Also known as ISC bind. This import adds utilities such as host(1), dig(1), and nslookup(1), as well as many other tools and libraries. Change-Id: I035ca46e64f1965d57019e773f4ff0ef035e4aa3
154 lines
4.5 KiB
Bash
154 lines
4.5 KiB
Bash
#!/bin/sh
|
|
#
|
|
# Copyright (C) 2004, 2007, 2009, 2011-2014 Internet Systems Consortium, Inc. ("ISC")
|
|
# Copyright (C) 2001 Internet Software Consortium.
|
|
#
|
|
# Permission to use, copy, modify, and/or distribute this software for any
|
|
# purpose with or without fee is hereby granted, provided that the above
|
|
# copyright notice and this permission notice appear in all copies.
|
|
#
|
|
# THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
|
|
# REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
|
|
# AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
|
|
# INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
|
|
# LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
|
|
# OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
|
|
# PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
# Id: tests.sh,v 1.11 2011/11/03 23:46:26 tbox Exp
|
|
|
|
SYSTEMTESTTOP=..
|
|
. $SYSTEMTESTTOP/conf.sh
|
|
|
|
DIGOPTS="@10.53.0.1 -p 5300"
|
|
|
|
status=0
|
|
|
|
echo "I:generating new DH key"
|
|
ret=0
|
|
dhkeyname=`$KEYGEN -T KEY -a DH -b 768 -n host -r $RANDFILE client` || ret=1
|
|
if [ $ret != 0 ]; then
|
|
echo "I:failed"
|
|
status=`expr $status + $ret`
|
|
echo "I:exit status: $status"
|
|
exit $status
|
|
fi
|
|
status=`expr $status + $ret`
|
|
|
|
for owner in . foo.example.
|
|
do
|
|
echo "I:creating new key using owner name \"$owner\""
|
|
ret=0
|
|
keyname=`./keycreate $dhkeyname $owner` || ret=1
|
|
if [ $ret != 0 ]; then
|
|
echo "I:failed"
|
|
status=`expr $status + $ret`
|
|
echo "I:exit status: $status"
|
|
exit $status
|
|
fi
|
|
status=`expr $status + $ret`
|
|
|
|
echo "I:checking the new key"
|
|
ret=0
|
|
$DIG $DIGOPTS . ns -k $keyname > dig.out.1 || ret=1
|
|
grep "status: NOERROR" dig.out.1 > /dev/null || ret=1
|
|
grep "TSIG.*hmac-md5.*NOERROR" dig.out.1 > /dev/null || ret=1
|
|
grep "Some TSIG could not be validated" dig.out.1 > /dev/null && ret=1
|
|
if [ $ret != 0 ]; then
|
|
echo "I:failed"
|
|
fi
|
|
status=`expr $status + $ret`
|
|
|
|
echo "I:deleting new key"
|
|
ret=0
|
|
./keydelete $keyname || ret=1
|
|
if [ $ret != 0 ]; then
|
|
echo "I:failed"
|
|
fi
|
|
status=`expr $status + $ret`
|
|
|
|
echo "I:checking that new key has been deleted"
|
|
ret=0
|
|
$DIG $DIGOPTS . ns -k $keyname > dig.out.2 || ret=1
|
|
grep "status: NOERROR" dig.out.2 > /dev/null && ret=1
|
|
grep "TSIG.*hmac-md5.*NOERROR" dig.out.2 > /dev/null && ret=1
|
|
grep "Some TSIG could not be validated" dig.out.2 > /dev/null || ret=1
|
|
if [ $ret != 0 ]; then
|
|
echo "I:failed"
|
|
fi
|
|
status=`expr $status + $ret`
|
|
done
|
|
|
|
echo "I:creating new key using owner name bar.example."
|
|
ret=0
|
|
keyname=`./keycreate $dhkeyname bar.example.` || ret=1
|
|
if [ $ret != 0 ]; then
|
|
echo "I:failed"
|
|
status=`expr $status + $ret`
|
|
echo "I:exit status: $status"
|
|
exit $status
|
|
fi
|
|
status=`expr $status + $ret`
|
|
|
|
echo "I:checking the key with 'rndc tsig-list'"
|
|
ret=0
|
|
$RNDC -c ../common/rndc.conf -s 10.53.0.1 -p 9953 tsig-list > rndc.out.1
|
|
grep "key \"bar.example.server" rndc.out.1 > /dev/null || ret=1
|
|
if [ $ret != 0 ]; then
|
|
echo "I:failed"
|
|
fi
|
|
status=`expr $status + $ret`
|
|
|
|
echo "I:using key in a request"
|
|
ret=0
|
|
$DIG $DIGOPTS -k $keyname txt.example txt > dig.out.3 || ret=1
|
|
grep "status: NOERROR" dig.out.3 > /dev/null || ret=1
|
|
if [ $ret != 0 ]; then
|
|
echo "I:failed"
|
|
fi
|
|
status=`expr $status + $ret`
|
|
|
|
echo "I:deleting the key with 'rndc tsig-delete'"
|
|
ret=0
|
|
$RNDC -c ../common/rndc.conf -s 10.53.0.1 -p 9953 tsig-delete bar.example.server > /dev/null || ret=1
|
|
$RNDC -c ../common/rndc.conf -s 10.53.0.1 -p 9953 tsig-list > rndc.out.2
|
|
grep "key \"bar.example.server" rndc.out.2 > /dev/null && ret=1
|
|
$DIG $DIGOPTS -k $keyname txt.example txt > dig.out.4 || ret=1
|
|
grep "TSIG could not be validated" dig.out.4 > /dev/null || ret=1
|
|
if [ $ret != 0 ]; then
|
|
echo "I:failed"
|
|
fi
|
|
status=`expr $status + $ret`
|
|
|
|
echo "I:recreating the bar.example. key"
|
|
ret=0
|
|
keyname=`./keycreate $dhkeyname bar.example.` || ret=1
|
|
if [ $ret != 0 ]; then
|
|
echo "I:failed"
|
|
status=`expr $status + $ret`
|
|
echo "I:exit status: $status"
|
|
exit $status
|
|
fi
|
|
status=`expr $status + $ret`
|
|
|
|
echo "I:checking the new key with 'rndc tsig-list'"
|
|
ret=0
|
|
$RNDC -c ../common/rndc.conf -s 10.53.0.1 -p 9953 tsig-list > rndc.out.3
|
|
grep "key \"bar.example.server" rndc.out.3 > /dev/null || ret=1
|
|
if [ $ret != 0 ]; then
|
|
echo "I:failed"
|
|
fi
|
|
status=`expr $status + $ret`
|
|
|
|
echo "I:using the new key in a request"
|
|
ret=0
|
|
$DIG $DIGOPTS -k $keyname txt.example txt > dig.out.5 || ret=1
|
|
grep "status: NOERROR" dig.out.5 > /dev/null || ret=1
|
|
if [ $ret != 0 ]; then
|
|
echo "I:failed"
|
|
fi
|
|
status=`expr $status + $ret`
|
|
|
|
echo "I:exit status: $status"
|
|
exit $status
|