mirror of
				https://github.com/coredns/coredns.git
				synced 2025-10-31 10:13:14 -04:00 
			
		
		
		
	Another thing we can test automatically, we sorta settled on using an uppercase letter in in t.Log and t.Fatal calls. Let's just check for this.
		
			
				
	
	
		
			83 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			83 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package dnssec
 | |
| 
 | |
| import (
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/coredns/coredns/plugin/pkg/cache"
 | |
| 	"github.com/coredns/coredns/plugin/test"
 | |
| 	"github.com/coredns/coredns/request"
 | |
| )
 | |
| 
 | |
| func TestCacheSet(t *testing.T) {
 | |
| 	fPriv, rmPriv, _ := test.TempFile(".", privKey)
 | |
| 	fPub, rmPub, _ := test.TempFile(".", pubKey)
 | |
| 	defer rmPriv()
 | |
| 	defer rmPub()
 | |
| 
 | |
| 	dnskey, err := ParseKeyFile(fPub, fPriv)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failed to parse key: %v\n", err)
 | |
| 	}
 | |
| 
 | |
| 	c := cache.New(defaultCap)
 | |
| 	m := testMsg()
 | |
| 	state := request.Request{Req: m, Zone: "miek.nl."}
 | |
| 	k := hash(m.Answer) // calculate *before* we add the sig
 | |
| 	d := New([]string{"miek.nl."}, []*DNSKEY{dnskey}, nil, c)
 | |
| 	d.Sign(state, time.Now().UTC(), server)
 | |
| 
 | |
| 	_, ok := d.get(k, server)
 | |
| 	if !ok {
 | |
| 		t.Errorf("Signature was not added to the cache")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestCacheNotValidExpired(t *testing.T) {
 | |
| 	fPriv, rmPriv, _ := test.TempFile(".", privKey)
 | |
| 	fPub, rmPub, _ := test.TempFile(".", pubKey)
 | |
| 	defer rmPriv()
 | |
| 	defer rmPub()
 | |
| 
 | |
| 	dnskey, err := ParseKeyFile(fPub, fPriv)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failed to parse key: %v\n", err)
 | |
| 	}
 | |
| 
 | |
| 	c := cache.New(defaultCap)
 | |
| 	m := testMsg()
 | |
| 	state := request.Request{Req: m, Zone: "miek.nl."}
 | |
| 	k := hash(m.Answer) // calculate *before* we add the sig
 | |
| 	d := New([]string{"miek.nl."}, []*DNSKEY{dnskey}, nil, c)
 | |
| 	d.Sign(state, time.Now().UTC().AddDate(0, 0, -9), server)
 | |
| 
 | |
| 	_, ok := d.get(k, server)
 | |
| 	if ok {
 | |
| 		t.Errorf("Signature was added to the cache even though not valid")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestCacheNotValidYet(t *testing.T) {
 | |
| 	fPriv, rmPriv, _ := test.TempFile(".", privKey)
 | |
| 	fPub, rmPub, _ := test.TempFile(".", pubKey)
 | |
| 	defer rmPriv()
 | |
| 	defer rmPub()
 | |
| 
 | |
| 	dnskey, err := ParseKeyFile(fPub, fPriv)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Failed to parse key: %v\n", err)
 | |
| 	}
 | |
| 
 | |
| 	c := cache.New(defaultCap)
 | |
| 	m := testMsg()
 | |
| 	state := request.Request{Req: m, Zone: "miek.nl."}
 | |
| 	k := hash(m.Answer) // calculate *before* we add the sig
 | |
| 	d := New([]string{"miek.nl."}, []*DNSKEY{dnskey}, nil, c)
 | |
| 	d.Sign(state, time.Now().UTC().AddDate(0, 0, +9), server)
 | |
| 
 | |
| 	_, ok := d.get(k, server)
 | |
| 	if ok {
 | |
| 		t.Errorf("Signature was added to the cache even though not valid yet")
 | |
| 	}
 | |
| }
 |