123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791 |
- // Copyright (C) 2009 Internet Systems Consortium, Inc. ("ISC")
- //
- // Permission to use, copy, modify, and/or distribute this software for any
- // purpose with or without fee is hereby granted, provided that the above
- // copyright notice and this permission notice appear in all copies.
- //
- // THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
- // REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
- // AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
- // INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
- // LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
- // OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
- // PERFORMANCE OF THIS SOFTWARE.
- #include <config.h>
- #include <netinet/in.h>
- #include <algorithm>
- #include <cassert>
- #include <iostream>
- #include <vector>
- #include <memory>
- #include <boost/bind.hpp>
- #include <asiolink/asiolink.h>
- #include <config/ccsession.h>
- #include <cc/data.h>
- #include <exceptions/exceptions.h>
- #include <util/buffer.h>
- #include <dns/edns.h>
- #include <dns/exceptions.h>
- #include <dns/messagerenderer.h>
- #include <dns/name.h>
- #include <dns/question.h>
- #include <dns/opcode.h>
- #include <dns/rcode.h>
- #include <dns/rrset.h>
- #include <dns/rrttl.h>
- #include <dns/message.h>
- #include <dns/tsig.h>
- #include <datasrc/query.h>
- #include <datasrc/data_source.h>
- #include <datasrc/memory_datasrc.h>
- #include <datasrc/static_datasrc.h>
- #include <datasrc/sqlite3_datasrc.h>
- #include <xfr/xfrout_client.h>
- #include <auth/common.h>
- #include <auth/auth_config.h>
- #include <auth/auth_srv.h>
- #include <auth/query.h>
- #include <auth/statistics.h>
- #include <auth/auth_log.h>
- using namespace std;
- using namespace isc;
- using namespace isc::cc;
- using namespace isc::datasrc;
- using namespace isc::dns;
- using namespace isc::util;
- using namespace isc::auth;
- using namespace isc::dns::rdata;
- using namespace isc::data;
- using namespace isc::config;
- using namespace isc::xfr;
- using namespace isc::asiolink;
- using namespace isc::asiodns;
- using namespace isc::server_common::portconfig;
- class AuthSrvImpl {
- private:
- // prohibit copy
- AuthSrvImpl(const AuthSrvImpl& source);
- AuthSrvImpl& operator=(const AuthSrvImpl& source);
- public:
- AuthSrvImpl(const bool use_cache, AbstractXfroutClient& xfrout_client);
- ~AuthSrvImpl();
- isc::data::ConstElementPtr setDbFile(isc::data::ConstElementPtr config);
- bool processNormalQuery(const IOMessage& io_message, MessagePtr message,
- OutputBufferPtr buffer,
- auto_ptr<TSIGContext> tsig_context);
- bool processXfrQuery(const IOMessage& io_message, MessagePtr message,
- OutputBufferPtr buffer,
- auto_ptr<TSIGContext> tsig_context);
- bool processNotify(const IOMessage& io_message, MessagePtr message,
- OutputBufferPtr buffer,
- auto_ptr<TSIGContext> tsig_context);
- IOService io_service_;
- /// Currently non-configurable, but will be.
- static const uint16_t DEFAULT_LOCAL_UDPSIZE = 4096;
- /// These members are public because AuthSrv accesses them directly.
- ModuleCCSession* config_session_;
- AbstractSession* xfrin_session_;
- /// In-memory data source. Currently class IN only for simplicity.
- const RRClass memory_client_class_;
- AuthSrv::InMemoryClientPtr memory_client_;
- /// Hot spot cache
- isc::datasrc::HotCache cache_;
- /// Interval timer for periodic submission of statistics counters.
- IntervalTimer statistics_timer_;
- /// Query counters for statistics
- AuthCounters counters_;
- /// Addresses we listen on
- AddressList listen_addresses_;
- /// The TSIG keyring
- const boost::shared_ptr<TSIGKeyRing>* keyring_;
- /// Bind the ModuleSpec object in config_session_ with
- /// isc:config::ModuleSpec::validateStatistics.
- void registerStatisticsValidator();
- private:
- std::string db_file_;
- MetaDataSrc data_sources_;
- /// We keep a pointer to the currently running sqlite datasource
- /// so that we can specifically remove that one should the database
- /// file change
- ConstDataSrcPtr cur_datasrc_;
- bool xfrout_connected_;
- AbstractXfroutClient& xfrout_client_;
- /// Increment query counter
- void incCounter(const int protocol);
- // validateStatistics
- bool validateStatistics(isc::data::ConstElementPtr data) const;
- };
- AuthSrvImpl::AuthSrvImpl(const bool use_cache,
- AbstractXfroutClient& xfrout_client) :
- config_session_(NULL),
- xfrin_session_(NULL),
- memory_client_class_(RRClass::IN()),
- statistics_timer_(io_service_),
- counters_(),
- keyring_(NULL),
- xfrout_connected_(false),
- xfrout_client_(xfrout_client)
- {
- // cur_datasrc_ is automatically initialized by the default constructor,
- // effectively being an empty (sqlite) data source. once ccsession is up
- // the datasource will be set by the configuration setting
- // add static data source
- data_sources_.addDataSrc(ConstDataSrcPtr(new StaticDataSrc));
- // enable or disable the cache
- cache_.setEnabled(use_cache);
- }
- AuthSrvImpl::~AuthSrvImpl() {
- if (xfrout_connected_) {
- xfrout_client_.disconnect();
- xfrout_connected_ = false;
- }
- }
- // This is a derived class of \c DNSLookup, to serve as a
- // callback in the asiolink module. It calls
- // AuthSrv::processMessage() on a single DNS message.
- class MessageLookup : public DNSLookup {
- public:
- MessageLookup(AuthSrv* srv) : server_(srv) {}
- virtual void operator()(const IOMessage& io_message,
- MessagePtr message,
- MessagePtr answer_message,
- OutputBufferPtr buffer,
- DNSServer* server) const
- {
- (void) answer_message;
- server_->processMessage(io_message, message, buffer, server);
- }
- private:
- AuthSrv* server_;
- };
- // This is a derived class of \c DNSAnswer, to serve as a callback in the
- // asiolink module. We actually shouldn't do anything in this class because
- // we build complete response messages in the process methods; otherwise
- // the response message will contain trailing garbage. In future, we should
- // probably even drop the reliance on DNSAnswer. We don't need the coroutine
- // tricks provided in that framework, and its overhead would be significant
- // in terms of performance consideration for the authoritative server
- // implementation.
- class MessageAnswer : public DNSAnswer {
- public:
- MessageAnswer(AuthSrv*) {}
- virtual void operator()(const IOMessage&, MessagePtr,
- MessagePtr, OutputBufferPtr) const
- {}
- };
- // This is a derived class of \c SimpleCallback, to serve
- // as a callback in the asiolink module. It checks for queued
- // configuration messages, and executes them if found.
- class ConfigChecker : public SimpleCallback {
- public:
- ConfigChecker(AuthSrv* srv) : server_(srv) {}
- virtual void operator()(const IOMessage&) const {
- ModuleCCSession* cfg_session = server_->getConfigSession();
- if (cfg_session != NULL && cfg_session->hasQueuedMsgs()) {
- cfg_session->checkCommand();
- }
- }
- private:
- AuthSrv* server_;
- };
- AuthSrv::AuthSrv(const bool use_cache, AbstractXfroutClient& xfrout_client)
- {
- impl_ = new AuthSrvImpl(use_cache, xfrout_client);
- checkin_ = new ConfigChecker(this);
- dns_lookup_ = new MessageLookup(this);
- dns_answer_ = new MessageAnswer(this);
- }
- void
- AuthSrv::stop() {
- impl_->io_service_.stop();
- }
- AuthSrv::~AuthSrv() {
- delete impl_;
- delete checkin_;
- delete dns_lookup_;
- delete dns_answer_;
- }
- namespace {
- class QuestionInserter {
- public:
- QuestionInserter(MessagePtr message) : message_(message) {}
- void operator()(const QuestionPtr question) {
- message_->addQuestion(question);
- }
- MessagePtr message_;
- };
- void
- makeErrorMessage(MessagePtr message, OutputBufferPtr buffer,
- const Rcode& rcode,
- std::auto_ptr<TSIGContext> tsig_context =
- std::auto_ptr<TSIGContext>())
- {
- // extract the parameters that should be kept.
- // XXX: with the current implementation, it's not easy to set EDNS0
- // depending on whether the query had it. So we'll simply omit it.
- const qid_t qid = message->getQid();
- const bool rd = message->getHeaderFlag(Message::HEADERFLAG_RD);
- const bool cd = message->getHeaderFlag(Message::HEADERFLAG_CD);
- const Opcode& opcode = message->getOpcode();
- vector<QuestionPtr> questions;
- // If this is an error to a query or notify, we should also copy the
- // question section.
- if (opcode == Opcode::QUERY() || opcode == Opcode::NOTIFY()) {
- questions.assign(message->beginQuestion(), message->endQuestion());
- }
- message->clear(Message::RENDER);
- message->setQid(qid);
- message->setOpcode(opcode);
- message->setHeaderFlag(Message::HEADERFLAG_QR);
- if (rd) {
- message->setHeaderFlag(Message::HEADERFLAG_RD);
- }
- if (cd) {
- message->setHeaderFlag(Message::HEADERFLAG_CD);
- }
- for_each(questions.begin(), questions.end(), QuestionInserter(message));
- message->setRcode(rcode);
- MessageRenderer renderer(*buffer);
- if (tsig_context.get() != NULL) {
- message->toWire(renderer, *tsig_context);
- } else {
- message->toWire(renderer);
- }
- LOG_DEBUG(auth_logger, DBG_AUTH_MESSAGES, AUTH_SEND_ERROR_RESPONSE)
- .arg(renderer.getLength()).arg(*message);
- }
- }
- IOService&
- AuthSrv::getIOService() {
- return (impl_->io_service_);
- }
- void
- AuthSrv::setCacheSlots(const size_t slots) {
- impl_->cache_.setSlots(slots);
- }
- size_t
- AuthSrv::getCacheSlots() const {
- return (impl_->cache_.getSlots());
- }
- void
- AuthSrv::setXfrinSession(AbstractSession* xfrin_session) {
- impl_->xfrin_session_ = xfrin_session;
- }
- void
- AuthSrv::setConfigSession(ModuleCCSession* config_session) {
- impl_->config_session_ = config_session;
- impl_->registerStatisticsValidator();
- }
- void
- AuthSrv::setStatisticsSession(AbstractSession* statistics_session) {
- impl_->counters_.setStatisticsSession(statistics_session);
- }
- ModuleCCSession*
- AuthSrv::getConfigSession() const {
- return (impl_->config_session_);
- }
- AuthSrv::InMemoryClientPtr
- AuthSrv::getInMemoryClient(const RRClass& rrclass) {
- // XXX: for simplicity, we only support the IN class right now.
- if (rrclass != impl_->memory_client_class_) {
- isc_throw(InvalidParameter,
- "Memory data source is not supported for RR class "
- << rrclass);
- }
- return (impl_->memory_client_);
- }
- void
- AuthSrv::setInMemoryClient(const isc::dns::RRClass& rrclass,
- InMemoryClientPtr memory_client)
- {
- // XXX: see above
- if (rrclass != impl_->memory_client_class_) {
- isc_throw(InvalidParameter,
- "Memory data source is not supported for RR class "
- << rrclass);
- } else if (!impl_->memory_client_ && memory_client) {
- LOG_DEBUG(auth_logger, DBG_AUTH_OPS, AUTH_MEM_DATASRC_ENABLED)
- .arg(rrclass);
- } else if (impl_->memory_client_ && !memory_client) {
- LOG_DEBUG(auth_logger, DBG_AUTH_OPS, AUTH_MEM_DATASRC_DISABLED)
- .arg(rrclass);
- }
- impl_->memory_client_ = memory_client;
- }
- uint32_t
- AuthSrv::getStatisticsTimerInterval() const {
- return (impl_->statistics_timer_.getInterval() / 1000);
- }
- void
- AuthSrv::setStatisticsTimerInterval(uint32_t interval) {
- if (interval == impl_->statistics_timer_.getInterval()) {
- return;
- }
- if (interval > 86400) {
- // It can't occur since the value is checked in
- // statisticsIntervalConfig::build().
- isc_throw(InvalidParameter, "Too long interval: " << interval);
- }
- if (interval == 0) {
- impl_->statistics_timer_.cancel();
- LOG_DEBUG(auth_logger, DBG_AUTH_OPS, AUTH_STATS_TIMER_DISABLED);
- } else {
- impl_->statistics_timer_.setup(boost::bind(&AuthSrv::submitStatistics,
- this),
- interval * 1000);
- LOG_DEBUG(auth_logger, DBG_AUTH_OPS, AUTH_STATS_TIMER_SET)
- .arg(interval);
- }
- }
- void
- AuthSrv::processMessage(const IOMessage& io_message, MessagePtr message,
- OutputBufferPtr buffer, DNSServer* server)
- {
- InputBuffer request_buffer(io_message.getData(), io_message.getDataSize());
- // First, check the header part. If we fail even for the base header,
- // just drop the message.
- try {
- message->parseHeader(request_buffer);
- // Ignore all responses.
- if (message->getHeaderFlag(Message::HEADERFLAG_QR)) {
- LOG_DEBUG(auth_logger, DBG_AUTH_DETAIL, AUTH_RESPONSE_RECEIVED);
- server->resume(false);
- return;
- }
- } catch (const Exception& ex) {
- LOG_DEBUG(auth_logger, DBG_AUTH_DETAIL, AUTH_HEADER_PARSE_FAIL)
- .arg(ex.what());
- server->resume(false);
- return;
- }
- try {
- // Parse the message.
- message->fromWire(request_buffer);
- } catch (const DNSProtocolError& error) {
- LOG_DEBUG(auth_logger, DBG_AUTH_DETAIL, AUTH_PACKET_PROTOCOL_ERROR)
- .arg(error.getRcode().toText()).arg(error.what());
- makeErrorMessage(message, buffer, error.getRcode());
- server->resume(true);
- return;
- } catch (const Exception& ex) {
- LOG_DEBUG(auth_logger, DBG_AUTH_DETAIL, AUTH_PACKET_PARSE_ERROR)
- .arg(ex.what());
- makeErrorMessage(message, buffer, Rcode::SERVFAIL());
- server->resume(true);
- return;
- } // other exceptions will be handled at a higher layer.
- LOG_DEBUG(auth_logger, DBG_AUTH_MESSAGES, AUTH_PACKET_RECEIVED)
- .arg(message->toText());
- // Perform further protocol-level validation.
- // TSIG first
- // If this is set to something, we know we need to answer with TSIG as well
- std::auto_ptr<TSIGContext> tsig_context;
- const TSIGRecord* tsig_record(message->getTSIGRecord());
- TSIGError tsig_error(TSIGError::NOERROR());
- // Do we do TSIG?
- // The keyring can be null if we're in test
- if (impl_->keyring_ != NULL && tsig_record != NULL) {
- tsig_context.reset(new TSIGContext(tsig_record->getName(),
- tsig_record->getRdata().
- getAlgorithm(),
- **impl_->keyring_));
- tsig_error = tsig_context->verify(tsig_record, io_message.getData(),
- io_message.getDataSize());
- }
- bool sendAnswer = true;
- if (tsig_error != TSIGError::NOERROR()) {
- makeErrorMessage(message, buffer, tsig_error.toRcode(), tsig_context);
- } else if (message->getOpcode() == Opcode::NOTIFY()) {
- sendAnswer = impl_->processNotify(io_message, message, buffer,
- tsig_context);
- } else if (message->getOpcode() != Opcode::QUERY()) {
- LOG_DEBUG(auth_logger, DBG_AUTH_DETAIL, AUTH_UNSUPPORTED_OPCODE)
- .arg(message->getOpcode().toText());
- makeErrorMessage(message, buffer, Rcode::NOTIMP(), tsig_context);
- } else if (message->getRRCount(Message::SECTION_QUESTION) != 1) {
- makeErrorMessage(message, buffer, Rcode::FORMERR(), tsig_context);
- } else {
- ConstQuestionPtr question = *message->beginQuestion();
- const RRType &qtype = question->getType();
- if (qtype == RRType::AXFR()) {
- sendAnswer = impl_->processXfrQuery(io_message, message, buffer,
- tsig_context);
- } else if (qtype == RRType::IXFR()) {
- sendAnswer = impl_->processXfrQuery(io_message, message, buffer,
- tsig_context);
- } else {
- sendAnswer = impl_->processNormalQuery(io_message, message, buffer,
- tsig_context);
- }
- }
- server->resume(sendAnswer);
- }
- bool
- AuthSrvImpl::processNormalQuery(const IOMessage& io_message, MessagePtr message,
- OutputBufferPtr buffer,
- auto_ptr<TSIGContext> tsig_context)
- {
- ConstEDNSPtr remote_edns = message->getEDNS();
- const bool dnssec_ok = remote_edns && remote_edns->getDNSSECAwareness();
- const uint16_t remote_bufsize = remote_edns ? remote_edns->getUDPSize() :
- Message::DEFAULT_MAX_UDPSIZE;
- message->makeResponse();
- message->setHeaderFlag(Message::HEADERFLAG_AA);
- message->setRcode(Rcode::NOERROR());
- // Increment query counter.
- incCounter(io_message.getSocket().getProtocol());
- if (remote_edns) {
- EDNSPtr local_edns = EDNSPtr(new EDNS());
- local_edns->setDNSSECAwareness(dnssec_ok);
- local_edns->setUDPSize(AuthSrvImpl::DEFAULT_LOCAL_UDPSIZE);
- message->setEDNS(local_edns);
- }
- try {
- // If a memory data source is configured call the separate
- // Query::process()
- const ConstQuestionPtr question = *message->beginQuestion();
- if (memory_client_ && memory_client_class_ == question->getClass()) {
- const RRType& qtype = question->getType();
- const Name& qname = question->getName();
- auth::Query(*memory_client_, qname, qtype, *message).process();
- } else {
- datasrc::Query query(*message, cache_, dnssec_ok);
- data_sources_.doQuery(query);
- }
- } catch (const Exception& ex) {
- LOG_ERROR(auth_logger, AUTH_PROCESS_FAIL).arg(ex.what());
- makeErrorMessage(message, buffer, Rcode::SERVFAIL());
- return (true);
- }
- MessageRenderer renderer(*buffer);
- const bool udp_buffer =
- (io_message.getSocket().getProtocol() == IPPROTO_UDP);
- renderer.setLengthLimit(udp_buffer ? remote_bufsize : 65535);
- if (tsig_context.get() != NULL) {
- message->toWire(renderer, *tsig_context);
- } else {
- message->toWire(renderer);
- }
- LOG_DEBUG(auth_logger, DBG_AUTH_MESSAGES, AUTH_SEND_NORMAL_RESPONSE)
- .arg(renderer.getLength()).arg(message->toText());
- return (true);
- }
- bool
- AuthSrvImpl::processXfrQuery(const IOMessage& io_message, MessagePtr message,
- OutputBufferPtr buffer,
- auto_ptr<TSIGContext> tsig_context)
- {
- // Increment query counter.
- incCounter(io_message.getSocket().getProtocol());
- if (io_message.getSocket().getProtocol() == IPPROTO_UDP) {
- LOG_DEBUG(auth_logger, DBG_AUTH_DETAIL, AUTH_AXFR_UDP);
- makeErrorMessage(message, buffer, Rcode::FORMERR(), tsig_context);
- return (true);
- }
- try {
- if (!xfrout_connected_) {
- xfrout_client_.connect();
- xfrout_connected_ = true;
- }
- xfrout_client_.sendXfroutRequestInfo(
- io_message.getSocket().getNative(),
- io_message.getData(),
- io_message.getDataSize());
- } catch (const XfroutError& err) {
- if (xfrout_connected_) {
- // disconnect() may trigger an exception, but since we try it
- // only if we've successfully opened it, it shouldn't happen in
- // normal condition. Should this occur, we'll propagate it to the
- // upper layer.
- xfrout_client_.disconnect();
- xfrout_connected_ = false;
- }
- LOG_DEBUG(auth_logger, DBG_AUTH_DETAIL, AUTH_AXFR_ERROR)
- .arg(err.what());
- makeErrorMessage(message, buffer, Rcode::SERVFAIL(), tsig_context);
- return (true);
- }
- return (false);
- }
- bool
- AuthSrvImpl::processNotify(const IOMessage& io_message, MessagePtr message,
- OutputBufferPtr buffer,
- std::auto_ptr<TSIGContext> tsig_context)
- {
- // The incoming notify must contain exactly one question for SOA of the
- // zone name.
- if (message->getRRCount(Message::SECTION_QUESTION) != 1) {
- LOG_DEBUG(auth_logger, DBG_AUTH_DETAIL, AUTH_NOTIFY_QUESTIONS)
- .arg(message->getRRCount(Message::SECTION_QUESTION));
- makeErrorMessage(message, buffer, Rcode::FORMERR(), tsig_context);
- return (true);
- }
- ConstQuestionPtr question = *message->beginQuestion();
- if (question->getType() != RRType::SOA()) {
- LOG_DEBUG(auth_logger, DBG_AUTH_DETAIL, AUTH_NOTIFY_RRTYPE)
- .arg(question->getType().toText());
- makeErrorMessage(message, buffer, Rcode::FORMERR(), tsig_context);
- return (true);
- }
- // According to RFC 1996, rcode should be "no error" and AA bit should be
- // on, but we don't check these conditions. This behavior is compatible
- // with BIND 9.
- // TODO check with the conf-mgr whether current server is the auth of the
- // zone
- // In the code that follows, we simply ignore the notify if any internal
- // error happens rather than returning (e.g.) SERVFAIL. RFC 1996 is
- // silent about such cases, but there doesn't seem to be anything we can
- // improve at the primary server side by sending an error anyway.
- if (xfrin_session_ == NULL) {
- LOG_DEBUG(auth_logger, DBG_AUTH_DETAIL, AUTH_NO_XFRIN);
- return (false);
- }
- const string remote_ip_address =
- io_message.getRemoteEndpoint().getAddress().toText();
- static const string command_template_start =
- "{\"command\": [\"notify\", {\"zone_name\" : \"";
- static const string command_template_master = "\", \"master\" : \"";
- static const string command_template_rrclass = "\", \"zone_class\" : \"";
- static const string command_template_end = "\"}]}";
- try {
- ConstElementPtr notify_command = Element::fromJSON(
- command_template_start + question->getName().toText() +
- command_template_master + remote_ip_address +
- command_template_rrclass + question->getClass().toText() +
- command_template_end);
- const unsigned int seq =
- xfrin_session_->group_sendmsg(notify_command, "Zonemgr",
- "*", "*");
- ConstElementPtr env, answer, parsed_answer;
- xfrin_session_->group_recvmsg(env, answer, false, seq);
- int rcode;
- parsed_answer = parseAnswer(rcode, answer);
- if (rcode != 0) {
- LOG_ERROR(auth_logger, AUTH_ZONEMGR_ERROR)
- .arg(parsed_answer->str());
- return (false);
- }
- } catch (const Exception& ex) {
- LOG_ERROR(auth_logger, AUTH_ZONEMGR_COMMS).arg(ex.what());
- return (false);
- }
- message->makeResponse();
- message->setHeaderFlag(Message::HEADERFLAG_AA);
- message->setRcode(Rcode::NOERROR());
- MessageRenderer renderer(*buffer);
- if (tsig_context.get() != NULL) {
- message->toWire(renderer, *tsig_context);
- } else {
- message->toWire(renderer);
- }
- return (true);
- }
- void
- AuthSrvImpl::incCounter(const int protocol) {
- // Increment query counter.
- if (protocol == IPPROTO_UDP) {
- counters_.inc(AuthCounters::SERVER_UDP_QUERY);
- } else if (protocol == IPPROTO_TCP) {
- counters_.inc(AuthCounters::SERVER_TCP_QUERY);
- } else {
- // unknown protocol
- isc_throw(Unexpected, "Unknown protocol: " << protocol);
- }
- }
- void
- AuthSrvImpl::registerStatisticsValidator() {
- counters_.registerStatisticsValidator(
- boost::bind(&AuthSrvImpl::validateStatistics, this, _1));
- }
- bool
- AuthSrvImpl::validateStatistics(isc::data::ConstElementPtr data) const {
- if (config_session_ == NULL) {
- return (false);
- }
- return (
- config_session_->getModuleSpec().validateStatistics(
- data, true));
- }
- ConstElementPtr
- AuthSrvImpl::setDbFile(ConstElementPtr config) {
- ConstElementPtr answer = isc::config::createAnswer();
- if (config && config->contains("database_file")) {
- db_file_ = config->get("database_file")->stringValue();
- } else if (config_session_ != NULL) {
- bool is_default;
- string item("database_file");
- ConstElementPtr value = config_session_->getValue(is_default, item);
- ElementPtr final = Element::createMap();
- // If the value is the default, and we are running from
- // a specific directory ('from build'), we need to use
- // a different value than the default (which may not exist)
- // (btw, this should not be done here in the end, i think
- // the from-source script should have a check for this,
- // but for that we need offline access to config, so for
- // now this is a decent solution)
- if (is_default && getenv("B10_FROM_BUILD")) {
- value = Element::create(string(getenv("B10_FROM_BUILD")) +
- "/bind10_zones.sqlite3");
- }
- final->set(item, value);
- config = final;
- db_file_ = value->stringValue();
- } else {
- return (answer);
- }
- LOG_DEBUG(auth_logger, DBG_AUTH_OPS, AUTH_DATA_SOURCE).arg(db_file_);
- // create SQL data source
- // Note: the following step is tricky to be exception-safe and to ensure
- // exception guarantee: We first need to perform all operations that can
- // fail, while acquiring resources in the RAII manner. We then perform
- // delete and swap operations which should not fail.
- DataSrcPtr datasrc_ptr(DataSrcPtr(new Sqlite3DataSrc));
- datasrc_ptr->init(config);
- data_sources_.addDataSrc(datasrc_ptr);
- // The following code should be exception free.
- if (cur_datasrc_ != NULL) {
- data_sources_.removeDataSrc(cur_datasrc_);
- }
- cur_datasrc_ = datasrc_ptr;
- return (answer);
- }
- ConstElementPtr
- AuthSrv::updateConfig(ConstElementPtr new_config) {
- try {
- // the ModuleCCSession has already checked if we have
- // the correct ElementPtr type as specified in our .spec file
- if (new_config) {
- configureAuthServer(*this, new_config);
- }
- return (impl_->setDbFile(new_config));
- } catch (const isc::Exception& error) {
- LOG_ERROR(auth_logger, AUTH_CONFIG_UPDATE_FAIL).arg(error.what());
- return (isc::config::createAnswer(1, error.what()));
- }
- }
- bool AuthSrv::submitStatistics() const {
- return (impl_->counters_.submitStatistics());
- }
- uint64_t
- AuthSrv::getCounter(const AuthCounters::ServerCounterType type) const {
- return (impl_->counters_.getCounter(type));
- }
- const AddressList&
- AuthSrv::getListenAddresses() const {
- return (impl_->listen_addresses_);
- }
- void
- AuthSrv::setListenAddresses(const AddressList& addresses) {
- installListenAddresses(addresses, impl_->listen_addresses_, *dnss_);
- }
- void
- AuthSrv::setDNSService(isc::asiodns::DNSService& dnss) {
- dnss_ = &dnss;
- }
- void
- AuthSrv::setTSIGKeyRing(const boost::shared_ptr<TSIGKeyRing>* keyring) {
- impl_->keyring_ = keyring;
- }
|