]> git.ipfire.org Git - thirdparty/bind9.git/commitdiff
Update system tests
authorMatthijs Mekking <matthijs@isc.org>
Tue, 7 Jun 2022 12:49:16 +0000 (14:49 +0200)
committerMatthijs Mekking <matthijs@isc.org>
Mon, 15 Aug 2022 09:44:20 +0000 (11:44 +0200)
Update checkconf and kasp related system tests after requiring
inline-signing.

22 files changed:
bin/tests/system/checkconf/good-kasp.conf
bin/tests/system/checkconf/good-key-directory.conf
bin/tests/system/checkconf/good.conf.in
bin/tests/system/checkconf/kasp-and-other-dnssec-options.conf
bin/tests/system/checkconf/kasp-bad-nsec3-iter.conf
bin/tests/system/checkconf/kasp-bad-signatures-refresh.conf
bin/tests/system/checkconf/kasp-ignore-keylen.conf
bin/tests/system/checkconf/kasp-warning.conf
bin/tests/system/checkconf/tests.sh
bin/tests/system/checkds/ns9/named.conf.in
bin/tests/system/kasp/ns2/named.conf.in
bin/tests/system/kasp/ns3/ed25519.conf
bin/tests/system/kasp/ns3/ed448.conf
bin/tests/system/kasp/ns3/named-fips.conf.in
bin/tests/system/kasp/ns3/named.conf.in
bin/tests/system/kasp/ns4/named.conf.in
bin/tests/system/kasp/ns5/named.conf.in
bin/tests/system/kasp/ns6/named.conf.in
bin/tests/system/kasp/ns6/named2.conf.in
bin/tests/system/keymgr2kasp/ns4/named2.conf.in
bin/tests/system/nsec3/ns3/named.conf.in
bin/tests/system/nsec3/ns3/named2.conf.in

index 7c8f929b00917793f164a45d339ea6c7feb1c863..17309e5ea6e9353bd0d3df423ad0cccdb3a71ecc 100644 (file)
@@ -40,15 +40,20 @@ options {
 zone "example1" {
        type primary;
        file "example1.db";
+       inline-signing yes;
 };
 zone "example2" {
        type primary;
        file "example2.db";
+       allow-update {
+               "any";
+       };
        dnssec-policy "test";
 };
 zone "example3" {
        type primary;
        file "example3.db";
+       inline-signing yes;
        dnssec-policy "default";
 };
 zone "dnssec-policy-none-shared-zonefile1" {
index 07deb2899374d21ed83244d235ea37b2a2a2b1b8..45befffa32828e47263c737b37312320e112ab4b 100644 (file)
@@ -46,6 +46,7 @@ view "localhost" {
         type primary;
         file "localhost/example.com.zone";
         dnssec-policy "localhost";
+        inline-signing yes;
     };
 };
 
@@ -56,6 +57,7 @@ view "external" {
         type primary;
         file "external/example.com.zone";
         dnssec-policy "internet";
+        inline-signing yes;
     };
 };
 
@@ -66,5 +68,6 @@ view "internal" {
         type primary;
         file "internal/example.com.zone";
         dnssec-policy "intranet";
+        inline-signing yes;
     };
 };
index 1c136c703e276f1e0ebdfa3a0745a1f5f74decb2..9ed4ece922d34052d2792a3848eda3e295ef5d0a 100644 (file)
@@ -103,6 +103,7 @@ view "first" {
        zone "clone" {
                type primary;
                file "yyy";
+               inline-signing yes;
                max-ixfr-ratio unlimited;
        };
        dnssec-validation auto;
@@ -166,9 +167,12 @@ view "third" {
        zone "p" {
                type primary;
                file "pfile";
+               inline-signing yes;
        };
        zone "s" {
                type secondary;
+               file "sfile";
+               inline-signing yes;
                primaries {
                        1.2.3.4;
                };
@@ -179,6 +183,7 @@ view "fourth" {
        zone "dnssec-test" {
                type primary;
                file "dnssec-test.db";
+               inline-signing yes;
                parental-agents {
                        1.2.3.4;
                        1.2.3.5;
@@ -189,6 +194,7 @@ view "fourth" {
        zone "dnssec-default" {
                type primary;
                file "dnssec-default.db";
+               inline-signing yes;
                parental-agents {
                        "parents";
                };
@@ -197,6 +203,7 @@ view "fourth" {
        zone "dnssec-inherit" {
                type primary;
                file "dnssec-inherit.db";
+               inline-signing yes;
        };
        zone "dnssec-none" {
                type primary;
@@ -206,11 +213,13 @@ view "fourth" {
        zone "dnssec-view1" {
                type primary;
                file "dnssec-view41.db";
+               inline-signing yes;
                dnssec-policy "test";
        };
        zone "dnssec-view2" {
                type primary;
                file "dnssec-view42.db";
+               inline-signing yes;
        };
        zone "dnssec-view3" {
                type primary;
@@ -230,17 +239,20 @@ view "fifth" {
        zone "dnssec-view1" {
                type primary;
                file "dnssec-view51.db";
+               inline-signing yes;
                dnssec-policy "test";
        };
        zone "dnssec-view2" {
                type primary;
                file "dnssec-view52.db";
+               inline-signing yes;
                dnssec-policy "test";
                key-directory "keys";
        };
        zone "dnssec-view3" {
                type primary;
                file "dnssec-view53.db";
+               inline-signing yes;
                dnssec-policy "default";
                key-directory "keys";
        };
@@ -255,6 +267,7 @@ view "chaos" chaos {
        zone "hostname.bind" chaos {
                type primary;
                database "_builtin hostname";
+               inline-signing yes;
        };
 };
 dyndb "name" "library.so" {
index bac45894dc756885e30ea230af52a28a74efdad4..b67a0e1d9a55455c802b967d9e2ba49a394a4949 100644 (file)
@@ -26,4 +26,3 @@ zone "nsec3.net" {
        sig-validity-interval 3600;
        update-check-ksk yes;
 };
-
index 8dc710f29c0f82b5dadaaf8d50f2c8ce621ed59f..a5a71d39bb932455c9e2f3bc9f56d6dc71548d9f 100644 (file)
@@ -57,4 +57,5 @@ zone "example.net" {
        type primary;
        file "example.db";
        dnssec-policy "default";
+       inline-signing yes;
 };
index dd907dddd23bb5b7296b6ab6aa371a9321494014..197ff17d3f142b871f4eb3dac98f81fbff0623de 100644 (file)
@@ -34,11 +34,13 @@ dnssec-policy "bad-sigrefresh-dnskey" {
 zone "sigrefresh.example.net" {
        type primary;
        file "sigrefresh.example.db";
+       inline-signing yes;
        dnssec-policy "bad-sigrefresh";
 };
 
 zone "dnskey.example.net" {
        type primary;
        file "dnskey.example.db";
+       inline-signing yes;
        dnssec-policy "bad-sigrefresh-dnskey";
 };
index fae3e4120dfba891c7529ebf8dfbd7598dcde365..c9787d4180863ed4b54ef9a52e6d2df64f8ab224 100644 (file)
@@ -22,5 +22,6 @@ zone "example.net" {
        type primary;
        file "example.db";
        dnssec-policy "warn-length";
+       inline-signing yes;
 };
 
index 4c05b5ad02bd37cad6214a48764696d864864fbd..41b6d6f27c682c5fba707072b0da4933896b77e4 100644 (file)
@@ -42,18 +42,21 @@ dnssec-policy "warn3" {
 zone "warn1.example.net" {
        type primary;
        file "warn1.example.db";
+       inline-signing yes;
        dnssec-policy "warn1";
 };
 
 zone "warn2.example.net" {
        type primary;
        file "warn2.example.db";
+       inline-signing yes;
        dnssec-policy "warn2";
 };
 
 zone "warn3.example.net" {
        type primary;
        file "warn3.example.db";
+       inline-signing yes;
        dnssec-policy "warn3";
 };
 
index 7d8d50e5cad112377ed73d6370277d7f87d4842d..c42f673a8b8bbc5892f08f5c5b063984849dcca5 100644 (file)
@@ -492,7 +492,7 @@ n=`expr $n + 1`
 echo_i "checking named-checkconf kasp errors ($n)"
 ret=0
 $CHECKCONF kasp-and-other-dnssec-options.conf > checkconf.out$n 2>&1 && ret=1
-grep "'inline-signing;' cannot be set to 'no' if dnssec-policy is also set on a non-dynamic DNS zone" < checkconf.out$n > /dev/null || ret=1
+grep "'dnssec-policy;' requires dynamic DNS or inline-signing to be configured for the zone" < checkconf.out$n > /dev/null || ret=1
 grep "'auto-dnssec maintain;' cannot be configured if dnssec-policy is also set" < checkconf.out$n > /dev/null || ret=1
 grep "dnskey-sig-validity: cannot be configured if dnssec-policy is also set" < checkconf.out$n > /dev/null || ret=1
 grep "dnssec-dnskey-kskonly: cannot be configured if dnssec-policy is also set" < checkconf.out$n > /dev/null || ret=1
index 9942b68d8eb15e755ae7aa2aa3cd602b0b14b1f3..73e5d80bb6becd79867133866634a34f4df3cb08 100644 (file)
@@ -49,6 +49,7 @@ zone "." {
 zone "dspublished.checkds" {
        type primary;
        file "dspublished.checkds.db";
+       inline-signing yes;
        dnssec-policy "default";
        parental-agents { 10.53.0.2 port @PORT@; };
 };
@@ -60,6 +61,7 @@ zone "dspublished.checkds" {
 zone "reference.checkds" {
        type primary;
        file "reference.checkds.db";
+       inline-signing yes;
        dnssec-policy "default";
        parental-agents { "ns2"; };
 };
@@ -71,6 +73,7 @@ zone "reference.checkds" {
 zone "missing-dspublished.checkds" {
        type primary;
        file "missing-dspublished.checkds.db";
+       inline-signing yes;
        dnssec-policy "default";
        parental-agents {
                10.53.0.5 port @PORT@; // missing
@@ -85,6 +88,7 @@ zone "missing-dspublished.checkds" {
 zone "bad-dspublished.checkds" {
        type primary;
        file "bad-dspublished.checkds.db";
+       inline-signing yes;
        dnssec-policy "default";
        parental-agents {
                10.53.0.6 port @PORT@; // bad
@@ -98,6 +102,7 @@ zone "bad-dspublished.checkds" {
 zone "multiple-dspublished.checkds" {
        type primary;
        file "multiple-dspublished.checkds.db";
+       inline-signing yes;
        dnssec-policy "default";
        parental-agents {
                10.53.0.2 port @PORT@;
@@ -113,6 +118,7 @@ zone "multiple-dspublished.checkds" {
 zone "incomplete-dspublished.checkds" {
        type primary;
        file "incomplete-dspublished.checkds.db";
+       inline-signing yes;
        dnssec-policy "default";
        parental-agents {
                10.53.0.2 port @PORT@;
@@ -130,6 +136,7 @@ zone "incomplete-dspublished.checkds" {
 zone "bad2-dspublished.checkds" {
        type primary;
        file "bad2-dspublished.checkds.db";
+       inline-signing yes;
        dnssec-policy "default";
        parental-agents {
                10.53.0.2 port @PORT@;
@@ -150,6 +157,7 @@ zone "bad2-dspublished.checkds" {
 zone "dswithdrawn.checkds" {
        type primary;
        file "dswithdrawn.checkds.db";
+       inline-signing yes;
        dnssec-policy "insecure";
        parental-agents { 10.53.0.5 port @PORT@; };
 };
@@ -157,6 +165,7 @@ zone "dswithdrawn.checkds" {
 zone "missing-dswithdrawn.checkds" {
        type primary;
        file "missing-dswithdrawn.checkds.db";
+       inline-signing yes;
        dnssec-policy "insecure";
        parental-agents {
                10.53.0.2 port @PORT@; // still published
@@ -166,6 +175,7 @@ zone "missing-dswithdrawn.checkds" {
 zone "bad-dswithdrawn.checkds" {
        type primary;
        file "bad-dswithdrawn.checkds.db";
+       inline-signing yes;
        dnssec-policy "insecure";
        parental-agents {
                10.53.0.6 port @PORT@; // bad
@@ -175,6 +185,7 @@ zone "bad-dswithdrawn.checkds" {
 zone "multiple-dswithdrawn.checkds" {
        type primary;
        file "multiple-dswithdrawn.checkds.db";
+       inline-signing yes;
        dnssec-policy "insecure";
        parental-agents {
                10.53.0.5 port @PORT@;
@@ -185,6 +196,7 @@ zone "multiple-dswithdrawn.checkds" {
 zone "incomplete-dswithdrawn.checkds" {
        type primary;
        file "incomplete-dswithdrawn.checkds.db";
+       inline-signing yes;
        dnssec-policy "insecure";
        parental-agents {
                10.53.0.2 port @PORT@; // still published
@@ -196,6 +208,7 @@ zone "incomplete-dswithdrawn.checkds" {
 zone "bad2-dswithdrawn.checkds" {
        type primary;
        file "bad2-dswithdrawn.checkds.db";
+       inline-signing yes;
        dnssec-policy "insecure";
        parental-agents {
                10.53.0.5 port @PORT@;
index df139cd139ad7d9bee55f49818f6f2e1938bfabf..f90fce86737f23bcb0b9b03d195c75231367a6d9 100644 (file)
@@ -46,8 +46,9 @@ zone "unsigned.tld" {
 
 zone "signed.tld" {
        type primary;
-       dnssec-policy "default";
        file "signed.tld.db";
+       dnssec-policy "default";
+       inline-signing yes;
 };
 
 /* Primary service for ns3 */
index b64c0c847163c88f4ea8a714fd430f6d44738f69..999fa2f657d53abb173d87e1725a3222cab8cb7f 100644 (file)
@@ -24,5 +24,6 @@ dnssec-policy "ed25519" {
 zone "ed25519.kasp" {
         type primary;
         file "ed25519.kasp.db";
+       inline-signing yes;
         dnssec-policy "ed25519";
 };
index ee4c494892883241682d8ad6a903877fb13ebc2e..e9c8312a43893fd93ef66c5bba773b0e03bbd156 100644 (file)
@@ -24,5 +24,6 @@ dnssec-policy "ed448" {
 zone "ed448.kasp" {
         type primary;
         file "ed448.kasp.db";
+       inline-signing yes;
         dnssec-policy "ed448";
 };
index 8b4e9903f17b4af79f7a050f6d90df70bc37b8ff..6199b0496b533383c6ba1b25323bf5619de3c958 100644 (file)
@@ -44,6 +44,7 @@ controls {
 zone "default.kasp" {
        type primary;
        file "default.kasp.db";
+       inline-signing yes;
        dnssec-policy "default";
 };
 
@@ -51,6 +52,7 @@ zone "default.kasp" {
 zone "checkds-ksk.kasp" {
        type primary;
        file "checkds-ksk.kasp.db";
+       inline-signing yes;
        dnssec-policy "checkds-ksk";
 };
 
@@ -58,6 +60,7 @@ zone "checkds-ksk.kasp" {
 zone "checkds-doubleksk.kasp" {
        type primary;
        file "checkds-doubleksk.kasp.db";
+       inline-signing yes;
        dnssec-policy "checkds-doubleksk";
 };
 
@@ -65,6 +68,7 @@ zone "checkds-doubleksk.kasp" {
 zone "checkds-csk.kasp" {
        type primary;
        file "checkds-csk.kasp.db";
+       inline-signing yes;
        dnssec-policy "checkds-csk";
 };
 
@@ -72,6 +76,7 @@ zone "checkds-csk.kasp" {
 zone "unlimited.kasp" {
        type primary;
        file "unlimited.kasp.db";
+       inline-signing yes;
        dnssec-policy "unlimited";
 };
 
@@ -79,12 +84,14 @@ zone "unlimited.kasp" {
 zone "manual-rollover.kasp" {
        type primary;
        file "manual-rollover.kasp.db";
+       inline-signing yes;
        dnssec-policy "manual-rollover";
 };
 
 /* A zone that inherits dnssec-policy. */
 zone "inherit.kasp" {
        type primary;
+       inline-signing yes;
        file "inherit.kasp.db";
 };
 
@@ -92,6 +99,7 @@ zone "inherit.kasp" {
 zone "unsigned.kasp" {
        type primary;
        file "unsigned.kasp.db";
+       inline-signing yes;
        dnssec-policy "none";
 };
 
@@ -99,6 +107,7 @@ zone "unsigned.kasp" {
 zone "insecure.kasp" {
        type primary;
        file "insecure.kasp.db";
+       inline-signing yes;
        dnssec-policy "insecure";
 };
 
@@ -106,6 +115,7 @@ zone "insecure.kasp" {
 zone "dnssec-keygen.kasp" {
        type primary;
        file "dnssec-keygen.kasp.db";
+       inline-signing yes;
        dnssec-policy "rsasha256";
 };
 
@@ -114,6 +124,7 @@ zone "secondary.kasp" {
        type secondary;
        primaries { 10.53.0.2; };
        file "secondary.kasp.db";
+       inline-signing yes;
        dnssec-policy "rsasha256";
 };
 
@@ -148,6 +159,7 @@ zone "inline-signing.kasp" {
 zone "some-keys.kasp" {
        type primary;
        file "some-keys.kasp.db";
+       inline-signing yes;
        dnssec-policy "rsasha256";
 };
 
@@ -157,6 +169,7 @@ zone "some-keys.kasp" {
 zone "legacy-keys.kasp" {
        type primary;
        file "legacy-keys.kasp.db";
+       inline-signing yes;
        dnssec-policy "migrate-to-dnssec-policy";
 };
 
@@ -166,6 +179,7 @@ zone "legacy-keys.kasp" {
 zone "pregenerated.kasp" {
        type primary;
        file "pregenerated.kasp.db";
+       inline-signing yes;
        dnssec-policy "rsasha256";
 };
 
@@ -176,6 +190,7 @@ zone "pregenerated.kasp" {
 zone "rumoured.kasp" {
        type primary;
        file "rumoured.kasp.db";
+       inline-signing yes;
        dnssec-policy "rsasha256";
 };
 
@@ -193,21 +208,25 @@ zone "multisigner-model2.kasp" {
 zone "rsasha256.kasp" {
        type primary;
        file "rsasha256.kasp.db";
+       inline-signing yes;
        dnssec-policy "rsasha256";
 };
 zone "rsasha512.kasp" {
        type primary;
        file "rsasha512.kasp.db";
+       inline-signing yes;
        dnssec-policy "rsasha512";
 };
 zone "ecdsa256.kasp" {
        type primary;
        file "ecdsa256.kasp.db";
+       inline-signing yes;
        dnssec-policy "ecdsa256";
 };
 zone "ecdsa384.kasp" {
        type primary;
        file "ecdsa384.kasp.db";
+       inline-signing yes;
        dnssec-policy "ecdsa384";
 };
 
@@ -217,6 +236,7 @@ zone "ecdsa384.kasp" {
 zone "max-zone-ttl.kasp" {
        type primary;
        file "max-zone-ttl.kasp.db";
+       inline-signing yes;
        dnssec-policy "ttl";
 };
 
@@ -230,6 +250,7 @@ zone "max-zone-ttl.kasp" {
 zone "expired-sigs.autosign" {
        type primary;
        file "expired-sigs.autosign.db";
+       inline-signing yes;
        dnssec-policy "autosign";
 };
 
@@ -239,6 +260,7 @@ zone "expired-sigs.autosign" {
 zone "fresh-sigs.autosign" {
        type primary;
        file "fresh-sigs.autosign.db";
+       inline-signing yes;
        dnssec-policy "autosign";
 };
 
@@ -248,6 +270,7 @@ zone "fresh-sigs.autosign" {
 zone "unfresh-sigs.autosign" {
        type primary;
        file "unfresh-sigs.autosign.db";
+       inline-signing yes;
        dnssec-policy "autosign";
 };
 
@@ -257,6 +280,7 @@ zone "unfresh-sigs.autosign" {
 zone "ksk-missing.autosign" {
        type primary;
        file "ksk-missing.autosign.db";
+       inline-signing yes;
        dnssec-policy "autosign";
 };
 
@@ -266,6 +290,7 @@ zone "ksk-missing.autosign" {
 zone "zsk-missing.autosign" {
        type primary;
        file "zsk-missing.autosign.db";
+       inline-signing yes;
        dnssec-policy "autosign";
 };
 
@@ -275,6 +300,7 @@ zone "zsk-missing.autosign" {
 zone "zsk-retired.autosign" {
        type primary;
        file "zsk-retired.autosign.db";
+       inline-signing yes;
        dnssec-policy "autosign";
 };
 
@@ -284,21 +310,25 @@ zone "zsk-retired.autosign" {
 zone "step1.enable-dnssec.autosign" {
        type primary;
        file "step1.enable-dnssec.autosign.db";
+       inline-signing yes;
        dnssec-policy "enable-dnssec";
 };
 zone "step2.enable-dnssec.autosign" {
        type primary;
        file "step2.enable-dnssec.autosign.db";
+       inline-signing yes;
        dnssec-policy "enable-dnssec";
 };
 zone "step3.enable-dnssec.autosign" {
        type primary;
        file "step3.enable-dnssec.autosign.db";
+       inline-signing yes;
        dnssec-policy "enable-dnssec";
 };
 zone "step4.enable-dnssec.autosign" {
        type primary;
        file "step4.enable-dnssec.autosign.db";
+       inline-signing yes;
        dnssec-policy "enable-dnssec";
 };
 
@@ -308,31 +338,37 @@ zone "step4.enable-dnssec.autosign" {
 zone "step1.zsk-prepub.autosign" {
        type primary;
        file "step1.zsk-prepub.autosign.db";
+       inline-signing yes;
        dnssec-policy "zsk-prepub";
 };
 zone "step2.zsk-prepub.autosign" {
        type primary;
        file "step2.zsk-prepub.autosign.db";
+       inline-signing yes;
        dnssec-policy "zsk-prepub";
 };
 zone "step3.zsk-prepub.autosign" {
        type primary;
        file "step3.zsk-prepub.autosign.db";
+       inline-signing yes;
        dnssec-policy "zsk-prepub";
 };
 zone "step4.zsk-prepub.autosign" {
        type primary;
        file "step4.zsk-prepub.autosign.db";
+       inline-signing yes;
        dnssec-policy "zsk-prepub";
 };
 zone "step5.zsk-prepub.autosign" {
        type primary;
        file "step5.zsk-prepub.autosign.db";
+       inline-signing yes;
        dnssec-policy "zsk-prepub";
 };
 zone "step6.zsk-prepub.autosign" {
        type primary;
        file "step6.zsk-prepub.autosign.db";
+       inline-signing yes;
        dnssec-policy "zsk-prepub";
 };
 
@@ -342,31 +378,37 @@ zone "step6.zsk-prepub.autosign" {
 zone "step1.ksk-doubleksk.autosign" {
        type primary;
        file "step1.ksk-doubleksk.autosign.db";
+       inline-signing yes;
        dnssec-policy "ksk-doubleksk";
 };
 zone "step2.ksk-doubleksk.autosign" {
        type primary;
        file "step2.ksk-doubleksk.autosign.db";
+       inline-signing yes;
        dnssec-policy "ksk-doubleksk";
 };
 zone "step3.ksk-doubleksk.autosign" {
        type primary;
        file "step3.ksk-doubleksk.autosign.db";
+       inline-signing yes;
        dnssec-policy "ksk-doubleksk";
 };
 zone "step4.ksk-doubleksk.autosign" {
        type primary;
        file "step4.ksk-doubleksk.autosign.db";
+       inline-signing yes;
        dnssec-policy "ksk-doubleksk";
 };
 zone "step5.ksk-doubleksk.autosign" {
        type primary;
        file "step5.ksk-doubleksk.autosign.db";
+       inline-signing yes;
        dnssec-policy "ksk-doubleksk";
 };
 zone "step6.ksk-doubleksk.autosign" {
        type primary;
        file "step6.ksk-doubleksk.autosign.db";
+       inline-signing yes;
        dnssec-policy "ksk-doubleksk";
 };
 
@@ -376,76 +418,91 @@ zone "step6.ksk-doubleksk.autosign" {
 zone "step1.csk-roll.autosign" {
        type primary;
        file "step1.csk-roll.autosign.db";
+       inline-signing yes;
        dnssec-policy "csk-roll";
 };
 zone "step2.csk-roll.autosign" {
        type primary;
        file "step2.csk-roll.autosign.db";
+       inline-signing yes;
        dnssec-policy "csk-roll";
 };
 zone "step3.csk-roll.autosign" {
        type primary;
        file "step3.csk-roll.autosign.db";
+       inline-signing yes;
        dnssec-policy "csk-roll";
 };
 zone "step4.csk-roll.autosign" {
        type primary;
        file "step4.csk-roll.autosign.db";
+       inline-signing yes;
        dnssec-policy "csk-roll";
 };
 zone "step5.csk-roll.autosign" {
        type primary;
        file "step5.csk-roll.autosign.db";
+       inline-signing yes;
        dnssec-policy "csk-roll";
 };
 zone "step6.csk-roll.autosign" {
        type primary;
        file "step6.csk-roll.autosign.db";
+       inline-signing yes;
        dnssec-policy "csk-roll";
 };
 zone "step7.csk-roll.autosign" {
        type primary;
        file "step7.csk-roll.autosign.db";
+       inline-signing yes;
        dnssec-policy "csk-roll";
 };
 zone "step8.csk-roll.autosign" {
        type primary;
        file "step8.csk-roll.autosign.db";
+       inline-signing yes;
        dnssec-policy "csk-roll";
 };
 
 zone "step1.csk-roll2.autosign" {
        type primary;
        file "step1.csk-roll2.autosign.db";
+       inline-signing yes;
        dnssec-policy "csk-roll2";
 };
 zone "step2.csk-roll2.autosign" {
        type primary;
        file "step2.csk-roll2.autosign.db";
+       inline-signing yes;
        dnssec-policy "csk-roll2";
 };
 zone "step3.csk-roll2.autosign" {
        type primary;
        file "step3.csk-roll2.autosign.db";
+       inline-signing yes;
        dnssec-policy "csk-roll2";
 };
 zone "step4.csk-roll2.autosign" {
        type primary;
        file "step4.csk-roll2.autosign.db";
+       inline-signing yes;
        dnssec-policy "csk-roll2";
 };
 zone "step5.csk-roll2.autosign" {
        type primary;
        file "step5.csk-roll2.autosign.db";
+       inline-signing yes;
        dnssec-policy "csk-roll2";
 };
 zone "step6.csk-roll2.autosign" {
        type primary;
        file "step6.csk-roll2.autosign.db";
+       inline-signing yes;
        dnssec-policy "csk-roll2";
 };
 zone "step7.csk-roll2.autosign" {
        type primary;
        file "step7.csk-roll2.autosign.db";
+       inline-signing yes;
        dnssec-policy "csk-roll2";
 };
index 921ecc89d17ae00712f98bb2972bd9b076e0199a..92e007d1e7370847870fa9fcb9e2ab37d0ec3693 100644 (file)
@@ -18,11 +18,13 @@ include "named-fips.conf";
 zone "rsasha1.kasp" {
        type primary;
        file "rsasha1.kasp.db";
+       inline-signing yes;
        dnssec-policy "rsasha1";
 };
 
 zone "rsasha1-nsec3.kasp" {
        type primary;
        file "rsasha1-nsec3.kasp.db";
+       inline-signing yes;
        dnssec-policy "rsasha1-nsec3";
 };
index 568587e09bbab4f1ca78d17fab541a07f78aaf72..4ded7a22189993d97f5703ae8aa6a916bafb7a80 100644 (file)
@@ -75,20 +75,22 @@ view "inherit" {
        zone "inherit.inherit.signed" {
                type primary;
                file "inherit.inherit.signed.db";
+               inline-signing yes;
        };
 
        /* Override dnssec-policy */
        zone "override.inherit.signed" {
                type primary;
-               dnssec-policy "default";
                file "override.inherit.signed.db";
+               inline-signing yes;
+               dnssec-policy "default";
        };
 
        /* Unset dnssec-policy */
        zone "none.inherit.signed" {
                type primary;
-               dnssec-policy "none";
                file "none.inherit.signed.db";
+               dnssec-policy "none";
        };
 };
 
@@ -100,20 +102,22 @@ view "override" {
        zone "inherit.override.signed" {
                type primary;
                file "inherit.override.signed.db";
+               inline-signing yes;
        };
 
        /* Override dnssec-policy */
        zone "override.override.signed" {
                type primary;
-               dnssec-policy "test";
                file "override.override.signed.db";
+               inline-signing yes;
+               dnssec-policy "test";
        };
 
        /* Unset dnssec-policy */
        zone "none.override.signed" {
                type primary;
-               dnssec-policy "none";
                file "none.override.signed.db";
+               dnssec-policy "none";
        };
 };
 
@@ -130,15 +134,16 @@ view "none" {
        /* Override dnssec-policy */
        zone "override.none.signed" {
                type primary;
-               dnssec-policy "test";
                file "override.none.signed.db";
+               inline-signing yes;
+               dnssec-policy "test";
        };
 
        /* Unset dnssec-policy */
        zone "none.none.signed" {
                type primary;
-               dnssec-policy "none";
                file "none.none.signed.db";
+               dnssec-policy "none";
        };
 };
 
@@ -150,7 +155,6 @@ view "example1" {
        zone "example.net" {
                type primary;
                file "example1.db";
-               // Dynamic zone, inline-signing disabled, policy inerhited.
        };
 };
 
@@ -160,7 +164,7 @@ view "example2" {
        zone "example.net" {
                type primary;
                file "example2.db";
-               // Static zone, inline-signing, policy inherited.
+               inline-signing yes;
        };
 };
 
index 02b17732d69e5560bd1c5ef33086abe61750ec97..dfa5bb1d4747c0d55abca447e48dec578b8468d2 100644 (file)
@@ -65,15 +65,16 @@ view "inherit" {
        /* Override dnssec-policy */
        zone "override.inherit.unsigned" {
                type primary;
-               dnssec-policy "default";
                file "override.inherit.unsigned.db";
+               inline-signing yes;
+               dnssec-policy "default";
        };
 
        /* Unset dnssec-policy */
        zone "none.inherit.unsigned" {
                type primary;
-               dnssec-policy "none";
                file "none.inherit.unsigned.db";
+               dnssec-policy "none";
        };
 };
 
@@ -85,20 +86,22 @@ view "override" {
        zone "inherit.override.unsigned" {
                type primary;
                file "inherit.override.unsigned.db";
+               inline-signing yes;
        };
 
        /* Override dnssec-policy */
        zone "override.override.unsigned" {
                type primary;
-               dnssec-policy "test";
                file "override.override.unsigned.db";
+               inline-signing yes;
+               dnssec-policy "test";
        };
 
        /* Unset dnssec-policy */
        zone "none.override.unsigned" {
                type primary;
-               dnssec-policy "none";
                file "none.override.unsigned.db";
+               dnssec-policy "none";
        };
 };
 
@@ -115,14 +118,15 @@ view "none" {
        /* Override dnssec-policy */
        zone "override.none.unsigned" {
                type primary;
-               dnssec-policy "test";
                file "override.none.unsigned.db";
+               inline-signing yes;
+               dnssec-policy "test";
        };
 
        /* Unset dnssec-policy */
        zone "none.none.unsigned" {
                type primary;
-               dnssec-policy "none";
                file "none.none.unsigned.db";
+               dnssec-policy "none";
        };
 };
index 9cfc6462be5baae0830b104c7ae22482afee7722..7e62fa9dd59f447e275d2aa09fd0993d55d53d11 100644 (file)
@@ -42,6 +42,7 @@ controls {
 zone "step1.going-insecure.kasp" {
        type primary;
        file "step1.going-insecure.kasp.db";
+       inline-signing yes;
        dnssec-policy "unsigning";
 };
 
@@ -55,6 +56,7 @@ zone "step1.going-insecure-dynamic.kasp" {
 zone "step1.going-straight-to-none.kasp" {
        type primary;
        file "step1.going-straight-to-none.kasp.db";
+       inline-signing yes;
        dnssec-policy "default";
 };
 
@@ -62,12 +64,14 @@ zone "step1.going-straight-to-none.kasp" {
 zone "step1.algorithm-roll.kasp" {
        type primary;
        file "step1.algorithm-roll.kasp.db";
+       inline-signing yes;
        dnssec-policy "rsasha256";
 };
 
 zone "step1.csk-algorithm-roll.kasp" {
        type primary;
        file "step1.csk-algorithm-roll.kasp.db";
+       inline-signing yes;
        dnssec-policy "csk-algoroll";
 };
 
@@ -79,6 +83,7 @@ dnssec-policy "modified" {
 
 zone example {
        type primary;
-       dnssec-policy modified;
        file "example.db";
+       inline-signing yes;
+       dnssec-policy modified;
 };
index f421b5e6621efb3e3bcc123128e497ac7737cf18..79fc7768e7cb452d976cad47a37385e66a1ce3d2 100644 (file)
@@ -41,12 +41,14 @@ controls {
 zone "step1.going-insecure.kasp" {
         type primary;
         file "step1.going-insecure.kasp.db";
+       inline-signing yes;
         dnssec-policy "insecure";
 };
 
 zone "step2.going-insecure.kasp" {
         type primary;
         file "step2.going-insecure.kasp.db";
+       inline-signing yes;
         dnssec-policy "insecure";
 };
 
@@ -76,36 +78,42 @@ zone "step1.going-straight-to-none.kasp" {
 zone "step1.algorithm-roll.kasp" {
        type primary;
        file "step1.algorithm-roll.kasp.db";
+       inline-signing yes;
        dnssec-policy "ecdsa256";
 };
 
 zone "step2.algorithm-roll.kasp" {
        type primary;
        file "step2.algorithm-roll.kasp.db";
+       inline-signing yes;
        dnssec-policy "ecdsa256";
 };
 
 zone "step3.algorithm-roll.kasp" {
        type primary;
        file "step3.algorithm-roll.kasp.db";
+       inline-signing yes;
        dnssec-policy "ecdsa256";
 };
 
 zone "step4.algorithm-roll.kasp" {
        type primary;
        file "step4.algorithm-roll.kasp.db";
+       inline-signing yes;
        dnssec-policy "ecdsa256";
 };
 
 zone "step5.algorithm-roll.kasp" {
        type primary;
        file "step5.algorithm-roll.kasp.db";
+       inline-signing yes;
        dnssec-policy "ecdsa256";
 };
 
 zone "step6.algorithm-roll.kasp" {
        type primary;
        file "step6.algorithm-roll.kasp.db";
+       inline-signing yes;
        dnssec-policy "ecdsa256";
 };
 
@@ -115,36 +123,42 @@ zone "step6.algorithm-roll.kasp" {
 zone "step1.csk-algorithm-roll.kasp" {
        type primary;
        file "step1.csk-algorithm-roll.kasp.db";
+       inline-signing yes;
        dnssec-policy "csk-algoroll";
 };
 
 zone "step2.csk-algorithm-roll.kasp" {
        type primary;
        file "step2.csk-algorithm-roll.kasp.db";
+       inline-signing yes;
        dnssec-policy "csk-algoroll";
 };
 
 zone "step3.csk-algorithm-roll.kasp" {
        type primary;
        file "step3.csk-algorithm-roll.kasp.db";
+       inline-signing yes;
        dnssec-policy "csk-algoroll";
 };
 
 zone "step4.csk-algorithm-roll.kasp" {
        type primary;
        file "step4.csk-algorithm-roll.kasp.db";
+       inline-signing yes;
        dnssec-policy "csk-algoroll";
 };
 
 zone "step5.csk-algorithm-roll.kasp" {
        type primary;
        file "step5.csk-algorithm-roll.kasp.db";
+       inline-signing yes;
        dnssec-policy "csk-algoroll";
 };
 
 zone "step6.csk-algorithm-roll.kasp" {
        type primary;
        file "step6.csk-algorithm-roll.kasp.db";
+       inline-signing yes;
        dnssec-policy "csk-algoroll";
 };
 
@@ -156,6 +170,7 @@ dnssec-policy "modified" {
 
 zone example {
        type primary;
-       dnssec-policy modified;
        file "example.db";
+       inline-signing yes;
+       dnssec-policy modified;
 };
index 0391eb3512cbfa5489dcf7dc432e189c5ca0a841..eb7a6538bbfa9ab015ded4eb0430e1143e8a02d0 100644 (file)
@@ -72,6 +72,7 @@ view "ext" {
        zone "view-rsasha256.kasp" {
                type primary;
                file "view-rsasha256.kasp.ext.db";
+               inline-signing yes;
                dnssec-policy "rsasha256";
        };
 };
@@ -82,6 +83,7 @@ view "int" {
        zone "view-rsasha256.kasp" {
                type primary;
                file "view-rsasha256.kasp.int.db";
+               inline-signing yes;
                dnssec-policy "rsasha256";
        };
 };
index 67febf6a650108ac7de128110c6958f623c92997..36c217ad3ceb5ea630036f4184a77b4600184a74 100644 (file)
@@ -55,6 +55,7 @@ controls {
 zone "nsec-to-nsec3.kasp" {
        type primary;
        file "nsec-to-nsec3.kasp.db";
+       inline-signing yes;
        dnssec-policy "nsec";
 };
 
@@ -62,6 +63,7 @@ zone "nsec-to-nsec3.kasp" {
 zone "nsec3.kasp" {
        type primary;
        file "nsec3.kasp.db";
+       inline-signing yes;
        dnssec-policy "nsec3";
 };
 
@@ -76,6 +78,7 @@ zone "nsec3-dynamic.kasp" {
 zone "nsec3-other.kasp" {
        type primary;
        file "nsec3-other.kasp.db";
+       inline-signing yes;
        dnssec-policy "nsec3-other";
 };
 
@@ -83,6 +86,7 @@ zone "nsec3-other.kasp" {
 zone "nsec3-change.kasp" {
        type primary;
        file "nsec3-change.kasp.db";
+       inline-signing yes;
        dnssec-policy "nsec3";
 };
 
@@ -97,6 +101,7 @@ zone "nsec3-dynamic-change.kasp" {
 zone "nsec3-to-optout.kasp" {
        type primary;
        file "nsec3-to-optout.kasp.db";
+       inline-signing yes;
        dnssec-policy "nsec3";
 };
 
@@ -104,6 +109,7 @@ zone "nsec3-to-optout.kasp" {
 zone "nsec3-from-optout.kasp" {
        type primary;
        file "nsec3-from-optout.kasp.db";
+       inline-signing yes;
        dnssec-policy "optout";
 };
 
@@ -111,6 +117,7 @@ zone "nsec3-from-optout.kasp" {
 zone "nsec3-to-nsec.kasp" {
        type primary;
        file "nsec3-to-nsec.kasp.db";
+       inline-signing yes;
        dnssec-policy "nsec3";
 };
 
index 3af1f5e8d9faaf82179616d9e1402c3b93cbc83f..c81cd700491e70880c52638aaf8bf056dfbbcbde 100644 (file)
@@ -55,6 +55,7 @@ controls {
 zone "nsec-to-nsec3.kasp" {
        type primary;
        file "nsec-to-nsec3.kasp.db";
+       inline-signing yes;
        //dnssec-policy "nsec";
        dnssec-policy "nsec3";
 };
@@ -63,6 +64,7 @@ zone "nsec-to-nsec3.kasp" {
 zone "nsec3.kasp" {
        type primary;
        file "nsec3.kasp.db";
+       inline-signing yes;
        dnssec-policy "nsec3";
 };
 
@@ -77,6 +79,7 @@ zone "nsec3-dynamic.kasp" {
 zone "nsec3-other.kasp" {
        type primary;
        file "nsec3-other.kasp.db";
+       inline-signing yes;
        dnssec-policy "nsec3-other";
 };
 
@@ -84,6 +87,7 @@ zone "nsec3-other.kasp" {
 zone "nsec3-change.kasp" {
        type primary;
        file "nsec3-change.kasp.db";
+       inline-signing yes;
        //dnssec-policy "nsec3";
        dnssec-policy "nsec3-other";
 };
@@ -100,6 +104,7 @@ zone "nsec3-dynamic-change.kasp" {
 zone "nsec3-to-optout.kasp" {
        type primary;
        file "nsec3-to-optout.kasp.db";
+       inline-signing yes;
        //dnssec-policy "nsec3";
        dnssec-policy "optout";
 };
@@ -108,6 +113,7 @@ zone "nsec3-to-optout.kasp" {
 zone "nsec3-from-optout.kasp" {
        type primary;
        file "nsec3-from-optout.kasp.db";
+       inline-signing yes;
        //dnssec-policy "optout";
        dnssec-policy "nsec3";
 };
@@ -116,6 +122,7 @@ zone "nsec3-from-optout.kasp" {
 zone "nsec3-to-nsec.kasp" {
        type primary;
        file "nsec3-to-nsec.kasp.db";
+       inline-signing yes;
        //dnssec-policy "nsec3";
        dnssec-policy "nsec";
 };