2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-30 05:57:52 +00:00

Replace "master/slave" terminology in tests

Replace most "master/slave" terminology in tests with the preferred
"primary/secondary", with the following exceptions:

- When testing the old syntax
- When master is used in master file and master file format terms
- When master is used in hostmaster or postmaster terms
- When master used in legacy domain names (for example in dig.batch)
- When there is no replacement (for example default-masters)
This commit is contained in:
Matthijs Mekking 2021-10-05 10:41:27 +02:00 committed by Evan Hunt
parent 570554149f
commit f3d3a4ff6e
182 changed files with 580 additions and 579 deletions

View File

@ -90,7 +90,7 @@ options {
// forwarding behavior, i.e. ask the forwarders first, and if that
// doesn't work then do the full lookup. You can also say
// "forward only;" which is what used to be specified with
// "slave" or "options forward-only". "only" will never attempt
// "secondary" or "options forward-only". "only" will never attempt
// a full lookup; only the forwarders will be used.
forward first;
forwarders {
@ -98,8 +98,8 @@ options {
5.6.7.8;
};
check-names master fail;
check-names slave warn;
check-names primary fail;
check-names secondary warn;
check-names response ignore;
allow-query { any; };
@ -209,10 +209,10 @@ controls {
inet 10.0.0.2 allow { none; };
};
zone "master.demo.zone" {
type master; // what used to be called "primary"
zone "primary.demo.zone" {
type primary; // what used to be called "primary"
database "somedb -option1 -option2 arg1 arg2 arg3";
file "master.demo.zone";
file "primary.demo.zone";
check-names fail;
allow-update { none; };
allow-update-forwarding { 10.0.0.5; !any; };
@ -227,11 +227,11 @@ zone "master.demo.zone" {
forwarders { 10.0.0.3; 1:2:3:4:5:6:7:8; };
};
zone "slave.demo.zone" {
type slave; // what used to be called "secondary"
file "slave.demo.zone";
ixfr-base "slave.demo.zone.ixfr"; // File name for IXFR transaction log file
masters {
zone "secondary.demo.zone" {
type secondary; // what used to be called "secondary"
file "secondary.demo.zone";
ixfr-base "secondary.demo.zone.ixfr"; // File name for IXFR transaction log file
primaries {
1.2.3.4 port 10 key "foo"; // where to zone transfer from
5.6.7.8;
6.7.8.9 key "zippo";
@ -263,8 +263,8 @@ view "test-view" in {
max-cache-size 100000;
allow-query { 10.0.0.30;};
match-clients { 10.0.0.1 ; };
check-names master warn;
check-names slave ignore;
check-names primary warn;
check-names secondary ignore;
check-names response fail;
auth-nxdomain false;
recursion true;
@ -290,9 +290,9 @@ view "test-view" in {
min-refresh-time 111;
zone "view-zone.com" {
type master;
type primary;
allow-update-forwarding { 10.0.0.34;};
file "view-zone-master";
file "view-zone-primary";
};
server 5.6.7.8 {
@ -307,12 +307,12 @@ view "test-view" in {
zone "stub.demo.zone" {
type stub; // stub zones are like slave zones,
type stub; // stub zones are like secondary zones,
// except that only the NS records
// are transferred.
dialup yes;
file "stub.demo.zone";
masters {
primaries {
1.2.3.4 ; // where to zone transfer from
5.6.7.8 port 999;
};
@ -348,7 +348,7 @@ acl can_axfr { 1.2.3.4; can_query; }; // host 1.2.3.4 and any host allowed
// by can_query are OK
zone "disabled-zone.com" {
type master;
type primary;
file "bar";
max-retry-time 100;
@ -358,7 +358,7 @@ zone "disabled-zone.com" {
};
zone "non-default-acl.demo.zone" {
type master;
type primary;
file "foo";
allow-query { can_query; };
allow-transfer { can_axfr; };

View File

@ -71,10 +71,10 @@ EOF
$PERL makenames.pl $nzones | while read zonename; do
if [ $single_file ]; then
echo "zone $zonename { type master; file \"smallzone.db\"; };"
echo "zone $zonename { type primary; file \"smallzone.db\"; };"
else
[ -d zones ] || mkdir zones
$PERL mkzonefile.pl $zonename $nrecords > zones/$zonename.db
echo "zone $zonename { type master; file \"zones/$zonename.db\"; };"
echo "zone $zonename { type primary; file \"zones/$zonename.db\"; };"
fi
done

View File

@ -187,7 +187,7 @@ structure:
e.g.
I:catz:checking that dom1.example is not served by master (1)
I:catz:checking that dom1.example is not served by primary (1)
The meanings of the fields are as follows:

View File

@ -35,9 +35,9 @@ def rndc_loop(test_state, domain):
'''
rndc_commands = [
['addzone', domain,
'{ type master; file "example.db"; };'],
'{ type primary; file "example.db"; };'],
['modzone', domain,
'{ type master; file "example.db"; allow-transfer { any; }; };'],
'{ type primary; file "example.db"; allow-transfer { any; }; };'],
['delzone', domain],
]

View File

@ -351,14 +351,14 @@ if [ $ret -ne 0 ]; then echo_i "failed"; fi
status=$((status+ret))
##########################################################################
echo_i "Testing masters suboption and random labels"
echo_i "Testing primaries suboption and random labels"
n=$((n+1))
echo_i "adding dom5.example. with a valid masters suboption (IP without TSIG) and a random label ($n)"
echo_i "adding dom5.example. with a valid primaries suboption (IP without TSIG) and a random label ($n)"
ret=0
$NSUPDATE -d <<END >> nsupdate.out.test$n 2>&1 || ret=1
server 10.53.0.1 ${PORT}
update add somerandomlabel.zones.catalog1.example. 3600 IN PTR dom5.example.
update add masters.somerandomlabel.zones.catalog1.example. 3600 IN A 10.53.0.3
update add primaries.somerandomlabel.zones.catalog1.example. 3600 IN A 10.53.0.3
send
END
if [ $ret -ne 0 ]; then echo_i "failed"; fi
@ -385,7 +385,7 @@ ret=0
$NSUPDATE -d <<END >> nsupdate.out.test$n 2>&1 || ret=1
server 10.53.0.1 ${PORT}
update delete somerandomlabel.zones.catalog1.example. 3600 IN PTR dom5.example.
update delete masters.somerandomlabel.zones.catalog1.example. 3600 IN A 10.53.0.3
update delete primaries.somerandomlabel.zones.catalog1.example. 3600 IN A 10.53.0.3
send
END
if [ $ret -ne 0 ]; then echo_i "failed"; fi
@ -407,14 +407,14 @@ status=$((status+ret))
##########################################################################
echo_i "Testing masters global option"
echo_i "Testing primaries global option"
n=$((n+1))
echo_i "adding dom6.example. and a valid global masters option (IP without TSIG) ($n)"
echo_i "adding dom6.example. and a valid global primaries option (IP without TSIG) ($n)"
ret=0
$NSUPDATE -d <<END >> nsupdate.out.test$n 2>&1 || ret=1
server 10.53.0.1 ${PORT}
update add masters.catalog1.example. 3600 IN A 10.53.0.3
update add masters.catalog1.example. 3600 IN AAAA fd92:7065:b8e:ffff::3
update add primaries.catalog1.example. 3600 IN A 10.53.0.3
update add primaries.catalog1.example. 3600 IN AAAA fd92:7065:b8e:ffff::3
update add 4346f565b4d63ddb99e5d2497ff22d04e878e8f8.zones.catalog1.example. 3600 IN PTR dom6.example.
send
END
@ -441,8 +441,8 @@ echo_i "removing dom6.example. ($n)"
ret=0
$NSUPDATE -d <<END >> nsupdate.out.test$n 2>&1 || ret=1
server 10.53.0.1 ${PORT}
update delete masters.catalog1.example. 3600 IN A 10.53.0.3
update delete masters.catalog1.example. 3600 IN AAAA fd92:7065:b8e:ffff::3
update delete primaries.catalog1.example. 3600 IN A 10.53.0.3
update delete primaries.catalog1.example. 3600 IN AAAA fd92:7065:b8e:ffff::3
update delete 4346f565b4d63ddb99e5d2497ff22d04e878e8f8.zones.catalog1.example. 3600 IN PTR dom6.example.
send
END
@ -466,7 +466,7 @@ status=$((status+ret))
nextpart ns2/named.run >/dev/null
n=$((n+1))
echo_i "adding dom6.example. and an invalid global masters option (TSIG without IP) ($n)"
echo_i "adding dom6.example. and an invalid global primaries option (TSIG without IP) ($n)"
ret=0
$NSUPDATE -d <<END >> nsupdate.out.test$n 2>&1 || ret=1
server 10.53.0.1 ${PORT}
@ -679,7 +679,7 @@ status=$((status+ret))
##########################################################################
echo_i "Testing TSIG keys for masters set per-domain"
echo_i "Testing TSIG keys for primaries set per-domain"
n=$((n+1))
echo_i "adding a domain dom9.example. to primary via RNDC, with transfers allowed only with TSIG key ($n)"
ret=0
@ -699,7 +699,7 @@ status=$((status+ret))
nextpart ns2/named.run >/dev/null
n=$((n+1))
echo_i "adding domain dom9.example. to catalog1 zone with a valid masters suboption (IP with TSIG) ($n)"
echo_i "adding domain dom9.example. to catalog1 zone with a valid primaries suboption (IP with TSIG) ($n)"
ret=0
$NSUPDATE -d <<END >> nsupdate.out.test$n 2>&1 || ret=1
server 10.53.0.1 ${PORT}
@ -756,7 +756,7 @@ status=$((status+ret))
nextpart ns2/named.run >/dev/null
n=$((n+1))
echo_i "adding domain dom9.example. to catalog1 zone with an invalid masters suboption (TSIG without IP) ($n)"
echo_i "adding domain dom9.example. to catalog1 zone with an invalid primaries suboption (TSIG without IP) ($n)"
ret=0
$NSUPDATE -d <<END >> nsupdate.out.test$n 2>&1 || ret=1
server 10.53.0.1 ${PORT}
@ -1243,7 +1243,7 @@ ret=0
$NSUPDATE -d <<END >> nsupdate.out.test$n 2>&1 || ret=1
server 10.53.0.1 ${PORT}
update add 8d7989c746b3f92b3bba2479e72afd977198363f.zones.catalog1.example. 3600 IN PTR dom13.example.
update add masters.8d7989c746b3f92b3bba2479e72afd977198363f.zones.catalog1.example. 3600 IN A 10.53.0.1
update add primaries.8d7989c746b3f92b3bba2479e72afd977198363f.zones.catalog1.example. 3600 IN A 10.53.0.1
send
END
if [ $ret -ne 0 ]; then echo_i "failed"; fi
@ -1273,7 +1273,7 @@ ret=0
$NSUPDATE -d <<END >> nsupdate.out.test$n 2>&1 || ret=1
server 10.53.0.3 ${PORT}
update add 8d7989c746b3f92b3bba2479e72afd977198363f.zones.catalog2.example. 3600 IN PTR dom13.example.
update add masters.8d7989c746b3f92b3bba2479e72afd977198363f.zones.catalog2.example. 3600 IN A 10.53.0.3
update add primaries.8d7989c746b3f92b3bba2479e72afd977198363f.zones.catalog2.example. 3600 IN A 10.53.0.3
send
END
if [ $ret -ne 0 ]; then echo_i "failed"; fi
@ -1302,7 +1302,7 @@ ret=0
$NSUPDATE -d <<END >> nsupdate.out.test$n 2>&1 || ret=1
server 10.53.0.3 ${PORT}
update delete 8d7989c746b3f92b3bba2479e72afd977198363f.zones.catalog2.example. 3600 IN PTR dom13.example.
update delete masters.8d7989c746b3f92b3bba2479e72afd977198363f.zones.catalog2.example. 3600 IN A 10.53.0.3
update delete primaries.8d7989c746b3f92b3bba2479e72afd977198363f.zones.catalog2.example. 3600 IN A 10.53.0.3
send
END
if [ $ret -ne 0 ]; then echo_i "failed"; fi
@ -1329,7 +1329,7 @@ ret=0
$NSUPDATE -d <<END >> nsupdate.out.test$n 2>&1 || ret=1
server 10.53.0.1 ${PORT}
update delete 8d7989c746b3f92b3bba2479e72afd977198363f.zones.catalog1.example. 3600 IN PTR dom13.example.
update delete masters.8d7989c746b3f92b3bba2479e72afd977198363f.zones.catalog1.example. 3600 IN A 10.53.0.2
update delete primaries.8d7989c746b3f92b3bba2479e72afd977198363f.zones.catalog1.example. 3600 IN A 10.53.0.2
send
END
if [ $ret -ne 0 ]; then echo_i "failed"; fi
@ -1424,7 +1424,7 @@ ret=0
$NSUPDATE -d <<END >> nsupdate.out.test$n 2>&1 || ret=1
server 10.53.0.3 ${PORT}
update add 45e3d45ea5f7bd01c395ccbde6ae2e750a3ee8ab.zones.catalog2.example. 3600 IN PTR dom14.example.
update add masters.45e3d45ea5f7bd01c395ccbde6ae2e750a3ee8ab.zones.catalog2.example. 3600 IN A 10.53.0.3
update add primaries.45e3d45ea5f7bd01c395ccbde6ae2e750a3ee8ab.zones.catalog2.example. 3600 IN A 10.53.0.3
send
END
if [ $ret -ne 0 ]; then echo_i "failed"; fi
@ -1453,7 +1453,7 @@ ret=0
$NSUPDATE -d <<END >> nsupdate.out.test$n 2>&1 || ret=1
server 10.53.0.3 ${PORT}
update delete 45e3d45ea5f7bd01c395ccbde6ae2e750a3ee8ab.zones.catalog2.example. 3600 IN PTR dom14.example.
update delete masters.45e3d45ea5f7bd01c395ccbde6ae2e750a3ee8ab.zones.catalog2.example. 3600 IN A 10.53.0.3
update delete primaries.45e3d45ea5f7bd01c395ccbde6ae2e750a3ee8ab.zones.catalog2.example. 3600 IN A 10.53.0.3
send
END
if [ $ret -ne 0 ]; then echo_i "failed"; fi

View File

@ -11,7 +11,7 @@
view override_bind chaos {
zone "version.bind" chaos {
type master;
type primary;
database "_builtin version";
};
};

View File

@ -15,7 +15,7 @@ dlz external {
};
zone "example.com" {
type master;
type primary;
dlz external;
};

View File

@ -10,11 +10,11 @@
*/
/*
* Missing master in also-notify clause.
* Missing primary in also-notify clause.
*/
zone dummy {
type master;
type primary;
file "xxxx";
also-notify { xxxx; };
};

View File

@ -10,8 +10,8 @@
*/
zone not-inline {
type slave;
masters { 127.0.0.1; };
type secondary;
primaries { 127.0.0.1; };
inline-signing no;
dnssec-dnskey-kskonly yes;
update-check-ksk yes;
@ -20,8 +20,8 @@ zone not-inline {
};
zone inline {
type slave;
masters { 127.0.0.1; };
type secondary;
primaries { 127.0.0.1; };
inline-signing yes;
dnssec-dnskey-kskonly yes;
update-check-ksk yes;

View File

@ -10,10 +10,10 @@
*/
view a {
zone x { type master; file "x"; };
zone x { type primary; file "x"; };
};
view b {
zone x { type master; file "x"; };
zone x { type primary; file "x"; };
zone x { in-view a; };
};

View File

@ -10,11 +10,11 @@
*/
/*
* An inline-signing slave should be forced to have a file option
* An inline-signing secondary should be forced to have a file option
*/
zone "." {
type slave;
type secondary;
inline-signing yes;
masters { 10.53.0.1; };
};
primaries { 10.53.0.1; };
};

View File

@ -15,7 +15,7 @@ dnssec-policy "default" {
};
zone "example.net" {
type master;
type primary;
file "example.db";
dnssec-policy "default";
};

View File

@ -15,7 +15,7 @@ dnssec-policy "insecure" {
};
zone "example.net" {
type master;
type primary;
file "example.db";
dnssec-policy "insecure";
};

View File

@ -15,7 +15,7 @@ dnssec-policy "none" {
};
zone "example.net" {
type master;
type primary;
file "example.db";
dnssec-policy "none";
};

View File

@ -16,7 +16,7 @@ dnssec-policy "badalg" {
};
zone "example.net" {
type master;
type primary;
file "example.db";
dnssec-policy "badalg";
};

View File

@ -16,7 +16,7 @@ dnssec-policy "badalg" {
};
zone "example.net" {
type master;
type primary;
file "example.db";
dnssec-policy "badalg";
};

View File

@ -16,7 +16,7 @@ dnssec-policy "badalg" {
};
zone "example.net" {
type master;
type primary;
file "example.db";
dnssec-policy "badalg";
};

View File

@ -16,7 +16,7 @@ dnssec-policy "badalg" {
};
zone "example.net" {
type master;
type primary;
file "example.db";
dnssec-policy "badalg";
};

View File

@ -13,13 +13,13 @@
// both using the same zone file.
zone "example1.net" {
type master;
type primary;
file "example.db";
dnssec-policy "none";
};
zone "example2.net" {
type master;
type primary;
file "example.db";
dnssec-policy "insecure";
};

View File

@ -13,13 +13,13 @@
// with the same zone file.
zone "example1.net" {
type master;
type primary;
file "example.db";
dnssec-policy "default";
};
zone "example2.net" {
type master;
type primary;
file "example.db";
allow-update { any; };
};

View File

@ -13,13 +13,13 @@
// with the same zone file.
zone "example1.net" {
type master;
type primary;
file "example.db";
dnssec-policy "default";
};
zone "example2.net" {
type master;
type primary;
file "example.db";
update-policy {
grant * self * TXT;

View File

@ -13,13 +13,13 @@
// with the same zone file.
zone "example1.net" {
type master;
type primary;
file "example.db";
dnssec-policy "insecure";
};
zone "example2.net" {
type master;
type primary;
file "example.db";
allow-update { any; };
};

View File

@ -14,7 +14,7 @@ include "good-kasp.conf";
// Bad zone configuration because this has dnssec-policy and other DNSSEC sign
// configuration options (auto-dnssec).
zone "example.net" {
type master;
type primary;
file "example.db";
dnssec-policy "test";
auto-dnssec maintain;

View File

@ -15,7 +15,7 @@ include "good-kasp.conf";
// dnssec-policy configuration (good-kasp.conf has "test", zone refers to
// "nosuchpolicy".
zone "example.net" {
type master;
type primary;
file "example.db";
dnssec-policy "nosuchpolicy";
};

View File

@ -16,7 +16,7 @@ dnssec-policy "badduration" {
};
zone "example.net" {
type master;
type primary;
file "example.db";
dnssec-policy "badduration";
};

View File

@ -12,13 +12,13 @@
// Two zones with dnssec-policy with the same zone file.
zone "example1.net" {
type master;
type primary;
file "example.db";
dnssec-policy "default";
};
zone "example2.net" {
type master;
type primary;
file "example.db";
dnssec-policy "default";
};

View File

@ -13,13 +13,13 @@
// with the same zone file.
zone "example1.net" {
type master;
type primary;
file "example.db";
dnssec-policy "insecure";
};
zone "example2.net" {
type master;
type primary;
file "example.db";
dnssec-policy "insecure";
};

View File

@ -13,13 +13,13 @@
// both with the same zone file.
zone "example1.net" {
type master;
type primary;
file "example.db";
dnssec-policy "default";
};
zone "example2.net" {
type master;
type primary;
file "example.db";
dnssec-policy "none";
};

View File

@ -13,13 +13,13 @@
// (transitioning to inseure), both with the same zone file.
zone "example1.net" {
type master;
type primary;
file "example.db";
dnssec-policy "default";
};
zone "example2.net" {
type master;
type primary;
file "example.db";
dnssec-policy "insecure";
};

View File

@ -10,11 +10,11 @@
*/
/*
* request-ixfr clause is not allowed in zone of type master.
* request-ixfr clause is not allowed in zone of type primary.
*/
zone dummy {
type master;
type primary;
request-ixfr no;
file "xxxx";
};

View File

@ -10,7 +10,7 @@
*/
zone example {
type master;
type primary;
masterfile-format raw;
file "example.db";
max-ixfr-ratio 0.9;

View File

@ -10,7 +10,7 @@
*/
zone example {
type master;
type primary;
masterfile-format raw;
file "example.db";
max-ixfr-ratio 0%;

View File

@ -16,5 +16,5 @@ options {
zone "." {
type mirror;
masters { 127.0.0.1; };
primaries { 127.0.0.1; };
};

View File

@ -10,7 +10,7 @@
*/
zone example {
type master;
type primary;
file "example.db";
auto-dnssec maintain;
allow-update { none; };

View File

@ -14,6 +14,6 @@ options {
};
zone "example.net" {
type slave;
masters { 192.168.1.1; };
type secondary;
primaries { 192.168.1.1; };
};

View File

@ -79,68 +79,68 @@ options {
};
};
zone "max1" { type master; file "rpz.db"; };
zone "max2" { type master; file "rpz.db"; };
zone "max3" { type master; file "rpz.db"; };
zone "max4" { type master; file "rpz.db"; };
zone "max5" { type master; file "rpz.db"; };
zone "max6" { type master; file "rpz.db"; };
zone "max7" { type master; file "rpz.db"; };
zone "max8" { type master; file "rpz.db"; };
zone "max9" { type master; file "rpz.db"; };
zone "max10" { type master; file "rpz.db"; };
zone "max11" { type master; file "rpz.db"; };
zone "max12" { type master; file "rpz.db"; };
zone "max13" { type master; file "rpz.db"; };
zone "max14" { type master; file "rpz.db"; };
zone "max15" { type master; file "rpz.db"; };
zone "max16" { type master; file "rpz.db"; };
zone "max17" { type master; file "rpz.db"; };
zone "max18" { type master; file "rpz.db"; };
zone "max19" { type master; file "rpz.db"; };
zone "max20" { type master; file "rpz.db"; };
zone "max21" { type master; file "rpz.db"; };
zone "max22" { type master; file "rpz.db"; };
zone "max23" { type master; file "rpz.db"; };
zone "max24" { type master; file "rpz.db"; };
zone "max25" { type master; file "rpz.db"; };
zone "max26" { type master; file "rpz.db"; };
zone "max27" { type master; file "rpz.db"; };
zone "max28" { type master; file "rpz.db"; };
zone "max29" { type master; file "rpz.db"; };
zone "max30" { type master; file "rpz.db"; };
zone "max31" { type master; file "rpz.db"; };
zone "max32" { type master; file "rpz.db"; };
zone "max33" { type master; file "rpz.db"; };
zone "max34" { type master; file "rpz.db"; };
zone "max35" { type master; file "rpz.db"; };
zone "max36" { type master; file "rpz.db"; };
zone "max37" { type master; file "rpz.db"; };
zone "max38" { type master; file "rpz.db"; };
zone "max39" { type master; file "rpz.db"; };
zone "max40" { type master; file "rpz.db"; };
zone "max41" { type master; file "rpz.db"; };
zone "max42" { type master; file "rpz.db"; };
zone "max43" { type master; file "rpz.db"; };
zone "max44" { type master; file "rpz.db"; };
zone "max45" { type master; file "rpz.db"; };
zone "max46" { type master; file "rpz.db"; };
zone "max47" { type master; file "rpz.db"; };
zone "max48" { type master; file "rpz.db"; };
zone "max49" { type master; file "rpz.db"; };
zone "max50" { type master; file "rpz.db"; };
zone "max51" { type master; file "rpz.db"; };
zone "max52" { type master; file "rpz.db"; };
zone "max53" { type master; file "rpz.db"; };
zone "max54" { type master; file "rpz.db"; };
zone "max55" { type master; file "rpz.db"; };
zone "max56" { type master; file "rpz.db"; };
zone "max57" { type master; file "rpz.db"; };
zone "max58" { type master; file "rpz.db"; };
zone "max59" { type master; file "rpz.db"; };
zone "max60" { type master; file "rpz.db"; };
zone "max61" { type master; file "rpz.db"; };
zone "max62" { type master; file "rpz.db"; };
zone "max63" { type master; file "rpz.db"; };
zone "max64" { type master; file "rpz.db"; };
zone "max65" { type master; file "rpz.db"; };
zone "max1" { type primary; file "rpz.db"; };
zone "max2" { type primary; file "rpz.db"; };
zone "max3" { type primary; file "rpz.db"; };
zone "max4" { type primary; file "rpz.db"; };
zone "max5" { type primary; file "rpz.db"; };
zone "max6" { type primary; file "rpz.db"; };
zone "max7" { type primary; file "rpz.db"; };
zone "max8" { type primary; file "rpz.db"; };
zone "max9" { type primary; file "rpz.db"; };
zone "max10" { type primary; file "rpz.db"; };
zone "max11" { type primary; file "rpz.db"; };
zone "max12" { type primary; file "rpz.db"; };
zone "max13" { type primary; file "rpz.db"; };
zone "max14" { type primary; file "rpz.db"; };
zone "max15" { type primary; file "rpz.db"; };
zone "max16" { type primary; file "rpz.db"; };
zone "max17" { type primary; file "rpz.db"; };
zone "max18" { type primary; file "rpz.db"; };
zone "max19" { type primary; file "rpz.db"; };
zone "max20" { type primary; file "rpz.db"; };
zone "max21" { type primary; file "rpz.db"; };
zone "max22" { type primary; file "rpz.db"; };
zone "max23" { type primary; file "rpz.db"; };
zone "max24" { type primary; file "rpz.db"; };
zone "max25" { type primary; file "rpz.db"; };
zone "max26" { type primary; file "rpz.db"; };
zone "max27" { type primary; file "rpz.db"; };
zone "max28" { type primary; file "rpz.db"; };
zone "max29" { type primary; file "rpz.db"; };
zone "max30" { type primary; file "rpz.db"; };
zone "max31" { type primary; file "rpz.db"; };
zone "max32" { type primary; file "rpz.db"; };
zone "max33" { type primary; file "rpz.db"; };
zone "max34" { type primary; file "rpz.db"; };
zone "max35" { type primary; file "rpz.db"; };
zone "max36" { type primary; file "rpz.db"; };
zone "max37" { type primary; file "rpz.db"; };
zone "max38" { type primary; file "rpz.db"; };
zone "max39" { type primary; file "rpz.db"; };
zone "max40" { type primary; file "rpz.db"; };
zone "max41" { type primary; file "rpz.db"; };
zone "max42" { type primary; file "rpz.db"; };
zone "max43" { type primary; file "rpz.db"; };
zone "max44" { type primary; file "rpz.db"; };
zone "max45" { type primary; file "rpz.db"; };
zone "max46" { type primary; file "rpz.db"; };
zone "max47" { type primary; file "rpz.db"; };
zone "max48" { type primary; file "rpz.db"; };
zone "max49" { type primary; file "rpz.db"; };
zone "max50" { type primary; file "rpz.db"; };
zone "max51" { type primary; file "rpz.db"; };
zone "max52" { type primary; file "rpz.db"; };
zone "max53" { type primary; file "rpz.db"; };
zone "max54" { type primary; file "rpz.db"; };
zone "max55" { type primary; file "rpz.db"; };
zone "max56" { type primary; file "rpz.db"; };
zone "max57" { type primary; file "rpz.db"; };
zone "max58" { type primary; file "rpz.db"; };
zone "max59" { type primary; file "rpz.db"; };
zone "max60" { type primary; file "rpz.db"; };
zone "max61" { type primary; file "rpz.db"; };
zone "max62" { type primary; file "rpz.db"; };
zone "max63" { type primary; file "rpz.db"; };
zone "max64" { type primary; file "rpz.db"; };
zone "max65" { type primary; file "rpz.db"; };

View File

@ -10,7 +10,7 @@
*/
zone "example.com." {
type master;
type primary;
file "example.com.zone";
};

View File

@ -10,7 +10,7 @@
*/
zone "example.com." {
type master;
type primary;
file "example.com.zone";
};

View File

@ -10,11 +10,11 @@
*/
zone a {
type master;
type primary;
file "shared.db";
};
zone b {
type slave;
type secondary;
file "shared.db";
masters { 1.2.3.4; };
primaries { 1.2.3.4; };
};

View File

@ -10,12 +10,12 @@
*/
zone a {
type slave;
type secondary;
file "shared.db";
masters { 1.2.3.4; };
primaries { 1.2.3.4; };
};
zone b {
type slave;
type secondary;
file "shared.db";
masters { 1.2.3.4; };
primaries { 1.2.3.4; };
};

View File

@ -14,7 +14,7 @@ view "first" {
"none";
};
zone "clone" {
type master;
type primary;
file "xxx";
};
};
@ -24,6 +24,6 @@ view "second" {
};
zone "clone" {
in-view "first";
type slave;
type secondary;
};
};

View File

@ -14,7 +14,7 @@ view "first" {
"none";
};
zone "clone" {
type master;
type primary;
file "xxx";
};
};
@ -26,6 +26,6 @@ view "second" {
in-view "first";
forward only;
forwarders { 10.0.0.100; };
type slave;
type secondary;
};
};

View File

@ -17,7 +17,7 @@ view first {
view second {
zone shared.example {
type master;
type primary;
file "shared.example.db";
};
};

View File

@ -19,5 +19,5 @@ zone "example." {
dialup notify;
notify no;
file "example.bk";
// masters { 10.53.0.1; };
// primaries { 10.53.0.1; };
};

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * self TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * krb5-selfsub TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * ms-selfsub TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * external TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant a-key-name name TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant a-key-name subdomain TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant a-key-name wildcard TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * tcp-self . "ptr(10 )";

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * selfsub TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * selfwild TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * ms-self TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * krb5-self TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * ms-subdomain TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * krb5-subdomain TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * tcp-self TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * 6to4-self TXT;

View File

@ -12,7 +12,7 @@
view example {
also-notify { missing; };
zone "example.net" {
type slave;
masters { 192.168.1.1; };
type secondary;
primaries { 192.168.1.1; };
};
};

View File

@ -14,7 +14,7 @@ options {
};
zone "check-dup-records" {
type master;
type primary;
file "check-dup-records.db";
check-dup-records fail;
};

View File

@ -11,14 +11,14 @@
view missing {
zone missing.example {
type master;
type primary;
file "missing.example.db";
};
};
view good {
zone shared.example {
type master;
type primary;
file "shared.example.db";
};
};

View File

@ -14,7 +14,7 @@ options {
};
zone "check-mx-cname" {
type master;
type primary;
file "check-mx-cname.db";
check-mx-cname fail;
};

View File

@ -14,7 +14,7 @@ options {
};
zone "check-mx" {
type master;
type primary;
file "check-mx.db";
check-mx fail;
};

View File

@ -14,7 +14,7 @@ options {
};
zone "check-names" {
type master;
type primary;
file "check-names.db";
check-names fail;
};

View File

@ -14,7 +14,7 @@ options {
};
zone "check-srv-cname" {
type master;
type primary;
file "check-srv-cname.db";
check-srv-cname fail;
};

View File

@ -18,8 +18,8 @@ dlz two {
search no;
};
zone master {
type master;
zone primary {
type primary;
database "none";
dlz two;
};

View File

@ -36,26 +36,26 @@ options {
dnssec-policy "default";
};
zone "example1" {
type master;
type primary;
file "example1.db";
};
zone "example2" {
type master;
type primary;
file "example2.db";
dnssec-policy "test";
};
zone "example3" {
type master;
type primary;
file "example3.db";
dnssec-policy "default";
};
zone "dnssec-policy-none-shared-zonefile1" {
type master;
type primary;
file "shared.db";
dnssec-policy "none";
};
zone "dnssec-policy-none-shared-zonefile2" {
type master;
type primary;
file "shared.db";
dnssec-policy "none";
};

View File

@ -10,7 +10,7 @@
*/
zone example {
type master;
type primary;
masterfile-format raw;
file "example.db";
max-ixfr-ratio 50%;

View File

@ -10,7 +10,7 @@
*/
zone example {
type master;
type primary;
masterfile-format raw;
file "example.db";
max-ixfr-ratio unlimited;

View File

@ -14,7 +14,7 @@ options {
};
zone "example.net" {
type slave;
type secondary;
notify no;
masters { 192.168.1.1; };
primaries { 192.168.1.1; };
};

View File

@ -10,7 +10,7 @@
*/
zone "example.com." {
type master;
type primary;
file "example.com.zone";
};

View File

@ -10,7 +10,7 @@
*/
zone "example.com." {
type master;
type primary;
file "example.com.zone";
};

View File

@ -10,7 +10,7 @@
*/
zone "example.com." {
type master;
type primary;
file "example.com.zone";
};

View File

@ -1,5 +1,5 @@
zone example {
type master;
type primary;
file "example.db";
sig-signing-type 65280;
};

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * self * TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * krb5-subdomain . TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * tcp-self . TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * 6to4-self . TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * tcp-self . ptr(1);

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * self . TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * selfsub . TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * selfsub * TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * selfwild * TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * selfwild . TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * krb5-self . TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * ms-self . TXT;

View File

@ -10,7 +10,7 @@
*/
zone "example.com" {
type master;
type primary;
file "example.com.db";
update-policy {
grant * ms-subdomain . TXT;

View File

@ -12,8 +12,8 @@
view example {
also-notify { missing; };
zone "example.net" {
type slave;
type secondary;
notify no;
masters { 192.168.1.1; };
primaries { 192.168.1.1; };
};
};

View File

@ -95,14 +95,14 @@ view "first" {
"none";
};
zone "example1" {
type master;
type primary;
file "xxx";
update-policy local;
max-ixfr-ratio 20%;
notify-source 10.10.10.10 port 53 dscp 55;
};
zone "clone" {
type master;
type primary;
file "yyy";
max-ixfr-ratio unlimited;
};
@ -114,7 +114,7 @@ view "second" {
"any";
};
zone "example1" {
type master;
type primary;
file "zzz";
update-policy local;
zone-statistics yes;
@ -138,7 +138,7 @@ view "second" {
};
zone "." {
type redirect;
masters {
primaries {
1.2.3.4;
};
};
@ -157,7 +157,7 @@ view "third" {
};
};
zone "dnssec" {
type master;
type primary;
file "file";
allow-update {
"any";
@ -170,7 +170,7 @@ view "third" {
};
zone "s" {
type secondary;
masters {
primaries {
1.2.3.4;
};
notify primary-only;
@ -178,7 +178,7 @@ view "third" {
};
view "fourth" {
zone "dnssec-test" {
type master;
type primary;
file "dnssec-test.db";
parental-agents {
1.2.3.4;
@ -188,7 +188,7 @@ view "fourth" {
parental-source 10.10.10.10 port 53 dscp 55;
};
zone "dnssec-default" {
type master;
type primary;
file "dnssec-default.db";
parental-agents {
"parents";
@ -196,31 +196,31 @@ view "fourth" {
dnssec-policy "default";
};
zone "dnssec-inherit" {
type master;
type primary;
file "dnssec-inherit.db";
};
zone "dnssec-none" {
type master;
type primary;
file "dnssec-none.db";
dnssec-policy "none";
};
zone "dnssec-view1" {
type master;
type primary;
file "dnssec-view41.db";
dnssec-policy "test";
};
zone "dnssec-view2" {
type master;
type primary;
file "dnssec-view42.db";
};
zone "dnssec-view3" {
type master;
type primary;
file "dnssec-view43.db";
dnssec-policy "none";
key-directory "keys";
};
zone "dnssec-view4" {
type master;
type primary;
file "dnssec-view44.db";
dnssec-policy "none";
};
@ -229,24 +229,24 @@ view "fourth" {
};
view "fifth" {
zone "dnssec-view1" {
type master;
type primary;
file "dnssec-view51.db";
dnssec-policy "test";
};
zone "dnssec-view2" {
type master;
type primary;
file "dnssec-view52.db";
dnssec-policy "test";
key-directory "keys";
};
zone "dnssec-view3" {
type master;
type primary;
file "dnssec-view53.db";
dnssec-policy "default";
key-directory "keys";
};
zone "dnssec-view4" {
type master;
type primary;
file "dnssec-view54.db";
dnssec-policy "none";
};
@ -254,7 +254,7 @@ view "fifth" {
};
view "chaos" chaos {
zone "hostname.bind" chaos {
type master;
type primary;
database "_builtin hostname";
};
};

View File

@ -1,24 +1,24 @@
example1 IN first master
clone IN first master
example1 IN second master
example1 IN first primary
clone IN first primary
example1 IN second primary
example2 IN second static-stub
example3 IN second static-stub
clone IN second in-view first
. IN second redirect
clone IN third in-view first
dnssec IN third master
dnssec IN third primary
p IN third primary
s IN third secondary
dnssec-test IN fourth master
dnssec-default IN fourth master
dnssec-inherit IN fourth master
dnssec-none IN fourth master
dnssec-view1 IN fourth master
dnssec-view2 IN fourth master
dnssec-view3 IN fourth master
dnssec-view4 IN fourth master
dnssec-view1 IN fifth master
dnssec-view2 IN fifth master
dnssec-view3 IN fifth master
dnssec-view4 IN fifth master
hostname.bind chaos chaos master
dnssec-test IN fourth primary
dnssec-default IN fourth primary
dnssec-inherit IN fourth primary
dnssec-none IN fourth primary
dnssec-view1 IN fourth primary
dnssec-view2 IN fourth primary
dnssec-view3 IN fourth primary
dnssec-view4 IN fourth primary
dnssec-view1 IN fifth primary
dnssec-view2 IN fifth primary
dnssec-view3 IN fifth primary
dnssec-view4 IN fifth primary
hostname.bind chaos chaos primary

View File

@ -11,7 +11,7 @@
view internal {
zone shared.example {
type master;
type primary;
file "shared.example.db";
};
};

View File

@ -10,16 +10,16 @@
*/
acl "transferees" {};
masters "stealthMasters" {127.0.0.1;};
masters "publicSlaves" {127.0.0.1;};
primaries "stealthPrimaries" {127.0.0.1;};
primaries "publicSecondaries" {127.0.0.1;};
zone "example.net" {
type slave;
type secondary;
key-directory "/var/lib/bind/example.net";
auto-dnssec maintain;
inline-signing yes;
masters { stealthMasters; };
primaries { stealthPrimaries; };
notify explicit;
also-notify { publicSlaves; };
also-notify { publicSecondaries; };
allow-transfer { localhost; transferees; };
};

View File

@ -10,17 +10,17 @@
*/
acl "transferees" {};
masters "stealthMasters" {127.0.0.1;};
masters "publicSlaves" {127.0.0.1;};
primaries "stealthPrimaries" {127.0.0.1;};
primaries "publicSecondaries" {127.0.0.1;};
zone "example.net" {
type slave;
type secondary;
file "/var/cache/bind/example.net.db";
key-directory "/var/lib/bind/example.net";
auto-dnssec maintain;
inline-signing yes;
masters { stealthMasters; };
primaries { stealthPrimaries; };
notify explicit;
also-notify { publicSlaves; };
also-notify { publicSecondaries; };
allow-transfer { localhost; transferees; };
};

View File

@ -10,16 +10,16 @@
*/
acl "transferees" {};
masters "stealthMasters" {127.0.0.1;};
masters "publicSlaves" {127.0.0.1;};
primaries "stealthPrimaries" {127.0.0.1;};
primaries "publicSecondaries" {127.0.0.1;};
zone "example.net" {
type slave;
type secondary;
key-directory "/var/lib/bind/example.net";
auto-dnssec maintain;
inline-signing no;
masters { stealthMasters; };
primaries { stealthPrimaries; };
notify explicit;
also-notify { publicSlaves; };
also-notify { publicSecondaries; };
allow-transfer { localhost; transferees; };
};

View File

@ -12,7 +12,7 @@
include "good-kasp.conf";
zone "nsec3.net" {
type master;
type primary;
file "nsec3.db";
dnssec-policy "test";
auto-dnssec maintain;

View File

@ -16,7 +16,7 @@ dnssec-policy "bad-keylen" {
};
zone "example.net" {
type master;
type primary;
file "example.db";
dnssec-policy "badkeylen";
};

View File

@ -17,7 +17,7 @@ dnssec-policy "bad-salt" {
};
zone "example.net" {
type master;
type primary;
file "example.db";
dnssec-policy "bad-salt";
};

Some files were not shown because too many files have changed in this diff Show More