Browse Source

Unskip tests, duckdns is working again

pull/881/head
Tim Kimber 6 months ago
parent
commit
4d5ae9b76a
No known key found for this signature in database GPG Key ID: 3E1804964E76BD18
2 changed files with 7 additions and 15 deletions
  1. +3
    -8
      test/u1-test-get_auth_dns-dig.bats
  2. +4
    -7
      test/u2-test-get_auth_dns-drill.bats

+ 3
- 8
test/u1-test-get_auth_dns-dig.bats View File

@ -64,7 +64,7 @@ teardown() {
# Assert that we had to use dig NS
assert_line --regexp 'Using dig.* NS'
# Check all Authoritive DNS servers are returned if requested
# Check all Authoritative DNS servers are returned if requested
CHECK_ALL_AUTH_DNS=true
run get_auth_dns ubuntu-getssl.ignorelist.com
assert_output --regexp 'set primary_ns = (ns[1-3]+\.afraid\.org ?)+'
@ -72,11 +72,6 @@ teardown() {
@test "Check get_auth_dns using dig SOA" {
# FIXME: stopped working Jun-2025 and don't have time to investigate why
skip
# Test that get_auth_dns() handles scenario where SOA query returns Authority section
#
# ************** EXAMPLE DIG OUTPUT **************
@ -98,7 +93,7 @@ teardown() {
assert_line --regexp 'Using dig.* SOA'
refute_line --regexp 'Using dig.* NS'
# Check all Authoritive DNS servers are returned if requested
# Check all Authoritative DNS servers are returned if requested
CHECK_ALL_AUTH_DNS=true
run get_auth_dns ubuntu-getssl.duckdns.org
assert_output --regexp 'set primary_ns = (ns[1-9]+\.duckdns\.org )+'
@ -134,7 +129,7 @@ teardown() {
assert_line --regexp 'Using dig.* CNAME'
assert_line --regexp 'Using dig.* NS'
# Check all Authoritive DNS servers are returned if requested
# Check all Authoritative DNS servers are returned if requested
CHECK_ALL_AUTH_DNS=true
run get_auth_dns www.duckdns.org
assert_output --regexp 'set primary_ns = ns.*\.awsdns.*\.net'


+ 4
- 7
test/u2-test-get_auth_dns-drill.bats View File

@ -70,7 +70,7 @@ teardown() {
# Assert that we had to use drill NS
assert_line --regexp 'Using drill.* NS'
# Check all Authoritive DNS servers are returned if requested
# Check all Authoritative DNS servers are returned if requested
CHECK_ALL_AUTH_DNS=true
run get_auth_dns ubuntu-getssl.ignorelist.com
assert_output --regexp 'set primary_ns = (ns[1-4]+\.afraid\.org ?)+'
@ -78,9 +78,6 @@ teardown() {
@test "Check get_auth_dns using drill SOA" {
# FIXME: stopped working Jun-2025 and don't have time to investigate why
skip
if [ ! -f /usr/bin/drill ]; then
# Can't find drill package for centos8
skip "Drill not installed on this system"
@ -107,7 +104,7 @@ teardown() {
assert_line --regexp 'Using drill.* SOA'
refute_line --regexp 'Using drill.* NS'
# Check all Authoritive DNS servers are returned if requested
# Check all Authoritative DNS servers are returned if requested
CHECK_ALL_AUTH_DNS=true
run get_auth_dns ubuntu-getssl.duckdns.org
assert_output --regexp 'set primary_ns = (ns[1-9]+\.duckdns\.org )+'
@ -149,8 +146,8 @@ teardown() {
assert_line --regexp 'Using drill.* CNAME'
assert_line --regexp 'Using drill.* NS'
# Check all Authoritive DNS servers are returned if requested
echo "# Checking all authoritive DNS servers are returned if requested"
# Check all Authoritative DNS servers are returned if requested
echo "# Checking all authoritative DNS servers are returned if requested"
CHECK_ALL_AUTH_DNS=true
run get_auth_dns www.duckdns.org
assert_output --regexp 'set primary_ns = ns.*\.awsdns.*\.net'


Loading…
Cancel
Save