2005-09-06 03:51:37 +00:00
|
|
|
/*
|
2018-02-15 00:16:19 +11:00
|
|
|
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
2021-06-03 08:37:05 +02:00
|
|
|
*
|
2018-02-15 00:16:19 +11:00
|
|
|
* SPDX-License-Identifier: MPL-2.0 AND ISC
|
2005-09-06 03:51:37 +00:00
|
|
|
*
|
|
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
|
2018-02-23 09:53:12 +01:00
|
|
|
*
|
2005-09-06 03:51:37 +00:00
|
|
|
* See the COPYRIGHT file distributed with this work for additional
|
2005-09-05 00:12:29 +00:00
|
|
|
* information regarding copyright ownership.
|
2005-09-06 03:51:37 +00:00
|
|
|
*/
|
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2002 Stichting NLnet, Netherlands, stichting@nlnet.nl.
|
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the
|
|
|
|
* above copyright notice and this permission notice appear in all
|
|
|
|
* copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND STICHTING NLNET
|
|
|
|
* DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL
|
|
|
|
* STICHTING NLNET BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR
|
|
|
|
* CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS
|
|
|
|
* OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
|
|
|
|
* OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE
|
|
|
|
* USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
*
|
|
|
|
* The development of Dynamically Loadable Zones (DLZ) for Bind 9 was
|
|
|
|
* conceived and contributed by Rob Butler.
|
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the
|
|
|
|
* above copyright notice and this permission notice appear in all
|
|
|
|
* copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND ROB BUTLER
|
|
|
|
* DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL
|
|
|
|
* ROB BUTLER BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR
|
|
|
|
* CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS
|
|
|
|
* OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
|
|
|
|
* OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE
|
|
|
|
* USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*! \file */
|
|
|
|
|
2018-03-28 14:19:37 +02:00
|
|
|
#include <inttypes.h>
|
2018-04-17 08:29:14 -07:00
|
|
|
#include <stdbool.h>
|
2005-09-05 00:12:29 +00:00
|
|
|
#include <string.h>
|
|
|
|
|
2022-06-24 22:11:02 +01:00
|
|
|
#include <isc/ascii.h>
|
2005-09-05 00:12:29 +00:00
|
|
|
#include <isc/buffer.h>
|
|
|
|
#include <isc/lex.h>
|
|
|
|
#include <isc/log.h>
|
|
|
|
#include <isc/magic.h>
|
|
|
|
#include <isc/mem.h>
|
|
|
|
#include <isc/once.h>
|
|
|
|
#include <isc/region.h>
|
2021-10-04 17:14:53 +02:00
|
|
|
#include <isc/result.h>
|
2005-09-05 00:12:29 +00:00
|
|
|
#include <isc/rwlock.h>
|
|
|
|
#include <isc/string.h>
|
|
|
|
#include <isc/util.h>
|
|
|
|
|
|
|
|
#include <dns/callbacks.h>
|
|
|
|
#include <dns/db.h>
|
|
|
|
#include <dns/dbiterator.h>
|
|
|
|
#include <dns/dlz.h>
|
|
|
|
#include <dns/fixedname.h>
|
|
|
|
#include <dns/log.h>
|
|
|
|
#include <dns/master.h>
|
|
|
|
#include <dns/rdata.h>
|
|
|
|
#include <dns/rdatalist.h>
|
|
|
|
#include <dns/rdataset.h>
|
|
|
|
#include <dns/rdatasetiter.h>
|
|
|
|
#include <dns/rdatatype.h>
|
|
|
|
#include <dns/sdlz.h>
|
|
|
|
#include <dns/types.h>
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Private Types
|
|
|
|
*/
|
|
|
|
|
|
|
|
struct dns_sdlzimplementation {
|
|
|
|
const dns_sdlzmethods_t *methods;
|
|
|
|
isc_mem_t *mctx;
|
|
|
|
void *driverarg;
|
|
|
|
unsigned int flags;
|
|
|
|
isc_mutex_t driverlock;
|
|
|
|
dns_dlzimplementation_t *dlz_imp;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct dns_sdlz_db {
|
|
|
|
/* Unlocked */
|
|
|
|
dns_db_t common;
|
|
|
|
void *dbdata;
|
|
|
|
dns_sdlzimplementation_t *dlzimp;
|
2019-05-20 16:54:13 +02:00
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
/* Locked */
|
2010-12-18 01:56:23 +00:00
|
|
|
dns_dbversion_t *future_version;
|
|
|
|
int dummy_version;
|
2005-09-05 00:12:29 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
struct dns_sdlzlookup {
|
|
|
|
/* Unlocked */
|
|
|
|
unsigned int magic;
|
|
|
|
dns_sdlz_db_t *sdlz;
|
|
|
|
ISC_LIST(dns_rdatalist_t) lists;
|
|
|
|
ISC_LIST(isc_buffer_t) buffers;
|
|
|
|
dns_name_t *name;
|
|
|
|
ISC_LINK(dns_sdlzlookup_t) link;
|
|
|
|
dns_rdatacallbacks_t callbacks;
|
2019-05-20 16:54:13 +02:00
|
|
|
|
|
|
|
/* Atomic */
|
|
|
|
isc_refcount_t references;
|
2005-09-05 00:12:29 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
typedef struct dns_sdlzlookup dns_sdlznode_t;
|
|
|
|
|
|
|
|
struct dns_sdlzallnodes {
|
|
|
|
dns_dbiterator_t common;
|
|
|
|
ISC_LIST(dns_sdlznode_t) nodelist;
|
|
|
|
dns_sdlznode_t *current;
|
|
|
|
dns_sdlznode_t *origin;
|
|
|
|
};
|
|
|
|
|
|
|
|
typedef dns_sdlzallnodes_t sdlz_dbiterator_t;
|
|
|
|
|
|
|
|
typedef struct sdlz_rdatasetiter {
|
|
|
|
dns_rdatasetiter_t common;
|
|
|
|
dns_rdatalist_t *current;
|
|
|
|
} sdlz_rdatasetiter_t;
|
|
|
|
|
|
|
|
#define SDLZDB_MAGIC ISC_MAGIC('D', 'L', 'Z', 'S')
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Note that "impmagic" is not the first four bytes of the struct, so
|
|
|
|
* ISC_MAGIC_VALID cannot be used.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#define VALID_SDLZDB(sdlzdb) \
|
|
|
|
((sdlzdb) != NULL && (sdlzdb)->common.impmagic == SDLZDB_MAGIC)
|
|
|
|
|
|
|
|
#define SDLZLOOKUP_MAGIC ISC_MAGIC('D', 'L', 'Z', 'L')
|
|
|
|
#define VALID_SDLZLOOKUP(sdlzl) ISC_MAGIC_VALID(sdlzl, SDLZLOOKUP_MAGIC)
|
|
|
|
#define VALID_SDLZNODE(sdlzn) VALID_SDLZLOOKUP(sdlzn)
|
|
|
|
|
|
|
|
/* These values are taken from RFC 1537 */
|
2018-02-15 00:16:19 +11:00
|
|
|
#define SDLZ_DEFAULT_REFRESH 28800U /* 8 hours */
|
|
|
|
#define SDLZ_DEFAULT_RETRY 7200U /* 2 hours */
|
|
|
|
#define SDLZ_DEFAULT_EXPIRE 604800U /* 7 days */
|
|
|
|
#define SDLZ_DEFAULT_MINIMUM 86400U /* 1 day */
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/* This is a reasonable value */
|
|
|
|
#define SDLZ_DEFAULT_TTL (60 * 60 * 24)
|
|
|
|
|
2007-08-27 03:32:27 +00:00
|
|
|
#ifdef __COVERITY__
|
|
|
|
#define MAYBE_LOCK(imp) LOCK(&imp->driverlock)
|
|
|
|
#define MAYBE_UNLOCK(imp) UNLOCK(&imp->driverlock)
|
|
|
|
#else /* ifdef __COVERITY__ */
|
2005-09-05 00:12:29 +00:00
|
|
|
#define MAYBE_LOCK(imp) \
|
|
|
|
do { \
|
|
|
|
unsigned int flags = imp->flags; \
|
|
|
|
if ((flags & DNS_SDLZFLAG_THREADSAFE) == 0) \
|
|
|
|
LOCK(&imp->driverlock); \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
#define MAYBE_UNLOCK(imp) \
|
|
|
|
do { \
|
|
|
|
unsigned int flags = imp->flags; \
|
|
|
|
if ((flags & DNS_SDLZFLAG_THREADSAFE) == 0) \
|
|
|
|
UNLOCK(&imp->driverlock); \
|
|
|
|
} while (0)
|
2007-08-27 03:32:27 +00:00
|
|
|
#endif /* ifdef __COVERITY__ */
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/*
|
2014-06-10 16:25:26 -07:00
|
|
|
* Forward references.
|
2005-09-05 00:12:29 +00:00
|
|
|
*/
|
2016-12-30 15:45:08 +11:00
|
|
|
static isc_result_t
|
|
|
|
getnodedata(dns_db_t *db, const dns_name_t *name, bool create,
|
2014-06-10 16:25:26 -07:00
|
|
|
unsigned int options, dns_clientinfomethods_t *methods,
|
|
|
|
dns_clientinfo_t *clientinfo, dns_dbnode_t **nodep);
|
2020-02-14 08:14:03 +01:00
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
static void
|
|
|
|
list_tordataset(dns_rdatalist_t *rdatalist, dns_db_t *db, dns_dbnode_t *node,
|
|
|
|
dns_rdataset_t *rdataset);
|
2020-02-14 08:14:03 +01:00
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
static void
|
2023-01-05 09:12:35 +01:00
|
|
|
detachnode(dns_db_t *db, dns_dbnode_t **targetp DNS__DB_FLARG);
|
2020-02-14 08:14:03 +01:00
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
static void
|
2023-01-05 09:12:35 +01:00
|
|
|
dbiterator_destroy(dns_dbiterator_t **iteratorp DNS__DB_FLARG);
|
2005-09-05 00:12:29 +00:00
|
|
|
static isc_result_t
|
2023-01-05 09:12:35 +01:00
|
|
|
dbiterator_first(dns_dbiterator_t *iterator DNS__DB_FLARG);
|
2005-09-05 00:12:29 +00:00
|
|
|
static isc_result_t
|
2023-01-05 09:12:35 +01:00
|
|
|
dbiterator_last(dns_dbiterator_t *iterator DNS__DB_FLARG);
|
2005-09-05 00:12:29 +00:00
|
|
|
static isc_result_t
|
2023-01-05 09:12:35 +01:00
|
|
|
dbiterator_seek(dns_dbiterator_t *iterator,
|
|
|
|
const dns_name_t *name DNS__DB_FLARG);
|
2005-09-05 00:12:29 +00:00
|
|
|
static isc_result_t
|
2023-01-05 09:12:35 +01:00
|
|
|
dbiterator_prev(dns_dbiterator_t *iterator DNS__DB_FLARG);
|
2005-09-05 00:12:29 +00:00
|
|
|
static isc_result_t
|
2023-01-05 09:12:35 +01:00
|
|
|
dbiterator_next(dns_dbiterator_t *iterator DNS__DB_FLARG);
|
2005-09-05 00:12:29 +00:00
|
|
|
static isc_result_t
|
|
|
|
dbiterator_current(dns_dbiterator_t *iterator, dns_dbnode_t **nodep,
|
2023-01-05 09:12:35 +01:00
|
|
|
dns_name_t *name DNS__DB_FLARG);
|
2005-09-05 00:12:29 +00:00
|
|
|
static isc_result_t
|
|
|
|
dbiterator_pause(dns_dbiterator_t *iterator);
|
|
|
|
static isc_result_t
|
|
|
|
dbiterator_origin(dns_dbiterator_t *iterator, dns_name_t *name);
|
|
|
|
|
|
|
|
static dns_dbiteratormethods_t dbiterator_methods = {
|
|
|
|
dbiterator_destroy, dbiterator_first, dbiterator_last,
|
|
|
|
dbiterator_seek, dbiterator_prev, dbiterator_next,
|
|
|
|
dbiterator_current, dbiterator_pause, dbiterator_origin
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Utility functions
|
|
|
|
*/
|
|
|
|
|
2010-12-18 01:56:23 +00:00
|
|
|
/*
|
|
|
|
* Log a message at the given level
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
sdlz_log(int level, const char *fmt, ...) {
|
|
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
|
|
|
isc_log_vwrite(dns_lctx, DNS_LOGCATEGORY_DATABASE, DNS_LOGMODULE_DLZ,
|
|
|
|
ISC_LOG_DEBUG(level), fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
2021-10-11 13:43:12 +02:00
|
|
|
static unsigned int
|
2005-09-05 00:12:29 +00:00
|
|
|
initial_size(const char *data) {
|
|
|
|
unsigned int len = (strlen(data) / 64) + 1;
|
|
|
|
return (len * 64 + 64);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Rdataset Iterator Methods. These methods were "borrowed" from the SDB
|
|
|
|
* driver interface. See the SDB driver interface documentation for more info.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static void
|
2023-01-05 09:12:35 +01:00
|
|
|
rdatasetiter_destroy(dns_rdatasetiter_t **iteratorp DNS__DB_FLARG) {
|
2005-09-05 00:12:29 +00:00
|
|
|
sdlz_rdatasetiter_t *sdlziterator = (sdlz_rdatasetiter_t *)(*iteratorp);
|
|
|
|
|
2023-01-05 09:12:35 +01:00
|
|
|
detachnode(sdlziterator->common.db,
|
|
|
|
&sdlziterator->common.node DNS__DB_FLARG_PASS);
|
2005-09-05 00:12:29 +00:00
|
|
|
isc_mem_put(sdlziterator->common.db->mctx, sdlziterator,
|
|
|
|
sizeof(sdlz_rdatasetiter_t));
|
|
|
|
*iteratorp = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
2023-01-05 09:12:35 +01:00
|
|
|
rdatasetiter_first(dns_rdatasetiter_t *iterator DNS__DB_FLARG) {
|
2005-09-05 00:12:29 +00:00
|
|
|
sdlz_rdatasetiter_t *sdlziterator = (sdlz_rdatasetiter_t *)iterator;
|
|
|
|
dns_sdlznode_t *sdlznode = (dns_sdlznode_t *)iterator->node;
|
|
|
|
|
|
|
|
if (ISC_LIST_EMPTY(sdlznode->lists)) {
|
|
|
|
return (ISC_R_NOMORE);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
sdlziterator->current = ISC_LIST_HEAD(sdlznode->lists);
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
2023-01-05 09:12:35 +01:00
|
|
|
rdatasetiter_next(dns_rdatasetiter_t *iterator DNS__DB_FLARG) {
|
2005-09-05 00:12:29 +00:00
|
|
|
sdlz_rdatasetiter_t *sdlziterator = (sdlz_rdatasetiter_t *)iterator;
|
|
|
|
|
|
|
|
sdlziterator->current = ISC_LIST_NEXT(sdlziterator->current, link);
|
|
|
|
if (sdlziterator->current == NULL) {
|
|
|
|
return (ISC_R_NOMORE);
|
|
|
|
} else {
|
|
|
|
return (ISC_R_SUCCESS);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2023-01-05 09:12:35 +01:00
|
|
|
rdatasetiter_current(dns_rdatasetiter_t *iterator,
|
|
|
|
dns_rdataset_t *rdataset DNS__DB_FLARG) {
|
2005-09-05 00:12:29 +00:00
|
|
|
sdlz_rdatasetiter_t *sdlziterator = (sdlz_rdatasetiter_t *)iterator;
|
|
|
|
|
|
|
|
list_tordataset(sdlziterator->current, iterator->db, iterator->node,
|
|
|
|
rdataset);
|
|
|
|
}
|
|
|
|
|
|
|
|
static dns_rdatasetitermethods_t rdatasetiter_methods = {
|
|
|
|
rdatasetiter_destroy, rdatasetiter_first, rdatasetiter_next,
|
|
|
|
rdatasetiter_current
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* DB routines. These methods were "borrowed" from the SDB driver interface.
|
|
|
|
* See the SDB driver interface documentation for more info.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static void
|
2023-02-17 13:04:12 -08:00
|
|
|
destroy(dns_db_t *db) {
|
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)db;
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
sdlz->common.magic = 0;
|
|
|
|
sdlz->common.impmagic = 0;
|
|
|
|
|
2019-05-20 16:54:13 +02:00
|
|
|
dns_name_free(&sdlz->common.origin, sdlz->common.mctx);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
2023-02-17 13:04:12 -08:00
|
|
|
isc_refcount_destroy(&sdlz->common.references);
|
2019-05-20 16:54:13 +02:00
|
|
|
isc_mem_putanddetach(&sdlz->common.mctx, sdlz, sizeof(dns_sdlz_db_t));
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
currentversion(dns_db_t *db, dns_dbversion_t **versionp) {
|
2010-12-18 01:56:23 +00:00
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)db;
|
|
|
|
REQUIRE(VALID_SDLZDB(sdlz));
|
2005-09-05 00:12:29 +00:00
|
|
|
REQUIRE(versionp != NULL && *versionp == NULL);
|
|
|
|
|
2010-12-18 01:56:23 +00:00
|
|
|
*versionp = (void *)&sdlz->dummy_version;
|
2005-09-05 00:12:29 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
|
|
|
newversion(dns_db_t *db, dns_dbversion_t **versionp) {
|
2010-12-18 01:56:23 +00:00
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)db;
|
|
|
|
char origin[DNS_NAME_MAXTEXT + 1];
|
|
|
|
isc_result_t result;
|
2005-09-05 00:12:29 +00:00
|
|
|
|
2010-12-18 01:56:23 +00:00
|
|
|
REQUIRE(VALID_SDLZDB(sdlz));
|
|
|
|
|
|
|
|
if (sdlz->dlzimp->methods->newversion == NULL) {
|
|
|
|
return (ISC_R_NOTIMPLEMENTED);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2010-12-18 01:56:23 +00:00
|
|
|
|
|
|
|
dns_name_format(&sdlz->common.origin, origin, sizeof(origin));
|
|
|
|
|
|
|
|
result = sdlz->dlzimp->methods->newversion(
|
|
|
|
origin, sdlz->dlzimp->driverarg, sdlz->dbdata, versionp);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
sdlz_log(ISC_LOG_ERROR,
|
|
|
|
"sdlz newversion on origin %s failed : %s", origin,
|
|
|
|
isc_result_totext(result));
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
sdlz->future_version = *versionp;
|
|
|
|
return (ISC_R_SUCCESS);
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2014-04-25 13:06:30 -07:00
|
|
|
attachversion(dns_db_t *db, dns_dbversion_t *source,
|
|
|
|
dns_dbversion_t **targetp) {
|
2010-12-18 01:56:23 +00:00
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)db;
|
|
|
|
|
|
|
|
REQUIRE(VALID_SDLZDB(sdlz));
|
|
|
|
REQUIRE(source != NULL && source == (void *)&sdlz->dummy_version);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
*targetp = source;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2023-01-05 09:12:35 +01:00
|
|
|
closeversion(dns_db_t *db, dns_dbversion_t **versionp,
|
|
|
|
bool commit DNS__DB_FLARG) {
|
2010-12-18 01:56:23 +00:00
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)db;
|
|
|
|
char origin[DNS_NAME_MAXTEXT + 1];
|
2005-09-05 00:12:29 +00:00
|
|
|
|
2010-12-18 01:56:23 +00:00
|
|
|
REQUIRE(VALID_SDLZDB(sdlz));
|
|
|
|
REQUIRE(versionp != NULL);
|
|
|
|
|
|
|
|
if (*versionp == (void *)&sdlz->dummy_version) {
|
|
|
|
*versionp = NULL;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
REQUIRE(*versionp == sdlz->future_version);
|
|
|
|
REQUIRE(sdlz->dlzimp->methods->closeversion != NULL);
|
|
|
|
|
|
|
|
dns_name_format(&sdlz->common.origin, origin, sizeof(origin));
|
2005-09-05 00:12:29 +00:00
|
|
|
|
2010-12-18 01:56:23 +00:00
|
|
|
sdlz->dlzimp->methods->closeversion(origin, commit,
|
|
|
|
sdlz->dlzimp->driverarg,
|
|
|
|
sdlz->dbdata, versionp);
|
|
|
|
if (*versionp != NULL) {
|
|
|
|
sdlz_log(ISC_LOG_ERROR, "sdlz closeversion on origin %s failed",
|
|
|
|
origin);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2010-12-18 01:56:23 +00:00
|
|
|
|
|
|
|
sdlz->future_version = NULL;
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
|
|
|
createnode(dns_sdlz_db_t *sdlz, dns_sdlznode_t **nodep) {
|
|
|
|
dns_sdlznode_t *node;
|
|
|
|
|
|
|
|
node = isc_mem_get(sdlz->common.mctx, sizeof(dns_sdlznode_t));
|
|
|
|
|
|
|
|
node->sdlz = NULL;
|
2023-02-17 13:04:12 -08:00
|
|
|
dns_db_attach((dns_db_t *)sdlz, (dns_db_t **)&node->sdlz);
|
2005-09-05 00:12:29 +00:00
|
|
|
ISC_LIST_INIT(node->lists);
|
|
|
|
ISC_LIST_INIT(node->buffers);
|
|
|
|
ISC_LINK_INIT(node, link);
|
|
|
|
node->name = NULL;
|
|
|
|
dns_rdatacallbacks_init(&node->callbacks);
|
2019-05-20 16:54:13 +02:00
|
|
|
|
|
|
|
isc_refcount_init(&node->references, 1);
|
2005-09-05 00:12:29 +00:00
|
|
|
node->magic = SDLZLOOKUP_MAGIC;
|
|
|
|
|
|
|
|
*nodep = node;
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
destroynode(dns_sdlznode_t *node) {
|
|
|
|
dns_rdatalist_t *list;
|
|
|
|
dns_rdata_t *rdata;
|
|
|
|
isc_buffer_t *b;
|
|
|
|
dns_sdlz_db_t *sdlz;
|
|
|
|
dns_db_t *db;
|
|
|
|
isc_mem_t *mctx;
|
|
|
|
|
2019-07-23 08:27:30 -04:00
|
|
|
isc_refcount_destroy(&node->references);
|
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
sdlz = node->sdlz;
|
|
|
|
mctx = sdlz->common.mctx;
|
|
|
|
|
|
|
|
while (!ISC_LIST_EMPTY(node->lists)) {
|
|
|
|
list = ISC_LIST_HEAD(node->lists);
|
|
|
|
while (!ISC_LIST_EMPTY(list->rdata)) {
|
|
|
|
rdata = ISC_LIST_HEAD(list->rdata);
|
|
|
|
ISC_LIST_UNLINK(list->rdata, rdata, link);
|
|
|
|
isc_mem_put(mctx, rdata, sizeof(dns_rdata_t));
|
|
|
|
}
|
|
|
|
ISC_LIST_UNLINK(node->lists, list, link);
|
|
|
|
isc_mem_put(mctx, list, sizeof(dns_rdatalist_t));
|
|
|
|
}
|
|
|
|
|
|
|
|
while (!ISC_LIST_EMPTY(node->buffers)) {
|
|
|
|
b = ISC_LIST_HEAD(node->buffers);
|
|
|
|
ISC_LIST_UNLINK(node->buffers, b, link);
|
|
|
|
isc_buffer_free(&b);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (node->name != NULL) {
|
|
|
|
dns_name_free(node->name, mctx);
|
|
|
|
isc_mem_put(mctx, node->name, sizeof(dns_name_t));
|
|
|
|
}
|
2019-05-20 16:54:13 +02:00
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
node->magic = 0;
|
|
|
|
isc_mem_put(mctx, node, sizeof(dns_sdlznode_t));
|
|
|
|
db = &sdlz->common;
|
2023-02-17 13:04:12 -08:00
|
|
|
dns_db_detach(&db);
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
2018-04-17 08:29:14 -07:00
|
|
|
getnodedata(dns_db_t *db, const dns_name_t *name, bool create,
|
2014-06-10 16:25:26 -07:00
|
|
|
unsigned int options, dns_clientinfomethods_t *methods,
|
|
|
|
dns_clientinfo_t *clientinfo, dns_dbnode_t **nodep) {
|
2005-09-05 00:12:29 +00:00
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)db;
|
|
|
|
dns_sdlznode_t *node = NULL;
|
|
|
|
isc_result_t result;
|
|
|
|
isc_buffer_t b;
|
|
|
|
char namestr[DNS_NAME_MAXTEXT + 1];
|
|
|
|
isc_buffer_t b2;
|
|
|
|
char zonestr[DNS_NAME_MAXTEXT + 1];
|
2018-04-17 08:29:14 -07:00
|
|
|
bool isorigin;
|
2005-09-05 00:12:29 +00:00
|
|
|
dns_sdlzauthorityfunc_t authority;
|
|
|
|
|
|
|
|
REQUIRE(VALID_SDLZDB(sdlz));
|
|
|
|
REQUIRE(nodep != NULL && *nodep == NULL);
|
|
|
|
|
2010-12-18 01:56:23 +00:00
|
|
|
if (sdlz->dlzimp->methods->newversion == NULL) {
|
2020-03-30 13:49:55 -07:00
|
|
|
REQUIRE(!create);
|
2010-12-18 01:56:23 +00:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
isc_buffer_init(&b, namestr, sizeof(namestr));
|
|
|
|
if ((sdlz->dlzimp->flags & DNS_SDLZFLAG_RELATIVEOWNER) != 0) {
|
|
|
|
dns_name_t relname;
|
|
|
|
unsigned int labels;
|
|
|
|
|
|
|
|
labels = dns_name_countlabels(name) -
|
2014-06-10 16:25:26 -07:00
|
|
|
dns_name_countlabels(&sdlz->common.origin);
|
2005-09-05 00:12:29 +00:00
|
|
|
dns_name_init(&relname, NULL);
|
|
|
|
dns_name_getlabelsequence(name, 0, labels, &relname);
|
2023-08-15 18:52:17 -07:00
|
|
|
result = dns_name_totext(&relname, DNS_NAME_OMITFINALDOT, &b);
|
2005-09-05 00:12:29 +00:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
return (result);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
} else {
|
2023-08-15 18:52:17 -07:00
|
|
|
result = dns_name_totext(name, DNS_NAME_OMITFINALDOT, &b);
|
2005-09-05 00:12:29 +00:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
return (result);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
isc_buffer_putuint8(&b, 0);
|
|
|
|
|
|
|
|
isc_buffer_init(&b2, zonestr, sizeof(zonestr));
|
2023-08-15 18:52:17 -07:00
|
|
|
result = dns_name_totext(&sdlz->common.origin, DNS_NAME_OMITFINALDOT,
|
|
|
|
&b2);
|
2005-09-05 00:12:29 +00:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
return (result);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
isc_buffer_putuint8(&b2, 0);
|
|
|
|
|
|
|
|
result = createnode(sdlz, &node);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
return (result);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
isorigin = dns_name_equal(name, &sdlz->common.origin);
|
|
|
|
|
|
|
|
/* make sure strings are always lowercase */
|
2022-06-24 22:11:02 +01:00
|
|
|
isc_ascii_strtolower(zonestr);
|
|
|
|
isc_ascii_strtolower(namestr);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
MAYBE_LOCK(sdlz->dlzimp);
|
|
|
|
|
|
|
|
/* try to lookup the host (namestr) */
|
|
|
|
result = sdlz->dlzimp->methods->lookup(
|
|
|
|
zonestr, namestr, sdlz->dlzimp->driverarg, sdlz->dbdata, node,
|
2011-10-11 00:09:03 +00:00
|
|
|
methods, clientinfo);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/*
|
2014-06-10 16:25:26 -07:00
|
|
|
* If the name was not found and DNS_DBFIND_NOWILD is not
|
|
|
|
* set, then we try to find a wildcard entry.
|
|
|
|
*
|
|
|
|
* If DNS_DBFIND_NOZONECUT is set and there are multiple
|
|
|
|
* levels between the host and the zone origin, we also look
|
|
|
|
* for wildcards at each level.
|
2005-09-05 00:12:29 +00:00
|
|
|
*/
|
2014-06-10 16:25:26 -07:00
|
|
|
if (result == ISC_R_NOTFOUND && !create &&
|
2022-11-02 19:33:14 +01:00
|
|
|
(options & DNS_DBFIND_NOWILD) == 0)
|
|
|
|
{
|
2014-06-10 16:25:26 -07:00
|
|
|
unsigned int i, dlabels, nlabels;
|
|
|
|
|
|
|
|
nlabels = dns_name_countlabels(name);
|
|
|
|
dlabels = nlabels - dns_name_countlabels(&sdlz->common.origin);
|
|
|
|
for (i = 0; i < dlabels; i++) {
|
|
|
|
char wildstr[DNS_NAME_MAXTEXT + 1];
|
|
|
|
dns_fixedname_t fixed;
|
2016-12-30 15:45:08 +11:00
|
|
|
const dns_name_t *wild;
|
2014-06-10 16:25:26 -07:00
|
|
|
|
|
|
|
dns_fixedname_init(&fixed);
|
2019-02-18 12:57:35 +11:00
|
|
|
if (i == dlabels - 1) {
|
2014-06-10 16:25:26 -07:00
|
|
|
wild = dns_wildcardname;
|
2019-02-18 12:57:35 +11:00
|
|
|
} else {
|
2016-12-30 15:45:08 +11:00
|
|
|
dns_name_t *fname;
|
|
|
|
fname = dns_fixedname_name(&fixed);
|
2014-06-10 16:25:26 -07:00
|
|
|
dns_name_getlabelsequence(
|
|
|
|
name, i + 1, dlabels - i - 1, fname);
|
|
|
|
result = dns_name_concatenate(
|
|
|
|
dns_wildcardname, fname, fname, NULL);
|
2019-03-13 10:51:56 +11:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
MAYBE_UNLOCK(sdlz->dlzimp);
|
2014-06-10 16:25:26 -07:00
|
|
|
return (result);
|
2019-03-13 10:51:56 +11:00
|
|
|
}
|
2016-12-30 15:45:08 +11:00
|
|
|
wild = fname;
|
2014-06-10 16:25:26 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
isc_buffer_init(&b, wildstr, sizeof(wildstr));
|
2023-08-15 18:52:17 -07:00
|
|
|
result = dns_name_totext(wild, DNS_NAME_OMITFINALDOT,
|
|
|
|
&b);
|
2019-03-13 10:51:56 +11:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
MAYBE_UNLOCK(sdlz->dlzimp);
|
2014-06-10 16:25:26 -07:00
|
|
|
return (result);
|
2019-03-13 10:51:56 +11:00
|
|
|
}
|
2014-06-10 16:25:26 -07:00
|
|
|
isc_buffer_putuint8(&b, 0);
|
|
|
|
|
|
|
|
result = sdlz->dlzimp->methods->lookup(
|
2005-09-05 00:12:29 +00:00
|
|
|
zonestr, wildstr, sdlz->dlzimp->driverarg,
|
2011-10-11 00:09:03 +00:00
|
|
|
sdlz->dbdata, node, methods, clientinfo);
|
2014-06-10 16:25:26 -07:00
|
|
|
if (result == ISC_R_SUCCESS) {
|
|
|
|
break;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2014-06-10 16:25:26 -07:00
|
|
|
}
|
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
MAYBE_UNLOCK(sdlz->dlzimp);
|
|
|
|
|
2013-03-11 15:54:03 -07:00
|
|
|
if (result == ISC_R_NOTFOUND && (isorigin || create)) {
|
|
|
|
result = ISC_R_SUCCESS;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2013-03-11 15:54:03 -07:00
|
|
|
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
2019-12-05 13:29:45 +11:00
|
|
|
isc_refcount_decrementz(&node->references);
|
2005-09-05 00:12:29 +00:00
|
|
|
destroynode(node);
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (isorigin && sdlz->dlzimp->methods->authority != NULL) {
|
|
|
|
MAYBE_LOCK(sdlz->dlzimp);
|
|
|
|
authority = sdlz->dlzimp->methods->authority;
|
|
|
|
result = (*authority)(zonestr, sdlz->dlzimp->driverarg,
|
|
|
|
sdlz->dbdata, node);
|
|
|
|
MAYBE_UNLOCK(sdlz->dlzimp);
|
2013-03-11 15:54:03 -07:00
|
|
|
if (result != ISC_R_SUCCESS && result != ISC_R_NOTIMPLEMENTED) {
|
2019-12-05 13:29:45 +11:00
|
|
|
isc_refcount_decrementz(&node->references);
|
2005-09-05 00:12:29 +00:00
|
|
|
destroynode(node);
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-12-18 01:56:23 +00:00
|
|
|
if (node->name == NULL) {
|
|
|
|
node->name = isc_mem_get(sdlz->common.mctx, sizeof(dns_name_t));
|
|
|
|
dns_name_init(node->name, NULL);
|
2019-11-01 08:31:13 -05:00
|
|
|
dns_name_dup(name, sdlz->common.mctx, node->name);
|
2010-12-18 01:56:23 +00:00
|
|
|
}
|
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
*nodep = node;
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
2014-06-10 16:25:26 -07:00
|
|
|
static isc_result_t
|
2018-04-17 08:29:14 -07:00
|
|
|
findnodeext(dns_db_t *db, const dns_name_t *name, bool create,
|
2014-06-10 16:25:26 -07:00
|
|
|
dns_clientinfomethods_t *methods, dns_clientinfo_t *clientinfo,
|
2023-01-05 09:12:35 +01:00
|
|
|
dns_dbnode_t **nodep DNS__DB_FLARG) {
|
2014-06-10 16:25:26 -07:00
|
|
|
return (getnodedata(db, name, create, 0, methods, clientinfo, nodep));
|
|
|
|
}
|
|
|
|
|
2011-10-11 00:09:03 +00:00
|
|
|
static isc_result_t
|
2018-04-17 08:29:14 -07:00
|
|
|
findnode(dns_db_t *db, const dns_name_t *name, bool create,
|
2023-01-05 09:12:35 +01:00
|
|
|
dns_dbnode_t **nodep DNS__DB_FLARG) {
|
2014-06-10 16:25:26 -07:00
|
|
|
return (getnodedata(db, name, create, 0, NULL, NULL, nodep));
|
2011-10-11 00:09:03 +00:00
|
|
|
}
|
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
static void
|
2023-01-05 09:12:35 +01:00
|
|
|
attachnode(dns_db_t *db, dns_dbnode_t *source,
|
|
|
|
dns_dbnode_t **targetp DNS__DB_FLARG) {
|
2005-09-05 00:12:29 +00:00
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)db;
|
|
|
|
dns_sdlznode_t *node = (dns_sdlznode_t *)source;
|
2023-01-05 09:12:35 +01:00
|
|
|
uint_fast32_t refs;
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
REQUIRE(VALID_SDLZDB(sdlz));
|
|
|
|
|
|
|
|
UNUSED(sdlz);
|
|
|
|
|
2023-01-05 09:12:35 +01:00
|
|
|
refs = isc_refcount_increment(&node->references);
|
|
|
|
#if DNS_DB_NODETRACE
|
|
|
|
fprintf(stderr, "incr:node:%s:%s:%u:%p->references = %" PRIuFAST32 "\n",
|
|
|
|
func, file, line, node, refs + 1);
|
|
|
|
#else
|
|
|
|
UNUSED(refs);
|
|
|
|
#endif
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
*targetp = source;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2023-01-05 09:12:35 +01:00
|
|
|
detachnode(dns_db_t *db, dns_dbnode_t **targetp DNS__DB_FLARG) {
|
2005-09-05 00:12:29 +00:00
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)db;
|
|
|
|
dns_sdlznode_t *node;
|
2023-01-05 09:12:35 +01:00
|
|
|
uint_fast32_t refs;
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
REQUIRE(VALID_SDLZDB(sdlz));
|
|
|
|
REQUIRE(targetp != NULL && *targetp != NULL);
|
|
|
|
|
|
|
|
UNUSED(sdlz);
|
|
|
|
|
|
|
|
node = (dns_sdlznode_t *)(*targetp);
|
2019-05-20 16:54:13 +02:00
|
|
|
*targetp = NULL;
|
2005-09-05 00:12:29 +00:00
|
|
|
|
2023-01-05 09:12:35 +01:00
|
|
|
refs = isc_refcount_decrement(&node->references);
|
|
|
|
#if DNS_DB_NODETRACE
|
|
|
|
fprintf(stderr, "decr:node:%s:%s:%u:%p->references = %" PRIuFAST32 "\n",
|
|
|
|
func, file, line, node, refs - 1);
|
|
|
|
#else
|
|
|
|
UNUSED(refs);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (refs == 1) {
|
2005-09-05 00:12:29 +00:00
|
|
|
destroynode(node);
|
2019-05-20 16:54:13 +02:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
2008-09-24 02:46:23 +00:00
|
|
|
createiterator(dns_db_t *db, unsigned int options,
|
|
|
|
dns_dbiterator_t **iteratorp) {
|
2005-09-05 00:12:29 +00:00
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)db;
|
|
|
|
sdlz_dbiterator_t *sdlziter;
|
|
|
|
isc_result_t result;
|
|
|
|
isc_buffer_t b;
|
|
|
|
char zonestr[DNS_NAME_MAXTEXT + 1];
|
|
|
|
|
|
|
|
REQUIRE(VALID_SDLZDB(sdlz));
|
|
|
|
|
|
|
|
if (sdlz->dlzimp->methods->allnodes == NULL) {
|
|
|
|
return (ISC_R_NOTIMPLEMENTED);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
2008-09-24 02:46:23 +00:00
|
|
|
if ((options & DNS_DB_NSEC3ONLY) != 0 ||
|
2022-11-02 19:33:14 +01:00
|
|
|
(options & DNS_DB_NONSEC3) != 0)
|
|
|
|
{
|
2008-09-24 02:46:23 +00:00
|
|
|
return (ISC_R_NOTIMPLEMENTED);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2008-09-24 02:46:23 +00:00
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
isc_buffer_init(&b, zonestr, sizeof(zonestr));
|
2023-08-15 18:52:17 -07:00
|
|
|
result = dns_name_totext(&sdlz->common.origin, DNS_NAME_OMITFINALDOT,
|
|
|
|
&b);
|
2005-09-05 00:12:29 +00:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
return (result);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
isc_buffer_putuint8(&b, 0);
|
|
|
|
|
|
|
|
sdlziter = isc_mem_get(sdlz->common.mctx, sizeof(sdlz_dbiterator_t));
|
|
|
|
|
|
|
|
sdlziter->common.methods = &dbiterator_methods;
|
|
|
|
sdlziter->common.db = NULL;
|
|
|
|
dns_db_attach(db, &sdlziter->common.db);
|
2018-10-11 11:57:57 +02:00
|
|
|
sdlziter->common.relative_names = ((options & DNS_DB_RELATIVENAMES) !=
|
|
|
|
0);
|
2005-09-05 00:12:29 +00:00
|
|
|
sdlziter->common.magic = DNS_DBITERATOR_MAGIC;
|
|
|
|
ISC_LIST_INIT(sdlziter->nodelist);
|
|
|
|
sdlziter->current = NULL;
|
|
|
|
sdlziter->origin = NULL;
|
|
|
|
|
|
|
|
/* make sure strings are always lowercase */
|
2022-06-24 22:11:02 +01:00
|
|
|
isc_ascii_strtolower(zonestr);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
MAYBE_LOCK(sdlz->dlzimp);
|
|
|
|
result = sdlz->dlzimp->methods->allnodes(
|
|
|
|
zonestr, sdlz->dlzimp->driverarg, sdlz->dbdata, sdlziter);
|
|
|
|
MAYBE_UNLOCK(sdlz->dlzimp);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
dns_dbiterator_t *iter = &sdlziter->common;
|
2023-01-05 09:12:35 +01:00
|
|
|
dbiterator_destroy(&iter DNS__DB_FILELINE);
|
2005-09-05 00:12:29 +00:00
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sdlziter->origin != NULL) {
|
|
|
|
ISC_LIST_UNLINK(sdlziter->nodelist, sdlziter->origin, link);
|
|
|
|
ISC_LIST_PREPEND(sdlziter->nodelist, sdlziter->origin, link);
|
|
|
|
}
|
|
|
|
|
|
|
|
*iteratorp = (dns_dbiterator_t *)sdlziter;
|
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
|
|
|
findrdataset(dns_db_t *db, dns_dbnode_t *node, dns_dbversion_t *version,
|
|
|
|
dns_rdatatype_t type, dns_rdatatype_t covers, isc_stdtime_t now,
|
2023-01-05 09:12:35 +01:00
|
|
|
dns_rdataset_t *rdataset,
|
|
|
|
dns_rdataset_t *sigrdataset DNS__DB_FLARG) {
|
2019-07-23 17:16:57 -04:00
|
|
|
REQUIRE(VALID_SDLZNODE(node));
|
2005-09-05 00:12:29 +00:00
|
|
|
dns_rdatalist_t *list;
|
|
|
|
dns_sdlznode_t *sdlznode = (dns_sdlznode_t *)node;
|
|
|
|
|
|
|
|
UNUSED(db);
|
|
|
|
UNUSED(version);
|
|
|
|
UNUSED(covers);
|
|
|
|
UNUSED(now);
|
|
|
|
UNUSED(sigrdataset);
|
|
|
|
|
2005-11-02 23:22:34 +00:00
|
|
|
if (type == dns_rdatatype_sig || type == dns_rdatatype_rrsig) {
|
2005-09-05 00:12:29 +00:00
|
|
|
return (ISC_R_NOTIMPLEMENTED);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
list = ISC_LIST_HEAD(sdlznode->lists);
|
|
|
|
while (list != NULL) {
|
|
|
|
if (list->type == type) {
|
|
|
|
break;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
list = ISC_LIST_NEXT(list, link);
|
|
|
|
}
|
|
|
|
if (list == NULL) {
|
|
|
|
return (ISC_R_NOTFOUND);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
list_tordataset(list, db, node, rdataset);
|
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
2016-12-30 15:45:08 +11:00
|
|
|
findext(dns_db_t *db, const dns_name_t *name, dns_dbversion_t *version,
|
2011-10-11 00:09:03 +00:00
|
|
|
dns_rdatatype_t type, unsigned int options, isc_stdtime_t now,
|
|
|
|
dns_dbnode_t **nodep, dns_name_t *foundname,
|
|
|
|
dns_clientinfomethods_t *methods, dns_clientinfo_t *clientinfo,
|
2023-01-05 09:12:35 +01:00
|
|
|
dns_rdataset_t *rdataset, dns_rdataset_t *sigrdataset DNS__DB_FLARG) {
|
2005-09-05 00:12:29 +00:00
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)db;
|
|
|
|
dns_dbnode_t *node = NULL;
|
|
|
|
dns_fixedname_t fname;
|
|
|
|
dns_rdataset_t xrdataset;
|
|
|
|
dns_name_t *xname;
|
|
|
|
unsigned int nlabels, olabels;
|
|
|
|
isc_result_t result;
|
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
REQUIRE(VALID_SDLZDB(sdlz));
|
|
|
|
REQUIRE(nodep == NULL || *nodep == NULL);
|
2014-04-25 13:06:30 -07:00
|
|
|
REQUIRE(version == NULL || version == (void *)&sdlz->dummy_version ||
|
|
|
|
version == sdlz->future_version);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
UNUSED(sdlz);
|
|
|
|
|
|
|
|
if (!dns_name_issubdomain(name, &db->origin)) {
|
|
|
|
return (DNS_R_NXDOMAIN);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
olabels = dns_name_countlabels(&db->origin);
|
|
|
|
nlabels = dns_name_countlabels(name);
|
|
|
|
|
2018-03-28 14:38:09 +02:00
|
|
|
xname = dns_fixedname_initname(&fname);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
2007-02-13 23:36:06 +00:00
|
|
|
if (rdataset == NULL) {
|
|
|
|
dns_rdataset_init(&xrdataset);
|
2005-09-05 00:12:29 +00:00
|
|
|
rdataset = &xrdataset;
|
2007-02-13 23:36:06 +00:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
result = DNS_R_NXDOMAIN;
|
|
|
|
|
2014-06-10 16:25:26 -07:00
|
|
|
/*
|
|
|
|
* If we're not walking down searching for zone
|
|
|
|
* cuts, we can cut straight to the chase
|
|
|
|
*/
|
|
|
|
if ((options & DNS_DBFIND_NOZONECUT) != 0) {
|
|
|
|
i = nlabels;
|
|
|
|
goto search;
|
|
|
|
}
|
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
for (i = olabels; i <= nlabels; i++) {
|
2014-06-10 16:25:26 -07:00
|
|
|
search:
|
2005-09-05 00:12:29 +00:00
|
|
|
/*
|
|
|
|
* Look up the next label.
|
|
|
|
*/
|
|
|
|
dns_name_getlabelsequence(name, nlabels - i, i, xname);
|
2018-04-17 08:29:14 -07:00
|
|
|
result = getnodedata(db, xname, false, options, methods,
|
2011-10-11 00:09:03 +00:00
|
|
|
clientinfo, &node);
|
2013-01-22 15:13:08 -08:00
|
|
|
if (result == ISC_R_NOTFOUND) {
|
2005-09-05 00:12:29 +00:00
|
|
|
result = DNS_R_NXDOMAIN;
|
|
|
|
continue;
|
2013-01-22 15:13:08 -08:00
|
|
|
} else if (result != ISC_R_SUCCESS) {
|
|
|
|
break;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Look for a DNAME at the current label, unless this is
|
|
|
|
* the qname.
|
|
|
|
*/
|
|
|
|
if (i < nlabels) {
|
2023-01-05 09:12:35 +01:00
|
|
|
result = findrdataset(
|
|
|
|
db, node, version, dns_rdatatype_dname, 0, now,
|
|
|
|
rdataset, sigrdataset DNS__DB_FLARG_PASS);
|
2005-09-05 00:12:29 +00:00
|
|
|
if (result == ISC_R_SUCCESS) {
|
|
|
|
result = DNS_R_DNAME;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Look for an NS at the current label, unless this is the
|
2014-06-10 16:25:26 -07:00
|
|
|
* origin, glue is ok, or there are known to be no zone cuts.
|
2005-09-05 00:12:29 +00:00
|
|
|
*/
|
2014-06-10 16:25:26 -07:00
|
|
|
if (i != olabels && (options & DNS_DBFIND_GLUEOK) == 0 &&
|
|
|
|
(options & DNS_DBFIND_NOZONECUT) == 0)
|
|
|
|
{
|
2023-01-05 09:12:35 +01:00
|
|
|
result = findrdataset(
|
|
|
|
db, node, version, dns_rdatatype_ns, 0, now,
|
|
|
|
rdataset, sigrdataset DNS__DB_FLARG_PASS);
|
2014-06-10 16:25:26 -07:00
|
|
|
|
|
|
|
if (result == ISC_R_SUCCESS && i == nlabels &&
|
2022-11-02 19:33:14 +01:00
|
|
|
type == dns_rdatatype_any)
|
|
|
|
{
|
2014-06-10 16:25:26 -07:00
|
|
|
result = DNS_R_ZONECUT;
|
|
|
|
dns_rdataset_disassociate(rdataset);
|
|
|
|
if (sigrdataset != NULL &&
|
2022-11-02 19:33:14 +01:00
|
|
|
dns_rdataset_isassociated(sigrdataset))
|
|
|
|
{
|
2014-06-10 16:25:26 -07:00
|
|
|
dns_rdataset_disassociate(sigrdataset);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2014-06-10 16:25:26 -07:00
|
|
|
break;
|
|
|
|
} else if (result == ISC_R_SUCCESS) {
|
|
|
|
result = DNS_R_DELEGATION;
|
2005-09-05 00:12:29 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the current name is not the qname, add another label
|
|
|
|
* and try again.
|
|
|
|
*/
|
|
|
|
if (i < nlabels) {
|
2023-01-05 09:12:35 +01:00
|
|
|
detachnode(db, &node DNS__DB_FLARG_PASS);
|
2005-09-05 00:12:29 +00:00
|
|
|
node = NULL;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we're looking for ANY, we're done.
|
|
|
|
*/
|
|
|
|
if (type == dns_rdatatype_any) {
|
|
|
|
result = ISC_R_SUCCESS;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Look for the qtype.
|
|
|
|
*/
|
2011-10-11 00:09:03 +00:00
|
|
|
result = findrdataset(db, node, version, type, 0, now, rdataset,
|
2023-01-05 09:12:35 +01:00
|
|
|
sigrdataset DNS__DB_FLARG_PASS);
|
2005-09-05 00:12:29 +00:00
|
|
|
if (result == ISC_R_SUCCESS) {
|
|
|
|
break;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Look for a CNAME
|
|
|
|
*/
|
|
|
|
if (type != dns_rdatatype_cname) {
|
2023-01-05 09:12:35 +01:00
|
|
|
result = findrdataset(
|
|
|
|
db, node, version, dns_rdatatype_cname, 0, now,
|
|
|
|
rdataset, sigrdataset DNS__DB_FLARG_PASS);
|
2005-09-05 00:12:29 +00:00
|
|
|
if (result == ISC_R_SUCCESS) {
|
|
|
|
result = DNS_R_CNAME;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
result = DNS_R_NXRRSET;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rdataset == &xrdataset && dns_rdataset_isassociated(rdataset)) {
|
|
|
|
dns_rdataset_disassociate(rdataset);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
if (foundname != NULL) {
|
2021-05-21 17:20:44 -07:00
|
|
|
dns_name_copy(xname, foundname);
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (nodep != NULL) {
|
|
|
|
*nodep = node;
|
|
|
|
} else if (node != NULL) {
|
2023-01-05 09:12:35 +01:00
|
|
|
detachnode(db, &node DNS__DB_FLARG_PASS);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
2011-10-11 00:09:03 +00:00
|
|
|
static isc_result_t
|
2016-12-30 15:45:08 +11:00
|
|
|
find(dns_db_t *db, const dns_name_t *name, dns_dbversion_t *version,
|
2011-10-11 00:09:03 +00:00
|
|
|
dns_rdatatype_t type, unsigned int options, isc_stdtime_t now,
|
|
|
|
dns_dbnode_t **nodep, dns_name_t *foundname, dns_rdataset_t *rdataset,
|
2023-01-05 09:12:35 +01:00
|
|
|
dns_rdataset_t *sigrdataset DNS__DB_FLARG) {
|
2011-10-11 00:09:03 +00:00
|
|
|
return (findext(db, name, version, type, options, now, nodep, foundname,
|
2023-01-05 09:12:35 +01:00
|
|
|
NULL, NULL, rdataset, sigrdataset DNS__DB_FLARG_PASS));
|
2011-10-11 00:09:03 +00:00
|
|
|
}
|
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
static isc_result_t
|
|
|
|
allrdatasets(dns_db_t *db, dns_dbnode_t *node, dns_dbversion_t *version,
|
2022-11-16 10:47:40 +11:00
|
|
|
unsigned int options, isc_stdtime_t now,
|
2023-01-05 09:12:35 +01:00
|
|
|
dns_rdatasetiter_t **iteratorp DNS__DB_FLARG) {
|
2010-12-18 01:56:23 +00:00
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)db;
|
2005-09-05 00:12:29 +00:00
|
|
|
sdlz_rdatasetiter_t *iterator;
|
|
|
|
|
2010-12-18 01:56:23 +00:00
|
|
|
REQUIRE(VALID_SDLZDB(sdlz));
|
|
|
|
|
|
|
|
REQUIRE(version == NULL || version == (void *)&sdlz->dummy_version ||
|
|
|
|
version == sdlz->future_version);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
UNUSED(version);
|
|
|
|
UNUSED(now);
|
|
|
|
|
|
|
|
iterator = isc_mem_get(db->mctx, sizeof(sdlz_rdatasetiter_t));
|
|
|
|
|
|
|
|
iterator->common.magic = DNS_RDATASETITER_MAGIC;
|
|
|
|
iterator->common.methods = &rdatasetiter_methods;
|
|
|
|
iterator->common.db = db;
|
|
|
|
iterator->common.node = NULL;
|
2023-01-05 09:12:35 +01:00
|
|
|
attachnode(db, node, &iterator->common.node DNS__DB_FLARG_PASS);
|
2005-09-05 00:12:29 +00:00
|
|
|
iterator->common.version = version;
|
2022-11-16 10:47:40 +11:00
|
|
|
iterator->common.options = options;
|
2005-09-05 00:12:29 +00:00
|
|
|
iterator->common.now = now;
|
|
|
|
|
|
|
|
*iteratorp = (dns_rdatasetiter_t *)iterator;
|
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
2010-12-18 01:56:23 +00:00
|
|
|
static isc_result_t
|
|
|
|
modrdataset(dns_db_t *db, dns_dbnode_t *node, dns_dbversion_t *version,
|
|
|
|
dns_rdataset_t *rdataset, unsigned int options,
|
|
|
|
dns_sdlzmodrdataset_t mod_function) {
|
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)db;
|
|
|
|
dns_master_style_t *style = NULL;
|
|
|
|
isc_result_t result;
|
|
|
|
isc_buffer_t *buffer = NULL;
|
|
|
|
isc_mem_t *mctx;
|
|
|
|
dns_sdlznode_t *sdlznode;
|
|
|
|
char *rdatastr = NULL;
|
|
|
|
char name[DNS_NAME_MAXTEXT + 1];
|
|
|
|
|
|
|
|
REQUIRE(VALID_SDLZDB(sdlz));
|
|
|
|
|
|
|
|
if (mod_function == NULL) {
|
|
|
|
return (ISC_R_NOTIMPLEMENTED);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2010-12-18 01:56:23 +00:00
|
|
|
|
|
|
|
sdlznode = (dns_sdlznode_t *)node;
|
|
|
|
|
|
|
|
UNUSED(options);
|
|
|
|
|
|
|
|
dns_name_format(sdlznode->name, name, sizeof(name));
|
|
|
|
|
|
|
|
mctx = sdlz->common.mctx;
|
|
|
|
|
2020-02-02 08:35:46 +01:00
|
|
|
isc_buffer_allocate(mctx, &buffer, 1024);
|
2010-12-18 01:56:23 +00:00
|
|
|
|
2018-04-03 13:09:55 +02:00
|
|
|
result = dns_master_stylecreate(&style, 0, 0, 0, 0, 0, 0, 1, 0xffffffff,
|
|
|
|
mctx);
|
2010-12-18 01:56:23 +00:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto cleanup;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2010-12-18 01:56:23 +00:00
|
|
|
|
|
|
|
result = dns_master_rdatasettotext(sdlznode->name, rdataset, style,
|
2019-11-18 20:46:58 +11:00
|
|
|
NULL, buffer);
|
2010-12-18 01:56:23 +00:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto cleanup;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2010-12-18 01:56:23 +00:00
|
|
|
|
|
|
|
if (isc_buffer_usedlength(buffer) < 1) {
|
|
|
|
result = ISC_R_BADADDRESSFORM;
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
rdatastr = isc_buffer_base(buffer);
|
|
|
|
if (rdatastr == NULL) {
|
|
|
|
result = ISC_R_NOMEMORY;
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
rdatastr[isc_buffer_usedlength(buffer) - 1] = 0;
|
|
|
|
|
|
|
|
MAYBE_LOCK(sdlz->dlzimp);
|
|
|
|
result = mod_function(name, rdatastr, sdlz->dlzimp->driverarg,
|
|
|
|
sdlz->dbdata, version);
|
|
|
|
MAYBE_UNLOCK(sdlz->dlzimp);
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
isc_buffer_free(&buffer);
|
|
|
|
if (style != NULL) {
|
|
|
|
dns_master_styledestroy(&style, mctx);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2010-12-18 01:56:23 +00:00
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
static isc_result_t
|
|
|
|
addrdataset(dns_db_t *db, dns_dbnode_t *node, dns_dbversion_t *version,
|
|
|
|
isc_stdtime_t now, dns_rdataset_t *rdataset, unsigned int options,
|
2023-01-05 09:12:35 +01:00
|
|
|
dns_rdataset_t *addedrdataset DNS__DB_FLARG) {
|
2010-12-18 01:56:23 +00:00
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)db;
|
|
|
|
isc_result_t result;
|
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
UNUSED(now);
|
|
|
|
UNUSED(addedrdataset);
|
2010-12-18 01:56:23 +00:00
|
|
|
REQUIRE(VALID_SDLZDB(sdlz));
|
2005-09-05 00:12:29 +00:00
|
|
|
|
2010-12-18 01:56:23 +00:00
|
|
|
if (sdlz->dlzimp->methods->addrdataset == NULL) {
|
|
|
|
return (ISC_R_NOTIMPLEMENTED);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2010-12-18 01:56:23 +00:00
|
|
|
|
|
|
|
result = modrdataset(db, node, version, rdataset, options,
|
|
|
|
sdlz->dlzimp->methods->addrdataset);
|
|
|
|
return (result);
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
|
|
|
subtractrdataset(dns_db_t *db, dns_dbnode_t *node, dns_dbversion_t *version,
|
|
|
|
dns_rdataset_t *rdataset, unsigned int options,
|
2023-01-05 09:12:35 +01:00
|
|
|
dns_rdataset_t *newrdataset DNS__DB_FLARG) {
|
2010-12-18 01:56:23 +00:00
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)db;
|
|
|
|
isc_result_t result;
|
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
UNUSED(newrdataset);
|
2010-12-18 01:56:23 +00:00
|
|
|
REQUIRE(VALID_SDLZDB(sdlz));
|
2005-09-05 00:12:29 +00:00
|
|
|
|
2010-12-18 01:56:23 +00:00
|
|
|
if (sdlz->dlzimp->methods->subtractrdataset == NULL) {
|
|
|
|
return (ISC_R_NOTIMPLEMENTED);
|
|
|
|
}
|
|
|
|
|
|
|
|
result = modrdataset(db, node, version, rdataset, options,
|
|
|
|
sdlz->dlzimp->methods->subtractrdataset);
|
|
|
|
return (result);
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
|
|
|
deleterdataset(dns_db_t *db, dns_dbnode_t *node, dns_dbversion_t *version,
|
2023-01-05 09:12:35 +01:00
|
|
|
dns_rdatatype_t type, dns_rdatatype_t covers DNS__DB_FLARG) {
|
2010-12-18 01:56:23 +00:00
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)db;
|
|
|
|
char name[DNS_NAME_MAXTEXT + 1];
|
|
|
|
char b_type[DNS_RDATATYPE_FORMATSIZE];
|
|
|
|
dns_sdlznode_t *sdlznode;
|
|
|
|
isc_result_t result;
|
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
UNUSED(covers);
|
|
|
|
|
2010-12-18 01:56:23 +00:00
|
|
|
REQUIRE(VALID_SDLZDB(sdlz));
|
|
|
|
|
|
|
|
if (sdlz->dlzimp->methods->delrdataset == NULL) {
|
|
|
|
return (ISC_R_NOTIMPLEMENTED);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2010-12-18 01:56:23 +00:00
|
|
|
|
|
|
|
sdlznode = (dns_sdlznode_t *)node;
|
|
|
|
dns_name_format(sdlznode->name, name, sizeof(name));
|
|
|
|
dns_rdatatype_format(type, b_type, sizeof(b_type));
|
|
|
|
|
|
|
|
MAYBE_LOCK(sdlz->dlzimp);
|
|
|
|
result = sdlz->dlzimp->methods->delrdataset(
|
|
|
|
name, b_type, sdlz->dlzimp->driverarg, sdlz->dbdata, version);
|
|
|
|
MAYBE_UNLOCK(sdlz->dlzimp);
|
|
|
|
|
|
|
|
return (result);
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
2018-04-17 08:29:14 -07:00
|
|
|
static bool
|
2005-09-05 00:12:29 +00:00
|
|
|
issecure(dns_db_t *db) {
|
|
|
|
UNUSED(db);
|
|
|
|
|
2018-04-17 08:29:14 -07:00
|
|
|
return (false);
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static unsigned int
|
2021-10-20 12:01:00 +11:00
|
|
|
nodecount(dns_db_t *db, dns_dbtree_t tree) {
|
2005-09-05 00:12:29 +00:00
|
|
|
UNUSED(db);
|
2021-10-20 12:01:00 +11:00
|
|
|
UNUSED(tree);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2022-10-26 22:36:04 -07:00
|
|
|
setloop(dns_db_t *db, isc_loop_t *loop) {
|
2005-09-05 00:12:29 +00:00
|
|
|
UNUSED(db);
|
2022-10-26 22:36:04 -07:00
|
|
|
UNUSED(loop);
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
2010-12-18 01:56:23 +00:00
|
|
|
/*
|
|
|
|
* getoriginnode() is used by the update code to find the
|
|
|
|
* dns_rdatatype_dnskey record for a zone
|
|
|
|
*/
|
|
|
|
static isc_result_t
|
2023-01-05 09:12:35 +01:00
|
|
|
getoriginnode(dns_db_t *db, dns_dbnode_t **nodep DNS__DB_FLARG) {
|
2010-12-18 01:56:23 +00:00
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)db;
|
|
|
|
isc_result_t result;
|
|
|
|
|
|
|
|
REQUIRE(VALID_SDLZDB(sdlz));
|
|
|
|
if (sdlz->dlzimp->methods->newversion == NULL) {
|
|
|
|
return (ISC_R_NOTIMPLEMENTED);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2010-12-18 01:56:23 +00:00
|
|
|
|
2018-04-17 08:29:14 -07:00
|
|
|
result = getnodedata(db, &sdlz->common.origin, false, 0, NULL, NULL,
|
2014-06-10 16:25:26 -07:00
|
|
|
nodep);
|
2010-12-18 01:56:23 +00:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
2013-03-11 16:49:52 -07:00
|
|
|
sdlz_log(ISC_LOG_ERROR, "sdlz getoriginnode failed: %s",
|
2010-12-18 01:56:23 +00:00
|
|
|
isc_result_totext(result));
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2010-12-18 01:56:23 +00:00
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
static dns_dbmethods_t sdlzdb_methods = {
|
2023-02-17 13:04:12 -08:00
|
|
|
.destroy = destroy,
|
2023-02-17 11:46:58 -08:00
|
|
|
.currentversion = currentversion,
|
|
|
|
.newversion = newversion,
|
|
|
|
.attachversion = attachversion,
|
|
|
|
.closeversion = closeversion,
|
|
|
|
.findnode = findnode,
|
|
|
|
.find = find,
|
|
|
|
.attachnode = attachnode,
|
|
|
|
.detachnode = detachnode,
|
|
|
|
.createiterator = createiterator,
|
|
|
|
.findrdataset = findrdataset,
|
|
|
|
.allrdatasets = allrdatasets,
|
|
|
|
.addrdataset = addrdataset,
|
|
|
|
.subtractrdataset = subtractrdataset,
|
|
|
|
.deleterdataset = deleterdataset,
|
|
|
|
.issecure = issecure,
|
|
|
|
.nodecount = nodecount,
|
|
|
|
.setloop = setloop,
|
|
|
|
.getoriginnode = getoriginnode,
|
|
|
|
.findnodeext = findnodeext,
|
|
|
|
.findext = findext,
|
2005-09-05 00:12:29 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Database Iterator Methods. These methods were "borrowed" from the SDB
|
|
|
|
* driver interface. See the SDB driver interface documentation for more info.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static void
|
2023-01-05 09:12:35 +01:00
|
|
|
dbiterator_destroy(dns_dbiterator_t **iteratorp DNS__DB_FLARG) {
|
2005-09-05 00:12:29 +00:00
|
|
|
sdlz_dbiterator_t *sdlziter = (sdlz_dbiterator_t *)(*iteratorp);
|
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)sdlziter->common.db;
|
|
|
|
|
|
|
|
while (!ISC_LIST_EMPTY(sdlziter->nodelist)) {
|
|
|
|
dns_sdlznode_t *node;
|
|
|
|
node = ISC_LIST_HEAD(sdlziter->nodelist);
|
|
|
|
ISC_LIST_UNLINK(sdlziter->nodelist, node, link);
|
2019-12-05 13:29:45 +11:00
|
|
|
isc_refcount_decrementz(&node->references);
|
2005-09-05 00:12:29 +00:00
|
|
|
destroynode(node);
|
|
|
|
}
|
|
|
|
|
|
|
|
dns_db_detach(&sdlziter->common.db);
|
|
|
|
isc_mem_put(sdlz->common.mctx, sdlziter, sizeof(sdlz_dbiterator_t));
|
|
|
|
|
|
|
|
*iteratorp = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
2023-01-05 09:12:35 +01:00
|
|
|
dbiterator_first(dns_dbiterator_t *iterator DNS__DB_FLARG) {
|
2005-09-05 00:12:29 +00:00
|
|
|
sdlz_dbiterator_t *sdlziter = (sdlz_dbiterator_t *)iterator;
|
|
|
|
|
|
|
|
sdlziter->current = ISC_LIST_HEAD(sdlziter->nodelist);
|
|
|
|
if (sdlziter->current == NULL) {
|
|
|
|
return (ISC_R_NOMORE);
|
|
|
|
} else {
|
|
|
|
return (ISC_R_SUCCESS);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
2023-01-05 09:12:35 +01:00
|
|
|
dbiterator_last(dns_dbiterator_t *iterator DNS__DB_FLARG) {
|
2005-09-05 00:12:29 +00:00
|
|
|
sdlz_dbiterator_t *sdlziter = (sdlz_dbiterator_t *)iterator;
|
|
|
|
|
|
|
|
sdlziter->current = ISC_LIST_TAIL(sdlziter->nodelist);
|
|
|
|
if (sdlziter->current == NULL) {
|
|
|
|
return (ISC_R_NOMORE);
|
|
|
|
} else {
|
|
|
|
return (ISC_R_SUCCESS);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
2023-01-05 09:12:35 +01:00
|
|
|
dbiterator_seek(dns_dbiterator_t *iterator,
|
|
|
|
const dns_name_t *name DNS__DB_FLARG) {
|
2005-09-05 00:12:29 +00:00
|
|
|
sdlz_dbiterator_t *sdlziter = (sdlz_dbiterator_t *)iterator;
|
|
|
|
|
|
|
|
sdlziter->current = ISC_LIST_HEAD(sdlziter->nodelist);
|
2009-06-26 06:21:03 +00:00
|
|
|
while (sdlziter->current != NULL) {
|
2005-09-05 00:12:29 +00:00
|
|
|
if (dns_name_equal(sdlziter->current->name, name)) {
|
|
|
|
return (ISC_R_SUCCESS);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2009-06-26 06:21:03 +00:00
|
|
|
sdlziter->current = ISC_LIST_NEXT(sdlziter->current, link);
|
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
return (ISC_R_NOTFOUND);
|
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
2023-01-05 09:12:35 +01:00
|
|
|
dbiterator_prev(dns_dbiterator_t *iterator DNS__DB_FLARG) {
|
2005-09-05 00:12:29 +00:00
|
|
|
sdlz_dbiterator_t *sdlziter = (sdlz_dbiterator_t *)iterator;
|
|
|
|
|
|
|
|
sdlziter->current = ISC_LIST_PREV(sdlziter->current, link);
|
|
|
|
if (sdlziter->current == NULL) {
|
|
|
|
return (ISC_R_NOMORE);
|
|
|
|
} else {
|
|
|
|
return (ISC_R_SUCCESS);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
2023-01-05 09:12:35 +01:00
|
|
|
dbiterator_next(dns_dbiterator_t *iterator DNS__DB_FLARG) {
|
2005-09-05 00:12:29 +00:00
|
|
|
sdlz_dbiterator_t *sdlziter = (sdlz_dbiterator_t *)iterator;
|
|
|
|
|
|
|
|
sdlziter->current = ISC_LIST_NEXT(sdlziter->current, link);
|
|
|
|
if (sdlziter->current == NULL) {
|
|
|
|
return (ISC_R_NOMORE);
|
|
|
|
} else {
|
|
|
|
return (ISC_R_SUCCESS);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
|
|
|
dbiterator_current(dns_dbiterator_t *iterator, dns_dbnode_t **nodep,
|
2023-01-05 09:12:35 +01:00
|
|
|
dns_name_t *name DNS__DB_FLARG) {
|
2005-09-05 00:12:29 +00:00
|
|
|
sdlz_dbiterator_t *sdlziter = (sdlz_dbiterator_t *)iterator;
|
|
|
|
|
2023-01-05 09:12:35 +01:00
|
|
|
attachnode(iterator->db, sdlziter->current, nodep DNS__DB_FLARG_PASS);
|
2019-09-10 13:16:48 +02:00
|
|
|
if (name != NULL) {
|
2021-05-21 17:20:44 -07:00
|
|
|
dns_name_copy(sdlziter->current->name, name);
|
2019-09-10 13:16:48 +02:00
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
|
|
|
dbiterator_pause(dns_dbiterator_t *iterator) {
|
|
|
|
UNUSED(iterator);
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
|
|
|
dbiterator_origin(dns_dbiterator_t *iterator, dns_name_t *name) {
|
|
|
|
UNUSED(iterator);
|
2021-05-21 17:20:44 -07:00
|
|
|
dns_name_copy(dns_rootname, name);
|
2019-09-10 13:16:48 +02:00
|
|
|
return (ISC_R_SUCCESS);
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Rdataset Methods. These methods were "borrowed" from the SDB driver
|
|
|
|
* interface. See the SDB driver interface documentation for more info.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static void
|
2023-01-05 09:12:35 +01:00
|
|
|
disassociate(dns_rdataset_t *rdataset DNS__DB_FLARG) {
|
Give the rdataset->privateN fields more helpful names
BIND's rdataset structure is a view of some DNS records. It is
polymorphic, so the details of how the records are stored can vary.
For instance, the records can be held in an rdatalist, or in an
rdataslab in the rbtdb.
The dns_rdataset structure previously had a number of fields called
`private1` up to `private7`, which were used by the various rdataset
implementations. It was not at all clear what these fields were for,
without reading the code and working it out from context.
This change makes the rdataset inheritance hierarchy more clear. The
polymorphic part of a `struct dns_rdataset` is now a union of structs,
each of which is named for the class of implementation using it. The
fields of these structs replace the old `privateN` fields. (Note: the
term "inheritance hierarchy" refers to the fact that the builtin and
SDLZ implementations are based on and inherit from the rdatalist
implementation, which in turn inherits from the generic rdataset.
Most of this change is mechanical, but there are a few extras.
In keynode.c there were a number of REQUIRE()ments that were not
necessary: they had already been checked by the rdataset method
dispatch code. On the other hand, In ncache.c there was a public
function which needed to REQUIRE() that an rdataset was valid.
I have removed lots of "reset iterator state" comments, because it
should now be clear from `target->iter = NULL` where before
`target->private5 = NULL` could have been doing anything.
Initialization is a bit neater in a few places, using C structure
literals where appropriate.
The pointer arithmetic for translating between an rdataslab header and
its raw contents is now fractionally safer.
2023-04-28 01:12:39 +01:00
|
|
|
dns_dbnode_t *node = rdataset->rdlist.node;
|
2005-09-05 00:12:29 +00:00
|
|
|
dns_sdlznode_t *sdlznode = (dns_sdlznode_t *)node;
|
|
|
|
dns_db_t *db = (dns_db_t *)sdlznode->sdlz;
|
|
|
|
|
2023-01-05 09:12:35 +01:00
|
|
|
detachnode(db, &node DNS__DB_FLARG_PASS);
|
|
|
|
dns_rdatalist_disassociate(rdataset DNS__DB_FLARG_PASS);
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2023-01-05 09:12:35 +01:00
|
|
|
rdataset_clone(dns_rdataset_t *source, dns_rdataset_t *target DNS__DB_FLARG) {
|
Give the rdataset->privateN fields more helpful names
BIND's rdataset structure is a view of some DNS records. It is
polymorphic, so the details of how the records are stored can vary.
For instance, the records can be held in an rdatalist, or in an
rdataslab in the rbtdb.
The dns_rdataset structure previously had a number of fields called
`private1` up to `private7`, which were used by the various rdataset
implementations. It was not at all clear what these fields were for,
without reading the code and working it out from context.
This change makes the rdataset inheritance hierarchy more clear. The
polymorphic part of a `struct dns_rdataset` is now a union of structs,
each of which is named for the class of implementation using it. The
fields of these structs replace the old `privateN` fields. (Note: the
term "inheritance hierarchy" refers to the fact that the builtin and
SDLZ implementations are based on and inherit from the rdatalist
implementation, which in turn inherits from the generic rdataset.
Most of this change is mechanical, but there are a few extras.
In keynode.c there were a number of REQUIRE()ments that were not
necessary: they had already been checked by the rdataset method
dispatch code. On the other hand, In ncache.c there was a public
function which needed to REQUIRE() that an rdataset was valid.
I have removed lots of "reset iterator state" comments, because it
should now be clear from `target->iter = NULL` where before
`target->private5 = NULL` could have been doing anything.
Initialization is a bit neater in a few places, using C structure
literals where appropriate.
The pointer arithmetic for translating between an rdataslab header and
its raw contents is now fractionally safer.
2023-04-28 01:12:39 +01:00
|
|
|
dns_dbnode_t *node = source->rdlist.node;
|
2005-09-05 00:12:29 +00:00
|
|
|
dns_sdlznode_t *sdlznode = (dns_sdlznode_t *)node;
|
|
|
|
dns_db_t *db = (dns_db_t *)sdlznode->sdlz;
|
|
|
|
|
2023-01-05 09:12:35 +01:00
|
|
|
dns_rdatalist_clone(source, target DNS__DB_FLARG_PASS);
|
Give the rdataset->privateN fields more helpful names
BIND's rdataset structure is a view of some DNS records. It is
polymorphic, so the details of how the records are stored can vary.
For instance, the records can be held in an rdatalist, or in an
rdataslab in the rbtdb.
The dns_rdataset structure previously had a number of fields called
`private1` up to `private7`, which were used by the various rdataset
implementations. It was not at all clear what these fields were for,
without reading the code and working it out from context.
This change makes the rdataset inheritance hierarchy more clear. The
polymorphic part of a `struct dns_rdataset` is now a union of structs,
each of which is named for the class of implementation using it. The
fields of these structs replace the old `privateN` fields. (Note: the
term "inheritance hierarchy" refers to the fact that the builtin and
SDLZ implementations are based on and inherit from the rdatalist
implementation, which in turn inherits from the generic rdataset.
Most of this change is mechanical, but there are a few extras.
In keynode.c there were a number of REQUIRE()ments that were not
necessary: they had already been checked by the rdataset method
dispatch code. On the other hand, In ncache.c there was a public
function which needed to REQUIRE() that an rdataset was valid.
I have removed lots of "reset iterator state" comments, because it
should now be clear from `target->iter = NULL` where before
`target->private5 = NULL` could have been doing anything.
Initialization is a bit neater in a few places, using C structure
literals where appropriate.
The pointer arithmetic for translating between an rdataslab header and
its raw contents is now fractionally safer.
2023-04-28 01:12:39 +01:00
|
|
|
attachnode(db, node, &target->rdlist.node DNS__DB_FLARG_PASS);
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static dns_rdatasetmethods_t rdataset_methods = {
|
2023-02-17 11:46:58 -08:00
|
|
|
.disassociate = disassociate,
|
|
|
|
.first = dns_rdatalist_first,
|
|
|
|
.next = dns_rdatalist_next,
|
|
|
|
.current = dns_rdatalist_current,
|
|
|
|
.clone = rdataset_clone,
|
|
|
|
.count = dns_rdatalist_count,
|
|
|
|
.addnoqname = dns_rdatalist_addnoqname,
|
|
|
|
.getnoqname = dns_rdatalist_getnoqname,
|
2005-09-05 00:12:29 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static void
|
|
|
|
list_tordataset(dns_rdatalist_t *rdatalist, dns_db_t *db, dns_dbnode_t *node,
|
|
|
|
dns_rdataset_t *rdataset) {
|
|
|
|
/*
|
Give the rdataset->privateN fields more helpful names
BIND's rdataset structure is a view of some DNS records. It is
polymorphic, so the details of how the records are stored can vary.
For instance, the records can be held in an rdatalist, or in an
rdataslab in the rbtdb.
The dns_rdataset structure previously had a number of fields called
`private1` up to `private7`, which were used by the various rdataset
implementations. It was not at all clear what these fields were for,
without reading the code and working it out from context.
This change makes the rdataset inheritance hierarchy more clear. The
polymorphic part of a `struct dns_rdataset` is now a union of structs,
each of which is named for the class of implementation using it. The
fields of these structs replace the old `privateN` fields. (Note: the
term "inheritance hierarchy" refers to the fact that the builtin and
SDLZ implementations are based on and inherit from the rdatalist
implementation, which in turn inherits from the generic rdataset.
Most of this change is mechanical, but there are a few extras.
In keynode.c there were a number of REQUIRE()ments that were not
necessary: they had already been checked by the rdataset method
dispatch code. On the other hand, In ncache.c there was a public
function which needed to REQUIRE() that an rdataset was valid.
I have removed lots of "reset iterator state" comments, because it
should now be clear from `target->iter = NULL` where before
`target->private5 = NULL` could have been doing anything.
Initialization is a bit neater in a few places, using C structure
literals where appropriate.
The pointer arithmetic for translating between an rdataslab header and
its raw contents is now fractionally safer.
2023-04-28 01:12:39 +01:00
|
|
|
* The sdlz rdataset is an rdatalist, but additionally holds
|
|
|
|
* a database node reference.
|
2005-09-05 00:12:29 +00:00
|
|
|
*/
|
|
|
|
|
2022-07-29 12:40:45 +00:00
|
|
|
dns_rdatalist_tordataset(rdatalist, rdataset);
|
2005-09-05 00:12:29 +00:00
|
|
|
rdataset->methods = &rdataset_methods;
|
Give the rdataset->privateN fields more helpful names
BIND's rdataset structure is a view of some DNS records. It is
polymorphic, so the details of how the records are stored can vary.
For instance, the records can be held in an rdatalist, or in an
rdataslab in the rbtdb.
The dns_rdataset structure previously had a number of fields called
`private1` up to `private7`, which were used by the various rdataset
implementations. It was not at all clear what these fields were for,
without reading the code and working it out from context.
This change makes the rdataset inheritance hierarchy more clear. The
polymorphic part of a `struct dns_rdataset` is now a union of structs,
each of which is named for the class of implementation using it. The
fields of these structs replace the old `privateN` fields. (Note: the
term "inheritance hierarchy" refers to the fact that the builtin and
SDLZ implementations are based on and inherit from the rdatalist
implementation, which in turn inherits from the generic rdataset.
Most of this change is mechanical, but there are a few extras.
In keynode.c there were a number of REQUIRE()ments that were not
necessary: they had already been checked by the rdataset method
dispatch code. On the other hand, In ncache.c there was a public
function which needed to REQUIRE() that an rdataset was valid.
I have removed lots of "reset iterator state" comments, because it
should now be clear from `target->iter = NULL` where before
`target->private5 = NULL` could have been doing anything.
Initialization is a bit neater in a few places, using C structure
literals where appropriate.
The pointer arithmetic for translating between an rdataslab header and
its raw contents is now fractionally safer.
2023-04-28 01:12:39 +01:00
|
|
|
dns_db_attachnode(db, node, &rdataset->rdlist.node);
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* SDLZ core methods. This is the core of the new DLZ functionality.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*%
|
|
|
|
* Build a 'bind' database driver structure to be returned by
|
|
|
|
* either the find zone or the allow zone transfer method.
|
|
|
|
* This method is only available in this source file, it is
|
|
|
|
* not made available anywhere else.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static isc_result_t
|
|
|
|
dns_sdlzcreateDBP(isc_mem_t *mctx, void *driverarg, void *dbdata,
|
2016-12-30 15:45:08 +11:00
|
|
|
const dns_name_t *name, dns_rdataclass_t rdclass,
|
|
|
|
dns_db_t **dbp) {
|
2005-09-05 00:12:29 +00:00
|
|
|
dns_sdlz_db_t *sdlzdb;
|
|
|
|
dns_sdlzimplementation_t *imp;
|
|
|
|
|
|
|
|
/* check that things are as we expect */
|
|
|
|
REQUIRE(dbp != NULL && *dbp == NULL);
|
|
|
|
REQUIRE(name != NULL);
|
|
|
|
|
|
|
|
imp = (dns_sdlzimplementation_t *)driverarg;
|
|
|
|
|
|
|
|
/* allocate and zero memory for driver structure */
|
2022-08-26 11:58:51 +02:00
|
|
|
sdlzdb = isc_mem_get(mctx, sizeof(*sdlzdb));
|
|
|
|
|
|
|
|
*sdlzdb = (dns_sdlz_db_t) {
|
|
|
|
.dlzimp = imp,
|
|
|
|
.common = { .methods = &sdlzdb_methods,
|
|
|
|
.rdclass = rdclass, },
|
|
|
|
.dbdata = dbdata,
|
|
|
|
};
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/* initialize and set origin */
|
|
|
|
dns_name_init(&sdlzdb->common.origin, NULL);
|
2024-03-12 14:38:18 -07:00
|
|
|
dns_name_dupwithoffsets(name, mctx, &sdlzdb->common.origin);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
2023-02-17 13:04:12 -08:00
|
|
|
isc_refcount_init(&sdlzdb->common.references, 1);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/* attach to the memory context */
|
|
|
|
isc_mem_attach(mctx, &sdlzdb->common.mctx);
|
|
|
|
|
|
|
|
/* mark structure as valid */
|
|
|
|
sdlzdb->common.magic = DNS_DB_MAGIC;
|
|
|
|
sdlzdb->common.impmagic = SDLZDB_MAGIC;
|
|
|
|
*dbp = (dns_db_t *)sdlzdb;
|
|
|
|
|
2024-03-12 14:38:18 -07:00
|
|
|
return (ISC_R_SUCCESS);
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
|
|
|
dns_sdlzallowzonexfr(void *driverarg, void *dbdata, isc_mem_t *mctx,
|
2016-12-30 15:45:08 +11:00
|
|
|
dns_rdataclass_t rdclass, const dns_name_t *name,
|
|
|
|
const isc_sockaddr_t *clientaddr, dns_db_t **dbp) {
|
2005-09-05 00:12:29 +00:00
|
|
|
isc_buffer_t b;
|
|
|
|
isc_buffer_t b2;
|
|
|
|
char namestr[DNS_NAME_MAXTEXT + 1];
|
|
|
|
char clientstr[(sizeof "xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:255.255.255."
|
|
|
|
"255") +
|
|
|
|
1];
|
|
|
|
isc_netaddr_t netaddr;
|
|
|
|
isc_result_t result;
|
|
|
|
dns_sdlzimplementation_t *imp;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Perform checks to make sure data is as we expect it to be.
|
|
|
|
*/
|
|
|
|
REQUIRE(driverarg != NULL);
|
|
|
|
REQUIRE(name != NULL);
|
|
|
|
REQUIRE(clientaddr != NULL);
|
|
|
|
REQUIRE(dbp != NULL && *dbp == NULL);
|
|
|
|
|
|
|
|
imp = (dns_sdlzimplementation_t *)driverarg;
|
|
|
|
|
|
|
|
/* Convert DNS name to ascii text */
|
|
|
|
isc_buffer_init(&b, namestr, sizeof(namestr));
|
2023-08-15 18:52:17 -07:00
|
|
|
result = dns_name_totext(name, DNS_NAME_OMITFINALDOT, &b);
|
2005-09-05 00:12:29 +00:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
return (result);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
isc_buffer_putuint8(&b, 0);
|
|
|
|
|
|
|
|
/* convert client address to ascii text */
|
|
|
|
isc_buffer_init(&b2, clientstr, sizeof(clientstr));
|
|
|
|
isc_netaddr_fromsockaddr(&netaddr, clientaddr);
|
|
|
|
result = isc_netaddr_totext(&netaddr, &b2);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
return (result);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
isc_buffer_putuint8(&b2, 0);
|
|
|
|
|
2008-04-01 23:47:10 +00:00
|
|
|
/* make sure strings are always lowercase */
|
2022-06-24 22:11:02 +01:00
|
|
|
isc_ascii_strtolower(namestr);
|
|
|
|
isc_ascii_strtolower(clientstr);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/* Call SDLZ driver's find zone method */
|
|
|
|
if (imp->methods->allowzonexfr != NULL) {
|
2019-01-02 17:29:59 +11:00
|
|
|
isc_result_t rresult = ISC_R_SUCCESS;
|
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
MAYBE_LOCK(imp);
|
|
|
|
result = imp->methods->allowzonexfr(imp->driverarg, dbdata,
|
|
|
|
namestr, clientstr);
|
|
|
|
MAYBE_UNLOCK(imp);
|
|
|
|
/*
|
2019-01-02 17:29:59 +11:00
|
|
|
* if zone is supported and transfers are (or might be)
|
|
|
|
* allowed, build a 'bind' database driver
|
2005-09-05 00:12:29 +00:00
|
|
|
*/
|
2019-01-02 17:29:59 +11:00
|
|
|
if (result == ISC_R_SUCCESS || result == ISC_R_DEFAULT) {
|
|
|
|
rresult = dns_sdlzcreateDBP(mctx, driverarg, dbdata,
|
|
|
|
name, rdclass, dbp);
|
|
|
|
}
|
|
|
|
if (rresult != ISC_R_SUCCESS) {
|
|
|
|
result = rresult;
|
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (ISC_R_NOTIMPLEMENTED);
|
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
|
|
|
dns_sdlzcreate(isc_mem_t *mctx, const char *dlzname, unsigned int argc,
|
|
|
|
char *argv[], void *driverarg, void **dbdata) {
|
|
|
|
dns_sdlzimplementation_t *imp;
|
|
|
|
isc_result_t result = ISC_R_NOTFOUND;
|
|
|
|
|
|
|
|
/* Write debugging message to log */
|
2010-12-18 01:56:23 +00:00
|
|
|
sdlz_log(ISC_LOG_DEBUG(2), "Loading SDLZ driver.");
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Performs checks to make sure data is as we expect it to be.
|
|
|
|
*/
|
|
|
|
REQUIRE(driverarg != NULL);
|
|
|
|
REQUIRE(dlzname != NULL);
|
|
|
|
REQUIRE(dbdata != NULL);
|
|
|
|
UNUSED(mctx);
|
|
|
|
|
|
|
|
imp = driverarg;
|
|
|
|
|
|
|
|
/* If the create method exists, call it. */
|
|
|
|
if (imp->methods->create != NULL) {
|
|
|
|
MAYBE_LOCK(imp);
|
|
|
|
result = imp->methods->create(dlzname, argc, argv,
|
|
|
|
imp->driverarg, dbdata);
|
|
|
|
MAYBE_UNLOCK(imp);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Write debugging message to log */
|
|
|
|
if (result == ISC_R_SUCCESS) {
|
2010-12-18 01:56:23 +00:00
|
|
|
sdlz_log(ISC_LOG_DEBUG(2), "SDLZ driver loaded successfully.");
|
2005-09-05 00:12:29 +00:00
|
|
|
} else {
|
2010-12-18 01:56:23 +00:00
|
|
|
sdlz_log(ISC_LOG_ERROR, "SDLZ driver failed to load.");
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2012-12-06 12:39:52 -08:00
|
|
|
dns_sdlzdestroy(void *driverdata, void **dbdata) {
|
2005-09-05 00:12:29 +00:00
|
|
|
dns_sdlzimplementation_t *imp;
|
|
|
|
|
|
|
|
/* Write debugging message to log */
|
2010-12-18 01:56:23 +00:00
|
|
|
sdlz_log(ISC_LOG_DEBUG(2), "Unloading SDLZ driver.");
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
imp = driverdata;
|
|
|
|
|
|
|
|
/* If the destroy method exists, call it. */
|
|
|
|
if (imp->methods->destroy != NULL) {
|
|
|
|
MAYBE_LOCK(imp);
|
|
|
|
imp->methods->destroy(imp->driverarg, dbdata);
|
|
|
|
MAYBE_UNLOCK(imp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static isc_result_t
|
|
|
|
dns_sdlzfindzone(void *driverarg, void *dbdata, isc_mem_t *mctx,
|
2016-12-30 15:45:08 +11:00
|
|
|
dns_rdataclass_t rdclass, const dns_name_t *name,
|
2012-12-06 12:59:36 -08:00
|
|
|
dns_clientinfomethods_t *methods, dns_clientinfo_t *clientinfo,
|
|
|
|
dns_db_t **dbp) {
|
2005-09-05 00:12:29 +00:00
|
|
|
isc_buffer_t b;
|
|
|
|
char namestr[DNS_NAME_MAXTEXT + 1];
|
|
|
|
isc_result_t result;
|
|
|
|
dns_sdlzimplementation_t *imp;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Perform checks to make sure data is as we expect it to be.
|
|
|
|
*/
|
|
|
|
REQUIRE(driverarg != NULL);
|
|
|
|
REQUIRE(name != NULL);
|
|
|
|
REQUIRE(dbp != NULL && *dbp == NULL);
|
|
|
|
|
|
|
|
imp = (dns_sdlzimplementation_t *)driverarg;
|
|
|
|
|
|
|
|
/* Convert DNS name to ascii text */
|
|
|
|
isc_buffer_init(&b, namestr, sizeof(namestr));
|
2023-08-15 18:52:17 -07:00
|
|
|
result = dns_name_totext(name, DNS_NAME_OMITFINALDOT, &b);
|
2005-09-05 00:12:29 +00:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
return (result);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
isc_buffer_putuint8(&b, 0);
|
|
|
|
|
2008-04-01 23:47:10 +00:00
|
|
|
/* make sure strings are always lowercase */
|
2022-06-24 22:11:02 +01:00
|
|
|
isc_ascii_strtolower(namestr);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/* Call SDLZ driver's find zone method */
|
|
|
|
MAYBE_LOCK(imp);
|
2012-12-06 12:59:36 -08:00
|
|
|
result = imp->methods->findzone(imp->driverarg, dbdata, namestr,
|
|
|
|
methods, clientinfo);
|
2005-09-05 00:12:29 +00:00
|
|
|
MAYBE_UNLOCK(imp);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* if zone is supported build a 'bind' database driver
|
|
|
|
* structure to return
|
|
|
|
*/
|
|
|
|
if (result == ISC_R_SUCCESS) {
|
|
|
|
result = dns_sdlzcreateDBP(mctx, driverarg, dbdata, name,
|
|
|
|
rdclass, dbp);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
2010-12-18 01:56:23 +00:00
|
|
|
static isc_result_t
|
2012-12-06 12:39:52 -08:00
|
|
|
dns_sdlzconfigure(void *driverarg, void *dbdata, dns_view_t *view,
|
|
|
|
dns_dlzdb_t *dlzdb) {
|
2010-12-18 01:56:23 +00:00
|
|
|
isc_result_t result;
|
|
|
|
dns_sdlzimplementation_t *imp;
|
|
|
|
|
|
|
|
REQUIRE(driverarg != NULL);
|
|
|
|
|
|
|
|
imp = (dns_sdlzimplementation_t *)driverarg;
|
|
|
|
|
|
|
|
/* Call SDLZ driver's configure method */
|
|
|
|
if (imp->methods->configure != NULL) {
|
|
|
|
MAYBE_LOCK(imp);
|
2012-12-06 12:39:52 -08:00
|
|
|
result = imp->methods->configure(view, dlzdb, imp->driverarg,
|
|
|
|
dbdata);
|
2010-12-18 01:56:23 +00:00
|
|
|
MAYBE_UNLOCK(imp);
|
|
|
|
} else {
|
|
|
|
result = ISC_R_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
2018-04-17 08:29:14 -07:00
|
|
|
static bool
|
2016-12-30 15:45:08 +11:00
|
|
|
dns_sdlzssumatch(const dns_name_t *signer, const dns_name_t *name,
|
|
|
|
const isc_netaddr_t *tcpaddr, dns_rdatatype_t type,
|
|
|
|
const dst_key_t *key, void *driverarg, void *dbdata) {
|
2010-12-18 01:56:23 +00:00
|
|
|
dns_sdlzimplementation_t *imp;
|
|
|
|
char b_signer[DNS_NAME_FORMATSIZE];
|
|
|
|
char b_name[DNS_NAME_FORMATSIZE];
|
|
|
|
char b_addr[ISC_NETADDR_FORMATSIZE];
|
|
|
|
char b_type[DNS_RDATATYPE_FORMATSIZE];
|
|
|
|
char b_key[DST_KEY_FORMATSIZE];
|
2011-03-21 19:54:03 +00:00
|
|
|
isc_buffer_t *tkey_token = NULL;
|
2017-04-28 11:01:23 +10:00
|
|
|
isc_region_t token_region = { NULL, 0 };
|
2018-03-28 14:19:37 +02:00
|
|
|
uint32_t token_len = 0;
|
2018-04-17 08:29:14 -07:00
|
|
|
bool ret;
|
2010-12-18 01:56:23 +00:00
|
|
|
|
|
|
|
REQUIRE(driverarg != NULL);
|
|
|
|
|
|
|
|
imp = (dns_sdlzimplementation_t *)driverarg;
|
|
|
|
if (imp->methods->ssumatch == NULL) {
|
2018-04-17 08:29:14 -07:00
|
|
|
return (false);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2010-12-18 01:56:23 +00:00
|
|
|
|
|
|
|
/*
|
2010-12-18 23:47:11 +00:00
|
|
|
* Format the request elements. sdlz operates on strings, not
|
2010-12-18 01:56:23 +00:00
|
|
|
* structures
|
2010-12-18 23:47:11 +00:00
|
|
|
*/
|
2011-03-21 19:54:03 +00:00
|
|
|
if (signer != NULL) {
|
2010-12-18 01:56:23 +00:00
|
|
|
dns_name_format(signer, b_signer, sizeof(b_signer));
|
|
|
|
} else {
|
|
|
|
b_signer[0] = 0;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2010-12-18 01:56:23 +00:00
|
|
|
|
|
|
|
dns_name_format(name, b_name, sizeof(b_name));
|
|
|
|
|
2011-03-21 19:54:03 +00:00
|
|
|
if (tcpaddr != NULL) {
|
2010-12-18 01:56:23 +00:00
|
|
|
isc_netaddr_format(tcpaddr, b_addr, sizeof(b_addr));
|
|
|
|
} else {
|
|
|
|
b_addr[0] = 0;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2010-12-18 01:56:23 +00:00
|
|
|
|
|
|
|
dns_rdatatype_format(type, b_type, sizeof(b_type));
|
|
|
|
|
2011-03-21 19:54:03 +00:00
|
|
|
if (key != NULL) {
|
2010-12-18 01:56:23 +00:00
|
|
|
dst_key_format(key, b_key, sizeof(b_key));
|
2011-03-21 19:54:03 +00:00
|
|
|
tkey_token = dst_key_tkeytoken(key);
|
|
|
|
} else {
|
2010-12-18 23:47:11 +00:00
|
|
|
b_key[0] = 0;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2010-12-18 01:56:23 +00:00
|
|
|
|
2011-03-21 19:54:03 +00:00
|
|
|
if (tkey_token != NULL) {
|
2010-12-18 01:56:23 +00:00
|
|
|
isc_buffer_region(tkey_token, &token_region);
|
|
|
|
token_len = token_region.length;
|
|
|
|
}
|
|
|
|
|
|
|
|
MAYBE_LOCK(imp);
|
|
|
|
ret = imp->methods->ssumatch(b_signer, b_name, b_addr, b_type, b_key,
|
|
|
|
token_len,
|
2011-03-21 19:54:03 +00:00
|
|
|
token_len != 0 ? token_region.base : NULL,
|
2010-12-18 01:56:23 +00:00
|
|
|
imp->driverarg, dbdata);
|
|
|
|
MAYBE_UNLOCK(imp);
|
|
|
|
return (ret);
|
|
|
|
}
|
|
|
|
|
2005-09-05 00:12:29 +00:00
|
|
|
static dns_dlzmethods_t sdlzmethods = { dns_sdlzcreate, dns_sdlzdestroy,
|
2010-12-18 01:56:23 +00:00
|
|
|
dns_sdlzfindzone, dns_sdlzallowzonexfr,
|
|
|
|
dns_sdlzconfigure, dns_sdlzssumatch };
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Public functions.
|
|
|
|
*/
|
|
|
|
|
|
|
|
isc_result_t
|
|
|
|
dns_sdlz_putrr(dns_sdlzlookup_t *lookup, const char *type, dns_ttl_t ttl,
|
|
|
|
const char *data) {
|
|
|
|
dns_rdatalist_t *rdatalist;
|
|
|
|
dns_rdata_t *rdata;
|
|
|
|
dns_rdatatype_t typeval;
|
|
|
|
isc_consttextregion_t r;
|
|
|
|
isc_buffer_t b;
|
2005-11-30 03:33:49 +00:00
|
|
|
isc_buffer_t *rdatabuf = NULL;
|
2005-09-05 00:12:29 +00:00
|
|
|
isc_lex_t *lex;
|
|
|
|
isc_result_t result;
|
|
|
|
unsigned int size;
|
|
|
|
isc_mem_t *mctx;
|
2016-12-30 15:45:08 +11:00
|
|
|
const dns_name_t *origin;
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
REQUIRE(VALID_SDLZLOOKUP(lookup));
|
|
|
|
REQUIRE(type != NULL);
|
|
|
|
REQUIRE(data != NULL);
|
|
|
|
|
|
|
|
mctx = lookup->sdlz->common.mctx;
|
|
|
|
|
|
|
|
r.base = type;
|
|
|
|
r.length = strlen(type);
|
|
|
|
result = dns_rdatatype_fromtext(&typeval, (void *)&r);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
return (result);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
rdatalist = ISC_LIST_HEAD(lookup->lists);
|
|
|
|
while (rdatalist != NULL) {
|
|
|
|
if (rdatalist->type == typeval) {
|
|
|
|
break;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
rdatalist = ISC_LIST_NEXT(rdatalist, link);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rdatalist == NULL) {
|
|
|
|
rdatalist = isc_mem_get(mctx, sizeof(dns_rdatalist_t));
|
2015-03-03 16:43:42 +11:00
|
|
|
dns_rdatalist_init(rdatalist);
|
2005-09-05 00:12:29 +00:00
|
|
|
rdatalist->rdclass = lookup->sdlz->common.rdclass;
|
|
|
|
rdatalist->type = typeval;
|
|
|
|
rdatalist->ttl = ttl;
|
|
|
|
ISC_LIST_APPEND(lookup->lists, rdatalist, link);
|
2010-12-18 01:56:23 +00:00
|
|
|
} else if (rdatalist->ttl > ttl) {
|
|
|
|
/*
|
|
|
|
* BIND9 doesn't enforce all RRs in an RRset
|
|
|
|
* having the same TTL, as per RFC 2136,
|
|
|
|
* section 7.12. If a DLZ backend has
|
|
|
|
* different TTLs, then the best
|
|
|
|
* we can do is return the lowest.
|
|
|
|
*/
|
|
|
|
rdatalist->ttl = ttl;
|
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
rdata = isc_mem_get(mctx, sizeof(dns_rdata_t));
|
|
|
|
dns_rdata_init(rdata);
|
|
|
|
|
|
|
|
if ((lookup->sdlz->dlzimp->flags & DNS_SDLZFLAG_RELATIVERDATA) != 0) {
|
|
|
|
origin = &lookup->sdlz->common.origin;
|
|
|
|
} else {
|
|
|
|
origin = dns_rootname;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
lex = NULL;
|
2022-10-26 12:35:41 +02:00
|
|
|
isc_lex_create(mctx, 64, &lex);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
size = initial_size(data);
|
|
|
|
do {
|
2012-12-08 12:48:57 +11:00
|
|
|
isc_buffer_constinit(&b, data, strlen(data));
|
2005-09-05 00:12:29 +00:00
|
|
|
isc_buffer_add(&b, strlen(data));
|
|
|
|
|
|
|
|
result = isc_lex_openbuffer(lex, &b);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto failure;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
rdatabuf = NULL;
|
2020-02-02 08:35:46 +01:00
|
|
|
isc_buffer_allocate(mctx, &rdatabuf, size);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
result = dns_rdata_fromtext(rdata, rdatalist->rdclass,
|
|
|
|
rdatalist->type, lex, origin, false,
|
|
|
|
mctx, rdatabuf, &lookup->callbacks);
|
2018-10-08 12:47:28 +02:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
2005-09-05 00:12:29 +00:00
|
|
|
isc_buffer_free(&rdatabuf);
|
2018-10-08 12:47:28 +02:00
|
|
|
}
|
2011-12-22 07:15:05 +00:00
|
|
|
if (size >= 65535) {
|
|
|
|
break;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
size *= 2;
|
2011-12-22 07:15:05 +00:00
|
|
|
if (size >= 65535) {
|
|
|
|
size = 65535;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
} while (result == ISC_R_NOSPACE);
|
|
|
|
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
2021-11-24 11:03:19 +11:00
|
|
|
result = DNS_R_SERVFAIL;
|
2005-09-05 00:12:29 +00:00
|
|
|
goto failure;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
ISC_LIST_APPEND(rdatalist->rdata, rdata, link);
|
|
|
|
ISC_LIST_APPEND(lookup->buffers, rdatabuf, link);
|
|
|
|
|
|
|
|
if (lex != NULL) {
|
|
|
|
isc_lex_destroy(&lex);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
|
|
|
|
failure:
|
2008-04-01 23:47:10 +00:00
|
|
|
if (rdatabuf != NULL) {
|
2005-09-05 00:12:29 +00:00
|
|
|
isc_buffer_free(&rdatabuf);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
if (lex != NULL) {
|
|
|
|
isc_lex_destroy(&lex);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
isc_mem_put(mctx, rdata, sizeof(dns_rdata_t));
|
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
isc_result_t
|
|
|
|
dns_sdlz_putnamedrr(dns_sdlzallnodes_t *allnodes, const char *name,
|
|
|
|
const char *type, dns_ttl_t ttl, const char *data) {
|
2016-12-30 15:45:08 +11:00
|
|
|
dns_name_t *newname;
|
|
|
|
const dns_name_t *origin;
|
2005-09-05 00:12:29 +00:00
|
|
|
dns_fixedname_t fnewname;
|
|
|
|
dns_sdlz_db_t *sdlz = (dns_sdlz_db_t *)allnodes->common.db;
|
|
|
|
dns_sdlznode_t *sdlznode;
|
|
|
|
isc_mem_t *mctx = sdlz->common.mctx;
|
|
|
|
isc_buffer_t b;
|
|
|
|
isc_result_t result;
|
|
|
|
|
2018-03-28 14:38:09 +02:00
|
|
|
newname = dns_fixedname_initname(&fnewname);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
if ((sdlz->dlzimp->flags & DNS_SDLZFLAG_RELATIVERDATA) != 0) {
|
|
|
|
origin = &sdlz->common.origin;
|
|
|
|
} else {
|
|
|
|
origin = dns_rootname;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2012-12-08 12:48:57 +11:00
|
|
|
isc_buffer_constinit(&b, name, strlen(name));
|
2005-09-05 00:12:29 +00:00
|
|
|
isc_buffer_add(&b, strlen(name));
|
|
|
|
|
2009-09-01 00:22:28 +00:00
|
|
|
result = dns_name_fromtext(newname, &b, origin, 0, NULL);
|
2005-09-05 00:12:29 +00:00
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
return (result);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
if (allnodes->common.relative_names) {
|
|
|
|
/* All names are relative to the root */
|
|
|
|
unsigned int nlabels = dns_name_countlabels(newname);
|
|
|
|
dns_name_getlabelsequence(newname, 0, nlabels - 1, newname);
|
|
|
|
}
|
|
|
|
|
|
|
|
sdlznode = ISC_LIST_HEAD(allnodes->nodelist);
|
|
|
|
if (sdlznode == NULL || !dns_name_equal(sdlznode->name, newname)) {
|
|
|
|
sdlznode = NULL;
|
|
|
|
result = createnode(sdlz, &sdlznode);
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
return (result);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
sdlznode->name = isc_mem_get(mctx, sizeof(dns_name_t));
|
|
|
|
dns_name_init(sdlznode->name, NULL);
|
2019-11-01 08:31:13 -05:00
|
|
|
dns_name_dup(newname, mctx, sdlznode->name);
|
2005-09-05 00:12:29 +00:00
|
|
|
ISC_LIST_PREPEND(allnodes->nodelist, sdlznode, link);
|
|
|
|
if (allnodes->origin == NULL &&
|
2022-11-02 19:33:14 +01:00
|
|
|
dns_name_equal(newname, &sdlz->common.origin))
|
|
|
|
{
|
2005-09-05 00:12:29 +00:00
|
|
|
allnodes->origin = sdlznode;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
|
|
|
return (dns_sdlz_putrr(sdlznode, type, ttl, data));
|
|
|
|
}
|
|
|
|
|
|
|
|
isc_result_t
|
|
|
|
dns_sdlz_putsoa(dns_sdlzlookup_t *lookup, const char *mname, const char *rname,
|
2018-03-28 14:19:37 +02:00
|
|
|
uint32_t serial) {
|
2005-09-05 00:12:29 +00:00
|
|
|
char str[2 * DNS_NAME_MAXTEXT + 5 * (sizeof("2147483647")) + 7];
|
|
|
|
int n;
|
|
|
|
|
|
|
|
REQUIRE(mname != NULL);
|
|
|
|
REQUIRE(rname != NULL);
|
|
|
|
|
|
|
|
n = snprintf(str, sizeof str, "%s %s %u %u %u %u %u", mname, rname,
|
|
|
|
serial, SDLZ_DEFAULT_REFRESH, SDLZ_DEFAULT_RETRY,
|
|
|
|
SDLZ_DEFAULT_EXPIRE, SDLZ_DEFAULT_MINIMUM);
|
|
|
|
if (n >= (int)sizeof(str) || n < 0) {
|
|
|
|
return (ISC_R_NOSPACE);
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
return (dns_sdlz_putrr(lookup, "SOA", SDLZ_DEFAULT_TTL, str));
|
|
|
|
}
|
|
|
|
|
|
|
|
isc_result_t
|
|
|
|
dns_sdlzregister(const char *drivername, const dns_sdlzmethods_t *methods,
|
|
|
|
void *driverarg, unsigned int flags, isc_mem_t *mctx,
|
|
|
|
dns_sdlzimplementation_t **sdlzimp) {
|
|
|
|
dns_sdlzimplementation_t *imp;
|
|
|
|
isc_result_t result;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Performs checks to make sure data is as we expect it to be.
|
|
|
|
*/
|
|
|
|
REQUIRE(drivername != NULL);
|
|
|
|
REQUIRE(methods != NULL);
|
|
|
|
REQUIRE(methods->findzone != NULL);
|
|
|
|
REQUIRE(methods->lookup != NULL);
|
|
|
|
REQUIRE(mctx != NULL);
|
|
|
|
REQUIRE(sdlzimp != NULL && *sdlzimp == NULL);
|
|
|
|
REQUIRE((flags &
|
|
|
|
~(DNS_SDLZFLAG_RELATIVEOWNER | DNS_SDLZFLAG_RELATIVERDATA |
|
|
|
|
DNS_SDLZFLAG_THREADSAFE)) == 0);
|
|
|
|
|
|
|
|
/* Write debugging message to log */
|
2010-12-18 01:56:23 +00:00
|
|
|
sdlz_log(ISC_LOG_DEBUG(2), "Registering SDLZ driver '%s'", drivername);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Allocate memory for a sdlz_implementation object. Error if
|
|
|
|
* we cannot.
|
|
|
|
*/
|
2022-08-26 11:58:51 +02:00
|
|
|
imp = isc_mem_get(mctx, sizeof(*imp));
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/* Store the data passed into this method */
|
2022-08-26 11:58:51 +02:00
|
|
|
*imp = (dns_sdlzimplementation_t){
|
|
|
|
.methods = methods,
|
|
|
|
.driverarg = driverarg,
|
|
|
|
.flags = flags,
|
|
|
|
};
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/* attach the new sdlz_implementation object to a memory context */
|
|
|
|
isc_mem_attach(mctx, &imp->mctx);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* initialize the driver lock, error if we cannot
|
|
|
|
* (used if a driver does not support multiple threads)
|
|
|
|
*/
|
2018-11-16 15:33:22 +01:00
|
|
|
isc_mutex_init(&imp->driverlock);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* register the DLZ driver. Pass in our "extra" sdlz information as
|
|
|
|
* a driverarg. (that's why we stored the passed in driver arg in our
|
|
|
|
* sdlz_implementation structure) Also, store the dlz_implementation
|
|
|
|
* structure in our sdlz_implementation.
|
|
|
|
*/
|
|
|
|
result = dns_dlzregister(drivername, &sdlzmethods, imp, mctx,
|
|
|
|
&imp->dlz_imp);
|
|
|
|
|
|
|
|
/* if registration fails, cleanup and get outta here. */
|
|
|
|
if (result != ISC_R_SUCCESS) {
|
|
|
|
goto cleanup_mutex;
|
2020-02-13 21:48:23 +01:00
|
|
|
}
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
*sdlzimp = imp;
|
|
|
|
|
|
|
|
return (ISC_R_SUCCESS);
|
|
|
|
|
|
|
|
cleanup_mutex:
|
|
|
|
/* destroy the driver lock, we don't need it anymore */
|
2018-11-19 10:31:09 +00:00
|
|
|
isc_mutex_destroy(&imp->driverlock);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* return the memory back to the available memory pool and
|
|
|
|
* remove it from the memory context.
|
|
|
|
*/
|
2022-08-26 11:58:51 +02:00
|
|
|
isc_mem_putanddetach(&imp->mctx, imp, sizeof(*imp));
|
2005-09-05 00:12:29 +00:00
|
|
|
return (result);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
dns_sdlzunregister(dns_sdlzimplementation_t **sdlzimp) {
|
|
|
|
dns_sdlzimplementation_t *imp;
|
|
|
|
|
|
|
|
/* Write debugging message to log */
|
2010-12-18 01:56:23 +00:00
|
|
|
sdlz_log(ISC_LOG_DEBUG(2), "Unregistering SDLZ driver.");
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Performs checks to make sure data is as we expect it to be.
|
|
|
|
*/
|
|
|
|
REQUIRE(sdlzimp != NULL && *sdlzimp != NULL);
|
|
|
|
|
|
|
|
imp = *sdlzimp;
|
2020-02-08 04:37:54 -08:00
|
|
|
*sdlzimp = NULL;
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/* Unregister the DLZ driver implementation */
|
|
|
|
dns_dlzunregister(&imp->dlz_imp);
|
|
|
|
|
|
|
|
/* destroy the driver lock, we don't need it anymore */
|
2018-11-19 10:31:09 +00:00
|
|
|
isc_mutex_destroy(&imp->driverlock);
|
2005-09-05 00:12:29 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* return the memory back to the available memory pool and
|
|
|
|
* remove it from the memory context.
|
|
|
|
*/
|
2019-07-23 17:16:57 -04:00
|
|
|
isc_mem_putanddetach(&imp->mctx, imp, sizeof(dns_sdlzimplementation_t));
|
2005-09-05 00:12:29 +00:00
|
|
|
}
|
2010-12-18 01:56:23 +00:00
|
|
|
|
|
|
|
isc_result_t
|
|
|
|
dns_sdlz_setdb(dns_dlzdb_t *dlzdatabase, dns_rdataclass_t rdclass,
|
2016-12-30 15:45:08 +11:00
|
|
|
const dns_name_t *name, dns_db_t **dbp) {
|
2010-12-18 01:56:23 +00:00
|
|
|
isc_result_t result;
|
|
|
|
|
|
|
|
result = dns_sdlzcreateDBP(dlzdatabase->mctx,
|
|
|
|
dlzdatabase->implementation->driverarg,
|
|
|
|
dlzdatabase->dbdata, name, rdclass, dbp);
|
|
|
|
return (result);
|
|
|
|
}
|