2019-11-05 15:02:01 +00:00
|
|
|
import ./make-test-python.nix ({ pkgs, lib, ...} :
|
2019-03-13 00:12:56 +00:00
|
|
|
let
|
|
|
|
common = {
|
|
|
|
networking.firewall.enable = false;
|
|
|
|
networking.useDHCP = false;
|
|
|
|
};
|
|
|
|
exampleZone = pkgs.writeTextDir "example.com.zone" ''
|
|
|
|
@ SOA ns.example.com. noc.example.com. 2019031301 86400 7200 3600000 172800
|
|
|
|
@ NS ns1
|
|
|
|
@ NS ns2
|
|
|
|
ns1 A 192.168.0.1
|
|
|
|
ns1 AAAA fd00::1
|
|
|
|
ns2 A 192.168.0.2
|
|
|
|
ns2 AAAA fd00::2
|
|
|
|
www A 192.0.2.1
|
|
|
|
www AAAA 2001:DB8::1
|
|
|
|
sub NS ns.example.com.
|
|
|
|
'';
|
|
|
|
delegatedZone = pkgs.writeTextDir "sub.example.com.zone" ''
|
|
|
|
@ SOA ns.example.com. noc.example.com. 2019031301 86400 7200 3600000 172800
|
|
|
|
@ NS ns1.example.com.
|
|
|
|
@ NS ns2.example.com.
|
|
|
|
@ A 192.0.2.2
|
|
|
|
@ AAAA 2001:DB8::2
|
|
|
|
'';
|
|
|
|
|
|
|
|
knotZonesEnv = pkgs.buildEnv {
|
|
|
|
name = "knot-zones";
|
|
|
|
paths = [ exampleZone delegatedZone ];
|
|
|
|
};
|
2020-02-12 16:35:33 +00:00
|
|
|
# DO NOT USE pkgs.writeText IN PRODUCTION. This put secrets in the nix store!
|
|
|
|
tsigFile = pkgs.writeText "tsig.conf" ''
|
|
|
|
key:
|
2023-02-25 01:41:25 +00:00
|
|
|
- id: xfr_key
|
2020-02-12 16:35:33 +00:00
|
|
|
algorithm: hmac-sha256
|
|
|
|
secret: zOYgOgnzx3TGe5J5I/0kxd7gTcxXhLYMEq3Ek3fY37s=
|
|
|
|
'';
|
2019-03-13 00:12:56 +00:00
|
|
|
in {
|
|
|
|
name = "knot";
|
2021-01-10 19:08:30 +00:00
|
|
|
meta = with pkgs.lib.maintainers; {
|
2019-11-05 15:03:21 +00:00
|
|
|
maintainers = [ hexa ];
|
|
|
|
};
|
|
|
|
|
2019-03-13 00:12:56 +00:00
|
|
|
|
|
|
|
nodes = {
|
2023-02-25 01:47:52 +00:00
|
|
|
primary = { lib, ... }: {
|
2019-03-13 00:12:56 +00:00
|
|
|
imports = [ common ];
|
2021-12-04 13:00:40 +00:00
|
|
|
|
|
|
|
# trigger sched_setaffinity syscall
|
|
|
|
virtualisation.cores = 2;
|
|
|
|
|
2019-03-13 00:12:56 +00:00
|
|
|
networking.interfaces.eth1 = {
|
|
|
|
ipv4.addresses = lib.mkForce [
|
|
|
|
{ address = "192.168.0.1"; prefixLength = 24; }
|
|
|
|
];
|
|
|
|
ipv6.addresses = lib.mkForce [
|
|
|
|
{ address = "fd00::1"; prefixLength = 64; }
|
|
|
|
];
|
|
|
|
};
|
|
|
|
services.knot.enable = true;
|
|
|
|
services.knot.extraArgs = [ "-v" ];
|
2020-02-12 16:35:33 +00:00
|
|
|
services.knot.keyFiles = [ tsigFile ];
|
2019-03-13 00:12:56 +00:00
|
|
|
services.knot.extraConfig = ''
|
|
|
|
server:
|
|
|
|
listen: 0.0.0.0@53
|
|
|
|
listen: ::@53
|
2023-02-25 01:41:25 +00:00
|
|
|
automatic-acl: true
|
2019-03-13 00:12:56 +00:00
|
|
|
|
|
|
|
remote:
|
2023-02-25 01:47:52 +00:00
|
|
|
- id: secondary
|
2019-03-13 00:12:56 +00:00
|
|
|
address: 192.168.0.2@53
|
2023-02-25 01:41:25 +00:00
|
|
|
key: xfr_key
|
2019-03-13 00:12:56 +00:00
|
|
|
|
|
|
|
template:
|
|
|
|
- id: default
|
|
|
|
storage: ${knotZonesEnv}
|
2023-02-25 01:47:52 +00:00
|
|
|
notify: [secondary]
|
2019-03-13 00:12:56 +00:00
|
|
|
dnssec-signing: on
|
|
|
|
# Input-only zone files
|
|
|
|
# https://www.knot-dns.cz/docs/2.8/html/operation.html#example-3
|
|
|
|
# prevents modification of the zonefiles, since the zonefiles are immutable
|
|
|
|
zonefile-sync: -1
|
|
|
|
zonefile-load: difference
|
|
|
|
journal-content: changes
|
|
|
|
# move databases below the state directory, because they need to be writable
|
|
|
|
journal-db: /var/lib/knot/journal
|
|
|
|
kasp-db: /var/lib/knot/kasp
|
|
|
|
timer-db: /var/lib/knot/timer
|
|
|
|
|
|
|
|
zone:
|
|
|
|
- domain: example.com
|
|
|
|
file: example.com.zone
|
|
|
|
|
|
|
|
- domain: sub.example.com
|
|
|
|
file: sub.example.com.zone
|
|
|
|
|
|
|
|
log:
|
|
|
|
- target: syslog
|
|
|
|
any: info
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2023-02-25 01:47:52 +00:00
|
|
|
secondary = { lib, ... }: {
|
2019-03-13 00:12:56 +00:00
|
|
|
imports = [ common ];
|
|
|
|
networking.interfaces.eth1 = {
|
|
|
|
ipv4.addresses = lib.mkForce [
|
|
|
|
{ address = "192.168.0.2"; prefixLength = 24; }
|
|
|
|
];
|
|
|
|
ipv6.addresses = lib.mkForce [
|
|
|
|
{ address = "fd00::2"; prefixLength = 64; }
|
|
|
|
];
|
|
|
|
};
|
|
|
|
services.knot.enable = true;
|
2020-02-12 16:35:33 +00:00
|
|
|
services.knot.keyFiles = [ tsigFile ];
|
2019-03-13 00:12:56 +00:00
|
|
|
services.knot.extraArgs = [ "-v" ];
|
|
|
|
services.knot.extraConfig = ''
|
|
|
|
server:
|
|
|
|
listen: 0.0.0.0@53
|
|
|
|
listen: ::@53
|
2023-02-25 01:41:25 +00:00
|
|
|
automatic-acl: true
|
2019-03-13 00:12:56 +00:00
|
|
|
|
|
|
|
remote:
|
2023-02-25 01:47:52 +00:00
|
|
|
- id: primary
|
2019-03-13 00:12:56 +00:00
|
|
|
address: 192.168.0.1@53
|
2023-02-25 01:41:25 +00:00
|
|
|
key: xfr_key
|
2019-03-13 00:12:56 +00:00
|
|
|
|
|
|
|
template:
|
|
|
|
- id: default
|
2023-02-25 01:47:52 +00:00
|
|
|
master: primary
|
2019-03-13 00:12:56 +00:00
|
|
|
# zonefileless setup
|
|
|
|
# https://www.knot-dns.cz/docs/2.8/html/operation.html#example-2
|
|
|
|
zonefile-sync: -1
|
|
|
|
zonefile-load: none
|
|
|
|
journal-content: all
|
|
|
|
# move databases below the state directory, because they need to be writable
|
|
|
|
journal-db: /var/lib/knot/journal
|
|
|
|
kasp-db: /var/lib/knot/kasp
|
|
|
|
timer-db: /var/lib/knot/timer
|
|
|
|
|
|
|
|
zone:
|
|
|
|
- domain: example.com
|
|
|
|
file: example.com.zone
|
|
|
|
|
|
|
|
- domain: sub.example.com
|
|
|
|
file: sub.example.com.zone
|
|
|
|
|
|
|
|
log:
|
|
|
|
- target: syslog
|
|
|
|
any: info
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
client = { lib, nodes, ... }: {
|
|
|
|
imports = [ common ];
|
|
|
|
networking.interfaces.eth1 = {
|
|
|
|
ipv4.addresses = [
|
|
|
|
{ address = "192.168.0.3"; prefixLength = 24; }
|
|
|
|
];
|
|
|
|
ipv6.addresses = [
|
|
|
|
{ address = "fd00::3"; prefixLength = 64; }
|
|
|
|
];
|
|
|
|
};
|
|
|
|
environment.systemPackages = [ pkgs.knot-dns ];
|
2020-02-12 16:35:33 +00:00
|
|
|
};
|
2019-03-13 00:12:56 +00:00
|
|
|
};
|
|
|
|
|
2020-02-12 16:35:33 +00:00
|
|
|
testScript = { nodes, ... }: let
|
2023-02-25 01:47:52 +00:00
|
|
|
primary4 = (lib.head nodes.primary.config.networking.interfaces.eth1.ipv4.addresses).address;
|
|
|
|
primary6 = (lib.head nodes.primary.config.networking.interfaces.eth1.ipv6.addresses).address;
|
2019-03-13 00:12:56 +00:00
|
|
|
|
2023-02-25 01:47:52 +00:00
|
|
|
secondary4 = (lib.head nodes.secondary.config.networking.interfaces.eth1.ipv4.addresses).address;
|
|
|
|
secondary6 = (lib.head nodes.secondary.config.networking.interfaces.eth1.ipv6.addresses).address;
|
2019-03-13 00:12:56 +00:00
|
|
|
in ''
|
2019-11-05 15:02:01 +00:00
|
|
|
import re
|
|
|
|
|
|
|
|
start_all()
|
|
|
|
|
|
|
|
client.wait_for_unit("network.target")
|
2023-02-25 01:47:52 +00:00
|
|
|
primary.wait_for_unit("knot.service")
|
|
|
|
secondary.wait_for_unit("knot.service")
|
2019-11-05 15:02:01 +00:00
|
|
|
|
|
|
|
|
|
|
|
def test(host, query_type, query, pattern):
|
|
|
|
out = client.succeed(f"khost -t {query_type} {query} {host}").strip()
|
|
|
|
client.log(f"{host} replied with: {out}")
|
|
|
|
assert re.search(pattern, out), f'Did not match "{pattern}"'
|
|
|
|
|
|
|
|
|
2023-02-25 01:47:52 +00:00
|
|
|
for host in ("${primary4}", "${primary6}", "${secondary4}", "${secondary6}"):
|
2019-11-05 15:02:01 +00:00
|
|
|
with subtest(f"Interrogate {host}"):
|
|
|
|
test(host, "SOA", "example.com", r"start of authority.*noc\.example\.com\.")
|
|
|
|
test(host, "A", "example.com", r"has no [^ ]+ record")
|
|
|
|
test(host, "AAAA", "example.com", r"has no [^ ]+ record")
|
|
|
|
|
|
|
|
test(host, "A", "www.example.com", r"address 192.0.2.1$")
|
|
|
|
test(host, "AAAA", "www.example.com", r"address 2001:db8::1$")
|
|
|
|
|
|
|
|
test(host, "NS", "sub.example.com", r"nameserver is ns\d\.example\.com.$")
|
|
|
|
test(host, "A", "sub.example.com", r"address 192.0.2.2$")
|
|
|
|
test(host, "AAAA", "sub.example.com", r"address 2001:db8::2$")
|
|
|
|
|
|
|
|
test(host, "RRSIG", "www.example.com", r"RR set signature is")
|
|
|
|
test(host, "DNSKEY", "example.com", r"DNSSEC key is")
|
2021-12-04 01:55:19 +00:00
|
|
|
|
2023-02-25 01:47:52 +00:00
|
|
|
primary.log(primary.succeed("systemd-analyze security knot.service | grep -v '✓'"))
|
2019-03-13 00:12:56 +00:00
|
|
|
'';
|
|
|
|
})
|