diff --git a/bin/tests/system/keymgr2kasp/ns4/named.conf.in b/bin/tests/system/keymgr2kasp/ns4/named.conf.in index c2751a321b..a74f3851cc 100644 --- a/bin/tests/system/keymgr2kasp/ns4/named.conf.in +++ b/bin/tests/system/keymgr2kasp/ns4/named.conf.in @@ -34,13 +34,13 @@ controls { }; key "external" { - algorithm "hmac-sha1"; - secret "YPfMoAk6h+3iN8MDRQC004iSNHY="; + algorithm "hmac-sha1"; + secret "YPfMoAk6h+3iN8MDRQC004iSNHY="; }; key "internal" { - algorithm "hmac-sha1"; - secret "4xILSZQnuO1UKubXHkYUsvBRPu8="; + algorithm "hmac-sha1"; + secret "4xILSZQnuO1UKubXHkYUsvBRPu8="; }; view "ext" { diff --git a/bin/tests/system/keymgr2kasp/ns4/named2.conf.in b/bin/tests/system/keymgr2kasp/ns4/named2.conf.in index c7e7cad2a9..d9a23f8657 100644 --- a/bin/tests/system/keymgr2kasp/ns4/named2.conf.in +++ b/bin/tests/system/keymgr2kasp/ns4/named2.conf.in @@ -33,16 +33,6 @@ controls { inet 10.53.0.4 port @CONTROLPORT@ allow { any; } keys { rndc_key; }; }; -key "external" { - algorithm "hmac-sha1"; - secret "YPfMoAk6h+3iN8MDRQC004iSNHY="; -}; - -key "internal" { - algorithm "hmac-sha1"; - secret "4xILSZQnuO1UKubXHkYUsvBRPu8="; -}; - dnssec-policy "rsasha256" { keys { zsk key-directory lifetime P3M algorithm 8 1024; @@ -64,7 +54,19 @@ dnssec-policy "rsasha256" { parent-propagation-delay 3h; }; -view "external-view" { +key "external" { + algorithm "hmac-sha1"; + secret "YPfMoAk6h+3iN8MDRQC004iSNHY="; +}; + +key "internal" { + algorithm "hmac-sha1"; + secret "4xILSZQnuO1UKubXHkYUsvBRPu8="; +}; + +view "ext" { + match-clients { key "external"; }; + zone "view-rsasha256.kasp" { type master; file "view-rsasha256.kasp.ext.db"; @@ -72,7 +74,9 @@ view "external-view" { }; }; -view "internal-view" { +view "int" { + match-clients { key "internal"; }; + zone "view-rsasha256.kasp" { type master; file "view-rsasha256.kasp.int.db"; diff --git a/bin/tests/system/keymgr2kasp/tests.sh b/bin/tests/system/keymgr2kasp/tests.sh index cd4812da4b..342b000bdf 100644 --- a/bin/tests/system/keymgr2kasp/tests.sh +++ b/bin/tests/system/keymgr2kasp/tests.sh @@ -866,7 +866,7 @@ set_keystate "KEY3" "STATE_ZRRSIG" "hidden" TSIG="hmac-sha1:external:$VIEW1" check_keys wait_for_done_signing -check_dnssecstatus "$SERVER" "$POLICY" "$ZONE" "external-view" +check_dnssecstatus "$SERVER" "$POLICY" "$ZONE" "ext" set_keytimes_view_migration # Set expected key times: @@ -923,11 +923,11 @@ check_keytimes check_apex dnssec_verify -# Various signing policy checks (external). +# Various signing policy checks (internal). TSIG="hmac-sha1:internal:$VIEW2" check_keys wait_for_done_signing -check_dnssecstatus "$SERVER" "$POLICY" "$ZONE" "internal-view" +check_dnssecstatus "$SERVER" "$POLICY" "$ZONE" "int" set_keytimes_view_migration check_keytimes check_apex