/* $NetBSD: catz.c,v 1.1 2024/02/18 20:57:30 christos Exp $ */ /* * Copyright (C) Internet Systems Consortium, Inc. ("ISC") * * SPDX-License-Identifier: MPL-2.0 * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, you can obtain one at https://mozilla.org/MPL/2.0/. * * See the COPYRIGHT file distributed with this work for additional * information regarding copyright ownership. */ /*! \file */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #define DNS_CATZ_ZONE_MAGIC ISC_MAGIC('c', 'a', 't', 'z') #define DNS_CATZ_ZONES_MAGIC ISC_MAGIC('c', 'a', 't', 's') #define DNS_CATZ_ENTRY_MAGIC ISC_MAGIC('c', 'a', 't', 'e') #define DNS_CATZ_ZONE_VALID(catz) ISC_MAGIC_VALID(catz, DNS_CATZ_ZONE_MAGIC) #define DNS_CATZ_ZONES_VALID(catzs) ISC_MAGIC_VALID(catzs, DNS_CATZ_ZONES_MAGIC) #define DNS_CATZ_ENTRY_VALID(entry) ISC_MAGIC_VALID(entry, DNS_CATZ_ENTRY_MAGIC) /*% * Single member zone in a catalog */ struct dns_catz_entry { unsigned int magic; dns_name_t name; dns_catz_options_t opts; isc_refcount_t refs; }; /*% * Catalog zone */ struct dns_catz_zone { unsigned int magic; dns_name_t name; dns_catz_zones_t *catzs; dns_rdata_t soa; /* key in entries is 'mhash', not domain name! */ isc_ht_t *entries; /* * defoptions are taken from named.conf * zoneoptions are global options from zone */ dns_catz_options_t defoptions; dns_catz_options_t zoneoptions; isc_time_t lastupdated; bool updatepending; uint32_t version; dns_db_t *db; dns_dbversion_t *dbversion; isc_timer_t *updatetimer; isc_event_t updateevent; bool active; bool db_registered; isc_refcount_t refs; }; static isc_result_t catz_process_zones_entry(dns_catz_zone_t *zone, dns_rdataset_t *value, dns_label_t *mhash); static isc_result_t catz_process_zones_suboption(dns_catz_zone_t *zone, dns_rdataset_t *value, dns_label_t *mhash, dns_name_t *name); static void catz_entry_add_or_mod(dns_catz_zone_t *target, isc_ht_t *ht, unsigned char *key, size_t keysize, dns_catz_entry_t *nentry, dns_catz_entry_t *oentry, const char *msg, const char *zname, const char *czname); /*% * Collection of catalog zones for a view */ struct dns_catz_zones { unsigned int magic; isc_ht_t *zones; isc_mem_t *mctx; isc_refcount_t refs; isc_mutex_t lock; dns_catz_zonemodmethods_t *zmm; isc_taskmgr_t *taskmgr; isc_timermgr_t *timermgr; dns_view_t *view; isc_task_t *updater; }; void dns_catz_options_init(dns_catz_options_t *options) { REQUIRE(options != NULL); dns_ipkeylist_init(&options->masters); options->allow_query = NULL; options->allow_transfer = NULL; options->allow_query = NULL; options->allow_transfer = NULL; options->in_memory = false; options->min_update_interval = 5; options->zonedir = NULL; } void dns_catz_options_free(dns_catz_options_t *options, isc_mem_t *mctx) { REQUIRE(options != NULL); REQUIRE(mctx != NULL); if (options->masters.count != 0) { dns_ipkeylist_clear(mctx, &options->masters); } if (options->zonedir != NULL) { isc_mem_free(mctx, options->zonedir); options->zonedir = NULL; } if (options->allow_query != NULL) { isc_buffer_free(&options->allow_query); } if (options->allow_transfer != NULL) { isc_buffer_free(&options->allow_transfer); } } isc_result_t dns_catz_options_copy(isc_mem_t *mctx, const dns_catz_options_t *src, dns_catz_options_t *dst) { REQUIRE(mctx != NULL); REQUIRE(src != NULL); REQUIRE(dst != NULL); REQUIRE(dst->masters.count == 0); REQUIRE(dst->allow_query == NULL); REQUIRE(dst->allow_transfer == NULL); if (src->masters.count != 0) { dns_ipkeylist_copy(mctx, &src->masters, &dst->masters); } if (dst->zonedir != NULL) { isc_mem_free(mctx, dst->zonedir); dst->zonedir = NULL; } if (src->zonedir != NULL) { dst->zonedir = isc_mem_strdup(mctx, src->zonedir); } if (src->allow_query != NULL) { isc_buffer_dup(mctx, &dst->allow_query, src->allow_query); } if (src->allow_transfer != NULL) { isc_buffer_dup(mctx, &dst->allow_transfer, src->allow_transfer); } return (ISC_R_SUCCESS); } isc_result_t dns_catz_options_setdefault(isc_mem_t *mctx, const dns_catz_options_t *defaults, dns_catz_options_t *opts) { REQUIRE(mctx != NULL); REQUIRE(defaults != NULL); REQUIRE(opts != NULL); if (opts->masters.count == 0 && defaults->masters.count != 0) { dns_ipkeylist_copy(mctx, &defaults->masters, &opts->masters); } if (defaults->zonedir != NULL) { opts->zonedir = isc_mem_strdup(mctx, defaults->zonedir); } if (opts->allow_query == NULL && defaults->allow_query != NULL) { isc_buffer_dup(mctx, &opts->allow_query, defaults->allow_query); } if (opts->allow_transfer == NULL && defaults->allow_transfer != NULL) { isc_buffer_dup(mctx, &opts->allow_transfer, defaults->allow_transfer); } /* This option is always taken from config, so it's always 'default' */ opts->in_memory = defaults->in_memory; return (ISC_R_SUCCESS); } isc_result_t dns_catz_entry_new(isc_mem_t *mctx, const dns_name_t *domain, dns_catz_entry_t **nentryp) { dns_catz_entry_t *nentry; REQUIRE(mctx != NULL); REQUIRE(nentryp != NULL && *nentryp == NULL); nentry = isc_mem_get(mctx, sizeof(dns_catz_entry_t)); dns_name_init(&nentry->name, NULL); if (domain != NULL) { dns_name_dup(domain, mctx, &nentry->name); } dns_catz_options_init(&nentry->opts); isc_refcount_init(&nentry->refs, 1); nentry->magic = DNS_CATZ_ENTRY_MAGIC; *nentryp = nentry; return (ISC_R_SUCCESS); } dns_name_t * dns_catz_entry_getname(dns_catz_entry_t *entry) { REQUIRE(DNS_CATZ_ENTRY_VALID(entry)); return (&entry->name); } isc_result_t dns_catz_entry_copy(dns_catz_zone_t *zone, const dns_catz_entry_t *entry, dns_catz_entry_t **nentryp) { isc_result_t result; dns_catz_entry_t *nentry = NULL; REQUIRE(DNS_CATZ_ZONE_VALID(zone)); REQUIRE(DNS_CATZ_ENTRY_VALID(entry)); REQUIRE(nentryp != NULL && *nentryp == NULL); result = dns_catz_entry_new(zone->catzs->mctx, &entry->name, &nentry); if (result != ISC_R_SUCCESS) { return (result); } result = dns_catz_options_copy(zone->catzs->mctx, &entry->opts, &nentry->opts); if (result != ISC_R_SUCCESS) { dns_catz_entry_detach(zone, &nentry); } *nentryp = nentry; return (result); } void dns_catz_entry_attach(dns_catz_entry_t *entry, dns_catz_entry_t **entryp) { REQUIRE(DNS_CATZ_ENTRY_VALID(entry)); REQUIRE(entryp != NULL && *entryp == NULL); isc_refcount_increment(&entry->refs); *entryp = entry; } void dns_catz_entry_detach(dns_catz_zone_t *zone, dns_catz_entry_t **entryp) { dns_catz_entry_t *entry; REQUIRE(DNS_CATZ_ZONE_VALID(zone)); REQUIRE(entryp != NULL); entry = *entryp; *entryp = NULL; REQUIRE(DNS_CATZ_ENTRY_VALID(entry)); if (isc_refcount_decrement(&entry->refs) == 1) { isc_mem_t *mctx = zone->catzs->mctx; entry->magic = 0; isc_refcount_destroy(&entry->refs); dns_catz_options_free(&entry->opts, mctx); if (dns_name_dynamic(&entry->name)) { dns_name_free(&entry->name, mctx); } isc_mem_put(mctx, entry, sizeof(dns_catz_entry_t)); } } bool dns_catz_entry_validate(const dns_catz_entry_t *entry) { REQUIRE(DNS_CATZ_ENTRY_VALID(entry)); UNUSED(entry); return (true); } bool dns_catz_entry_cmp(const dns_catz_entry_t *ea, const dns_catz_entry_t *eb) { isc_region_t ra, rb; REQUIRE(DNS_CATZ_ENTRY_VALID(ea)); REQUIRE(DNS_CATZ_ENTRY_VALID(eb)); if (ea == eb) { return (true); } if (ea->opts.masters.count != eb->opts.masters.count) { return (false); } if (memcmp(ea->opts.masters.addrs, eb->opts.masters.addrs, ea->opts.masters.count * sizeof(isc_sockaddr_t))) { return (false); } for (size_t i = 0; i < eb->opts.masters.count; i++) { if ((ea->opts.masters.keys[i] == NULL) != (eb->opts.masters.keys[i] == NULL)) { return (false); } if (ea->opts.masters.keys[i] == NULL) { continue; } if (!dns_name_equal(ea->opts.masters.keys[i], eb->opts.masters.keys[i])) { return (false); } } /* If one is NULL and the other isn't, the entries don't match */ if ((ea->opts.allow_query == NULL) != (eb->opts.allow_query == NULL)) { return (false); } /* If one is non-NULL, then they both are */ if (ea->opts.allow_query != NULL) { isc_buffer_usedregion(ea->opts.allow_query, &ra); isc_buffer_usedregion(eb->opts.allow_query, &rb); if (isc_region_compare(&ra, &rb)) { return (false); } } /* Repeat the above checks with allow_transfer */ if ((ea->opts.allow_transfer == NULL) != (eb->opts.allow_transfer == NULL)) { return (false); } if (ea->opts.allow_transfer != NULL) { isc_buffer_usedregion(ea->opts.allow_transfer, &ra); isc_buffer_usedregion(eb->opts.allow_transfer, &rb); if (isc_region_compare(&ra, &rb)) { return (false); } } /* xxxwpk TODO compare dscps! */ return (true); } dns_name_t * dns_catz_zone_getname(dns_catz_zone_t *zone) { REQUIRE(DNS_CATZ_ZONE_VALID(zone)); return (&zone->name); } dns_catz_options_t * dns_catz_zone_getdefoptions(dns_catz_zone_t *zone) { REQUIRE(DNS_CATZ_ZONE_VALID(zone)); return (&zone->defoptions); } void dns_catz_zone_resetdefoptions(dns_catz_zone_t *zone) { REQUIRE(DNS_CATZ_ZONE_VALID(zone)); dns_catz_options_free(&zone->defoptions, zone->catzs->mctx); dns_catz_options_init(&zone->defoptions); } isc_result_t dns_catz_zones_merge(dns_catz_zone_t *target, dns_catz_zone_t *newzone) { isc_result_t result; isc_ht_iter_t *iter1 = NULL, *iter2 = NULL; isc_ht_iter_t *iteradd = NULL, *itermod = NULL; isc_ht_t *toadd = NULL, *tomod = NULL; bool delcur = false; char czname[DNS_NAME_FORMATSIZE]; char zname[DNS_NAME_FORMATSIZE]; dns_catz_zoneop_fn_t addzone, modzone, delzone; REQUIRE(DNS_CATZ_ZONE_VALID(newzone)); REQUIRE(DNS_CATZ_ZONE_VALID(target)); /* TODO verify the new zone first! */ addzone = target->catzs->zmm->addzone; modzone = target->catzs->zmm->modzone; delzone = target->catzs->zmm->delzone; /* Copy zoneoptions from newzone into target. */ dns_catz_options_free(&target->zoneoptions, target->catzs->mctx); dns_catz_options_copy(target->catzs->mctx, &newzone->zoneoptions, &target->zoneoptions); dns_catz_options_setdefault(target->catzs->mctx, &target->defoptions, &target->zoneoptions); dns_name_format(&target->name, czname, DNS_NAME_FORMATSIZE); isc_ht_init(&toadd, target->catzs->mctx, 16, ISC_HT_CASE_SENSITIVE); isc_ht_init(&tomod, target->catzs->mctx, 16, ISC_HT_CASE_SENSITIVE); isc_ht_iter_create(newzone->entries, &iter1); isc_ht_iter_create(target->entries, &iter2); /* * We can create those iterators now, even though toadd and tomod are * empty */ isc_ht_iter_create(toadd, &iteradd); isc_ht_iter_create(tomod, &itermod); /* * First - walk the new zone and find all nodes that are not in the * old zone, or are in both zones and are modified. */ for (result = isc_ht_iter_first(iter1); result == ISC_R_SUCCESS; result = delcur ? isc_ht_iter_delcurrent_next(iter1) : isc_ht_iter_next(iter1)) { dns_catz_entry_t *nentry = NULL; dns_catz_entry_t *oentry = NULL; dns_zone_t *zone = NULL; unsigned char *key = NULL; size_t keysize; delcur = false; isc_ht_iter_current(iter1, (void **)&nentry); isc_ht_iter_currentkey(iter1, &key, &keysize); /* * Spurious record that came from suboption without main * record, removed. * xxxwpk: make it a separate verification phase? */ if (dns_name_countlabels(&nentry->name) == 0) { dns_catz_entry_detach(newzone, &nentry); delcur = true; continue; } dns_name_format(&nentry->name, zname, DNS_NAME_FORMATSIZE); isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_DEBUG(3), "catz: iterating over '%s' from catalog '%s'", zname, czname); dns_catz_options_setdefault(target->catzs->mctx, &target->zoneoptions, &nentry->opts); result = isc_ht_find(target->entries, key, (uint32_t)keysize, (void **)&oentry); if (result != ISC_R_SUCCESS) { catz_entry_add_or_mod(target, toadd, key, keysize, nentry, NULL, "adding", zname, czname); continue; } result = dns_zt_find(target->catzs->view->zonetable, dns_catz_entry_getname(nentry), 0, NULL, &zone); if (result != ISC_R_SUCCESS) { isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_DEBUG(3), "catz: zone '%s' was expected to exist " "but can not be found, will be restored", zname); catz_entry_add_or_mod(target, toadd, key, keysize, nentry, oentry, "adding", zname, czname); continue; } dns_zone_detach(&zone); if (dns_catz_entry_cmp(oentry, nentry) != true) { catz_entry_add_or_mod(target, tomod, key, keysize, nentry, oentry, "modifying", zname, czname); continue; } /* * Delete the old entry so that it won't accidentally be * removed as a non-existing entry below. */ dns_catz_entry_detach(target, &oentry); result = isc_ht_delete(target->entries, key, (uint32_t)keysize); RUNTIME_CHECK(result == ISC_R_SUCCESS); } RUNTIME_CHECK(result == ISC_R_NOMORE); isc_ht_iter_destroy(&iter1); /* * Then - walk the old zone; only deleted entries should remain. */ for (result = isc_ht_iter_first(iter2); result == ISC_R_SUCCESS; result = isc_ht_iter_delcurrent_next(iter2)) { dns_catz_entry_t *entry = NULL; isc_ht_iter_current(iter2, (void **)&entry); dns_name_format(&entry->name, zname, DNS_NAME_FORMATSIZE); result = delzone(entry, target, target->catzs->view, target->catzs->taskmgr, target->catzs->zmm->udata); isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_INFO, "catz: deleting zone '%s' from catalog '%s' - %s", zname, czname, isc_result_totext(result)); dns_catz_entry_detach(target, &entry); } RUNTIME_CHECK(result == ISC_R_NOMORE); isc_ht_iter_destroy(&iter2); /* At this moment target->entries has to be be empty. */ INSIST(isc_ht_count(target->entries) == 0); isc_ht_destroy(&target->entries); for (result = isc_ht_iter_first(iteradd); result == ISC_R_SUCCESS; result = isc_ht_iter_delcurrent_next(iteradd)) { dns_catz_entry_t *entry = NULL; isc_ht_iter_current(iteradd, (void **)&entry); dns_name_format(&entry->name, zname, DNS_NAME_FORMATSIZE); result = addzone(entry, target, target->catzs->view, target->catzs->taskmgr, target->catzs->zmm->udata); isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_INFO, "catz: adding zone '%s' from catalog " "'%s' - %s", zname, czname, isc_result_totext(result)); } for (result = isc_ht_iter_first(itermod); result == ISC_R_SUCCESS; result = isc_ht_iter_delcurrent_next(itermod)) { dns_catz_entry_t *entry = NULL; isc_ht_iter_current(itermod, (void **)&entry); dns_name_format(&entry->name, zname, DNS_NAME_FORMATSIZE); result = modzone(entry, target, target->catzs->view, target->catzs->taskmgr, target->catzs->zmm->udata); isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_INFO, "catz: modifying zone '%s' from catalog " "'%s' - %s", zname, czname, isc_result_totext(result)); } target->entries = newzone->entries; newzone->entries = NULL; result = ISC_R_SUCCESS; isc_ht_iter_destroy(&iteradd); isc_ht_iter_destroy(&itermod); isc_ht_destroy(&toadd); isc_ht_destroy(&tomod); return (result); } isc_result_t dns_catz_new_zones(dns_catz_zones_t **catzsp, dns_catz_zonemodmethods_t *zmm, isc_mem_t *mctx, isc_taskmgr_t *taskmgr, isc_timermgr_t *timermgr) { dns_catz_zones_t *new_zones; isc_result_t result; REQUIRE(catzsp != NULL && *catzsp == NULL); REQUIRE(zmm != NULL); new_zones = isc_mem_get(mctx, sizeof(*new_zones)); memset(new_zones, 0, sizeof(*new_zones)); isc_mutex_init(&new_zones->lock); isc_refcount_init(&new_zones->refs, 1); isc_ht_init(&new_zones->zones, mctx, 4, ISC_HT_CASE_SENSITIVE); isc_mem_attach(mctx, &new_zones->mctx); new_zones->zmm = zmm; new_zones->timermgr = timermgr; new_zones->taskmgr = taskmgr; result = isc_task_create(taskmgr, 0, &new_zones->updater); if (result != ISC_R_SUCCESS) { goto cleanup_ht; } new_zones->magic = DNS_CATZ_ZONES_MAGIC; *catzsp = new_zones; return (ISC_R_SUCCESS); cleanup_ht: isc_ht_destroy(&new_zones->zones); isc_refcount_destroy(&new_zones->refs); isc_mutex_destroy(&new_zones->lock); isc_mem_putanddetach(&new_zones->mctx, new_zones, sizeof(*new_zones)); return (result); } void dns_catz_catzs_set_view(dns_catz_zones_t *catzs, dns_view_t *view) { REQUIRE(DNS_CATZ_ZONES_VALID(catzs)); REQUIRE(DNS_VIEW_VALID(view)); /* Either it's a new one or it's being reconfigured. */ REQUIRE(catzs->view == NULL || !strcmp(catzs->view->name, view->name)); catzs->view = view; } isc_result_t dns_catz_new_zone(dns_catz_zones_t *catzs, dns_catz_zone_t **zonep, const dns_name_t *name) { isc_result_t result; dns_catz_zone_t *new_zone; REQUIRE(DNS_CATZ_ZONES_VALID(catzs)); REQUIRE(zonep != NULL && *zonep == NULL); REQUIRE(ISC_MAGIC_VALID(name, DNS_NAME_MAGIC)); new_zone = isc_mem_get(catzs->mctx, sizeof(*new_zone)); memset(new_zone, 0, sizeof(*new_zone)); dns_name_init(&new_zone->name, NULL); dns_name_dup(name, catzs->mctx, &new_zone->name); isc_ht_init(&new_zone->entries, catzs->mctx, 16, ISC_HT_CASE_SENSITIVE); new_zone->updatetimer = NULL; result = isc_timer_create(catzs->timermgr, isc_timertype_inactive, NULL, NULL, catzs->updater, dns_catz_update_taskaction, new_zone, &new_zone->updatetimer); if (result != ISC_R_SUCCESS) { goto cleanup_ht; } isc_time_settoepoch(&new_zone->lastupdated); new_zone->updatepending = false; new_zone->db = NULL; new_zone->dbversion = NULL; new_zone->catzs = catzs; dns_catz_options_init(&new_zone->defoptions); dns_catz_options_init(&new_zone->zoneoptions); new_zone->active = true; new_zone->db_registered = false; new_zone->version = (uint32_t)(-1); isc_refcount_init(&new_zone->refs, 1); new_zone->magic = DNS_CATZ_ZONE_MAGIC; *zonep = new_zone; return (ISC_R_SUCCESS); cleanup_ht: isc_ht_destroy(&new_zone->entries); dns_name_free(&new_zone->name, catzs->mctx); isc_mem_put(catzs->mctx, new_zone, sizeof(*new_zone)); return (result); } isc_result_t dns_catz_add_zone(dns_catz_zones_t *catzs, const dns_name_t *name, dns_catz_zone_t **zonep) { dns_catz_zone_t *new_zone = NULL; isc_result_t result, tresult; char zname[DNS_NAME_FORMATSIZE]; REQUIRE(DNS_CATZ_ZONES_VALID(catzs)); REQUIRE(ISC_MAGIC_VALID(name, DNS_NAME_MAGIC)); REQUIRE(zonep != NULL && *zonep == NULL); dns_name_format(name, zname, DNS_NAME_FORMATSIZE); isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_DEBUG(3), "catz: dns_catz_add_zone %s", zname); LOCK(&catzs->lock); result = dns_catz_new_zone(catzs, &new_zone, name); if (result != ISC_R_SUCCESS) { goto cleanup; } result = isc_ht_add(catzs->zones, new_zone->name.ndata, new_zone->name.length, new_zone); if (result != ISC_R_SUCCESS) { dns_catz_zone_detach(&new_zone); if (result != ISC_R_EXISTS) { goto cleanup; } } if (result == ISC_R_EXISTS) { tresult = isc_ht_find(catzs->zones, name->ndata, name->length, (void **)&new_zone); INSIST(tresult == ISC_R_SUCCESS && !new_zone->active); new_zone->active = true; } *zonep = new_zone; cleanup: UNLOCK(&catzs->lock); return (result); } dns_catz_zone_t * dns_catz_get_zone(dns_catz_zones_t *catzs, const dns_name_t *name) { isc_result_t result; dns_catz_zone_t *found = NULL; REQUIRE(DNS_CATZ_ZONES_VALID(catzs)); REQUIRE(ISC_MAGIC_VALID(name, DNS_NAME_MAGIC)); LOCK(&catzs->lock); result = isc_ht_find(catzs->zones, name->ndata, name->length, (void **)&found); UNLOCK(&catzs->lock); if (result != ISC_R_SUCCESS) { return (NULL); } return (found); } void dns_catz_catzs_attach(dns_catz_zones_t *catzs, dns_catz_zones_t **catzsp) { REQUIRE(DNS_CATZ_ZONES_VALID(catzs)); REQUIRE(catzsp != NULL && *catzsp == NULL); isc_refcount_increment(&catzs->refs); *catzsp = catzs; } void dns_catz_zone_attach(dns_catz_zone_t *zone, dns_catz_zone_t **zonep) { REQUIRE(zonep != NULL && *zonep == NULL); isc_refcount_increment(&zone->refs); *zonep = zone; } void dns_catz_zone_detach(dns_catz_zone_t **zonep) { REQUIRE(zonep != NULL && *zonep != NULL); dns_catz_zone_t *zone = *zonep; *zonep = NULL; if (isc_refcount_decrement(&zone->refs) == 1) { isc_mem_t *mctx = zone->catzs->mctx; isc_refcount_destroy(&zone->refs); if (zone->entries != NULL) { isc_ht_iter_t *iter = NULL; isc_result_t result; isc_ht_iter_create(zone->entries, &iter); for (result = isc_ht_iter_first(iter); result == ISC_R_SUCCESS; result = isc_ht_iter_delcurrent_next(iter)) { dns_catz_entry_t *entry = NULL; isc_ht_iter_current(iter, (void **)&entry); dns_catz_entry_detach(zone, &entry); } INSIST(result == ISC_R_NOMORE); isc_ht_iter_destroy(&iter); /* The hashtable has to be empty now. */ INSIST(isc_ht_count(zone->entries) == 0); isc_ht_destroy(&zone->entries); } zone->magic = 0; isc_timer_destroy(&zone->updatetimer); if (zone->db_registered) { dns_db_updatenotify_unregister( zone->db, dns_catz_dbupdate_callback, zone->catzs); } if (zone->dbversion) { dns_db_closeversion(zone->db, &zone->dbversion, false); } if (zone->db != NULL) { dns_db_detach(&zone->db); } dns_name_free(&zone->name, mctx); dns_catz_options_free(&zone->defoptions, mctx); dns_catz_options_free(&zone->zoneoptions, mctx); zone->catzs = NULL; isc_mem_put(mctx, zone, sizeof(dns_catz_zone_t)); } } void dns_catz_catzs_detach(dns_catz_zones_t **catzsp) { dns_catz_zones_t *catzs; REQUIRE(catzsp != NULL && DNS_CATZ_ZONES_VALID(*catzsp)); catzs = *catzsp; *catzsp = NULL; if (isc_refcount_decrement(&catzs->refs) == 1) { catzs->magic = 0; isc_task_destroy(&catzs->updater); isc_mutex_destroy(&catzs->lock); if (catzs->zones != NULL) { isc_ht_iter_t *iter = NULL; isc_result_t result; isc_ht_iter_create(catzs->zones, &iter); for (result = isc_ht_iter_first(iter); result == ISC_R_SUCCESS;) { dns_catz_zone_t *zone = NULL; isc_ht_iter_current(iter, (void **)&zone); result = isc_ht_iter_delcurrent_next(iter); dns_catz_zone_detach(&zone); } INSIST(result == ISC_R_NOMORE); isc_ht_iter_destroy(&iter); INSIST(isc_ht_count(catzs->zones) == 0); isc_ht_destroy(&catzs->zones); } isc_refcount_destroy(&catzs->refs); isc_mem_putanddetach(&catzs->mctx, catzs, sizeof(*catzs)); } } typedef enum { CATZ_OPT_NONE, CATZ_OPT_ZONES, CATZ_OPT_MASTERS, CATZ_OPT_ALLOW_QUERY, CATZ_OPT_ALLOW_TRANSFER, CATZ_OPT_VERSION, } catz_opt_t; static bool catz_opt_cmp(const dns_label_t *option, const char *opt) { unsigned int l = strlen(opt); if (option->length - 1 == l && memcmp(opt, option->base + 1, l - 1) == 0) { return (true); } else { return (false); } } static catz_opt_t catz_get_option(const dns_label_t *option) { if (catz_opt_cmp(option, "zones")) { return (CATZ_OPT_ZONES); } else if (catz_opt_cmp(option, "masters")) { return (CATZ_OPT_MASTERS); } else if (catz_opt_cmp(option, "allow-query")) { return (CATZ_OPT_ALLOW_QUERY); } else if (catz_opt_cmp(option, "allow-transfer")) { return (CATZ_OPT_ALLOW_TRANSFER); } else if (catz_opt_cmp(option, "version")) { return (CATZ_OPT_VERSION); } else { return (CATZ_OPT_NONE); } } static isc_result_t catz_process_zones(dns_catz_zone_t *zone, dns_rdataset_t *value, dns_name_t *name) { dns_label_t mhash; dns_name_t opt; REQUIRE(DNS_CATZ_ZONE_VALID(zone)); REQUIRE(DNS_RDATASET_VALID(value)); REQUIRE(ISC_MAGIC_VALID(name, DNS_NAME_MAGIC)); if (value->rdclass != dns_rdataclass_in) { return (ISC_R_FAILURE); } if (name->labels == 0) { return (ISC_R_FAILURE); } dns_name_getlabel(name, name->labels - 1, &mhash); if (name->labels == 1) { return (catz_process_zones_entry(zone, value, &mhash)); } else { dns_name_init(&opt, NULL); dns_name_split(name, 1, &opt, NULL); return (catz_process_zones_suboption(zone, value, &mhash, &opt)); } } static isc_result_t catz_process_zones_entry(dns_catz_zone_t *zone, dns_rdataset_t *value, dns_label_t *mhash) { isc_result_t result; dns_rdata_t rdata; dns_rdata_ptr_t ptr; dns_catz_entry_t *entry = NULL; /* * We only take -first- value, as mhash must be * different. */ if (value->type != dns_rdatatype_ptr) { return (ISC_R_FAILURE); } result = dns_rdataset_first(value); if (result != ISC_R_SUCCESS) { return (ISC_R_FAILURE); } dns_rdata_init(&rdata); dns_rdataset_current(value, &rdata); result = dns_rdata_tostruct(&rdata, &ptr, NULL); RUNTIME_CHECK(result == ISC_R_SUCCESS); result = isc_ht_find(zone->entries, mhash->base, mhash->length, (void **)&entry); if (result == ISC_R_SUCCESS) { if (dns_name_countlabels(&entry->name) != 0) { /* We have a duplicate. */ dns_rdata_freestruct(&ptr); return (ISC_R_FAILURE); } else { dns_name_dup(&ptr.ptr, zone->catzs->mctx, &entry->name); } } else { result = dns_catz_entry_new(zone->catzs->mctx, &ptr.ptr, &entry); if (result != ISC_R_SUCCESS) { dns_rdata_freestruct(&ptr); return (result); } result = isc_ht_add(zone->entries, mhash->base, mhash->length, entry); if (result != ISC_R_SUCCESS) { dns_rdata_freestruct(&ptr); dns_catz_entry_detach(zone, &entry); return (result); } } dns_rdata_freestruct(&ptr); return (ISC_R_SUCCESS); } static isc_result_t catz_process_version(dns_catz_zone_t *zone, dns_rdataset_t *value) { isc_result_t result; dns_rdata_t rdata; dns_rdata_txt_t rdatatxt; dns_rdata_txt_string_t rdatastr; uint32_t tversion; char t[16]; REQUIRE(DNS_CATZ_ZONE_VALID(zone)); REQUIRE(DNS_RDATASET_VALID(value)); if (value->rdclass != dns_rdataclass_in || value->type != dns_rdatatype_txt) { return (ISC_R_FAILURE); } result = dns_rdataset_first(value); if (result != ISC_R_SUCCESS) { return (result); } dns_rdata_init(&rdata); dns_rdataset_current(value, &rdata); result = dns_rdata_tostruct(&rdata, &rdatatxt, NULL); RUNTIME_CHECK(result == ISC_R_SUCCESS); result = dns_rdata_txt_first(&rdatatxt); if (result != ISC_R_SUCCESS) { goto cleanup; } result = dns_rdata_txt_current(&rdatatxt, &rdatastr); if (result != ISC_R_SUCCESS) { goto cleanup; } result = dns_rdata_txt_next(&rdatatxt); if (result != ISC_R_NOMORE) { result = ISC_R_FAILURE; goto cleanup; } if (rdatastr.length > 15) { result = ISC_R_BADNUMBER; goto cleanup; } memmove(t, rdatastr.data, rdatastr.length); t[rdatastr.length] = 0; result = isc_parse_uint32(&tversion, t, 10); if (result != ISC_R_SUCCESS) { goto cleanup; } zone->version = tversion; result = ISC_R_SUCCESS; cleanup: dns_rdata_freestruct(&rdatatxt); return (result); } static isc_result_t catz_process_masters(dns_catz_zone_t *zone, dns_ipkeylist_t *ipkl, dns_rdataset_t *value, dns_name_t *name) { isc_result_t result; dns_rdata_t rdata; dns_rdata_in_a_t rdata_a; dns_rdata_in_aaaa_t rdata_aaaa; dns_rdata_txt_t rdata_txt; dns_rdata_txt_string_t rdatastr; dns_name_t *keyname = NULL; isc_mem_t *mctx; char keycbuf[DNS_NAME_FORMATSIZE]; isc_buffer_t keybuf; unsigned int rcount; unsigned int i; REQUIRE(DNS_CATZ_ZONE_VALID(zone)); REQUIRE(ipkl != NULL); REQUIRE(DNS_RDATASET_VALID(value)); REQUIRE(dns_rdataset_isassociated(value)); REQUIRE(ISC_MAGIC_VALID(name, DNS_NAME_MAGIC)); mctx = zone->catzs->mctx; memset(&rdata_a, 0, sizeof(rdata_a)); memset(&rdata_aaaa, 0, sizeof(rdata_aaaa)); memset(&rdata_txt, 0, sizeof(rdata_txt)); isc_buffer_init(&keybuf, keycbuf, sizeof(keycbuf)); /* * We have three possibilities here: * - either empty name and IN A/IN AAAA record * - label and IN A/IN AAAA * - label and IN TXT - TSIG key name */ if (value->rdclass != dns_rdataclass_in) { return (ISC_R_FAILURE); } if (name->labels > 0) { isc_sockaddr_t sockaddr; /* * We're pre-preparing the data once, we'll put it into * the right spot in the masters array once we find it. */ result = dns_rdataset_first(value); RUNTIME_CHECK(result == ISC_R_SUCCESS); dns_rdata_init(&rdata); dns_rdataset_current(value, &rdata); switch (value->type) { case dns_rdatatype_a: result = dns_rdata_tostruct(&rdata, &rdata_a, NULL); RUNTIME_CHECK(result == ISC_R_SUCCESS); isc_sockaddr_fromin(&sockaddr, &rdata_a.in_addr, 0); break; case dns_rdatatype_aaaa: result = dns_rdata_tostruct(&rdata, &rdata_aaaa, NULL); RUNTIME_CHECK(result == ISC_R_SUCCESS); isc_sockaddr_fromin6(&sockaddr, &rdata_aaaa.in6_addr, 0); break; case dns_rdatatype_txt: result = dns_rdata_tostruct(&rdata, &rdata_txt, NULL); RUNTIME_CHECK(result == ISC_R_SUCCESS); result = dns_rdata_txt_first(&rdata_txt); if (result != ISC_R_SUCCESS) { return (result); } result = dns_rdata_txt_current(&rdata_txt, &rdatastr); if (result != ISC_R_SUCCESS) { return (result); } result = dns_rdata_txt_next(&rdata_txt); if (result != ISC_R_NOMORE) { return (ISC_R_FAILURE); } /* rdatastr.length < DNS_NAME_MAXTEXT */ keyname = isc_mem_get(mctx, sizeof(dns_name_t)); dns_name_init(keyname, 0); memmove(keycbuf, rdatastr.data, rdatastr.length); keycbuf[rdatastr.length] = 0; result = dns_name_fromstring(keyname, keycbuf, 0, mctx); if (result != ISC_R_SUCCESS) { dns_name_free(keyname, mctx); isc_mem_put(mctx, keyname, sizeof(dns_name_t)); return (result); } break; default: return (ISC_R_FAILURE); } /* * We have to find the appropriate labeled record in masters * if it exists. * In common case we'll have no more than 3-4 records here so * no optimization. */ for (i = 0; i < ipkl->count; i++) { if (ipkl->labels[i] != NULL && !dns_name_compare(name, ipkl->labels[i])) { break; } } if (i < ipkl->count) { /* we have this record already */ if (value->type == dns_rdatatype_txt) { ipkl->keys[i] = keyname; } else { /* A/AAAA */ memmove(&ipkl->addrs[i], &sockaddr, sizeof(isc_sockaddr_t)); } } else { result = dns_ipkeylist_resize(mctx, ipkl, i + 1); if (result != ISC_R_SUCCESS) { return (result); } ipkl->labels[i] = isc_mem_get(mctx, sizeof(dns_name_t)); dns_name_init(ipkl->labels[i], NULL); dns_name_dup(name, mctx, ipkl->labels[i]); if (value->type == dns_rdatatype_txt) { ipkl->keys[i] = keyname; } else { /* A/AAAA */ memmove(&ipkl->addrs[i], &sockaddr, sizeof(isc_sockaddr_t)); } ipkl->count++; } return (ISC_R_SUCCESS); } /* else - 'simple' case - without labels */ if (value->type != dns_rdatatype_a && value->type != dns_rdatatype_aaaa) { return (ISC_R_FAILURE); } rcount = dns_rdataset_count(value) + ipkl->count; result = dns_ipkeylist_resize(mctx, ipkl, rcount); if (result != ISC_R_SUCCESS) { return (result); } for (result = dns_rdataset_first(value); result == ISC_R_SUCCESS; result = dns_rdataset_next(value)) { dns_rdata_init(&rdata); dns_rdataset_current(value, &rdata); /* * port 0 == take the default */ if (value->type == dns_rdatatype_a) { result = dns_rdata_tostruct(&rdata, &rdata_a, NULL); RUNTIME_CHECK(result == ISC_R_SUCCESS); isc_sockaddr_fromin(&ipkl->addrs[ipkl->count], &rdata_a.in_addr, 0); } else { result = dns_rdata_tostruct(&rdata, &rdata_aaaa, NULL); RUNTIME_CHECK(result == ISC_R_SUCCESS); isc_sockaddr_fromin6(&ipkl->addrs[ipkl->count], &rdata_aaaa.in6_addr, 0); } ipkl->keys[ipkl->count] = NULL; ipkl->labels[ipkl->count] = NULL; ipkl->count++; dns_rdata_freestruct(&rdata_a); } return (ISC_R_SUCCESS); } static isc_result_t catz_process_apl(dns_catz_zone_t *zone, isc_buffer_t **aclbp, dns_rdataset_t *value) { isc_result_t result = ISC_R_SUCCESS; dns_rdata_t rdata; dns_rdata_in_apl_t rdata_apl; dns_rdata_apl_ent_t apl_ent; isc_netaddr_t addr; isc_buffer_t *aclb = NULL; unsigned char buf[256]; /* larger than INET6_ADDRSTRLEN */ REQUIRE(DNS_CATZ_ZONE_VALID(zone)); REQUIRE(aclbp != NULL); REQUIRE(*aclbp == NULL); REQUIRE(DNS_RDATASET_VALID(value)); REQUIRE(dns_rdataset_isassociated(value)); if (value->rdclass != dns_rdataclass_in || value->type != dns_rdatatype_apl) { return (ISC_R_FAILURE); } if (dns_rdataset_count(value) > 1) { isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_WARNING, "catz: more than one APL entry for member zone, " "result is undefined"); } result = dns_rdataset_first(value); RUNTIME_CHECK(result == ISC_R_SUCCESS); dns_rdata_init(&rdata); dns_rdataset_current(value, &rdata); result = dns_rdata_tostruct(&rdata, &rdata_apl, zone->catzs->mctx); if (result != ISC_R_SUCCESS) { return (result); } isc_buffer_allocate(zone->catzs->mctx, &aclb, 16); isc_buffer_setautorealloc(aclb, true); for (result = dns_rdata_apl_first(&rdata_apl); result == ISC_R_SUCCESS; result = dns_rdata_apl_next(&rdata_apl)) { result = dns_rdata_apl_current(&rdata_apl, &apl_ent); RUNTIME_CHECK(result == ISC_R_SUCCESS); memset(buf, 0, sizeof(buf)); if (apl_ent.data != NULL && apl_ent.length > 0) { memmove(buf, apl_ent.data, apl_ent.length); } if (apl_ent.family == 1) { isc_netaddr_fromin(&addr, (struct in_addr *)buf); } else if (apl_ent.family == 2) { isc_netaddr_fromin6(&addr, (struct in6_addr *)buf); } else { continue; /* xxxwpk log it or simply ignore? */ } if (apl_ent.negative) { isc_buffer_putuint8(aclb, '!'); } isc_buffer_reserve(&aclb, INET6_ADDRSTRLEN); result = isc_netaddr_totext(&addr, aclb); RUNTIME_CHECK(result == ISC_R_SUCCESS); if ((apl_ent.family == 1 && apl_ent.prefix < 32) || (apl_ent.family == 2 && apl_ent.prefix < 128)) { isc_buffer_putuint8(aclb, '/'); isc_buffer_putdecint(aclb, apl_ent.prefix); } isc_buffer_putstr(aclb, "; "); } if (result == ISC_R_NOMORE) { result = ISC_R_SUCCESS; } else { goto cleanup; } *aclbp = aclb; aclb = NULL; cleanup: if (aclb != NULL) { isc_buffer_free(&aclb); } dns_rdata_freestruct(&rdata_apl); return (result); } static isc_result_t catz_process_zones_suboption(dns_catz_zone_t *zone, dns_rdataset_t *value, dns_label_t *mhash, dns_name_t *name) { isc_result_t result; dns_catz_entry_t *entry = NULL; dns_label_t option; dns_name_t prefix; catz_opt_t opt; REQUIRE(DNS_CATZ_ZONE_VALID(zone)); REQUIRE(mhash != NULL); REQUIRE(DNS_RDATASET_VALID(value)); REQUIRE(ISC_MAGIC_VALID(name, DNS_NAME_MAGIC)); if (name->labels == 0) { return (ISC_R_FAILURE); } dns_name_getlabel(name, name->labels - 1, &option); opt = catz_get_option(&option); /* * We're adding this entry now, in case the option is invalid we'll get * rid of it in verification phase. */ result = isc_ht_find(zone->entries, mhash->base, mhash->length, (void **)&entry); if (result != ISC_R_SUCCESS) { result = dns_catz_entry_new(zone->catzs->mctx, NULL, &entry); if (result != ISC_R_SUCCESS) { return (result); } result = isc_ht_add(zone->entries, mhash->base, mhash->length, entry); if (result != ISC_R_SUCCESS) { dns_catz_entry_detach(zone, &entry); return (result); } } dns_name_init(&prefix, NULL); dns_name_split(name, 1, &prefix, NULL); switch (opt) { case CATZ_OPT_MASTERS: return (catz_process_masters(zone, &entry->opts.masters, value, &prefix)); case CATZ_OPT_ALLOW_QUERY: if (prefix.labels != 0) { return (ISC_R_FAILURE); } return (catz_process_apl(zone, &entry->opts.allow_query, value)); case CATZ_OPT_ALLOW_TRANSFER: if (prefix.labels != 0) { return (ISC_R_FAILURE); } return (catz_process_apl(zone, &entry->opts.allow_transfer, value)); default: return (ISC_R_FAILURE); } return (ISC_R_FAILURE); } static void catz_entry_add_or_mod(dns_catz_zone_t *target, isc_ht_t *ht, unsigned char *key, size_t keysize, dns_catz_entry_t *nentry, dns_catz_entry_t *oentry, const char *msg, const char *zname, const char *czname) { isc_result_t result = isc_ht_add(ht, key, (uint32_t)keysize, nentry); if (result != ISC_R_SUCCESS) { isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, "catz: error %s zone '%s' from catalog '%s' - %s", msg, zname, czname, isc_result_totext(result)); } if (oentry != NULL) { dns_catz_entry_detach(target, &oentry); result = isc_ht_delete(target->entries, key, (uint32_t)keysize); RUNTIME_CHECK(result == ISC_R_SUCCESS); } } static isc_result_t catz_process_value(dns_catz_zone_t *zone, dns_name_t *name, dns_rdataset_t *rdataset) { dns_label_t option; dns_name_t prefix; catz_opt_t opt; REQUIRE(DNS_CATZ_ZONE_VALID(zone)); REQUIRE(ISC_MAGIC_VALID(name, DNS_NAME_MAGIC)); REQUIRE(DNS_RDATASET_VALID(rdataset)); dns_name_getlabel(name, name->labels - 1, &option); opt = catz_get_option(&option); dns_name_init(&prefix, NULL); dns_name_split(name, 1, &prefix, NULL); switch (opt) { case CATZ_OPT_ZONES: return (catz_process_zones(zone, rdataset, &prefix)); case CATZ_OPT_MASTERS: return (catz_process_masters(zone, &zone->zoneoptions.masters, rdataset, &prefix)); case CATZ_OPT_ALLOW_QUERY: if (prefix.labels != 0) { return (ISC_R_FAILURE); } return (catz_process_apl(zone, &zone->zoneoptions.allow_query, rdataset)); case CATZ_OPT_ALLOW_TRANSFER: if (prefix.labels != 0) { return (ISC_R_FAILURE); } return (catz_process_apl( zone, &zone->zoneoptions.allow_transfer, rdataset)); case CATZ_OPT_VERSION: if (prefix.labels != 0) { return (ISC_R_FAILURE); } return (catz_process_version(zone, rdataset)); default: return (ISC_R_FAILURE); } } isc_result_t dns_catz_update_process(dns_catz_zones_t *catzs, dns_catz_zone_t *zone, const dns_name_t *src_name, dns_rdataset_t *rdataset) { isc_result_t result; int order; unsigned int nlabels; dns_namereln_t nrres; dns_rdata_t rdata = DNS_RDATA_INIT; dns_rdata_soa_t soa; dns_name_t prefix; REQUIRE(DNS_CATZ_ZONES_VALID(catzs)); REQUIRE(DNS_CATZ_ZONE_VALID(zone)); REQUIRE(ISC_MAGIC_VALID(src_name, DNS_NAME_MAGIC)); nrres = dns_name_fullcompare(src_name, &zone->name, &order, &nlabels); if (nrres == dns_namereln_equal) { if (rdataset->type == dns_rdatatype_soa) { result = dns_rdataset_first(rdataset); if (result != ISC_R_SUCCESS) { return (result); } dns_rdataset_current(rdataset, &rdata); result = dns_rdata_tostruct(&rdata, &soa, NULL); RUNTIME_CHECK(result == ISC_R_SUCCESS); /* * xxxwpk TODO do we want to save something from SOA? */ return (result); } else if (rdataset->type == dns_rdatatype_ns) { return (ISC_R_SUCCESS); } else { return (ISC_R_UNEXPECTED); } } else if (nrres != dns_namereln_subdomain) { return (ISC_R_UNEXPECTED); } dns_name_init(&prefix, NULL); dns_name_split(src_name, zone->name.labels, &prefix, NULL); result = catz_process_value(zone, &prefix, rdataset); return (result); } static isc_result_t digest2hex(unsigned char *digest, unsigned int digestlen, char *hash, size_t hashlen) { unsigned int i; int ret; for (i = 0; i < digestlen; i++) { size_t left = hashlen - i * 2; ret = snprintf(hash + i * 2, left, "%02x", digest[i]); if (ret < 0 || (size_t)ret >= left) { return (ISC_R_NOSPACE); } } return (ISC_R_SUCCESS); } isc_result_t dns_catz_generate_masterfilename(dns_catz_zone_t *zone, dns_catz_entry_t *entry, isc_buffer_t **buffer) { isc_buffer_t *tbuf = NULL; isc_region_t r; isc_result_t result; size_t rlen; bool special = false; REQUIRE(DNS_CATZ_ZONE_VALID(zone)); REQUIRE(DNS_CATZ_ENTRY_VALID(entry)); REQUIRE(buffer != NULL && *buffer != NULL); isc_buffer_allocate(zone->catzs->mctx, &tbuf, strlen(zone->catzs->view->name) + 2 * DNS_NAME_FORMATSIZE + 2); isc_buffer_putstr(tbuf, zone->catzs->view->name); isc_buffer_putstr(tbuf, "_"); result = dns_name_totext(&zone->name, true, tbuf); if (result != ISC_R_SUCCESS) { goto cleanup; } isc_buffer_putstr(tbuf, "_"); result = dns_name_totext(&entry->name, true, tbuf); if (result != ISC_R_SUCCESS) { goto cleanup; } /* * Search for slash and other special characters in the view and * zone names. Add a null terminator so we can use strpbrk(), then * remove it. */ isc_buffer_putuint8(tbuf, 0); if (strpbrk(isc_buffer_base(tbuf), "\\/:") != NULL) { special = true; } isc_buffer_subtract(tbuf, 1); /* __catz__.db */ rlen = (isc_md_type_get_size(ISC_MD_SHA256) * 2 + 1) + 12; /* optionally prepend with / */ if (entry->opts.zonedir != NULL) { rlen += strlen(entry->opts.zonedir) + 1; } result = isc_buffer_reserve(buffer, (unsigned int)rlen); if (result != ISC_R_SUCCESS) { goto cleanup; } if (entry->opts.zonedir != NULL) { isc_buffer_putstr(*buffer, entry->opts.zonedir); isc_buffer_putstr(*buffer, "/"); } isc_buffer_usedregion(tbuf, &r); isc_buffer_putstr(*buffer, "__catz__"); if (special || tbuf->used > ISC_SHA256_DIGESTLENGTH * 2 + 1) { unsigned char digest[ISC_MAX_MD_SIZE]; unsigned int digestlen; /* we can do that because digest string < 2 * DNS_NAME */ result = isc_md(ISC_MD_SHA256, r.base, r.length, digest, &digestlen); if (result != ISC_R_SUCCESS) { goto cleanup; } result = digest2hex(digest, digestlen, (char *)r.base, ISC_SHA256_DIGESTLENGTH * 2 + 1); if (result != ISC_R_SUCCESS) { goto cleanup; } isc_buffer_putstr(*buffer, (char *)r.base); } else { isc_buffer_copyregion(*buffer, &r); } isc_buffer_putstr(*buffer, ".db"); result = ISC_R_SUCCESS; cleanup: isc_buffer_free(&tbuf); return (result); } isc_result_t dns_catz_generate_zonecfg(dns_catz_zone_t *zone, dns_catz_entry_t *entry, isc_buffer_t **buf) { /* * We have to generate a text buffer with regular zone config: * zone "foo.bar" { * type slave; * masters [ dscp X ] { ip1 port port1; ip2 port port2; }; * } */ isc_buffer_t *buffer = NULL; isc_region_t region; isc_result_t result; uint32_t i; isc_netaddr_t netaddr; char pbuf[sizeof("65535")]; /* used both for port number and DSCP */ char zname[DNS_NAME_FORMATSIZE]; REQUIRE(DNS_CATZ_ZONE_VALID(zone)); REQUIRE(DNS_CATZ_ENTRY_VALID(entry)); REQUIRE(buf != NULL && *buf == NULL); /* * The buffer will be reallocated if something won't fit, * ISC_BUFFER_INCR seems like a good start. */ isc_buffer_allocate(zone->catzs->mctx, &buffer, ISC_BUFFER_INCR); isc_buffer_setautorealloc(buffer, true); isc_buffer_putstr(buffer, "zone \""); dns_name_totext(&entry->name, true, buffer); isc_buffer_putstr(buffer, "\" { type slave; masters"); /* * DSCP value has no default, but when it is specified, it is identical * for all masters and cannot be overridden for a specific master IP, so * use the DSCP value set for the first master */ if (entry->opts.masters.count > 0 && entry->opts.masters.dscps[0] >= 0) { isc_buffer_putstr(buffer, " dscp "); snprintf(pbuf, sizeof(pbuf), "%hd", entry->opts.masters.dscps[0]); isc_buffer_putstr(buffer, pbuf); } isc_buffer_putstr(buffer, " { "); for (i = 0; i < entry->opts.masters.count; i++) { /* * Every master must have an IP address assigned. */ switch (entry->opts.masters.addrs[i].type.sa.sa_family) { case AF_INET: case AF_INET6: break; default: dns_name_format(&entry->name, zname, DNS_NAME_FORMATSIZE); isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, "catz: zone '%s' uses an invalid master " "(no IP address assigned)", zname); result = ISC_R_FAILURE; goto cleanup; } isc_netaddr_fromsockaddr(&netaddr, &entry->opts.masters.addrs[i]); isc_buffer_reserve(&buffer, INET6_ADDRSTRLEN); result = isc_netaddr_totext(&netaddr, buffer); RUNTIME_CHECK(result == ISC_R_SUCCESS); isc_buffer_putstr(buffer, " port "); snprintf(pbuf, sizeof(pbuf), "%u", isc_sockaddr_getport(&entry->opts.masters.addrs[i])); isc_buffer_putstr(buffer, pbuf); if (entry->opts.masters.keys[i] != NULL) { isc_buffer_putstr(buffer, " key "); result = dns_name_totext(entry->opts.masters.keys[i], true, buffer); if (result != ISC_R_SUCCESS) { goto cleanup; } } isc_buffer_putstr(buffer, "; "); } isc_buffer_putstr(buffer, "}; "); if (!entry->opts.in_memory) { isc_buffer_putstr(buffer, "file \""); result = dns_catz_generate_masterfilename(zone, entry, &buffer); if (result != ISC_R_SUCCESS) { goto cleanup; } isc_buffer_putstr(buffer, "\"; "); } if (entry->opts.allow_query != NULL) { isc_buffer_putstr(buffer, "allow-query { "); isc_buffer_usedregion(entry->opts.allow_query, ®ion); isc_buffer_copyregion(buffer, ®ion); isc_buffer_putstr(buffer, "}; "); } if (entry->opts.allow_transfer != NULL) { isc_buffer_putstr(buffer, "allow-transfer { "); isc_buffer_usedregion(entry->opts.allow_transfer, ®ion); isc_buffer_copyregion(buffer, ®ion); isc_buffer_putstr(buffer, "}; "); } isc_buffer_putstr(buffer, "};"); *buf = buffer; return (ISC_R_SUCCESS); cleanup: isc_buffer_free(&buffer); return (result); } void dns_catz_update_taskaction(isc_task_t *task, isc_event_t *event) { isc_result_t result; dns_catz_zone_t *zone; (void)task; REQUIRE(event != NULL); zone = event->ev_arg; REQUIRE(DNS_CATZ_ZONE_VALID(zone)); LOCK(&zone->catzs->lock); zone->updatepending = false; dns_catz_update_from_db(zone->db, zone->catzs); result = isc_timer_reset(zone->updatetimer, isc_timertype_inactive, NULL, NULL, true); RUNTIME_CHECK(result == ISC_R_SUCCESS); isc_event_free(&event); result = isc_time_now(&zone->lastupdated); RUNTIME_CHECK(result == ISC_R_SUCCESS); UNLOCK(&zone->catzs->lock); } isc_result_t dns_catz_dbupdate_callback(dns_db_t *db, void *fn_arg) { dns_catz_zones_t *catzs; dns_catz_zone_t *zone = NULL; isc_time_t now; uint64_t tdiff; isc_result_t result = ISC_R_SUCCESS; isc_region_t r; REQUIRE(DNS_DB_VALID(db)); REQUIRE(DNS_CATZ_ZONES_VALID(fn_arg)); catzs = (dns_catz_zones_t *)fn_arg; dns_name_toregion(&db->origin, &r); LOCK(&catzs->lock); result = isc_ht_find(catzs->zones, r.base, r.length, (void **)&zone); if (result != ISC_R_SUCCESS) { goto cleanup; } /* New zone came as AXFR */ if (zone->db != NULL && zone->db != db) { if (zone->dbversion != NULL) { dns_db_closeversion(zone->db, &zone->dbversion, false); } dns_db_updatenotify_unregister( zone->db, dns_catz_dbupdate_callback, zone->catzs); dns_db_detach(&zone->db); /* * We're not registering db update callback, it will be * registered at the end of update_from_db */ zone->db_registered = false; } if (zone->db == NULL) { dns_db_attach(db, &zone->db); } if (!zone->updatepending) { zone->updatepending = true; isc_time_now(&now); tdiff = isc_time_microdiff(&now, &zone->lastupdated) / 1000000; if (tdiff < zone->defoptions.min_update_interval) { isc_interval_t interval; isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_INFO, "catz: new zone version came too soon, " "deferring update"); isc_interval_set(&interval, zone->defoptions.min_update_interval - (unsigned int)tdiff, 0); dns_db_currentversion(db, &zone->dbversion); result = isc_timer_reset(zone->updatetimer, isc_timertype_once, NULL, &interval, true); if (result != ISC_R_SUCCESS) { goto cleanup; } } else { isc_event_t *event; dns_db_currentversion(db, &zone->dbversion); ISC_EVENT_INIT(&zone->updateevent, sizeof(zone->updateevent), 0, NULL, DNS_EVENT_CATZUPDATED, dns_catz_update_taskaction, zone, zone, NULL, NULL); event = &zone->updateevent; isc_task_send(catzs->updater, &event); } } else { isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_DEBUG(3), "catz: update already queued"); if (zone->dbversion != NULL) { dns_db_closeversion(zone->db, &zone->dbversion, false); } dns_db_currentversion(zone->db, &zone->dbversion); } cleanup: UNLOCK(&catzs->lock); return (result); } static bool catz_rdatatype_is_processable(const dns_rdatatype_t type) { return (!dns_rdatatype_isdnssec(type) && type != dns_rdatatype_cds && type != dns_rdatatype_cdnskey && type != dns_rdatatype_zonemd); } void dns_catz_update_from_db(dns_db_t *db, dns_catz_zones_t *catzs) { dns_catz_zone_t *oldzone = NULL, *newzone = NULL; isc_result_t result; isc_region_t r; dns_dbnode_t *node = NULL; dns_dbiterator_t *it = NULL; dns_fixedname_t fixname; dns_name_t *name; dns_rdatasetiter_t *rdsiter = NULL; dns_rdataset_t rdataset; char bname[DNS_NAME_FORMATSIZE]; isc_buffer_t ibname; uint32_t vers; REQUIRE(DNS_DB_VALID(db)); REQUIRE(DNS_CATZ_ZONES_VALID(catzs)); /* * Create a new catz in the same context as current catz. */ dns_name_toregion(&db->origin, &r); result = isc_ht_find(catzs->zones, r.base, r.length, (void **)&oldzone); if (result != ISC_R_SUCCESS) { /* This can happen if we remove the zone in the meantime. */ isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, "catz: zone '%s' not in config", bname); return; } if (!oldzone->active) { /* This can happen during a reconfiguration. */ isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_INFO, "catz: zone '%s' is no longer active", bname); return; } isc_buffer_init(&ibname, bname, DNS_NAME_FORMATSIZE); result = dns_name_totext(&db->origin, true, &ibname); INSIST(result == ISC_R_SUCCESS); result = dns_db_getsoaserial(db, oldzone->dbversion, &vers); if (result != ISC_R_SUCCESS) { /* A zone without SOA record?!? */ isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, "catz: zone '%s' has no SOA record (%s)", bname, isc_result_totext(result)); return; } isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_INFO, "catz: updating catalog zone '%s' with serial %" PRIu32, bname, vers); result = dns_catz_new_zone(catzs, &newzone, &db->origin); if (result != ISC_R_SUCCESS) { dns_db_closeversion(db, &oldzone->dbversion, false); isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, "catz: failed to create new zone - %s", isc_result_totext(result)); return; } result = dns_db_createiterator(db, DNS_DB_NONSEC3, &it); if (result != ISC_R_SUCCESS) { dns_catz_zone_detach(&newzone); dns_db_closeversion(db, &oldzone->dbversion, false); isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, "catz: failed to create DB iterator - %s", isc_result_totext(result)); return; } name = dns_fixedname_initname(&fixname); /* * Iterate over database to fill the new zone. */ result = dns_dbiterator_first(it); if (result != ISC_R_SUCCESS) { isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, "catz: failed to get db iterator - %s", isc_result_totext(result)); } while (result == ISC_R_SUCCESS) { result = dns_dbiterator_current(it, &node, name); if (result != ISC_R_SUCCESS) { isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, "catz: failed to get db iterator - %s", isc_result_totext(result)); break; } result = dns_db_allrdatasets(db, node, oldzone->dbversion, 0, 0, &rdsiter); if (result != ISC_R_SUCCESS) { isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, "catz: failed to fetch rrdatasets - %s", isc_result_totext(result)); dns_db_detachnode(db, &node); break; } dns_rdataset_init(&rdataset); result = dns_rdatasetiter_first(rdsiter); while (result == ISC_R_SUCCESS) { dns_rdatasetiter_current(rdsiter, &rdataset); /* * Skip processing DNSSEC-related and ZONEMD types, * because we are not interested in them in the context * of a catalog zone, and processing them will fail * and produce an unnecessary warning message. */ if (!catz_rdatatype_is_processable(rdataset.type)) { goto next; } result = dns_catz_update_process(catzs, newzone, name, &rdataset); if (result != ISC_R_SUCCESS) { char cname[DNS_NAME_FORMATSIZE]; char typebuf[DNS_RDATATYPE_FORMATSIZE]; char classbuf[DNS_RDATACLASS_FORMATSIZE]; dns_name_format(name, cname, DNS_NAME_FORMATSIZE); dns_rdataclass_format(rdataset.rdclass, classbuf, sizeof(classbuf)); dns_rdatatype_format(rdataset.type, typebuf, sizeof(typebuf)); isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_WARNING, "catz: unknown record in catalog " "zone - %s %s %s(%s) - ignoring", cname, classbuf, typebuf, isc_result_totext(result)); } next: dns_rdataset_disassociate(&rdataset); result = dns_rdatasetiter_next(rdsiter); } dns_rdatasetiter_destroy(&rdsiter); dns_db_detachnode(db, &node); result = dns_dbiterator_next(it); } dns_dbiterator_destroy(&it); dns_db_closeversion(db, &oldzone->dbversion, false); isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_DEBUG(3), "catz: update_from_db: iteration finished"); /* * Finally merge new zone into old zone. */ result = dns_catz_zones_merge(oldzone, newzone); dns_catz_zone_detach(&newzone); if (result != ISC_R_SUCCESS) { isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_ERROR, "catz: failed merging zones: %s", isc_result_totext(result)); return; } isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_DEBUG(3), "catz: update_from_db: new zone merged"); /* * When we're doing reconfig and setting a new catalog zone * from an existing zone we won't have a chance to set up * update callback in zone_startload or axfr_makedb, but we will * call onupdate() artificially so we can register the callback here. */ if (!oldzone->db_registered) { result = dns_db_updatenotify_register( db, dns_catz_dbupdate_callback, oldzone->catzs); if (result == ISC_R_SUCCESS) { oldzone->db_registered = true; } } } void dns_catz_prereconfig(dns_catz_zones_t *catzs) { isc_result_t result; isc_ht_iter_t *iter = NULL; REQUIRE(DNS_CATZ_ZONES_VALID(catzs)); LOCK(&catzs->lock); isc_ht_iter_create(catzs->zones, &iter); for (result = isc_ht_iter_first(iter); result == ISC_R_SUCCESS; result = isc_ht_iter_next(iter)) { dns_catz_zone_t *zone = NULL; isc_ht_iter_current(iter, (void **)&zone); zone->active = false; } UNLOCK(&catzs->lock); INSIST(result == ISC_R_NOMORE); isc_ht_iter_destroy(&iter); } void dns_catz_postreconfig(dns_catz_zones_t *catzs) { isc_result_t result; dns_catz_zone_t *newzone = NULL; isc_ht_iter_t *iter = NULL; REQUIRE(DNS_CATZ_ZONES_VALID(catzs)); LOCK(&catzs->lock); isc_ht_iter_create(catzs->zones, &iter); for (result = isc_ht_iter_first(iter); result == ISC_R_SUCCESS;) { dns_catz_zone_t *zone = NULL; isc_ht_iter_current(iter, (void **)&zone); if (!zone->active) { char cname[DNS_NAME_FORMATSIZE]; dns_name_format(&zone->name, cname, DNS_NAME_FORMATSIZE); isc_log_write(dns_lctx, DNS_LOGCATEGORY_GENERAL, DNS_LOGMODULE_MASTER, ISC_LOG_WARNING, "catz: removing catalog zone %s", cname); /* * Merge the old zone with an empty one to remove * all members. */ result = dns_catz_new_zone(catzs, &newzone, &zone->name); INSIST(result == ISC_R_SUCCESS); dns_catz_zones_merge(zone, newzone); dns_catz_zone_detach(&newzone); /* Make sure that we have an empty catalog zone. */ INSIST(isc_ht_count(zone->entries) == 0); result = isc_ht_iter_delcurrent_next(iter); dns_catz_zone_detach(&zone); } else { result = isc_ht_iter_next(iter); } } UNLOCK(&catzs->lock); RUNTIME_CHECK(result == ISC_R_NOMORE); isc_ht_iter_destroy(&iter); } void dns_catz_get_iterator(dns_catz_zone_t *catz, isc_ht_iter_t **itp) { REQUIRE(DNS_CATZ_ZONE_VALID(catz)); isc_ht_iter_create(catz->entries, itp); }