11 $debug $needglue $localonly $verbosity);
13 $quis= $0; $quis =~ s,.*/,,;
17 $etcfile= "/etc/bind/chiark-conf-gen.zones";
25 use vars qw($dig_owner $dig_type $dig_rdata);
27 while (@ARGV && $ARGV[0] =~ m/^\-/) {
31 if (m/^(yes|no|force)$/) { m/^./; $mode= $&; }
32 elsif (m/^all$/) { $doall=1; }
33 elsif (m/^config$/) { $etcfile= loarg(); $where= '--config option'; }
34 elsif (m/^glueless$/) { $needglue=0; }
35 elsif (m/^localonly$/) { $localonly=1; }
36 elsif (m/^quiet$/) { $verbosity=0; }
37 elsif (m/^repeat$/) { $repeat=1; }
38 elsif (m/^verbose$/) { $verbosity=2; }
39 else { usageerr("unknown option --$_"); }
44 if (s/^[ynf]//) { $mode=$&; }
45 elsif (s/^A//) { $doall=1; }
46 elsif (s/^C//) { $etcfile= soarg(); $where= '-C option'; }
47 elsif (s/^D//) { $debug++; }
48 elsif (s/^g//) { $needglue=0; }
49 elsif (s/^l//) { $localonly=1; }
50 elsif (s/^q//) { $verbosity=0; }
51 elsif (s/^r//) { $repeat=1; }
52 elsif (s/^v//) { $verbosity=2; }
53 else { usageerr("unknown option -$&"); }
58 sub loarg() { usageerr("missing option value") if !@ARGV; return shift @ARGV; }
59 sub soarg() { my ($rv); $rv=$_; $_=''; return length $rv ? $rv : loarg(); }
61 usageerr("-D may be specified at most twice") if $debug>2;
62 usageerr("must specify either -f|-y|-n or zones (and not both)")
63 if !!$mode == !!@ARGV;
68 usage: named-conf-regen [options] -f|-y|-n|<zone>...\n".
70 " -f --force install without checking\n".
71 " -y --yes check and install\n".
72 " -n --no check only\n".
73 "additional options:\n".
74 " -A --all report on zones marked ? (ones we know are broken)\n".
75 " -D debug $quis (does not help debug your DNS config)\n".
76 " -g --glueless do not warn about any glueless referrals (not recommended)\n".
77 " -l --localonly full checks only on zones which we primary\n".
78 " -q --quiet no output for OK zones\n".
79 " -r --repeat repeat warnings for all sources of imperfect data\n".
80 " -v --verbose extra verbose info about each zone\n"
81 " -C|--config <DIR/FILE use FILE as default config and DIR as default dir\n";
84 cfg_fail("config filename $etcfile should not be directory")
87 use vars qw($default_dir);
88 $default_dir= $etcfile =~ m,^.*/, ? $& : './';
90 use vars qw($slave_dir $slave_prefix $slave_suffix);
95 use vars qw(@self_ns @self_soa @self_addr @forbid_addr);
96 @self_ns= @self_soa= @self_addr= @forbid_addr= ();
98 use vars qw(%zone_cfg @zone_cfg_list);
102 use vars qw($output $default_output %output_contents);
105 %output_contents= ();
107 use vars qw($check $install);
108 $check= $mode !~ m/^f/;
109 $install= $mode =~ m/^[yf]/;
111 read_config($etcfile);
112 debug_dump('@zone_cfg_list %zone_cfg');
113 process_zones($mode ? @zone_cfg_list : @ARGV);
114 debug_dump('%output_contents');
115 output_files() if $install;
119 #-------------------- configuration reading
121 sub cfg_fail ($) { die "$quis: $where:\n $_[0]\n"; }
123 sub read_config ($) {
125 my ($fh,$z,@self,$before,
126 $mod,$dir,$prefix,$suffix,$subfile,$lprefix,$lsuffix,$zf);
129 $fh= new IO::File $if,'r' or cfg_fail("open $if:\n $!");
132 if (!defined($_= <$fh>)) {
133 cfg_fail("read config file $if:\n $!") if $fh->error();
137 if (m/\\$/) { $before.= $_; next; }
145 if (m/^self(\-ns|\-soa|)\s+(\S.*\S)/) {
146 @self= split /\s+/, $2;
147 @self_ns= @self if $1 ne '-soa';
148 @self_soa= @self if $1 ne '-ns';
149 } elsif (m/^self\-addr\s+([0-9. \t]+)/) {
150 @self_addr= split /\s+/, $1;
151 } elsif (m/^forbid\-addr(?:\s+([0-9. \t]+))?/) {
152 @forbid_addr= defined $1 ? split /\s+/, $1 : ();
156 (?: \s+ ([^/ \t]*) (?: (/.+) )?
159 ($mod, $dir, $prefix, $suffix, $subfile) =
160 ($1,qualify($2),$3,$4,$5);
161 $suffix= '' if !defined $suffix;
162 $subfile= '' if !defined $subfile;
163 $suffix= '_db' if !length $suffix && !length $subfile;
164 if (-d "$dir/$prefix") { $dir.='/'; $dir.=$prefix; $prefix=''; }
165 opendir D, $dir or cfg_fail("open primary-dir $dir:\n $!");
166 $lprefix= length $prefix; $lsuffix= length $suffix;
167 while (defined($_= readdir D)) {
168 next if m/^\./ && !$lprefix;
169 next unless length > $lprefix+$lsuffix;
170 next unless substr($_,0,$lprefix) eq $prefix;
171 next unless substr($_,length($_)-$lsuffix) eq $suffix;
172 $z= substr($_,$lprefix,length($_)-($lprefix+$lsuffix));
173 $zf= $dir.'/'.$prefix.$z.$suffix.$subfile;
175 next if length $subfile && $! == &ENOENT;
176 cfg_fail("cannot stat zonefile $zf:\n $!");
178 -f _ or cfg_fail("zonefile $zf is not a plain file");
179 zone_conf($z,'primary','p',$mod,$zf);
181 closedir D or cfg_fail("close primary-dir $dir:\n $!");
182 } elsif (m/^primary([*?]?)\s+(\S+)\s+(\S+)$/) {
183 zone_conf($2,'primary','p',$1,qualify($3));
184 } elsif (m/^published([*?]?)\s+(\S+)\s+([0-9.\t]+)$/) {
185 zone_conf($2,'published','s',$1,'',$3);
186 } elsif (m/^stealth([*?]?)\s+(\S+)\s+([0-9. \t]+)$/) {
187 zone_conf($2,'stealth','u',$1,'',split /\s+/, $3);
188 } elsif (m/^slave\-dir\s+(\S+)(?:(?:\s+(\S+))\s+(\S+))?$/) {
189 ($slave_dir, $slave_prefix, $slave_suffix) = (qualify($1),$2,$3);
190 $slave_prefix='' if !defined $slave_prefix;
191 $slave_suffix='' if !defined $slave_suffix;
192 } elsif (m/^output\s+bind8\+(\S+)$/) {
193 cfg_fail("default output may not apply to only some zones")
194 if @zone_cfg_list && length $default_output;
195 set_output(qualify($1));
196 } elsif (m/^include\s+(\S+)$/) {
199 cfg_fail("unknown configuration directive".
200 " or incorrect syntax or arguments");
203 $fh->close or cfg_fail("close config file $if:\n $!");
208 $i= "$default_dir$i" unless $i =~ m,^/,;
212 sub zone_conf ($$$$$@) {
213 my ($zone,$style,$sabbr,$mod,$file,@servers) = @_;
215 $file= qualify("$slave_dir/$slave_prefix".$zone.$slave_suffix)
217 if (!length $output) {
218 $default_output= qualify('chiark-conf-gen.bind8')
219 unless length $default_output;
220 set_output($default_output);
222 cfg_fail("redefined zone $zone\n".
223 " earlier definition $zone_cfg{$zone}{'where'}")
224 if exists $zone_cfg{$zone};
225 $zone_cfg{$zone}{'where'}= $where;
226 $zone_cfg{$zone}{'file'}= $file;
227 $zone_cfg{$zone}{'style_p'}= $style.$mod;
228 $zone_cfg{$zone}{'s'}= $sabbr.$mod; # p)rimary s)econdary u)npub f)oreign
229 $zone_cfg{$zone}{'servers'}= [ @servers ];
230 foreach $sfx (qw(soa ns addr)) {
231 { no strict 'refs'; $aref= [ @{ "self_$sfx" } ]; }
232 @$aref or cfg_fail("failed to specify self-$sfx before zone");
233 $zone_cfg{$zone}{"self_$sfx"}= $aref;
235 $zone_cfg{$zone}{'output'}= $output;
236 push @zone_cfg_list, $zone;
242 $output_contents{$output}= '';
246 #-------------------- checking
248 use vars qw($zone $cfg $warnings);
252 return if !$verbosity;
257 return if $verbosity<2;
261 sub process_zones (@) {
265 foreach $zone (@zones) {
266 $cfg= $zone_cfg{$zone} || {
267 'style_p' => 'foreign',
271 progress(sprintf "%-40s %s", $zone, $$cfg{'style_p'});
272 if ($check && ($doall || $cfg->{'s'} !~ m/\?/)) {
274 if ($localonly && $cfg->{'s'} =~ m/f/) {
275 zone_warning("foreign zone specified with -l",'');
276 } elsif ($cfg->{'s'} =~ m/\*/ ||
277 ($localonly && $cfg->{'s'} !~ m/p/)) {
283 zone_warning("checks failed: $@",'') if length $@;
285 $output_contents{$$cfg{'output'}} .= zone_output()
288 print STDERR "$quis: $warnings warnings\n" or die $!
292 sub zone_warning ($$) {
297 $wk =~ s/,.*// if !$repeat;
298 return 0 if $$warned{$w}{$wk}++;
303 print STDERR "$zone: warning: $w\n" or die $!;
308 sub zone_warnmore ($) {
309 print STDERR "$zone: $_[0]\n" or die $!;
312 use vars qw(%delgs); # $delgs{$nameserver_list} = [ $whosaidandwhy ]
313 use vars qw(%auths); # $auths{$nameserver_list} = [ $whosaidandwhy ]
314 use vars qw(%glue); # $glue{$name}{$addr_list} = [ $whosaidandwhy ]
315 use vars qw(%soas); # $soa{"$origin $serial"} = [ $whosaidandwhy ]
316 use vars qw(%addr_is_ok %warned);
317 use vars qw($delg_to_us);
318 use vars qw(@to_check); # ($addr,$whyask,$is_auth,$glueless_ok, ...)
319 use vars qw(@to_check_soa); # ($addr,$whyask, ...)
321 sub zone_check_full () {
329 %delgs= %auths= %glue= %soas= %warned= %addr_is_ok= ();
331 @to_check= @to_check_soa= ();
334 sub zone_investigate() {
335 my ($super_zone, @super_nsnames,
336 $super_ns, @super_ns_addrs, $s, $wa, $is_auth,
337 %nsrrset_checked, %soa_checked, $addr, $glueless_ok, $rcode);
341 debug_trace("zone $zone superzone $super_zone");
342 $super_zone =~ s/^[^.]+\.// or die "no superzone ? ($super_zone)\n";
343 ($rcode,@super_nsnames)= lookup($super_zone,'ns-','06');
346 for $super_ns (@super_nsnames) {
347 $super_ns= lc $super_ns;
348 ($rcode,@super_ns_addrs)= lookup($super_ns,'a','0');
349 foreach $addr (@super_ns_addrs) {
352 "$super_ns, server for $super_zone",
357 # We do these in order so that we always do NS RRset checks on
358 # nameservers that came from other NS RRsets first; otherwise
359 # we might set nsrrset_checked due to a glueless_ok check,
360 # and then not check for gluefulness later.
361 debug_dump('@to_check @to_check_soa');
362 if (($addr,$wa,$is_auth,$glueless_ok,@to_check) = @to_check) {
363 push @to_check_soa, $addr, $wa if $is_auth;
364 next if $nsrrset_checked{$addr}++;
365 zone_check_nsrrset($addr, $wa, $is_auth, $glueless_ok);
366 } elsif (($addr,$wa,@to_check_soa) = @to_check_soa) {
367 next if $soa_checked{$addr}++;
368 zone_check_soa($addr, $wa, "NS [$uaddr]");
375 sub zone_check_nsrrset ($$$$) {
376 my ($uaddr,$wa, $is_auth, $glueless_ok) = @_;
377 my (@s, $s, %s2g, @glue, $glue, $delgs_or_auths, $wwn, $ww);
378 verbose("checking delegation by $ww");
381 if ($dig_type eq 'ns' && $dig_owner eq $zone) {
382 $s2g{lc $dig_rdata} = [ ];
383 } elsif ($dig_type eq 'a' && exists $s2g{$dig_owner}) {
384 $wwn= "in glue from $ww";
385 push @to_check, $dig_rdata, "$dig_owner, $wwn", 1, 0;
386 zone_server_addr($dig_rdata,$dig_owner,$wwn,"NS [$uaddr]",0);
387 push @{ $s2g{$dig_owner} }, $dig_rdata;
392 zone_warning("unable to find NS RRset at [$uaddr]", $wa);
394 } elsif (keys %s2g == 1) {
395 zone_warning("only one nameserver",$ww);
399 @glue= @{ $s2g{$s} };
401 zone_warning("glueless NS $s,".($needglue<=1 ? " (eg)" : ""),
403 unless $glueless_ok || !$needglue;
406 $glue= join ' ', sort @glue;
407 push @{ $glue{$s}{$glue} }, $ww;
410 $delgs_or_auths= $is_auth ? \%auths : \%delgs;
411 push @{ $delgs_or_auths->{$s} }, $ww;
414 sub zone_server_addr ($$$$$) {
415 my ($addr,$name,$ww,$wwq,$is_soa) = @_;
416 $addr_is_ok{$addr}= "$name ($wwq)"
417 if $is_soa || $cfg->{'s'} =~ m/u/;
418 zone_warning("configured as stealth but we [$addr] $name are published",
420 if $cfg->{'s'} =~ m/u/ && grep { $_ eq $addr } @self_addr;
421 zone_warning("forbidden nameserver address [$addr] $name",$ww)
422 if grep { $_ eq $addr } @forbid_addr;
424 my ($name_is_self, $addr_is_self);
425 $name_is_self= grep { $_ eq $name }
426 @{ $cfg->{$is_soa ? 'self_soa' : 'self_ns'} };
427 $addr_is_self= grep { $_ eq $addr }
428 @{ $cfg->{'self_addr'} };
429 if ($name_is_self && !$addr_is_self) {
430 zone_warning("our name $name with wrong address [$addr]",$ww);
431 } elsif (!$name_is_self && $addr_is_self) {
432 zone_warning(($is_soa ? "SOA ORIGIN maps to" : "referral to").
433 " us [$addr] with wrong name $name",
436 $delg_to_us=1 if $name_is_self;
439 sub zone_check_soa ($$$) {
440 my ($uaddr,$wa,$waq) = @_;
441 my ($lame,$origin,$got,$rcode,@soa_addrs,$soa_addr,$wwn);
442 verbose("checking service at $wwq");
443 $lame= 'dead or lame';
445 if ($dig_type eq 'flags:') {
446 $lame= $dig_rdata =~ m/ aa / ? '' : 'lame';
447 } elsif ($dig_type eq 'soa' && $dig_owner eq $zone && !$lame) {
448 die "several SOAs ? $ww" if defined $origin;
450 $got =~ m/^(\S+) \d+/ or die "$got ?";
455 $lame= 'broken' if !$lame && !defined $origin;
456 if ($lame) { zone_warning("$lame server [$uaddr]",$wa); return; }
457 push @{ $soas{$got} }, $ww;
458 ($rcode,@soa_addrs)= lookup($origin,'a','0');
459 foreach $soa_addr (@soa_addrs) {
460 $wwn= "SOA ORIGIN from $ww";
461 zone_server_addr($soa_addr,$origin,$wwn,"SOA [$uaddr]",1);
462 push @to_check, $soa_addr, "$origin, $wwn";
466 sub zone_consistency() {
467 my ($d, $org_ser, $origin, $a, $h, $self_soa, $wa);
468 zone_consistency_set('delegations',\%delgs);
469 foreach $d (keys %delgs) { delete $auths{$d}; }
470 zone_consistency_set('zone nameserver rrset',\%auths);
471 foreach $h (keys %glue) {
472 zone_consistency_set("glue for $h", $glue{$h});
474 zone_consistency_set("SOA ORIGIN and SERIAL",\%soas);
475 $self_soa= $cfg->{'self_soa'};
476 if ($cfg->{'s'} =~ m/p/) {
477 foreach $org_ser (keys %soas) {
478 $org_ser =~ m/^(\S+) \d+$/ or die "$org_ser ?";
480 next if grep { $_ eq $origin } @$self_soa;
481 foreach $wa (@{ $soas{$org_ser} }) {
482 zone_warning("SOA ORIGIN $origin is not our name (@$self_soa)",
489 sub zone_servers_ok () {
493 foreach $a (@{ $cfg->{'servers'} }) {
494 next if exists $addr_is_ok{$a};
495 zone_warning("we slave from [$a]",'')
499 foreach $a (keys %addr_is_ok) {
500 zone_warnmore("permitted master [$a] $addr_is_ok{$a}");
504 if ($cfg->{'s'} =~ m/s/ && !$delg_to_us) {
505 zone_warning("we are supposedly published secondary,".
506 " but not listed as a nameserver",'');
510 sub zone_consistency_set ($%) {
513 if (keys(%$set) > 1) {
514 zone_warning("inconsistent $msg:",'');
515 foreach $d (keys %$set) {
516 foreach $o (@{ $set->{$d} }) { zone_warnmore(" $d from $o"); }
521 sub zone_check_local () {
523 zone_servers_simplefind();
527 sub zone_servers_simplefind () {
528 my ($rcode,@nsnames,$ns,@soas,$origin);
530 ($rcode,@nsnames)= lookup($zone,'ns-','0');
531 foreach $ns (@nsnames) { zone_server_simple($ns,'NS',0); }
533 ($rcode,@soas)= lookup($zone,'soa','0');
534 die "multiple SOA RRs in set! @soas ?" if @soas!=1;
535 $soas[0] =~ m/^(\S+)\s/ or die "SOA ? $_";
536 zone_server_simple(domain_canon($1),'SOA',1);
539 sub zone_server_simple ($$$) {
540 my ($name,$ww,$is_soa) = @_;
541 my ($rcode,@addrs,$addr);
542 ($rcode,@addrs)= lookup($name,'a','0');
543 foreach $addr (@addrs) { zone_server_addr($addr,$name,$ww,$ww,$is_soa); }
546 #-------------------- outputting
551 $o= "zone \"$zone\" {\n";
552 if ($$cfg{'s'} =~ m/p/) {
553 $o.= " type master;\n";
555 $o.= " type slave;\n".
557 foreach $m (@{ $$cfg{'servers'} }) { $o.= " $m;\n"; }
560 $o.= " file \"$$cfg{'file'}\";\n";
565 sub output_files () {
566 my ($fn,$ofn,$mfn,$l,$dir, $maxmode,$h,@to_install);
568 foreach $ofn (keys %output_contents) {
569 $fn= $ofn; $mfn= "output file $fn";
572 $! == &ENOENT or die "$quis: stat $mfn:\n $!\n";
576 $maxmode= (stat _)[2];
579 defined($l= readlink $fn)
580 or die "$quis: readlink $mfn:\n $!\n";
581 $dir= $fn =~ m,^.*/, ? $& : './';
582 $fn= "$dir$l" unless $l =~ m,^/,;
583 $mfn= "output file $fn (symlink target of $ofn)";
585 die "$quis: output file $mfn exists but is not a file".
586 " (or symlink to one)";
589 unlink "$fn.new" or $! == &ENOENT or
590 die "$quis: cannot clear out old .new version of $mfn:\n $!";
591 $h= new IO::File "$fn.new",'w',$maxmode
592 or die("$quis: create .new version of $mfn:\n $!");
594 "# generated by $quis, do not edit\n",
595 $output_contents{$ofn}
596 or die "$quis: write data to .new version of $mfn:\n $!";
598 or die "$quis: close .new version of $mfn:\n $!";
599 push @to_install, $fn,$mfn;
602 while (($fn,$mfn, @to_install) = @to_install) {
604 or die "$quis: install new version of $mfn:\n $!";
608 #-------------------- general utilities
612 return unless $debug>1;
613 local $Data::Dumper::Terse=1;
614 foreach $vn (split /\s+/, $_[0]) {
615 print "$vn := ", eval "Dumper(\\$vn)";
619 sub debug_trace ($) {
620 return unless $debug;
625 my ($domain,$type,$okrcodes) = @_;
627 debug_trace("lookup ==> (->$okrcodes) $domain $type");
630 defined($c= open $h, "-|") or die "$quis: fork adnshost:\n $!\n";
632 exec 'adnshost','-Fi','+Do','+Dt','+Dc','-Cf',"-t$type",
634 die "$quis: exec adnshost:\n $!\n";
636 @result= $h->getlines();
637 $h->error and die "$quis: read from adnshost:\n $!\n";
640 die "$quis: lookup -t$type $domain $okrcodes failed $? $! @result\n"
641 if $! or $?&255 or $?>1536 or index($okrcodes,$?>>8)<0;
642 debug_trace("lookup <== $? @result");
648 my ($eachrr, $qowner,$qtype,$qaddr) = @_;
649 # also pseudo-rr with type `flags:'
650 my ($h,$inmid,$irdata,$c);
653 debug_trace("dig ==> \@$qaddr $qowner $qtype");
656 defined($c= open $h, "-|") or die "$quis: fork dig:\n $!\n";
658 open STDERR, ">&STDOUT" or die $!;
660 '+nodef','+nosea','+nodebug','+norecurse',
661 "\@$qaddr",'-t',$qtype,$qowner);
662 die "$quis: exec dig:\n $!\n";
666 if (!defined($_= $h->getline())) {
667 $h->error() and die "$quis: read from dig:\n $!\n";
672 s/^\s+/ / or die "$inmid // $_ ?";
676 s/$/ \(/ unless s/\s*\)\s*$//;
678 if (s/\s*\(\s*$//) { $inmid= $_; next; }
679 if (m/^\;\; flags\:( [-0-9a-z ]+)\;/) {
680 $dig_owner=''; $dig_type='flags:'; $dig_rdata= "$1 ";
681 debug_trace("dig f: $dig_rdata");
685 } elsif (m/^([-.0-9a-z]+)\s+\d\w+\s+in\s+([a-z]+)\s+(\S.*)/i) {
686 $dig_owner=domain_canon($1); $dig_type=lc $2; $irdata=$3;
687 if ($dig_type eq 'a') {
688 $irdata =~ m/^[.0-9]+$/ or die "$irdata ?";
690 } elsif ($dig_type eq 'ns') {
691 $irdata =~ m/^[-.0-9a-z]+$/i or die "bad nameserver $irdata ?";
692 $dig_rdata= domain_canon($irdata);
693 } elsif ($dig_type eq 'soa') {
694 $irdata =~ m/^([-.0-9a-z]+)\s+.*\s+(\d+)(?:\s+\d\w+){4}$/i
695 or die "bad SOA $irdata ?";
696 $dig_rdata= domain_canon($1).' '.$2;
698 debug_trace("ignoring uknown RR type $dig_type");
701 debug_trace("dig $dig_owner $dig_type $dig_rdata");
704 debug_trace("ignoring unknown dig output $_");
708 debug_trace("dig <== gave $?");
711 sub domain_canon ($) {
714 die "domain $_ ?" unless m/^[0-9a-z]/i;