| 1 | # dns/trunk/DNSDB/ExportBIND.pm
 | 
|---|
| 2 | # BIND data export/publication
 | 
|---|
| 3 | # Call through DNSDB.pm's export() sub
 | 
|---|
| 4 | ##
 | 
|---|
| 5 | # $Id: ExportBIND.pm 901 2025-08-11 20:34:14Z kdeugau $
 | 
|---|
| 6 | # Copyright 2022-2025 Kris Deugau <kdeugau@deepnet.cx>
 | 
|---|
| 7 | # 
 | 
|---|
| 8 | #    This program is free software: you can redistribute it and/or modify
 | 
|---|
| 9 | #    it under the terms of the GNU General Public License as published by
 | 
|---|
| 10 | #    the Free Software Foundation, either version 3 of the License, or
 | 
|---|
| 11 | #    (at your option) any later version. 
 | 
|---|
| 12 | # 
 | 
|---|
| 13 | #    This program is distributed in the hope that it will be useful,
 | 
|---|
| 14 | #    but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
|---|
| 15 | #    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
|---|
| 16 | #    GNU General Public License for more details.
 | 
|---|
| 17 | # 
 | 
|---|
| 18 | #    You should have received a copy of the GNU General Public License
 | 
|---|
| 19 | #    along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
|---|
| 20 | ##
 | 
|---|
| 21 | 
 | 
|---|
| 22 | package DNSDB::ExportBIND;
 | 
|---|
| 23 | 
 | 
|---|
| 24 | use strict;
 | 
|---|
| 25 | use warnings;
 | 
|---|
| 26 | 
 | 
|---|
| 27 | use DNSDB;
 | 
|---|
| 28 | 
 | 
|---|
| 29 | sub export {
 | 
|---|
| 30 |   # expected to be a DNSDB object
 | 
|---|
| 31 |   my $dnsdb = shift;
 | 
|---|
| 32 | 
 | 
|---|
| 33 |   # to be a hash of views/locations, containing lists of zones
 | 
|---|
| 34 |   my %viewzones;
 | 
|---|
| 35 | 
 | 
|---|
| 36 |   # allow for future exports of subgroups of records
 | 
|---|
| 37 |   my $viewlist = $dnsdb->getLocList(curgroup => 1, full => 1);
 | 
|---|
| 38 | 
 | 
|---|
| 39 | 
 | 
|---|
| 40 | ## export reverse zones
 | 
|---|
| 41 | 
 | 
|---|
| 42 |   my $soasth = $dnsdb->{dbh}->prepare("SELECT host,val,ttl,record_id,location FROM records WHERE rdns_id=? AND type=6");
 | 
|---|
| 43 |   # record order matters for reverse zones because we need to override larger templates with smaller ones.
 | 
|---|
| 44 |   my $recsth = $dnsdb->{dbh}->prepare(
 | 
|---|
| 45 |         "SELECT host,type,val,distance,weight,port,ttl,record_id,location,extract(epoch from stamp),expires,stampactive ".
 | 
|---|
| 46 |         "FROM records WHERE rdns_id=? AND NOT type=6 ".
 | 
|---|
| 47 |         "ORDER BY masklen(inetlazy(val)) DESC, inetlazy(val), record_id");
 | 
|---|
| 48 | 
 | 
|---|
| 49 |   # Fetch active zone list
 | 
|---|
| 50 |   my $revsth = $dnsdb->{dbh}->prepare("SELECT rdns_id,revnet,status,changed,default_location FROM revzones WHERE status=1 ".
 | 
|---|
| 51 |         "ORDER BY masklen(revnet),revnet DESC, rdns_id");
 | 
|---|
| 52 |   # Unflag changed zones, so we can maybe cache the export and not redo everything every time
 | 
|---|
| 53 |   my $zonesth = $dnsdb->{dbh}->prepare("UPDATE revzones SET changed='n' WHERE rdns_id=?");
 | 
|---|
| 54 | 
 | 
|---|
| 55 |   my %recflags;  # need this to be independent for forward vs reverse zones, as they're not merged
 | 
|---|
| 56 | 
 | 
|---|
| 57 |   $revsth->execute();
 | 
|---|
| 58 |   while (my ($revid,$revzone,$revstat,$changed,$defloc) = $revsth->fetchrow_array) {
 | 
|---|
| 59 |     my $cidr = NetAddr::IP->new($revzone);
 | 
|---|
| 60 | 
 | 
|---|
| 61 | ##fixme:  convert logical revzone into .arpa name?  maybe take a slice of showrev_arpa?
 | 
|---|
| 62 | ##fixme:  need to bodge logical non-octet-boundary revzones into octet-boundary revzones
 | 
|---|
| 63 | ##fixme:  do we do cache files?  views balloon the file count stupidly
 | 
|---|
| 64 | ## foreach $octetzone $cidr->split(octet-boundary)
 | 
|---|
| 65 | ##   loclist = SELECT DISTINCT location FROM records WHERE rdns_id = $zid AND inetlazy(val) <<= $octetzone
 | 
|---|
| 66 | 
 | 
|---|
| 67 | #printf "non-octet? %s, %i\n", $cidr->masklen, $cidr->masklen % 8;
 | 
|---|
| 68 | 
 | 
|---|
| 69 |     # fetch a list of views/locations present in the zone.  we need to publish a file for each one.
 | 
|---|
| 70 |     # in the event that no locations are present (~~ $viewlist is empty), /%view collapses to nothing in the zone path
 | 
|---|
| 71 |     my $tmplocs = $dnsdb->{dbh}->selectall_arrayref("SELECT DISTINCT location FROM records WHERE rdns_id = ?", undef, $revid);
 | 
|---|
| 72 |     my @loclist;
 | 
|---|
| 73 |     foreach my $tloc (@{$tmplocs}) {
 | 
|---|
| 74 |       push @loclist, ($tloc->[0] eq '' ? 'common' : $tloc->[0]);
 | 
|---|
| 75 |     }
 | 
|---|
| 76 | 
 | 
|---|
| 77 |     my %zonefiles;      # zone file handles
 | 
|---|
| 78 | 
 | 
|---|
| 79 |     eval {
 | 
|---|
| 80 | 
 | 
|---|
| 81 | ##fixme:  use tmpfile module for more secure temp files?  want the zone name at least in it anyway, not sure that works...
 | 
|---|
| 82 |       my $arpazone = DNSDB::_ZONE($cidr, 'ZONE', 'r', '.').($cidr->{isv6} ? '.ip6.arpa' : '.in-addr.arpa');
 | 
|---|
| 83 |       my $zfile = $cidr->network->addr."-".$cidr->masklen;
 | 
|---|
| 84 | #      my $cachefile = "$dnsdb->{exportcache}/$zfile";
 | 
|---|
| 85 | #      my $tmpcache = "$dnsdb->{exportcache}/tmp.$zfile.$$";
 | 
|---|
| 86 |       my $tmpcache = "tmp.$zfile.$$";      # safety net.  don't overwrite a previous known-good file
 | 
|---|
| 87 | 
 | 
|---|
| 88 | ##fixme:  need to open separate zone files for aggregated metazones eg /22 or /14
 | 
|---|
| 89 |       foreach my $loc (@loclist) {
 | 
|---|
| 90 |         my $zfilepath = $dnsdb->{bind_export_reverse_zone_path};
 | 
|---|
| 91 |         $zfilepath =~ s/\%view/$loc/;
 | 
|---|
| 92 |         $zfilepath =~ s/\%zone/$zfile/;
 | 
|---|
| 93 |         $zfilepath =~ s/\%arpazone/$arpazone/;
 | 
|---|
| 94 | 
 | 
|---|
| 95 |         # Just In Case(TM)
 | 
|---|
| 96 |         $zfilepath =~ s,[^\w./-],_,g;
 | 
|---|
| 97 | 
 | 
|---|
| 98 |         # safety check, may need tweaking for race conditions
 | 
|---|
| 99 |         my $zpathbase = $zfilepath;
 | 
|---|
| 100 |         $zpathbase =~ s{/[^/]+$}{};
 | 
|---|
| 101 |         if (!-e $zpathbase) {
 | 
|---|
| 102 |           mkdir $zpathbase;
 | 
|---|
| 103 |         } else {
 | 
|---|
| 104 |           die "$zpathbase is not a directory\n" unless -d $zpathbase;
 | 
|---|
| 105 |         }
 | 
|---|
| 106 | 
 | 
|---|
| 107 |         # write fresh records if:
 | 
|---|
| 108 |         #  - the zone contains records which expire in less than 10 minutes or became valid less than 10 minutes ago
 | 
|---|
| 109 |         # note, no need to multi-bump the serial
 | 
|---|
| 110 |         if ( ($dnsdb->{dbh}->selectrow_array("SELECT COUNT(*) FROM records WHERE rdns_id = ? AND ".
 | 
|---|
| 111 |                 "stampactive='t' AND @(extract(epoch from stamp-now())) < 600", undef, $revid))[0] ) {
 | 
|---|
| 112 |           $changed = 1;
 | 
|---|
| 113 |           $dnsdb->_updateserial(rdns_id => $revid);
 | 
|---|
| 114 |         }
 | 
|---|
| 115 | #  - we are not using the cache
 | 
|---|
| 116 | # if ($dnsdb->{usecache}
 | 
|---|
| 117 |         #  - force_refresh is set
 | 
|---|
| 118 |         #  - the zone has changed
 | 
|---|
| 119 |         #  - the zone file does not exist
 | 
|---|
| 120 |         #  - the zone file is empty
 | 
|---|
| 121 |         elsif ($dnsdb->{force_refresh} || $changed || !-e $zfilepath || -z $zfilepath) {
 | 
|---|
| 122 | #          if ($dnsdb->{usecache}) {
 | 
|---|
| 123 | #            open ZONECACHE, ">$tmpcache" or die "Error creating temporary file $tmpcache: $!\n";
 | 
|---|
| 124 | #            $zonefilehandle = *ZONECACHE;
 | 
|---|
| 125 | #          }
 | 
|---|
| 126 |           open $zonefiles{$loc}, ">", $zfilepath or die "Error creating temporary file $zfilepath: $!\n";
 | 
|---|
| 127 | 
 | 
|---|
| 128 |           # Header for human convenience
 | 
|---|
| 129 | ##fixme?  vary arpazone/cidr in header and error message per showrev_arpa, or possibly
 | 
|---|
| 130 | # new dedicated setting, or possibly interact with with bind_export_fqdn?
 | 
|---|
| 131 |           printf {$zonefiles{$loc}} "; %s in view %s exported %s\n", $arpazone, $loc, scalar(localtime)
 | 
|---|
| 132 |             or die "Error writing header [$arpazone, '$loc']: $!\n";
 | 
|---|
| 133 | 
 | 
|---|
| 134 |           # Fetch the SOA separately as we publish it separately for each location with this loop,
 | 
|---|
| 135 |           # mainly because we want it first in the zone file
 | 
|---|
| 136 |           $soasth->execute($revid);
 | 
|---|
| 137 |           my ($soa_host, $soa_val, $soa_ttl, $soa_id, $soa_loc) = $soasth->fetchrow_array;
 | 
|---|
| 138 | 
 | 
|---|
| 139 | ##fixme: do we even need @loclist passed in?
 | 
|---|
| 140 |           printrec_bind($dnsdb, \%zonefiles, \@loclist, $soa_id, 'y', \%recflags, $cidr,
 | 
|---|
| 141 |             $soa_host, 6, $soa_val, 0, 0, 0, $soa_ttl, $loc, '');
 | 
|---|
| 142 | 
 | 
|---|
| 143 |         } # if force_refresh etc
 | 
|---|
| 144 | 
 | 
|---|
| 145 |         # tag the zonefile for publication in the view
 | 
|---|
| 146 |         push @{$viewzones{$loc}}, $arpazone;
 | 
|---|
| 147 | 
 | 
|---|
| 148 |       } # foreach @loclist
 | 
|---|
| 149 | 
 | 
|---|
| 150 |       # now the meat of the records
 | 
|---|
| 151 |       $recsth->execute($revid);
 | 
|---|
| 152 |       while (my ($host, $type, $val, $dist, $weight, $port, $ttl, $recid, $loc, $stamp, $expires, $stampactive)
 | 
|---|
| 153 |                 = $recsth->fetchrow_array) {
 | 
|---|
| 154 |         next if $recflags{$recid};
 | 
|---|
| 155 | 
 | 
|---|
| 156 |         # Spaces are evil.
 | 
|---|
| 157 |         $val =~ s/^\s+//;
 | 
|---|
| 158 |         $val =~ s/\s+$//;
 | 
|---|
| 159 |         if ($typemap{$type} ne 'TXT') {
 | 
|---|
| 160 |           # Leading or trailng spaces could be legit in TXT records.
 | 
|---|
| 161 |           $host =~ s/^\s+//;
 | 
|---|
| 162 |           $host =~ s/\s+$//;
 | 
|---|
| 163 |         }
 | 
|---|
| 164 | 
 | 
|---|
| 165 |         # Check for out-of-zone data
 | 
|---|
| 166 |         if ($val =~ /\.arpa$/) {
 | 
|---|
| 167 |           # val is non-IP
 | 
|---|
| 168 |           if ($val !~ /$arpazone$/) {
 | 
|---|
| 169 |             warn "Not exporting out-of-zone record $val $typemap{$type} $host, $ttl (zone $cidr)\n";
 | 
|---|
| 170 |             next;
 | 
|---|
| 171 |           }
 | 
|---|
| 172 |         } else {
 | 
|---|
| 173 |           my $ipval = new NetAddr::IP $val;
 | 
|---|
| 174 |           if (!$cidr->contains($ipval)) {
 | 
|---|
| 175 |             warn "Not exporting out-of-zone record $val $typemap{$type} $host, $ttl (zone $cidr)\n";
 | 
|---|
| 176 |             next;
 | 
|---|
| 177 |           }
 | 
|---|
| 178 |         } # is $val a raw .arpa name?
 | 
|---|
| 179 | 
 | 
|---|
| 180 |         printrec_bind($dnsdb, \%zonefiles, \@loclist, $recid, 'y', \%recflags, $revzone,
 | 
|---|
| 181 |                 $host, $type, $val, $dist, $weight, $port, $ttl, $loc, $stamp, $expires, $stampactive);
 | 
|---|
| 182 | 
 | 
|---|
| 183 |         $recflags{$recid} = 1;
 | 
|---|
| 184 | 
 | 
|---|
| 185 |       } # while ($recsth)
 | 
|---|
| 186 | 
 | 
|---|
| 187 | #      if ($dnsdb->{usecache}) {
 | 
|---|
| 188 | #        close ZONECACHE; # force the file to be written
 | 
|---|
| 189 | #        # catch obvious write errors that leave an empty temp file
 | 
|---|
| 190 | #        if (-s $tmpcache) {
 | 
|---|
| 191 | #          rename $tmpcache, $cachefile
 | 
|---|
| 192 | #            or die "Error overwriting cache file $cachefile with temporary file: $!\n";
 | 
|---|
| 193 | #        }
 | 
|---|
| 194 | #      }
 | 
|---|
| 195 | 
 | 
|---|
| 196 |     };
 | 
|---|
| 197 |     if ($@) {
 | 
|---|
| 198 |       die "error writing ".($dnsdb->{usecache} ? 'new data for ' : '')."$revzone: $@\n";
 | 
|---|
| 199 |       # error!  something borked, and we should be able to fall back on the old cache file
 | 
|---|
| 200 |       # report the error, somehow.
 | 
|---|
| 201 |     } else {
 | 
|---|
| 202 |       # mark zone as unmodified.  Only do this if no errors, that way
 | 
|---|
| 203 |       # export failures should recover a little more automatically.
 | 
|---|
| 204 |       $zonesth->execute($revid);
 | 
|---|
| 205 |     }
 | 
|---|
| 206 | 
 | 
|---|
| 207 | #    if ($dnsdb->{usecache}) {
 | 
|---|
| 208 | #      # We've already made as sure as we can that a cached zone file is "good",
 | 
|---|
| 209 | #      # although possibly stale/obsolete due to errors creating a new one.
 | 
|---|
| 210 | #      eval {
 | 
|---|
| 211 | #        open CACHE, "<$cachefile" or die $!;
 | 
|---|
| 212 | #        print $datafile $_ or die "error copying cached $revzone to master file: $!" while <CACHE>;
 | 
|---|
| 213 | #        close CACHE;
 | 
|---|
| 214 | #      };
 | 
|---|
| 215 | #      die $@ if $@;
 | 
|---|
| 216 | #    }
 | 
|---|
| 217 | 
 | 
|---|
| 218 |   } # revsth->fetch
 | 
|---|
| 219 | 
 | 
|---|
| 220 | 
 | 
|---|
| 221 | 
 | 
|---|
| 222 | ## and now the domains
 | 
|---|
| 223 | 
 | 
|---|
| 224 |   $soasth = $dnsdb->{dbh}->prepare("SELECT host,val,ttl,record_id,location FROM records WHERE domain_id=? AND type=6");
 | 
|---|
| 225 |   # record order needs to match reverse zone ordering for IP values, or A+PTR
 | 
|---|
| 226 |   # template records don't cascade/expand correctly to match the reverse zones.
 | 
|---|
| 227 |   # order by record_id at least makes the zone consistent from export to export,
 | 
|---|
| 228 |   # otherwise the records could (theoretically) be returned in any old order by
 | 
|---|
| 229 |   # the DB engine
 | 
|---|
| 230 |   # ordering by nominal parent-child label hierarchy (as actually found live
 | 
|---|
| 231 |   # in some AXFRed zone files) would take a lot of chewing on data
 | 
|---|
| 232 |   $recsth = $dnsdb->{dbh}->prepare(
 | 
|---|
| 233 |         "SELECT host,type,val,distance,weight,port,ttl,record_id,location,extract(epoch from stamp),expires,stampactive ".
 | 
|---|
| 234 |         "FROM records WHERE domain_id=? AND NOT type=6 ".
 | 
|---|
| 235 |         "ORDER BY masklen(inetlazy(val)) DESC, inetlazy(val), record_id");
 | 
|---|
| 236 | #      "FROM records WHERE domain_id=? AND type < 65280");     # Just exclude all types relating to rDNS
 | 
|---|
| 237 | 
 | 
|---|
| 238 |   # Fetch active zone list
 | 
|---|
| 239 |   my $domsth = $dnsdb->{dbh}->prepare("SELECT domain_id,domain,status,changed,default_location FROM domains WHERE status=1 ".
 | 
|---|
| 240 |         "ORDER BY domain_id");
 | 
|---|
| 241 |   # Unflag changed zones, so we can maybe cache the export and not redo everything every time
 | 
|---|
| 242 |   $zonesth = $dnsdb->{dbh}->prepare("UPDATE domains SET changed='n' WHERE domain_id=?");
 | 
|---|
| 243 | 
 | 
|---|
| 244 |   # Clear %reclfags, since we explicitly want to NOT carry "I've published this
 | 
|---|
| 245 |   # record" over from rDNS, since we have to regenerate any templates for forward
 | 
|---|
| 246 |   # zones.  downside: small mismatches due to overridden entries.  not sure how
 | 
|---|
| 247 |   # best to manage that.  :/
 | 
|---|
| 248 | ##fixme:  selectively delete entries to allow template_always_publish_a to flag
 | 
|---|
| 249 | # whether extra A records get published or not.  should default to not (nb, of
 | 
|---|
| 250 | # *course* that's the complex case) to match original tinydns template masking behaviour
 | 
|---|
| 251 | #  %recflags = ();
 | 
|---|
| 252 | 
 | 
|---|
| 253 |   $domsth->execute();
 | 
|---|
| 254 |   while (my ($domid,$domain,$domstat,$changed) = $domsth->fetchrow_array) {
 | 
|---|
| 255 | 
 | 
|---|
| 256 |     # fetch a list of views/locations present in the zone.  we need to publish a file for each one.
 | 
|---|
| 257 |     # in the event that no locations are present (~~ $viewlist is empty), /%view collapses to nothing in the zone path
 | 
|---|
| 258 |     my $tmplocs = $dnsdb->{dbh}->selectall_arrayref("SELECT DISTINCT location FROM records WHERE domain_id = ?", undef, $domid);
 | 
|---|
| 259 |     my @loclist;
 | 
|---|
| 260 |     foreach my $tloc (@{$tmplocs}) {
 | 
|---|
| 261 |       push @loclist, ($tloc->[0] eq '' ? 'common' : $tloc->[0]);
 | 
|---|
| 262 |     }
 | 
|---|
| 263 | 
 | 
|---|
| 264 |     my %zonefiles;  # zone file handles
 | 
|---|
| 265 | 
 | 
|---|
| 266 |     eval {
 | 
|---|
| 267 | 
 | 
|---|
| 268 | ##fixme:  use tmpfile module for more secure temp files?  want the zone name at least in it anyway, not sure that works...
 | 
|---|
| 269 |       my $zfile = $domain;  # can probably drop this intermediate
 | 
|---|
| 270 |       my $tmpcache = "tmp.$zfile.$$";   # safety net.  don't overwrite a previous known-good file
 | 
|---|
| 271 | 
 | 
|---|
| 272 |       foreach my $loc (@loclist) {
 | 
|---|
| 273 |         my $zfilepath = $dnsdb->{bind_export_zone_path};
 | 
|---|
| 274 |         $zfilepath =~ s/\%view/$loc/;
 | 
|---|
| 275 |         $zfilepath =~ s/\%zone/$zfile/;
 | 
|---|
| 276 | 
 | 
|---|
| 277 |         # Just In Case(TM)
 | 
|---|
| 278 |         $zfilepath =~ s,[^\w./-],_,g;
 | 
|---|
| 279 | 
 | 
|---|
| 280 |         # safety check, may need tweaking for race conditions
 | 
|---|
| 281 |         my $zpathbase = $zfilepath;
 | 
|---|
| 282 |         $zpathbase =~ s{/[^/]+$}{};
 | 
|---|
| 283 |         if (!-e $zpathbase) {
 | 
|---|
| 284 |           mkdir $zpathbase;
 | 
|---|
| 285 |         } else {
 | 
|---|
| 286 |           die "$zpathbase is not a directory\n" unless -d $zpathbase;
 | 
|---|
| 287 |         }
 | 
|---|
| 288 | 
 | 
|---|
| 289 |         # write fresh records if:
 | 
|---|
| 290 |         #  - the zone contains ALIAS pseudorecords, which need to cascade changes from the upstream CNAME farm at every opportunity
 | 
|---|
| 291 |         if ( ($dnsdb->{dbh}->selectrow_array("SELECT count(*) FROM records WHERE domain_id = ? AND type=65300", undef, $domid))[0] ) {
 | 
|---|
| 292 |           $changed = 1;  # abuse this flag for zones with ALIAS records
 | 
|---|
| 293 |           # also update the serial number, because while it shouldn't matter purely for serving
 | 
|---|
| 294 |           # records, it WILL matter if AXFR becomes part of the publishing infrastructure
 | 
|---|
| 295 |           $dnsdb->_updateserial(domain_id => $domid);
 | 
|---|
| 296 |         }
 | 
|---|
| 297 |         #  - the zone contains records which expire in less than 10 minutes or became valid less than 10 minutes ago
 | 
|---|
| 298 |         # note, no need to multi-bump the serial
 | 
|---|
| 299 |         elsif ( ($dnsdb->{dbh}->selectrow_array("SELECT COUNT(*) FROM records WHERE domain_id = ? AND ".
 | 
|---|
| 300 |                 "stampactive='t' AND @(extract(epoch from stamp-now())) < 600", undef, $domid))[0] ) {
 | 
|---|
| 301 |           $changed = 1;
 | 
|---|
| 302 |           $dnsdb->_updateserial(domain_id => $domid);
 | 
|---|
| 303 |         }
 | 
|---|
| 304 | #  - we are not using the cache
 | 
|---|
| 305 | # if ($dnsdb->{usecache}
 | 
|---|
| 306 |         #  - force_refresh is set
 | 
|---|
| 307 |         #  - the zone has changed
 | 
|---|
| 308 |         #  - the zone file does not exist
 | 
|---|
| 309 |         #  - the zone file is empty
 | 
|---|
| 310 | #        if (!$self->{usecache} || $self->{force_refresh} || $changed || !-e $cachefile || -z $cachefile) {
 | 
|---|
| 311 |         if ($dnsdb->{force_refresh} || $changed || !-e $zfilepath || -z $zfilepath) {
 | 
|---|
| 312 | #          if ($self->{usecache}) {
 | 
|---|
| 313 | #            open ZONECACHE, ">$tmpcache" or die "Error creating temporary file $tmpcache: $!\n";
 | 
|---|
| 314 | #            $zonefilehandle = *ZONECACHE;
 | 
|---|
| 315 | #          }
 | 
|---|
| 316 |           open $zonefiles{$loc}, ">", $zfilepath or die "Error creating temporary file $zfilepath: $!\n";
 | 
|---|
| 317 | 
 | 
|---|
| 318 |           # Header for human convenience
 | 
|---|
| 319 |           printf {$zonefiles{$loc}} "; %s in view %s exported %s\n", $domain, $loc, scalar(localtime)
 | 
|---|
| 320 |                 or die "Error writing header [$domain, '$loc']: $!\n";
 | 
|---|
| 321 | 
 | 
|---|
| 322 |           # Fetch the SOA separately as we publish it separately for each location with this loop,
 | 
|---|
| 323 |           # mainly because we want it first in the zone file
 | 
|---|
| 324 |           $soasth->execute($domid);
 | 
|---|
| 325 |           my ($soa_host, $soa_val, $soa_ttl, $soa_id, $soa_loc) = $soasth->fetchrow_array;
 | 
|---|
| 326 | 
 | 
|---|
| 327 | ##fixme: do we even need @loclist passed in?
 | 
|---|
| 328 |           printrec_bind($dnsdb, \%zonefiles, \@loclist, $soa_id, 'n', \%recflags, $domain,
 | 
|---|
| 329 |             $soa_host, 6, $soa_val, 0, 0, 0, $soa_ttl, $loc, '');
 | 
|---|
| 330 | 
 | 
|---|
| 331 |         } # if force_refresh etc
 | 
|---|
| 332 | 
 | 
|---|
| 333 |         # tag the zonefile for publication in the view
 | 
|---|
| 334 |         push @{$viewzones{$loc}}, $domain;
 | 
|---|
| 335 | 
 | 
|---|
| 336 |       } # foreach @loclist
 | 
|---|
| 337 | 
 | 
|---|
| 338 |       # now the meat of the records
 | 
|---|
| 339 |       $recsth->execute($domid);
 | 
|---|
| 340 |       while (my ($host,$type,$val,$dist,$weight,$port,$ttl,$recid,$loc,$stamp,$expires,$stampactive) = $recsth->fetchrow_array) {
 | 
|---|
| 341 | ##work  need more subtle check - $recflags{$val} eq 'ptr' maybe?
 | 
|---|
| 342 |         next if $recflags{$recid};
 | 
|---|
| 343 | #next if $recflags{$val} && $type == 65280;# && !$dnsdb->{template_always_publish_a};
 | 
|---|
| 344 | 
 | 
|---|
| 345 |         # Spaces are evil.
 | 
|---|
| 346 |         $host =~ s/^\s+//;
 | 
|---|
| 347 |         $host =~ s/\s+$//;
 | 
|---|
| 348 |         if ($typemap{$type} ne 'TXT') {
 | 
|---|
| 349 |           # Leading or trailng spaces could be legit in TXT records.
 | 
|---|
| 350 |           $val =~ s/^\s+//;
 | 
|---|
| 351 |           $val =~ s/\s+$//;
 | 
|---|
| 352 |         }
 | 
|---|
| 353 | 
 | 
|---|
| 354 |         # Check for out-of-zone data
 | 
|---|
| 355 |         $host = $domain if $host eq '@';
 | 
|---|
| 356 |         if ($domain !~ /\.rpz$/ && $host !~ /$domain$/i) {
 | 
|---|
| 357 |           warn "Not exporting out-of-zone record $host $type $val, $ttl (zone $domain)\n";
 | 
|---|
| 358 |           next;
 | 
|---|
| 359 |         }
 | 
|---|
| 360 | 
 | 
|---|
| 361 |         printrec_bind($dnsdb, \%zonefiles, \@loclist, $recid, 'n', \%recflags, $domain,
 | 
|---|
| 362 |           $host, $type, $val, $dist, $weight, $port, $ttl, $loc, $stamp, $expires, $stampactive);
 | 
|---|
| 363 | 
 | 
|---|
| 364 |         $recflags{$recid} = 1;
 | 
|---|
| 365 | 
 | 
|---|
| 366 |       } # while ($recsth)
 | 
|---|
| 367 | 
 | 
|---|
| 368 |       # retrieve NS records for subdomains.  not strictly required in current production
 | 
|---|
| 369 |       # context but may matter sometime down the road
 | 
|---|
| 370 |       my $subnssth = $dnsdb->{dbh}->prepare("SELECT r.host,r.val,r.ttl,r.record_id,r.loc,r.stamp,r.expires,r.stampactive ".
 | 
|---|
| 371 |         "FROM records r ".
 | 
|---|
| 372 |         "JOIN domains d ON r.domain_id=d.domain_id ".
 | 
|---|
| 373 |         "WHERE r.type=2 AND d.domain LIKE ?");
 | 
|---|
| 374 |       $subnssth->execute('%.'.$domain);
 | 
|---|
| 375 |       while (my ($host,$val,$ttl,$recid,$loc,$stamp,$expires,$stampactive) = $subnssth->fetchrow_array) {
 | 
|---|
| 376 |         printrec_bind($dnsdb, \%zonefiles, \@loclist, $recid, 'n', \%recflags, $domain,
 | 
|---|
| 377 |           $host, 2, $val, '', '', '', $ttl, $loc, $stamp, $expires, $stampactive);
 | 
|---|
| 378 |       } # subdomain-ns-recsth
 | 
|---|
| 379 | 
 | 
|---|
| 380 | 
 | 
|---|
| 381 | #        if ($self->{usecache}) {
 | 
|---|
| 382 | #          close ZONECACHE; # force the file to be written
 | 
|---|
| 383 | #          # catch obvious write errors that leave an empty temp file
 | 
|---|
| 384 | #          if (-s $tmpcache) {
 | 
|---|
| 385 | #            rename $tmpcache, $cachefile
 | 
|---|
| 386 | #              or die "Error overwriting cache file $cachefile with temporary file: $!\n";
 | 
|---|
| 387 | #          }
 | 
|---|
| 388 | #        }
 | 
|---|
| 389 | 
 | 
|---|
| 390 | #      } # if $changed or cache filesize is 0
 | 
|---|
| 391 | 
 | 
|---|
| 392 |     };
 | 
|---|
| 393 |     if ($@) {
 | 
|---|
| 394 |       die "error writing ".($dnsdb->{usecache} ? 'new data for ' : '')."$domain: $@\n";
 | 
|---|
| 395 |       # error!  something borked, and we should be able to fall back on the old cache file
 | 
|---|
| 396 |       # report the error, somehow.
 | 
|---|
| 397 |     } else {
 | 
|---|
| 398 |       # mark zone as unmodified.  Only do this if no errors, that way
 | 
|---|
| 399 |       # export failures should recover a little more automatically.
 | 
|---|
| 400 |       $zonesth->execute($domid);
 | 
|---|
| 401 |     }
 | 
|---|
| 402 | 
 | 
|---|
| 403 | #    if ($dnsdb->{usecache}) {
 | 
|---|
| 404 | #      # We've already made as sure as we can that a cached zone file is "good",
 | 
|---|
| 405 | #      # although possibly stale/obsolete due to errors creating a new one.
 | 
|---|
| 406 | #      eval {
 | 
|---|
| 407 | #        open CACHE, "<$cachefile" or die $!;
 | 
|---|
| 408 | #        print $datafile $_ or die "error copying cached $revzone to master file: $!" while <CACHE>;
 | 
|---|
| 409 | #        close CACHE;
 | 
|---|
| 410 | #      };
 | 
|---|
| 411 | #      die $@ if $@;
 | 
|---|
| 412 | #    }
 | 
|---|
| 413 | 
 | 
|---|
| 414 |   } # domsth->fetch
 | 
|---|
| 415 | 
 | 
|---|
| 416 | 
 | 
|---|
| 417 | 
 | 
|---|
| 418 |   # Write the view configuration last, because otherwise we have to be horribly inefficient
 | 
|---|
| 419 |   # at figuring out which zones are visible/present in which views
 | 
|---|
| 420 |   if ($viewlist) {
 | 
|---|
| 421 |     my $tmpconf = "$dnsdb->{bind_export_conf_path}.$$"; ##fixme:  split filename for prefixing
 | 
|---|
| 422 |     open BINDCONF, ">", $tmpconf;
 | 
|---|
| 423 | 
 | 
|---|
| 424 |     foreach my $view (@{$viewlist}, { location => 'common', iplist => '' }) {
 | 
|---|
| 425 | #print Dumper($view);
 | 
|---|
| 426 |       print BINDCONF "view $view->{location} {\n";
 | 
|---|
| 427 | #      print "view $view->{location} {\n";
 | 
|---|
| 428 |       # could also use an acl { ... }; statement, then match-clients { aclname; };, but that gets hairy
 | 
|---|
| 429 |       # note that some semantics of data visibility need to be handled by the record export, since it's
 | 
|---|
| 430 |       # not 100% clear if the semantics of a tinydns view with an empty IP list (matches anyone) are the
 | 
|---|
| 431 |       # same as a BIND view with match-clients { any; };
 | 
|---|
| 432 |       if ($view->{iplist}) {
 | 
|---|
| 433 |          print BINDCONF "  match-clients { ".join("; ", $view->{iplist})."; };\n";
 | 
|---|
| 434 | #         print "  match-clients { ".join("; ", split(/[\s,]+/, $view->{iplist}))."; };\n";
 | 
|---|
| 435 |       } else {
 | 
|---|
| 436 |          print BINDCONF "  match-clients { any; };\n";
 | 
|---|
| 437 | #         print "  match-clients { any; };\n";
 | 
|---|
| 438 |       }
 | 
|---|
| 439 |       foreach my $zone (@{$viewzones{$view->{location}}}) {
 | 
|---|
| 440 | ##fixme:  notify settings, maybe per-zone?
 | 
|---|
| 441 |         print BINDCONF qq(  zone "$zone" IN {\n\ttype master;\n\tnotify no;\n\tfile "db.$zone";\n  };\n);
 | 
|---|
| 442 | #        print qq(  zone "$zone" IN {\n\ttype master;\n\tnotify no;\n\tfile "db.$zone";\n  };\n);
 | 
|---|
| 443 |       }
 | 
|---|
| 444 |       print BINDCONF "};\n\n";
 | 
|---|
| 445 | #      print "};\n\n";
 | 
|---|
| 446 |     } # foreach @$viewlist
 | 
|---|
| 447 |     rename $tmpconf, $dnsdb->{bind_export_conf_path};
 | 
|---|
| 448 |   } # if $viewlist
 | 
|---|
| 449 | 
 | 
|---|
| 450 | } # export()
 | 
|---|
| 451 | 
 | 
|---|
| 452 | 
 | 
|---|
| 453 | # Print individual records in BIND format
 | 
|---|
| 454 | sub printrec_bind {
 | 
|---|
| 455 |   my $dnsdb = shift;
 | 
|---|
| 456 | 
 | 
|---|
| 457 | #  my ($zonefiles, $recid, $revrec, $loclist, $zone, $host, $type, $val, $distance, $weight, $port, $ttl,
 | 
|---|
| 458 |   my ($zonefiles, $loclist, $recid, $revrec, $recflags, $zone, $host, $type, $val, $distance, $weight, $port, $ttl,
 | 
|---|
| 459 |         $loc, $stamp, $expires, $stampactive) = @_;
 | 
|---|
| 460 | 
 | 
|---|
| 461 |   # Just In Case something is lingering in the DB
 | 
|---|
| 462 |   $loc = '' if !$loc;
 | 
|---|
| 463 | 
 | 
|---|
| 464 |   ## Records that are valid only before or after a set time
 | 
|---|
| 465 |   # Note that BIND-style zone files fundamentally don't support this directly
 | 
|---|
| 466 |   # unlike tinydns, as it's not a native feature/function.  Dropping TTLs to
 | 
|---|
| 467 |   # 15s or so is the best we can do for expiry.  "Valid-after" is only as good
 | 
|---|
| 468 |   # as the export cron job timing.
 | 
|---|
| 469 |   if ($stampactive) {
 | 
|---|
| 470 |     my $now = time();
 | 
|---|
| 471 |     if ($expires) {
 | 
|---|
| 472 |       # record expires at $stamp;  decide if we need to keep the TTL on file
 | 
|---|
| 473 |       # or set it to 15 so the record falls out of caches quickly sometime
 | 
|---|
| 474 |       # around the nominal expiry time.
 | 
|---|
| 475 | 
 | 
|---|
| 476 |       # For weirdos who set huge TTLs, cap the TTL at one day.  30+ years ago
 | 
|---|
| 477 |       # long TTLs made sense when even DNS had a measurable cost in small
 | 
|---|
| 478 |       # networks;  today DNS is below the noise floor in all but the largest
 | 
|---|
| 479 |       # networks and systems.
 | 
|---|
| 480 |       my $ahead = (86400 < $ttl*2 ? 86400 : $ttl*2);
 | 
|---|
| 481 |       if (($now + $ahead) < $stamp) {
 | 
|---|
| 482 |         # more than 2x TTL OR more than one day (whichever is less) from expiry time;  publish normal record
 | 
|---|
| 483 |       } elsif ($now > $stamp) {
 | 
|---|
| 484 |         # record has expired;  return early as we don't need to publish anything
 | 
|---|
| 485 |         return;
 | 
|---|
| 486 |       } else {
 | 
|---|
| 487 |         # less than 2x TTL from expiry time, set a short TTL
 | 
|---|
| 488 |         $ttl = $dnsdb->{bind_export_autoexpire_ttl};
 | 
|---|
| 489 |       }
 | 
|---|
| 490 |     } else {
 | 
|---|
| 491 |       # record is "active after";  return unless it's now after the nominal validity timestamp.
 | 
|---|
| 492 |       return unless $now >= $stamp;
 | 
|---|
| 493 |     }
 | 
|---|
| 494 |   } # if $stampactive
 | 
|---|
| 495 | 
 | 
|---|
| 496 |   ## And now to the records!
 | 
|---|
| 497 | 
 | 
|---|
| 498 |   if ($typemap{$type} eq 'SOA') {
 | 
|---|
| 499 |     # host contains pri-ns:responsible
 | 
|---|
| 500 |     # val is abused to contain refresh:retry:expire:minttl
 | 
|---|
| 501 |     # let's be explicit about abusing $host and $val
 | 
|---|
| 502 |     my ($email, $primary) = (split /:/, $host)[0,1];
 | 
|---|
| 503 |     my ($refresh, $retry, $expire, $min_ttl) = (split /:/, $val)[0,1,2,3];
 | 
|---|
| 504 |     my $serial = 0;  # fail less horribly than leaving it empty?
 | 
|---|
| 505 |     # just snarfing the right SOA serial for the zone type
 | 
|---|
| 506 |     if ($revrec eq 'y') {
 | 
|---|
| 507 |       ($serial) = $dnsdb->{dbh}->selectrow_array("SELECT zserial FROM revzones WHERE revnet=?", undef, $zone);
 | 
|---|
| 508 |     } else {
 | 
|---|
| 509 |       ($serial) = $dnsdb->{dbh}->selectrow_array("SELECT zserial FROM domains WHERE domain=?", undef, $zone);
 | 
|---|
| 510 |     } # revrec <> 'y'
 | 
|---|
| 511 |     # suppress a "uninitialized value" warning.  should be impossible but...
 | 
|---|
| 512 |     # abuse hours as the last digit pair of the serial for simplicity
 | 
|---|
| 513 | ##fixme?:  alternate SOA serial schemes?
 | 
|---|
| 514 |     $serial = strftime("%Y%m%d%H", localtime()) if !$serial;
 | 
|---|
| 515 |     $primary .= "." if $primary !~ /\.$/;
 | 
|---|
| 516 |     $email .= "." if $email !~ /\.$/;
 | 
|---|
| 517 | #    print *{$zonefiles->{$loc}} "Z$zone:$primary:$email:$serial:$refresh:$retry:$expire:$min_ttl:$ttl:$stamp:$loc\n"
 | 
|---|
| 518 | #      or die $!;
 | 
|---|
| 519 | #    print *{$zonefiles->{$loc}} "$zone $ttl    IN      SOA     $primary        $email  ( $serial $refresh $retry $expire $min_ttl )\n"
 | 
|---|
| 520 | #       or die "couldn't write $zone SOA: $!";
 | 
|---|
| 521 | 
 | 
|---|
| 522 |     # Prepare the body of the record
 | 
|---|
| 523 |     my $recdata = "$ttl IN      SOA     $primary        $email  ( $serial $refresh $retry $expire $min_ttl )\n";
 | 
|---|
| 524 | 
 | 
|---|
| 525 |     # ... and prepend the zone name FQDN
 | 
|---|
| 526 |     if ($revrec eq 'y') {
 | 
|---|
| 527 |       my $zone2 = DNSDB::_ZONE($zone, 'ZONE', 'r', '.').($zone->{isv6} ? '.ip6.arpa' : '.in-addr.arpa');
 | 
|---|
| 528 |       $recdata = "$zone2.       $recdata";
 | 
|---|
| 529 |     } else {
 | 
|---|
| 530 |       $recdata = "$zone.        $recdata";
 | 
|---|
| 531 |     }
 | 
|---|
| 532 | 
 | 
|---|
| 533 |     __recprint($zonefiles, $loclist, $loc, $recdata);
 | 
|---|
| 534 |   } # SOA
 | 
|---|
| 535 | 
 | 
|---|
| 536 |   elsif ($typemap{$type} eq 'A') {
 | 
|---|
| 537 |     ($host,$val) = __revswap($host,$val) if $revrec eq 'y';
 | 
|---|
| 538 | #    print $datafile "+$host:$val:$ttl:$stamp:$loc\n" or die $!;
 | 
|---|
| 539 | #    print {$zonefiles->{$loc}} "$host  $ttl    IN      A       $val\n" or die $!;
 | 
|---|
| 540 |     my $recdata = "$host.       $ttl    IN      A       $val\n";
 | 
|---|
| 541 |     __recprint($zonefiles, $loclist, $loc, $recdata);
 | 
|---|
| 542 |   } # A
 | 
|---|
| 543 | 
 | 
|---|
| 544 |   elsif ($typemap{$type} eq 'NS') {
 | 
|---|
| 545 |     if ($revrec eq 'y') {
 | 
|---|
| 546 |       $val = NetAddr::IP->new($val);
 | 
|---|
| 547 | 
 | 
|---|
| 548 | ##fixme:  conversion for sub-/24 delegations in reverse zones?
 | 
|---|
| 549 | #      if (!$val->{isv6} && ($val->masklen > 24)) {
 | 
|---|
| 550 | #      }
 | 
|---|
| 551 | 
 | 
|---|
| 552 |       my $val2 = DNSDB::_ZONE($val, 'ZONE', 'r', '.').($val->{isv6} ? '.ip6.arpa' : '.in-addr.arpa');
 | 
|---|
| 553 |       $host .= "." if $host !~ /\.$/;
 | 
|---|
| 554 |       my $recdata = "$val2.     $ttl    IN      NS      $host\n";
 | 
|---|
| 555 |       __recprint($zonefiles, $loclist, $loc, $recdata);
 | 
|---|
| 556 | 
 | 
|---|
| 557 |     } else {
 | 
|---|
| 558 |       my $recdata = "$host.     $ttl    IN      NS      $val.\n";
 | 
|---|
| 559 |       __recprint($zonefiles, $loclist, $loc, $recdata);
 | 
|---|
| 560 |     }
 | 
|---|
| 561 |   } # NS
 | 
|---|
| 562 | 
 | 
|---|
| 563 |   elsif ($typemap{$type} eq 'AAAA') {
 | 
|---|
| 564 | #    ($host,$val) = __revswap($host,$val) if $revrec eq 'y';
 | 
|---|
| 565 | #    print {$zonefiles->{$loc}} "$host  $ttl    IN      AAAA    $val\n" or die $!;
 | 
|---|
| 566 |     my $recdata = "$host.       $ttl    IN      AAAA    $val\n";
 | 
|---|
| 567 |     __recprint($zonefiles, $loclist, $loc, $recdata);
 | 
|---|
| 568 |   } # AAAA
 | 
|---|
| 569 | 
 | 
|---|
| 570 |   elsif ($typemap{$type} eq 'MX') {
 | 
|---|
| 571 | #    ($host,$val) = __revswap($host,$val) if $revrec eq 'y';
 | 
|---|
| 572 | #    print {$zonefiles->{$loc}} "$host  $ttl    IN      MX      $distance $val\n" or die $!;
 | 
|---|
| 573 | # should arguably swap host and val first, but MX records really don't make any sense in reverse zones, so any silliness that results from finding one doesn't much matter.
 | 
|---|
| 574 |     my $recdata = "$host.       $ttl    IN      MX      $distance $val.\n";
 | 
|---|
| 575 |     __recprint($zonefiles, $loclist, $loc, $recdata);
 | 
|---|
| 576 |   } # MX
 | 
|---|
| 577 | 
 | 
|---|
| 578 |   elsif ($typemap{$type} eq 'TXT') {
 | 
|---|
| 579 | #    ($host,$val) = __revswap($host,$val) if $revrec eq 'y';
 | 
|---|
| 580 | #    print {$zonefiles->{$loc}} "$host  $ttl    IN      TXT     \"$val\"\n" or die $!;
 | 
|---|
| 581 |     # Clean up some lingering tinydns/VegaDNSisms
 | 
|---|
| 582 |     DNSDB::_deoctal(\$val);
 | 
|---|
| 583 |     my $recdata = "$host.       $ttl    IN      TXT     \"$val\"\n";
 | 
|---|
| 584 |     __recprint($zonefiles, $loclist, $loc, $recdata);
 | 
|---|
| 585 |   } # TXT
 | 
|---|
| 586 | 
 | 
|---|
| 587 |   elsif ($typemap{$type} eq 'CNAME') {
 | 
|---|
| 588 | #    ($host,$val) = __revswap($host,$val) if $revrec eq 'y';
 | 
|---|
| 589 | #    print {$zonefiles->{$loc}} "$host  $ttl    IN      CNAME   $val\n" or die $!;
 | 
|---|
| 590 |     my $recdata;
 | 
|---|
| 591 |     if ($zone =~ /\.rpz$/) {
 | 
|---|
| 592 |       # RPZ data stored and published as-is
 | 
|---|
| 593 |       $recdata = "$host $ttl    IN      CNAME   $val\n";
 | 
|---|
| 594 |     } else {
 | 
|---|
| 595 |       $recdata = "$host.        $ttl    IN      CNAME   $val.\n";
 | 
|---|
| 596 |     }
 | 
|---|
| 597 |     __recprint($zonefiles, $loclist, $loc, $recdata);
 | 
|---|
| 598 |   } # CNAME
 | 
|---|
| 599 | 
 | 
|---|
| 600 |   elsif ($typemap{$type} eq 'SRV') {
 | 
|---|
| 601 | #    ($host,$val) = __revswap($host,$val) if $revrec eq 'y';
 | 
|---|
| 602 | #    print {$zonefiles->{$loc}} "$host  $ttl    IN      SRV     $distance   $weight $port   $val\n" or die $!;
 | 
|---|
| 603 |     my $recdata = "$host.       $ttl    IN      SRV     $distance       $weight $port   $val.\n";
 | 
|---|
| 604 |     __recprint($zonefiles, $loclist, $loc, $recdata);
 | 
|---|
| 605 |   } # SRV
 | 
|---|
| 606 | 
 | 
|---|
| 607 |   elsif ($typemap{$type} eq 'RP') {
 | 
|---|
| 608 | #    ($host,$val) = __revswap($host,$val) if $revrec eq 'y';
 | 
|---|
| 609 | #    print {$zonefiles->{$loc}} "$host  $ttl    IN      RP      $val\n" or die $!;
 | 
|---|
| 610 |     my $recdata = "$host.       $ttl    IN      RP      $val\n";
 | 
|---|
| 611 |     __recprint($zonefiles, $loclist, $loc, $recdata);
 | 
|---|
| 612 |   } # RP
 | 
|---|
| 613 | 
 | 
|---|
| 614 |   elsif ($typemap{$type} eq 'PTR') {
 | 
|---|
| 615 | #    $$recflags{$val}++;
 | 
|---|
| 616 |        # maybe track exclusions like this?  so we can publish "all
 | 
|---|
| 617 |        # A and/or PTR records" irrespective of template records
 | 
|---|
| 618 |     $$recflags{$val} = 'ptr';
 | 
|---|
| 619 |     return if $host eq '%blank%';
 | 
|---|
| 620 | 
 | 
|---|
| 621 |     if ($revrec eq 'y') {
 | 
|---|
| 622 | 
 | 
|---|
| 623 |       if ($val =~ /\.arpa$/) {
 | 
|---|
| 624 |         # someone put in the formal .arpa name.  humor them.
 | 
|---|
| 625 |         my $recdata = "$val.    $ttl    IN      PTR     $host.\n";
 | 
|---|
| 626 |         __recprint($zonefiles, $loclist, $loc, $recdata);
 | 
|---|
| 627 |       } else {
 | 
|---|
| 628 |         $zone = NetAddr::IP->new($zone);
 | 
|---|
| 629 |         if (!$zone->{isv6} && $zone->masklen > 24) {
 | 
|---|
| 630 |           # sub-octet v4 zone
 | 
|---|
| 631 |           ($val) = ($val =~ /\.(\d+)$/);
 | 
|---|
| 632 |           my $recdata = "$val.".DNSDB::_ZONE($zone, 'ZONE', 'r', '.').".in-addr.arpa.   $ttl    IN      PTR     $host.\n";
 | 
|---|
| 633 |           __recprint($zonefiles, $loclist, $loc, $recdata);
 | 
|---|
| 634 |         } else {
 | 
|---|
| 635 |           # not going to care about strange results if $val is not an IP value and is resolveable in DNS
 | 
|---|
| 636 |           $val = NetAddr::IP->new($val);
 | 
|---|
| 637 |           my $recdata = DNSDB::_ZONE($val, 'ZONE', 'r', '.').($val->{isv6} ? '.ip6.arpa' : '.in-addr.arpa').
 | 
|---|
| 638 |                 ".      $ttl    IN      PTR     $host.\n";
 | 
|---|
| 639 |           __recprint($zonefiles, $loclist, $loc, $recdata);
 | 
|---|
| 640 |         }
 | 
|---|
| 641 |       } # non-".arpa" $val
 | 
|---|
| 642 | 
 | 
|---|
| 643 |     } else {
 | 
|---|
| 644 |       # PTRs in forward zones are less bizarre and insane than some other record types
 | 
|---|
| 645 |       # in reverse zones...  OTOH we can't validate them any which way, so we cross our
 | 
|---|
| 646 |       # fingers and close our eyes and make it Someone Else's Problem.
 | 
|---|
| 647 | #      print {$zonefiles->{$loc}} "$host        $ttl    IN      PTR     $val\n" or die $!;
 | 
|---|
| 648 |       my $recdata = "$host.     $ttl    IN      PTR     $val.\n";
 | 
|---|
| 649 |       __recprint($zonefiles, $loclist, $loc, $recdata);
 | 
|---|
| 650 |     }
 | 
|---|
| 651 |   } # PTR
 | 
|---|
| 652 | 
 | 
|---|
| 653 |   elsif ($type == 65280) { # A+PTR
 | 
|---|
| 654 |     # Recurse to PTR or A as appropriate because BIND et al don't share
 | 
|---|
| 655 |     # the tinydns concept of merged forward/reverse records
 | 
|---|
| 656 | # %recflags gets updated in the PTR branch just above
 | 
|---|
| 657 | #    $$recflags{$val}++;
 | 
|---|
| 658 |     if ($revrec eq 'y') {
 | 
|---|
| 659 |       printrec_bind($dnsdb, $zonefiles, $loclist, $recid, $revrec, $recflags, $zone, $host, 12, $val,
 | 
|---|
| 660 |         $distance, $weight, $port, $ttl, $loc, $stamp, $expires, $stampactive);
 | 
|---|
| 661 | # ... but we need to tweak it for this case?  so the A record gets published...
 | 
|---|
| 662 | #$$recflags{$val} = 'a+ptr';
 | 
|---|
| 663 | #print {$zonefiles->{$loc}} "=$host:$val:$ttl:$stamp:$loc\n" or die $!;
 | 
|---|
| 664 | #          printrec_bind($dnsdb, \%zonefiles, $recid, 'y', \@loclist, $revzone,
 | 
|---|
| 665 | #            $host, $type, $val, $dist, $weight, $port, $ttl, $loc, $stamp, $expires, $stampactive);
 | 
|---|
| 666 | #  my ($zonefiles, $recid, $revrec, $loclist, $zone, $host, $type, $val, $distance, $weight, $port, $ttl,
 | 
|---|
| 667 | #        $loc, $stamp, $expires, $stampactive) = @_;
 | 
|---|
| 668 |     } else {
 | 
|---|
| 669 |       printrec_bind($dnsdb, $zonefiles, $loclist, $recid, $revrec, $recflags, $zone, $host, 1, $val,
 | 
|---|
| 670 |         $distance, $weight, $port, $ttl, $loc, $stamp, $expires, $stampactive);
 | 
|---|
| 671 |       # set a unique flag to skip template expansion for this IP in forward zones
 | 
|---|
| 672 |       $$recflags{$val} = 'a';
 | 
|---|
| 673 |     }
 | 
|---|
| 674 |   } # A+PTR
 | 
|---|
| 675 | 
 | 
|---|
| 676 |   elsif ($type == 65282) { # PTR template
 | 
|---|
| 677 |     # only useful for v4 with standard DNS software, since this expands all
 | 
|---|
| 678 |     # IPs in $zone (or possibly $val?) with autogenerated records
 | 
|---|
| 679 |     $val = NetAddr::IP->new($val);
 | 
|---|
| 680 |     return if $val->{isv6};
 | 
|---|
| 681 | 
 | 
|---|
| 682 |     if ($val->masklen <= 16) {
 | 
|---|
| 683 |       foreach my $sub ($val->split(16)) {
 | 
|---|
| 684 |         __publish_template_bind($dnsdb, $sub, $recflags, $host, $zonefiles, $loclist, $ttl, $stamp, $loc, $zone, $revrec);
 | 
|---|
| 685 |       }
 | 
|---|
| 686 |     } else {
 | 
|---|
| 687 |       __publish_template_bind($dnsdb, $val, $recflags, $host, $zonefiles, $loclist, $ttl, $stamp, $loc, $zone, $revrec);
 | 
|---|
| 688 |     }
 | 
|---|
| 689 |   } # PTR template
 | 
|---|
| 690 | 
 | 
|---|
| 691 |   elsif ($type == 65283) { # A+PTR template
 | 
|---|
| 692 |     $val = NetAddr::IP->new($val);
 | 
|---|
| 693 |     # Just In Case.  An A+PTR should be impossible to add to a v6 revzone via API.
 | 
|---|
| 694 |     return if $val->{isv6};
 | 
|---|
| 695 | 
 | 
|---|
| 696 |     if ($val->masklen < 16) {
 | 
|---|
| 697 |       foreach my $sub ($val->split(16)) {
 | 
|---|
| 698 |         __publish_template_bind($dnsdb, $sub, $recflags, $host, $zonefiles, $loclist, $ttl, $stamp, $loc, $zone, $revrec);
 | 
|---|
| 699 |       }
 | 
|---|
| 700 |     } else {
 | 
|---|
| 701 |       __publish_template_bind($dnsdb, $val, $recflags, $host, $zonefiles, $loclist, $ttl, $stamp, $loc, $zone, $revrec);
 | 
|---|
| 702 |     }
 | 
|---|
| 703 |   } # A+PTR template
 | 
|---|
| 704 |  
 | 
|---|
| 705 |   elsif ($type == 65284) { # AAAA+PTR template
 | 
|---|
| 706 |     # Stub for completeness.  Could be exported to DNS software that supports
 | 
|---|
| 707 |     # some degree of internal automagic in generic-record-creation
 | 
|---|
| 708 |     # (eg http://search.cpan.org/dist/AllKnowingDNS/ )
 | 
|---|
| 709 |   } # AAAA+PTR template
 | 
|---|
| 710 | 
 | 
|---|
| 711 |   elsif ($type == 65300) { # ALIAS
 | 
|---|
| 712 |     # Implemented as a unique record in parallel with many other
 | 
|---|
| 713 |     # management tools, for clarity VS formal behviour around CNAME
 | 
|---|
| 714 |     # Mainly for "root CNAME" or "apex alias";  limited value for any
 | 
|---|
| 715 |     # other use case since CNAME can generally be used elsewhere.
 | 
|---|
| 716 | 
 | 
|---|
| 717 |     # .arpa zones don't need this hack.  shouldn't be allowed into
 | 
|---|
| 718 |     # the DB in the first place, but Just In Case...
 | 
|---|
| 719 |     return if $revrec eq 'y';
 | 
|---|
| 720 | 
 | 
|---|
| 721 |     my ($iplist) = $dnsdb->{dbh}->selectrow_array("SELECT auxdata FROM records WHERE record_id = ?", undef, $recid);
 | 
|---|
| 722 |     $iplist = '' if !$iplist;
 | 
|---|
| 723 | 
 | 
|---|
| 724 |     # shared target-name-to-IP converter
 | 
|---|
| 725 |     my $liveips = $dnsdb->_grab_65300($recid, $val);
 | 
|---|
| 726 |     # only update the cache if the live lookup actually returned data
 | 
|---|
| 727 |     if ($liveips && ($iplist ne $liveips)) {
 | 
|---|
| 728 |       $dnsdb->{dbh}->do("UPDATE records SET auxdata = ? WHERE record_id = ?", undef, $liveips, $recid);
 | 
|---|
| 729 |       $iplist = $liveips;
 | 
|---|
| 730 |     }
 | 
|---|
| 731 | 
 | 
|---|
| 732 |     # slice the TTL we'll actually publish off the front
 | 
|---|
| 733 |     my @asubs = split ';', $iplist;
 | 
|---|
| 734 |     my $attl = shift @asubs;
 | 
|---|
| 735 | 
 | 
|---|
| 736 |     # output a plain old A or AAAA record for each IP the target name really points to.
 | 
|---|
| 737 |     # in the event that, for whatever reason, no A/AAAA records are available for $val, nothing will be output.
 | 
|---|
| 738 |     foreach my $subip (@asubs) {
 | 
|---|
| 739 |       my $recdata;
 | 
|---|
| 740 |       if ($subip =~ /\d+\.\d+\.\d+\.\d+/) {
 | 
|---|
| 741 |         $recdata = "$host.      $attl   IN      A       $subip\n";
 | 
|---|
| 742 |       } else {
 | 
|---|
| 743 |         $recdata = "$host.      $attl   IN      AAAA    $subip\n";
 | 
|---|
| 744 |       }
 | 
|---|
| 745 |       __recprint($zonefiles, $loclist, $loc, $recdata);
 | 
|---|
| 746 |     }
 | 
|---|
| 747 | 
 | 
|---|
| 748 |   } # ALIAS
 | 
|---|
| 749 | 
 | 
|---|
| 750 | 
 | 
|---|
| 751 | } # printrec_bind()
 | 
|---|
| 752 | 
 | 
|---|
| 753 | 
 | 
|---|
| 754 | sub __publish_template_bind {
 | 
|---|
| 755 |   my $dnsdb = shift;
 | 
|---|
| 756 |   my $sub = shift;
 | 
|---|
| 757 |   my $recflags = shift;
 | 
|---|
| 758 |   my $hpat = shift;
 | 
|---|
| 759 |   my $zonefiles = shift;
 | 
|---|
| 760 |   my $loclist = shift;
 | 
|---|
| 761 |   my $ttl = shift;
 | 
|---|
| 762 |   my $stamp = shift;
 | 
|---|
| 763 |   my $loc = shift;
 | 
|---|
| 764 |   my $zpass = shift;
 | 
|---|
| 765 |   my $zone = new NetAddr::IP $zpass;
 | 
|---|
| 766 | #  my $zone = new NetAddr::IP shift;
 | 
|---|
| 767 |   my $revrec = shift || 'y';
 | 
|---|
| 768 | #  my $ptrflag = shift || 0;    ##fixme:  default to PTR instead of A record for the BIND variant of this sub?
 | 
|---|
| 769 | 
 | 
|---|
| 770 |   # do this conversion once, not (number-of-ips-in-subnet) times
 | 
|---|
| 771 |   my $arpabase = DNSDB::_ZONE($zone, 'ZONE.in-addr.arpa.', 'r', '.');
 | 
|---|
| 772 | 
 | 
|---|
| 773 |   my $iplist = $sub->splitref(32);
 | 
|---|
| 774 |   my $ipindex = -1;
 | 
|---|
| 775 |   foreach (@$iplist) {
 | 
|---|
| 776 |     my $ip = $_->addr;
 | 
|---|
| 777 |     $ipindex++;
 | 
|---|
| 778 |     # make as if we split the non-octet-aligned block into octet-aligned blocks as with SOA
 | 
|---|
| 779 |     my $lastoct = (split /\./, $ip)[3];
 | 
|---|
| 780 | 
 | 
|---|
| 781 |     # Allow smaller entries to override longer ones, eg, a specific PTR will
 | 
|---|
| 782 |     # always publish, overriding any template record containing that IP.
 | 
|---|
| 783 |     # %blank% also needs to be per-IP here to properly cascade overrides with
 | 
|---|
| 784 |     # multiple nested templates
 | 
|---|
| 785 | #    next if $$recflags{$ip}; # && $self->{skip_bcast_255}
 | 
|---|
| 786 | 
 | 
|---|
| 787 | #    next if $$recflags{$ip} && ($$recflags{$ip} eq 'ptr' || $$recflags{$ip} eq 'a+ptr');
 | 
|---|
| 788 | 
 | 
|---|
| 789 |     if ($revrec eq 'y') {
 | 
|---|
| 790 |       next if $$recflags{$ip};  # blanket exclusion;  we do reverse records first
 | 
|---|
| 791 |     } else {
 | 
|---|
| 792 | ##fixme:  A record side templates not cascading correctly
 | 
|---|
| 793 |       # excluding ptr does NOT work, as it excludes ALL previously covered A+PTR template entries.
 | 
|---|
| 794 |       # we only want to exclude the singleton (A+)PTR ones
 | 
|---|
| 795 |       #if ($$recflags{$ip} && ($$recflags{$ip} eq 'a' || $$recflags{$ip} eq 'ptr')) {
 | 
|---|
| 796 |       if ($$recflags{$ip} && ($$recflags{$ip} eq 'a' || $$recflags{$ip} eq 'atemplate' || $$recflags{$ip} eq 'ptr')) {
 | 
|---|
| 797 |         # default skip case
 | 
|---|
| 798 |         next;
 | 
|---|
| 799 |       }
 | 
|---|
| 800 |     } # revrec branch for skipping template member expansion
 | 
|---|
| 801 | 
 | 
|---|
| 802 |     # set a forward/reverse-unique flag in %recflags
 | 
|---|
| 803 |     $$recflags{$ip} = ($revrec eq 'y' ? 'ptrtemplate' : 'atemplate');
 | 
|---|
| 804 |     next if $hpat eq '%blank%';
 | 
|---|
| 805 | 
 | 
|---|
| 806 |     my $rec = $hpat;  # start fresh with the template for each IP
 | 
|---|
| 807 | ##fixme:  there really isn't a good way to handle sub-/24 zones here.  This way at least
 | 
|---|
| 808 | # seems less bad than some alternatives.
 | 
|---|
| 809 |     $dnsdb->_template4_expand(\$rec, $ip, \$sub, $ipindex);
 | 
|---|
| 810 |     # _template4_expand may blank $rec;  if so, don't publish a record
 | 
|---|
| 811 |     next if !$rec;
 | 
|---|
| 812 | ##fixme:  trim merged record type voodoo.  "if ($ptrflag) {} else {}" ?
 | 
|---|
| 813 | #    if ($ptrflag || $zone->masklen > 24) {
 | 
|---|
| 814 |     my $recdata;
 | 
|---|
| 815 |     if ($revrec eq 'y') {
 | 
|---|
| 816 | # || $zone->masklen > 24) {
 | 
|---|
| 817 | #      print $fh "^$lastoct.$arpabase:$rec:$ttl:$stamp:$loc\n" or die $!;
 | 
|---|
| 818 | ##fixme: use $ORIGIN instead?  make the FQDN output switchable-optional?
 | 
|---|
| 819 | #      print $fh "$lastoct.$arpabase    $ttl    IN      PTR     $rec\n" or die $!;
 | 
|---|
| 820 | #      if ($revrec ne 'y') {
 | 
|---|
| 821 |         # print a separate A record.  Arguably we could use an = record here instead.
 | 
|---|
| 822 | #        print $fh "+$rec:$ip:$ttl:$stamp:$loc\n" or die $!;
 | 
|---|
| 823 | #        print $fh "$rec        $ttl    IN      A       $ip\n" or die $!;
 | 
|---|
| 824 | #      }
 | 
|---|
| 825 |       if ($dnsdb->{bind_export_fqdn}) {
 | 
|---|
| 826 |         $recdata = "$lastoct.$arpabase  $ttl    IN      PTR     $rec.\n";
 | 
|---|
| 827 |       } else {
 | 
|---|
| 828 |         $recdata = "$lastoct    $ttl    IN      PTR     $rec.\n";
 | 
|---|
| 829 |       }
 | 
|---|
| 830 | 
 | 
|---|
| 831 |     } else {
 | 
|---|
| 832 |       # A record, not merged
 | 
|---|
| 833 | #      print $fh "=$rec:$ip:$ttl:$stamp:$loc\n" or die $!;
 | 
|---|
| 834 | #      print $fh "$rec  $ttl    IN      A       $ip\n" or die $!;
 | 
|---|
| 835 |       $rec =~ s/\.$zone$// unless $dnsdb->{bind_export_fqdn};
 | 
|---|
| 836 |       $recdata = "$rec. $ttl    IN      A       $ip\n";
 | 
|---|
| 837 |     }
 | 
|---|
| 838 |     # and finally 
 | 
|---|
| 839 |     __recprint($zonefiles, $loclist, $loc, $recdata);
 | 
|---|
| 840 |   } # foreach (@iplist)
 | 
|---|
| 841 | } # __publish_template_bind()
 | 
|---|
| 842 | 
 | 
|---|
| 843 | 
 | 
|---|
| 844 | # actual record printing sub
 | 
|---|
| 845 | # loop on the locations here so we don't end up with a huge pot of copypasta
 | 
|---|
| 846 | sub __recprint {
 | 
|---|
| 847 |   my ($zonefiles, $loclist, $loc, $recdata) = @_;
 | 
|---|
| 848 |   if ($loc eq '') {
 | 
|---|
| 849 |     # "common" record visible in all locations
 | 
|---|
| 850 |     foreach my $rloc (@{$loclist}) {
 | 
|---|
| 851 |       print {$zonefiles->{$rloc}} $recdata or die $!;
 | 
|---|
| 852 |     }
 | 
|---|
| 853 |   } else {
 | 
|---|
| 854 |     # record with specific location tagged
 | 
|---|
| 855 |     print {$zonefiles->{$loc}} $recdata or die $!;
 | 
|---|
| 856 |   }
 | 
|---|
| 857 | }
 | 
|---|
| 858 | 
 | 
|---|
| 859 | 1;
 | 
|---|