meson: tests/integration - turn off DNSSEC, add additional tests

parent cb9f654c
......@@ -26,6 +26,12 @@ config_tests += [
['dns64', files('dns64/dns64.test.lua')],
]
integr_tests += [
['bogus_log', join_paths(meson.current_source_dir(), 'bogus_log', 'test.integr')],
['rebinding', join_paths(meson.current_source_dir(), 'rebinding', 'test.integr')],
['serve_stale', join_paths(meson.current_source_dir(), 'serve_stale', 'test.integr')],
]
# handle more complex C/LUA modules separately
subdir('bogus_log')
......
......@@ -9,6 +9,7 @@ config_tests += [
]
integr_tests += [
['policy', join_paths(meson.current_source_dir(), 'test.integr')],
['policy.noipv6', join_paths(meson.current_source_dir(), 'noipv6.test.integr')],
['policy.noipvx', join_paths(meson.current_source_dir(), 'noipvx.test.integr')],
]
......
......@@ -2,6 +2,9 @@
net.ipv6 = false
policy.add(policy.all(policy.STUB({ '::1:2:3:4', '1.2.3.4' })))
-- make sure DNSSEC is turned off for tests
trust_anchors.keyfile_default = nil
-- Disable RFC8145 signaling, scenario doesn't provide expected answers
if ta_signal_query then
modules.unload('ta_signal_query')
......
......@@ -3,6 +3,9 @@ net.ipv4 = false
net.ipv6 = false
policy.add(policy.all(policy.STUB({ '::1:2:3:4', '1.2.3.4' })))
-- make sure DNSSEC is turned off for tests
trust_anchors.keyfile_default = nil
-- Disable RFC8145 signaling, scenario doesn't provide expected answers
if ta_signal_query then
modules.unload('ta_signal_query')
......
{% raw %}
policy.add(policy.suffix(policy.REFUSE, {todname('refuse.example.com')}))
-- make sure DNSSEC is turned off for tests
trust_anchors.keyfile_default = nil
-- Disable RFC8145 signaling, scenario doesn't provide expected answers
if ta_signal_query then
modules.unload('ta_signal_query')
......
-- Protection from DNS rebinding attacks
local kres = require('kres')
local renumber = require('kres_module.renumber')
local renumber = require('kres_modules.renumber')
local M = {}
M.layer = {}
......
{% raw %}
-- make sure DNSSEC is turned off for tests
trust_anchors.keyfile_default = nil
-- Disable RFC8145 signaling, scenario doesn't provide expected answers
if ta_signal_query then
modules.unload('ta_signal_query')
......
{% raw %}
modules = { 'serve_stale < cache' }
-- make sure DNSSEC is turned off for tests
trust_anchors.keyfile_default = nil
-- Disable RFC8145 signaling, scenario doesn't provide expected answers
if ta_signal_query then
modules.unload('ta_signal_query')
......
......@@ -4,6 +4,11 @@ stats_src = [
'stats.c',
]
integr_tests += [
['stats', join_paths(meson.current_source_dir(), 'test.integr')],
]
stats_mod = shared_module(
'stats',
stats_src,
......
......@@ -51,6 +51,9 @@ end
policy.add(policy.pattern(reply_result, 'stats.test.'))
policy.add(policy.all(FWD_TARGET)) -- avoid iteration
-- make sure DNSSEC is turned off for tests
trust_anchors.keyfile_default = nil
-- Disable RFC8145 signaling, scenario doesn't provide expected answers
if ta_signal_query then
modules.unload('ta_signal_query')
......
......@@ -5,6 +5,9 @@ view:addr('127.0.0.0/24', policy.suffix(policy.DENY_MSG("addr 127.0.0.0/24 match
view:addr('127.0.0.0/24', policy.suffix(policy.DENY_MSG("addr 127.0.0.0/24 matched net"),{"\3net\0"}))
policy.add(policy.all(policy.FORWARD('1.2.3.4')))
-- make sure DNSSEC is turned off for tests
trust_anchors.keyfile_default = nil
-- Disable RFC8145 signaling, scenario doesn't provide expected answers
if ta_signal_query then
modules.unload('ta_signal_query')
......
......@@ -22,6 +22,9 @@ if detect_time_skew then
modules.unload('detect_time_skew')
end
-- make sure DNSSEC is turned off for tests
trust_anchors.keyfile_default = nil
_hint_root_file('hints')
cache.size = 2*MB
verbose(true)
......
......@@ -2,6 +2,9 @@ net = { '{{SELF_ADDR}}' }
-- hints.root({['k.root-servers.net'] = '{{ROOT_ADDR}}'})
_hint_root_file('hints')
-- make sure DNSSEC is turned off for tests
trust_anchors.keyfile_default = nil
cache.size = 2*MB
......
......@@ -26,7 +26,6 @@ deckard_contrib = custom_target(
'@0@'.format(join_paths(meson.current_source_dir(), 'deckard')),
],
output: 'deckard_contrib',
build_always_stale: true,
)
deckard_env = environment()
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment