|
|
@ -11,9 +11,9 @@ from octodns.record import ARecord, AaaaRecord, AliasRecord, CaaRecord, \ |
|
|
CaaValue, CnameRecord, DnameRecord, Create, Delete, GeoValue, LocRecord, \ |
|
|
CaaValue, CnameRecord, DnameRecord, Create, Delete, GeoValue, LocRecord, \ |
|
|
LocValue, MxRecord, MxValue, NaptrRecord, NaptrValue, NsRecord, \ |
|
|
LocValue, MxRecord, MxValue, NaptrRecord, NaptrValue, NsRecord, \ |
|
|
PtrRecord, Record, RecordException, SshfpRecord, SshfpValue, SpfRecord, \ |
|
|
PtrRecord, Record, RecordException, SshfpRecord, SshfpValue, SpfRecord, \ |
|
|
SrvRecord, SrvValue, TxtRecord, Update, UrlfwdRecord, UrlfwdValue, \ |
|
|
|
|
|
ValidationError, _Dynamic, _DynamicPool, _DynamicRule, _NsValue, \ |
|
|
|
|
|
ValuesMixin |
|
|
|
|
|
|
|
|
SrvRecord, SrvValue, TlsaRecord, TxtRecord, Update, UrlfwdRecord, \ |
|
|
|
|
|
UrlfwdValue, ValidationError, _Dynamic, _DynamicPool, _DynamicRule, \ |
|
|
|
|
|
_NsValue, ValuesMixin |
|
|
from octodns.zone import Zone |
|
|
from octodns.zone import Zone |
|
|
|
|
|
|
|
|
from helpers import DynamicProvider, GeoProvider, SimpleProvider |
|
|
from helpers import DynamicProvider, GeoProvider, SimpleProvider |
|
|
@ -907,6 +907,89 @@ class TestRecord(TestCase): |
|
|
# __repr__ doesn't blow up |
|
|
# __repr__ doesn't blow up |
|
|
a.__repr__() |
|
|
a.__repr__() |
|
|
|
|
|
|
|
|
|
|
|
def test_tlsa(self): |
|
|
|
|
|
a_values = [{ |
|
|
|
|
|
'certificate_usage': 1, |
|
|
|
|
|
'selector': 1, |
|
|
|
|
|
'matching_type': 1, |
|
|
|
|
|
'certificate_association_data': 'ABABABABABABABABAB', |
|
|
|
|
|
}, { |
|
|
|
|
|
'certificate_usage': 2, |
|
|
|
|
|
'selector': 0, |
|
|
|
|
|
'matching_type': 2, |
|
|
|
|
|
'certificate_association_data': 'ABABABABABABABABAC', |
|
|
|
|
|
}] |
|
|
|
|
|
a_data = {'ttl': 30, 'values': a_values} |
|
|
|
|
|
a = TlsaRecord(self.zone, 'a', a_data) |
|
|
|
|
|
self.assertEqual('a.unit.tests.', a.fqdn) |
|
|
|
|
|
self.assertEqual('a', a.name) |
|
|
|
|
|
self.assertEqual(30, a.ttl) |
|
|
|
|
|
self.assertEqual(a_values[0]['certificate_usage'], |
|
|
|
|
|
a.values[0].certificate_usage) |
|
|
|
|
|
self.assertEqual(a_values[0]['selector'], a.values[0].selector) |
|
|
|
|
|
self.assertEqual(a_values[0]['matching_type'], |
|
|
|
|
|
a.values[0].matching_type) |
|
|
|
|
|
self.assertEqual(a_values[0]['certificate_association_data'], |
|
|
|
|
|
a.values[0].certificate_association_data) |
|
|
|
|
|
|
|
|
|
|
|
self.assertEqual(a_values[1]['certificate_usage'], |
|
|
|
|
|
a.values[1].certificate_usage) |
|
|
|
|
|
self.assertEqual(a_values[1]['selector'], |
|
|
|
|
|
a.values[1].selector) |
|
|
|
|
|
self.assertEqual(a_values[1]['matching_type'], |
|
|
|
|
|
a.values[1].matching_type) |
|
|
|
|
|
self.assertEqual(a_values[1]['certificate_association_data'], |
|
|
|
|
|
a.values[1].certificate_association_data) |
|
|
|
|
|
self.assertEqual(a_data, a.data) |
|
|
|
|
|
|
|
|
|
|
|
b_value = { |
|
|
|
|
|
'certificate_usage': 0, |
|
|
|
|
|
'selector': 0, |
|
|
|
|
|
'matching_type': 0, |
|
|
|
|
|
'certificate_association_data': 'AAAAAAAAAAAAAAA', |
|
|
|
|
|
} |
|
|
|
|
|
b_data = {'ttl': 30, 'value': b_value} |
|
|
|
|
|
b = TlsaRecord(self.zone, 'b', b_data) |
|
|
|
|
|
self.assertEqual(b_value['certificate_usage'], |
|
|
|
|
|
b.values[0].certificate_usage) |
|
|
|
|
|
self.assertEqual(b_value['selector'], b.values[0].selector) |
|
|
|
|
|
self.assertEqual(b_value['matching_type'], |
|
|
|
|
|
b.values[0].matching_type) |
|
|
|
|
|
self.assertEqual(b_value['certificate_association_data'], |
|
|
|
|
|
b.values[0].certificate_association_data) |
|
|
|
|
|
self.assertEqual(b_data, b.data) |
|
|
|
|
|
|
|
|
|
|
|
target = SimpleProvider() |
|
|
|
|
|
# No changes with self |
|
|
|
|
|
self.assertFalse(a.changes(a, target)) |
|
|
|
|
|
# Diff in certificate_usage causes change |
|
|
|
|
|
other = TlsaRecord(self.zone, 'a', {'ttl': 30, 'values': a_values}) |
|
|
|
|
|
other.values[0].certificate_usage = 0 |
|
|
|
|
|
change = a.changes(other, target) |
|
|
|
|
|
self.assertEqual(change.existing, a) |
|
|
|
|
|
self.assertEqual(change.new, other) |
|
|
|
|
|
# Diff in selector causes change |
|
|
|
|
|
other = TlsaRecord(self.zone, 'a', {'ttl': 30, 'values': a_values}) |
|
|
|
|
|
other.values[0].selector = 0 |
|
|
|
|
|
change = a.changes(other, target) |
|
|
|
|
|
self.assertEqual(change.existing, a) |
|
|
|
|
|
self.assertEqual(change.new, other) |
|
|
|
|
|
# Diff in matching_type causes change |
|
|
|
|
|
other = TlsaRecord(self.zone, 'a', {'ttl': 30, 'values': a_values}) |
|
|
|
|
|
other.values[0].matching_type = 0 |
|
|
|
|
|
change = a.changes(other, target) |
|
|
|
|
|
self.assertEqual(change.existing, a) |
|
|
|
|
|
self.assertEqual(change.new, other) |
|
|
|
|
|
# Diff in certificate_association_data causes change |
|
|
|
|
|
other = TlsaRecord(self.zone, 'a', {'ttl': 30, 'values': a_values}) |
|
|
|
|
|
other.values[0].certificate_association_data = 'AAAAAAAAAAAAA' |
|
|
|
|
|
change = a.changes(other, target) |
|
|
|
|
|
self.assertEqual(change.existing, a) |
|
|
|
|
|
self.assertEqual(change.new, other) |
|
|
|
|
|
|
|
|
|
|
|
# __repr__ doesn't blow up |
|
|
|
|
|
a.__repr__() |
|
|
|
|
|
|
|
|
def test_txt(self): |
|
|
def test_txt(self): |
|
|
a_values = ['a one', 'a two'] |
|
|
a_values = ['a one', 'a two'] |
|
|
b_value = 'b other' |
|
|
b_value = 'b other' |
|
|
@ -3187,6 +3270,190 @@ class TestRecordValidation(TestCase): |
|
|
self.assertEqual(['Invalid SRV target "100 foo.bar.com." is not a ' |
|
|
self.assertEqual(['Invalid SRV target "100 foo.bar.com." is not a ' |
|
|
'valid FQDN.'], ctx.exception.reasons) |
|
|
'valid FQDN.'], ctx.exception.reasons) |
|
|
|
|
|
|
|
|
|
|
|
def test_TLSA(self): |
|
|
|
|
|
# doesn't blow up |
|
|
|
|
|
Record.new(self.zone, '', { |
|
|
|
|
|
'type': 'TLSA', |
|
|
|
|
|
'ttl': 600, |
|
|
|
|
|
'value': { |
|
|
|
|
|
'certificate_usage': 0, |
|
|
|
|
|
'selector': 0, |
|
|
|
|
|
'matching_type': 0, |
|
|
|
|
|
'certificate_association_data': 'AAAAAAAAAAAAA' |
|
|
|
|
|
} |
|
|
|
|
|
}) |
|
|
|
|
|
# Multi value, second missing certificate usage |
|
|
|
|
|
with self.assertRaises(ValidationError) as ctx: |
|
|
|
|
|
Record.new(self.zone, '', { |
|
|
|
|
|
'type': 'TLSA', |
|
|
|
|
|
'ttl': 600, |
|
|
|
|
|
'values': [{ |
|
|
|
|
|
'certificate_usage': 0, |
|
|
|
|
|
'selector': 0, |
|
|
|
|
|
'matching_type': 0, |
|
|
|
|
|
'certificate_association_data': 'AAAAAAAAAAAAA' |
|
|
|
|
|
}, { |
|
|
|
|
|
'selector': 0, |
|
|
|
|
|
'matching_type': 0, |
|
|
|
|
|
'certificate_association_data': 'AAAAAAAAAAAAA' |
|
|
|
|
|
} |
|
|
|
|
|
] |
|
|
|
|
|
}) |
|
|
|
|
|
self.assertEqual(['missing certificate_usage'], |
|
|
|
|
|
ctx.exception.reasons) |
|
|
|
|
|
|
|
|
|
|
|
# missing certificate_association_data |
|
|
|
|
|
with self.assertRaises(ValidationError) as ctx: |
|
|
|
|
|
Record.new(self.zone, '', { |
|
|
|
|
|
'type': 'TLSA', |
|
|
|
|
|
'ttl': 600, |
|
|
|
|
|
'value': { |
|
|
|
|
|
'certificate_usage': 0, |
|
|
|
|
|
'selector': 0, |
|
|
|
|
|
'matching_type': 0 |
|
|
|
|
|
} |
|
|
|
|
|
}) |
|
|
|
|
|
self.assertEqual(['missing certificate_association_data'], |
|
|
|
|
|
ctx.exception.reasons) |
|
|
|
|
|
|
|
|
|
|
|
# missing certificate_usage |
|
|
|
|
|
with self.assertRaises(ValidationError) as ctx: |
|
|
|
|
|
Record.new(self.zone, '', { |
|
|
|
|
|
'type': 'TLSA', |
|
|
|
|
|
'ttl': 600, |
|
|
|
|
|
'value': { |
|
|
|
|
|
'selector': 0, |
|
|
|
|
|
'matching_type': 0, |
|
|
|
|
|
'certificate_association_data': 'AAAAAAAAAAAAA' |
|
|
|
|
|
} |
|
|
|
|
|
}) |
|
|
|
|
|
self.assertEqual(['missing certificate_usage'], |
|
|
|
|
|
ctx.exception.reasons) |
|
|
|
|
|
|
|
|
|
|
|
# False certificate_usage |
|
|
|
|
|
with self.assertRaises(ValidationError) as ctx: |
|
|
|
|
|
Record.new(self.zone, '', { |
|
|
|
|
|
'type': 'TLSA', |
|
|
|
|
|
'ttl': 600, |
|
|
|
|
|
'value': { |
|
|
|
|
|
'certificate_usage': 4, |
|
|
|
|
|
'selector': 0, |
|
|
|
|
|
'matching_type': 0, |
|
|
|
|
|
'certificate_association_data': 'AAAAAAAAAAAAA' |
|
|
|
|
|
} |
|
|
|
|
|
}) |
|
|
|
|
|
self.assertEqual('invalid certificate_usage ' |
|
|
|
|
|
'"{value["certificate_usage"]}"', |
|
|
|
|
|
ctx.exception.reasons) |
|
|
|
|
|
|
|
|
|
|
|
# Invalid certificate_usage |
|
|
|
|
|
with self.assertRaises(ValidationError) as ctx: |
|
|
|
|
|
Record.new(self.zone, '', { |
|
|
|
|
|
'type': 'TLSA', |
|
|
|
|
|
'ttl': 600, |
|
|
|
|
|
'value': { |
|
|
|
|
|
'certificate_usage': 'XYZ', |
|
|
|
|
|
'selector': 0, |
|
|
|
|
|
'matching_type': 0, |
|
|
|
|
|
'certificate_association_data': 'AAAAAAAAAAAAA' |
|
|
|
|
|
} |
|
|
|
|
|
}) |
|
|
|
|
|
self.assertEqual('invalid certificate_usage ' |
|
|
|
|
|
'"{value["certificate_usage"]}"', |
|
|
|
|
|
ctx.exception.reasons) |
|
|
|
|
|
|
|
|
|
|
|
# missing selector |
|
|
|
|
|
with self.assertRaises(ValidationError) as ctx: |
|
|
|
|
|
Record.new(self.zone, '', { |
|
|
|
|
|
'type': 'TLSA', |
|
|
|
|
|
'ttl': 600, |
|
|
|
|
|
'value': { |
|
|
|
|
|
'certificate_usage': 0, |
|
|
|
|
|
'matching_type': 0, |
|
|
|
|
|
'certificate_association_data': 'AAAAAAAAAAAAA' |
|
|
|
|
|
} |
|
|
|
|
|
}) |
|
|
|
|
|
self.assertEqual(['missing selector'], |
|
|
|
|
|
ctx.exception.reasons) |
|
|
|
|
|
|
|
|
|
|
|
# False selector |
|
|
|
|
|
with self.assertRaises(ValidationError) as ctx: |
|
|
|
|
|
Record.new(self.zone, '', { |
|
|
|
|
|
'type': 'TLSA', |
|
|
|
|
|
'ttl': 600, |
|
|
|
|
|
'value': { |
|
|
|
|
|
'certificate_usage': 0, |
|
|
|
|
|
'selector': 4, |
|
|
|
|
|
'matching_type': 0, |
|
|
|
|
|
'certificate_association_data': 'AAAAAAAAAAAAA' |
|
|
|
|
|
} |
|
|
|
|
|
}) |
|
|
|
|
|
self.assertEqual('invalid selector ' |
|
|
|
|
|
'"{value["selector"]}"', |
|
|
|
|
|
ctx.exception.reasons) |
|
|
|
|
|
|
|
|
|
|
|
# Invalid selector |
|
|
|
|
|
with self.assertRaises(ValidationError) as ctx: |
|
|
|
|
|
Record.new(self.zone, '', { |
|
|
|
|
|
'type': 'TLSA', |
|
|
|
|
|
'ttl': 600, |
|
|
|
|
|
'value': { |
|
|
|
|
|
'certificate_usage': 0, |
|
|
|
|
|
'selector': 'XYZ', |
|
|
|
|
|
'matching_type': 0, |
|
|
|
|
|
'certificate_association_data': 'AAAAAAAAAAAAA' |
|
|
|
|
|
} |
|
|
|
|
|
}) |
|
|
|
|
|
self.assertEqual('invalid selector ' |
|
|
|
|
|
'"{value["selector"]}"', |
|
|
|
|
|
ctx.exception.reasons) |
|
|
|
|
|
|
|
|
|
|
|
# missing matching_type |
|
|
|
|
|
with self.assertRaises(ValidationError) as ctx: |
|
|
|
|
|
Record.new(self.zone, '', { |
|
|
|
|
|
'type': 'TLSA', |
|
|
|
|
|
'ttl': 600, |
|
|
|
|
|
'value': { |
|
|
|
|
|
'certificate_usage': 0, |
|
|
|
|
|
'selector': 0, |
|
|
|
|
|
'certificate_association_data': 'AAAAAAAAAAAAA' |
|
|
|
|
|
} |
|
|
|
|
|
}) |
|
|
|
|
|
self.assertEqual(['missing matching_type'], |
|
|
|
|
|
ctx.exception.reasons) |
|
|
|
|
|
|
|
|
|
|
|
# False matching_type |
|
|
|
|
|
with self.assertRaises(ValidationError) as ctx: |
|
|
|
|
|
Record.new(self.zone, '', { |
|
|
|
|
|
'type': 'TLSA', |
|
|
|
|
|
'ttl': 600, |
|
|
|
|
|
'value': { |
|
|
|
|
|
'certificate_usage': 0, |
|
|
|
|
|
'selector': 1, |
|
|
|
|
|
'matching_type': 3, |
|
|
|
|
|
'certificate_association_data': 'AAAAAAAAAAAAA' |
|
|
|
|
|
} |
|
|
|
|
|
}) |
|
|
|
|
|
self.assertEqual('invalid matching_type ' |
|
|
|
|
|
'"{value["matching_type"]}"', |
|
|
|
|
|
ctx.exception.reasons) |
|
|
|
|
|
|
|
|
|
|
|
# Invalid matching_type |
|
|
|
|
|
with self.assertRaises(ValidationError) as ctx: |
|
|
|
|
|
Record.new(self.zone, '', { |
|
|
|
|
|
'type': 'TLSA', |
|
|
|
|
|
'ttl': 600, |
|
|
|
|
|
'value': { |
|
|
|
|
|
'certificate_usage': 0, |
|
|
|
|
|
'selector': 1, |
|
|
|
|
|
'matching_type': 'XYZ', |
|
|
|
|
|
'certificate_association_data': 'AAAAAAAAAAAAA' |
|
|
|
|
|
} |
|
|
|
|
|
}) |
|
|
|
|
|
self.assertEqual('invalid matching_type ' |
|
|
|
|
|
'"{value["matching_type"]}"', |
|
|
|
|
|
ctx.exception.reasons) |
|
|
|
|
|
|
|
|
def test_TXT(self): |
|
|
def test_TXT(self): |
|
|
# doesn't blow up (name & zone here don't make any sense, but not |
|
|
# doesn't blow up (name & zone here don't make any sense, but not |
|
|
# important) |
|
|
# important) |
|
|
|