['dns64', files('dns64/dns64.test.lua')],
]
+integr_tests += [
+ ['bogus_log', join_paths(meson.current_source_dir(), 'bogus_log', 'test.integr')],
+ ['rebinding', join_paths(meson.current_source_dir(), 'rebinding', 'test.integr')],
+ ['serve_stale', join_paths(meson.current_source_dir(), 'serve_stale', 'test.integr')],
+]
+
# handle more complex C/LUA modules separately
subdir('bogus_log')
]
integr_tests += [
+ ['policy', join_paths(meson.current_source_dir(), 'test.integr')],
['policy.noipv6', join_paths(meson.current_source_dir(), 'noipv6.test.integr')],
['policy.noipvx', join_paths(meson.current_source_dir(), 'noipvx.test.integr')],
]
net.ipv6 = false
policy.add(policy.all(policy.STUB({ '::1:2:3:4', '1.2.3.4' })))
+-- make sure DNSSEC is turned off for tests
+trust_anchors.keyfile_default = nil
+
-- Disable RFC8145 signaling, scenario doesn't provide expected answers
if ta_signal_query then
modules.unload('ta_signal_query')
net.ipv6 = false
policy.add(policy.all(policy.STUB({ '::1:2:3:4', '1.2.3.4' })))
+-- make sure DNSSEC is turned off for tests
+trust_anchors.keyfile_default = nil
+
-- Disable RFC8145 signaling, scenario doesn't provide expected answers
if ta_signal_query then
modules.unload('ta_signal_query')
{% raw %}
policy.add(policy.suffix(policy.REFUSE, {todname('refuse.example.com')}))
+-- make sure DNSSEC is turned off for tests
+trust_anchors.keyfile_default = nil
+
-- Disable RFC8145 signaling, scenario doesn't provide expected answers
if ta_signal_query then
modules.unload('ta_signal_query')
-- Protection from DNS rebinding attacks
local kres = require('kres')
-local renumber = require('kres_module.renumber')
+local renumber = require('kres_modules.renumber')
local M = {}
M.layer = {}
{% raw %}
+-- make sure DNSSEC is turned off for tests
+trust_anchors.keyfile_default = nil
+
-- Disable RFC8145 signaling, scenario doesn't provide expected answers
if ta_signal_query then
modules.unload('ta_signal_query')
{% raw %}
modules = { 'serve_stale < cache' }
+-- make sure DNSSEC is turned off for tests
+trust_anchors.keyfile_default = nil
+
-- Disable RFC8145 signaling, scenario doesn't provide expected answers
if ta_signal_query then
modules.unload('ta_signal_query')
'stats.c',
]
+integr_tests += [
+ ['stats', join_paths(meson.current_source_dir(), 'test.integr')],
+]
+
+
stats_mod = shared_module(
'stats',
stats_src,
policy.add(policy.pattern(reply_result, 'stats.test.'))
policy.add(policy.all(FWD_TARGET)) -- avoid iteration
+-- make sure DNSSEC is turned off for tests
+trust_anchors.keyfile_default = nil
+
-- Disable RFC8145 signaling, scenario doesn't provide expected answers
if ta_signal_query then
modules.unload('ta_signal_query')
view:addr('127.0.0.0/24', policy.suffix(policy.DENY_MSG("addr 127.0.0.0/24 matched net"),{"\3net\0"}))
policy.add(policy.all(policy.FORWARD('1.2.3.4')))
+-- make sure DNSSEC is turned off for tests
+trust_anchors.keyfile_default = nil
+
-- Disable RFC8145 signaling, scenario doesn't provide expected answers
if ta_signal_query then
modules.unload('ta_signal_query')
modules.unload('detect_time_skew')
end
+-- make sure DNSSEC is turned off for tests
+trust_anchors.keyfile_default = nil
+
_hint_root_file('hints')
cache.size = 2*MB
verbose(true)
-- hints.root({['k.root-servers.net'] = '{{ROOT_ADDR}}'})
_hint_root_file('hints')
+-- make sure DNSSEC is turned off for tests
+trust_anchors.keyfile_default = nil
+
cache.size = 2*MB
'@0@'.format(join_paths(meson.current_source_dir(), 'deckard')),
],
output: 'deckard_contrib',
- build_always_stale: true,
)
deckard_env = environment()