_command)
dsfromkey = out.stdout.decode("utf-8").split()
rdata_fromfile = " ".join(dsfromkey[:7])
timeout=60,
stdout=subprocess.PIPE,
stderr=subprocess.PIPE,
- log_stdout=False,
+ log_stdout=True,
log_stderr=True,
input_text: Optional[bytes] = None,
raise_on_exception=True,
"""Run the dig command with the given parameters and return the decoded output."""
return cmd(
[os.environ.get("DIG")] + f"{self.base_params} {params}".split(),
- log_stdout=True,
).stdout.decode("utf-8")
zone,
]
- return isctest.run.cmd(keygen_command, log_stdout=True).stdout.decode("utf-8")
+ return isctest.run.cmd(keygen_command).stdout.decode("utf-8")
# check that 'dnssec-keygen -k' (configured policy) creates valid files.
keyprops = [
str(publish),
key.path,
]
- out = isctest.run.cmd(settime, log_stdout=True).stdout.decode("utf-8")
+ out = isctest.run.cmd(settime).stdout.decode("utf-8")
isctest.check.file_contents_equal(f"{key.statefile}", f"{key.statefile}.backup")
assert key.get_metadata("Publish", file=key.privatefile) == str(publish)
str(now),
key.path,
]
- out = isctest.run.cmd(settime, log_stdout=True).stdout.decode("utf-8")
+ out = isctest.run.cmd(settime).stdout.decode("utf-8")
isctest.kasp.check_keys("kasp", keys, expected)
isctest.kasp.check_keytimes(keys, expected)
str(now),
key.path,
]
- out = isctest.run.cmd(settime, log_stdout=True).stdout.decode("utf-8")
+ out = isctest.run.cmd(settime).stdout.decode("utf-8")
isctest.kasp.check_keys("kasp", keys, expected)
isctest.kasp.check_keytimes(keys, expected)
str(soon),
key.path,
]
- out = isctest.run.cmd(settime, log_stdout=True).stdout.decode("utf-8")
+ out = isctest.run.cmd(settime).stdout.decode("utf-8")
isctest.kasp.check_keys("kasp", keys, expected)
isctest.kasp.check_keytimes(keys, expected)
isctest.run.cmd(
token_cleanup_command,
env=EMPTY_OPENSSL_CONF_ENV,
- log_stdout=True,
raise_on_exception=False,
)
try:
output = isctest.run.cmd(
- token_init_command, env=EMPTY_OPENSSL_CONF_ENV, log_stdout=True
+ token_init_command, env=EMPTY_OPENSSL_CONF_ENV
).stdout.decode("utf-8")
assert "The token has been initialized and is reassigned to slot" in output
yield
output = isctest.run.cmd(
token_cleanup_command,
env=EMPTY_OPENSSL_CONF_ENV,
- log_stdout=True,
raise_on_exception=False,
).stdout.decode("utf-8")
assert re.search("Found token (.*) with matching token label", output)
]
output = isctest.run.cmd(
- pkcs11_command, env=EMPTY_OPENSSL_CONF_ENV, log_stdout=True
+ pkcs11_command, env=EMPTY_OPENSSL_CONF_ENV
).stdout.decode("utf-8")
assert "Key pair generated" in output
zone,
]
- output = isctest.run.cmd(keyfrlab_command, log_stdout=True)
+ output = isctest.run.cmd(keyfrlab_command)
output_decoded = output.stdout.decode("utf-8").rstrip() + ".key"
assert os.path.exists(output_decoded)
zone,
zone_file,
]
- isctest.run.cmd(signer_command, log_stdout=True)
+ isctest.run.cmd(signer_command)
assert os.path.exists(f"{zone_file}.signed")
zone,
]
- out = isctest.run.cmd(
- ksr_command, log_stdout=True, raise_on_exception=raise_on_exception
- )
+ out = isctest.run.cmd(ksr_command, raise_on_exception=raise_on_exception)
return out.stdout.decode("utf-8"), out.stderr.decode("utf-8")
zone,
]
- return isctest.run.cmd(keygen_command, log_stdout=True).stdout.decode("utf-8")
+ return isctest.run.cmd(keygen_command).stdout.decode("utf-8")
zone = "multisigner-model2.kasp"
def test_max_rsa_exponent_size_bad(exponent_size, templates):
templates.render("options.conf", {"max_rsa_exponent_size": exponent_size})
with pytest.raises(subprocess.CalledProcessError):
- isctest.run.cmd([CHECKCONF, "options.conf"], log_stdout=True)
+ isctest.run.cmd([CHECKCONF, "options.conf"])
def test_rsa_big_exponent_keys_cant_load():
],
)
def test_verify_good_zone_files(zone):
- isctest.run.cmd([VERIFY, "-z", "-o", zone, f"zones/{zone}.good"], log_stdout=True)
+ isctest.run.cmd([VERIFY, "-z", "-o", zone, f"zones/{zone}.good"])
def test_verify_good_zone_nsec_next_name_case_mismatch():
"nsec-next-name-case-mismatch",
"zones/nsec-next-name-case-mismatch.good",
],
- log_stdout=True,
)
output = isctest.run.cmd(
[VERIFY, *only_opt, "-o", zone, f"zones/{zone}.bad"],
raise_on_exception=False,
- log_stdout=True,
)
stream = (output.stdout + output.stderr).decode("utf-8").replace("\n", "")
return stream