diff options
author | Michael Biebl <biebl@debian.org> | 2021-10-01 01:00:28 +0200 |
---|---|---|
committer | Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> | 2021-10-12 18:02:04 +0200 |
commit | 99e6112ebb20d4e2c39a379eafdb8e88317677b2 (patch) | |
tree | d7b213639fd71a4064d7701087c04a153617fe77 | |
parent | ccab691c0bd035adaed548812dd06cdb91043e63 (diff) | |
download | systemd-99e6112ebb20d4e2c39a379eafdb8e88317677b2.tar.gz |
networkd-test: fix resolved_domain_restricted_dns
megasearch.net was meant to be a non-existing bogus domain, and had been
for a long time. But it seems some domain grabber recently registered
it, and it's an actual thing now:
$ host megasearch.net
megasearch.net has address 207.148.248.143
This causes the test to fail randomly.
Use search.example.com instead which yields
$ host search.example.com
Host search.example.com not found: 3(NXDOMAIN)
Fixes: #18357
(cherry picked from commit 528dd6a42389fcf4aa490c0fa0d858772e930d13)
(cherry picked from commit 974f94103908fd7f3221fb4e6fe9a590c35fc6f2)
-rwxr-xr-x | test/networkd-test.py | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/test/networkd-test.py b/test/networkd-test.py index 726cc2e0e1..3982d6dda2 100755 --- a/test/networkd-test.py +++ b/test/networkd-test.py @@ -625,7 +625,7 @@ Name={} [Network] DHCP=ipv4 IPv6AcceptRA=False -DNSSECNegativeTrustAnchors=megasearch.net +DNSSECNegativeTrustAnchors=search.example.com '''.format(self.iface)) # create second device/dnsmasq for a .company/.lab VPN interface @@ -671,8 +671,8 @@ DNSSECNegativeTrustAnchors=company lab self.assertIn(b'kettle.cantina.company: 10.241.4.4', out) # test general domains - out = subprocess.check_output(['resolvectl', 'query', 'megasearch.net']) - self.assertIn(b'megasearch.net: 192.168.42.1', out) + out = subprocess.check_output(['resolvectl', 'query', 'search.example.com']) + self.assertIn(b'search.example.com: 192.168.42.1', out) with open(self.dnsmasq_log) as f: general_log = f.read() @@ -686,8 +686,8 @@ DNSSECNegativeTrustAnchors=company lab self.assertNotIn('.company', general_log) # general domains should not be sent to the VPN DNS - self.assertRegex(general_log, 'query.*megasearch.net') - self.assertNotIn('megasearch.net', vpn_log) + self.assertRegex(general_log, 'query.*search.example.com') + self.assertNotIn('search.example.com', vpn_log) def test_resolved_etc_hosts(self): '''resolved queries to /etc/hosts''' |