xref: /netbsd-src/external/mpl/bind/dist/bin/tests/system/kasp/ns4/named.conf.in (revision 3587d6f89c746bbb4f886219ddacd41ace480ecf)
1/*
2 * Copyright (C) Internet Systems Consortium, Inc. ("ISC")
3 *
4 * SPDX-License-Identifier: MPL-2.0
5 *
6 * This Source Code Form is subject to the terms of the Mozilla Public
7 * License, v. 2.0.  If a copy of the MPL was not distributed with this
8 * file, you can obtain one at https://mozilla.org/MPL/2.0/.
9 *
10 * See the COPYRIGHT file distributed with this work for additional
11 * information regarding copyright ownership.
12 */
13
14// NS4
15
16key rndc_key {
17	secret "1234abcd8765";
18	algorithm hmac-sha256;
19};
20
21controls {
22	inet 10.53.0.4 port @CONTROLPORT@ allow { any; } keys { rndc_key; };
23};
24
25key "sha1" {
26	algorithm "hmac-sha1";
27	secret "FrSt77yPTFx6hTs4i2tKLB9LmE0=";
28};
29
30key "sha224" {
31	algorithm "hmac-sha224";
32	secret "hXfwwwiag2QGqblopofai9NuW28q/1rH4CaTnA==";
33};
34
35key "sha256" {
36	algorithm "hmac-sha256";
37	secret "R16NojROxtxH/xbDl//ehDsHm5DjWTQ2YXV+hGC2iBY=";
38};
39
40key "keyforview1" {
41	algorithm @DEFAULT_HMAC@;
42	secret "YPfMoAk6h+3iN8MDRQC004iSNHY=";
43};
44
45key "keyforview2" {
46	algorithm @DEFAULT_HMAC@;
47	secret "4xILSZQnuO1UKubXHkYUsvBRPu8=";
48};
49
50key "keyforview3" {
51	algorithm @DEFAULT_HMAC@;
52	secret "C1Azf+gGPMmxrUg/WQINP6eV9Y0=";
53};
54
55dnssec-policy "test" {
56	keys {
57		csk key-directory lifetime 0 algorithm 14;
58	};
59};
60
61options {
62	query-source address 10.53.0.4;
63	port @PORT@;
64	pid-file "named.pid";
65	listen-on { 10.53.0.4; };
66	listen-on-v6 { none; };
67	recursion no;
68	dnssec-policy "test";
69};
70
71view "inherit" {
72	match-clients { key "sha1"; };
73
74	/* Inherit dnssec-policy 'test' */
75	zone "inherit.inherit.signed" {
76		type primary;
77		file "inherit.inherit.signed.db";
78		inline-signing yes;
79	};
80
81	/* Override dnssec-policy */
82	zone "override.inherit.signed" {
83		type primary;
84		file "override.inherit.signed.db";
85		inline-signing yes;
86		dnssec-policy "default";
87	};
88
89	/* Unset dnssec-policy */
90	zone "none.inherit.signed" {
91		type primary;
92		file "none.inherit.signed.db";
93		dnssec-policy "none";
94	};
95};
96
97view "override" {
98	match-clients { key "sha224"; };
99	dnssec-policy "default";
100
101	/* Inherit dnssec-policy 'test' */
102	zone "inherit.override.signed" {
103		type primary;
104		file "inherit.override.signed.db";
105		inline-signing yes;
106	};
107
108	/* Override dnssec-policy */
109	zone "override.override.signed" {
110		type primary;
111		file "override.override.signed.db";
112		inline-signing yes;
113		dnssec-policy "test";
114	};
115
116	/* Unset dnssec-policy */
117	zone "none.override.signed" {
118		type primary;
119		file "none.override.signed.db";
120		dnssec-policy "none";
121	};
122};
123
124view "none" {
125	match-clients { key "sha256"; };
126	dnssec-policy "none";
127
128	/* Inherit dnssec-policy 'none' */
129	zone "inherit.none.signed" {
130		type primary;
131		file "inherit.none.signed.db";
132	};
133
134	/* Override dnssec-policy */
135	zone "override.none.signed" {
136		type primary;
137		file "override.none.signed.db";
138		inline-signing yes;
139		dnssec-policy "test";
140	};
141
142	/* Unset dnssec-policy */
143	zone "none.none.signed" {
144		type primary;
145		file "none.none.signed.db";
146		dnssec-policy "none";
147	};
148};
149
150view "example1" {
151	match-clients { key "keyforview1"; };
152
153	allow-update { any; };
154
155	zone "example.net" {
156		type primary;
157		file "example1.db";
158	};
159};
160
161view "example2" {
162	match-clients { key "keyforview2"; };
163
164	zone "example.net" {
165		type primary;
166		file "example2.db";
167		inline-signing yes;
168	};
169};
170
171view "example3" {
172	match-clients { key "keyforview3"; };
173	zone "example.net" {
174		in-view example2;
175	};
176};
177