1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
|
/*
* options.h -- nsd.conf options definitions and prototypes
*
* Copyright (c) 2001-2011, NLnet Labs. All rights reserved.
*
* See LICENSE for the license.
*
*/
#ifndef OPTIONS_H
#define OPTIONS_H
#include "config.h"
#include <stdarg.h>
#include "region-allocator.h"
#include "rbtree.h"
struct query;
struct dname;
struct tsig_key;
typedef struct nsd_options nsd_options_t;
typedef struct zone_options zone_options_t;
typedef struct ipaddress_option ip_address_option_t;
typedef struct acl_options acl_options_t;
typedef struct key_options key_options_t;
typedef struct config_parser_state config_parser_state_t;
/*
* Options global for nsd.
*/
struct nsd_options {
/* options for zones, by apex, contains zone_options_t */
rbtree_t* zone_options;
/* list of keys defined */
key_options_t* keys;
size_t numkeys;
/* list of ip adresses to bind to (or NULL for all) */
ip_address_option_t* ip_addresses;
int debug_mode;
int verbosity;
int hide_version;
int ip4_only;
int ip6_only;
const char* database;
const char* identity;
const char* logfile;
int server_count;
int tcp_count;
int tcp_query_count;
int tcp_timeout;
size_t ipv4_edns_size;
size_t ipv6_edns_size;
const char* pidfile;
const char* port;
int statistics;
const char* zonestatsfile;
const char* chroot;
const char* username;
const char* zonesdir;
const char* difffile;
const char* xfrdfile;
const char* nsid;
int xfrd_reload_timeout;
region_type* region;
};
struct ipaddress_option {
ip_address_option_t* next;
char* address;
};
/*
* Options for a zone
*/
struct zone_options {
/* key is dname of apex */
rbnode_t node;
/* is apex of the zone */
const char* name;
const char* zonefile;
acl_options_t* allow_notify;
acl_options_t* request_xfr;
acl_options_t* notify;
acl_options_t* provide_xfr;
acl_options_t* outgoing_interface;
uint8_t allow_axfr_fallback;
uint8_t notify_retry;
};
union acl_addr_storage {
#ifdef INET6
struct in_addr addr;
struct in6_addr addr6;
#else
struct in_addr addr;
#endif
};
/*
* Access control list element
*/
struct acl_options {
acl_options_t* next;
/* options */
uint8_t use_axfr_only;
uint8_t allow_udp;
time_t ixfr_disabled;
/* ip address range */
const char* ip_address_spec;
uint8_t is_ipv6;
unsigned int port; /* is 0(no port) or suffix @port value */
union acl_addr_storage addr;
union acl_addr_storage range_mask;
enum {
acl_range_single = 0, /* single adress */
acl_range_mask = 1, /* 10.20.30.40&255.255.255.0 */
acl_range_subnet = 2, /* 10.20.30.40/28 */
acl_range_minmax = 3 /* 10.20.30.40-10.20.30.60 (mask=max) */
} rangetype;
/* key */
uint8_t nokey;
uint8_t blocked;
const char* key_name;
key_options_t* key_options;
};
/*
* Key definition
*/
struct key_options {
key_options_t* next;
const char* name;
const char* algorithm;
const char* secret;
struct tsig_key* tsig_key;
};
/*
* Used during options parsing
*/
struct config_parser_state {
const char* filename;
int line;
int errors;
nsd_options_t* opt;
zone_options_t* current_zone;
key_options_t* current_key;
ip_address_option_t* current_ip_address_option;
acl_options_t* current_allow_notify;
acl_options_t* current_request_xfr;
acl_options_t* current_notify;
acl_options_t* current_provide_xfr;
acl_options_t* current_outgoing_interface;
};
extern config_parser_state_t* cfg_parser;
/* region will be put in nsd_options struct. Returns empty options struct. */
nsd_options_t* nsd_options_create(region_type* region);
/* the number of zones that are configured */
static inline size_t nsd_options_num_zones(nsd_options_t* opt)
{ return opt->zone_options->count; }
/* insert a zone into the main options tree, returns 0 on error */
int nsd_options_insert_zone(nsd_options_t* opt, zone_options_t* zone);
/* parses options file. Returns false on failure */
int parse_options_file(nsd_options_t* opt, const char* file);
zone_options_t* zone_options_create(region_type* region);
/* find a zone by apex domain name, or NULL if not found. */
zone_options_t* zone_options_find(nsd_options_t* opt, const struct dname* apex);
key_options_t* key_options_create(region_type* region);
key_options_t* key_options_find(nsd_options_t* opt, const char* name);
#if defined(HAVE_SSL)
/* tsig must be inited, adds all keys in options to tsig. */
void key_options_tsig_add(nsd_options_t* opt);
#endif
/* check acl list, acl number that matches if passed(0..),
* or failure (-1) if dropped */
/* the reason why (the acl) is returned too (or NULL) */
int acl_check_incoming(acl_options_t* acl, struct query* q,
acl_options_t** reason);
int acl_addr_matches(acl_options_t* acl, struct query* q);
int acl_key_matches(acl_options_t* acl, struct query* q);
int acl_addr_match_mask(uint32_t* a, uint32_t* b, uint32_t* mask, size_t sz);
int acl_addr_match_range(uint32_t* minval, uint32_t* x, uint32_t* maxval, size_t sz);
/* returns true if acls are both from the same host */
int acl_same_host(acl_options_t* a, acl_options_t* b);
/* find acl by number in the list */
acl_options_t* acl_find_num(acl_options_t* acl, int num);
/* see if a zone is a slave or a master zone */
int zone_is_slave(zone_options_t* opt);
/* parsing helpers */
void c_error(const char* msg);
void c_error_msg(const char* fmt, ...) ATTR_FORMAT(printf, 1, 2);
acl_options_t* parse_acl_info(region_type* region, char* ip, const char* key);
/* true if ipv6 address, false if ipv4 */
int parse_acl_is_ipv6(const char* p);
/* returns range type. mask is the 2nd part of the range */
int parse_acl_range_type(char* ip, char** mask);
/* parses subnet mask, fills 0 mask as well */
void parse_acl_range_subnet(char* p, void* addr, int maxbits);
/* clean up options */
void nsd_options_destroy(nsd_options_t* opt);
#endif /* OPTIONS_H */
|