summaryrefslogtreecommitdiffstats
path: root/tests/integration (follow)
Commit message (Collapse)AuthorAgeFilesLines
* ci: fix Deckard integration so it throws errors up the stackPetr Špaček2020-09-251-0/+0
| | | | Fixes: #611
* ci: use docker image with knot 3.0Lukáš Ježek2020-09-161-0/+0
|
* tests: integration test for cache overflow situationPetr Špaček2020-09-071-0/+0
| | | | Resolvers must answer queries even if the shared cache overflown during query processing.
* modules/ta_update: resurrect RFC5011 test removed from deckardLukáš Ježek2020-08-131-0/+0
|
* ci: fix divergent commit in Deckard submoduleŠtěpán Balážik2020-08-111-0/+0
| | | | | | Branch on Deckard tree tracked in this repository was left unmerged in Deckard. The two trees therefore diverged and broke CI in knot-resolver repo on a few commits retroactively.
* validator: bottom->up chase DS if RRSIG(s) are missingVladimír Čunát2020-08-071-0/+0
| | | | | | | | | | | | | | | | | | | | | | | This is about situations when validator *thinks* it's in a signed zone but an unsigned answer comes in. The assumption was that RRSIGs didn't make it through some middle-boxes and it retried with explicit QTYPE=RRSIG. There were two issues with that. 1. It seems that in most cases the cause of the situation is that we skipped over a zone cut that transitioned to insecure state, so the signatures correctly don't exist. 2. An explicit RRSIG query appears to be more trouble than worth; it seems reasonable for servers not to answer it (fully); see RFC 8482 sect. 7. The new approach simply tries to find a proof that the name is insecure, by spawning a QTYPE=DS sub-query on that name. That fixes some real-life cases; usually this happens in iteration mode where one IP address serves zones on both sides of a cut that transitions to insecure. For details see new comments in that rrsig_not_found() function. The change resulted in the iterator fallback not making sense anymore so it was removed.
* deckard: update to fix in CI (new dnspython in image)Vladimír Čunát2020-08-031-0/+0
|
* NXNSAttack mitigation testsPetr Špaček2020-05-182-12/+0
| | | | | | New Deckard repo without conflicting iter_refused.rpl test does not contain libswrap and libfaketime anymore so I had to remove hacks in build system for these.
* ci: update Deckard to a version without swrapPetr Špaček2020-04-301-0/+0
|
* tests: add Deckard module with DNAME testsPetr Špaček2020-04-271-0/+0
|
* validator: use rank BOGUS where appropriate instead of MISSINGPetr Špaček2020-04-151-0/+0
| | | | | | | | | | | | | | | MISSING triggers re-query to auth in attempt to find missing RRSIGs. It causes reduntant queries and also puts some BOGUS RRsets in answers. (It sounds bad but we were correctly setting rcode=SERVFAIL and AD=0 even before this commit.) Formerly RRSIG ranks did not reflect results of validation. Now we mark them as BOGUS and upgrade them to SECURE if they validate. New validator phase answer_finalize prevents BOGUS RRsets from being put even into SERVFAIL answers. Closes: #396
* modules/policy: use origin and domain name as binary dataLukáš Ježek2020-04-141-0/+0
|
* modules/policy: Return NODATA on *. action in rpz fileLukáš Ježek2020-04-141-0/+0
|
* tests: revert broken commits in Deckard repoPetr Špaček2020-04-021-0/+0
| | | | I don't know why exactly it fails ... let's unblock release.
* deckard: abort if sendmmsg/recvmmsg are in usePetr Špaček2020-03-311-0/+0
| | | | | | Deckard does not support these and it leads to confusing errors. In long term we need to migrate Deckard to different network backend: https://gitlab.labs.nic.cz/knot/deckard/issues/42
* treewide: machine readable license for all the restPetr Špaček2020-02-252-0/+2
| | | | | These files did not have GNU GPL v3 boilderplate in them so I've added machine readable tag with appropriate license.
* lua net.list(): change output and docsVladimír Čunát2019-04-181-0/+0
| | | | Now we hopefully won't need to touch it for a long time.
* trust_anchors: update Deckard to take ta_update module into accountPetr Špaček2019-04-041-0/+0
|
* trust_anchors: do not accept add_file() for managed TA without ta_update modulePetr Špaček2019-04-041-0/+0
| | | | | Previous version would add the TA and then print error message, which is not expected.
* WIP: test/integration: update deckardTomas Krizek2019-04-041-0/+0
|
* tests/integration: update kresd config for deckardTomas Krizek2019-04-041-56/+0
|
* tests: adapt to change of net.list() outputVladimír Čunát2019-03-122-1/+1
|
* tests/integration: turn off python3 deprecation warnings (jinja2)Tomas Krizek2019-03-121-0/+2
|
* meson: tests/integration - turn off DNSSEC, add additional testsTomas Krizek2019-03-122-1/+3
|
* meson: use sbin_dir variableTomas Krizek2019-03-121-1/+1
|
* meson: cleanupTomas Krizek2019-03-121-0/+2
|
* meson: tests/integration run all test suitesTomas Krizek2019-03-121-22/+57
|
* meson: tests/pytests - add extra_tests build optionTomas Krizek2019-03-121-27/+32
|
* meson: tests/integration - prepare scriptTomas Krizek2019-03-121-0/+30
|
* tests/integration: move related filesTomas Krizek2019-03-1235-0/+7715
|
* test/integration: move deckard submoduleTomas Krizek2019-03-121-0/+0