From 3b9b6d0b8e7f798023c9d109c490449d528fde80 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sun, 7 Apr 2024 17:59:48 +0200 Subject: Adding upstream version 1:9.18.19. Signed-off-by: Daniel Baumann --- bin/tests/system/checkzone/tests.sh | 214 ++++++++++++++++++++++++++++++++++++ 1 file changed, 214 insertions(+) create mode 100644 bin/tests/system/checkzone/tests.sh (limited to 'bin/tests/system/checkzone/tests.sh') diff --git a/bin/tests/system/checkzone/tests.sh b/bin/tests/system/checkzone/tests.sh new file mode 100644 index 0000000..169e411 --- /dev/null +++ b/bin/tests/system/checkzone/tests.sh @@ -0,0 +1,214 @@ +#!/bin/sh + +# Copyright (C) Internet Systems Consortium, Inc. ("ISC") +# +# SPDX-License-Identifier: MPL-2.0 +# +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, you can obtain one at https://mozilla.org/MPL/2.0/. +# +# See the COPYRIGHT file distributed with this work for additional +# information regarding copyright ownership. + +set -e + +. ../conf.sh + +status=0 +n=1 + +for db in zones/good*.db +do + echo_i "checking $db ($n)" + ret=0 + case $db in + zones/good-gc-msdcs.db|zones/good-spf-exception.db) + $CHECKZONE -k fail -i local example $db > test.out.$n 2>&1 || ret=1 + ;; + zones/good-dns-sd-reverse.db) + $CHECKZONE -k fail -i local 0.0.0.0.in-addr.arpa $db > test.out.$n 2>&1 || ret=1 + ;; + *) + $CHECKZONE -i local example $db > test.out.$n 2>&1 || ret=1 + ;; + esac + n=$((n+1)) + if [ $ret != 0 ]; then echo_i "failed"; fi + status=$((status+ret)) +done + +for db in zones/bad*.db +do + echo_i "checking $db ($n)" + ret=0 v=0 + case $db in + zones/bad-dns-sd-reverse.db|zones/bad-svcb-servername.db) + $CHECKZONE -k fail -i local 0.0.0.0.in-addr.arpa $db > test.out.$n 2>&1 || v=$? + ;; + *) + $CHECKZONE -i local example $db > test.out.$n 2>&1 || v=$? + ;; + esac + test $v = 1 || ret=1 + n=$((n+1)) + if [ $ret != 0 ]; then echo_i "failed"; fi + status=$((status+ret)) +done + +echo_i "checking with journal file ($n)" +ret=0 +$CHECKZONE -D -o test.orig.db test zones/test1.db > /dev/null 2>&1 || ret=1 +$CHECKZONE -D -o test.changed.db test zones/test2.db > /dev/null 2>&1 || ret=1 +$MAKEJOURNAL test test.orig.db test.changed.db test.orig.db.jnl 2>&1 || ret=1 +jlines=$($JOURNALPRINT test.orig.db.jnl | wc -l) +[ $jlines = 3 ] || ret=1 +$CHECKZONE -D -j -o test.out1.db test test.orig.db > /dev/null 2>&1 || ret=1 +cmp -s test.changed.db test.out1.db || ret=1 +mv -f test.orig.db.jnl test.journal +$CHECKZONE -D -J test.journal -o test.out2.db test test.orig.db > /dev/null 2>&1 || ret=1 +cmp -s test.changed.db test.out2.db || ret=1 +n=$((n+1)) +if [ $ret != 0 ]; then echo_i "failed"; fi +status=$((status+ret)) + +echo_i "checking with spf warnings ($n)" +ret=0 +$CHECKZONE example zones/spf.db > test.out1.$n 2>&1 || ret=1 +$CHECKZONE -T ignore example zones/spf.db > test.out2.$n 2>&1 || ret=1 +grep "'x.example' found type SPF" test.out1.$n > /dev/null && ret=1 +grep "'y.example' found type SPF" test.out1.$n > /dev/null || ret=1 +grep "'example' found type SPF" test.out1.$n > /dev/null && ret=1 +grep "'x.example' found type SPF" test.out2.$n > /dev/null && ret=1 +grep "'y.example' found type SPF" test.out2.$n > /dev/null && ret=1 +grep "'example' found type SPF" test.out2.$n > /dev/null && ret=1 +n=$((n+1)) +if [ $ret != 0 ]; then echo_i "failed"; fi +status=$((status+ret)) + +echo_i "checking with max ttl (text) ($n)" +ret=0 +$CHECKZONE -l 300 example zones/good1.db > test.out1.$n 2>&1 && ret=1 +$CHECKZONE -l 600 example zones/good1.db > test.out2.$n 2>&1 || ret=1 +n=$((n+1)) +if [ $ret != 0 ]; then echo_i "failed"; fi +status=$((status+ret)) + +echo_i "checking with max ttl (raw) ($n)" +ret=0 +$CHECKZONE -f raw -l 300 example good1.db.raw > test.out1.$n 2>&1 && ret=1 +$CHECKZONE -f raw -l 600 example good1.db.raw > test.out2.$n 2>&1 || ret=1 +n=$((n+1)) +if [ $ret != 0 ]; then echo_i "failed"; fi +status=$((status+ret)) + +echo_i "checking for no 'inherited owner' warning on '\$INCLUDE file' with no new \$ORIGIN ($n)" +ret=0 +$CHECKZONE example zones/nowarn.inherited.owner.db > test.out1.$n 2>&1 || ret=1 +grep "inherited.owner" test.out1.$n > /dev/null && ret=1 +n=$((n+1)) +if [ $ret != 0 ]; then echo_i "failed"; fi +status=$((status+ret)) + +echo_i "checking for 'inherited owner' warning on '\$ORIGIN + \$INCLUDE file' ($n)" +ret=0 +$CHECKZONE example zones/warn.inherit.origin.db > test.out1.$n 2>&1 || ret=1 +grep "inherited.owner" test.out1.$n > /dev/null || ret=1 +n=$((n+1)) +if [ $ret != 0 ]; then echo_i "failed"; fi +status=$((status+ret)) + +echo_i "checking for 'inherited owner' warning on '\$INCLUDE file origin' ($n)" +ret=0 +$CHECKZONE example zones/warn.inherited.owner.db > test.out1.$n 2>&1 || ret=1 +grep "inherited.owner" test.out1.$n > /dev/null || ret=1 +n=$((n+1)) +if [ $ret != 0 ]; then echo_i "failed"; fi +status=$((status+ret)) + +echo_i "checking that raw zone with bad class is handled ($n)" +ret=0 +$CHECKZONE -f raw example zones/bad-badclass.raw > test.out.$n 2>&1 && ret=1 +grep "failed: bad class" test.out.$n >/dev/null || ret=1 +n=$((n+1)) +if [ $ret != 0 ]; then echo_i "failed"; fi +status=$((status+ret)) + +echo_i "checking that expirations that loop using serial arithmetic are handled ($n)" +ret=0 +q=-q +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +test $ret -eq 1 || $CHECKZONE $q dyn.example.net zones/crashzone.db || ret=1 +n=$((n+1)) +if [ $ret != 0 ]; then echo_i "failed"; fi +status=$((status+ret)) + +echo_i "checking that nameserver below DNAME is reported even with occulted address record present ($n)" +ret=0 +$CHECKZONE example.com zones/ns-address-below-dname.db > test.out.$n 2>&1 && ret=1 +grep "is below a DNAME" test.out.$n >/dev/null || ret=1 +n=$((n+1)) +if [ $ret != 0 ]; then echo_i "failed"; fi +status=$((status+ret)) + +echo_i "checking that delegating nameserver below DNAME is reported even with occulted address record present ($n)" +ret=0 +$CHECKZONE example.com zones/delegating-ns-address-below-dname.db > test.out.$n 2>&1 || ret=1 +grep "is below a DNAME" test.out.$n >/dev/null || ret=1 +n=$((n+1)) +if [ $ret != 0 ]; then echo_i "failed"; fi +status=$((status+ret)) + +n=$((n+1)) +echo_i "checking that named-compilezone works when reading input from stdin ($n)" +ret=0 +# Step 1: take raw input from stdin and convert it to text/relative format. +# Last argument "-" is optional, but it says more explicitly that we're reading from stdin. +cat zones/zone1.db | ./named-compilezone -f text -F text -s relative \ + -o zones/zone1_stdin.txt zone1.com - > /dev/null || ret=1 +status=$((status+ret)) + +ret=0 +# Step 2: take raw input from file and convert it to text format. +./named-compilezone -f text -F text -s relative -o zones/zone1_file.txt \ + zone1.com zones/zone1.db > /dev/null || ret=1 +status=$((status+ret)) + +ret=0 +# Step 3: Ensure that output conversion from stdin is the same as the output conversion from a file. +diff zones/zone1_file.txt zones/zone1_stdin.txt >/dev/null 2>&1 || ret=1 +if [ $ret != 0 ]; then echo_i "failed"; fi +status=$((status+ret)) + +n=$((n+1)) +ret=0 +echo_i "checking integer overflow is prevented in \$GENERATE ($n)" +$CHECKZONE -D example.com zones/generate-overflow.db > test.out.$n 2>&1 || ret=1 +lines=$(grep -c CNAME test.out.$n) +echo $lines +[ "$lines" -eq 1 ] || ret=1 +if [ $ret != 0 ]; then echo_i "failed"; fi +status=$((status+ret)) + +echo_i "exit status: $status" +[ $status -eq 0 ] || exit 1 -- cgit v1.2.3