xfrout.py.in 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686
  1. #!@PYTHON@
  2. # Copyright (C) 2010 Internet Systems Consortium.
  3. #
  4. # Permission to use, copy, modify, and distribute this software for any
  5. # purpose with or without fee is hereby granted, provided that the above
  6. # copyright notice and this permission notice appear in all copies.
  7. #
  8. # THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SYSTEMS CONSORTIUM
  9. # DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL
  10. # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL
  11. # INTERNET SYSTEMS CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT,
  12. # INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
  13. # FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
  14. # NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
  15. # WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  16. import sys; sys.path.append ('@@PYTHONPATH@@')
  17. import isc
  18. import isc.cc
  19. import threading
  20. import struct
  21. import signal
  22. from isc.datasrc import sqlite3_ds
  23. from socketserver import *
  24. import os
  25. from isc.config.ccsession import *
  26. from isc.log.log import *
  27. from isc.cc import SessionError, SessionTimeout
  28. from isc.notify import notify_out
  29. import isc.util.process
  30. import socket
  31. import select
  32. import errno
  33. from optparse import OptionParser, OptionValueError
  34. from isc.util import socketserver_mixin
  35. try:
  36. from libutil_io_python import *
  37. from pydnspp import *
  38. except ImportError as e:
  39. # C++ loadable module may not be installed; even so the xfrout process
  40. # must keep running, so we warn about it and move forward.
  41. sys.stderr.write('[b10-xfrout] failed to import DNS or isc.util.io module: %s\n' % str(e))
  42. isc.util.process.rename()
  43. def init_paths():
  44. global SPECFILE_PATH
  45. global AUTH_SPECFILE_PATH
  46. global UNIX_SOCKET_FILE
  47. if "B10_FROM_BUILD" in os.environ:
  48. SPECFILE_PATH = os.environ["B10_FROM_BUILD"] + "/src/bin/xfrout"
  49. AUTH_SPECFILE_PATH = os.environ["B10_FROM_BUILD"] + "/src/bin/auth"
  50. if "B10_FROM_SOURCE_LOCALSTATEDIR" in os.environ:
  51. UNIX_SOCKET_FILE = os.environ["B10_FROM_SOURCE_LOCALSTATEDIR"] + \
  52. "/auth_xfrout_conn"
  53. else:
  54. UNIX_SOCKET_FILE = os.environ["B10_FROM_BUILD"] + "/auth_xfrout_conn"
  55. else:
  56. PREFIX = "@prefix@"
  57. DATAROOTDIR = "@datarootdir@"
  58. SPECFILE_PATH = "@datadir@/@PACKAGE@".replace("${datarootdir}", DATAROOTDIR).replace("${prefix}", PREFIX)
  59. AUTH_SPECFILE_PATH = SPECFILE_PATH
  60. if "BIND10_XFROUT_SOCKET_FILE" in os.environ:
  61. UNIX_SOCKET_FILE = os.environ["BIND10_XFROUT_SOCKET_FILE"]
  62. else:
  63. UNIX_SOCKET_FILE = "@@LOCALSTATEDIR@@/auth_xfrout_conn"
  64. init_paths()
  65. SPECFILE_LOCATION = SPECFILE_PATH + "/xfrout.spec"
  66. AUTH_SPECFILE_LOCATION = AUTH_SPECFILE_PATH + os.sep + "auth.spec"
  67. MAX_TRANSFERS_OUT = 10
  68. VERBOSE_MODE = False
  69. # tsig sign every N axfr packets.
  70. TSIG_SIGN_EVERY_NTH = 96
  71. XFROUT_MAX_MESSAGE_SIZE = 65535
  72. class XfroutException(Exception):
  73. pass
  74. def get_rrset_len(rrset):
  75. """Returns the wire length of the given RRset"""
  76. bytes = bytearray()
  77. rrset.to_wire(bytes)
  78. return len(bytes)
  79. class XfroutSession():
  80. def __init__(self, sock_fd, request_data, server, log, tsig_key_ring):
  81. # The initializer for the superclass may call functions
  82. # that need _log to be set, so we set it first
  83. self._sock_fd = sock_fd
  84. self._request_data = request_data
  85. self._server = server
  86. self._log = log
  87. self._tsig_key_ring = tsig_key_ring
  88. self._tsig_ctx = None
  89. self._tsig_len = 0
  90. self.handle()
  91. def create_tsig_ctx(self, tsig_record, tsig_key_ring):
  92. return TSIGContext(tsig_record.get_name(), tsig_record.get_rdata().get_algorithm(),
  93. tsig_key_ring)
  94. def handle(self):
  95. ''' Handle a xfrout query, send xfrout response '''
  96. try:
  97. self.dns_xfrout_start(self._sock_fd, self._request_data)
  98. #TODO, avoid catching all exceptions
  99. except Exception as e:
  100. self._log.log_message("error", str(e))
  101. os.close(self._sock_fd)
  102. def _check_request_tsig(self, msg, request_data):
  103. ''' If request has a tsig record, perform tsig related checks '''
  104. tsig_record = msg.get_tsig_record()
  105. if tsig_record is not None:
  106. self._tsig_len = tsig_record.get_length()
  107. self._tsig_ctx = self.create_tsig_ctx(tsig_record, self._tsig_key_ring)
  108. tsig_error = self._tsig_ctx.verify(tsig_record, request_data)
  109. if tsig_error != TSIGError.NOERROR:
  110. return Rcode.NOTAUTH()
  111. return Rcode.NOERROR()
  112. def _parse_query_message(self, mdata):
  113. ''' parse query message to [socket,message]'''
  114. #TODO, need to add parseHeader() in case the message header is invalid
  115. try:
  116. msg = Message(Message.PARSE)
  117. Message.from_wire(msg, mdata)
  118. # TSIG related checks
  119. rcode = self._check_request_tsig(msg, mdata)
  120. except Exception as err:
  121. self._log.log_message("error", str(err))
  122. return Rcode.FORMERR(), None
  123. return rcode, msg
  124. def _get_query_zone_name(self, msg):
  125. question = msg.get_question()[0]
  126. return question.get_name().to_text()
  127. def _send_data(self, sock_fd, data):
  128. size = len(data)
  129. total_count = 0
  130. while total_count < size:
  131. count = os.write(sock_fd, data[total_count:])
  132. total_count += count
  133. def _send_message(self, sock_fd, msg, tsig_ctx=None):
  134. render = MessageRenderer()
  135. # As defined in RFC5936 section3.4, perform case-preserving name
  136. # compression for AXFR message.
  137. render.set_compress_mode(MessageRenderer.CASE_SENSITIVE)
  138. render.set_length_limit(XFROUT_MAX_MESSAGE_SIZE)
  139. # XXX Currently, python wrapper doesn't accept 'None' parameter in this case,
  140. # we should remove the if statement and use a universal interface later.
  141. if tsig_ctx is not None:
  142. msg.to_wire(render, tsig_ctx)
  143. else:
  144. msg.to_wire(render)
  145. header_len = struct.pack('H', socket.htons(render.get_length()))
  146. self._send_data(sock_fd, header_len)
  147. self._send_data(sock_fd, render.get_data())
  148. def _reply_query_with_error_rcode(self, msg, sock_fd, rcode_):
  149. msg.make_response()
  150. msg.set_rcode(rcode_)
  151. self._send_message(sock_fd, msg, self._tsig_ctx)
  152. def _reply_query_with_format_error(self, msg, sock_fd):
  153. '''query message format isn't legal.'''
  154. if not msg:
  155. return # query message is invalid. send nothing back.
  156. msg.make_response()
  157. msg.set_rcode(Rcode.FORMERR())
  158. self._send_message(sock_fd, msg, self._tsig_ctx)
  159. def _zone_has_soa(self, zone):
  160. '''Judge if the zone has an SOA record.'''
  161. # In some sense, the SOA defines a zone.
  162. # If the current name server has authority for the
  163. # specific zone, we need to judge if the zone has an SOA record;
  164. # if not, we consider the zone has incomplete data, so xfrout can't
  165. # serve for it.
  166. if sqlite3_ds.get_zone_soa(zone, self._server.get_db_file()):
  167. return True
  168. return False
  169. def _zone_exist(self, zonename):
  170. '''Judge if the zone is configured by config manager.'''
  171. # Currently, if we find the zone in datasource successfully, we
  172. # consider the zone is configured, and the current name server has
  173. # authority for the specific zone.
  174. # TODO: should get zone's configuration from cfgmgr or other place
  175. # in future.
  176. return sqlite3_ds.zone_exist(zonename, self._server.get_db_file())
  177. def _check_xfrout_available(self, zone_name):
  178. '''Check if xfr request can be responsed.
  179. TODO, Get zone's configuration from cfgmgr or some other place
  180. eg. check allow_transfer setting,
  181. '''
  182. # If the current name server does not have authority for the
  183. # zone, xfrout can't serve for it, return rcode NOTAUTH.
  184. if not self._zone_exist(zone_name):
  185. return Rcode.NOTAUTH()
  186. # If we are an authoritative name server for the zone, but fail
  187. # to find the zone's SOA record in datasource, xfrout can't
  188. # provide zone transfer for it.
  189. if not self._zone_has_soa(zone_name):
  190. return Rcode.SERVFAIL()
  191. #TODO, check allow_transfer
  192. if not self._server.increase_transfers_counter():
  193. return Rcode.REFUSED()
  194. return Rcode.NOERROR()
  195. def dns_xfrout_start(self, sock_fd, msg_query):
  196. rcode_, msg = self._parse_query_message(msg_query)
  197. #TODO. create query message and parse header
  198. if rcode_ == Rcode.FORMERR():
  199. return self._reply_query_with_format_error(msg, sock_fd)
  200. elif rcode_ == Rcode.NOTAUTH():
  201. return self._reply_query_with_error_rcode(msg, sock_fd, rcode_)
  202. zone_name = self._get_query_zone_name(msg)
  203. rcode_ = self._check_xfrout_available(zone_name)
  204. if rcode_ != Rcode.NOERROR():
  205. self._log.log_message("info", "transfer of '%s/IN' failed: %s",
  206. zone_name, rcode_.to_text())
  207. return self. _reply_query_with_error_rcode(msg, sock_fd, rcode_)
  208. try:
  209. self._log.log_message("info", "transfer of '%s/IN': AXFR started" % zone_name)
  210. self._reply_xfrout_query(msg, sock_fd, zone_name)
  211. self._log.log_message("info", "transfer of '%s/IN': AXFR end" % zone_name)
  212. except Exception as err:
  213. self._log.log_message("error", str(err))
  214. self._server.decrease_transfers_counter()
  215. return
  216. def _clear_message(self, msg):
  217. qid = msg.get_qid()
  218. opcode = msg.get_opcode()
  219. rcode = msg.get_rcode()
  220. msg.clear(Message.RENDER)
  221. msg.set_qid(qid)
  222. msg.set_opcode(opcode)
  223. msg.set_rcode(rcode)
  224. msg.set_header_flag(Message.HEADERFLAG_AA)
  225. msg.set_header_flag(Message.HEADERFLAG_QR)
  226. return msg
  227. def _create_rrset_from_db_record(self, record):
  228. '''Create one rrset from one record of datasource, if the schema of record is changed,
  229. This function should be updated first.
  230. '''
  231. rrtype_ = RRType(record[5])
  232. rdata_ = Rdata(rrtype_, RRClass("IN"), " ".join(record[7:]))
  233. rrset_ = RRset(Name(record[2]), RRClass("IN"), rrtype_, RRTTL( int(record[4])))
  234. rrset_.add_rdata(rdata_)
  235. return rrset_
  236. def _send_message_with_last_soa(self, msg, sock_fd, rrset_soa, message_upper_len):
  237. '''Add the SOA record to the end of message. If it can't be
  238. added, a new message should be created to send out the last soa .
  239. '''
  240. rrset_len = get_rrset_len(rrset_soa)
  241. if message_upper_len + rrset_len + self._tsig_len < XFROUT_MAX_MESSAGE_SIZE:
  242. msg.add_rrset(Message.SECTION_ANSWER, rrset_soa)
  243. else:
  244. self._send_message(sock_fd, msg)
  245. msg = self._clear_message(msg)
  246. msg.add_rrset(Message.SECTION_ANSWER, rrset_soa)
  247. # If tsig context exist, sign the last packet
  248. self._send_message(sock_fd, msg, self._tsig_ctx)
  249. def _reply_xfrout_query(self, msg, sock_fd, zone_name):
  250. #TODO, there should be a better way to insert rrset.
  251. count_since_last_tsig_sign = TSIG_SIGN_EVERY_NTH
  252. msg.make_response()
  253. msg.set_header_flag(Message.HEADERFLAG_AA)
  254. soa_record = sqlite3_ds.get_zone_soa(zone_name, self._server.get_db_file())
  255. rrset_soa = self._create_rrset_from_db_record(soa_record)
  256. msg.add_rrset(Message.SECTION_ANSWER, rrset_soa)
  257. message_upper_len = get_rrset_len(rrset_soa) + self._tsig_len
  258. for rr_data in sqlite3_ds.get_zone_datas(zone_name, self._server.get_db_file()):
  259. if self._server._shutdown_event.is_set(): # Check if xfrout is shutdown
  260. self._log.log_message("info", "xfrout process is being shutdown")
  261. return
  262. # TODO: RRType.SOA() ?
  263. if RRType(rr_data[5]) == RRType("SOA"): #ignore soa record
  264. continue
  265. rrset_ = self._create_rrset_from_db_record(rr_data)
  266. # We calculate the maximum size of the RRset (i.e. the
  267. # size without compression) and use that to see if we
  268. # may have reached the limit
  269. rrset_len = get_rrset_len(rrset_)
  270. if message_upper_len + rrset_len < XFROUT_MAX_MESSAGE_SIZE:
  271. msg.add_rrset(Message.SECTION_ANSWER, rrset_)
  272. message_upper_len += rrset_len
  273. continue
  274. # If tsig context exist, sign every N packets
  275. if count_since_last_tsig_sign == TSIG_SIGN_EVERY_NTH:
  276. count_since_last_tsig_sign = 0
  277. self._send_message(sock_fd, msg, self._tsig_ctx)
  278. else:
  279. self._send_message(sock_fd, msg)
  280. count_since_last_tsig_sign += 1
  281. msg = self._clear_message(msg)
  282. msg.add_rrset(Message.SECTION_ANSWER, rrset_) # Add the rrset to the new message
  283. # Reserve tsig space for signed packet
  284. if count_since_last_tsig_sign == TSIG_SIGN_EVERY_NTH:
  285. message_upper_len = rrset_len + self._tsig_len
  286. else:
  287. message_upper_len = rrset_len
  288. self._send_message_with_last_soa(msg, sock_fd, rrset_soa, message_upper_len)
  289. class UnixSockServer(socketserver_mixin.NoPollMixIn, ThreadingUnixStreamServer):
  290. '''The unix domain socket server which accept xfr query sent from auth server.'''
  291. def __init__(self, sock_file, handle_class, shutdown_event, config_data, cc, log):
  292. self._remove_unused_sock_file(sock_file)
  293. self._sock_file = sock_file
  294. socketserver_mixin.NoPollMixIn.__init__(self)
  295. ThreadingUnixStreamServer.__init__(self, sock_file, handle_class)
  296. self._lock = threading.Lock()
  297. self._transfers_counter = 0
  298. self._shutdown_event = shutdown_event
  299. self._write_sock, self._read_sock = socket.socketpair()
  300. self._log = log
  301. self.update_config_data(config_data)
  302. self._cc = cc
  303. def _receive_query_message(self, sock):
  304. ''' receive request message from sock'''
  305. # receive data length
  306. data_len = sock.recv(2)
  307. if not data_len:
  308. return None
  309. msg_len = struct.unpack('!H', data_len)[0]
  310. # receive data
  311. recv_size = 0
  312. msgdata = b''
  313. while recv_size < msg_len:
  314. data = sock.recv(msg_len - recv_size)
  315. if not data:
  316. return None
  317. recv_size += len(data)
  318. msgdata += data
  319. return msgdata
  320. def handle_request(self):
  321. ''' Enable server handle a request until shutdown or auth is closed.'''
  322. try:
  323. request, client_address = self.get_request()
  324. except socket.error:
  325. self._log.log_message("error", "Failed to fetch request")
  326. return
  327. # Check self._shutdown_event to ensure the real shutdown comes.
  328. # Linux could trigger a spurious readable event on the _read_sock
  329. # due to a bug, so we need perform a double check.
  330. while not self._shutdown_event.is_set(): # Check if xfrout is shutdown
  331. try:
  332. (rlist, wlist, xlist) = select.select([self._read_sock, request], [], [])
  333. except select.error as e:
  334. if e.args[0] == errno.EINTR:
  335. (rlist, wlist, xlist) = ([], [], [])
  336. continue
  337. else:
  338. self._log.log_message("error", "Error with select(): %s" %e)
  339. break
  340. # self.server._shutdown_event will be set by now, if it is not a false
  341. # alarm
  342. if self._read_sock in rlist:
  343. continue
  344. try:
  345. self.process_request(request)
  346. except:
  347. self._log.log_message("error", "Exception happened during processing of %s"
  348. % str(client_address))
  349. break
  350. def _handle_request_noblock(self):
  351. """Override the function _handle_request_noblock(), it creates a new
  352. thread to handle requests for each auth"""
  353. td = threading.Thread(target=self.handle_request)
  354. td.setDaemon(True)
  355. td.start()
  356. def process_request(self, request):
  357. """Receive socket fd and query message from auth, then
  358. start a new thread to process the request."""
  359. sock_fd = recv_fd(request.fileno())
  360. if sock_fd < 0:
  361. # This may happen when one xfrout process try to connect to
  362. # xfrout unix socket server, to check whether there is another
  363. # xfrout running.
  364. if sock_fd == FD_COMM_ERROR:
  365. self._log.log_message("error", "Failed to receive the file descriptor for XFR connection")
  366. return
  367. # receive request msg
  368. request_data = self._receive_query_message(request)
  369. if not request_data:
  370. return
  371. t = threading.Thread(target = self.finish_request,
  372. args = (sock_fd, request_data))
  373. if self.daemon_threads:
  374. t.daemon = True
  375. t.start()
  376. def finish_request(self, sock_fd, request_data):
  377. '''Finish one request by instantiating RequestHandlerClass.'''
  378. self.RequestHandlerClass(sock_fd, request_data, self, self._log, self.tsig_key_ring)
  379. def _remove_unused_sock_file(self, sock_file):
  380. '''Try to remove the socket file. If the file is being used
  381. by one running xfrout process, exit from python.
  382. If it's not a socket file or nobody is listening
  383. , it will be removed. If it can't be removed, exit from python. '''
  384. if self._sock_file_in_use(sock_file):
  385. self._log.log_message("error", "Fail to start xfrout process, unix socket file '%s'"
  386. " is being used by another xfrout process\n" % sock_file)
  387. sys.exit(0)
  388. else:
  389. if not os.path.exists(sock_file):
  390. return
  391. try:
  392. os.unlink(sock_file)
  393. except OSError as err:
  394. self._log.log_message("error", "[b10-xfrout] Fail to remove file %s: %s\n" % (sock_file, err))
  395. sys.exit(0)
  396. def _sock_file_in_use(self, sock_file):
  397. '''Check whether the socket file 'sock_file' exists and
  398. is being used by one running xfrout process. If it is,
  399. return True, or else return False. '''
  400. try:
  401. sock = socket.socket(socket.AF_UNIX)
  402. sock.connect(sock_file)
  403. except socket.error as err:
  404. return False
  405. else:
  406. return True
  407. def shutdown(self):
  408. self._write_sock.send(b"shutdown") #terminate the xfrout session thread
  409. super().shutdown() # call the shutdown() of class socketserver_mixin.NoPollMixIn
  410. try:
  411. os.unlink(self._sock_file)
  412. except Exception as e:
  413. self._log.log_message('error', str(e))
  414. def update_config_data(self, new_config):
  415. '''Apply the new config setting of xfrout module. '''
  416. self._log.log_message('info', 'update config data start.')
  417. self._lock.acquire()
  418. self._max_transfers_out = new_config.get('transfers_out')
  419. self.set_tsig_key_ring(new_config.get('tsig_key_ring'))
  420. self._log.log_message('info', 'max transfer out : %d', self._max_transfers_out)
  421. self._lock.release()
  422. self._log.log_message('info', 'update config data complete.')
  423. def set_tsig_key_ring(self, key_list):
  424. """Set the tsig_key for this zone, given a TSIG key string
  425. representation. If tsig_key_str is None, no TSIG key will
  426. be set. Raises XfrinZoneInfoException if tsig_key_str cannot
  427. be parsed."""
  428. self.tsig_key_ring = TSIGKeyRing()
  429. # tsig_key_ring list is empty
  430. if not key_list:
  431. return
  432. for key_item in key_list:
  433. try:
  434. self.tsig_key_ring.add(TSIGKey(key_item))
  435. except InvalidParameter as ipe:
  436. errmsg = "bad TSIG key string: " + str(key_item)
  437. self._log.log_message('error', '%s' % errmsg)
  438. def get_db_file(self):
  439. file, is_default = self._cc.get_remote_config_value("Auth", "database_file")
  440. # this too should be unnecessary, but currently the
  441. # 'from build' override isn't stored in the config
  442. # (and we don't have indirect python access to datasources yet)
  443. if is_default and "B10_FROM_BUILD" in os.environ:
  444. file = os.environ["B10_FROM_BUILD"] + os.sep + "bind10_zones.sqlite3"
  445. return file
  446. def increase_transfers_counter(self):
  447. '''Return False, if counter + 1 > max_transfers_out, or else
  448. return True
  449. '''
  450. ret = False
  451. self._lock.acquire()
  452. if self._transfers_counter < self._max_transfers_out:
  453. self._transfers_counter += 1
  454. ret = True
  455. self._lock.release()
  456. return ret
  457. def decrease_transfers_counter(self):
  458. self._lock.acquire()
  459. self._transfers_counter -= 1
  460. self._lock.release()
  461. class XfroutServer:
  462. def __init__(self):
  463. self._unix_socket_server = None
  464. self._log = None
  465. self._listen_sock_file = UNIX_SOCKET_FILE
  466. self._shutdown_event = threading.Event()
  467. self._cc = isc.config.ModuleCCSession(SPECFILE_LOCATION, self.config_handler, self.command_handler)
  468. self._config_data = self._cc.get_full_config()
  469. self._cc.start()
  470. self._cc.add_remote_config(AUTH_SPECFILE_LOCATION);
  471. self._log = isc.log.NSLogger(self._config_data.get('log_name'), self._config_data.get('log_file'),
  472. self._config_data.get('log_severity'), self._config_data.get('log_versions'),
  473. self._config_data.get('log_max_bytes'), True)
  474. self._start_xfr_query_listener()
  475. self._start_notifier()
  476. def _start_xfr_query_listener(self):
  477. '''Start a new thread to accept xfr query. '''
  478. self._unix_socket_server = UnixSockServer(self._listen_sock_file, XfroutSession,
  479. self._shutdown_event, self._config_data,
  480. self._cc, self._log);
  481. listener = threading.Thread(target=self._unix_socket_server.serve_forever)
  482. listener.start()
  483. def _start_notifier(self):
  484. datasrc = self._unix_socket_server.get_db_file()
  485. self._notifier = notify_out.NotifyOut(datasrc, self._log)
  486. self._notifier.dispatcher()
  487. def send_notify(self, zone_name, zone_class):
  488. self._notifier.send_notify(zone_name, zone_class)
  489. def config_handler(self, new_config):
  490. '''Update config data. TODO. Do error check'''
  491. answer = create_answer(0)
  492. for key in new_config:
  493. if key not in self._config_data:
  494. answer = create_answer(1, "Unknown config data: " + str(key))
  495. continue
  496. self._config_data[key] = new_config[key]
  497. if self._log:
  498. self._log.update_config(new_config)
  499. if self._unix_socket_server:
  500. self._unix_socket_server.update_config_data(self._config_data)
  501. return answer
  502. def shutdown(self):
  503. ''' shutdown the xfrout process. The thread which is doing zone transfer-out should be
  504. terminated.
  505. '''
  506. global xfrout_server
  507. xfrout_server = None #Avoid shutdown is called twice
  508. self._shutdown_event.set()
  509. self._notifier.shutdown()
  510. if self._unix_socket_server:
  511. self._unix_socket_server.shutdown()
  512. # Wait for all threads to terminate
  513. main_thread = threading.currentThread()
  514. for th in threading.enumerate():
  515. if th is main_thread:
  516. continue
  517. th.join()
  518. def command_handler(self, cmd, args):
  519. if cmd == "shutdown":
  520. self._log.log_message("info", "Received shutdown command.")
  521. self.shutdown()
  522. answer = create_answer(0)
  523. elif cmd == notify_out.ZONE_NEW_DATA_READY_CMD:
  524. zone_name = args.get('zone_name')
  525. zone_class = args.get('zone_class')
  526. if zone_name and zone_class:
  527. self._log.log_message("info", "zone '%s/%s': receive notify others command" \
  528. % (zone_name, zone_class))
  529. self.send_notify(zone_name, zone_class)
  530. answer = create_answer(0)
  531. else:
  532. answer = create_answer(1, "Bad command parameter:" + str(args))
  533. else:
  534. answer = create_answer(1, "Unknown command:" + str(cmd))
  535. return answer
  536. def run(self):
  537. '''Get and process all commands sent from cfgmgr or other modules. '''
  538. while not self._shutdown_event.is_set():
  539. self._cc.check_command(False)
  540. xfrout_server = None
  541. def signal_handler(signal, frame):
  542. if xfrout_server:
  543. xfrout_server.shutdown()
  544. sys.exit(0)
  545. def set_signal_handler():
  546. signal.signal(signal.SIGTERM, signal_handler)
  547. signal.signal(signal.SIGINT, signal_handler)
  548. def set_cmd_options(parser):
  549. parser.add_option("-v", "--verbose", dest="verbose", action="store_true",
  550. help="display more about what is going on")
  551. if '__main__' == __name__:
  552. try:
  553. parser = OptionParser()
  554. set_cmd_options(parser)
  555. (options, args) = parser.parse_args()
  556. VERBOSE_MODE = options.verbose
  557. set_signal_handler()
  558. xfrout_server = XfroutServer()
  559. xfrout_server.run()
  560. except KeyboardInterrupt:
  561. sys.stderr.write("[b10-xfrout] exit xfrout process\n")
  562. except SessionError as e:
  563. sys.stderr.write("[b10-xfrout] Error creating xfrout, "
  564. "is the command channel daemon running?\n")
  565. except SessionTimeout as e:
  566. sys.stderr.write("[b10-xfrout] Error creating xfrout, "
  567. "is the configuration manager running?\n")
  568. except ModuleCCSessionError as e:
  569. sys.stderr.write("[b10-xfrout] exit xfrout process:%s\n" % str(e))
  570. if xfrout_server:
  571. xfrout_server.shutdown()