mirror of
https://gitlab.nic.cz/knot/knot-dns.git
synced 2026-02-03 18:49:28 -05:00
177 lines
5 KiB
Python
177 lines
5 KiB
Python
#!/usr/bin/env python3
|
|
|
|
''' Check 'dnsproxy' query module functionality. '''
|
|
|
|
from dnstest.test import Test
|
|
from dnstest.keys import Tsig
|
|
from dnstest.module import ModDnsproxy
|
|
import dnstest.keys
|
|
|
|
TSIG = Tsig() # Use the same TSIG key for all communication.
|
|
t = Test(tsig=TSIG)
|
|
|
|
ModDnsproxy.check()
|
|
|
|
def is_subzone(subzone, zone):
|
|
"""Tests if the first zone is a subzone of the second one or equal, case insensitive."""
|
|
return subzone.name.lower().endswith(zone.name.lower())
|
|
|
|
# Initialize server configuration
|
|
zone_common1 = t.zone("test", storage=".", file_name="test.local_zone")
|
|
zone_common2 = t.zone("test", storage=".", file_name="test.remote_zone")
|
|
while True:
|
|
zone_local = t.zone_rnd(1)
|
|
if not is_subzone(zone_local[0], zone_common1[0]):
|
|
break;
|
|
while True:
|
|
zone_remote = t.zone_rnd(1)
|
|
if not is_subzone(zone_remote[0], zone_common2[0]):
|
|
break;
|
|
|
|
local = t.server("knot", tsig=TSIG)
|
|
t.link(zone_common1, local)
|
|
t.link(zone_local, local)
|
|
|
|
remote = t.server("knot", tsig=TSIG)
|
|
t.link(zone_common2, remote)
|
|
t.link(zone_remote, remote)
|
|
|
|
if local.valgrind:
|
|
local.semantic_check = False
|
|
remote.semantic_check = False
|
|
|
|
def fallback_checks(server, zone_local, zone_remote, nxdomain):
|
|
# Local preferred OK, try with local TSIG.
|
|
resp = server.dig("dns1.test", "A", tsig=True)
|
|
resp.check(rcode="NOERROR", flags="AA", rdata="192.0.2.1", nordata="192.0.2.2")
|
|
|
|
# Local record OK.
|
|
resp = server.dig("local.test", "A")
|
|
resp.check(rcode="NOERROR", flags="AA", rdata="1.1.1.1")
|
|
|
|
# Local OK.
|
|
resp = server.dig(zone_local.name, "SOA")
|
|
resp.check(rcode="NOERROR", flags="AA")
|
|
|
|
# Remote OK.
|
|
resp = server.dig(zone_remote.name, "SOA", tsig=True)
|
|
if (is_subzone(zone_remote, zone_local) and not nxdomain):
|
|
resp.check(rcode="NXDOMAIN", flags="AA")
|
|
else:
|
|
resp.check(rcode="NOERROR", flags="AA")
|
|
|
|
# Remote NOK, not existing zone.
|
|
resp = server.dig("z-o-n-e.", "SOA")
|
|
resp.check(rcode="REFUSED", noflags="AA")
|
|
|
|
# Local XFR OK.
|
|
resp = server.dig("test", "AXFR", tsig=True)
|
|
resp.check_xfr(rcode="NOERROR")
|
|
|
|
# Remote XFR not possible in the fallback mode - not authoritative.
|
|
resp = server.dig(zone_remote.name, "AXFR")
|
|
resp.check_xfr(rcode="NOTAUTH")
|
|
|
|
t.start()
|
|
|
|
remote.zone_wait(zone_common2)
|
|
|
|
### No fallback
|
|
|
|
# Only after successful start the remote address is known!
|
|
local.add_module(None, ModDnsproxy(remote.addr, remote.port, fallback=False))
|
|
local.gen_confile()
|
|
local.reload()
|
|
|
|
# Remote OK, try with remote TSIG.
|
|
resp = local.dig("dns1.test", "A", tsig=True)
|
|
resp.check(rcode="NOERROR", flags="AA", rdata="192.0.2.2", nordata="192.0.2.1")
|
|
|
|
# Remote XFR OK.
|
|
resp = local.dig("test", "AXFR", tsig=True)
|
|
resp.check_xfr(rcode="NOERROR")
|
|
|
|
# Local record NOK.
|
|
resp = local.dig("local.test", "A")
|
|
resp.check(rcode="NXDOMAIN", flags="AA")
|
|
|
|
# Remote record OK.
|
|
resp = local.dig("remote.test", "A")
|
|
resp.check(rcode="NOERROR", flags="AA", rdata="1.1.1.2")
|
|
|
|
# Local NOK, unknown zone.
|
|
resp = local.dig(zone_local[0].name, "SOA")
|
|
resp.check(rcode="REFUSED", noflags="AA")
|
|
|
|
# Remote OK.
|
|
resp = local.dig(zone_remote[0].name, "SOA")
|
|
resp.check(rcode="NOERROR", flags="AA")
|
|
|
|
# Remote AXFR OK.
|
|
resp = local.dig(zone_remote[0].name, "AXFR", tsig=True)
|
|
resp.check_xfr(rcode="NOERROR")
|
|
|
|
# Remote NOK, not existing owner.
|
|
resp = local.dig("u-n-k-n-o-w-n." + zone_remote[0].name, "A")
|
|
resp.check(rcode="NXDOMAIN", flags="AA")
|
|
|
|
# Remote NOK, unknown zone.
|
|
resp = local.dig("z-o-n-e.", "SOA")
|
|
resp.check(rcode="REFUSED", noflags="AA")
|
|
|
|
### Fallback, no nxdomain
|
|
|
|
local.clear_modules(None)
|
|
local.add_module(None, ModDnsproxy(remote.addr, remote.port, fallback=True, nxdomain=False))
|
|
local.gen_confile()
|
|
local.reload()
|
|
|
|
fallback_checks(local, zone_local[0], zone_remote[0], nxdomain=False)
|
|
|
|
# Local NOK, not forwarded.
|
|
resp = local.dig("remote.test", "A")
|
|
resp.check(rcode="NXDOMAIN", flags="AA")
|
|
|
|
### Fallback, nxdomain
|
|
|
|
local.clear_modules(None)
|
|
local.add_module(None, ModDnsproxy(remote.addr, remote.port, fallback=True, nxdomain=True))
|
|
local.gen_confile()
|
|
local.reload()
|
|
|
|
fallback_checks(local, zone_local[0], zone_remote[0], nxdomain=True)
|
|
|
|
# Local NOK, but forwarded OK.
|
|
resp = local.dig("remote.test", "A")
|
|
resp.check(rcode="NOERROR", flags="AA", rdata="1.1.1.2")
|
|
|
|
# Remote not available, responded locally.
|
|
remote.stop()
|
|
resp = local.dig("remote.test", "A")
|
|
resp.check(rcode="NXDOMAIN", flags="AA")
|
|
remote.start()
|
|
|
|
### Per zone, fallback
|
|
|
|
local.clear_modules(None)
|
|
local.add_module(zone_common1[0], ModDnsproxy(remote.addr, remote.port, fallback=False))
|
|
local.gen_confile()
|
|
local.reload()
|
|
|
|
# Remote OK.
|
|
resp = local.dig("dns1.test", "A")
|
|
resp.check(rcode="NOERROR", flags="AA", rdata="192.0.2.2", nordata="192.0.2.1")
|
|
|
|
# Remote NOK, not forwarded.
|
|
resp = local.dig(zone_remote[0].name, "SOA")
|
|
if not is_subzone(zone_remote[0], zone_local[0]):
|
|
resp.check(rcode="REFUSED", noflags="AA")
|
|
else:
|
|
resp.check(rcode="NXDOMAIN", flags="AA")
|
|
|
|
# Remote not available, responded locally.
|
|
remote.stop()
|
|
resp = local.dig("dns1.test", "A")
|
|
resp.check(rcode="NOERROR", flags="AA", rdata="192.0.2.1", nordata="192.0.2.2")
|
|
|
|
t.end()
|