tests: named_test_configs -> test_configs

This commit is contained in:
Daniel McCarney 2023-01-10 17:56:05 -05:00 committed by Benjamin Fry
parent 9a461bb9a9
commit 3235d2b3f6
56 changed files with 73 additions and 79 deletions

View File

@ -87,7 +87,7 @@ a restart of the server process.
### DNS-over-TLS and DNS-over-HTTPS on the Server ### DNS-over-TLS and DNS-over-HTTPS on the Server
Support of TLS on the Server is managed through a pkcs12 der file. The documentation is captured in the example test config file, [example.toml](https://github.com/bluejekyll/trust-dns/blob/main/tests/test-data/named_test_configs/example.toml). A registered certificate to the server can be pinned to the Client with the `add_ca()` method. Alternatively, as the client uses the rust-native-tls library, it should work with certificate signed by any standard CA. Support of TLS on the Server is managed through a pkcs12 der file. The documentation is captured in the example test config file, [example.toml](https://github.com/bluejekyll/trust-dns/blob/main/tests/test-data/test_configs/example.toml). A registered certificate to the server can be pinned to the Client with the `add_ca()` method. Alternatively, as the client uses the rust-native-tls library, it should work with certificate signed by any standard CA.
## DNS-over-TLS and DNS-over-HTTPS ## DNS-over-TLS and DNS-over-HTTPS
@ -260,7 +260,7 @@ so this should allow it to work with most internal loads.
You may want not passing the `-p` parameter will run on default DNS ports. For the tls features, there are also port options for those, see `trust-dns --help` You may want not passing the `-p` parameter will run on default DNS ports. For the tls features, there are also port options for those, see `trust-dns --help`
```shell ```shell
./target/release/trust-dns -c ./tests/test-data/named_test_configs/example.toml -z ./tests/test-data/named_test_configs/ -p 24141 ./target/release/trust-dns -c ./tests/test-data/test_configs/example.toml -z ./tests/test-data/test_configs/ -p 24141
``` ```
- Query the just launched server with `dig` - Query the just launched server with `dig`

View File

@ -16,7 +16,7 @@ This a named implementation for DNS zone hosting. It is capable of performing si
## DNS-over-TLS and DNS-over-HTTPS ## DNS-over-TLS and DNS-over-HTTPS
Support of TLS on the Server is managed through a pkcs12 der file. The documentation is captured in the example test config file, [example.toml](https://github.com/bluejekyll/trust-dns/blob/main/tests/test-data/named_test_configs/example.toml). A registered certificate to the server can be pinned to the Client with the `add_ca()` method. Alternatively, as the client uses the rust-native-tls library, it should work with certificate signed by any standard CA. Support of TLS on the Server is managed through a pkcs12 der file. The documentation is captured in the example test config file, [example.toml](https://github.com/bluejekyll/trust-dns/blob/main/tests/test-data/test_configs/example.toml). A registered certificate to the server can be pinned to the Client with the `add_ca()` method. Alternatively, as the client uses the rust-native-tls library, it should work with certificate signed by any standard CA.
DoT and DoH are supported. This is accomplished through the use of one of `native-tls`, `openssl`, or `rustls` (only `rustls` is currently supported for DoH). The Resolver requires only requires valid DoT or DoH resolvers being registered in order to be used. DoT and DoH are supported. This is accomplished through the use of one of `native-tls`, `openssl`, or `rustls` (only `rustls` is currently supported for DoH). The Resolver requires only requires valid DoT or DoH resolvers being registered in order to be used.

View File

@ -1,7 +1,7 @@
/* /*
Trust-DNS bench setup: Trust-DNS bench setup:
this is meant to mimic the trust-dns-server config this is meant to mimic the trust-dns-server config
which is in tests/test-data/named_test_configs/example.toml which is in tests/test-data/test_configs/example.toml
*/ */
controls { /* empty */ }; controls { /* empty */ };
@ -15,30 +15,30 @@ options {
zone "localhost" { zone "localhost" {
type primary; type primary;
file "../../../tests/test-data/named_test_configs/default/localhost.zone"; file "../../../tests/test-data/test_configs/default/localhost.zone";
}; };
zone "0.0.127.in-addr.arpa" { zone "0.0.127.in-addr.arpa" {
type primary; type primary;
file "../../../tests/test-data/named_test_configs/default/127.0.0.1.zone"; file "../../../tests/test-data/test_configs/default/127.0.0.1.zone";
}; };
zone "0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa" { zone "0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa" {
type primary; type primary;
file "../../../tests/test-data/named_test_configs/default/ipv6_1.zone"; file "../../../tests/test-data/test_configs/default/ipv6_1.zone";
}; };
zone "255.in-addr.arpa" { zone "255.in-addr.arpa" {
type primary; type primary;
file "../../../tests/test-data/named_test_configs/default/255.zone"; file "../../../tests/test-data/test_configs/default/255.zone";
}; };
zone "0.in-addr.arpa" { zone "0.in-addr.arpa" {
type primary; type primary;
file "../../../tests/test-data/named_test_configs/default/0.zone"; file "../../../tests/test-data/test_configs/default/0.zone";
}; };
zone "example.com" { zone "example.com" {
type primary; type primary;
file "../../../tests/test-data/named_test_configs/example.com.zone"; file "../../../tests/test-data/test_configs/example.com.zone";
}; };

View File

@ -87,11 +87,8 @@ fn trust_dns_process() -> (NamedProcess, u16) {
let ws_root = env::var("WORKSPACE_ROOT").unwrap_or_else(|_| "..".to_owned()); let ws_root = env::var("WORKSPACE_ROOT").unwrap_or_else(|_| "..".to_owned());
let named_path = format!("{}/target/release/named", ws_root); let named_path = format!("{}/target/release/named", ws_root);
let config_path = format!( let config_path = format!("{}/tests/test-data/test_configs/example.toml", ws_root);
"{}/tests/test-data/named_test_configs/example.toml", let zone_dir = format!("{}/tests/test-data/test_configs", ws_root);
ws_root
);
let zone_dir = format!("{}/tests/test-data/named_test_configs", ws_root);
File::open(&named_path).expect(&named_path); File::open(&named_path).expect(&named_path);
File::open(&config_path).expect(&config_path); File::open(&config_path).expect(&config_path);

View File

@ -37,7 +37,7 @@ fn test_example_https_toml_startup() {
println!("using server src path: {}", server_path); println!("using server src path: {}", server_path);
File::open(format!( File::open(format!(
"{}/tests/test-data/named_test_configs/sec/example.cert", "{}/tests/test-data/test_configs/sec/example.cert",
server_path server_path
)) ))
.expect("failed to open cert") .expect("failed to open cert")

View File

@ -45,7 +45,7 @@ fn test_startup(toml: &'static str) {
println!("using server src path: {}", server_path); println!("using server src path: {}", server_path);
File::open(&format!( File::open(&format!(
"{}/tests/test-data/named_test_configs/sec/example.cert", "{}/tests/test-data/test_configs/sec/example.cert",
server_path server_path
)) ))
.expect("failed to open cert") .expect("failed to open cert")

View File

@ -29,7 +29,7 @@ fn test_example_quic_toml_startup() {
println!("using server src path: {server_path} and quic_port: {quic_port:?}"); println!("using server src path: {server_path} and quic_port: {quic_port:?}");
File::open(format!( File::open(format!(
"{}/tests/test-data/named_test_configs/sec/example.cert", "{}/tests/test-data/test_configs/sec/example.cert",
server_path server_path
)) ))
.expect("failed to open cert") .expect("failed to open cert")

View File

@ -38,7 +38,7 @@ fn test_example_tls_toml_startup() {
println!("using server src path: {}", server_path); println!("using server src path: {}", server_path);
File::open(format!( File::open(format!(
"{}/tests/test-data/named_test_configs/sec/example.cert", "{}/tests/test-data/test_configs/sec/example.cert",
server_path server_path
)) ))
.expect("failed to open cert") .expect("failed to open cert")

View File

@ -111,7 +111,7 @@ fn generic_test(config_toml: &str, key_path: &str, key_format: KeyFormat, algori
fn test_rsa_sha256() { fn test_rsa_sha256() {
generic_test( generic_test(
confg_toml(), confg_toml(),
"tests/test-data/named_test_configs/dnssec/rsa_2048.pem", "tests/test-data/test_configs/dnssec/rsa_2048.pem",
KeyFormat::Pem, KeyFormat::Pem,
Algorithm::RSASHA256, Algorithm::RSASHA256,
); );
@ -122,7 +122,7 @@ fn test_rsa_sha256() {
fn test_rsa_sha512() { fn test_rsa_sha512() {
generic_test( generic_test(
confg_toml(), confg_toml(),
"tests/test-data/named_test_configs/dnssec/rsa_2048.pem", "tests/test-data/test_configs/dnssec/rsa_2048.pem",
KeyFormat::Pem, KeyFormat::Pem,
Algorithm::RSASHA512, Algorithm::RSASHA512,
); );
@ -133,7 +133,7 @@ fn test_rsa_sha512() {
fn test_ecdsa_p256() { fn test_ecdsa_p256() {
generic_test( generic_test(
confg_toml(), confg_toml(),
"tests/test-data/named_test_configs/dnssec/ecdsa_p256.pem", "tests/test-data/test_configs/dnssec/ecdsa_p256.pem",
KeyFormat::Pem, KeyFormat::Pem,
Algorithm::ECDSAP256SHA256, Algorithm::ECDSAP256SHA256,
); );
@ -144,7 +144,7 @@ fn test_ecdsa_p256() {
fn test_ecdsa_p256_pkcs8() { fn test_ecdsa_p256_pkcs8() {
generic_test( generic_test(
confg_toml(), confg_toml(),
"tests/test-data/named_test_configs/dnssec/ecdsa_p256.pk8", "tests/test-data/test_configs/dnssec/ecdsa_p256.pk8",
KeyFormat::Pkcs8, KeyFormat::Pkcs8,
Algorithm::ECDSAP256SHA256, Algorithm::ECDSAP256SHA256,
); );
@ -155,7 +155,7 @@ fn test_ecdsa_p256_pkcs8() {
fn test_ecdsa_p384() { fn test_ecdsa_p384() {
generic_test( generic_test(
confg_toml(), confg_toml(),
"tests/test-data/named_test_configs/dnssec/ecdsa_p384.pem", "tests/test-data/test_configs/dnssec/ecdsa_p384.pem",
KeyFormat::Pem, KeyFormat::Pem,
Algorithm::ECDSAP384SHA384, Algorithm::ECDSAP384SHA384,
); );
@ -166,7 +166,7 @@ fn test_ecdsa_p384() {
fn test_ecdsa_p384_pkcs8() { fn test_ecdsa_p384_pkcs8() {
generic_test( generic_test(
confg_toml(), confg_toml(),
"tests/test-data/named_test_configs/dnssec/ecdsa_p384.pk8", "tests/test-data/test_configs/dnssec/ecdsa_p384.pk8",
KeyFormat::Pkcs8, KeyFormat::Pkcs8,
Algorithm::ECDSAP384SHA384, Algorithm::ECDSAP384SHA384,
); );
@ -177,7 +177,7 @@ fn test_ecdsa_p384_pkcs8() {
fn test_ed25519() { fn test_ed25519() {
generic_test( generic_test(
confg_toml(), confg_toml(),
"tests/test-data/named_test_configs/dnssec/ed25519.pk8", "tests/test-data/test_configs/dnssec/ed25519.pk8",
KeyFormat::Pkcs8, KeyFormat::Pkcs8,
Algorithm::ED25519, Algorithm::ED25519,
); );
@ -189,7 +189,7 @@ fn test_ed25519() {
fn test_rsa_sha1_fails() { fn test_rsa_sha1_fails() {
generic_test( generic_test(
confg_toml(), confg_toml(),
"tests/test-data/named_test_configs/dnssec/rsa_2048.pem", "tests/test-data/test_configs/dnssec/rsa_2048.pem",
KeyFormat::Pem, KeyFormat::Pem,
Algorithm::RSASHA1, Algorithm::RSASHA1,
); );
@ -202,13 +202,12 @@ fn test_dnssec_restart_with_update_journal() {
// TODO: make journal path configurable, it should be in target/tests/... // TODO: make journal path configurable, it should be in target/tests/...
let server_path = env::var("TDNS_WORKSPACE_ROOT").unwrap_or_else(|_| "..".to_owned()); let server_path = env::var("TDNS_WORKSPACE_ROOT").unwrap_or_else(|_| "..".to_owned());
let server_path = Path::new(&server_path); let server_path = Path::new(&server_path);
let journal = let journal = server_path.join("tests/test-data/test_configs/example.com_dnssec_update.jrnl");
server_path.join("tests/test-data/named_test_configs/example.com_dnssec_update.jrnl");
std::fs::remove_file(&journal).ok(); std::fs::remove_file(&journal).ok();
generic_test( generic_test(
"dnssec_with_update.toml", "dnssec_with_update.toml",
"tests/test-data/named_test_configs/dnssec/rsa_2048.pem", "tests/test-data/test_configs/dnssec/rsa_2048.pem",
KeyFormat::Pem, KeyFormat::Pem,
Algorithm::RSASHA256, Algorithm::RSASHA256,
); );
@ -219,7 +218,7 @@ fn test_dnssec_restart_with_update_journal() {
// and all dnssec tests should still pass // and all dnssec tests should still pass
generic_test( generic_test(
"dnssec_with_update.toml", "dnssec_with_update.toml",
"tests/test-data/named_test_configs/dnssec/rsa_2048.pem", "tests/test-data/test_configs/dnssec/rsa_2048.pem",
KeyFormat::Pem, KeyFormat::Pem,
Algorithm::RSASHA256, Algorithm::RSASHA256,
); );
@ -239,12 +238,12 @@ fn test_dnssec_restart_with_update_journal_dep() {
// TODO: make journal path configurable, it should be in target/tests/... // TODO: make journal path configurable, it should be in target/tests/...
let server_path = env::var("TDNS_WORKSPACE_ROOT").unwrap_or_else(|_| "..".to_owned()); let server_path = env::var("TDNS_WORKSPACE_ROOT").unwrap_or_else(|_| "..".to_owned());
let server_path = Path::new(&server_path); let server_path = Path::new(&server_path);
let journal = server_path.join("tests/test-data/named_test_configs/example.com.jrnl"); let journal = server_path.join("tests/test-data/test_configs/example.com.jrnl");
std::fs::remove_file(&journal).ok(); std::fs::remove_file(&journal).ok();
generic_test( generic_test(
"dnssec_with_update_deprecated.toml", "dnssec_with_update_deprecated.toml",
"tests/test-data/named_test_configs/dnssec/rsa_2048.pem", "tests/test-data/test_configs/dnssec/rsa_2048.pem",
KeyFormat::Pem, KeyFormat::Pem,
Algorithm::RSASHA256, Algorithm::RSASHA256,
); );
@ -255,7 +254,7 @@ fn test_dnssec_restart_with_update_journal_dep() {
// and all dnssec tests should still pass // and all dnssec tests should still pass
generic_test( generic_test(
"dnssec_with_update_deprecated.toml", "dnssec_with_update_deprecated.toml",
"tests/test-data/named_test_configs/dnssec/rsa_2048.pem", "tests/test-data/test_configs/dnssec/rsa_2048.pem",
KeyFormat::Pem, KeyFormat::Pem,
Algorithm::RSASHA256, Algorithm::RSASHA256,
); );

View File

@ -51,10 +51,10 @@ where
"trust_dns_client=debug,trust_dns_proto=debug,trust_dns_resolver=debug,trust_dns_server=debug", "trust_dns_client=debug,trust_dns_proto=debug,trust_dns_resolver=debug,trust_dns_server=debug",
).arg("-d") ).arg("-d")
.arg(&format!( .arg(&format!(
"--config={}/tests/test-data/named_test_configs/{}", "--config={}/tests/test-data/test_configs/{}",
server_path, toml server_path, toml
)).arg(&format!( )).arg(&format!(
"--zonedir={}/tests/test-data/named_test_configs", "--zonedir={}/tests/test-data/test_configs",
server_path server_path
)).arg(&format!("--port={}", 0)) )).arg(&format!("--port={}", 0))
.arg(&format!("--tls-port={}", 0)) .arg(&format!("--tls-port={}", 0))

View File

@ -366,12 +366,12 @@ mod tests {
fn test_load_zone() { fn test_load_zone() {
#[cfg(feature = "dnssec")] #[cfg(feature = "dnssec")]
let config = FileConfig { let config = FileConfig {
zone_file_path: "../../tests/test-data/named_test_configs/dnssec/example.com.zone" zone_file_path: "../../tests/test-data/test_configs/dnssec/example.com.zone"
.to_string(), .to_string(),
}; };
#[cfg(not(feature = "dnssec"))] #[cfg(not(feature = "dnssec"))]
let config = FileConfig { let config = FileConfig {
zone_file_path: "../../tests/test-data/named_test_configs/example.com.zone".to_string(), zone_file_path: "../../tests/test-data/test_configs/example.com.zone".to_string(),
}; };
let authority = FileAuthority::try_from_config( let authority = FileAuthority::try_from_config(
Name::from_str("example.com.").unwrap(), Name::from_str("example.com.").unwrap(),

View File

@ -725,7 +725,7 @@ macro_rules! define_basic_test {
// Useful for getting debug logs // Useful for getting debug logs
// env_logger::try_init().ok(); // env_logger::try_init().ok();
let authority = crate::$new("../../tests/test-data/named_test_configs/example.com.zone", module_path!(), stringify!($f)); let authority = crate::$new("../../tests/test-data/test_configs/example.com.zone", module_path!(), stringify!($f));
crate::authority_battery::basic::$f(authority); crate::authority_battery::basic::$f(authority);
} }
)* )*

View File

@ -379,7 +379,7 @@ pub fn add_signers<A: DnssecAuthority>(authority: &mut A) -> Vec<DNSKEY> {
// rsa // rsa
{ {
let key_config = KeyConfig { let key_config = KeyConfig {
key_path: "../../tests/test-data/named_test_configs/dnssec/rsa_2048.pem".to_string(), key_path: "../../tests/test-data/test_configs/dnssec/rsa_2048.pem".to_string(),
password: Some("123456".to_string()), password: Some("123456".to_string()),
algorithm: Algorithm::RSASHA512.to_string(), algorithm: Algorithm::RSASHA512.to_string(),
signer_name: Some(signer_name.to_string()), signer_name: Some(signer_name.to_string()),
@ -399,7 +399,7 @@ pub fn add_signers<A: DnssecAuthority>(authority: &mut A) -> Vec<DNSKEY> {
// // ecdsa_p256 // // ecdsa_p256
// { // {
// let key_config = KeyConfig { // let key_config = KeyConfig {
// key_path: "../../tests/test-data/named_test_configs/dnssec/ecdsa_p256.pem".to_string(), // key_path: "../../tests/test-data/test_configs/dnssec/ecdsa_p256.pem".to_string(),
// password: None, // password: None,
// algorithm: Algorithm::ECDSAP256SHA256.to_string(), // algorithm: Algorithm::ECDSAP256SHA256.to_string(),
// signer_name: Some(signer_name.clone().to_string()), // signer_name: Some(signer_name.clone().to_string()),
@ -416,7 +416,7 @@ pub fn add_signers<A: DnssecAuthority>(authority: &mut A) -> Vec<DNSKEY> {
// // ecdsa_p384 // // ecdsa_p384
// { // {
// let key_config = KeyConfig { // let key_config = KeyConfig {
// key_path: "../../tests/test-data/named_test_configs/dnssec/ecdsa_p384.pem".to_string(), // key_path: "../../tests/test-data/test_configs/dnssec/ecdsa_p384.pem".to_string(),
// password: None, // password: None,
// algorithm: Algorithm::ECDSAP384SHA384.to_string(), // algorithm: Algorithm::ECDSAP384SHA384.to_string(),
// signer_name: Some(signer_name.clone().to_string()), // signer_name: Some(signer_name.clone().to_string()),
@ -434,7 +434,7 @@ pub fn add_signers<A: DnssecAuthority>(authority: &mut A) -> Vec<DNSKEY> {
#[cfg(feature = "dnssec-ring")] #[cfg(feature = "dnssec-ring")]
{ {
let key_config = KeyConfig { let key_config = KeyConfig {
key_path: "../../tests/test-data/named_test_configs/dnssec/ed25519.pk8".to_string(), key_path: "../../tests/test-data/test_configs/dnssec/ed25519.pk8".to_string(),
password: None, password: None,
algorithm: Algorithm::ED25519.to_string(), algorithm: Algorithm::ED25519.to_string(),
signer_name: Some(signer_name.to_string()), signer_name: Some(signer_name.to_string()),
@ -458,7 +458,7 @@ macro_rules! define_dnssec_test {
$( $(
#[test] #[test]
fn $f () { fn $f () {
let mut authority = crate::$new("../../tests/test-data/named_test_configs/example.com.zone", module_path!(), stringify!($f)); let mut authority = crate::$new("../../tests/test-data/test_configs/example.com.zone", module_path!(), stringify!($f));
let keys = crate::authority_battery::dnssec::add_signers(&mut authority); let keys = crate::authority_battery::dnssec::add_signers(&mut authority);
crate::authority_battery::dnssec::$f(authority, &keys); crate::authority_battery::dnssec::$f(authority, &keys);
} }

View File

@ -791,7 +791,7 @@ pub fn add_auth<A: DnssecAuthority>(authority: &mut A) -> Vec<SigSigner> {
#[cfg(feature = "dnssec-openssl")] #[cfg(feature = "dnssec-openssl")]
{ {
let key_config = KeyConfig { let key_config = KeyConfig {
key_path: "../../tests/test-data/named_test_configs/dnssec/rsa_2048.pem".to_string(), key_path: "../../tests/test-data/test_configs/dnssec/rsa_2048.pem".to_string(),
password: Some("123456".to_string()), password: Some("123456".to_string()),
algorithm: Algorithm::RSASHA512.to_string(), algorithm: Algorithm::RSASHA512.to_string(),
signer_name: Some(update_name.to_string()), signer_name: Some(update_name.to_string()),
@ -816,7 +816,7 @@ pub fn add_auth<A: DnssecAuthority>(authority: &mut A) -> Vec<SigSigner> {
// // ecdsa_p256 // // ecdsa_p256
// { // {
// let key_config = KeyConfig { // let key_config = KeyConfig {
// key_path: "tests/test-data/named_test_configs/dnssec/ecdsa_p256.pem".to_string(), // key_path: "tests/test-data/test_configs/dnssec/ecdsa_p256.pem".to_string(),
// password: None, // password: None,
// algorithm: Algorithm::ECDSAP256SHA256.to_string(), // algorithm: Algorithm::ECDSAP256SHA256.to_string(),
// signer_name: Some(signer_name.clone().to_string()), // signer_name: Some(signer_name.clone().to_string()),
@ -833,7 +833,7 @@ pub fn add_auth<A: DnssecAuthority>(authority: &mut A) -> Vec<SigSigner> {
// // ecdsa_p384 // // ecdsa_p384
// { // {
// let key_config = KeyConfig { // let key_config = KeyConfig {
// key_path: "../../tests/test-data/named_test_configs/dnssec/ecdsa_p384.pem".to_string(), // key_path: "../../tests/test-data/test_configs/dnssec/ecdsa_p384.pem".to_string(),
// password: None, // password: None,
// algorithm: Algorithm::ECDSAP384SHA384.to_string(), // algorithm: Algorithm::ECDSAP384SHA384.to_string(),
// signer_name: Some(signer_name.clone().to_string()), // signer_name: Some(signer_name.clone().to_string()),
@ -851,7 +851,7 @@ pub fn add_auth<A: DnssecAuthority>(authority: &mut A) -> Vec<SigSigner> {
#[cfg(feature = "dnssec-ring")] #[cfg(feature = "dnssec-ring")]
{ {
let key_config = KeyConfig { let key_config = KeyConfig {
key_path: "../../tests/test-data/named_test_configs/dnssec/ed25519.pk8".to_string(), key_path: "../../tests/test-data/test_configs/dnssec/ed25519.pk8".to_string(),
password: None, password: None,
algorithm: Algorithm::ED25519.to_string(), algorithm: Algorithm::ED25519.to_string(),
signer_name: Some(update_name.to_string()), signer_name: Some(update_name.to_string()),
@ -880,7 +880,7 @@ macro_rules! define_update_test {
$( $(
#[test] #[test]
fn $f () { fn $f () {
let mut authority = crate::$new("../../tests/test-data/named_test_configs/example.com.zone", module_path!(), stringify!($f)); let mut authority = crate::$new("../../tests/test-data/test_configs/example.com.zone", module_path!(), stringify!($f));
let keys = crate::authority_battery::dynamic_update::add_auth(&mut authority); let keys = crate::authority_battery::dynamic_update::add_auth(&mut authority);
crate::authority_battery::dynamic_update::$f(authority, &keys); crate::authority_battery::dynamic_update::$f(authority, &keys);
} }

View File

@ -25,7 +25,7 @@ use trust_dns_server::config::*;
fn test_read_config() { fn test_read_config() {
let server_path = env::var("TDNS_WORKSPACE_ROOT").unwrap_or_else(|_| "../..".to_owned()); let server_path = env::var("TDNS_WORKSPACE_ROOT").unwrap_or_else(|_| "../..".to_owned());
let path: PathBuf = let path: PathBuf =
PathBuf::from(server_path).join("tests/test-data/named_test_configs/example.toml"); PathBuf::from(server_path).join("tests/test-data/test_configs/example.toml");
if !path.exists() { if !path.exists() {
panic!("can't locate example.toml and other configs: {:?}", path) panic!("can't locate example.toml and other configs: {:?}", path)
@ -240,7 +240,7 @@ tls_listen_port = 8853
fn test_config(path: &str) { fn test_config(path: &str) {
let workspace = env::var("TDNS_WORKSPACE_ROOT").unwrap_or_else(|_| "../..".to_owned()); let workspace = env::var("TDNS_WORKSPACE_ROOT").unwrap_or_else(|_| "../..".to_owned());
let path = PathBuf::from(workspace) let path = PathBuf::from(workspace)
.join("tests/test-data/named_test_configs") .join("tests/test-data/test_configs")
.join(path) .join(path)
.with_extension("toml"); .with_extension("toml");
assert!(path.exists(), "does not exist: {}", path.display()); assert!(path.exists(), "does not exist: {}", path.display());

View File

@ -30,8 +30,7 @@ dnssec_battery!(file);
#[test] #[test]
fn test_all_lines_are_loaded() { fn test_all_lines_are_loaded() {
let config = FileConfig { let config = FileConfig {
zone_file_path: "../../tests/test-data/named_test_configs/default/nonewline.zone" zone_file_path: "../../tests/test-data/test_configs/default/nonewline.zone".to_string(),
.to_string(),
}; };
let mut authority = FileAuthority::try_from_config( let mut authority = FileAuthority::try_from_config(
@ -52,8 +51,7 @@ fn test_all_lines_are_loaded() {
#[tokio::test] #[tokio::test]
async fn test_ttl_wilcard() { async fn test_ttl_wilcard() {
let config = FileConfig { let config = FileConfig {
zone_file_path: "../../tests/test-data/named_test_configs/default/test.local.zone" zone_file_path: "../../tests/test-data/test_configs/default/test.local.zone".to_string(),
.to_string(),
}; };
let zone_name = LowerName::from_str("test.local.").unwrap(); let zone_name = LowerName::from_str("test.local.").unwrap();

View File

@ -1,7 +1,7 @@
/* /*
Trust-DNS bench setup: Trust-DNS bench setup:
this is meant to mimic the trust-dns-server config this is meant to mimic the trust-dns-server config
which is in tests/test-data/named_test_configs/example.toml which is in tests/test-data/test_configs/example.toml
*/ */
include "../../tests/compatibility-tests/tests/conf/tsig.conf"; include "../../tests/compatibility-tests/tests/conf/tsig.conf";
@ -19,27 +19,27 @@ options {
zone "localhost" { zone "localhost" {
type master; type master;
file "../../crates/server/tests/test-data/named_test_configs/default/localhost.zone"; file "../../crates/server/tests/test-data/test_configs/default/localhost.zone";
}; };
zone "0.0.127.in-addr.arpa" { zone "0.0.127.in-addr.arpa" {
type master; type master;
file "../../crates/server/tests/test-data/named_test_configs/default/127.0.0.1.zone"; file "../../crates/server/tests/test-data/test_configs/default/127.0.0.1.zone";
}; };
zone "0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa" { zone "0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa" {
type master; type master;
file "../../crates/server/tests/test-data/named_test_configs/default/ipv6_1.zone"; file "../../crates/server/tests/test-data/test_configs/default/ipv6_1.zone";
}; };
zone "255.in-addr.arpa" { zone "255.in-addr.arpa" {
type master; type master;
file "../../crates/server/tests/test-data/named_test_configs/default/255.zone"; file "../../crates/server/tests/test-data/test_configs/default/255.zone";
}; };
zone "0.in-addr.arpa" { zone "0.in-addr.arpa" {
type master; type master;
file "../../crates/server/tests/test-data/named_test_configs/default/0.zone"; file "../../crates/server/tests/test-data/test_configs/default/0.zone";
}; };
zone "example.com" { zone "example.com" {

View File

@ -40,7 +40,7 @@ file = "example.com.zone"
enable_dnssec = true enable_dnssec = true
[[zones.keys]] [[zones.keys]]
key_path = "../tests/test-data/named_test_configs/dnssec/rsa_2048.pem" key_path = "../tests/test-data/test_configs/dnssec/rsa_2048.pem"
## the password used to encrypt/decrypt the file (must be PEM), blank for none ## the password used to encrypt/decrypt the file (must be PEM), blank for none
password = "123456" password = "123456"
## specify the algorithm ## specify the algorithm
@ -53,37 +53,37 @@ is_zone_signing_key = true
# create_if_absent = false # create_if_absent = false
[[zones.keys]] [[zones.keys]]
key_path = "../tests/test-data/named_test_configs/dnssec/rsa_2048.pem" key_path = "../tests/test-data/test_configs/dnssec/rsa_2048.pem"
password = "123456" password = "123456"
algorithm = "RSASHA512" algorithm = "RSASHA512"
is_zone_signing_key = true is_zone_signing_key = true
[[zones.keys]] [[zones.keys]]
key_path = "../tests/test-data/named_test_configs/dnssec/ecdsa_p256.pem" key_path = "../tests/test-data/test_configs/dnssec/ecdsa_p256.pem"
# password = "123456" # password = "123456"
algorithm = "ECDSAP256SHA256" algorithm = "ECDSAP256SHA256"
is_zone_signing_key = true is_zone_signing_key = true
[[zones.keys]] [[zones.keys]]
key_path = "../tests/test-data/named_test_configs/dnssec/ecdsa_p384.pem" key_path = "../tests/test-data/test_configs/dnssec/ecdsa_p384.pem"
# password = "123456" # password = "123456"
algorithm = "ECDSAP384SHA384" algorithm = "ECDSAP384SHA384"
is_zone_signing_key = true is_zone_signing_key = true
[[zones.keys]] [[zones.keys]]
# Requires --features=ring # Requires --features=ring
key_path = "../tests/test-data/named_test_configs/dnssec/ecdsa_p256.pk8" key_path = "../tests/test-data/test_configs/dnssec/ecdsa_p256.pk8"
algorithm = "ECDSAP256SHA256" algorithm = "ECDSAP256SHA256"
is_zone_signing_key = true is_zone_signing_key = true
[[zones.keys]] [[zones.keys]]
# Requires --features=ring # Requires --features=ring
key_path = "../tests/test-data/named_test_configs/dnssec/ecdsa_p384.pk8" key_path = "../tests/test-data/test_configs/dnssec/ecdsa_p384.pk8"
algorithm = "ECDSAP384SHA384" algorithm = "ECDSAP384SHA384"
is_zone_signing_key = true is_zone_signing_key = true
[[zones.keys]] [[zones.keys]]
# Requires --features=ring # Requires --features=ring
key_path = "../tests/test-data/named_test_configs/dnssec/ed25519.pk8" key_path = "../tests/test-data/test_configs/dnssec/ed25519.pk8"
algorithm = "ED25519" algorithm = "ED25519"
is_zone_signing_key = true is_zone_signing_key = true

View File

@ -46,7 +46,7 @@ enable_dnssec = true
stores = { type = "sqlite", zone_file_path = "example.com.zone", journal_file_path = "example.com_dnssec_update.jrnl", allow_update = true } stores = { type = "sqlite", zone_file_path = "example.com.zone", journal_file_path = "example.com_dnssec_update.jrnl", allow_update = true }
[[zones.keys]] [[zones.keys]]
key_path = "../tests/test-data/named_test_configs/dnssec/rsa_2048.pem" key_path = "../tests/test-data/test_configs/dnssec/rsa_2048.pem"
## the password used to encrypt/decrypt the file (must be PEM), blank for none ## the password used to encrypt/decrypt the file (must be PEM), blank for none
password = "123456" password = "123456"
## specify the algorithm ## specify the algorithm
@ -59,7 +59,7 @@ is_zone_signing_key = true
# create_if_absent = false # create_if_absent = false
[[zones.keys]] [[zones.keys]]
key_path = "../tests/test-data/named_test_configs/dnssec/rsa_2048.pem" key_path = "../tests/test-data/test_configs/dnssec/rsa_2048.pem"
password = "123456" password = "123456"
algorithm = "RSASHA512" algorithm = "RSASHA512"
is_zone_signing_key = false is_zone_signing_key = false

View File

@ -51,7 +51,7 @@ allow_update = true
enable_dnssec = true enable_dnssec = true
[[zones.keys]] [[zones.keys]]
key_path = "../tests/test-data/named_test_configs/dnssec/rsa_2048.pem" key_path = "../tests/test-data/test_configs/dnssec/rsa_2048.pem"
## the password used to encrypt/decrypt the file (must be PEM), blank for none ## the password used to encrypt/decrypt the file (must be PEM), blank for none
password = "123456" password = "123456"
## specify the algorithm ## specify the algorithm
@ -64,7 +64,7 @@ is_zone_signing_key = true
# create_if_absent = false # create_if_absent = false
[[zones.keys]] [[zones.keys]]
key_path = "../tests/test-data/named_test_configs/dnssec/rsa_2048.pem" key_path = "../tests/test-data/test_configs/dnssec/rsa_2048.pem"
password = "123456" password = "123456"
algorithm = "RSASHA512" algorithm = "RSASHA512"
is_zone_signing_key = false is_zone_signing_key = false

View File

@ -40,7 +40,7 @@ file = "example.com.zone"
enable_dnssec = true enable_dnssec = true
[[zones.keys]] [[zones.keys]]
key_path = "../tests/test-data/named_test_configs/dnssec/rsa_2048.pem" key_path = "../tests/test-data/test_configs/dnssec/rsa_2048.pem"
## the password used to encrypt/decrypt the file (must be PEM), blank for none ## the password used to encrypt/decrypt the file (must be PEM), blank for none
password = "123456" password = "123456"
## specify the algorithm ## specify the algorithm
@ -53,19 +53,19 @@ is_zone_signing_key = true
# create_if_absent = false # create_if_absent = false
[[zones.keys]] [[zones.keys]]
key_path = "../tests/test-data/named_test_configs/dnssec/rsa_2048.pem" key_path = "../tests/test-data/test_configs/dnssec/rsa_2048.pem"
password = "123456" password = "123456"
algorithm = "RSASHA512" algorithm = "RSASHA512"
is_zone_signing_key = true is_zone_signing_key = true
[[zones.keys]] [[zones.keys]]
key_path = "../tests/test-data/named_test_configs/dnssec/ecdsa_p256.pem" key_path = "../tests/test-data/test_configs/dnssec/ecdsa_p256.pem"
# password = "123456" # password = "123456"
algorithm = "ECDSAP256SHA256" algorithm = "ECDSAP256SHA256"
is_zone_signing_key = true is_zone_signing_key = true
[[zones.keys]] [[zones.keys]]
key_path = "../tests/test-data/named_test_configs/dnssec/ecdsa_p384.pem" key_path = "../tests/test-data/test_configs/dnssec/ecdsa_p384.pem"
# password = "123456" # password = "123456"
algorithm = "ECDSAP384SHA384" algorithm = "ECDSAP384SHA384"
is_zone_signing_key = true is_zone_signing_key = true

View File

@ -41,18 +41,18 @@ enable_dnssec = true
[[zones.keys]] [[zones.keys]]
# Requires --features=ring # Requires --features=ring
key_path = "../tests/test-data/named_test_configs/dnssec/ecdsa_p256.pk8" key_path = "../tests/test-data/test_configs/dnssec/ecdsa_p256.pk8"
algorithm = "ECDSAP256SHA256" algorithm = "ECDSAP256SHA256"
is_zone_signing_key = true is_zone_signing_key = true
[[zones.keys]] [[zones.keys]]
# Requires --features=ring # Requires --features=ring
key_path = "../tests/test-data/named_test_configs/dnssec/ecdsa_p384.pk8" key_path = "../tests/test-data/test_configs/dnssec/ecdsa_p384.pk8"
algorithm = "ECDSAP384SHA384" algorithm = "ECDSAP384SHA384"
is_zone_signing_key = true is_zone_signing_key = true
[[zones.keys]] [[zones.keys]]
# Requires --features=ring # Requires --features=ring
key_path = "../tests/test-data/named_test_configs/dnssec/ed25519.pk8" key_path = "../tests/test-data/test_configs/dnssec/ed25519.pk8"
algorithm = "ED25519" algorithm = "ED25519"
is_zone_signing_key = true is_zone_signing_key = true