2cd8fa3ef9b168429dcf76603e7b95c58317dd28Mark Andrews#!/bin/sh
2cd8fa3ef9b168429dcf76603e7b95c58317dd28Mark Andrews#
dce54b9b5cfa450570fe9c11644450aeb3ee89f3Tinderbox User# Copyright (C) 2004, 2007, 2010-2012, 2016 Internet Systems Consortium, Inc. ("ISC")
bf8267aa453e5d2a735ed732a043b77a0b355b20Mark Andrews#
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews# This Source Code Form is subject to the terms of the Mozilla Public
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews# License, v. 2.0. If a copy of the MPL was not distributed with this
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews# file, You can obtain one at http://mozilla.org/MPL/2.0/.
2cd8fa3ef9b168429dcf76603e7b95c58317dd28Mark Andrews
6406d6507af7c76dec2cb373ce16331876468784Automatic Updater# $Id: tests.sh,v 1.8 2011/05/26 23:47:28 tbox Exp $
2cd8fa3ef9b168429dcf76603e7b95c58317dd28Mark Andrews
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark AndrewsSYSTEMTESTTOP=..
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrews. $SYSTEMTESTTOP/conf.sh
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrews
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrewsstatus=0
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrewsn=0
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrews
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrewsrm -f dig.out.*
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrews
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark AndrewsDIGOPTS="+tcp +noadd +nosea +nostat +nocmd +dnssec -p 5300"
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrews
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrewsecho "I:checking that DNSKEY reference by DLV validates as secure ($n)"
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrewsret=0
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrews$DIG $DIGOPTS child1.utld dnskey @10.53.0.5 > dig.out.ns5.test$n || ret=1
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrewsgrep "flags:.*ad.*QUERY" dig.out.ns5.test$n > /dev/null || ret=1
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrewsn=`expr $n + 1`
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrewsif [ $ret != 0 ]; then echo "I:failed"; fi
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrewsstatus=`expr $status + $ret`
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrews
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrewsecho "I:checking that child DNSKEY reference by DLV validates as secure ($n)"
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrewsret=0
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrews$DIG $DIGOPTS grand.child1.utld dnskey @10.53.0.5 > dig.out.ns5.test$n || ret=1
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrewsgrep "flags:.*ad.*QUERY" dig.out.ns5.test$n > /dev/null || ret=1
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrewsn=`expr $n + 1`
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrewsif [ $ret != 0 ]; then echo "I:failed"; fi
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrewsstatus=`expr $status + $ret`
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrews
ea8278253210df030a24f0c89342b43fe279a127Mark Andrewsecho "I:checking that SOA reference by DLV in a DRUZ with DS validates as secure ($n)"
ea8278253210df030a24f0c89342b43fe279a127Mark Andrewsret=0
ea8278253210df030a24f0c89342b43fe279a127Mark Andrews$DIG $DIGOPTS child1.druz soa @10.53.0.5 > dig.out.ns5.test$n || ret=1
ea8278253210df030a24f0c89342b43fe279a127Mark Andrewsgrep "flags:.*ad.*QUERY" dig.out.ns5.test$n > /dev/null || ret=1
ea8278253210df030a24f0c89342b43fe279a127Mark Andrewsn=`expr $n + 1`
ea8278253210df030a24f0c89342b43fe279a127Mark Andrewsif [ $ret != 0 ]; then echo "I:failed"; fi
ea8278253210df030a24f0c89342b43fe279a127Mark Andrewsstatus=`expr $status + $ret`
ea8278253210df030a24f0c89342b43fe279a127Mark Andrews
ea8278253210df030a24f0c89342b43fe279a127Mark Andrewsecho "I:checking that child SOA reference by DLV in a DRUZ with DS validates as secure ($n)"
ea8278253210df030a24f0c89342b43fe279a127Mark Andrewsret=0
ea8278253210df030a24f0c89342b43fe279a127Mark Andrews$DIG $DIGOPTS grand.child1.druz soa @10.53.0.5 > dig.out.ns5.test$n || ret=1
ea8278253210df030a24f0c89342b43fe279a127Mark Andrewsgrep "flags:.*ad.*QUERY" dig.out.ns5.test$n > /dev/null || ret=1
ea8278253210df030a24f0c89342b43fe279a127Mark Andrewsn=`expr $n + 1`
ea8278253210df030a24f0c89342b43fe279a127Mark Andrewsif [ $ret != 0 ]; then echo "I:failed"; fi
ea8278253210df030a24f0c89342b43fe279a127Mark Andrewsstatus=`expr $status + $ret`
ea8278253210df030a24f0c89342b43fe279a127Mark Andrews
e27d55e3ee06b6edcf625b8920a5c809da7f0b98Mark Andrewsecho "I:exit status: $status"
3635d8f9104e70e141a8f191a0e6c1502ceed2f3Mark Andrews[ $status -eq 0 ] || exit 1