summaryrefslogtreecommitdiff
path: root/test/networkd-test.py
diff options
context:
space:
mode:
authorMartin Pitt <martin@piware.de>2019-02-21 12:24:16 +0100
committerMartin Pitt <martin@piware.de>2019-02-21 12:37:06 +0100
commit6592c9c850675fb20236271efc4f65acbe3bfa00 (patch)
tree856ae91d066077ad54df3519cc976f5cb2524e99 /test/networkd-test.py
parent528a74a1ad25fe8524b48d0c0a8919bc0fe5cefa (diff)
downloadsystemd-6592c9c850675fb20236271efc4f65acbe3bfa00.tar.gz
networkd-test: disable DNSSEC in domain-restricted DNS test
dnsmasq 2.80 changed behaviour when being queried by resolved with enabled DNSSEC: It returns errors for SOA and DS queries which cause the entire query to fail. As we don't configure DNSSEC in this test anyway, just disable it so that we retain compatibility with old and new dnsmasq versions.
Diffstat (limited to 'test/networkd-test.py')
-rwxr-xr-xtest/networkd-test.py7
1 files changed, 7 insertions, 0 deletions
diff --git a/test/networkd-test.py b/test/networkd-test.py
index 7011abc965..71ee06f279 100755
--- a/test/networkd-test.py
+++ b/test/networkd-test.py
@@ -575,6 +575,13 @@ class DnsmasqClientTest(ClientTestBase, unittest.TestCase):
def test_resolved_domain_restricted_dns(self):
'''resolved: domain-restricted DNS servers'''
+ # FIXME: resolvectl query fails with enabled DNSSEC against our dnsmasq
+ conf = '/run/systemd/resolved.conf.d/test-disable-dnssec.conf'
+ os.makedirs(os.path.dirname(conf), exist_ok=True)
+ with open(conf, 'w') as f:
+ f.write('[Resolve]\nDNSSEC=no\n')
+ self.addCleanup(os.remove, conf)
+
# create interface for generic connections; this will map all DNS names
# to 192.168.42.1
self.create_iface(dnsmasq_opts=['--address=/#/192.168.42.1'])