2 Unix SMB/CIFS implementation.
6 Copyright (C) 2010 Kai Blin <kai@samba.org>
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "libcli/util/ntstatus.h"
24 #include "libcli/util/werror.h"
25 #include "librpc/ndr/libndr.h"
26 #include "librpc/gen_ndr/ndr_dns.h"
27 #include "librpc/gen_ndr/ndr_dnsp.h"
29 #include "dsdb/samdb/samdb.h"
30 #include "dsdb/common/util.h"
31 #include "dns_server/dns_server.h"
34 #define DBGC_CLASS DBGC_DNS
36 bool dns_name_match(const char *zone, const char *name, size_t *host_part_len)
38 size_t zl = strlen(zone);
39 size_t nl = strlen(name);
41 static const size_t fixup = 'a' - 'A';
47 for (zi = zl, ni = nl; zi >= 0; zi--, ni--) {
51 /* convert to lower case */
52 if (zc >= 'A' && zc <= 'Z') {
55 if (nc >= 'A' && nc <= 'Z') {
65 if (name[ni] != '.') {
72 *host_part_len = ni+1;
77 /* Names are equal if they match and there's nothing left over */
78 bool dns_name_equal(const char *name1, const char *name2)
81 bool ret = dns_name_match(name1, name2, &host_part_len);
83 return ret && (host_part_len == 0);
87 see if two dns records match
89 bool dns_records_match(struct dnsp_DnssrvRpcRecord *rec1,
90 struct dnsp_DnssrvRpcRecord *rec2)
95 if (rec1->wType != rec2->wType) {
99 /* see if the data matches */
100 switch (rec1->wType) {
102 return strcmp(rec1->data.ipv4, rec2->data.ipv4) == 0;
104 return strcmp(rec1->data.ipv6, rec2->data.ipv6) == 0;
106 return dns_name_equal(rec1->data.cname, rec2->data.cname);
108 if (rec1->data.txt.count != rec2->data.txt.count) {
112 for (i=0; i<rec1->data.txt.count; i++) {
113 status = status && (strcmp(rec1->data.txt.str[i],
114 rec2->data.txt.str[i]) == 0);
118 return strcmp(rec1->data.ptr, rec2->data.ptr) == 0;
120 return dns_name_equal(rec1->data.ns, rec2->data.ns);
123 return rec1->data.srv.wPriority == rec2->data.srv.wPriority &&
124 rec1->data.srv.wWeight == rec2->data.srv.wWeight &&
125 rec1->data.srv.wPort == rec2->data.srv.wPort &&
126 dns_name_equal(rec1->data.srv.nameTarget, rec2->data.srv.nameTarget);
129 return rec1->data.mx.wPriority == rec2->data.mx.wPriority &&
130 dns_name_equal(rec1->data.mx.nameTarget, rec2->data.mx.nameTarget);
133 return strcmp(rec1->data.hinfo.cpu, rec2->data.hinfo.cpu) == 0 &&
134 strcmp(rec1->data.hinfo.os, rec2->data.hinfo.os) == 0;
137 return dns_name_equal(rec1->data.soa.mname, rec2->data.soa.mname) &&
138 dns_name_equal(rec1->data.soa.rname, rec2->data.soa.rname) &&
139 rec1->data.soa.serial == rec2->data.soa.serial &&
140 rec1->data.soa.refresh == rec2->data.soa.refresh &&
141 rec1->data.soa.retry == rec2->data.soa.retry &&
142 rec1->data.soa.expire == rec2->data.soa.expire &&
143 rec1->data.soa.minimum == rec2->data.soa.minimum;
151 WERROR dns_lookup_records(struct dns_server *dns,
154 struct dnsp_DnssrvRpcRecord **records,
157 static const char * const attrs[] = { "dnsRecord", NULL};
158 struct ldb_message_element *el;
161 struct ldb_message *msg = NULL;
162 struct dnsp_DnssrvRpcRecord *recs;
167 ret = dsdb_search_one(dns->samdb, mem_ctx, &msg, dn,
168 LDB_SCOPE_BASE, attrs, 0, "%s", "(objectClass=dnsNode)");
169 if (ret == LDB_ERR_NO_SUCH_OBJECT) {
170 return WERR_DNS_ERROR_NAME_DOES_NOT_EXIST;
172 if (ret != LDB_SUCCESS) {
173 /* TODO: we need to check if there's a glue record we need to
174 * create a referral to */
175 return DNS_ERR(NAME_ERROR);
178 el = ldb_msg_find_element(msg, attrs[0]);
180 return DNS_ERR(NAME_ERROR);
183 recs = talloc_zero_array(mem_ctx, struct dnsp_DnssrvRpcRecord, el->num_values);
187 for (ri = 0; ri < el->num_values; ri++) {
188 struct ldb_val *v = &el->values[ri];
189 enum ndr_err_code ndr_err;
191 ndr_err = ndr_pull_struct_blob(v, recs, &recs[ri],
192 (ndr_pull_flags_fn_t)ndr_pull_dnsp_DnssrvRpcRecord);
193 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
194 DEBUG(0, ("Failed to grab dnsp_DnssrvRpcRecord\n"));
195 return DNS_ERR(SERVER_FAILURE);
199 *rec_count = el->num_values;
203 WERROR dns_replace_records(struct dns_server *dns,
207 const struct dnsp_DnssrvRpcRecord *records,
210 struct ldb_message_element *el;
213 struct ldb_message *msg = NULL;
215 msg = ldb_msg_new(mem_ctx);
216 W_ERROR_HAVE_NO_MEMORY(msg);
220 ret = ldb_msg_add_empty(msg, "dnsRecord", LDB_FLAG_MOD_REPLACE, &el);
221 if (ret != LDB_SUCCESS) {
222 return DNS_ERR(SERVER_FAILURE);
225 el->values = talloc_zero_array(el, struct ldb_val, rec_count);
227 W_ERROR_HAVE_NO_MEMORY(el->values);
230 for (i = 0; i < rec_count; i++) {
231 static const struct dnsp_DnssrvRpcRecord zero;
232 struct ldb_val *v = &el->values[el->num_values];
233 enum ndr_err_code ndr_err;
235 if (memcmp(&records[i], &zero, sizeof(zero)) == 0) {
238 ndr_err = ndr_push_struct_blob(v, el->values, &records[i],
239 (ndr_push_flags_fn_t)ndr_push_dnsp_DnssrvRpcRecord);
240 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
241 DEBUG(0, ("Failed to grab dnsp_DnssrvRpcRecord\n"));
242 return DNS_ERR(SERVER_FAILURE);
248 if (el->num_values == 0) {
252 /* TODO: Delete object? */
253 el->flags = LDB_FLAG_MOD_DELETE;
257 ret = ldb_msg_add_string(msg, "objectClass", "dnsNode");
258 if (ret != LDB_SUCCESS) {
259 return DNS_ERR(SERVER_FAILURE);
262 ret = ldb_add(dns->samdb, msg);
263 if (ret != LDB_SUCCESS) {
264 return DNS_ERR(SERVER_FAILURE);
270 ret = ldb_modify(dns->samdb, msg);
271 if (ret != LDB_SUCCESS) {
272 return DNS_ERR(SERVER_FAILURE);
278 bool dns_authorative_for_zone(struct dns_server *dns,
281 const struct dns_server_zone *z;
282 size_t host_part_len = 0;
288 if (strcmp(name, "") == 0) {
291 for (z = dns->zones; z != NULL; z = z->next) {
294 match = dns_name_match(z->name, name, &host_part_len);
306 WERROR dns_name2dn(struct dns_server *dns,
313 const struct dns_server_zone *z;
314 size_t host_part_len = 0;
317 return DNS_ERR(FORMAT_ERROR);
320 /*TODO: Check if 'name' is a valid DNS name */
322 if (strcmp(name, "") == 0) {
323 base = ldb_get_default_basedn(dns->samdb);
324 dn = ldb_dn_copy(mem_ctx, base);
325 ldb_dn_add_child_fmt(dn, "DC=@,DC=RootDNSServers,CN=MicrosoftDNS,CN=System");
330 for (z = dns->zones; z != NULL; z = z->next) {
333 match = dns_name_match(z->name, name, &host_part_len);
340 return DNS_ERR(NAME_ERROR);
343 if (host_part_len == 0) {
344 dn = ldb_dn_copy(mem_ctx, z->dn);
345 ldb_dn_add_child_fmt(dn, "DC=@");
350 dn = ldb_dn_copy(mem_ctx, z->dn);
351 ldb_dn_add_child_fmt(dn, "DC=%*.*s", (int)host_part_len, (int)host_part_len, name);
356 WERROR dns_generate_options(struct dns_server *dns,
358 struct dns_res_rec **options)
360 struct dns_res_rec *o;
362 o = talloc_zero(mem_ctx, struct dns_res_rec);
367 o->rr_type = DNS_QTYPE_OPT;
368 /* This is ugly, but RFC2671 wants the payload size in this field */
369 o->rr_class = (enum dns_qclass) dns->max_payload;