bind9/bin/tests/system/mkeys
Nicki Křížek 9d3279a542 Replace .in with .j2 templates for cases with namedX.conf
The following tests use multiple named configs. Previously, these have
been rendered with copy_setports in tests.sh when needed. Transform
these into jinja2 templates and render them during setup. In the tests,
the copy_setports invocations can be then replaced with a simple cp.
2025-12-09 14:23:14 +01:00
..
ns1 Replace .in with .j2 templates for cases with namedX.conf 2025-12-09 14:23:14 +01:00
ns2 Replace .in with .j2 templates for cases with namedX.conf 2025-12-09 14:23:14 +01:00
ns3 Replace .in with .j2 templates for cases with namedX.conf 2025-12-09 14:23:14 +01:00
ns4 Replace .in with .j2 templates for cases with namedX.conf 2025-12-09 14:23:14 +01:00
ns5 Replace .in with .j2 templates for cases with namedX.conf 2025-12-09 14:23:14 +01:00
ns6 Replace .in with .j2 templates for cases with namedX.conf 2025-12-09 14:23:14 +01:00
ns7 Replace .in with .j2 templates for cases with namedX.conf 2025-12-09 14:23:14 +01:00
README Update the copyright information in all files in the repository 2022-01-11 09:05:02 +01:00
setup.sh Replace .in with .j2 templates for cases with namedX.conf 2025-12-09 14:23:14 +01:00
tests.sh Replace .in with .j2 templates for cases with namedX.conf 2025-12-09 14:23:14 +01:00
tests_sh_mkeys.py Use pytest.mark.flaky as the flaky marker 2025-07-07 13:29:15 +02:00

Copyright (C) Internet Systems Consortium, Inc. ("ISC")

SPDX-License-Identifier: MPL-2.0

This Source Code Form is subject to the terms of the Mozilla Public
License, v. 2.0.  If a copy of the MPL was not distributed with this
file, you can obtain one at https://mozilla.org/MPL/2.0/.

See the COPYRIGHT file distributed with this work for additional
information regarding copyright ownership.

This is for testing RFC 5011 Automated Updates of DNSSEC Trust Anchors.

ns1 is the root server that offers new KSKs and hosts one record for
testing. The TTL for the zone's records is 2 seconds.

ns2 is a validator that uses managed keys.  "-T mkeytimers=2/20/40"
is used so it will attempt do automated updates frequently. "-T tat=1"
is used so it will send TAT queries once per second.

ns3 is a validator with a broken initializing key in trust-anchors.

ns4 is a validator with a deliberately broken managed-keys.bind and
managed-keys.jnl, causing RFC 5011 initialization to fail.

ns5 is a validator which is prevented from getting a response from the
root server, causing key refresh queries to fail.

ns6 is a validator which has unsupported algorithms, one at start up,
one because of an algorithm rollover.

ns7 is a validator with multiple views configured.  It is used for
testing per-view rndc commands and checking interactions between options
related to and potentially affecting RFC 5011 processing.