1999-01-19 06:32:53 +00:00
|
|
|
/*
|
2000-02-03 22:29:57 +00:00
|
|
|
* Copyright (C) 1999, 2000 Internet Software Consortium.
|
2000-08-01 01:33:37 +00:00
|
|
|
*
|
1999-01-19 06:32:53 +00:00
|
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
2000-08-01 01:33:37 +00:00
|
|
|
*
|
2000-07-27 09:55:03 +00:00
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM
|
|
|
|
* DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL
|
|
|
|
* INTERNET SOFTWARE CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT,
|
|
|
|
* INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
|
|
|
|
* FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
|
|
|
|
* NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
|
|
|
|
* WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
1999-01-19 06:32:53 +00:00
|
|
|
*/
|
|
|
|
|
2000-12-05 01:41:29 +00:00
|
|
|
/* $Id: server.c,v 1.268 2000/12/05 01:41:29 gson Exp $ */
|
2000-06-22 22:00:42 +00:00
|
|
|
|
1999-01-19 06:32:53 +00:00
|
|
|
#include <config.h>
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
2000-01-21 23:55:12 +00:00
|
|
|
#include <isc/app.h>
|
2000-04-10 21:31:41 +00:00
|
|
|
#include <isc/base64.h>
|
2000-01-21 23:55:12 +00:00
|
|
|
#include <isc/dir.h>
|
2000-06-09 22:33:52 +00:00
|
|
|
#include <isc/entropy.h>
|
2000-09-07 18:37:38 +00:00
|
|
|
#include <isc/file.h>
|
2000-05-08 14:38:29 +00:00
|
|
|
#include <isc/lex.h>
|
2000-11-15 00:19:49 +00:00
|
|
|
#include <isc/print.h>
|
|
|
|
#include <isc/resource.h>
|
2000-11-08 18:58:02 +00:00
|
|
|
#include <isc/stdio.h>
|
2000-05-09 15:02:20 +00:00
|
|
|
#include <isc/string.h>
|
2000-01-21 23:55:12 +00:00
|
|
|
#include <isc/task.h>
|
1999-01-19 06:32:53 +00:00
|
|
|
#include <isc/timer.h>
|
1999-12-16 22:24:22 +00:00
|
|
|
#include <isc/util.h>
|
1999-01-19 06:32:53 +00:00
|
|
|
|
1999-12-02 22:38:34 +00:00
|
|
|
#include <dns/cache.h>
|
1999-10-13 17:50:21 +00:00
|
|
|
#include <dns/confparser.h>
|
2000-01-21 23:55:12 +00:00
|
|
|
#include <dns/db.h>
|
2000-01-26 19:25:22 +00:00
|
|
|
#include <dns/dispatch.h>
|
2000-08-24 22:15:40 +00:00
|
|
|
#include <dns/forward.h>
|
2000-01-21 23:55:12 +00:00
|
|
|
#include <dns/journal.h>
|
2000-04-10 21:31:41 +00:00
|
|
|
#include <dns/keytable.h>
|
2000-09-05 03:35:24 +00:00
|
|
|
#include <dns/master.h>
|
2000-05-08 14:38:29 +00:00
|
|
|
#include <dns/peer.h>
|
2000-11-30 20:47:53 +00:00
|
|
|
#include <dns/rdataclass.h>
|
2000-04-10 21:31:41 +00:00
|
|
|
#include <dns/rdatastruct.h>
|
2000-01-31 19:59:11 +00:00
|
|
|
#include <dns/resolver.h>
|
2000-01-22 01:59:02 +00:00
|
|
|
#include <dns/rootns.h>
|
2000-12-01 23:49:59 +00:00
|
|
|
#include <dns/stats.h>
|
2000-05-08 14:38:29 +00:00
|
|
|
#include <dns/tkey.h>
|
1999-08-05 22:14:43 +00:00
|
|
|
#include <dns/view.h>
|
1999-10-13 17:50:21 +00:00
|
|
|
#include <dns/zone.h>
|
2000-10-12 21:52:00 +00:00
|
|
|
#include <dns/zt.h>
|
1999-01-19 06:32:53 +00:00
|
|
|
|
2000-06-07 01:44:33 +00:00
|
|
|
#include <dst/dst.h>
|
|
|
|
|
2000-01-18 18:09:47 +00:00
|
|
|
#include <named/client.h>
|
2000-01-13 23:32:41 +00:00
|
|
|
#include <named/interfacemgr.h>
|
1999-10-22 19:35:19 +00:00
|
|
|
#include <named/log.h>
|
2000-02-28 18:38:44 +00:00
|
|
|
#include <named/logconf.h>
|
2000-10-04 23:19:01 +00:00
|
|
|
#include <named/lwresd.h>
|
2000-07-10 22:02:38 +00:00
|
|
|
#include <named/omapi.h>
|
2000-01-28 20:09:49 +00:00
|
|
|
#include <named/os.h>
|
1999-07-24 01:16:38 +00:00
|
|
|
#include <named/server.h>
|
2000-11-27 19:42:38 +00:00
|
|
|
#include <named/tkeyconf.h>
|
|
|
|
#include <named/tsigconf.h>
|
|
|
|
#include <named/zoneconf.h>
|
1999-01-19 06:32:53 +00:00
|
|
|
|
2000-01-21 23:55:12 +00:00
|
|
|
/*
|
|
|
|
* Check an operation for failure. Assumes that the function
|
|
|
|
* using it has a 'result' variable and a 'cleanup' label.
|
|
|
|
*/
|
|
|
|
#define CHECK(op) \
|
|
|
|
do { result = (op); \
|
|
|
|
if (result != ISC_R_SUCCESS) goto cleanup; \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
#define CHECKM(op, msg) \
|
|
|
|
do { result = (op); \
|
|
|
|
if (result != ISC_R_SUCCESS) { \
|
|
|
|
isc_log_write(ns_g_lctx, \
|
|
|
|
NS_LOGCATEGORY_GENERAL, \
|
|
|
|
NS_LOGMODULE_SERVER, \
|
|
|
|
ISC_LOG_ERROR, \
|
|
|
|
"%s: %s", msg, \
|
|
|
|
isc_result_totext(result)); \
|
|
|
|
goto cleanup; \
|
|
|
|
} \
|
|
|
|
} while (0) \
|
|
|
|
|
|
|
|
#define CHECKFATAL(op, msg) \
|
|
|
|
do { result = (op); \
|
|
|
|
if (result != ISC_R_SUCCESS) \
|
|
|
|
fatal(msg, result); \
|
|
|
|
} while (0) \
|
|
|
|
|
1999-10-15 01:51:48 +00:00
|
|
|
typedef struct {
|
|
|
|
isc_mem_t * mctx;
|
|
|
|
dns_viewlist_t viewlist;
|
2000-11-27 19:42:38 +00:00
|
|
|
ns_aclconfctx_t *aclconf;
|
1999-10-15 01:51:48 +00:00
|
|
|
} ns_load_t;
|
1999-10-13 17:50:21 +00:00
|
|
|
|
2000-06-01 18:49:22 +00:00
|
|
|
static void
|
|
|
|
fatal(const char *msg, isc_result_t result);
|
|
|
|
|
|
|
|
static void
|
|
|
|
ns_server_reload(isc_task_t *task, isc_event_t *event);
|
2000-01-26 17:35:16 +00:00
|
|
|
|
2000-01-25 21:21:05 +00:00
|
|
|
static isc_result_t
|
|
|
|
ns_listenelt_fromconfig(dns_c_lstnon_t *celt, dns_c_ctx_t *cctx,
|
2000-11-27 19:42:38 +00:00
|
|
|
ns_aclconfctx_t *actx,
|
2000-01-25 21:21:05 +00:00
|
|
|
isc_mem_t *mctx, ns_listenelt_t **target);
|
|
|
|
static isc_result_t
|
|
|
|
ns_listenlist_fromconfig(dns_c_lstnlist_t *clist, dns_c_ctx_t *cctx,
|
2000-11-27 19:42:38 +00:00
|
|
|
ns_aclconfctx_t *actx,
|
2000-01-25 21:21:05 +00:00
|
|
|
isc_mem_t *mctx, ns_listenlist_t **target);
|
2000-01-21 23:55:12 +00:00
|
|
|
|
2000-08-24 22:15:40 +00:00
|
|
|
static isc_result_t
|
|
|
|
configure_forward(dns_c_ctx_t *cctx, dns_c_zone_t *czone, dns_c_view_t *cview,
|
|
|
|
dns_view_t *view, dns_name_t *origin,
|
|
|
|
dns_c_iplist_t *forwarders);
|
|
|
|
|
2000-04-06 17:31:33 +00:00
|
|
|
/*
|
|
|
|
* Configure a single view ACL at '*aclp'. Get its configuration by
|
|
|
|
* calling 'getvcacl' (for per-view configuration) and maybe 'getscacl'
|
|
|
|
* (for a global default).
|
|
|
|
*/
|
|
|
|
static isc_result_t
|
2000-08-01 01:33:37 +00:00
|
|
|
configure_view_acl(dns_c_view_t *cview,
|
2000-04-06 17:31:33 +00:00
|
|
|
dns_c_ctx_t *cctx,
|
2000-11-27 19:42:38 +00:00
|
|
|
ns_aclconfctx_t *actx, isc_mem_t *mctx,
|
2000-04-06 17:31:33 +00:00
|
|
|
isc_result_t (*getvcacl)
|
|
|
|
(dns_c_view_t *, dns_c_ipmatchlist_t **),
|
|
|
|
isc_result_t (*getscacl)
|
|
|
|
(dns_c_ctx_t *, dns_c_ipmatchlist_t **),
|
|
|
|
dns_acl_t **aclp)
|
|
|
|
{
|
|
|
|
isc_result_t result;
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-04-06 17:31:33 +00:00
|
|
|
dns_c_ipmatchlist_t *cacl = NULL;
|
|
|
|
if (*aclp != NULL)
|
|
|
|
dns_acl_detach(aclp);
|
|
|
|
if (getvcacl != NULL && cview != NULL)
|
2000-07-10 11:35:02 +00:00
|
|
|
(void)(*getvcacl)(cview, &cacl);
|
2000-04-06 17:31:33 +00:00
|
|
|
if (cacl == NULL && getscacl != NULL)
|
2000-07-10 11:35:02 +00:00
|
|
|
(void)(*getscacl)(cctx, &cacl);
|
2000-04-06 17:31:33 +00:00
|
|
|
if (cacl == NULL) {
|
2000-07-10 11:35:02 +00:00
|
|
|
/*
|
|
|
|
* No value available. *aclp == NULL.
|
|
|
|
*/
|
2000-04-06 17:31:33 +00:00
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
2000-11-27 19:42:38 +00:00
|
|
|
result = ns_acl_fromconfig(cacl, cctx, actx, mctx, aclp);
|
2000-04-06 17:31:33 +00:00
|
|
|
|
|
|
|
dns_c_ipmatchlist_detach(&cacl);
|
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
2000-11-15 01:16:30 +00:00
|
|
|
static isc_result_t
|
|
|
|
configure_view_dnsseckey(dns_c_view_t *cview, dns_c_tkey_t *ckey,
|
|
|
|
dns_keytable_t *keytable, isc_mem_t *mctx)
|
|
|
|
{
|
|
|
|
dns_rdataclass_t viewclass;
|
|
|
|
dns_rdata_key_t keystruct;
|
|
|
|
isc_int32_t flags, proto, alg;
|
|
|
|
unsigned char keydata[4096];
|
|
|
|
isc_buffer_t keydatabuf;
|
|
|
|
unsigned char rrdata[4096];
|
|
|
|
isc_buffer_t rrdatabuf;
|
|
|
|
isc_region_t r;
|
|
|
|
dns_fixedname_t fkeyname;
|
|
|
|
dns_name_t *keyname;
|
|
|
|
isc_buffer_t namebuf;
|
|
|
|
isc_result_t result;
|
|
|
|
dst_key_t *dstkey = NULL;
|
|
|
|
|
|
|
|
if (cview == NULL)
|
|
|
|
viewclass = dns_rdataclass_in;
|
|
|
|
else
|
|
|
|
CHECK(dns_c_view_getviewclass(cview,
|
|
|
|
&viewclass));
|
|
|
|
keystruct.common.rdclass = viewclass;
|
|
|
|
keystruct.common.rdtype = dns_rdatatype_key;
|
|
|
|
/*
|
|
|
|
* The key data in keystruct is not
|
|
|
|
* dynamically allocated.
|
|
|
|
*/
|
|
|
|
keystruct.mctx = NULL;
|
|
|
|
|
|
|
|
ISC_LINK_INIT(&keystruct.common, link);
|
|
|
|
|
|
|
|
flags = ckey->pubkey->flags;
|
|
|
|
proto = ckey->pubkey->protocol;
|
|
|
|
alg = ckey->pubkey->algorithm;
|
|
|
|
if (flags < 0 || flags > 0xffff)
|
|
|
|
CHECKM(ISC_R_RANGE, "key flags");
|
|
|
|
if (proto < 0 || proto > 0xff)
|
|
|
|
CHECKM(ISC_R_RANGE, "key protocol");
|
|
|
|
if (alg < 0 || alg > 0xff)
|
|
|
|
CHECKM(ISC_R_RANGE, "key algorithm");
|
|
|
|
keystruct.flags = flags;
|
|
|
|
keystruct.protocol = proto;
|
|
|
|
keystruct.algorithm = alg;
|
|
|
|
|
|
|
|
isc_buffer_init(&keydatabuf, keydata, sizeof(keydata));
|
|
|
|
isc_buffer_init(&rrdatabuf, rrdata, sizeof(rrdata));
|
|
|
|
|
|
|
|
CHECK(isc_base64_decodestring(mctx, ckey->pubkey->key,
|
|
|
|
&keydatabuf));
|
|
|
|
isc_buffer_usedregion(&keydatabuf, &r);
|
|
|
|
keystruct.datalen = r.length;
|
|
|
|
keystruct.data = r.base;
|
|
|
|
|
|
|
|
CHECK(dns_rdata_fromstruct(NULL,
|
|
|
|
keystruct.common.rdclass,
|
|
|
|
keystruct.common.rdtype,
|
|
|
|
&keystruct, &rrdatabuf));
|
|
|
|
dns_fixedname_init(&fkeyname);
|
|
|
|
keyname = dns_fixedname_name(&fkeyname);
|
|
|
|
isc_buffer_init(&namebuf, ckey->domain,
|
|
|
|
strlen(ckey->domain));
|
|
|
|
isc_buffer_add(&namebuf, strlen(ckey->domain));
|
|
|
|
CHECK(dns_name_fromtext(keyname, &namebuf,
|
|
|
|
dns_rootname, ISC_FALSE,
|
|
|
|
NULL));
|
|
|
|
CHECK(dst_key_fromdns(keyname, viewclass, &rrdatabuf,
|
|
|
|
mctx, &dstkey));
|
|
|
|
|
|
|
|
CHECK(dns_keytable_add(keytable, &dstkey));
|
|
|
|
INSIST(dstkey == NULL);
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL,
|
|
|
|
NS_LOGMODULE_SERVER, ISC_LOG_ERROR,
|
|
|
|
"configuring trusted key for '%s': "
|
|
|
|
"%s", ckey->domain,
|
|
|
|
isc_result_totext(result));
|
|
|
|
result = ISC_R_FAILURE;
|
|
|
|
|
|
|
|
if (dstkey != NULL)
|
|
|
|
dst_key_free(&dstkey);
|
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
2000-04-10 21:31:41 +00:00
|
|
|
/*
|
2000-05-25 21:43:18 +00:00
|
|
|
* Configure DNSSEC keys for a view. Currently used only for
|
|
|
|
* the security roots.
|
2000-08-01 01:33:37 +00:00
|
|
|
*
|
2000-05-25 21:43:18 +00:00
|
|
|
* The per-view configuration values and their server-global
|
2000-08-01 01:33:37 +00:00
|
|
|
* defaults are are read from 'cview' and 'cctx' using
|
2000-05-25 21:43:18 +00:00
|
|
|
* the function 'cgetv' and 'cgets', respectively.
|
|
|
|
* The variable to be configured is '*target'.
|
2000-04-10 21:31:41 +00:00
|
|
|
*/
|
|
|
|
static isc_result_t
|
2000-05-25 21:43:18 +00:00
|
|
|
configure_view_dnsseckeys(dns_c_view_t *cview,
|
|
|
|
dns_c_ctx_t *cctx,
|
2000-04-10 21:31:41 +00:00
|
|
|
isc_mem_t *mctx,
|
2000-05-25 21:43:18 +00:00
|
|
|
isc_result_t (*cgetv)
|
|
|
|
(dns_c_view_t *, dns_c_tkeylist_t **),
|
|
|
|
isc_result_t (*cgets)
|
2000-04-10 21:31:41 +00:00
|
|
|
(dns_c_ctx_t *, dns_c_tkeylist_t **),
|
|
|
|
dns_keytable_t **target)
|
|
|
|
{
|
|
|
|
isc_result_t result;
|
|
|
|
dns_c_tkeylist_t *ckeys = NULL;
|
|
|
|
dns_c_tkey_t *ckey;
|
|
|
|
dns_keytable_t *keytable = NULL;
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-04-10 21:31:41 +00:00
|
|
|
CHECK(dns_keytable_create(mctx, &keytable));
|
|
|
|
|
2000-05-25 21:43:18 +00:00
|
|
|
result = ISC_R_FAILURE;
|
|
|
|
if (cgetv != NULL && cview != NULL)
|
|
|
|
result = (*cgetv)(cview, &ckeys);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
result = (*cgets)(cctx, &ckeys);
|
|
|
|
|
2000-04-11 17:52:57 +00:00
|
|
|
if (result == ISC_R_SUCCESS) {
|
|
|
|
for (ckey = ISC_LIST_HEAD(ckeys->tkeylist);
|
|
|
|
ckey != NULL;
|
2000-11-15 01:16:30 +00:00
|
|
|
ckey = ISC_LIST_NEXT(ckey, next)) {
|
|
|
|
CHECK(configure_view_dnsseckey(cview, ckey,
|
|
|
|
keytable, mctx));
|
2000-04-11 17:52:57 +00:00
|
|
|
}
|
|
|
|
} else if (result != ISC_R_NOTFOUND)
|
|
|
|
goto cleanup;
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-04-10 21:31:41 +00:00
|
|
|
dns_keytable_detach(target);
|
|
|
|
*target = keytable; /* Transfer ownership. */
|
|
|
|
keytable = NULL;
|
|
|
|
result = ISC_R_SUCCESS;
|
2000-11-15 01:16:30 +00:00
|
|
|
|
2000-04-10 21:31:41 +00:00
|
|
|
cleanup:
|
|
|
|
return (result);
|
|
|
|
}
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-04-10 21:31:41 +00:00
|
|
|
|
Merge the mlg-20000518 branch onto the mainline. Change summary:
dns_dispatch_create() no longer exists. dns_dispatch_createtcp()
and dns_dispatch_getudp() are the replacements. _createtcp() takes
a bound, connected TCP socket, while _getudp() will search for
a sharable UDP socket, and if found, attach to it and return a
pointer to it. If one is not found, it will create a udp socket,
bind it to a supplied local address, and create a new dispatcher
around it.
dns_dispatch_remove{request,response}() no longer take the dispatch
as an argument.
query-source can now be set per view.
The dispatch manager holds onto three memory pools, one for
allocating dispatchers from, one for events, and one for
requests/replies. The free list on these pools is hard-coded,
but set to 1024. This keeps us from having to dig into the
isc_mem_t the pools draw from as often.
dns_resolver_create() and dns_view_createresolver() require that
valid dispatchers be passed in; dispatchers are no longer created
for the caller.
2000-05-19 21:46:46 +00:00
|
|
|
/*
|
|
|
|
* Get a dispatch appropriate for the resolver of a given view.
|
|
|
|
*/
|
|
|
|
static isc_result_t
|
|
|
|
get_view_querysource_dispatch(dns_c_ctx_t *cctx, dns_c_view_t *cview,
|
|
|
|
int af, dns_dispatch_t **dispatchp)
|
|
|
|
{
|
|
|
|
isc_result_t result;
|
|
|
|
dns_dispatch_t *disp;
|
|
|
|
isc_sockaddr_t sa;
|
|
|
|
unsigned int attrs, attrmask;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Make compiler happy.
|
|
|
|
*/
|
|
|
|
result = ISC_R_FAILURE;
|
|
|
|
|
|
|
|
switch (af) {
|
|
|
|
case AF_INET:
|
|
|
|
result = ISC_R_NOTFOUND;
|
|
|
|
if (cview != NULL)
|
|
|
|
result = dns_c_view_getquerysource(cview, &sa);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
2000-05-24 05:10:00 +00:00
|
|
|
result = dns_c_ctx_getquerysource(cctx, &sa);
|
Merge the mlg-20000518 branch onto the mainline. Change summary:
dns_dispatch_create() no longer exists. dns_dispatch_createtcp()
and dns_dispatch_getudp() are the replacements. _createtcp() takes
a bound, connected TCP socket, while _getudp() will search for
a sharable UDP socket, and if found, attach to it and return a
pointer to it. If one is not found, it will create a udp socket,
bind it to a supplied local address, and create a new dispatcher
around it.
dns_dispatch_remove{request,response}() no longer take the dispatch
as an argument.
query-source can now be set per view.
The dispatch manager holds onto three memory pools, one for
allocating dispatchers from, one for events, and one for
requests/replies. The free list on these pools is hard-coded,
but set to 1024. This keeps us from having to dig into the
isc_mem_t the pools draw from as often.
dns_resolver_create() and dns_view_createresolver() require that
valid dispatchers be passed in; dispatchers are no longer created
for the caller.
2000-05-19 21:46:46 +00:00
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
isc_sockaddr_any(&sa);
|
|
|
|
break;
|
|
|
|
case AF_INET6:
|
|
|
|
result = ISC_R_NOTFOUND;
|
|
|
|
if (cview != NULL)
|
|
|
|
result = dns_c_view_getquerysourcev6(cview, &sa);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
result = dns_c_ctx_getquerysourcev6(cctx, &sa);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
2000-08-01 01:33:37 +00:00
|
|
|
isc_sockaddr_any6(&sa);
|
Merge the mlg-20000518 branch onto the mainline. Change summary:
dns_dispatch_create() no longer exists. dns_dispatch_createtcp()
and dns_dispatch_getudp() are the replacements. _createtcp() takes
a bound, connected TCP socket, while _getudp() will search for
a sharable UDP socket, and if found, attach to it and return a
pointer to it. If one is not found, it will create a udp socket,
bind it to a supplied local address, and create a new dispatcher
around it.
dns_dispatch_remove{request,response}() no longer take the dispatch
as an argument.
query-source can now be set per view.
The dispatch manager holds onto three memory pools, one for
allocating dispatchers from, one for events, and one for
requests/replies. The free list on these pools is hard-coded,
but set to 1024. This keeps us from having to dig into the
isc_mem_t the pools draw from as often.
dns_resolver_create() and dns_view_createresolver() require that
valid dispatchers be passed in; dispatchers are no longer created
for the caller.
2000-05-19 21:46:46 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
INSIST(0);
|
|
|
|
}
|
2000-08-01 01:33:37 +00:00
|
|
|
|
Merge the mlg-20000518 branch onto the mainline. Change summary:
dns_dispatch_create() no longer exists. dns_dispatch_createtcp()
and dns_dispatch_getudp() are the replacements. _createtcp() takes
a bound, connected TCP socket, while _getudp() will search for
a sharable UDP socket, and if found, attach to it and return a
pointer to it. If one is not found, it will create a udp socket,
bind it to a supplied local address, and create a new dispatcher
around it.
dns_dispatch_remove{request,response}() no longer take the dispatch
as an argument.
query-source can now be set per view.
The dispatch manager holds onto three memory pools, one for
allocating dispatchers from, one for events, and one for
requests/replies. The free list on these pools is hard-coded,
but set to 1024. This keeps us from having to dig into the
isc_mem_t the pools draw from as often.
dns_resolver_create() and dns_view_createresolver() require that
valid dispatchers be passed in; dispatchers are no longer created
for the caller.
2000-05-19 21:46:46 +00:00
|
|
|
INSIST(isc_sockaddr_pf(&sa) == af);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we don't support this address family, we're done!
|
|
|
|
*/
|
|
|
|
switch (af) {
|
|
|
|
case AF_INET:
|
|
|
|
result = isc_net_probeipv4();
|
|
|
|
break;
|
|
|
|
case AF_INET6:
|
|
|
|
result = isc_net_probeipv6();
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
INSIST(0);
|
|
|
|
}
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Try to find a dispatcher that we can share.
|
|
|
|
*/
|
|
|
|
attrs = 0;
|
|
|
|
attrs |= DNS_DISPATCHATTR_UDP;
|
|
|
|
switch (af) {
|
|
|
|
case AF_INET:
|
|
|
|
attrs |= DNS_DISPATCHATTR_IPV4;
|
|
|
|
break;
|
|
|
|
case AF_INET6:
|
|
|
|
attrs |= DNS_DISPATCHATTR_IPV6;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
attrmask = 0;
|
|
|
|
attrmask |= DNS_DISPATCHATTR_UDP;
|
|
|
|
attrmask |= DNS_DISPATCHATTR_TCP;
|
|
|
|
attrmask |= DNS_DISPATCHATTR_IPV4;
|
|
|
|
attrmask |= DNS_DISPATCHATTR_IPV6;
|
|
|
|
|
|
|
|
disp = NULL;
|
|
|
|
result = dns_dispatch_getudp(ns_g_dispatchmgr, ns_g_socketmgr,
|
|
|
|
ns_g_taskmgr, &sa, 4096,
|
|
|
|
1000, 32768, 16411, 16433,
|
|
|
|
attrs, attrmask, &disp);
|
2000-06-13 16:33:19 +00:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL,
|
2000-11-15 01:16:30 +00:00
|
|
|
NS_LOGMODULE_SERVER, ISC_LOG_ERROR,
|
2000-06-13 16:33:19 +00:00
|
|
|
"could not get query source dispatcher");
|
Merge the mlg-20000518 branch onto the mainline. Change summary:
dns_dispatch_create() no longer exists. dns_dispatch_createtcp()
and dns_dispatch_getudp() are the replacements. _createtcp() takes
a bound, connected TCP socket, while _getudp() will search for
a sharable UDP socket, and if found, attach to it and return a
pointer to it. If one is not found, it will create a udp socket,
bind it to a supplied local address, and create a new dispatcher
around it.
dns_dispatch_remove{request,response}() no longer take the dispatch
as an argument.
query-source can now be set per view.
The dispatch manager holds onto three memory pools, one for
allocating dispatchers from, one for events, and one for
requests/replies. The free list on these pools is hard-coded,
but set to 1024. This keeps us from having to dig into the
isc_mem_t the pools draw from as often.
dns_resolver_create() and dns_view_createresolver() require that
valid dispatchers be passed in; dispatchers are no longer created
for the caller.
2000-05-19 21:46:46 +00:00
|
|
|
return (result);
|
2000-06-13 16:33:19 +00:00
|
|
|
}
|
Merge the mlg-20000518 branch onto the mainline. Change summary:
dns_dispatch_create() no longer exists. dns_dispatch_createtcp()
and dns_dispatch_getudp() are the replacements. _createtcp() takes
a bound, connected TCP socket, while _getudp() will search for
a sharable UDP socket, and if found, attach to it and return a
pointer to it. If one is not found, it will create a udp socket,
bind it to a supplied local address, and create a new dispatcher
around it.
dns_dispatch_remove{request,response}() no longer take the dispatch
as an argument.
query-source can now be set per view.
The dispatch manager holds onto three memory pools, one for
allocating dispatchers from, one for events, and one for
requests/replies. The free list on these pools is hard-coded,
but set to 1024. This keeps us from having to dig into the
isc_mem_t the pools draw from as often.
dns_resolver_create() and dns_view_createresolver() require that
valid dispatchers be passed in; dispatchers are no longer created
for the caller.
2000-05-19 21:46:46 +00:00
|
|
|
|
|
|
|
*dispatchp = disp;
|
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
2000-01-21 19:24:01 +00:00
|
|
|
/*
|
2000-04-07 17:08:12 +00:00
|
|
|
* Configure 'view' according to 'cview', taking defaults from 'cctx'
|
2000-08-24 19:02:06 +00:00
|
|
|
* where values are missing in cview.
|
2000-04-07 17:08:12 +00:00
|
|
|
*
|
2000-08-24 19:02:06 +00:00
|
|
|
* When configuring the default view, cview will be NULL and the
|
2000-10-04 23:19:01 +00:00
|
|
|
* global defaults in cctx used exclusively.
|
2000-01-21 19:24:01 +00:00
|
|
|
*/
|
1999-10-15 01:51:48 +00:00
|
|
|
static isc_result_t
|
2000-04-06 17:31:33 +00:00
|
|
|
configure_view(dns_view_t *view, dns_c_ctx_t *cctx, dns_c_view_t *cview,
|
2000-11-27 19:42:38 +00:00
|
|
|
isc_mem_t *mctx, ns_aclconfctx_t *actx)
|
1999-10-15 01:51:48 +00:00
|
|
|
{
|
2000-03-02 23:47:39 +00:00
|
|
|
dns_cache_t *cache = NULL;
|
1999-10-15 01:51:48 +00:00
|
|
|
isc_result_t result;
|
2000-06-05 09:17:14 +00:00
|
|
|
isc_uint32_t cleaning_interval;
|
2000-08-31 12:15:17 +00:00
|
|
|
isc_uint32_t max_cache_size;
|
2000-11-08 03:53:16 +00:00
|
|
|
isc_uint32_t lame_ttl;
|
2000-01-21 20:24:49 +00:00
|
|
|
dns_tsig_keyring_t *ring;
|
2000-01-31 19:59:11 +00:00
|
|
|
dns_c_iplist_t *forwarders;
|
2000-03-02 23:47:39 +00:00
|
|
|
dns_view_t *pview = NULL; /* Production view */
|
2000-04-12 01:38:26 +00:00
|
|
|
isc_mem_t *cmctx;
|
Merge the mlg-20000518 branch onto the mainline. Change summary:
dns_dispatch_create() no longer exists. dns_dispatch_createtcp()
and dns_dispatch_getudp() are the replacements. _createtcp() takes
a bound, connected TCP socket, while _getudp() will search for
a sharable UDP socket, and if found, attach to it and return a
pointer to it. If one is not found, it will create a udp socket,
bind it to a supplied local address, and create a new dispatcher
around it.
dns_dispatch_remove{request,response}() no longer take the dispatch
as an argument.
query-source can now be set per view.
The dispatch manager holds onto three memory pools, one for
allocating dispatchers from, one for events, and one for
requests/replies. The free list on these pools is hard-coded,
but set to 1024. This keeps us from having to dig into the
isc_mem_t the pools draw from as often.
dns_resolver_create() and dns_view_createresolver() require that
valid dispatchers be passed in; dispatchers are no longer created
for the caller.
2000-05-19 21:46:46 +00:00
|
|
|
dns_dispatch_t *dispatch4 = NULL;
|
|
|
|
dns_dispatch_t *dispatch6 = NULL;
|
2000-06-05 19:10:13 +00:00
|
|
|
in_port_t port;
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-01-21 19:24:01 +00:00
|
|
|
REQUIRE(DNS_VIEW_VALID(view));
|
1999-08-05 22:14:43 +00:00
|
|
|
|
2000-04-12 01:38:26 +00:00
|
|
|
cmctx = NULL;
|
2000-01-31 19:59:11 +00:00
|
|
|
|
2000-01-27 01:00:16 +00:00
|
|
|
RWLOCK(&view->conflock, isc_rwlocktype_write);
|
2000-06-05 19:10:13 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Set the view's port number for outgoing queries.
|
|
|
|
*/
|
|
|
|
result = dns_c_ctx_getport(cctx, &port);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
port = 53;
|
|
|
|
dns_view_setdstport(view, port);
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-09-05 03:35:24 +00:00
|
|
|
/*
|
|
|
|
* Attach load manager to view.
|
|
|
|
*/
|
|
|
|
dns_view_setloadmgr(view, ns_g_server->loadmgr);
|
|
|
|
|
1999-10-15 01:51:48 +00:00
|
|
|
/*
|
2000-03-02 23:47:39 +00:00
|
|
|
* Configure the view's cache. Try to reuse an existing
|
|
|
|
* cache if possible, otherwise create a new cache.
|
|
|
|
* Note that the ADB is not preserved in either case.
|
2000-08-01 01:33:37 +00:00
|
|
|
*
|
|
|
|
* XXX Determining when it is safe to reuse a cache is
|
2000-03-02 23:47:39 +00:00
|
|
|
* tricky. When the view's configuration changes, the cached
|
|
|
|
* data may become invalid because it reflects our old
|
|
|
|
* view of the world. As more view attributes become
|
|
|
|
* configurable, we will have to add code here to check
|
|
|
|
* whether they have changed in ways that could
|
|
|
|
* invalidate the cache.
|
1999-10-15 01:51:48 +00:00
|
|
|
*/
|
2000-03-02 23:47:39 +00:00
|
|
|
result = dns_viewlist_find(&ns_g_server->viewlist,
|
|
|
|
view->name, view->rdclass,
|
|
|
|
&pview);
|
|
|
|
if (result != ISC_R_NOTFOUND && result != ISC_R_SUCCESS)
|
|
|
|
goto cleanup;
|
|
|
|
if (pview != NULL) {
|
|
|
|
INSIST(pview->cache != NULL);
|
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL,
|
2000-11-15 01:16:30 +00:00
|
|
|
NS_LOGMODULE_SERVER, ISC_LOG_DEBUG(3),
|
|
|
|
"reusing existing cache");
|
2000-03-02 23:47:39 +00:00
|
|
|
dns_cache_attach(pview->cache, &cache);
|
|
|
|
dns_view_detach(&pview);
|
|
|
|
} else {
|
2000-04-12 01:38:26 +00:00
|
|
|
CHECK(isc_mem_create(0, 0, &cmctx));
|
|
|
|
CHECK(dns_cache_create(cmctx, ns_g_taskmgr, ns_g_timermgr,
|
2000-03-02 23:47:39 +00:00
|
|
|
view->rdclass, "rbt", 0, NULL, &cache));
|
|
|
|
}
|
1999-12-02 22:38:34 +00:00
|
|
|
dns_view_setcache(view, cache);
|
2000-04-07 18:04:24 +00:00
|
|
|
|
|
|
|
result = ISC_R_NOTFOUND;
|
|
|
|
if (cview != NULL)
|
2000-05-08 14:38:29 +00:00
|
|
|
result = dns_c_view_getcleaninterval(cview,
|
|
|
|
&cleaning_interval);
|
2000-04-07 18:04:24 +00:00
|
|
|
if (result != ISC_R_SUCCESS)
|
2000-04-10 22:00:13 +00:00
|
|
|
result = dns_c_ctx_getcleaninterval(cctx, &cleaning_interval);
|
2000-04-07 18:04:24 +00:00
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
cleaning_interval = 3600; /* Default is 1 hour. */
|
1999-12-17 01:02:49 +00:00
|
|
|
dns_cache_setcleaninginterval(cache, cleaning_interval);
|
2000-04-07 18:04:24 +00:00
|
|
|
|
2000-08-31 12:15:17 +00:00
|
|
|
result = ISC_R_NOTFOUND;
|
|
|
|
if (cview != NULL)
|
|
|
|
result = dns_c_view_getmaxcachesize(cview, &max_cache_size);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
result = dns_c_ctx_getmaxcachesize(cctx, &max_cache_size);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
max_cache_size = 0;
|
|
|
|
/*
|
|
|
|
* XXX remove once rbt if fixed
|
|
|
|
*/
|
|
|
|
max_cache_size = 0;
|
|
|
|
dns_cache_setcachesize(cache, max_cache_size);
|
|
|
|
|
1999-12-02 22:38:34 +00:00
|
|
|
dns_cache_detach(&cache);
|
1999-05-03 19:56:23 +00:00
|
|
|
|
1999-10-25 18:59:20 +00:00
|
|
|
/*
|
|
|
|
* XXXRTH Temporary support for loading cache contents.
|
|
|
|
*/
|
|
|
|
if (ns_g_cachefile != NULL) {
|
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL,
|
2000-11-15 01:16:30 +00:00
|
|
|
NS_LOGMODULE_SERVER, ISC_LOG_DEBUG(1),
|
|
|
|
"loading cache '%s'", ns_g_cachefile);
|
2000-10-17 07:22:39 +00:00
|
|
|
/* DNS_R_SEENINCLUDE should be impossible here. */
|
2000-01-21 23:55:12 +00:00
|
|
|
CHECK(dns_db_load(view->cachedb, ns_g_cachefile));
|
1999-10-25 18:59:20 +00:00
|
|
|
}
|
|
|
|
|
1999-10-15 01:51:48 +00:00
|
|
|
/*
|
|
|
|
* Resolver.
|
|
|
|
*
|
2000-01-26 19:25:22 +00:00
|
|
|
* XXXRTH Hardwired number of tasks.
|
1999-10-15 01:51:48 +00:00
|
|
|
*/
|
Merge the mlg-20000518 branch onto the mainline. Change summary:
dns_dispatch_create() no longer exists. dns_dispatch_createtcp()
and dns_dispatch_getudp() are the replacements. _createtcp() takes
a bound, connected TCP socket, while _getudp() will search for
a sharable UDP socket, and if found, attach to it and return a
pointer to it. If one is not found, it will create a udp socket,
bind it to a supplied local address, and create a new dispatcher
around it.
dns_dispatch_remove{request,response}() no longer take the dispatch
as an argument.
query-source can now be set per view.
The dispatch manager holds onto three memory pools, one for
allocating dispatchers from, one for events, and one for
requests/replies. The free list on these pools is hard-coded,
but set to 1024. This keeps us from having to dig into the
isc_mem_t the pools draw from as often.
dns_resolver_create() and dns_view_createresolver() require that
valid dispatchers be passed in; dispatchers are no longer created
for the caller.
2000-05-19 21:46:46 +00:00
|
|
|
CHECK(get_view_querysource_dispatch(cctx, cview, AF_INET,
|
|
|
|
&dispatch4));
|
|
|
|
CHECK(get_view_querysource_dispatch(cctx, cview, AF_INET6,
|
|
|
|
&dispatch6));
|
2000-01-21 23:55:12 +00:00
|
|
|
CHECK(dns_view_createresolver(view, ns_g_taskmgr, 31,
|
|
|
|
ns_g_socketmgr, ns_g_timermgr,
|
2000-05-10 21:34:50 +00:00
|
|
|
0, ns_g_dispatchmgr,
|
Merge the mlg-20000518 branch onto the mainline. Change summary:
dns_dispatch_create() no longer exists. dns_dispatch_createtcp()
and dns_dispatch_getudp() are the replacements. _createtcp() takes
a bound, connected TCP socket, while _getudp() will search for
a sharable UDP socket, and if found, attach to it and return a
pointer to it. If one is not found, it will create a udp socket,
bind it to a supplied local address, and create a new dispatcher
around it.
dns_dispatch_remove{request,response}() no longer take the dispatch
as an argument.
query-source can now be set per view.
The dispatch manager holds onto three memory pools, one for
allocating dispatchers from, one for events, and one for
requests/replies. The free list on these pools is hard-coded,
but set to 1024. This keeps us from having to dig into the
isc_mem_t the pools draw from as often.
dns_resolver_create() and dns_view_createresolver() require that
valid dispatchers be passed in; dispatchers are no longer created
for the caller.
2000-05-19 21:46:46 +00:00
|
|
|
dispatch4, dispatch6));
|
|
|
|
if (dispatch4 != NULL)
|
|
|
|
dns_dispatch_detach(&dispatch4);
|
|
|
|
if (dispatch6 != NULL)
|
|
|
|
dns_dispatch_detach(&dispatch6);
|
1999-08-05 22:14:43 +00:00
|
|
|
|
2000-11-08 03:53:16 +00:00
|
|
|
/*
|
|
|
|
* Set resolver's lame-ttl.
|
|
|
|
*/
|
2000-11-08 18:46:40 +00:00
|
|
|
if (cview != NULL)
|
|
|
|
result = dns_c_view_getlamettl(cview, &lame_ttl);
|
|
|
|
else
|
|
|
|
result = ISC_R_NOTFOUND;
|
2000-11-08 03:53:16 +00:00
|
|
|
if (result == ISC_R_NOTFOUND)
|
|
|
|
result = dns_c_ctx_getlamettl(cctx, &lame_ttl);
|
|
|
|
if (result == ISC_R_NOTFOUND)
|
|
|
|
lame_ttl = 600;
|
|
|
|
if (lame_ttl > 18000)
|
|
|
|
lame_ttl = 18000;
|
|
|
|
dns_resolver_setlamettl(view->resolver, lame_ttl);
|
|
|
|
|
2000-01-31 19:59:11 +00:00
|
|
|
/*
|
|
|
|
* Set resolver forwarding policy.
|
|
|
|
*/
|
2000-04-07 16:23:54 +00:00
|
|
|
if ((cview != NULL &&
|
|
|
|
dns_c_view_getforwarders(cview, &forwarders) == ISC_R_SUCCESS) ||
|
2000-04-07 01:07:07 +00:00
|
|
|
(dns_c_ctx_getforwarders(cctx, &forwarders) == ISC_R_SUCCESS))
|
|
|
|
{
|
2000-08-24 22:15:40 +00:00
|
|
|
result = configure_forward(cctx, NULL, cview, view,
|
|
|
|
dns_rootname, forwarders);
|
2000-02-11 15:29:37 +00:00
|
|
|
dns_c_iplist_detach(&forwarders);
|
2000-01-31 19:59:11 +00:00
|
|
|
}
|
|
|
|
|
1999-10-15 01:51:48 +00:00
|
|
|
/*
|
2000-01-27 01:57:08 +00:00
|
|
|
* We have default hints for class IN if we need them.
|
1999-10-15 01:51:48 +00:00
|
|
|
*/
|
2000-01-27 01:57:08 +00:00
|
|
|
if (view->rdclass == dns_rdataclass_in && view->hints == NULL)
|
2000-04-06 17:31:33 +00:00
|
|
|
dns_view_sethints(view, ns_g_server->in_roothints);
|
1999-08-05 22:14:43 +00:00
|
|
|
|
2000-04-06 17:31:33 +00:00
|
|
|
/*
|
|
|
|
* If we still have no hints, this is a non-IN view with no
|
|
|
|
* "hints zone" configured. That's an error.
|
|
|
|
*/
|
|
|
|
if (view->hints == NULL) {
|
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL,
|
|
|
|
NS_LOGMODULE_SERVER, ISC_LOG_ERROR,
|
2000-04-07 17:08:12 +00:00
|
|
|
"no root hints for view '%s'",
|
|
|
|
cview == NULL ? "<default>" : cview->name);
|
2000-04-06 17:31:33 +00:00
|
|
|
result = ISC_R_FAILURE;
|
|
|
|
goto cleanup;
|
|
|
|
}
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-01-21 20:24:49 +00:00
|
|
|
/*
|
2000-01-21 23:55:12 +00:00
|
|
|
* Configure the view's TSIG keys.
|
2000-01-21 20:24:49 +00:00
|
|
|
*/
|
|
|
|
ring = NULL;
|
2000-11-27 19:42:38 +00:00
|
|
|
CHECK(ns_tsigkeyring_fromconfig(cview, cctx, view->mctx, &ring));
|
2000-01-21 20:24:49 +00:00
|
|
|
dns_view_setkeyring(view, ring);
|
|
|
|
|
2000-02-24 21:12:16 +00:00
|
|
|
/*
|
|
|
|
* Configure the view's peer list.
|
|
|
|
*/
|
|
|
|
{
|
|
|
|
dns_peerlist_t *newpeers = NULL;
|
2000-05-25 22:19:34 +00:00
|
|
|
|
2000-08-01 01:33:37 +00:00
|
|
|
result = ISC_R_NOTFOUND;
|
2000-05-25 22:19:34 +00:00
|
|
|
if (cview != NULL)
|
|
|
|
result = dns_c_view_getpeerlist(cview, &newpeers);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
result = dns_c_ctx_getpeerlist(cctx, &newpeers);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
result = dns_peerlist_new(mctx, &newpeers);
|
|
|
|
CHECK(result);
|
|
|
|
|
2000-02-24 21:12:16 +00:00
|
|
|
dns_peerlist_detach(&view->peers);
|
|
|
|
view->peers = newpeers; /* Transfer ownership. */
|
|
|
|
}
|
2000-04-06 17:31:33 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Configure the "match-clients" ACL.
|
|
|
|
*/
|
2000-08-01 01:33:37 +00:00
|
|
|
CHECK(configure_view_acl(cview, cctx, actx, ns_g_mctx,
|
2000-04-06 17:31:33 +00:00
|
|
|
dns_c_view_getmatchclients, NULL,
|
|
|
|
&view->matchclients));
|
|
|
|
|
2000-04-06 20:25:48 +00:00
|
|
|
/*
|
|
|
|
* Configure other configurable data.
|
|
|
|
*/
|
2000-04-06 23:58:01 +00:00
|
|
|
view->recursion = ISC_TRUE;
|
2000-07-10 11:35:02 +00:00
|
|
|
(void)dns_c_ctx_getrecursion(cctx, &view->recursion);
|
2000-04-06 23:58:01 +00:00
|
|
|
if (cview != NULL)
|
2000-07-10 11:35:02 +00:00
|
|
|
(void)dns_c_view_getrecursion(cview, &view->recursion);
|
2000-04-06 20:25:48 +00:00
|
|
|
|
|
|
|
view->auth_nxdomain = ISC_FALSE; /* Was true in BIND 8 */
|
2000-07-10 11:35:02 +00:00
|
|
|
(void)dns_c_ctx_getauthnxdomain(cctx, &view->auth_nxdomain);
|
2000-04-06 23:58:01 +00:00
|
|
|
if (cview != NULL)
|
2000-07-10 11:35:02 +00:00
|
|
|
(void)dns_c_view_getauthnxdomain(cview, &view->auth_nxdomain);
|
2000-04-06 20:25:48 +00:00
|
|
|
|
2000-06-23 01:08:29 +00:00
|
|
|
result = ISC_R_NOTFOUND;
|
2000-08-01 01:33:37 +00:00
|
|
|
if (cview != NULL)
|
2000-06-23 01:08:29 +00:00
|
|
|
result = dns_c_view_gettransferformat(cview,
|
|
|
|
&view->transfer_format);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
result = dns_c_ctx_gettransferformat(cctx,
|
|
|
|
&view->transfer_format);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
view->transfer_format = dns_many_answers;
|
2000-04-06 23:58:01 +00:00
|
|
|
|
2000-07-31 21:07:07 +00:00
|
|
|
/*
|
|
|
|
* Set sources where additional data, CNAMEs, and DNAMEs may be found.
|
|
|
|
*/
|
|
|
|
result = ISC_R_NOTFOUND;
|
|
|
|
if (cview != NULL)
|
|
|
|
result = dns_c_view_getadditionalfromauth(cview,
|
|
|
|
&view->additionalfromauth);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
result = dns_c_ctx_getadditionalfromauth(cctx,
|
|
|
|
&view->additionalfromauth);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
view->additionalfromauth = ISC_TRUE;
|
|
|
|
|
|
|
|
result = ISC_R_NOTFOUND;
|
|
|
|
if (cview != NULL)
|
|
|
|
result = dns_c_view_getadditionalfromcache(cview,
|
|
|
|
&view->additionalfromcache);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
result = dns_c_ctx_getadditionalfromcache(cctx,
|
|
|
|
&view->additionalfromcache);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
view->additionalfromcache = ISC_TRUE;
|
|
|
|
|
2000-04-06 23:58:01 +00:00
|
|
|
CHECK(configure_view_acl(cview, cctx, actx, ns_g_mctx,
|
|
|
|
dns_c_view_getallowquery,
|
|
|
|
dns_c_ctx_getallowquery,
|
|
|
|
&view->queryacl));
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-04-06 23:58:01 +00:00
|
|
|
CHECK(configure_view_acl(cview, cctx, actx, ns_g_mctx,
|
|
|
|
dns_c_view_getrecursionacl,
|
|
|
|
dns_c_ctx_getallowrecursion,
|
|
|
|
&view->recursionacl));
|
2000-04-07 22:30:43 +00:00
|
|
|
|
2000-11-10 03:41:08 +00:00
|
|
|
CHECK(configure_view_acl(cview, cctx, actx, ns_g_mctx,
|
|
|
|
dns_c_view_getsortlist,
|
|
|
|
dns_c_ctx_getsortlist,
|
|
|
|
&view->sortlist));
|
|
|
|
|
2000-04-07 22:30:43 +00:00
|
|
|
result = ISC_R_NOTFOUND;
|
|
|
|
if (cview != NULL)
|
|
|
|
result = dns_c_view_getrequestixfr(cview, &view->requestixfr);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
result = dns_c_ctx_getrequestixfr(cctx, &view->requestixfr);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
view->requestixfr = ISC_TRUE;
|
|
|
|
|
|
|
|
result = ISC_R_NOTFOUND;
|
|
|
|
if (cview != NULL)
|
|
|
|
result = dns_c_view_getprovideixfr(cview, &view->provideixfr);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
result = dns_c_ctx_getprovideixfr(cctx, &view->provideixfr);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
view->provideixfr = ISC_TRUE;
|
|
|
|
|
2000-04-11 00:37:59 +00:00
|
|
|
/*
|
|
|
|
* For now, there is only one kind of trusted keys, the
|
|
|
|
* "security roots".
|
|
|
|
*/
|
2000-05-25 21:43:18 +00:00
|
|
|
CHECK(configure_view_dnsseckeys(cview, cctx, mctx,
|
2000-06-01 00:21:12 +00:00
|
|
|
dns_c_view_gettrustedkeys,
|
2000-04-10 21:31:41 +00:00
|
|
|
dns_c_ctx_gettrustedkeys,
|
2000-04-11 00:37:59 +00:00
|
|
|
&view->secroots));
|
|
|
|
|
2000-05-26 23:17:56 +00:00
|
|
|
{
|
2000-06-05 09:17:14 +00:00
|
|
|
isc_uint32_t val;
|
2000-05-26 23:17:56 +00:00
|
|
|
result = ISC_R_NOTFOUND;
|
|
|
|
if (cview != NULL)
|
|
|
|
result = dns_c_view_getmaxcachettl(cview, &val);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
result = dns_c_ctx_getmaxcachettl(cctx, &val);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
2000-05-27 00:20:39 +00:00
|
|
|
val = 7 * 24 * 3600;
|
2000-05-26 23:17:56 +00:00
|
|
|
view->maxcachettl = val;
|
|
|
|
}
|
|
|
|
{
|
2000-06-05 09:17:14 +00:00
|
|
|
isc_uint32_t val;
|
2000-05-26 23:17:56 +00:00
|
|
|
result = ISC_R_NOTFOUND;
|
|
|
|
if (cview != NULL)
|
|
|
|
result = dns_c_view_getmaxncachettl(cview, &val);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
result = dns_c_ctx_getmaxncachettl(cctx, &val);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
val = 3 * 3600;
|
|
|
|
if (val > 7 * 24 * 3600)
|
|
|
|
val = 7 * 24 * 3600;
|
|
|
|
view->maxncachettl = val;
|
|
|
|
}
|
|
|
|
|
2000-04-07 22:37:42 +00:00
|
|
|
result = ISC_R_SUCCESS;
|
|
|
|
|
1999-10-15 01:51:48 +00:00
|
|
|
cleanup:
|
2000-01-27 01:00:16 +00:00
|
|
|
RWUNLOCK(&view->conflock, isc_rwlocktype_write);
|
2000-01-31 19:59:11 +00:00
|
|
|
|
2000-04-12 01:38:26 +00:00
|
|
|
if (cmctx != NULL)
|
|
|
|
isc_mem_detach(&cmctx);
|
|
|
|
|
1999-08-05 22:14:43 +00:00
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
1999-12-08 21:27:08 +00:00
|
|
|
/*
|
2000-08-02 18:13:08 +00:00
|
|
|
* Create the special view that handles queries under "bind. CH".
|
|
|
|
*/
|
|
|
|
static isc_result_t
|
|
|
|
create_bind_view(dns_view_t **viewp)
|
|
|
|
{
|
|
|
|
isc_result_t result;
|
|
|
|
dns_view_t *view = NULL;
|
|
|
|
|
|
|
|
REQUIRE(viewp != NULL && *viewp == NULL);
|
|
|
|
|
|
|
|
CHECK(dns_view_create(ns_g_mctx, dns_rdataclass_ch, "_bind", &view));
|
|
|
|
|
|
|
|
/* Transfer ownership. */
|
|
|
|
*viewp = view;
|
|
|
|
view = NULL;
|
|
|
|
|
|
|
|
result = ISC_R_SUCCESS;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
if (view != NULL)
|
|
|
|
dns_view_detach(&view);
|
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2000-10-12 21:52:00 +00:00
|
|
|
|
2000-08-02 18:13:08 +00:00
|
|
|
/*
|
|
|
|
* Create the zone that handles queries for
|
1999-12-08 21:27:08 +00:00
|
|
|
* "version.bind. CH". The version string returned is that
|
2000-04-07 22:36:15 +00:00
|
|
|
* configured in 'cctx', or a compiled-in default if
|
1999-12-08 21:27:08 +00:00
|
|
|
* there is no "version" configuration option.
|
|
|
|
*/
|
|
|
|
static isc_result_t
|
2000-08-02 18:13:08 +00:00
|
|
|
create_version_zone(dns_c_ctx_t *cctx, dns_zonemgr_t *zmgr, dns_view_t *view)
|
2000-05-17 19:45:36 +00:00
|
|
|
{
|
1999-12-23 00:09:04 +00:00
|
|
|
isc_result_t result;
|
1999-12-08 21:27:08 +00:00
|
|
|
dns_db_t *db = NULL;
|
|
|
|
dns_zone_t *zone = NULL;
|
|
|
|
dns_dbversion_t *dbver = NULL;
|
|
|
|
dns_difftuple_t *tuple = NULL;
|
|
|
|
dns_diff_t diff;
|
|
|
|
char *versiontext;
|
2000-01-19 21:25:24 +00:00
|
|
|
unsigned char buf[256];
|
1999-12-08 21:27:08 +00:00
|
|
|
isc_region_t r;
|
|
|
|
size_t len;
|
2000-10-25 04:26:57 +00:00
|
|
|
dns_rdata_t rdata = DNS_RDATA_INIT;
|
2000-01-21 19:24:01 +00:00
|
|
|
static unsigned char origindata[] = "\007version\004bind";
|
|
|
|
dns_name_t origin;
|
1999-12-08 21:27:08 +00:00
|
|
|
|
|
|
|
dns_diff_init(ns_g_mctx, &diff);
|
|
|
|
|
2000-01-21 19:24:01 +00:00
|
|
|
dns_name_init(&origin, NULL);
|
|
|
|
r.base = origindata;
|
|
|
|
r.length = sizeof(origindata);
|
|
|
|
dns_name_fromregion(&origin, &r);
|
|
|
|
|
2000-05-23 00:40:59 +00:00
|
|
|
result = dns_c_ctx_getversion(cctx, &versiontext);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
2000-06-01 18:49:22 +00:00
|
|
|
/*
|
|
|
|
* Removing the const qualifier from ns_g_version is ok
|
|
|
|
* because the resulting string is not modified, only
|
|
|
|
* copied into a new buffer.
|
|
|
|
*/
|
|
|
|
DE_CONST(ns_g_version, versiontext);
|
|
|
|
|
1999-12-08 21:27:08 +00:00
|
|
|
len = strlen(versiontext);
|
|
|
|
if (len > 255)
|
|
|
|
len = 255; /* Silently truncate. */
|
|
|
|
buf[0] = len;
|
|
|
|
memcpy(buf + 1, versiontext, len);
|
|
|
|
|
|
|
|
r.base = buf;
|
|
|
|
r.length = 1 + len;
|
|
|
|
dns_rdata_fromregion(&rdata, dns_rdataclass_ch, dns_rdatatype_txt, &r);
|
|
|
|
|
2000-01-21 23:55:12 +00:00
|
|
|
CHECK(dns_zone_create(&zone, ns_g_mctx));
|
|
|
|
CHECK(dns_zone_setorigin(zone, &origin));
|
2000-06-01 23:11:26 +00:00
|
|
|
dns_zone_settype(zone, dns_zone_master);
|
2000-05-23 01:21:32 +00:00
|
|
|
dns_zone_setclass(zone, dns_rdataclass_ch);
|
2000-08-01 01:33:37 +00:00
|
|
|
dns_zone_setview(zone, view);
|
|
|
|
|
2000-05-17 19:45:36 +00:00
|
|
|
CHECK(dns_zonemgr_managezone(zmgr, zone));
|
1999-12-08 21:27:08 +00:00
|
|
|
|
2000-06-07 02:38:41 +00:00
|
|
|
CHECK(dns_db_create(ns_g_mctx, "rbt", &origin, dns_dbtype_zone,
|
2000-01-21 23:55:12 +00:00
|
|
|
dns_rdataclass_ch, 0, NULL, &db));
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-01-21 23:55:12 +00:00
|
|
|
CHECK(dns_db_newversion(db, &dbver));
|
1999-12-08 21:27:08 +00:00
|
|
|
|
2000-01-21 23:55:12 +00:00
|
|
|
CHECK(dns_difftuple_create(ns_g_mctx, DNS_DIFFOP_ADD, &origin,
|
|
|
|
0, &rdata, &tuple));
|
1999-12-08 21:27:08 +00:00
|
|
|
dns_diff_append(&diff, &tuple);
|
2000-01-21 23:55:12 +00:00
|
|
|
CHECK(dns_diff_apply(&diff, db, dbver));
|
1999-12-08 21:27:08 +00:00
|
|
|
|
|
|
|
dns_db_closeversion(db, &dbver, ISC_TRUE);
|
|
|
|
|
2000-01-21 23:55:12 +00:00
|
|
|
CHECK(dns_zone_replacedb(zone, db, ISC_FALSE));
|
1999-12-08 21:27:08 +00:00
|
|
|
|
2000-01-21 23:55:12 +00:00
|
|
|
CHECK(dns_view_addzone(view, zone));
|
1999-12-08 21:27:08 +00:00
|
|
|
|
2000-08-02 18:13:08 +00:00
|
|
|
result = ISC_R_SUCCESS;
|
1999-12-08 21:27:08 +00:00
|
|
|
|
2000-08-02 18:13:08 +00:00
|
|
|
cleanup:
|
|
|
|
if (zone != NULL)
|
|
|
|
dns_zone_detach(&zone);
|
|
|
|
if (dbver != NULL)
|
|
|
|
dns_db_closeversion(db, &dbver, ISC_FALSE);
|
|
|
|
if (db != NULL)
|
|
|
|
dns_db_detach(&db);
|
|
|
|
dns_diff_clear(&diff);
|
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create the special view that handles queries for
|
|
|
|
* "authors.bind. CH". The strings returned list
|
2000-08-08 00:44:21 +00:00
|
|
|
* the BIND 9 authors.
|
2000-08-02 18:13:08 +00:00
|
|
|
*/
|
|
|
|
static isc_result_t
|
|
|
|
create_authors_zone(dns_zonemgr_t *zmgr, dns_view_t *view) {
|
|
|
|
isc_result_t result;
|
|
|
|
dns_db_t *db = NULL;
|
|
|
|
dns_zone_t *zone = NULL;
|
|
|
|
dns_dbversion_t *dbver = NULL;
|
|
|
|
dns_difftuple_t *tuple;
|
|
|
|
dns_diff_t diff;
|
2000-08-02 20:55:40 +00:00
|
|
|
isc_constregion_t r;
|
2000-08-02 18:13:08 +00:00
|
|
|
isc_constregion_t cr;
|
2000-10-25 04:26:57 +00:00
|
|
|
dns_rdata_t rdata = DNS_RDATA_INIT;
|
2000-08-02 20:47:21 +00:00
|
|
|
static const char origindata[] = "\007authors\004bind";
|
2000-08-02 18:13:08 +00:00
|
|
|
dns_name_t origin;
|
|
|
|
int i;
|
2000-08-02 20:47:21 +00:00
|
|
|
static const char *authors[] = {
|
2000-08-02 20:44:31 +00:00
|
|
|
"\014Mark Andrews",
|
|
|
|
"\015James Brister",
|
|
|
|
"\015Michael Graff",
|
|
|
|
"\022Andreas Gustafsson",
|
|
|
|
"\012Bob Halley",
|
|
|
|
"\016David Lawrence",
|
|
|
|
"\016Michael Sawyer",
|
|
|
|
"\020Brian Wellington",
|
|
|
|
NULL,
|
|
|
|
};
|
2000-08-02 18:13:08 +00:00
|
|
|
|
|
|
|
dns_diff_init(ns_g_mctx, &diff);
|
|
|
|
|
|
|
|
dns_name_init(&origin, NULL);
|
|
|
|
r.base = origindata;
|
|
|
|
r.length = sizeof(origindata);
|
2000-08-02 20:55:40 +00:00
|
|
|
dns_name_fromregion(&origin, (isc_region_t *)&r);
|
2000-08-02 18:13:08 +00:00
|
|
|
|
|
|
|
CHECK(dns_zone_create(&zone, ns_g_mctx));
|
|
|
|
CHECK(dns_zone_setorigin(zone, &origin));
|
|
|
|
dns_zone_settype(zone, dns_zone_master);
|
|
|
|
dns_zone_setclass(zone, dns_rdataclass_ch);
|
|
|
|
dns_zone_setview(zone, view);
|
|
|
|
|
|
|
|
CHECK(dns_zonemgr_managezone(zmgr, zone));
|
|
|
|
|
|
|
|
CHECK(dns_db_create(ns_g_mctx, "rbt", &origin, dns_dbtype_zone,
|
|
|
|
dns_rdataclass_ch, 0, NULL, &db));
|
|
|
|
|
|
|
|
CHECK(dns_db_newversion(db, &dbver));
|
|
|
|
|
|
|
|
for (i = 0; authors[i] != NULL; i++) {
|
|
|
|
cr.base = authors[i];
|
|
|
|
cr.length = strlen(authors[i]);
|
2000-08-08 01:56:44 +00:00
|
|
|
INSIST(cr.length == ((const unsigned char *)cr.base)[0] + 1U);
|
2000-08-02 18:13:08 +00:00
|
|
|
dns_rdata_fromregion(&rdata, dns_rdataclass_ch,
|
|
|
|
dns_rdatatype_txt, (isc_region_t *)&cr);
|
|
|
|
tuple = NULL;
|
|
|
|
CHECK(dns_difftuple_create(ns_g_mctx, DNS_DIFFOP_ADD, &origin,
|
|
|
|
0, &rdata, &tuple));
|
|
|
|
dns_diff_append(&diff, &tuple);
|
2000-10-31 03:22:05 +00:00
|
|
|
dns_rdata_reset(&rdata);
|
2000-08-02 18:13:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
CHECK(dns_diff_apply(&diff, db, dbver));
|
|
|
|
|
|
|
|
dns_db_closeversion(db, &dbver, ISC_TRUE);
|
|
|
|
|
|
|
|
CHECK(dns_zone_replacedb(zone, db, ISC_FALSE));
|
|
|
|
|
|
|
|
CHECK(dns_view_addzone(view, zone));
|
1999-12-08 21:27:08 +00:00
|
|
|
|
|
|
|
result = ISC_R_SUCCESS;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
if (zone != NULL)
|
|
|
|
dns_zone_detach(&zone);
|
|
|
|
if (dbver != NULL)
|
|
|
|
dns_db_closeversion(db, &dbver, ISC_FALSE);
|
|
|
|
if (db != NULL)
|
|
|
|
dns_db_detach(&db);
|
|
|
|
dns_diff_clear(&diff);
|
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
2000-01-27 01:57:08 +00:00
|
|
|
static isc_result_t
|
|
|
|
configure_hints(dns_view_t *view, const char *filename) {
|
|
|
|
isc_result_t result;
|
|
|
|
dns_db_t *db;
|
|
|
|
|
|
|
|
db = NULL;
|
|
|
|
result = dns_rootns_create(view->mctx, view->rdclass, filename, &db);
|
|
|
|
if (result == ISC_R_SUCCESS) {
|
|
|
|
dns_view_sethints(view, db);
|
|
|
|
dns_db_detach(&db);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
2000-08-24 22:15:40 +00:00
|
|
|
static isc_result_t
|
|
|
|
configure_forward(dns_c_ctx_t *cctx, dns_c_zone_t *czone, dns_c_view_t *cview,
|
|
|
|
dns_view_t *view, dns_name_t *origin,
|
|
|
|
dns_c_iplist_t *forwarders)
|
|
|
|
{
|
|
|
|
dns_c_forw_t forward;
|
|
|
|
dns_fwdpolicy_t fwdpolicy;
|
|
|
|
isc_sockaddrlist_t addresses;
|
|
|
|
isc_sockaddr_t *sa;
|
|
|
|
isc_result_t result;
|
|
|
|
in_port_t port;
|
|
|
|
unsigned int i;
|
|
|
|
|
2000-10-04 23:19:01 +00:00
|
|
|
/*
|
|
|
|
* Determine which port to send forwarded requests to.
|
|
|
|
*/
|
|
|
|
if (ns_g_port != 0) {
|
|
|
|
port = ns_g_port;
|
|
|
|
} else {
|
|
|
|
result = dns_c_ctx_getport(cctx, &port);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
port = 53;
|
|
|
|
}
|
2000-08-24 22:15:40 +00:00
|
|
|
|
|
|
|
ISC_LIST_INIT(addresses);
|
|
|
|
|
|
|
|
if (forwarders != NULL) {
|
|
|
|
for (i = 0; i < forwarders->nextidx; i++) {
|
|
|
|
sa = isc_mem_get(view->mctx, sizeof(isc_sockaddr_t));
|
|
|
|
if (sa == NULL) {
|
|
|
|
result = ISC_R_NOMEMORY;
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
*sa = forwarders->ips[i];
|
|
|
|
isc_sockaddr_setport(sa, port);
|
|
|
|
ISC_LINK_INIT(sa, link);
|
|
|
|
ISC_LIST_APPEND(addresses, sa, link);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ISC_LIST_EMPTY(addresses))
|
|
|
|
fwdpolicy = dns_fwdpolicy_none;
|
|
|
|
else
|
|
|
|
fwdpolicy = dns_fwdpolicy_first;
|
|
|
|
|
|
|
|
if ((czone != NULL &&
|
|
|
|
dns_c_zone_getforward(czone, &forward) == ISC_R_SUCCESS) ||
|
|
|
|
(cview != NULL &&
|
|
|
|
dns_c_view_getforward(cview, &forward) == ISC_R_SUCCESS) ||
|
|
|
|
dns_c_ctx_getforward(cctx, &forward) == ISC_R_SUCCESS)
|
|
|
|
{
|
|
|
|
INSIST(forward == dns_c_forw_first ||
|
|
|
|
forward == dns_c_forw_only);
|
|
|
|
if (forward == dns_c_forw_only)
|
|
|
|
fwdpolicy = dns_fwdpolicy_only;
|
|
|
|
}
|
|
|
|
|
|
|
|
result = dns_fwdtable_add(view->fwdtable, origin, &addresses,
|
|
|
|
fwdpolicy);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
result = ISC_R_SUCCESS;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
|
|
|
|
while (!ISC_LIST_EMPTY(addresses)) {
|
|
|
|
sa = ISC_LIST_HEAD(addresses);
|
|
|
|
ISC_LIST_UNLINK(addresses, sa, link);
|
|
|
|
isc_mem_put(view->mctx, sa, sizeof(isc_sockaddr_t));
|
|
|
|
}
|
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
2000-04-06 17:31:33 +00:00
|
|
|
/*
|
|
|
|
* Find an existing view matching the name and class of 'cview'
|
|
|
|
* in 'viewlist', or create a new one and add it to the list.
|
|
|
|
*
|
|
|
|
* If 'cview' is NULL, find or create the default view.
|
|
|
|
*
|
|
|
|
* The view found or created is attached to '*viewp'.
|
|
|
|
*/
|
|
|
|
static isc_result_t
|
|
|
|
find_or_create_view(dns_c_view_t *cview, dns_viewlist_t *viewlist,
|
|
|
|
dns_view_t **viewp)
|
|
|
|
{
|
|
|
|
isc_result_t result;
|
2000-06-01 18:49:22 +00:00
|
|
|
const char *viewname;
|
2000-04-06 17:31:33 +00:00
|
|
|
dns_rdataclass_t viewclass;
|
|
|
|
dns_view_t *view = NULL;
|
|
|
|
|
|
|
|
if (cview != NULL) {
|
|
|
|
viewname = cview->name;
|
|
|
|
result = dns_c_view_getviewclass(cview, &viewclass);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
return (result);
|
|
|
|
} else {
|
|
|
|
viewname = "_default";
|
|
|
|
viewclass = dns_rdataclass_in;
|
|
|
|
}
|
|
|
|
result = dns_viewlist_find(viewlist, viewname,
|
|
|
|
viewclass, &view);
|
|
|
|
if (result == ISC_R_SUCCESS) {
|
|
|
|
*viewp = view;
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
if (result != ISC_R_NOTFOUND)
|
|
|
|
return (result);
|
|
|
|
INSIST(view == NULL);
|
|
|
|
|
|
|
|
result = dns_view_create(ns_g_mctx, viewclass, viewname, &view);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
return (result);
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-04-06 17:31:33 +00:00
|
|
|
ISC_LIST_APPEND(*viewlist, view, link);
|
|
|
|
dns_view_attach(view, viewp);
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
2000-01-21 19:24:01 +00:00
|
|
|
/*
|
|
|
|
* Configure or reconfigure a zone. This callback function
|
|
|
|
* is called after parsing each "zone" statement in named.conf.
|
|
|
|
*/
|
1999-08-05 22:14:43 +00:00
|
|
|
static isc_result_t
|
2000-01-27 01:00:16 +00:00
|
|
|
configure_zone(dns_c_ctx_t *cctx, dns_c_zone_t *czone, dns_c_view_t *cview,
|
1999-10-15 01:51:48 +00:00
|
|
|
void *uap)
|
|
|
|
{
|
2000-01-21 19:24:01 +00:00
|
|
|
ns_load_t *lctx = (ns_load_t *) uap;
|
|
|
|
dns_view_t *view = NULL; /* New view */
|
|
|
|
dns_view_t *pview = NULL; /* Production view */
|
|
|
|
dns_zone_t *zone = NULL; /* New or reused zone */
|
2000-05-22 17:07:43 +00:00
|
|
|
dns_zone_t *dupzone = NULL;
|
2000-10-18 22:13:48 +00:00
|
|
|
dns_c_iplist_t *forwarders = NULL;
|
|
|
|
dns_c_forw_t tfwd;
|
2000-08-01 01:33:37 +00:00
|
|
|
|
1999-10-15 01:51:48 +00:00
|
|
|
isc_result_t result;
|
1999-08-05 22:14:43 +00:00
|
|
|
|
2000-08-01 01:33:37 +00:00
|
|
|
char *corigin;
|
2000-01-21 19:24:01 +00:00
|
|
|
isc_buffer_t buffer;
|
|
|
|
dns_fixedname_t fixorigin;
|
|
|
|
dns_name_t *origin;
|
2000-01-27 01:00:16 +00:00
|
|
|
|
1999-08-05 22:14:43 +00:00
|
|
|
/*
|
2000-01-21 19:24:01 +00:00
|
|
|
* Get the zone origin as a dns_name_t.
|
1999-08-05 22:14:43 +00:00
|
|
|
*/
|
2000-01-21 19:24:01 +00:00
|
|
|
corigin = NULL;
|
|
|
|
/* XXX casting away const */
|
2000-01-21 23:55:12 +00:00
|
|
|
CHECK(dns_c_zone_getname(czone, (const char **) &corigin));
|
103. [func] libisc buffer API changes for <isc/buffer.h>:
Added:
isc_buffer_base(b) (pointer)
isc_buffer_current(b) (pointer)
isc_buffer_active(b) (pointer)
isc_buffer_used(b) (pointer)
isc_buffer_length(b) (int)
isc_buffer_usedlength(b) (int)
isc_buffer_consumedlength(b) (int)
isc_buffer_remaininglength(b) (int)
isc_buffer_activelength(b) (int)
isc_buffer_availablelength(b) (int)
Removed:
ISC_BUFFER_USEDCOUNT(b)
ISC_BUFFER_AVAILABLECOUNT(b)
isc_buffer_type(b)
Changed names:
isc_buffer_used(b, r) ->
isc_buffer_usedregion(b, r)
isc_buffer_available(b, r) ->
isc_buffer_available_region(b, r)
isc_buffer_consumed(b, r) ->
isc_buffer_consumedregion(b, r)
isc_buffer_active(b, r) ->
isc_buffer_activeregion(b, r)
isc_buffer_remaining(b, r) ->
isc_buffer_remainingregion(b, r)
Buffer types were removed, so the ISC_BUFFERTYPE_*
macros are no more, and the type argument to
isc_buffer_init and isc_buffer_allocate were removed.
isc_buffer_putstr is now void (instead of isc_result_t)
and requires that the caller ensure that there
is enough available buffer space for the string.
2000-04-27 00:03:12 +00:00
|
|
|
isc_buffer_init(&buffer, corigin, strlen(corigin));
|
2000-01-21 19:24:01 +00:00
|
|
|
isc_buffer_add(&buffer, strlen(corigin));
|
|
|
|
dns_fixedname_init(&fixorigin);
|
2000-01-21 23:55:12 +00:00
|
|
|
CHECK(dns_name_fromtext(dns_fixedname_name(&fixorigin),
|
|
|
|
&buffer, dns_rootname, ISC_FALSE, NULL));
|
2000-01-21 19:24:01 +00:00
|
|
|
origin = dns_fixedname_name(&fixorigin);
|
2000-08-01 01:33:37 +00:00
|
|
|
|
1999-10-15 01:51:48 +00:00
|
|
|
/*
|
2000-01-21 19:24:01 +00:00
|
|
|
* Find or create the view in the new view list.
|
1999-10-15 01:51:48 +00:00
|
|
|
*/
|
|
|
|
view = NULL;
|
2000-04-06 17:31:33 +00:00
|
|
|
CHECK(find_or_create_view(cview, &lctx->viewlist, &view));
|
|
|
|
|
|
|
|
if (czone->zclass != view->rdclass) {
|
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL,
|
|
|
|
NS_LOGMODULE_SERVER, ISC_LOG_ERROR,
|
|
|
|
"zone '%s': wrong class for view '%s'",
|
|
|
|
corigin, cview ? cview->name : "<default view>");
|
|
|
|
result = ISC_R_FAILURE;
|
2000-01-21 19:24:01 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-01-27 01:57:08 +00:00
|
|
|
/*
|
|
|
|
* "hints zones" aren't zones. If we've got one,
|
|
|
|
* configure it and return.
|
|
|
|
*/
|
|
|
|
if (czone->ztype == dns_c_zone_hint) {
|
|
|
|
if (czone->u.hzone.file == NULL) {
|
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL,
|
|
|
|
NS_LOGMODULE_SERVER, ISC_LOG_ERROR,
|
|
|
|
"zone '%s': 'file' not specified",
|
|
|
|
corigin);
|
|
|
|
result = ISC_R_FAILURE;
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
if (dns_name_equal(origin, dns_rootname)) {
|
|
|
|
result = configure_hints(view, czone->u.hzone.file);
|
|
|
|
} else {
|
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL,
|
|
|
|
NS_LOGMODULE_SERVER, ISC_LOG_WARNING,
|
|
|
|
"ignoring non-root hint zone '%s'",
|
|
|
|
corigin);
|
|
|
|
result = ISC_R_SUCCESS;
|
|
|
|
}
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2000-08-24 22:15:40 +00:00
|
|
|
* "forward zones" aren't zones either. Translate this syntax into
|
|
|
|
* the appropriate selective forwarding configuration and return.
|
2000-01-27 01:57:08 +00:00
|
|
|
*/
|
|
|
|
if (czone->ztype == dns_c_zone_forward) {
|
2000-08-24 22:15:40 +00:00
|
|
|
result = configure_forward(cctx, czone, cview, view, origin,
|
|
|
|
czone->u.fzone.forwarders);
|
2000-01-27 01:57:08 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2000-01-21 19:24:01 +00:00
|
|
|
/*
|
|
|
|
* Check for duplicates in the new zone table.
|
|
|
|
*/
|
2000-05-22 17:07:43 +00:00
|
|
|
result = dns_view_findzone(view, origin, &dupzone);
|
2000-01-21 19:24:01 +00:00
|
|
|
if (result == ISC_R_SUCCESS) {
|
|
|
|
/*
|
|
|
|
* We already have this zone!
|
|
|
|
*/
|
2000-05-22 17:07:43 +00:00
|
|
|
dns_zone_detach(&dupzone);
|
2000-01-21 19:24:01 +00:00
|
|
|
result = ISC_R_EXISTS;
|
|
|
|
goto cleanup;
|
1999-10-15 01:51:48 +00:00
|
|
|
}
|
2000-05-22 17:07:43 +00:00
|
|
|
INSIST(dupzone == NULL);
|
1999-08-05 22:14:43 +00:00
|
|
|
|
1999-10-15 01:51:48 +00:00
|
|
|
/*
|
2000-01-21 19:24:01 +00:00
|
|
|
* See if we can reuse an existing zone. This is
|
|
|
|
* only possible if all of these are true:
|
|
|
|
* - The zone's view exists
|
|
|
|
* - A zone with the right name exists in the view
|
|
|
|
* - The zone is compatible with the config
|
2000-08-01 01:33:37 +00:00
|
|
|
* options (e.g., an existing master zone cannot
|
2000-01-21 19:24:01 +00:00
|
|
|
* be reused if the options specify a slave zone)
|
1999-10-15 01:51:48 +00:00
|
|
|
*/
|
2000-01-12 01:19:47 +00:00
|
|
|
result = dns_viewlist_find(&ns_g_server->viewlist,
|
|
|
|
view->name, view->rdclass,
|
1999-10-15 01:51:48 +00:00
|
|
|
&pview);
|
|
|
|
if (result != ISC_R_NOTFOUND && result != ISC_R_SUCCESS)
|
|
|
|
goto cleanup;
|
2000-01-21 19:24:01 +00:00
|
|
|
if (pview != NULL)
|
|
|
|
result = dns_view_findzone(pview, origin, &zone);
|
|
|
|
if (result != ISC_R_NOTFOUND && result != ISC_R_SUCCESS)
|
|
|
|
goto cleanup;
|
|
|
|
if (zone != NULL) {
|
2000-11-27 19:42:38 +00:00
|
|
|
if (! ns_zone_reusable(zone, czone))
|
2000-01-21 19:24:01 +00:00
|
|
|
dns_zone_detach(&zone);
|
|
|
|
}
|
1999-08-05 22:14:43 +00:00
|
|
|
|
2000-05-23 04:38:22 +00:00
|
|
|
if (zone != NULL) {
|
|
|
|
/*
|
|
|
|
* We found a reusable zone. Make it use the
|
|
|
|
* new view.
|
|
|
|
*/
|
|
|
|
dns_zone_setview(zone, view);
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* We cannot reuse an existing zone, we have
|
|
|
|
* to create a new one.
|
|
|
|
*/
|
2000-01-21 23:55:12 +00:00
|
|
|
CHECK(dns_zone_create(&zone, lctx->mctx));
|
|
|
|
CHECK(dns_zone_setorigin(zone, origin));
|
2000-05-19 02:34:23 +00:00
|
|
|
dns_zone_setview(zone, view);
|
2000-05-23 04:38:22 +00:00
|
|
|
CHECK(dns_zonemgr_managezone(ns_g_server->zonemgr, zone));
|
2000-01-21 19:24:01 +00:00
|
|
|
}
|
|
|
|
|
2000-10-18 22:13:48 +00:00
|
|
|
/*
|
|
|
|
* If the zone contains 'forward' or 'forwarders' statements,
|
|
|
|
* configure selective forwarding.
|
|
|
|
*/
|
|
|
|
if (dns_c_zone_getforwarders(czone, &forwarders) == ISC_R_SUCCESS ||
|
|
|
|
dns_c_zone_getforward(czone, &tfwd) == ISC_R_SUCCESS)
|
|
|
|
CHECK(configure_forward(cctx, czone, cview, view,
|
|
|
|
origin, forwarders));
|
|
|
|
|
2000-01-21 19:24:01 +00:00
|
|
|
/*
|
|
|
|
* Configure the zone.
|
|
|
|
*/
|
2000-11-27 19:42:38 +00:00
|
|
|
CHECK(ns_zone_configure(cctx, cview, czone, lctx->aclconf, zone));
|
1999-08-05 22:14:43 +00:00
|
|
|
|
2000-01-21 19:24:01 +00:00
|
|
|
/*
|
|
|
|
* Add the zone to its view in the new view list.
|
|
|
|
*/
|
2000-01-21 23:55:12 +00:00
|
|
|
CHECK(dns_view_addzone(view, zone));
|
1999-08-05 22:14:43 +00:00
|
|
|
|
1999-10-14 01:37:00 +00:00
|
|
|
cleanup:
|
1999-10-15 01:51:48 +00:00
|
|
|
if (zone != NULL)
|
|
|
|
dns_zone_detach(&zone);
|
|
|
|
if (pview != NULL)
|
|
|
|
dns_view_detach(&pview);
|
|
|
|
if (view != NULL)
|
|
|
|
dns_view_detach(&view);
|
1999-08-05 22:14:43 +00:00
|
|
|
|
|
|
|
return (result);
|
1999-05-03 19:56:23 +00:00
|
|
|
}
|
|
|
|
|
2000-01-21 23:55:12 +00:00
|
|
|
/*
|
|
|
|
* Configure a single server quota.
|
|
|
|
*/
|
2000-01-15 00:37:31 +00:00
|
|
|
static void
|
|
|
|
configure_server_quota(dns_c_ctx_t *cctx,
|
2000-06-05 09:17:14 +00:00
|
|
|
isc_result_t (*getquota)(dns_c_ctx_t *, isc_uint32_t *),
|
2000-01-15 00:37:31 +00:00
|
|
|
isc_quota_t *quota, int defaultvalue)
|
|
|
|
{
|
2000-06-05 09:17:14 +00:00
|
|
|
isc_uint32_t val = defaultvalue;
|
2000-01-15 00:37:31 +00:00
|
|
|
(void)(*getquota)(cctx, &val);
|
|
|
|
quota->max = val;
|
|
|
|
}
|
|
|
|
|
2000-02-08 01:30:16 +00:00
|
|
|
/*
|
|
|
|
* This function is called as soon as the 'options' statement has been
|
|
|
|
* parsed.
|
|
|
|
*/
|
|
|
|
static isc_result_t
|
|
|
|
options_callback(dns_c_ctx_t *cctx, void *uap) {
|
|
|
|
isc_result_t result;
|
|
|
|
|
2000-02-16 18:21:17 +00:00
|
|
|
UNUSED(uap);
|
2000-02-08 01:30:16 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Change directory.
|
|
|
|
*/
|
|
|
|
if (cctx->options != NULL &&
|
|
|
|
cctx->options->directory != NULL) {
|
|
|
|
result = isc_dir_chdir(cctx->options->directory);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL,
|
|
|
|
NS_LOGMODULE_SERVER,
|
|
|
|
ISC_LOG_ERROR, "change directory "
|
|
|
|
"to '%s' failed: %s",
|
|
|
|
cctx->options->directory,
|
|
|
|
isc_result_totext(result));
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
2000-02-16 19:58:39 +00:00
|
|
|
|
2000-08-01 01:33:37 +00:00
|
|
|
static void
|
2000-06-08 22:31:55 +00:00
|
|
|
scan_interfaces(ns_server_t *server, isc_boolean_t verbose) {
|
|
|
|
ns_interfacemgr_scan(server->interfacemgr, verbose);
|
2000-02-16 19:58:39 +00:00
|
|
|
dns_aclenv_copy(&server->aclenv,
|
|
|
|
ns_interfacemgr_getaclenv(server->interfacemgr));
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This event callback is invoked to do periodic network
|
|
|
|
* interface scanning.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
interface_timer_tick(isc_task_t *task, isc_event_t *event) {
|
2000-08-01 01:33:37 +00:00
|
|
|
ns_server_t *server = (ns_server_t *) event->ev_arg;
|
2000-02-16 19:58:39 +00:00
|
|
|
UNUSED(task);
|
|
|
|
isc_event_free(&event);
|
|
|
|
RWLOCK(&server->conflock, isc_rwlocktype_write);
|
2000-06-08 22:31:55 +00:00
|
|
|
scan_interfaces(server, ISC_FALSE);
|
2000-02-16 19:58:39 +00:00
|
|
|
RWUNLOCK(&server->conflock, isc_rwlocktype_write);
|
|
|
|
}
|
|
|
|
|
2000-11-03 07:16:09 +00:00
|
|
|
static void
|
|
|
|
heartbeat_timer_tick(isc_task_t *task, isc_event_t *event) {
|
|
|
|
ns_server_t *server = (ns_server_t *) event->ev_arg;
|
|
|
|
dns_view_t *view;
|
|
|
|
|
|
|
|
UNUSED(task);
|
|
|
|
isc_event_free(&event);
|
|
|
|
RWLOCK(&server->conflock, isc_rwlocktype_read);
|
|
|
|
view = ISC_LIST_HEAD(server->viewlist);
|
|
|
|
while (view != NULL) {
|
|
|
|
dns_view_dialup(view);
|
|
|
|
view = ISC_LIST_NEXT(view, link);
|
|
|
|
}
|
|
|
|
RWUNLOCK(&server->conflock, isc_rwlocktype_read);
|
|
|
|
}
|
|
|
|
|
2000-11-08 18:58:02 +00:00
|
|
|
static isc_result_t
|
2000-12-01 23:49:59 +00:00
|
|
|
setstatsfile(ns_server_t *server, const char *name) {
|
|
|
|
char *p;
|
2000-11-08 18:58:02 +00:00
|
|
|
|
2000-12-01 23:49:59 +00:00
|
|
|
REQUIRE(name != NULL);
|
2000-11-09 19:55:20 +00:00
|
|
|
|
2000-12-01 23:49:59 +00:00
|
|
|
p = isc_mem_strdup(server->mctx, name);
|
|
|
|
if (p == NULL)
|
|
|
|
return (ISC_R_NOMEMORY);
|
|
|
|
if (server->statsfile != NULL)
|
|
|
|
isc_mem_free(server->mctx, server->statsfile);
|
|
|
|
server->statsfile = p;
|
|
|
|
return (ISC_R_SUCCESS);
|
2000-11-08 18:58:02 +00:00
|
|
|
}
|
|
|
|
|
2000-11-15 00:19:49 +00:00
|
|
|
#define SETLIMIT(cfgvar, resource, description) \
|
|
|
|
if (dns_c_ctx_get ## cfgvar(cctx, &resource) == ISC_R_SUCCESS) { \
|
|
|
|
if (resource == DNS_C_SIZE_SPEC_DEFAULT) \
|
|
|
|
value = ns_g_init ## resource; \
|
|
|
|
else if (resource == DNS_C_SIZE_SPEC_UNLIM) \
|
|
|
|
value = ISC_RESOURCE_UNLIMITED; \
|
|
|
|
else \
|
|
|
|
value = resource; \
|
|
|
|
result = isc_resource_setlimit(isc_resource_ ## resource, \
|
|
|
|
value); \
|
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL, \
|
|
|
|
NS_LOGMODULE_SERVER, \
|
|
|
|
result == ISC_R_SUCCESS ? \
|
|
|
|
ISC_LOG_DEBUG(1) : ISC_LOG_WARNING, \
|
2000-12-01 23:49:59 +00:00
|
|
|
"set maximum " description " to %" \
|
2000-11-15 00:19:49 +00:00
|
|
|
ISC_PRINT_QUADFORMAT "d: %s", value, \
|
2000-11-15 01:37:00 +00:00
|
|
|
isc_result_totext(result)); \
|
2000-11-15 00:19:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
set_limits(dns_c_ctx_t *cctx) {
|
|
|
|
isc_uint32_t stacksize;
|
|
|
|
isc_uint32_t datasize;
|
|
|
|
isc_uint32_t coresize;
|
|
|
|
isc_uint32_t openfiles;
|
|
|
|
isc_resourcevalue_t value;
|
|
|
|
isc_result_t result;
|
|
|
|
|
|
|
|
SETLIMIT(stacksize, stacksize, "stack size");
|
|
|
|
SETLIMIT(datasize, datasize, "data size");
|
|
|
|
SETLIMIT(coresize, coresize, "core size");
|
|
|
|
SETLIMIT(files, openfiles, "open files");
|
|
|
|
}
|
|
|
|
|
2000-01-21 23:55:12 +00:00
|
|
|
static isc_result_t
|
2000-01-29 01:38:09 +00:00
|
|
|
load_configuration(const char *filename, ns_server_t *server,
|
|
|
|
isc_boolean_t first_time)
|
|
|
|
{
|
1999-10-15 01:51:48 +00:00
|
|
|
isc_result_t result;
|
|
|
|
ns_load_t lctx;
|
|
|
|
dns_c_cbks_t callbacks;
|
2000-04-07 22:36:15 +00:00
|
|
|
dns_c_ctx_t *cctx;
|
2000-04-06 23:58:01 +00:00
|
|
|
dns_view_t *view = NULL;
|
2000-04-06 17:31:33 +00:00
|
|
|
dns_view_t *view_next;
|
2000-01-21 23:55:12 +00:00
|
|
|
dns_viewlist_t tmpviewlist;
|
2000-11-27 19:42:38 +00:00
|
|
|
ns_aclconfctx_t aclconfctx;
|
2000-03-08 22:31:52 +00:00
|
|
|
dns_dispatch_t *dispatchv4 = NULL;
|
|
|
|
dns_dispatch_t *dispatchv6 = NULL;
|
2000-01-29 01:38:09 +00:00
|
|
|
char *pidfilename;
|
2000-11-07 23:49:42 +00:00
|
|
|
char *statsfilename;
|
2000-06-05 09:17:14 +00:00
|
|
|
isc_uint32_t interface_interval;
|
2000-11-03 07:16:09 +00:00
|
|
|
isc_uint32_t heartbeat_interval;
|
2000-06-05 19:10:13 +00:00
|
|
|
in_port_t listen_port;
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-11-27 19:42:38 +00:00
|
|
|
ns_aclconfctx_init(&aclconfctx);
|
1999-08-05 22:14:43 +00:00
|
|
|
|
2000-01-27 01:00:16 +00:00
|
|
|
RWLOCK(&server->conflock, isc_rwlocktype_write);
|
|
|
|
dns_zonemgr_lockconf(server->zonemgr, isc_rwlocktype_write);
|
2000-08-01 01:33:37 +00:00
|
|
|
|
1999-10-15 01:51:48 +00:00
|
|
|
lctx.mctx = ns_g_mctx;
|
1999-12-16 23:11:07 +00:00
|
|
|
lctx.aclconf = &aclconfctx;
|
1999-10-15 01:51:48 +00:00
|
|
|
ISC_LIST_INIT(lctx.viewlist);
|
1999-07-24 01:16:38 +00:00
|
|
|
|
2000-01-27 01:00:16 +00:00
|
|
|
callbacks.zonecbk = configure_zone;
|
1999-10-15 01:51:48 +00:00
|
|
|
callbacks.zonecbkuap = &lctx;
|
2000-02-08 01:30:16 +00:00
|
|
|
callbacks.optscbk = options_callback;
|
1999-10-15 01:51:48 +00:00
|
|
|
callbacks.optscbkuap = NULL;
|
1999-09-24 01:42:22 +00:00
|
|
|
|
2000-01-21 19:24:01 +00:00
|
|
|
/*
|
|
|
|
* Parse the configuration file creating a parse tree. Any
|
|
|
|
* 'zone' statements are handled immediately by calling
|
2000-01-27 01:00:16 +00:00
|
|
|
* configure_zone() through 'callbacks'.
|
2000-01-21 19:24:01 +00:00
|
|
|
*/
|
2000-04-07 22:36:15 +00:00
|
|
|
cctx = NULL;
|
2000-10-13 22:35:46 +00:00
|
|
|
if (ns_g_lwresdonly && lwresd_g_useresolvconf)
|
|
|
|
result = ISC_R_FILENOTFOUND;
|
|
|
|
else {
|
|
|
|
isc_log_write(ns_g_lctx,
|
|
|
|
NS_LOGCATEGORY_GENERAL, NS_LOGMODULE_SERVER,
|
|
|
|
ISC_LOG_INFO, "loading configuration from '%s'",
|
|
|
|
filename);
|
|
|
|
|
|
|
|
result = dns_c_parse_namedconf(filename, ns_g_mctx, &cctx,
|
|
|
|
&callbacks);
|
|
|
|
}
|
2000-11-01 20:59:22 +00:00
|
|
|
if (result == ISC_R_FILENOTFOUND &&
|
|
|
|
ns_g_lwresdonly && !ns_g_conffileset)
|
|
|
|
{
|
2000-10-13 22:35:46 +00:00
|
|
|
isc_log_write(ns_g_lctx,
|
|
|
|
NS_LOGCATEGORY_GENERAL, NS_LOGMODULE_SERVER,
|
|
|
|
ISC_LOG_INFO, "loading configuration from '%s'",
|
|
|
|
lwresd_g_resolvconffile);
|
|
|
|
|
2000-10-04 23:19:01 +00:00
|
|
|
result = ns_lwresd_parseresolvconf(ns_g_mctx, &cctx);
|
2000-10-13 22:35:46 +00:00
|
|
|
}
|
2000-10-04 23:19:01 +00:00
|
|
|
CHECK(result);
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-11-15 00:19:49 +00:00
|
|
|
/*
|
|
|
|
* Set process limits, which (usually) needs to be done as root.
|
|
|
|
*/
|
|
|
|
set_limits(cctx);
|
|
|
|
|
1999-12-16 23:11:07 +00:00
|
|
|
/*
|
|
|
|
* Configure various server options.
|
|
|
|
*/
|
2000-04-07 22:36:15 +00:00
|
|
|
configure_server_quota(cctx, dns_c_ctx_gettransfersout,
|
2000-01-21 23:55:12 +00:00
|
|
|
&server->xfroutquota, 10);
|
2000-04-07 22:36:15 +00:00
|
|
|
configure_server_quota(cctx, dns_c_ctx_gettcpclients,
|
2000-01-21 23:55:12 +00:00
|
|
|
&server->tcpquota, 100);
|
2000-04-07 22:36:15 +00:00
|
|
|
configure_server_quota(cctx, dns_c_ctx_getrecursiveclients,
|
2000-07-24 18:45:50 +00:00
|
|
|
&server->recursionquota, 1000);
|
2000-01-13 23:32:41 +00:00
|
|
|
|
2000-11-03 02:45:55 +00:00
|
|
|
CHECK(configure_view_acl(NULL, cctx, &aclconfctx, ns_g_mctx, NULL,
|
|
|
|
dns_c_ctx_getblackhole,
|
|
|
|
&server->blackholeacl));
|
|
|
|
if (server->blackholeacl != NULL)
|
|
|
|
dns_dispatchmgr_setblackhole(ns_g_dispatchmgr,
|
|
|
|
server->blackholeacl);
|
|
|
|
|
2000-09-05 03:35:24 +00:00
|
|
|
/* dns_loadmgr_setlimit(server->loadmgr, 20); XXXMPA */
|
|
|
|
|
2000-02-25 00:52:11 +00:00
|
|
|
/*
|
|
|
|
* Configure the zone manager.
|
|
|
|
*/
|
2000-02-25 17:34:05 +00:00
|
|
|
{
|
2000-06-05 09:17:14 +00:00
|
|
|
isc_uint32_t transfersin = 10;
|
2000-07-10 11:35:02 +00:00
|
|
|
(void)dns_c_ctx_gettransfersin(cctx, &transfersin);
|
2000-02-25 17:34:05 +00:00
|
|
|
dns_zonemgr_settransfersin(server->zonemgr, transfersin);
|
|
|
|
}
|
2000-02-25 00:52:11 +00:00
|
|
|
{
|
2000-06-05 09:17:14 +00:00
|
|
|
isc_uint32_t transfersperns = 2;
|
2000-07-10 11:35:02 +00:00
|
|
|
(void)dns_c_ctx_gettransfersperns(cctx, &transfersperns);
|
2000-02-25 00:52:11 +00:00
|
|
|
dns_zonemgr_settransfersperns(server->zonemgr, transfersperns);
|
|
|
|
}
|
|
|
|
|
2000-06-05 19:10:13 +00:00
|
|
|
/*
|
|
|
|
* Determine which port to use for listening for incoming connections.
|
|
|
|
*/
|
|
|
|
if (ns_g_port != 0) {
|
|
|
|
listen_port = ns_g_port;
|
|
|
|
} else {
|
|
|
|
result = dns_c_ctx_getport(cctx, &listen_port);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
listen_port = 53;
|
|
|
|
}
|
2000-01-13 23:32:41 +00:00
|
|
|
/*
|
|
|
|
* Configure the interface manager according to the "listen-on"
|
|
|
|
* statement.
|
|
|
|
*/
|
|
|
|
{
|
|
|
|
dns_c_lstnlist_t *clistenon = NULL;
|
|
|
|
ns_listenlist_t *listenon = NULL;
|
|
|
|
|
2000-07-10 11:35:02 +00:00
|
|
|
(void)dns_c_ctx_getlistenlist(cctx, &clistenon);
|
2000-01-13 23:32:41 +00:00
|
|
|
if (clistenon != NULL) {
|
|
|
|
result = ns_listenlist_fromconfig(clistenon,
|
2000-04-07 22:36:15 +00:00
|
|
|
cctx,
|
2000-01-13 23:32:41 +00:00
|
|
|
&aclconfctx,
|
2000-01-26 19:25:22 +00:00
|
|
|
ns_g_mctx,
|
|
|
|
&listenon);
|
2000-10-04 23:19:01 +00:00
|
|
|
} else if (!ns_g_lwresdonly) {
|
2000-07-10 11:35:02 +00:00
|
|
|
/*
|
|
|
|
* Not specified, use default.
|
|
|
|
*/
|
2000-06-05 19:10:13 +00:00
|
|
|
CHECK(ns_listenlist_default(ns_g_mctx, listen_port,
|
2000-06-23 01:08:29 +00:00
|
|
|
ISC_TRUE, &listenon));
|
2000-01-13 23:32:41 +00:00
|
|
|
}
|
2000-10-04 23:19:01 +00:00
|
|
|
if (listenon != NULL) {
|
|
|
|
ns_interfacemgr_setlistenon4(server->interfacemgr,
|
|
|
|
listenon);
|
|
|
|
ns_listenlist_detach(&listenon);
|
|
|
|
}
|
2000-01-13 23:32:41 +00:00
|
|
|
}
|
2000-06-05 19:10:13 +00:00
|
|
|
/*
|
|
|
|
* Ditto for IPv6.
|
|
|
|
*/
|
|
|
|
{
|
2000-06-06 18:53:02 +00:00
|
|
|
dns_c_lstnlist_t *clistenon = NULL;
|
|
|
|
ns_listenlist_t *listenon = NULL;
|
|
|
|
|
2000-07-10 11:35:02 +00:00
|
|
|
(void)dns_c_ctx_getv6listenlist(cctx, &clistenon);
|
2000-06-06 18:53:02 +00:00
|
|
|
if (clistenon != NULL) {
|
|
|
|
result = ns_listenlist_fromconfig(clistenon,
|
|
|
|
cctx,
|
|
|
|
&aclconfctx,
|
|
|
|
ns_g_mctx,
|
|
|
|
&listenon);
|
2000-10-04 23:19:01 +00:00
|
|
|
} else if (!ns_g_lwresdonly) {
|
2000-07-10 11:35:02 +00:00
|
|
|
/*
|
|
|
|
* Not specified, use default.
|
|
|
|
*/
|
2000-06-06 18:53:02 +00:00
|
|
|
CHECK(ns_listenlist_default(ns_g_mctx, listen_port,
|
2000-06-23 01:08:29 +00:00
|
|
|
ISC_FALSE, &listenon));
|
2000-06-06 18:53:02 +00:00
|
|
|
}
|
2000-10-04 23:19:01 +00:00
|
|
|
if (listenon != NULL) {
|
|
|
|
ns_interfacemgr_setlistenon6(server->interfacemgr,
|
|
|
|
listenon);
|
|
|
|
ns_listenlist_detach(&listenon);
|
|
|
|
}
|
2000-06-05 19:10:13 +00:00
|
|
|
}
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-01-26 19:25:22 +00:00
|
|
|
/*
|
|
|
|
* Rescan the interface list to pick up changes in the
|
|
|
|
* listen-on option. It's important that we do this before we try
|
|
|
|
* to configure the query source, since the dispatcher we use might
|
|
|
|
* be shared with an interface.
|
|
|
|
*/
|
2000-06-08 22:31:55 +00:00
|
|
|
scan_interfaces(server, ISC_TRUE);
|
2000-02-16 19:58:39 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Arrange for further interface scanning to occur periodically
|
|
|
|
* as specified by the "interface-interval" option.
|
|
|
|
*/
|
|
|
|
interface_interval = 3600; /* Default is 1 hour. */
|
2000-07-10 11:35:02 +00:00
|
|
|
(void)dns_c_ctx_getinterfaceinterval(cctx, &interface_interval);
|
2000-02-16 19:58:39 +00:00
|
|
|
if (interface_interval == 0) {
|
2000-04-06 17:31:33 +00:00
|
|
|
isc_timer_reset(server->interface_timer,
|
|
|
|
isc_timertype_inactive,
|
2000-02-16 19:58:39 +00:00
|
|
|
NULL, NULL, ISC_TRUE);
|
|
|
|
} else {
|
|
|
|
isc_interval_t interval;
|
|
|
|
isc_interval_set(&interval, interface_interval, 0);
|
|
|
|
isc_timer_reset(server->interface_timer, isc_timertype_ticker,
|
|
|
|
NULL, &interval, ISC_FALSE);
|
|
|
|
}
|
2000-01-26 19:25:22 +00:00
|
|
|
|
2000-11-03 07:16:09 +00:00
|
|
|
/*
|
2000-11-03 17:54:52 +00:00
|
|
|
* Configure the dialup heartbeat timer.
|
2000-11-03 07:16:09 +00:00
|
|
|
*/
|
|
|
|
heartbeat_interval = 3600; /* Default is 1 hour. */
|
|
|
|
(void)dns_c_ctx_getheartbeatinterval(cctx, &heartbeat_interval);
|
|
|
|
|
|
|
|
if (heartbeat_interval == 0) {
|
|
|
|
isc_timer_reset(server->heartbeat_timer,
|
|
|
|
isc_timertype_inactive,
|
|
|
|
NULL, NULL, ISC_TRUE);
|
|
|
|
} else {
|
|
|
|
isc_interval_t interval;
|
|
|
|
isc_interval_set(&interval, heartbeat_interval, 0);
|
|
|
|
isc_timer_reset(server->heartbeat_timer, isc_timertype_ticker,
|
|
|
|
NULL, &interval, ISC_FALSE);
|
|
|
|
}
|
2000-11-03 17:54:52 +00:00
|
|
|
|
1999-10-15 01:51:48 +00:00
|
|
|
/*
|
2000-04-08 00:49:19 +00:00
|
|
|
* Configure and freeze all explicit views. Explicit
|
|
|
|
* views that have zones were already created at parsing
|
2000-04-06 17:31:33 +00:00
|
|
|
* time, but views with no zones must be created here.
|
|
|
|
*/
|
2000-04-07 22:36:15 +00:00
|
|
|
if (cctx->views != NULL) {
|
2000-04-06 17:31:33 +00:00
|
|
|
dns_c_view_t *cview;
|
2000-04-07 22:36:15 +00:00
|
|
|
for (cview = ISC_LIST_HEAD(cctx->views->views);
|
2000-04-06 17:31:33 +00:00
|
|
|
cview != NULL;
|
|
|
|
cview = ISC_LIST_NEXT(cview, next))
|
|
|
|
{
|
|
|
|
view = NULL;
|
|
|
|
CHECK(find_or_create_view(cview,
|
|
|
|
&lctx.viewlist, &view));
|
|
|
|
INSIST(view != NULL);
|
2000-04-07 22:36:15 +00:00
|
|
|
CHECK(configure_view(view, cctx, cview, ns_g_mctx,
|
Merge the mlg-20000518 branch onto the mainline. Change summary:
dns_dispatch_create() no longer exists. dns_dispatch_createtcp()
and dns_dispatch_getudp() are the replacements. _createtcp() takes
a bound, connected TCP socket, while _getudp() will search for
a sharable UDP socket, and if found, attach to it and return a
pointer to it. If one is not found, it will create a udp socket,
bind it to a supplied local address, and create a new dispatcher
around it.
dns_dispatch_remove{request,response}() no longer take the dispatch
as an argument.
query-source can now be set per view.
The dispatch manager holds onto three memory pools, one for
allocating dispatchers from, one for events, and one for
requests/replies. The free list on these pools is hard-coded,
but set to 1024. This keeps us from having to dig into the
isc_mem_t the pools draw from as often.
dns_resolver_create() and dns_view_createresolver() require that
valid dispatchers be passed in; dispatchers are no longer created
for the caller.
2000-05-19 21:46:46 +00:00
|
|
|
&aclconfctx));
|
2000-04-06 17:31:33 +00:00
|
|
|
dns_view_freeze(view);
|
|
|
|
dns_view_detach(&view);
|
|
|
|
}
|
|
|
|
}
|
2000-04-08 00:49:19 +00:00
|
|
|
INSIST(view == NULL);
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-04-06 17:31:33 +00:00
|
|
|
/*
|
2000-08-01 01:33:37 +00:00
|
|
|
* Make sure we have a default view if and only if there
|
|
|
|
* were no explicit views.
|
1999-10-15 01:51:48 +00:00
|
|
|
*/
|
2000-04-08 00:49:19 +00:00
|
|
|
if (cctx->views == NULL || ISC_LIST_EMPTY(cctx->views->views)) {
|
|
|
|
/*
|
|
|
|
* No explicit views; there ought to be a default view.
|
2000-12-01 08:58:10 +00:00
|
|
|
* There may already be one created as a side effect
|
2000-04-08 00:49:19 +00:00
|
|
|
* of zone statements, or we may have to create one.
|
|
|
|
* In either case, we need to configure and freeze it.
|
|
|
|
*/
|
|
|
|
CHECK(find_or_create_view(NULL, &lctx.viewlist, &view));
|
2000-04-07 22:36:15 +00:00
|
|
|
CHECK(configure_view(view, cctx, NULL,
|
Merge the mlg-20000518 branch onto the mainline. Change summary:
dns_dispatch_create() no longer exists. dns_dispatch_createtcp()
and dns_dispatch_getudp() are the replacements. _createtcp() takes
a bound, connected TCP socket, while _getudp() will search for
a sharable UDP socket, and if found, attach to it and return a
pointer to it. If one is not found, it will create a udp socket,
bind it to a supplied local address, and create a new dispatcher
around it.
dns_dispatch_remove{request,response}() no longer take the dispatch
as an argument.
query-source can now be set per view.
The dispatch manager holds onto three memory pools, one for
allocating dispatchers from, one for events, and one for
requests/replies. The free list on these pools is hard-coded,
but set to 1024. This keeps us from having to dig into the
isc_mem_t the pools draw from as often.
dns_resolver_create() and dns_view_createresolver() require that
valid dispatchers be passed in; dispatchers are no longer created
for the caller.
2000-05-19 21:46:46 +00:00
|
|
|
ns_g_mctx, &aclconfctx));
|
2000-04-08 00:49:19 +00:00
|
|
|
dns_view_freeze(view);
|
|
|
|
dns_view_detach(&view);
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* There are explicit views. There should not be
|
|
|
|
* a default view. If there is one, complain.
|
|
|
|
*/
|
2000-08-01 01:33:37 +00:00
|
|
|
result = dns_viewlist_find(&lctx.viewlist, "_default",
|
2000-04-08 00:49:19 +00:00
|
|
|
dns_rdataclass_in, &view);
|
|
|
|
if (result == ISC_R_SUCCESS) {
|
|
|
|
dns_view_detach(&view);
|
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL,
|
|
|
|
NS_LOGMODULE_SERVER, ISC_LOG_ERROR,
|
|
|
|
"when using 'view' statements, "
|
|
|
|
"all zones must be in views");
|
|
|
|
result = ISC_R_FAILURE;
|
|
|
|
goto cleanup;
|
|
|
|
}
|
2000-01-21 19:24:01 +00:00
|
|
|
}
|
2000-08-01 01:33:37 +00:00
|
|
|
|
1999-10-15 01:51:48 +00:00
|
|
|
/*
|
2000-08-02 18:13:08 +00:00
|
|
|
* Create (or recreate) the internal _bind view.
|
1999-10-15 01:51:48 +00:00
|
|
|
*/
|
2000-08-02 18:13:08 +00:00
|
|
|
CHECK(create_bind_view(&view));
|
1999-10-15 01:51:48 +00:00
|
|
|
ISC_LIST_APPEND(lctx.viewlist, view, link);
|
2000-08-02 18:13:08 +00:00
|
|
|
CHECK(create_version_zone(cctx, server->zonemgr, view));
|
|
|
|
CHECK(create_authors_zone(server->zonemgr, view));
|
|
|
|
dns_view_freeze(view);
|
1999-12-08 21:27:08 +00:00
|
|
|
view = NULL;
|
1999-01-31 12:31:31 +00:00
|
|
|
|
1999-10-15 01:51:48 +00:00
|
|
|
/*
|
2000-01-21 23:55:12 +00:00
|
|
|
* Swap our new view list with the production one.
|
1999-10-15 01:51:48 +00:00
|
|
|
*/
|
2000-01-21 23:55:12 +00:00
|
|
|
tmpviewlist = server->viewlist;
|
1999-12-22 18:45:56 +00:00
|
|
|
server->viewlist = lctx.viewlist;
|
2000-01-21 23:55:12 +00:00
|
|
|
lctx.viewlist = tmpviewlist;
|
1999-10-15 01:51:48 +00:00
|
|
|
|
|
|
|
/*
|
2000-01-25 19:05:46 +00:00
|
|
|
* Load the TKEY information from the configuration.
|
1999-10-15 01:51:48 +00:00
|
|
|
*/
|
2000-01-25 19:05:46 +00:00
|
|
|
{
|
2000-06-09 22:33:52 +00:00
|
|
|
dns_tkeyctx_t *t = NULL;
|
2000-11-27 19:42:38 +00:00
|
|
|
CHECKM(ns_tkeyctx_fromconfig(cctx, ns_g_mctx, ns_g_entropy,
|
2000-06-09 22:33:52 +00:00
|
|
|
&t),
|
2000-01-25 19:05:46 +00:00
|
|
|
"configuring TKEY");
|
|
|
|
if (server->tkeyctx != NULL)
|
|
|
|
dns_tkeyctx_destroy(&server->tkeyctx);
|
|
|
|
server->tkeyctx = t;
|
|
|
|
}
|
2000-01-29 01:38:09 +00:00
|
|
|
|
2000-07-10 11:35:02 +00:00
|
|
|
/*
|
|
|
|
* Bind the OMAPI port(s).
|
|
|
|
*/
|
|
|
|
CHECKM(ns_omapi_configure(ns_g_mctx, cctx, &aclconfctx),
|
|
|
|
"binding control channel(s)");
|
|
|
|
|
2000-10-04 23:19:01 +00:00
|
|
|
/*
|
|
|
|
* Bind the lwresd port(s).
|
|
|
|
*/
|
|
|
|
CHECKM(ns_lwresd_configure(ns_g_mctx, cctx),
|
|
|
|
"binding lightweight resolver ports");
|
|
|
|
|
2000-04-18 22:17:27 +00:00
|
|
|
/*
|
|
|
|
* Relinquish root privileges.
|
|
|
|
*/
|
|
|
|
if (first_time)
|
2000-07-01 00:48:06 +00:00
|
|
|
ns_os_changeuser();
|
2000-04-18 22:17:27 +00:00
|
|
|
|
2000-02-28 18:38:44 +00:00
|
|
|
/*
|
|
|
|
* Configure the logging system.
|
2000-08-01 01:33:37 +00:00
|
|
|
*
|
|
|
|
* Do this after changing UID to make sure that any log
|
2000-04-18 22:17:27 +00:00
|
|
|
* files specified in named.conf get created by the
|
|
|
|
* unprivileged user, not root.
|
2000-02-28 18:38:44 +00:00
|
|
|
*/
|
2000-02-28 22:17:59 +00:00
|
|
|
if (ns_g_logstderr) {
|
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL,
|
|
|
|
NS_LOGMODULE_SERVER, ISC_LOG_INFO,
|
2000-05-02 18:45:08 +00:00
|
|
|
"ignoring config file logging "
|
|
|
|
"statement due to -g option");
|
2000-02-28 22:17:59 +00:00
|
|
|
} else {
|
2000-02-28 18:38:44 +00:00
|
|
|
dns_c_logginglist_t *clog = NULL;
|
|
|
|
isc_logconfig_t *logc = NULL;
|
|
|
|
|
2000-03-01 00:40:54 +00:00
|
|
|
CHECKM(isc_logconfig_create(ns_g_lctx, &logc),
|
|
|
|
"creating new logging configuration");
|
|
|
|
|
2000-07-10 11:35:02 +00:00
|
|
|
(void)dns_c_ctx_getlogging(cctx, &clog);
|
2000-04-28 18:53:45 +00:00
|
|
|
if (clog != NULL) {
|
2000-03-01 00:40:54 +00:00
|
|
|
CHECKM(ns_log_configure(logc, clog),
|
|
|
|
"configuring logging");
|
2000-04-28 18:53:45 +00:00
|
|
|
} else {
|
|
|
|
CHECKM(ns_log_setdefaultchannels(logc),
|
|
|
|
"setting up default logging channels");
|
|
|
|
CHECKM(ns_log_setdefaultcategory(logc),
|
|
|
|
"setting up default 'category default'");
|
|
|
|
}
|
2000-02-28 18:38:44 +00:00
|
|
|
|
|
|
|
result = isc_logconfig_use(ns_g_lctx, logc);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
isc_logconfig_destroy(&logc);
|
2000-04-13 22:41:23 +00:00
|
|
|
CHECKM(result, "installing logging configuration");
|
2000-02-28 18:38:44 +00:00
|
|
|
}
|
|
|
|
|
2000-06-01 21:45:45 +00:00
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL,
|
|
|
|
NS_LOGMODULE_SERVER, ISC_LOG_DEBUG(1),
|
|
|
|
"now using logging configuration from "
|
|
|
|
"config file");
|
|
|
|
}
|
2000-05-02 18:45:08 +00:00
|
|
|
|
2000-12-01 02:01:26 +00:00
|
|
|
/*
|
|
|
|
* Set the default value of the query logging flag depending
|
|
|
|
* whether a "queries" category has been defined. This is
|
|
|
|
* a disgusting hack, but we need to do this for BIND 8
|
|
|
|
* compatibility.
|
|
|
|
*/
|
|
|
|
if (first_time) {
|
|
|
|
dns_c_logginglist_t *clog = NULL;
|
|
|
|
dns_c_logcat_t *ccat;
|
|
|
|
(void)dns_c_ctx_getlogging(cctx, &clog);
|
|
|
|
for (ccat = ISC_LIST_HEAD(clog->categories);
|
|
|
|
ccat != NULL;
|
|
|
|
ccat = ISC_LIST_NEXT(ccat, next)) {
|
|
|
|
if (strcmp(ccat->catname, "queries") == 0)
|
|
|
|
server->log_queries = ISC_TRUE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-06-01 18:49:22 +00:00
|
|
|
if (dns_c_ctx_getpidfilename(cctx, &pidfilename) != ISC_R_NOTFOUND)
|
|
|
|
ns_os_writepidfile(pidfilename);
|
2000-10-04 23:19:01 +00:00
|
|
|
else if (ns_g_lwresdonly)
|
|
|
|
ns_os_writepidfile(lwresd_g_defaultpidfile);
|
2000-06-01 18:49:22 +00:00
|
|
|
else
|
|
|
|
ns_os_writepidfile(ns_g_defaultpidfile);
|
|
|
|
|
2000-12-01 23:49:59 +00:00
|
|
|
result = dns_c_ctx_getstatsfilename(cctx, &statsfilename);
|
|
|
|
if (result == ISC_R_NOTFOUND) {
|
|
|
|
CHECKM(setstatsfile(server, "named.stats"), "strdup");
|
|
|
|
} else {
|
|
|
|
CHECKM(setstatsfile(server, statsfilename), "strdup");
|
|
|
|
}
|
2000-11-07 23:49:42 +00:00
|
|
|
|
2000-11-13 23:35:24 +00:00
|
|
|
cleanup:
|
2000-11-27 19:42:38 +00:00
|
|
|
ns_aclconfctx_destroy(&aclconfctx);
|
1999-12-17 00:19:29 +00:00
|
|
|
|
2000-11-14 00:37:19 +00:00
|
|
|
if (cctx != NULL)
|
|
|
|
dns_c_ctx_delete(&cctx);
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-11-13 23:35:24 +00:00
|
|
|
if (view != NULL)
|
|
|
|
dns_view_detach(&view);
|
|
|
|
|
2000-01-21 23:55:12 +00:00
|
|
|
/*
|
|
|
|
* This cleans up either the old production view list
|
|
|
|
* or our temporary list depending on whether they
|
|
|
|
* were swapped above or not.
|
|
|
|
*/
|
|
|
|
for (view = ISC_LIST_HEAD(lctx.viewlist);
|
|
|
|
view != NULL;
|
|
|
|
view = view_next) {
|
|
|
|
view_next = ISC_LIST_NEXT(view, link);
|
|
|
|
ISC_LIST_UNLINK(lctx.viewlist, view, link);
|
|
|
|
dns_view_detach(&view);
|
2000-01-27 01:00:16 +00:00
|
|
|
|
2000-01-21 23:55:12 +00:00
|
|
|
}
|
2000-01-27 01:00:16 +00:00
|
|
|
|
2000-03-08 22:31:52 +00:00
|
|
|
if (dispatchv4 != NULL)
|
|
|
|
dns_dispatch_detach(&dispatchv4);
|
|
|
|
if (dispatchv6 != NULL)
|
|
|
|
dns_dispatch_detach(&dispatchv6);
|
|
|
|
|
2000-01-27 01:00:16 +00:00
|
|
|
dns_zonemgr_unlockconf(server->zonemgr, isc_rwlocktype_write);
|
2000-02-16 19:58:39 +00:00
|
|
|
RWUNLOCK(&server->conflock, isc_rwlocktype_write);
|
2000-08-24 19:02:06 +00:00
|
|
|
|
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL, NS_LOGMODULE_SERVER,
|
|
|
|
ISC_LOG_DEBUG(1), "load_configuration: %s",
|
|
|
|
isc_result_totext(result));
|
|
|
|
|
2000-01-21 23:55:12 +00:00
|
|
|
return (result);
|
1999-07-24 01:16:38 +00:00
|
|
|
}
|
1999-01-19 06:32:53 +00:00
|
|
|
|
2000-01-22 01:36:34 +00:00
|
|
|
static isc_result_t
|
|
|
|
load_zones(ns_server_t *server, isc_boolean_t stop) {
|
|
|
|
isc_result_t result;
|
|
|
|
dns_view_t *view;
|
2000-01-27 01:00:16 +00:00
|
|
|
|
|
|
|
dns_zonemgr_lockconf(server->zonemgr, isc_rwlocktype_read);
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-01-22 01:36:34 +00:00
|
|
|
/*
|
|
|
|
* Load zone data from disk.
|
|
|
|
*/
|
|
|
|
for (view = ISC_LIST_HEAD(server->viewlist);
|
|
|
|
view != NULL;
|
|
|
|
view = ISC_LIST_NEXT(view, link))
|
|
|
|
{
|
|
|
|
CHECK(dns_view_load(view, stop));
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Force zone maintenance. Do this after loading
|
|
|
|
* so that we know when we need to force AXFR of
|
|
|
|
* slave zones whose master files are missing.
|
|
|
|
*/
|
|
|
|
CHECK(dns_zonemgr_forcemaint(server->zonemgr));
|
|
|
|
cleanup:
|
2000-08-01 01:33:37 +00:00
|
|
|
dns_zonemgr_unlockconf(server->zonemgr, isc_rwlocktype_read);
|
2000-01-22 01:36:34 +00:00
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
1999-07-24 01:16:38 +00:00
|
|
|
static void
|
|
|
|
run_server(isc_task_t *task, isc_event_t *event) {
|
2000-01-18 18:09:47 +00:00
|
|
|
isc_result_t result;
|
2000-04-17 19:22:44 +00:00
|
|
|
ns_server_t *server = (ns_server_t *)event->ev_arg;
|
2000-01-29 01:38:09 +00:00
|
|
|
|
2000-02-16 18:21:17 +00:00
|
|
|
UNUSED(task);
|
1999-10-15 01:51:48 +00:00
|
|
|
|
1999-10-22 19:35:19 +00:00
|
|
|
isc_event_free(&event);
|
1999-01-19 06:32:53 +00:00
|
|
|
|
2000-06-21 22:12:02 +00:00
|
|
|
CHECKFATAL(dns_dispatchmgr_create(ns_g_mctx, ns_g_entropy,
|
|
|
|
&ns_g_dispatchmgr),
|
|
|
|
"creating dispatch manager");
|
|
|
|
|
2000-01-21 23:55:12 +00:00
|
|
|
CHECKFATAL(ns_interfacemgr_create(ns_g_mctx, ns_g_taskmgr,
|
2000-05-10 21:34:50 +00:00
|
|
|
ns_g_socketmgr, ns_g_dispatchmgr,
|
2000-01-21 23:55:12 +00:00
|
|
|
&server->interfacemgr),
|
|
|
|
"creating interface manager");
|
2000-01-18 18:09:47 +00:00
|
|
|
|
2000-02-16 19:58:39 +00:00
|
|
|
CHECKFATAL(isc_timer_create(ns_g_timermgr, isc_timertype_inactive,
|
|
|
|
NULL, NULL, server->task,
|
|
|
|
interface_timer_tick,
|
|
|
|
server, &server->interface_timer),
|
|
|
|
"creating interface timer");
|
|
|
|
|
2000-11-03 07:16:09 +00:00
|
|
|
CHECKFATAL(isc_timer_create(ns_g_timermgr, isc_timertype_inactive,
|
|
|
|
NULL, NULL, server->task,
|
|
|
|
heartbeat_timer_tick,
|
|
|
|
server, &server->heartbeat_timer),
|
|
|
|
"creating heartbeat timer");
|
|
|
|
|
2000-10-04 23:19:01 +00:00
|
|
|
if (ns_g_lwresdonly)
|
|
|
|
CHECKFATAL(load_configuration(lwresd_g_conffile, server,
|
|
|
|
ISC_TRUE),
|
|
|
|
"loading configuration");
|
|
|
|
else
|
|
|
|
CHECKFATAL(load_configuration(ns_g_conffile, server, ISC_TRUE),
|
|
|
|
"loading configuration");
|
1999-10-15 01:51:48 +00:00
|
|
|
|
2000-10-03 23:56:26 +00:00
|
|
|
CHECKFATAL(load_zones(server, ISC_FALSE),
|
2000-01-22 01:36:34 +00:00
|
|
|
"loading zones");
|
|
|
|
|
1999-10-22 19:35:19 +00:00
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL, NS_LOGMODULE_SERVER,
|
1999-10-23 00:02:23 +00:00
|
|
|
ISC_LOG_INFO, "running");
|
1999-07-24 01:16:38 +00:00
|
|
|
}
|
1999-01-28 05:52:20 +00:00
|
|
|
|
2000-10-05 10:42:40 +00:00
|
|
|
void
|
2000-10-05 23:48:49 +00:00
|
|
|
ns_server_flushonshutdown(ns_server_t *server, isc_boolean_t flush) {
|
|
|
|
|
|
|
|
REQUIRE(NS_SERVER_VALID(server));
|
|
|
|
|
|
|
|
server->flushonshutdown = flush;
|
2000-10-05 10:42:40 +00:00
|
|
|
}
|
|
|
|
|
1999-07-24 01:16:38 +00:00
|
|
|
static void
|
|
|
|
shutdown_server(isc_task_t *task, isc_event_t *event) {
|
1999-08-05 22:14:43 +00:00
|
|
|
dns_view_t *view, *view_next;
|
2000-04-17 19:22:44 +00:00
|
|
|
ns_server_t *server = (ns_server_t *)event->ev_arg;
|
2000-10-05 10:42:40 +00:00
|
|
|
isc_boolean_t flush = server->flushonshutdown;
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-01-27 01:00:16 +00:00
|
|
|
UNUSED(task);
|
|
|
|
|
|
|
|
RWLOCK(&server->conflock, isc_rwlocktype_write);
|
1999-08-05 22:14:43 +00:00
|
|
|
|
1999-10-22 19:35:19 +00:00
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL, NS_LOGMODULE_SERVER,
|
2000-10-05 10:42:40 +00:00
|
|
|
ISC_LOG_INFO, "shutting down%s",
|
|
|
|
flush ? ": flushing changes" : "");
|
1999-08-05 22:14:43 +00:00
|
|
|
|
1999-12-22 18:45:56 +00:00
|
|
|
for (view = ISC_LIST_HEAD(server->viewlist);
|
1999-08-05 22:14:43 +00:00
|
|
|
view != NULL;
|
|
|
|
view = view_next) {
|
|
|
|
view_next = ISC_LIST_NEXT(view, link);
|
1999-12-22 18:45:56 +00:00
|
|
|
ISC_LIST_UNLINK(server->viewlist, view, link);
|
2000-10-05 10:42:40 +00:00
|
|
|
if (flush)
|
|
|
|
dns_view_flushanddetach(&view);
|
|
|
|
else
|
|
|
|
dns_view_detach(&view);
|
1999-08-05 22:14:43 +00:00
|
|
|
}
|
1999-10-15 01:51:48 +00:00
|
|
|
|
2000-02-16 19:58:39 +00:00
|
|
|
isc_timer_detach(&server->interface_timer);
|
2000-11-03 07:16:09 +00:00
|
|
|
isc_timer_detach(&server->heartbeat_timer);
|
2000-05-17 19:45:36 +00:00
|
|
|
|
2000-01-12 01:17:34 +00:00
|
|
|
ns_interfacemgr_shutdown(server->interfacemgr);
|
2000-08-01 01:33:37 +00:00
|
|
|
ns_interfacemgr_detach(&server->interfacemgr);
|
2000-05-17 19:45:36 +00:00
|
|
|
|
2000-06-21 22:12:02 +00:00
|
|
|
dns_dispatchmgr_destroy(&ns_g_dispatchmgr);
|
|
|
|
|
2000-01-19 22:02:18 +00:00
|
|
|
dns_zonemgr_shutdown(server->zonemgr);
|
Merge the mlg-20000518 branch onto the mainline. Change summary:
dns_dispatch_create() no longer exists. dns_dispatch_createtcp()
and dns_dispatch_getudp() are the replacements. _createtcp() takes
a bound, connected TCP socket, while _getudp() will search for
a sharable UDP socket, and if found, attach to it and return a
pointer to it. If one is not found, it will create a udp socket,
bind it to a supplied local address, and create a new dispatcher
around it.
dns_dispatch_remove{request,response}() no longer take the dispatch
as an argument.
query-source can now be set per view.
The dispatch manager holds onto three memory pools, one for
allocating dispatchers from, one for events, and one for
requests/replies. The free list on these pools is hard-coded,
but set to 1024. This keeps us from having to dig into the
isc_mem_t the pools draw from as often.
dns_resolver_create() and dns_view_createresolver() require that
valid dispatchers be passed in; dispatchers are no longer created
for the caller.
2000-05-19 21:46:46 +00:00
|
|
|
|
2000-11-03 02:45:55 +00:00
|
|
|
if (server->blackholeacl != NULL)
|
|
|
|
dns_acl_detach(&server->blackholeacl);
|
|
|
|
|
2000-01-13 22:07:24 +00:00
|
|
|
isc_task_detach(&server->task);
|
2000-01-27 01:00:16 +00:00
|
|
|
|
1999-07-24 01:16:38 +00:00
|
|
|
isc_event_free(&event);
|
2000-01-27 01:00:16 +00:00
|
|
|
|
|
|
|
RWUNLOCK(&server->conflock, isc_rwlocktype_write);
|
1999-07-24 01:16:38 +00:00
|
|
|
}
|
1999-01-19 06:32:53 +00:00
|
|
|
|
2000-01-21 23:55:12 +00:00
|
|
|
void
|
1999-12-16 23:11:07 +00:00
|
|
|
ns_server_create(isc_mem_t *mctx, ns_server_t **serverp) {
|
1999-12-22 18:45:56 +00:00
|
|
|
isc_result_t result;
|
2000-08-01 01:33:37 +00:00
|
|
|
|
1999-12-16 23:11:07 +00:00
|
|
|
ns_server_t *server = isc_mem_get(mctx, sizeof(*server));
|
|
|
|
if (server == NULL)
|
2000-01-21 23:55:12 +00:00
|
|
|
fatal("allocating server object", ISC_R_NOMEMORY);
|
|
|
|
|
1999-12-16 23:11:07 +00:00
|
|
|
server->mctx = mctx;
|
2000-01-13 22:07:24 +00:00
|
|
|
server->task = NULL;
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-01-27 21:20:32 +00:00
|
|
|
CHECKFATAL(isc_rwlock_init(&server->conflock, 1, 1),
|
2000-01-27 01:00:16 +00:00
|
|
|
"initializing server configuration lock");
|
|
|
|
|
1999-12-22 18:45:56 +00:00
|
|
|
/* Initialize configuration data with default values. */
|
2000-01-27 01:00:16 +00:00
|
|
|
|
2000-01-13 21:17:08 +00:00
|
|
|
result = isc_quota_init(&server->xfroutquota, 10);
|
2000-08-01 01:33:37 +00:00
|
|
|
RUNTIME_CHECK(result == ISC_R_SUCCESS);
|
2000-01-13 21:17:08 +00:00
|
|
|
result = isc_quota_init(&server->tcpquota, 10);
|
2000-08-01 01:33:37 +00:00
|
|
|
RUNTIME_CHECK(result == ISC_R_SUCCESS);
|
2000-01-13 21:17:08 +00:00
|
|
|
result = isc_quota_init(&server->recursionquota, 100);
|
2000-08-01 01:33:37 +00:00
|
|
|
RUNTIME_CHECK(result == ISC_R_SUCCESS);
|
2000-02-09 22:59:40 +00:00
|
|
|
|
|
|
|
result = dns_aclenv_init(mctx, &server->aclenv);
|
2000-03-20 21:06:27 +00:00
|
|
|
RUNTIME_CHECK(result == ISC_R_SUCCESS);
|
2000-08-01 01:33:37 +00:00
|
|
|
|
1999-12-22 18:45:56 +00:00
|
|
|
/* Initialize server data structures. */
|
2000-09-05 03:35:24 +00:00
|
|
|
server->loadmgr = NULL;
|
2000-01-18 18:09:47 +00:00
|
|
|
server->zonemgr = NULL;
|
|
|
|
server->interfacemgr = NULL;
|
1999-12-22 18:45:56 +00:00
|
|
|
ISC_LIST_INIT(server->viewlist);
|
2000-04-06 17:31:33 +00:00
|
|
|
server->in_roothints = NULL;
|
2000-11-03 02:45:55 +00:00
|
|
|
server->blackholeacl = NULL;
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-01-27 01:57:08 +00:00
|
|
|
CHECKFATAL(dns_rootns_create(mctx, dns_rdataclass_in, NULL,
|
2000-04-06 17:31:33 +00:00
|
|
|
&server->in_roothints),
|
2000-01-21 23:55:12 +00:00
|
|
|
"setting up root hints");
|
2000-01-24 22:21:47 +00:00
|
|
|
|
|
|
|
CHECKFATAL(isc_mutex_init(&server->reload_event_lock),
|
|
|
|
"initializing reload event lock");
|
|
|
|
server->reload_event =
|
|
|
|
isc_event_allocate(ns_g_mctx, server,
|
|
|
|
NS_EVENT_RELOAD,
|
|
|
|
ns_server_reload,
|
|
|
|
server,
|
|
|
|
sizeof(isc_event_t));
|
|
|
|
CHECKFATAL(server->reload_event == NULL ?
|
|
|
|
ISC_R_NOMEMORY : ISC_R_SUCCESS,
|
|
|
|
"allocating reload event");
|
2000-01-25 19:05:46 +00:00
|
|
|
|
2000-08-08 18:15:18 +00:00
|
|
|
CHECKFATAL(dst_lib_init(ns_g_mctx, ns_g_entropy, ISC_ENTROPY_GOODONLY),
|
2000-06-09 22:33:52 +00:00
|
|
|
"initializing DST");
|
2000-06-07 01:44:33 +00:00
|
|
|
|
2000-01-25 19:05:46 +00:00
|
|
|
server->tkeyctx = NULL;
|
2000-06-21 22:12:02 +00:00
|
|
|
CHECKFATAL(dns_tkeyctx_create(ns_g_mctx, ns_g_entropy,
|
2000-06-09 22:33:52 +00:00
|
|
|
&server->tkeyctx),
|
2000-01-25 19:05:46 +00:00
|
|
|
"creating TKEY context");
|
|
|
|
|
2000-01-13 22:07:24 +00:00
|
|
|
/*
|
|
|
|
* Setup the server task, which is responsible for coordinating
|
|
|
|
* startup and shutdown of the server.
|
|
|
|
*/
|
2000-04-12 01:38:26 +00:00
|
|
|
CHECKFATAL(isc_task_create(ns_g_taskmgr, 0, &server->task),
|
2000-01-21 23:55:12 +00:00
|
|
|
"creating server task");
|
2000-01-25 19:31:23 +00:00
|
|
|
isc_task_setname(server->task, "server", server);
|
2000-01-21 23:55:12 +00:00
|
|
|
CHECKFATAL(isc_task_onshutdown(server->task, shutdown_server, server),
|
|
|
|
"isc_task_onshutdown");
|
|
|
|
CHECKFATAL(isc_app_onrun(ns_g_mctx, server->task, run_server, server),
|
|
|
|
"isc_app_onrun");
|
|
|
|
|
2000-02-16 19:58:39 +00:00
|
|
|
server->interface_timer = NULL;
|
2000-11-03 07:16:09 +00:00
|
|
|
server->heartbeat_timer = NULL;
|
2000-09-06 20:52:05 +00:00
|
|
|
|
2000-01-21 23:55:12 +00:00
|
|
|
CHECKFATAL(dns_zonemgr_create(ns_g_mctx, ns_g_taskmgr, ns_g_timermgr,
|
|
|
|
ns_g_socketmgr, &server->zonemgr),
|
|
|
|
"dns_zonemgr_create");
|
2000-09-05 03:35:24 +00:00
|
|
|
CHECKFATAL(dns_loadmgr_create(ns_g_mctx, &server->loadmgr),
|
|
|
|
"dns_loadmgr_create");
|
2000-01-19 22:02:18 +00:00
|
|
|
|
2000-12-01 23:49:59 +00:00
|
|
|
server->statsfile = isc_mem_strdup(server->mctx, "named.stats");
|
|
|
|
CHECKFATAL(server->statsfile == NULL ? ISC_R_NOMEMORY : ISC_R_SUCCESS,
|
|
|
|
"isc_mem_strdup");
|
|
|
|
server->querystats = NULL;
|
|
|
|
CHECKFATAL(dns_stats_alloccounters(ns_g_mctx, &server->querystats),
|
|
|
|
"dns_stats_alloccounters");
|
2000-11-28 19:58:14 +00:00
|
|
|
|
2000-10-05 10:42:40 +00:00
|
|
|
server->flushonshutdown = ISC_FALSE;
|
2000-11-30 00:25:49 +00:00
|
|
|
server->log_queries = ISC_FALSE;
|
|
|
|
|
1999-12-16 23:11:07 +00:00
|
|
|
server->magic = NS_SERVER_MAGIC;
|
|
|
|
*serverp = server;
|
|
|
|
}
|
2000-08-01 01:33:37 +00:00
|
|
|
|
1999-12-16 23:11:07 +00:00
|
|
|
void
|
|
|
|
ns_server_destroy(ns_server_t **serverp) {
|
|
|
|
ns_server_t *server = *serverp;
|
|
|
|
REQUIRE(NS_SERVER_VALID(server));
|
|
|
|
|
2000-12-01 23:49:59 +00:00
|
|
|
dns_stats_freecounters(server->mctx, &server->querystats);
|
|
|
|
isc_mem_free(server->mctx, server->statsfile);
|
2000-11-08 18:58:02 +00:00
|
|
|
|
2000-09-05 03:35:24 +00:00
|
|
|
dns_loadmgr_detach(&server->loadmgr);
|
2000-06-15 17:40:22 +00:00
|
|
|
dns_zonemgr_detach(&server->zonemgr);
|
|
|
|
|
2000-01-25 19:05:46 +00:00
|
|
|
if (server->tkeyctx != NULL)
|
|
|
|
dns_tkeyctx_destroy(&server->tkeyctx);
|
|
|
|
|
2000-06-07 01:44:33 +00:00
|
|
|
dst_lib_destroy();
|
|
|
|
|
2000-01-24 22:21:47 +00:00
|
|
|
isc_event_free(&server->reload_event);
|
2000-08-01 01:33:37 +00:00
|
|
|
|
1999-12-22 18:45:56 +00:00
|
|
|
INSIST(ISC_LIST_EMPTY(server->viewlist));
|
2000-01-18 23:38:42 +00:00
|
|
|
|
2000-04-06 17:31:33 +00:00
|
|
|
dns_db_detach(&server->in_roothints);
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-02-09 22:59:40 +00:00
|
|
|
dns_aclenv_destroy(&server->aclenv);
|
|
|
|
|
2000-01-11 21:18:22 +00:00
|
|
|
isc_quota_destroy(&server->recursionquota);
|
|
|
|
isc_quota_destroy(&server->tcpquota);
|
|
|
|
isc_quota_destroy(&server->xfroutquota);
|
2000-01-27 01:00:16 +00:00
|
|
|
isc_rwlock_destroy(&server->conflock);
|
2000-01-26 19:25:22 +00:00
|
|
|
|
1999-12-16 23:11:07 +00:00
|
|
|
server->magic = 0;
|
|
|
|
isc_mem_put(server->mctx, server, sizeof(*server));
|
|
|
|
}
|
2000-01-18 22:49:55 +00:00
|
|
|
|
2000-01-21 23:55:12 +00:00
|
|
|
static void
|
2000-06-01 18:49:22 +00:00
|
|
|
fatal(const char *msg, isc_result_t result) {
|
2000-01-21 23:55:12 +00:00
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL, NS_LOGMODULE_SERVER,
|
2000-03-14 21:19:31 +00:00
|
|
|
ISC_LOG_CRITICAL, "%s: %s", msg,
|
|
|
|
isc_result_totext(result));
|
1999-10-23 00:02:23 +00:00
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL, NS_LOGMODULE_SERVER,
|
|
|
|
ISC_LOG_CRITICAL, "exiting (due to fatal error)");
|
|
|
|
exit(1);
|
|
|
|
}
|
2000-01-24 22:21:47 +00:00
|
|
|
|
|
|
|
static void
|
|
|
|
ns_server_reload(isc_task_t *task, isc_event_t *event) {
|
|
|
|
isc_result_t result;
|
2000-04-17 19:22:44 +00:00
|
|
|
ns_server_t *server = (ns_server_t *)event->ev_arg;
|
2000-01-24 22:21:47 +00:00
|
|
|
UNUSED(task);
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-10-04 23:19:01 +00:00
|
|
|
if (ns_g_lwresdonly)
|
|
|
|
result = load_configuration(lwresd_g_conffile, server,
|
|
|
|
ISC_FALSE);
|
|
|
|
else
|
|
|
|
result = load_configuration(ns_g_conffile, server, ISC_FALSE);
|
2000-04-06 22:03:35 +00:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
2000-01-24 22:21:47 +00:00
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL,
|
|
|
|
NS_LOGMODULE_SERVER, ISC_LOG_ERROR,
|
|
|
|
"reloading configuration failed: %s",
|
|
|
|
isc_result_totext(result));
|
|
|
|
}
|
|
|
|
result = load_zones(server, ISC_FALSE);
|
2000-04-06 22:03:35 +00:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
2000-01-24 22:21:47 +00:00
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL,
|
|
|
|
NS_LOGMODULE_SERVER, ISC_LOG_ERROR,
|
|
|
|
"reloading zones failed: %s",
|
|
|
|
isc_result_totext(result));
|
|
|
|
}
|
|
|
|
LOCK(&server->reload_event_lock);
|
|
|
|
INSIST(server->reload_event == NULL);
|
|
|
|
server->reload_event = event;
|
|
|
|
UNLOCK(&server->reload_event_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ns_server_reloadwanted(ns_server_t *server) {
|
|
|
|
LOCK(&server->reload_event_lock);
|
|
|
|
if (server->reload_event != NULL)
|
|
|
|
isc_task_send(server->task, &server->reload_event);
|
|
|
|
UNLOCK(&server->reload_event_lock);
|
|
|
|
}
|
2000-01-25 21:21:05 +00:00
|
|
|
|
2000-10-12 21:52:00 +00:00
|
|
|
static char *
|
|
|
|
next_token(char **stringp, const char *delim) {
|
|
|
|
char *res;
|
2000-10-11 21:21:47 +00:00
|
|
|
|
2000-10-12 21:52:00 +00:00
|
|
|
do {
|
|
|
|
res = strsep(stringp, delim);
|
|
|
|
if (res == NULL)
|
|
|
|
break;
|
|
|
|
} while (*res == '\0');
|
|
|
|
return (res);
|
|
|
|
}
|
|
|
|
|
2000-11-30 19:38:04 +00:00
|
|
|
/*
|
|
|
|
* Find the zone specified in the control channel command 'args',
|
|
|
|
* if any. If a zone is specified, point '*zonep' at it, otherwise
|
|
|
|
* set '*zonep' to NULL.
|
|
|
|
*/
|
2000-10-12 21:52:00 +00:00
|
|
|
static isc_result_t
|
2000-11-30 19:38:04 +00:00
|
|
|
zone_from_args(ns_server_t *server, char *args, dns_zone_t **zonep) {
|
2000-10-12 21:52:00 +00:00
|
|
|
char *input, *ptr;
|
2000-11-30 19:38:04 +00:00
|
|
|
const char *zonetxt;
|
2000-11-30 20:47:53 +00:00
|
|
|
char *classtxt;
|
|
|
|
const char *viewtxt = NULL;
|
2000-10-12 21:52:00 +00:00
|
|
|
dns_fixedname_t name;
|
|
|
|
isc_result_t result;
|
|
|
|
isc_buffer_t buf;
|
2000-11-25 03:27:54 +00:00
|
|
|
dns_view_t *view = NULL;
|
2000-11-30 20:47:53 +00:00
|
|
|
dns_rdataclass_t rdclass;
|
2000-10-12 21:52:00 +00:00
|
|
|
|
2000-11-30 19:38:04 +00:00
|
|
|
REQUIRE(zonep != NULL && *zonep == NULL);
|
|
|
|
|
2000-10-12 21:52:00 +00:00
|
|
|
input = args;
|
2000-11-30 19:38:04 +00:00
|
|
|
|
|
|
|
/* Skip the command name. */
|
2000-10-12 21:52:00 +00:00
|
|
|
ptr = next_token(&input, " \t");
|
2000-11-30 19:38:04 +00:00
|
|
|
if (ptr == NULL)
|
|
|
|
return (ISC_R_UNEXPECTEDEND);
|
|
|
|
|
|
|
|
/* Look for the zone name. */
|
|
|
|
zonetxt = next_token(&input, " \t");
|
|
|
|
if (zonetxt == NULL) {
|
|
|
|
*zonep = NULL;
|
|
|
|
return (ISC_R_SUCCESS);
|
2000-10-12 21:52:00 +00:00
|
|
|
}
|
2000-11-30 19:38:04 +00:00
|
|
|
|
2000-11-30 20:47:53 +00:00
|
|
|
/* Look for the optional class name. */
|
|
|
|
classtxt = next_token(&input, " \t");
|
|
|
|
if (classtxt != NULL) {
|
|
|
|
/* Look for the optional view name. */
|
|
|
|
viewtxt = next_token(&input, " \t");
|
|
|
|
}
|
2000-11-30 19:38:04 +00:00
|
|
|
|
2000-10-12 21:52:00 +00:00
|
|
|
isc_buffer_init(&buf, zonetxt, strlen(zonetxt));
|
|
|
|
isc_buffer_add(&buf, strlen(zonetxt));
|
|
|
|
dns_fixedname_init(&name);
|
2000-11-30 20:47:53 +00:00
|
|
|
result = dns_name_fromtext(dns_fixedname_name(&name),
|
|
|
|
&buf, dns_rootname, ISC_FALSE, NULL);
|
2000-10-12 21:52:00 +00:00
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
goto fail1;
|
2000-11-30 20:47:53 +00:00
|
|
|
|
|
|
|
if (classtxt != NULL) {
|
|
|
|
isc_textregion_t r;
|
|
|
|
r.base = classtxt;
|
|
|
|
r.length = strlen(classtxt);
|
|
|
|
result = dns_rdataclass_fromtext(&rdclass, &r);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
goto fail1;
|
|
|
|
} else {
|
|
|
|
rdclass = dns_rdataclass_in;
|
|
|
|
}
|
|
|
|
|
2000-11-30 19:38:04 +00:00
|
|
|
if (viewtxt == NULL)
|
2000-10-12 21:52:00 +00:00
|
|
|
viewtxt = "_default";
|
2000-11-30 19:38:04 +00:00
|
|
|
result = dns_viewlist_find(&server->viewlist, viewtxt,
|
2000-11-30 20:47:53 +00:00
|
|
|
rdclass, &view);
|
2000-10-12 21:52:00 +00:00
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
goto fail1;
|
2000-11-30 20:47:53 +00:00
|
|
|
|
2000-11-30 19:38:04 +00:00
|
|
|
result = dns_zt_find(view->zonetable, dns_fixedname_name(&name),
|
|
|
|
0, NULL, zonep);
|
2000-10-12 21:52:00 +00:00
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
goto fail2;
|
|
|
|
fail2:
|
|
|
|
dns_view_detach(&view);
|
|
|
|
fail1:
|
|
|
|
return (result);
|
2000-10-11 21:21:47 +00:00
|
|
|
}
|
|
|
|
|
2000-11-30 19:38:04 +00:00
|
|
|
/*
|
|
|
|
* Act on a "reload" command from the command channel.
|
|
|
|
*/
|
2000-10-12 21:52:00 +00:00
|
|
|
isc_result_t
|
2000-11-30 19:38:04 +00:00
|
|
|
ns_server_reloadcommand(ns_server_t *server, char *args) {
|
2000-10-12 21:52:00 +00:00
|
|
|
isc_result_t result;
|
|
|
|
dns_zone_t *zone = NULL;
|
|
|
|
|
|
|
|
UNUSED(server);
|
2000-11-30 19:38:04 +00:00
|
|
|
result = zone_from_args(server, args, &zone);
|
2000-10-12 21:52:00 +00:00
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
return (result);
|
2000-11-30 19:38:04 +00:00
|
|
|
if (zone == NULL) {
|
|
|
|
ns_server_reloadwanted(server);
|
|
|
|
} else {
|
2000-10-12 21:52:00 +00:00
|
|
|
dns_zone_forcereload(zone);
|
|
|
|
dns_zone_detach(&zone);
|
|
|
|
}
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
2000-11-30 19:38:04 +00:00
|
|
|
/*
|
|
|
|
* Act on a "refresh" command from the command channel.
|
|
|
|
*/
|
2000-10-12 21:52:00 +00:00
|
|
|
isc_result_t
|
2000-11-30 19:38:04 +00:00
|
|
|
ns_server_refreshcommand(ns_server_t *server, char *args) {
|
2000-10-12 21:52:00 +00:00
|
|
|
isc_result_t result;
|
|
|
|
dns_zone_t *zone = NULL;
|
|
|
|
|
2000-11-30 19:38:04 +00:00
|
|
|
result = zone_from_args(server, args, &zone);
|
2000-10-12 21:52:00 +00:00
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
return (result);
|
2000-11-30 19:38:04 +00:00
|
|
|
if (zone == NULL)
|
|
|
|
return (ISC_R_UNEXPECTEDEND);
|
|
|
|
|
|
|
|
dns_zone_refresh(zone);
|
|
|
|
dns_zone_detach(&zone);
|
|
|
|
|
2000-10-12 21:52:00 +00:00
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
2000-11-30 00:25:49 +00:00
|
|
|
isc_result_t
|
|
|
|
ns_server_togglequerylog(ns_server_t *server) {
|
|
|
|
server->log_queries = ! server->log_queries;
|
|
|
|
|
|
|
|
isc_log_write(ns_g_lctx, NS_LOGCATEGORY_GENERAL,
|
|
|
|
NS_LOGMODULE_SERVER, ISC_LOG_INFO,
|
|
|
|
"query logging is now %s",
|
|
|
|
server->log_queries ? "on" : "off");
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
2000-01-31 22:06:09 +00:00
|
|
|
static isc_result_t
|
2000-01-25 21:21:05 +00:00
|
|
|
ns_listenlist_fromconfig(dns_c_lstnlist_t *clist, dns_c_ctx_t *cctx,
|
2000-11-27 19:42:38 +00:00
|
|
|
ns_aclconfctx_t *actx,
|
2000-01-25 21:21:05 +00:00
|
|
|
isc_mem_t *mctx, ns_listenlist_t **target)
|
|
|
|
{
|
|
|
|
dns_c_lstnon_t *ce;
|
|
|
|
isc_result_t result;
|
|
|
|
ns_listenlist_t *dlist = NULL;
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-01-25 21:21:05 +00:00
|
|
|
REQUIRE(target != NULL && *target == NULL);
|
|
|
|
|
|
|
|
result = ns_listenlist_create(mctx, &dlist);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
return (result);
|
2000-08-01 01:33:37 +00:00
|
|
|
|
2000-01-25 21:21:05 +00:00
|
|
|
for (ce = ISC_LIST_HEAD(clist->elements);
|
|
|
|
ce != NULL;
|
|
|
|
ce = ISC_LIST_NEXT(ce, next))
|
|
|
|
{
|
|
|
|
ns_listenelt_t *delt = NULL;
|
|
|
|
result = ns_listenelt_fromconfig(ce, cctx, actx, mctx, &delt);
|
2000-04-06 22:03:35 +00:00
|
|
|
if (result != ISC_R_SUCCESS)
|
2000-01-25 21:21:05 +00:00
|
|
|
goto cleanup;
|
|
|
|
ISC_LIST_APPEND(dlist->elts, delt, link);
|
|
|
|
}
|
|
|
|
*target = dlist;
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
ns_listenlist_detach(&dlist);
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create a listen list from the corresponding configuration
|
|
|
|
* data structure.
|
|
|
|
*/
|
|
|
|
static isc_result_t
|
|
|
|
ns_listenelt_fromconfig(dns_c_lstnon_t *celt, dns_c_ctx_t *cctx,
|
2000-11-27 19:42:38 +00:00
|
|
|
ns_aclconfctx_t *actx,
|
2000-01-25 21:21:05 +00:00
|
|
|
isc_mem_t *mctx, ns_listenelt_t **target)
|
|
|
|
{
|
|
|
|
isc_result_t result;
|
|
|
|
ns_listenelt_t *delt = NULL;
|
|
|
|
REQUIRE(target != NULL && *target == NULL);
|
|
|
|
result = ns_listenelt_create(mctx, celt->port, NULL, &delt);
|
|
|
|
if (result != ISC_R_SUCCESS)
|
|
|
|
return (result);
|
|
|
|
|
2000-11-27 19:42:38 +00:00
|
|
|
result = ns_acl_fromconfig(celt->iml, cctx, actx, mctx, &delt->acl);
|
2000-04-06 22:03:35 +00:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
2000-01-25 21:21:05 +00:00
|
|
|
ns_listenelt_destroy(delt);
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
*target = delt;
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
2000-11-07 23:49:42 +00:00
|
|
|
|
|
|
|
isc_result_t
|
|
|
|
ns_server_dumpstats(ns_server_t *server) {
|
|
|
|
isc_result_t result;
|
2000-12-01 23:49:59 +00:00
|
|
|
dns_zone_t *zone;
|
2000-11-07 23:49:42 +00:00
|
|
|
isc_stdtime_t now;
|
2000-12-01 23:49:59 +00:00
|
|
|
FILE *fp = NULL;
|
2000-11-09 19:55:20 +00:00
|
|
|
int i;
|
2000-12-01 23:49:59 +00:00
|
|
|
int ncounters;
|
2000-11-07 23:49:42 +00:00
|
|
|
|
|
|
|
isc_stdtime_get(&now);
|
2000-12-01 23:49:59 +00:00
|
|
|
|
|
|
|
CHECKM(isc_stdio_open(server->statsfile, "a", &fp),
|
|
|
|
"could not open statistics dump file");
|
|
|
|
|
|
|
|
ncounters = dns_stats_ncounters();
|
|
|
|
fprintf(fp, "+++ Statistics Dump +++ (%lu)\n", (unsigned long)now);
|
|
|
|
|
|
|
|
for (i = 0; i < ncounters; i++)
|
|
|
|
fprintf(fp, "%s %" ISC_PRINT_QUADFORMAT "d\n",
|
|
|
|
dns_statscounter_names[i],
|
|
|
|
server->querystats[i]);
|
|
|
|
|
2000-11-07 23:49:42 +00:00
|
|
|
dns_zonemgr_lockconf(server->zonemgr, isc_rwlocktype_read);
|
2000-12-05 01:41:29 +00:00
|
|
|
zone = NULL;
|
2000-12-01 23:49:59 +00:00
|
|
|
for (result = dns_zone_first(server->zonemgr, &zone);
|
|
|
|
result == ISC_R_SUCCESS;
|
|
|
|
result = dns_zone_next(zone, &zone))
|
|
|
|
{
|
|
|
|
isc_uint64_t *zonestats = dns_zone_getstatscounters(zone);
|
|
|
|
if (zonestats != NULL) {
|
|
|
|
char zonename[DNS_NAME_FORMATSIZE];
|
|
|
|
dns_view_t *view;
|
|
|
|
char *viewname;
|
|
|
|
|
|
|
|
dns_name_format(dns_zone_getorigin(zone),
|
|
|
|
zonename, sizeof(zonename));
|
|
|
|
view = dns_zone_getview(zone);
|
|
|
|
viewname = view->name;
|
|
|
|
for (i = 0; i < ncounters; i++) {
|
|
|
|
fprintf(fp, "%s %" ISC_PRINT_QUADFORMAT
|
|
|
|
"d %s",
|
|
|
|
dns_statscounter_names[i],
|
|
|
|
zonestats[i],
|
|
|
|
zonename);
|
|
|
|
if (strcmp(viewname, "_default") != 0)
|
|
|
|
fprintf(fp, " %s", viewname);
|
|
|
|
fprintf(fp, "\n");
|
|
|
|
}
|
2000-11-07 23:49:42 +00:00
|
|
|
}
|
|
|
|
}
|
2000-12-01 23:49:59 +00:00
|
|
|
if (result == ISC_R_NOMORE)
|
|
|
|
result = ISC_R_SUCCESS;
|
|
|
|
CHECK(result);
|
|
|
|
|
|
|
|
fprintf(fp, "--- Statistics Dump --- (%lu)\n", (unsigned long)now);
|
2000-11-07 23:49:42 +00:00
|
|
|
dns_zonemgr_unlockconf(server->zonemgr, isc_rwlocktype_read);
|
2000-12-01 23:49:59 +00:00
|
|
|
|
|
|
|
cleanup:
|
|
|
|
if (fp != NULL)
|
|
|
|
(void)isc_stdio_close(fp);
|
|
|
|
return (result);
|
2000-11-07 23:49:42 +00:00
|
|
|
}
|