]>
Commit | Line | Data |
---|---|---|
12c86877 | 1 | /* |
6edbf68a PL |
2 | * This file is part of PowerDNS or dnsdist. |
3 | * Copyright -- PowerDNS.COM B.V. and its contributors | |
4 | * | |
5 | * This program is free software; you can redistribute it and/or modify | |
6 | * it under the terms of version 2 of the GNU General Public License as | |
7 | * published by the Free Software Foundation. | |
8 | * | |
9 | * In addition, for the avoidance of any doubt, permission is granted to | |
10 | * link this program with OpenSSL and to (re)distribute the binaries | |
11 | * produced as the result of such linking. | |
12 | * | |
13 | * This program is distributed in the hope that it will be useful, | |
14 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
15 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
16 | * GNU General Public License for more details. | |
17 | * | |
18 | * You should have received a copy of the GNU General Public License | |
19 | * along with this program; if not, write to the Free Software | |
20 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. | |
21 | */ | |
870a0fe4 AT |
22 | #ifdef HAVE_CONFIG_H |
23 | #include "config.h" | |
24 | #endif | |
cb433f9c BH |
25 | #include <boost/archive/binary_iarchive.hpp> |
26 | #include <boost/archive/binary_oarchive.hpp> | |
27 | ||
bf269e28 | 28 | #include "auth-querycache.hh" |
12c86877 | 29 | #include "utility.hh" |
c6566265 | 30 | |
c6566265 | 31 | |
96349507 | 32 | #include <dlfcn.h> |
12c86877 BH |
33 | #include <string> |
34 | #include <map> | |
35 | #include <sys/types.h> | |
cb433f9c | 36 | #include <sstream> |
12c86877 BH |
37 | #include <errno.h> |
38 | #include <iostream> | |
39 | #include <sstream> | |
40 | #include <functional> | |
fa8fd4d2 | 41 | |
12c86877 BH |
42 | #include "dns.hh" |
43 | #include "arguments.hh" | |
44 | #include "dnsbackend.hh" | |
45 | #include "ueberbackend.hh" | |
46 | #include "dnspacket.hh" | |
47 | #include "logger.hh" | |
48 | #include "statbag.hh" | |
12c86877 BH |
49 | |
50 | extern StatBag S; | |
51 | ||
52 | vector<UeberBackend *>UeberBackend::instances; | |
53 | pthread_mutex_t UeberBackend::instances_lock=PTHREAD_MUTEX_INITIALIZER; | |
54 | ||
12c86877 BH |
55 | // initially we are blocked |
56 | bool UeberBackend::d_go=false; | |
57 | pthread_mutex_t UeberBackend::d_mut = PTHREAD_MUTEX_INITIALIZER; | |
58 | pthread_cond_t UeberBackend::d_cond = PTHREAD_COND_INITIALIZER; | |
59 | ||
12c86877 BH |
60 | //! Loads a module and reports it to all UeberBackend threads |
61 | bool UeberBackend::loadmodule(const string &name) | |
62 | { | |
e6a9dde5 | 63 | g_log<<Logger::Warning <<"Loading '"<<name<<"'" << endl; |
74caf870 | 64 | |
12c86877 | 65 | void *dlib=dlopen(name.c_str(), RTLD_NOW); |
74caf870 | 66 | |
12c86877 | 67 | if(dlib == NULL) { |
e6a9dde5 | 68 | g_log<<Logger::Error <<"Unable to load module '"<<name<<"': "<<dlerror() << endl; |
12c86877 BH |
69 | return false; |
70 | } | |
74caf870 | 71 | |
12c86877 | 72 | return true; |
12c86877 BH |
73 | } |
74 | ||
d4168b30 CHB |
75 | bool UeberBackend::loadModules(const vector<string>& modules, const string& path) |
76 | { | |
77 | for (const auto& module: modules) { | |
78 | bool res; | |
79 | if (module.find(".")==string::npos) { | |
80 | res = UeberBackend::loadmodule(path+"/lib"+module+"backend.so"); | |
81 | } else if (module[0]=='/' || (module[0]=='.' && module[1]=='/') || (module[0]=='.' && module[1]=='.')) { | |
82 | // absolute or current path | |
83 | res = UeberBackend::loadmodule(module); | |
84 | } else { | |
85 | res = UeberBackend::loadmodule(path+"/"+module); | |
86 | } | |
87 | ||
88 | if (res == false) { | |
89 | return false; | |
90 | } | |
91 | } | |
92 | return true; | |
93 | } | |
94 | ||
12c86877 BH |
95 | void UeberBackend::go(void) |
96 | { | |
97 | pthread_mutex_lock(&d_mut); | |
98 | d_go=true; | |
99 | pthread_cond_broadcast(&d_cond); | |
100 | pthread_mutex_unlock(&d_mut); | |
101 | } | |
102 | ||
47bddbb7 | 103 | bool UeberBackend::getDomainInfo(const DNSName &domain, DomainInfo &di, bool getSerial) |
12c86877 BH |
104 | { |
105 | for(vector<DNSBackend *>::const_iterator i=backends.begin();i!=backends.end();++i) | |
47bddbb7 | 106 | if((*i)->getDomainInfo(domain, di, getSerial)) |
12c86877 BH |
107 | return true; |
108 | return false; | |
109 | } | |
110 | ||
675fa24c | 111 | bool UeberBackend::createDomain(const DNSName &domain) |
487cf033 | 112 | { |
ef7cd021 | 113 | for(DNSBackend* mydb : backends) { |
487cf033 | 114 | if(mydb->createDomain(domain)) { |
487cf033 CH |
115 | return true; |
116 | } | |
117 | } | |
118 | return false; | |
119 | } | |
120 | ||
7fa35c07 KM |
121 | bool UeberBackend::doesDNSSEC() |
122 | { | |
123 | for(auto* db : backends) { | |
124 | if(db->doesDNSSEC()) | |
125 | return true; | |
126 | } | |
127 | return false; | |
128 | } | |
129 | ||
82cc0761 | 130 | bool UeberBackend::addDomainKey(const DNSName& name, const DNSBackend::KeyData& key, int64_t& id) |
c0273500 | 131 | { |
82cc0761 | 132 | id = -1; |
ef7cd021 | 133 | for(DNSBackend* db : backends) { |
82cc0761 BZ |
134 | if(db->addDomainKey(name, key, id)) |
135 | return true; | |
c0273500 | 136 | } |
82cc0761 | 137 | return false; |
c0273500 | 138 | } |
9c1c5d49 | 139 | bool UeberBackend::getDomainKeys(const DNSName& name, std::vector<DNSBackend::KeyData>& keys) |
c0273500 | 140 | { |
ef7cd021 | 141 | for(DNSBackend* db : backends) { |
9c1c5d49 | 142 | if(db->getDomainKeys(name, keys)) |
c0273500 BH |
143 | return true; |
144 | } | |
145 | return false; | |
146 | } | |
147 | ||
675fa24c | 148 | bool UeberBackend::getAllDomainMetadata(const DNSName& name, std::map<std::string, std::vector<std::string> >& meta) |
ac993e0a | 149 | { |
ef7cd021 | 150 | for(DNSBackend* db : backends) { |
ac993e0a AT |
151 | if(db->getAllDomainMetadata(name, meta)) |
152 | return true; | |
153 | } | |
154 | return false; | |
155 | } | |
156 | ||
675fa24c | 157 | bool UeberBackend::getDomainMetadata(const DNSName& name, const std::string& kind, std::vector<std::string>& meta) |
c0273500 | 158 | { |
ef7cd021 | 159 | for(DNSBackend* db : backends) { |
c0273500 BH |
160 | if(db->getDomainMetadata(name, kind, meta)) |
161 | return true; | |
162 | } | |
163 | return false; | |
164 | } | |
165 | ||
675fa24c | 166 | bool UeberBackend::setDomainMetadata(const DNSName& name, const std::string& kind, const std::vector<std::string>& meta) |
c0273500 | 167 | { |
ef7cd021 | 168 | for(DNSBackend* db : backends) { |
c0273500 BH |
169 | if(db->setDomainMetadata(name, kind, meta)) |
170 | return true; | |
171 | } | |
172 | return false; | |
173 | } | |
174 | ||
675fa24c | 175 | bool UeberBackend::activateDomainKey(const DNSName& name, unsigned int id) |
4496f66f | 176 | { |
ef7cd021 | 177 | for(DNSBackend* db : backends) { |
4496f66f BH |
178 | if(db->activateDomainKey(name, id)) |
179 | return true; | |
180 | } | |
181 | return false; | |
182 | } | |
183 | ||
675fa24c | 184 | bool UeberBackend::deactivateDomainKey(const DNSName& name, unsigned int id) |
4496f66f | 185 | { |
ef7cd021 | 186 | for(DNSBackend* db : backends) { |
4496f66f BH |
187 | if(db->deactivateDomainKey(name, id)) |
188 | return true; | |
189 | } | |
190 | return false; | |
191 | } | |
192 | ||
675fa24c | 193 | bool UeberBackend::removeDomainKey(const DNSName& name, unsigned int id) |
4496f66f | 194 | { |
ef7cd021 | 195 | for(DNSBackend* db : backends) { |
4496f66f BH |
196 | if(db->removeDomainKey(name, id)) |
197 | return true; | |
198 | } | |
199 | return false; | |
200 | } | |
201 | ||
c0273500 | 202 | |
675fa24c | 203 | bool UeberBackend::getTSIGKey(const DNSName& name, DNSName* algorithm, string* content) |
78bcb858 | 204 | { |
ef7cd021 | 205 | for(DNSBackend* db : backends) { |
78bcb858 BH |
206 | if(db->getTSIGKey(name, algorithm, content)) |
207 | return true; | |
208 | } | |
209 | return false; | |
210 | } | |
211 | ||
212 | ||
675fa24c | 213 | bool UeberBackend::setTSIGKey(const DNSName& name, const DNSName& algorithm, const string& content) |
6f872b78 | 214 | { |
ef7cd021 | 215 | for(DNSBackend* db : backends) { |
6f872b78 AT |
216 | if(db->setTSIGKey(name, algorithm, content)) |
217 | return true; | |
218 | } | |
219 | return false; | |
220 | } | |
221 | ||
675fa24c | 222 | bool UeberBackend::deleteTSIGKey(const DNSName& name) |
6f872b78 | 223 | { |
ef7cd021 | 224 | for(DNSBackend* db : backends) { |
6f872b78 AT |
225 | if(db->deleteTSIGKey(name)) |
226 | return true; | |
227 | } | |
228 | return false; | |
229 | } | |
230 | ||
231 | bool UeberBackend::getTSIGKeys(std::vector< struct TSIGKey > &keys) | |
232 | { | |
ef7cd021 | 233 | for(DNSBackend* db : backends) { |
6f872b78 AT |
234 | db->getTSIGKeys(keys); |
235 | } | |
236 | return true; | |
237 | } | |
238 | ||
12c86877 BH |
239 | void UeberBackend::reload() |
240 | { | |
241 | for ( vector< DNSBackend * >::iterator i = backends.begin(); i != backends.end(); ++i ) | |
242 | { | |
243 | ( *i )->reload(); | |
244 | } | |
245 | } | |
246 | ||
973ad2b5 | 247 | void UeberBackend::rediscover(string *status) |
12c86877 | 248 | { |
20ca8e7d | 249 | |
12c86877 BH |
250 | for ( vector< DNSBackend * >::iterator i = backends.begin(); i != backends.end(); ++i ) |
251 | { | |
973ad2b5 BH |
252 | string tmpstr; |
253 | ( *i )->rediscover(&tmpstr); | |
6242d8a4 KM |
254 | if(status) |
255 | *status+=tmpstr + (i!=backends.begin() ? "\n" : ""); | |
12c86877 BH |
256 | } |
257 | } | |
258 | ||
259 | ||
260 | void UeberBackend::getUnfreshSlaveInfos(vector<DomainInfo>* domains) | |
261 | { | |
262 | for ( vector< DNSBackend * >::iterator i = backends.begin(); i != backends.end(); ++i ) | |
263 | { | |
264 | ( *i )->getUnfreshSlaveInfos( domains ); | |
265 | } | |
266 | } | |
267 | ||
268 | ||
269 | ||
270 | void UeberBackend::getUpdatedMasters(vector<DomainInfo>* domains) | |
271 | { | |
272 | for ( vector< DNSBackend * >::iterator i = backends.begin(); i != backends.end(); ++i ) | |
273 | { | |
274 | ( *i )->getUpdatedMasters( domains ); | |
275 | } | |
276 | } | |
277 | ||
cec52de6 | 278 | bool UeberBackend::getAuth(const DNSName &target, const QType& qtype, SOAData* sd, bool cachedOk) |
c14bc34a | 279 | { |
942d4729 KM |
280 | // A backend can respond to our authority request with the 'best' match it |
281 | // has. For example, when asked for a.b.c.example.com. it might respond with | |
282 | // com. We then store that and keep querying the other backends in case one | |
283 | // of them has a more specific zone but don't bother asking this specific | |
284 | // backend again for b.c.example.com., c.example.com. and example.com. | |
285 | // If a backend has no match it may respond with an enmpty qname. | |
286 | ||
5b9ac871 KM |
287 | bool found = false; |
288 | int cstat; | |
942d4729 | 289 | DNSName shorter(target); |
5b9ac871 KM |
290 | vector<pair<size_t, SOAData> > bestmatch (backends.size(), make_pair(target.wirelength()+1, SOAData())); |
291 | do { | |
292 | ||
293 | // Check cache | |
cec52de6 | 294 | if(cachedOk && (d_cache_ttl || d_negcache_ttl)) { |
5b9ac871 | 295 | d_question.qtype = QType::SOA; |
942d4729 | 296 | d_question.qname = shorter; |
5b9ac871 KM |
297 | d_question.zoneId = -1; |
298 | ||
299 | cstat = cacheHas(d_question,d_answers); | |
300 | ||
301 | if(cstat == 1 && !d_answers.empty() && d_cache_ttl) { | |
e6a9dde5 | 302 | DLOG(g_log<<Logger::Error<<"has pos cache entry: "<<shorter<<endl); |
90ba52e0 | 303 | fillSOAData(d_answers[0], *sd); |
304 | ||
5b9ac871 | 305 | sd->db = 0; |
942d4729 | 306 | sd->qname = shorter; |
5b9ac871 KM |
307 | goto found; |
308 | } else if(cstat == 0 && d_negcache_ttl) { | |
e6a9dde5 | 309 | DLOG(g_log<<Logger::Error<<"has neg cache entry: "<<shorter<<endl); |
5b9ac871 | 310 | continue; |
c14bc34a | 311 | } |
c14bc34a | 312 | } |
f70be3c3 | 313 | |
5b9ac871 KM |
314 | // Check backends |
315 | { | |
316 | vector<DNSBackend *>::const_iterator i = backends.begin(); | |
317 | vector<pair<size_t, SOAData> >::iterator j = bestmatch.begin(); | |
318 | for(; i != backends.end() && j != bestmatch.end(); ++i, ++j) { | |
319 | ||
e6a9dde5 | 320 | DLOG(g_log<<Logger::Error<<"backend: "<<i-backends.begin()<<", qname: "<<shorter<<endl); |
5b9ac871 | 321 | |
942d4729 | 322 | if(j->first < shorter.wirelength()) { |
e6a9dde5 | 323 | DLOG(g_log<<Logger::Error<<"skipped, we already found a shorter best match in this backend: "<<j->second.qname<<endl); |
5b9ac871 | 324 | continue; |
942d4729 | 325 | } else if(j->first == shorter.wirelength()) { |
e6a9dde5 | 326 | DLOG(g_log<<Logger::Error<<"use shorter best match: "<<j->second.qname<<endl); |
5b9ac871 KM |
327 | *sd = j->second; |
328 | break; | |
329 | } else { | |
e6a9dde5 | 330 | DLOG(g_log<<Logger::Error<<"lookup: "<<shorter<<endl); |
942d4729 | 331 | if((*i)->getAuth(shorter, sd)) { |
e6a9dde5 | 332 | DLOG(g_log<<Logger::Error<<"got: "<<sd->qname<<endl); |
5b9ac871 | 333 | j->first = sd->qname.wirelength(); |
bee25428 | 334 | j->second = *sd; |
942d4729 | 335 | if(sd->qname == shorter) { |
5b9ac871 KM |
336 | break; |
337 | } | |
338 | } else { | |
e6a9dde5 | 339 | DLOG(g_log<<Logger::Error<<"no match for: "<<shorter<<endl); |
5b9ac871 KM |
340 | } |
341 | } | |
f70be3c3 | 342 | } |
c14bc34a | 343 | |
5b9ac871 KM |
344 | // Add to cache |
345 | if(i == backends.end()) { | |
346 | if(d_negcache_ttl) { | |
e6a9dde5 | 347 | DLOG(g_log<<Logger::Error<<"add neg cache entry:"<<shorter<<endl); |
942d4729 | 348 | d_question.qname=shorter; |
5b9ac871 KM |
349 | addNegCache(d_question); |
350 | } | |
351 | continue; | |
352 | } else if(d_cache_ttl) { | |
e6a9dde5 | 353 | DLOG(g_log<<Logger::Error<<"add pos cache entry: "<<sd->qname<<endl); |
c14bc34a MZ |
354 | d_question.qtype = QType::SOA; |
355 | d_question.qname = sd->qname; | |
356 | d_question.zoneId = -1; | |
357 | ||
90ba52e0 | 358 | DNSZoneRecord rr; |
359 | rr.dr.d_name = sd->qname; | |
360 | rr.dr.d_type = QType::SOA; | |
90ba52e0 | 361 | rr.dr.d_content = makeSOAContent(*sd); |
362 | rr.dr.d_ttl = sd->ttl; | |
c14bc34a | 363 | rr.domain_id = sd->domain_id; |
90ba52e0 | 364 | |
365 | addCache(d_question, {rr}); | |
5b9ac871 | 366 | } |
c14bc34a MZ |
367 | } |
368 | ||
5b9ac871 | 369 | found: |
942d4729 | 370 | if(found == (qtype == QType::DS) || target != shorter) { |
e6a9dde5 | 371 | DLOG(g_log<<Logger::Error<<"found: "<<sd->qname<<endl); |
5b9ac871 KM |
372 | return true; |
373 | } else { | |
e6a9dde5 | 374 | DLOG(g_log<<Logger::Error<<"chasing next: "<<sd->qname<<endl); |
5b9ac871 KM |
375 | found = true; |
376 | } | |
377 | ||
942d4729 | 378 | } while(shorter.chopOff()); |
5b9ac871 | 379 | return found; |
c14bc34a MZ |
380 | } |
381 | ||
94bfa5b6 | 382 | bool UeberBackend::getSOA(const DNSName &domain, SOAData &sd) |
12c86877 BH |
383 | { |
384 | d_question.qtype=QType::SOA; | |
385 | d_question.qname=domain; | |
386 | d_question.zoneId=-1; | |
387 | ||
79ba7763 CH |
388 | int cstat=cacheHas(d_question,d_answers); |
389 | if(cstat==0) { // negative | |
390 | return false; | |
12c86877 | 391 | } |
79ba7763 | 392 | else if(cstat==1 && !d_answers.empty()) { |
90ba52e0 | 393 | fillSOAData(d_answers[0],sd); |
79ba7763 | 394 | sd.domain_id=d_answers[0].domain_id; |
90ba52e0 | 395 | sd.ttl=d_answers[0].dr.d_ttl; |
79ba7763 CH |
396 | sd.db=0; |
397 | return true; | |
398 | } | |
399 | ||
400 | // not found in neg. or pos. cache, look it up | |
76e1255a | 401 | return getSOAUncached(domain, sd); |
79ba7763 CH |
402 | } |
403 | ||
76e1255a | 404 | bool UeberBackend::getSOAUncached(const DNSName &domain, SOAData &sd) |
79ba7763 CH |
405 | { |
406 | d_question.qtype=QType::SOA; | |
407 | d_question.qname=domain; | |
408 | d_question.zoneId=-1; | |
409 | ||
12c86877 | 410 | for(vector<DNSBackend *>::const_iterator i=backends.begin();i!=backends.end();++i) |
76e1255a KM |
411 | if((*i)->getSOA(domain, sd)) { |
412 | if(d_cache_ttl) { | |
90ba52e0 | 413 | DNSZoneRecord rr; |
414 | rr.dr.d_name = sd.qname; | |
415 | rr.dr.d_type = QType::SOA; | |
90ba52e0 | 416 | rr.dr.d_content = makeSOAContent(sd); |
417 | rr.dr.d_ttl = sd.ttl; | |
418 | rr.domain_id = sd.domain_id; | |
419 | ||
420 | addCache(d_question, {rr}); | |
421 | ||
f1d64762 | 422 | } |
12c86877 BH |
423 | return true; |
424 | } | |
425 | ||
b87f301b KM |
426 | if(d_negcache_ttl) |
427 | addNegCache(d_question); | |
12c86877 BH |
428 | return false; |
429 | } | |
430 | ||
675fa24c | 431 | bool UeberBackend::superMasterBackend(const string &ip, const DNSName &domain, const vector<DNSResourceRecord>&nsset, string *nameserver, string *account, DNSBackend **db) |
12c86877 BH |
432 | { |
433 | for(vector<DNSBackend *>::const_iterator i=backends.begin();i!=backends.end();++i) | |
719f9024 | 434 | if((*i)->superMasterBackend(ip, domain, nsset, nameserver, account, db)) |
12c86877 BH |
435 | return true; |
436 | return false; | |
12c86877 BH |
437 | } |
438 | ||
12c86877 BH |
439 | UeberBackend::UeberBackend(const string &pname) |
440 | { | |
12c86877 BH |
441 | pthread_mutex_lock(&instances_lock); |
442 | instances.push_back(this); // report to the static list of ourself | |
443 | pthread_mutex_unlock(&instances_lock); | |
444 | ||
51d01c80 AT |
445 | d_negcached=0; |
446 | d_ancount=0; | |
ce4a60ce | 447 | d_domain_id=-1; |
51d01c80 | 448 | d_cached=0; |
f1d64762 MZ |
449 | d_cache_ttl = ::arg().asNum("query-cache-ttl"); |
450 | d_negcache_ttl = ::arg().asNum("negquery-cache-ttl"); | |
451 | ||
ce4a60ce CH |
452 | d_tid=pthread_self(); |
453 | d_stale=false; | |
12c86877 | 454 | |
e0d84497 | 455 | backends=BackendMakers().all(pname=="key-only"); |
12c86877 BH |
456 | } |
457 | ||
12c86877 BH |
458 | void del(DNSBackend* d) |
459 | { | |
460 | delete d; | |
461 | } | |
462 | ||
463 | void UeberBackend::cleanup() | |
464 | { | |
465 | pthread_mutex_lock(&instances_lock); | |
466 | ||
467 | remove(instances.begin(),instances.end(),this); | |
468 | instances.resize(instances.size()-1); | |
469 | ||
470 | pthread_mutex_unlock(&instances_lock); | |
471 | ||
6242d8a4 | 472 | for_each(backends.begin(),backends.end(),del); |
12c86877 BH |
473 | } |
474 | ||
cb433f9c | 475 | // returns -1 for miss, 0 for negative match, 1 for hit |
90ba52e0 | 476 | int UeberBackend::cacheHas(const Question &q, vector<DNSZoneRecord> &rrs) |
12c86877 | 477 | { |
bf269e28 | 478 | extern AuthQueryCache QC; |
12c86877 | 479 | |
f1d64762 | 480 | if(!d_cache_ttl && ! d_negcache_ttl) { |
12c86877 BH |
481 | return -1; |
482 | } | |
483 | ||
a3b6f8d0 | 484 | rrs.clear(); |
e6a9dde5 | 485 | // g_log<<Logger::Warning<<"looking up: '"<<q.qname+"'|N|"+q.qtype.getName()+"|"+itoa(q.zoneId)<<endl; |
cf71f03f | 486 | |
bf269e28 | 487 | bool ret=QC.getEntry(q.qname, q.qtype, rrs, q.zoneId); // think about lowercasing here |
12c86877 | 488 | if(!ret) { |
12c86877 BH |
489 | return -1; |
490 | } | |
a3b6f8d0 | 491 | if(rrs.empty()) // negatively cached |
12c86877 | 492 | return 0; |
cb433f9c | 493 | |
12c86877 BH |
494 | return 1; |
495 | } | |
496 | ||
497 | void UeberBackend::addNegCache(const Question &q) | |
498 | { | |
bf269e28 | 499 | extern AuthQueryCache QC; |
f1d64762 | 500 | if(!d_negcache_ttl) |
12c86877 | 501 | return; |
ee5e1751 | 502 | // we should also not be storing negative answers if a pipebackend does scopeMask, but we can't pass a negative scopeMask in an empty set! |
bf269e28 | 503 | QC.insert(q.qname, q.qtype, vector<DNSZoneRecord>(), d_negcache_ttl, q.zoneId); |
12c86877 BH |
504 | } |
505 | ||
90ba52e0 | 506 | void UeberBackend::addCache(const Question &q, const vector<DNSZoneRecord> &rrs) |
12c86877 | 507 | { |
bf269e28 | 508 | extern AuthQueryCache QC; |
46c6efbe | 509 | |
f1d64762 | 510 | if(!d_cache_ttl) |
12c86877 | 511 | return; |
f1d64762 MZ |
512 | |
513 | unsigned int store_ttl = d_cache_ttl; | |
90ba52e0 | 514 | for(const auto& rr : rrs) { |
515 | if (rr.dr.d_ttl < d_cache_ttl) | |
516 | store_ttl = rr.dr.d_ttl; | |
429ae4cb | 517 | if (rr.scopeMask) |
518 | return; | |
519 | } | |
520 | ||
bf269e28 | 521 | QC.insert(q.qname, q.qtype, rrs, store_ttl, q.zoneId); |
12c86877 BH |
522 | } |
523 | ||
675fa24c | 524 | void UeberBackend::alsoNotifies(const DNSName &domain, set<string> *ips) |
27d94a79 BH |
525 | { |
526 | for ( vector< DNSBackend * >::iterator i = backends.begin(); i != backends.end(); ++i ) | |
527 | (*i)->alsoNotifies(domain,ips); | |
528 | } | |
12c86877 BH |
529 | |
530 | UeberBackend::~UeberBackend() | |
531 | { | |
e6a9dde5 | 532 | DLOG(g_log<<Logger::Error<<"UeberBackend destructor called, removing ourselves from instances, and deleting our backends"<<endl); |
12c86877 BH |
533 | cleanup(); |
534 | } | |
535 | ||
536 | // this handle is more magic than most | |
675fa24c | 537 | void UeberBackend::lookup(const QType &qtype,const DNSName &qname, DNSPacket *pkt_p, int zoneId) |
12c86877 | 538 | { |
ce4a60ce | 539 | if(d_stale) { |
e6a9dde5 | 540 | g_log<<Logger::Error<<"Stale ueberbackend received question, signalling that we want to be recycled"<<endl; |
3f81d239 | 541 | throw PDNSException("We are stale, please recycle"); |
12c86877 BH |
542 | } |
543 | ||
e6a9dde5 | 544 | DLOG(g_log<<"UeberBackend received question for "<<qtype.getName()<<" of "<<qname<<endl); |
12c86877 BH |
545 | if(!d_go) { |
546 | pthread_mutex_lock(&d_mut); | |
547 | while (d_go==false) { | |
e6a9dde5 | 548 | g_log<<Logger::Error<<"UeberBackend is blocked, waiting for 'go'"<<endl; |
12c86877 | 549 | pthread_cond_wait(&d_cond, &d_mut); |
e6a9dde5 | 550 | g_log<<Logger::Error<<"Broadcast received, unblocked"<<endl; |
12c86877 BH |
551 | } |
552 | pthread_mutex_unlock(&d_mut); | |
553 | } | |
554 | ||
ce4a60ce | 555 | d_domain_id=zoneId; |
c27c8d96 | 556 | |
12c86877 BH |
557 | d_handle.i=0; |
558 | d_handle.qtype=qtype; | |
559 | d_handle.qname=qname; | |
560 | d_handle.pkt_p=pkt_p; | |
561 | d_ancount=0; | |
562 | ||
563 | if(!backends.size()) { | |
e6a9dde5 | 564 | g_log<<Logger::Error<<"No database backends available - unable to answer questions."<<endl; |
ce4a60ce | 565 | d_stale=true; // please recycle us! |
3f81d239 | 566 | throw PDNSException("We are stale, please recycle"); |
12c86877 BH |
567 | } |
568 | else { | |
6242d8a4 KM |
569 | d_question.qtype=qtype; |
570 | d_question.qname=qname; | |
571 | d_question.zoneId=zoneId; | |
572 | int cstat=cacheHas(d_question, d_answers); | |
573 | if(cstat<0) { // nothing | |
aa7b2405 | 574 | // cout<<"UeberBackend::lookup("<<qname<<"|"<<DNSRecordContent::NumberToType(qtype.getCode())<<"): uncached"<<endl; |
6242d8a4 KM |
575 | d_negcached=d_cached=false; |
576 | d_answers.clear(); | |
577 | (d_handle.d_hinterBackend=backends[d_handle.i++])->lookup(qtype, qname,pkt_p,zoneId); | |
578 | } | |
579 | else if(cstat==0) { | |
aa7b2405 | 580 | // cout<<"UeberBackend::lookup("<<qname<<"|"<<DNSRecordContent::NumberToType(qtype.getCode())<<"): NEGcached"<<endl; |
6242d8a4 KM |
581 | d_negcached=true; |
582 | d_cached=false; | |
583 | d_answers.clear(); | |
584 | } | |
585 | else { | |
aa7b2405 | 586 | // cout<<"UeberBackend::lookup("<<qname<<"|"<<DNSRecordContent::NumberToType(qtype.getCode())<<"): CACHED"<<endl; |
6242d8a4 KM |
587 | d_negcached=false; |
588 | d_cached=true; | |
589 | d_cachehandleiter = d_answers.begin(); | |
590 | } | |
12c86877 BH |
591 | } |
592 | ||
593 | d_handle.parent=this; | |
12c86877 BH |
594 | } |
595 | ||
cea26350 | 596 | void UeberBackend::getAllDomains(vector<DomainInfo> *domains, bool include_disabled) { |
1325e8a2 PD |
597 | for (vector<DNSBackend*>::iterator i = backends.begin(); i != backends.end(); ++i ) |
598 | { | |
cea26350 | 599 | (*i)->getAllDomains(domains, include_disabled); |
1325e8a2 PD |
600 | } |
601 | } | |
602 | ||
90ba52e0 | 603 | bool UeberBackend::get(DNSZoneRecord &rr) |
12c86877 | 604 | { |
aa7b2405 | 605 | // cout<<"UeberBackend::get(DNSZoneRecord) called"<<endl; |
12c86877 BH |
606 | if(d_negcached) { |
607 | return false; | |
608 | } | |
609 | ||
610 | if(d_cached) { | |
cb433f9c BH |
611 | if(d_cachehandleiter != d_answers.end()) { |
612 | rr=*d_cachehandleiter++;; | |
613 | return true; | |
614 | } | |
615 | return false; | |
12c86877 | 616 | } |
12c86877 | 617 | if(!d_handle.get(rr)) { |
aa7b2405 | 618 | // cout<<"end of ueberbackend get, seeing if we should cache"<<endl; |
619 | if(!d_ancount && d_handle.qname.countLabels()) {// don't cache axfr | |
16925355 | 620 | // cout<<"adding negcache"<<endl; |
12c86877 | 621 | addNegCache(d_question); |
aa7b2405 | 622 | } |
623 | else { | |
624 | // cout<<"adding query cache"<<endl; | |
625 | addCache(d_question, d_answers); | |
626 | } | |
cb433f9c | 627 | d_answers.clear(); |
12c86877 BH |
628 | return false; |
629 | } | |
cb433f9c BH |
630 | d_ancount++; |
631 | d_answers.push_back(rr); | |
12c86877 BH |
632 | return true; |
633 | } | |
634 | ||
9f8e226e AT |
635 | bool UeberBackend::searchRecords(const string& pattern, int maxResults, vector<DNSResourceRecord>& result) |
636 | { | |
637 | bool rc = false; | |
638 | for ( vector< DNSBackend * >::iterator i = backends.begin(); result.size() < static_cast<vector<DNSResourceRecord>::size_type>(maxResults) && i != backends.end(); ++i ) | |
639 | if ((*i)->searchRecords(pattern, maxResults - result.size(), result)) rc = true; | |
640 | return rc; | |
641 | } | |
642 | ||
643 | bool UeberBackend::searchComments(const string& pattern, int maxResults, vector<Comment>& result) | |
644 | { | |
645 | bool rc = false; | |
646 | for ( vector< DNSBackend * >::iterator i = backends.begin(); result.size() < static_cast<vector<Comment>::size_type>(maxResults) && i != backends.end(); ++i ) | |
647 | if ((*i)->searchComments(pattern, maxResults - result.size(), result)) rc = true; | |
648 | return rc; | |
649 | } | |
12c86877 | 650 | |
16f7d28d | 651 | AtomicCounter UeberBackend::handle::instances(0); |
12c86877 BH |
652 | |
653 | UeberBackend::handle::handle() | |
654 | { | |
e6a9dde5 | 655 | // g_log<<Logger::Warning<<"Handle instances: "<<instances<<endl; |
16f7d28d | 656 | ++instances; |
457d7c72 AT |
657 | parent=NULL; |
658 | d_hinterBackend=NULL; | |
659 | pkt_p=NULL; | |
660 | i=0; | |
12c86877 BH |
661 | } |
662 | ||
663 | UeberBackend::handle::~handle() | |
664 | { | |
16f7d28d | 665 | --instances; |
12c86877 BH |
666 | } |
667 | ||
90ba52e0 | 668 | bool UeberBackend::handle::get(DNSZoneRecord &r) |
12c86877 | 669 | { |
e6a9dde5 | 670 | DLOG(g_log << "Ueber get() was called for a "<<qtype.getName()<<" record" << endl); |
12c86877 BH |
671 | bool isMore=false; |
672 | while(d_hinterBackend && !(isMore=d_hinterBackend->get(r))) { // this backend out of answers | |
673 | if(i<parent->backends.size()) { | |
e6a9dde5 | 674 | DLOG(g_log<<"Backend #"<<i<<" of "<<parent->backends.size() |
4957a608 | 675 | <<" out of answers, taking next"<<endl); |
12c86877 BH |
676 | |
677 | d_hinterBackend=parent->backends[i++]; | |
ce4a60ce | 678 | d_hinterBackend->lookup(qtype,qname,pkt_p,parent->d_domain_id); |
12c86877 BH |
679 | } |
680 | else | |
681 | break; | |
682 | ||
e6a9dde5 | 683 | DLOG(g_log<<"Now asking backend #"<<i<<endl); |
12c86877 BH |
684 | } |
685 | ||
686 | if(!isMore && i==parent->backends.size()) { | |
e6a9dde5 | 687 | DLOG(g_log<<"UeberBackend reached end of backends"<<endl); |
12c86877 BH |
688 | return false; |
689 | } | |
690 | ||
e6a9dde5 | 691 | DLOG(g_log<<"Found an answering backend - will not try another one"<<endl); |
12c86877 BH |
692 | i=parent->backends.size(); // don't go on to the next backend |
693 | return true; | |
694 | } |