summaryrefslogtreecommitdiffstats
path: root/daemon/lua/trust_anchors.test/ta.test.lua
blob: b977bc91d3b8d92be6e321080a7a4a6fa47424f5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
-- SPDX-License-Identifier: GPL-3.0-or-later

trust_anchors.remove('.')

local ffi = require('ffi')

-- count warning messages
warn_msg = {}
overriding_msg="warning: overriding previously set trust anchors for ."
warn_msg[overriding_msg] = 0
function log_warn(grp, fmt, ...) --luacheck: no unused args
	msg = string.format(fmt, ...)
	if warn_msg[msg] ~= nil then
		warn_msg[msg] = warn_msg[msg] + 1
	end
end

-- Test that adding a revoked DNSKEY is refused.
local function test_revoked_key()
	local ta_c = kres.context().trust_anchors
	same(ffi.C.kr_ta_del(ta_c, '\0'), 0, 'remove root TAs if any')
	-- same() doesn't consider nil and typed NULL pointer equal, so we work around:
	same(ffi.C.kr_ta_get(ta_c, '\0') == nil, true, 'no TA for root is used')
	local key_crypto = 'AwEAAagAIKlVZrpC6Ia7gEzahOR+9W29euxhJhVVLOyQbSEW0O8gcCjFFV'
		.. 'QUTf6v58fLjwBd0YI0EzrAcQqBGCzh/RStIoO8g0NfnfL2MTJRkxoXbfDaUeVPQuYEhg37'
		.. 'NZWAJQ9VnMVDxP/VHL496M/QZxkjf5/Efucp2gaDX6RS6CXpoY68LsvPVjR0ZSwzz1apAz'
		.. 'vN9dlzEheX7ICJBBtuA6G3LQpzW5hOA2hzCTMjJPJ8LbqF6dsV6DoBQzgul0sGIcGOYl7O'
		.. 'yQdXfZ57relSQageu+ipAdTTJ25AsRTAoub8ONGcLmqrAmRLKBP1dfwhYB4N7knNnulqQxA+Uk1ihz0='
	boom(trust_anchors.add, { '. 3600 DNSKEY 385 3 8 ' .. key_crypto }, 'refuse revoked key')
	same(ffi.C.kr_ta_get(ta_c, '\0') == nil, true, 'no TA for root is used')
	-- Test that we don't have another problem in the key
	trust_anchors.add('. 3600 DNSKEY 257 3 8 ' .. key_crypto)
	local root_ta = ffi.C.kr_ta_get(ta_c, '\0')
	same(root_ta == nil, false, 'we got non-NULL TA RRset')
	same(root_ta.rrs.count, 1, 'the root TA set contains one RR')
end

local function test_remove()
	-- uses root key from the previous test
	assert(trust_anchors.keysets['\0'], 'root key must be there from previous test')
	local ta_c = kres.context().trust_anchors
	local root_ta = ffi.C.kr_ta_get(ta_c, '\0')
	assert(root_ta ~= nil, 'we got non-NULL TA RRset')
	assert(root_ta.rrs.count, 1, 'we have a root TA set to be deleted')

	trust_anchors.remove('.')

	same(trust_anchors.keysets['\0'], nil, 'Lua interface does not have the removed key')
	root_ta = ffi.C.kr_ta_get(ta_c, '\0')
	same(root_ta == nil, true, 'C interface does not have the removed key')
end

local function test_add_file()
	boom(trust_anchors.add_file, {'nonwriteable/root.keys', false},
	     "Managed trust anchor in non-writeable directory")

	boom(trust_anchors.add_file, {'nonexistent.keys', true},
	     "Nonexistent unmanaged trust anchor file")

	is(warn_msg[overriding_msg], 0, "No override warning messages at start of test")
	trust_anchors.add_file('root.keys', true)
	trust_anchors.add_file('root.keys', true)
	is(warn_msg[overriding_msg], 1, "Warning message when override trust anchors")

	is(trust_anchors.keysets['\0'][1].key_tag, 20326,
	   "Loaded KeyTag from root.keys")
end

local function test_nta()
	assert(trust_anchors.keysets['\0'], 'root key must be there from previous tests')

	trust_anchors.set_insecure({'example.com'})
	is(trust_anchors.insecure[1], 'example.com', 'Add example.com to NTA list')
	boom(trust_anchors.set_insecure, {{'.'}}, 'Got error when adding TA . to NTA list')
	is(#trust_anchors.insecure, 1, 'Check one item in NTA list')
	is(trust_anchors.insecure[1], 'example.com', 'Check previous NTA list')
end

return {
	test_revoked_key,
	test_remove,
	test_add_file,
	test_nta,
}