check_process
configname=$1
domcount=$(grep -c zone named.conf)
- if [ ! -x ../pdns/pdns_control ]; then
- echo "No pdns_control found"
- exit 1
- fi
- loopcount=0
+ if [ ! -x ../pdns/pdns_control ]; then
+ echo "No pdns_control found"
+ exit 1
+ fi
+ loopcount=0
while [ $loopcount -lt 20 ]; do
sleep 10
if [ $done = $domcount ]; then
return
fi
- let loopcount=loopcount+1
+ let loopcount=loopcount+1
done
- if [ $done != $domcount ]; then
- echo "Domain parsing failed" >> failed_tests
- fi
+
+ if [ $done != $domcount ]; then
+ echo "Domain parsing failed" >> failed_tests
+ fi
}
securezone ()
set +e
pids=$(cat pdns*.pid 2>/dev/null)
if [ -z "$pids" ]; then
- echo "PowerDNS did not start"
- exit 1
+ echo "PowerDNS did not start"
+ exit 1
fi
kill -0 $pids >/dev/null 2>&1
if [ $? -ne 0 ]; then
- echo "PowerDNS did not start"
- exit 1
+ echo "PowerDNS did not start"
+ exit 1
fi
set -e
}
remotetype=$(echo $context | cut -d- -f 2)
remotesec=$(echo $context | cut -d- -f 3)
narrow=$(echo $context | cut -d- -f 4)
- testsdir=../modules/remotebackend/regression-tests/
+ testsdir=../modules/remotebackend/regression-tests/
- # cleanup unbound-host.conf to avoid failures
- rm -f unbound-host.conf
+ # cleanup unbound-host.conf to avoid failures
+ rm -f unbound-host.conf
case $remotetype in
http)
if [ "$remotesec" = "nsec3" ]; then
remotedosec="yes"
if [ "$narrow" = "narrow" ]; then
- extracontexts="dnssec nsec3 narrow"
+ extracontexts="dnssec nsec3 narrow"
skipreasons="narrow nsec3"
- else
+ else
extracontexts="dnssec nsec3"
skipreasons="nsec3"
fi
- remote_add_param="--remote-dnssec=yes"
- else
+ remote_add_param="--remote-dnssec=yes"
+ else
if [ "$remotesec" = "dnssec" ]; then
remotedosec="yes"
remote_add_param="--remote-dnssec=yes"
--query-logging --loglevel=9 --cache-ttl=0 --no-config \
--send-root-referral \
--remote-connection-string="$connstr" $remote_add_param &
-
+
echo "Setting up test database..."
# setup test database
rm -f $testsdir/remote.sqlite3
sqlite3 $testsdir/remote.sqlite3 < $testsdir/test-schema.sql
chmod 0666 $testsdir/remote.sqlite3
if [ "$remotedosec" = "yes" ]; then
- echo "remote-dnssec=yes" >> pdns-remote.conf
- ../pdns/pdnssec --config-dir=. --config-name=remote import-zone-key example.com $testsdir/example.com.ksk ksk
- ../pdns/pdnssec --config-dir=. --config-name=remote import-zone-key example.com $testsdir/example.com.zsk.1 zsk
- ../pdns/pdnssec --config-dir=. --config-name=remote import-zone-key example.com $testsdir/example.com.zsk.2 zsk
- ../pdns/pdnssec --config-dir=. --config-name=remote activate-zone-key example.com 1
- ../pdns/pdnssec --config-dir=. --config-name=remote activate-zone-key example.com 2
- ../pdns/pdnssec --config-dir=. --config-name=remote deactivate-zone-key example.com 3
-
- ../pdns/pdnssec --config-dir=. --config-name=remote import-zone-key up.example.com $testsdir/up.example.com.ksk ksk
- ../pdns/pdnssec --config-dir=. --config-name=remote import-zone-key up.example.com $testsdir/up.example.com.zsk.1 zsk
- ../pdns/pdnssec --config-dir=. --config-name=remote import-zone-key up.example.com $testsdir/up.example.com.zsk.2 zsk
- ../pdns/pdnssec --config-dir=. --config-name=remote activate-zone-key example.com 4
- ../pdns/pdnssec --config-dir=. --config-name=remote activate-zone-key example.com 5
- ../pdns/pdnssec --config-dir=. --config-name=remote deactivate-zone-key example.com 6
+ echo "remote-dnssec=yes" >> pdns-remote.conf
+ ../pdns/pdnssec --config-dir=. --config-name=remote import-zone-key example.com $testsdir/example.com.ksk ksk
+ ../pdns/pdnssec --config-dir=. --config-name=remote import-zone-key example.com $testsdir/example.com.zsk.1 zsk
+ ../pdns/pdnssec --config-dir=. --config-name=remote import-zone-key example.com $testsdir/example.com.zsk.2 zsk
+ ../pdns/pdnssec --config-dir=. --config-name=remote activate-zone-key example.com 1
+ ../pdns/pdnssec --config-dir=. --config-name=remote activate-zone-key example.com 2
+ ../pdns/pdnssec --config-dir=. --config-name=remote deactivate-zone-key example.com 3
+
+ ../pdns/pdnssec --config-dir=. --config-name=remote import-zone-key up.example.com $testsdir/up.example.com.ksk ksk
+ ../pdns/pdnssec --config-dir=. --config-name=remote import-zone-key up.example.com $testsdir/up.example.com.zsk.1 zsk
+ ../pdns/pdnssec --config-dir=. --config-name=remote import-zone-key up.example.com $testsdir/up.example.com.zsk.2 zsk
+ ../pdns/pdnssec --config-dir=. --config-name=remote activate-zone-key example.com 4
+ ../pdns/pdnssec --config-dir=. --config-name=remote activate-zone-key example.com 5
+ ../pdns/pdnssec --config-dir=. --config-name=remote deactivate-zone-key example.com 6
if [ "$remotesec" = "nsec3" ]; then
../pdns/pdnssec --config-dir=. --config-name=remote set-nsec3 example.com
- ../pdns/pdnssec --config-dir=. --config-name=remote set-nsec3 up.example.com
+ ../pdns/pdnssec --config-dir=. --config-name=remote set-nsec3 up.example.com
fi
fi
--gmysql-password="$GMYSQL2PASSWD" \
--config-name=gmysql2 |& egrep -v "update records set ordername|insert into records" &
echo 'waiting for zones to be slaved'
- loopcount=0
+ loopcount=0
while [ $loopcount -lt 20 ]
do
sleep 10
then
break
fi
- let loopcount=loopcount+1
+ let loopcount=loopcount+1
done
if [ $todo -ne 0 ]; then
- echo "AXFR FAILED" >> failed_tests
- fi
+ echo "AXFR FAILED" >> failed_tests
+ fi
elif [ ${context:0:8} = gsqlite3 ]
then
context=${context}-presigned
--gsqlite3-database=pdns.sqlite31 --gsqlite3-pragma-synchronous=0 |& egrep -v "update records set ordername|insert into records" &
echo 'waiting for zones to be slaved'
set +e
- loopcount=0
+ loopcount=0
while [ $loopcount -lt 20 ]
do
sleep 10
break
fi
fi
- let loopcount=loopcount+1
+ let loopcount=loopcount+1
done
- if [ $todo -ne 0 ]; then
- echo "AXFR FAILED" >> failed_tests
- fi
+ if [ $todo -ne 0 ]; then
+ echo "AXFR FAILED" >> failed_tests
+ fi
set -e
sqlite3 pdns.sqlite31 ANALYZE;
elif [ ${context:0:4} = bind ]