1#!/bin/sh
2#
3# Copyright (C) 2012, 2014  Internet Systems Consortium, Inc. ("ISC")
4#
5# Permission to use, copy, modify, and/or distribute this software for any
6# purpose with or without fee is hereby granted, provided that the above
7# copyright notice and this permission notice appear in all copies.
8#
9# THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10# REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11# AND FITNESS.  IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12# INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13# LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14# OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15# PERFORMANCE OF THIS SOFTWARE.
16
17SYSTEMTESTTOP=../..
18. $SYSTEMTESTTOP/conf.sh
19
20zone=.
21infile=root.db.in
22zonefile=root.db
23
24cp ../ns2/dsset-example.in dsset-example.
25
26keyname=`$KEYGEN -q -r $RANDFILE -a RSASHA1 -b 1024 -n zone $zone`
27
28cat $infile $keyname.key > $zonefile
29
30$SIGNER -P -g -r $RANDFILE -o $zone $zonefile > /dev/null
31
32# Configure the resolving server with a trusted key.
33cat $keyname.key | grep -v '^; ' | $PERL -n -e '
34local ($dn, $class, $type, $flags, $proto, $alg, @rest) = split;
35local $key = join("", @rest);
36print <<EOF
37trusted-keys {
38    "$dn" $flags $proto $alg "$key";
39};
40EOF
41' > trusted.conf
42
43cp trusted.conf ../ns2/trusted.conf
44cp trusted.conf ../ns3/trusted.conf
45
46cd ../ns2 && $SHELL -e ./sign.sh
47