Home | History | Annotate | Line # | Download | only in named
zoneconf.c revision 1.4
      1  1.2  christos /*	$NetBSD: zoneconf.c,v 1.4 2019/09/05 19:32:55 christos Exp $	*/
      2  1.1  christos 
      3  1.1  christos /*
      4  1.1  christos  * Copyright (C) Internet Systems Consortium, Inc. ("ISC")
      5  1.1  christos  *
      6  1.1  christos  * This Source Code Form is subject to the terms of the Mozilla Public
      7  1.1  christos  * License, v. 2.0. If a copy of the MPL was not distributed with this
      8  1.1  christos  * file, You can obtain one at http://mozilla.org/MPL/2.0/.
      9  1.1  christos  *
     10  1.1  christos  * See the COPYRIGHT file distributed with this work for additional
     11  1.1  christos  * information regarding copyright ownership.
     12  1.1  christos  */
     13  1.1  christos 
     14  1.1  christos #include <config.h>
     15  1.1  christos 
     16  1.3  christos #include <inttypes.h>
     17  1.3  christos #include <stdbool.h>
     18  1.3  christos 
     19  1.1  christos #include <isc/buffer.h>
     20  1.1  christos #include <isc/file.h>
     21  1.1  christos #include <isc/mem.h>
     22  1.1  christos #include <isc/print.h>
     23  1.1  christos #include <isc/stats.h>
     24  1.1  christos #include <isc/string.h>		/* Required for HP/UX (and others?) */
     25  1.1  christos #include <isc/util.h>
     26  1.1  christos 
     27  1.1  christos #include <dns/acl.h>
     28  1.1  christos #include <dns/db.h>
     29  1.1  christos #include <dns/ipkeylist.h>
     30  1.1  christos #include <dns/fixedname.h>
     31  1.1  christos #include <dns/journal.h>
     32  1.1  christos #include <dns/log.h>
     33  1.1  christos #include <dns/name.h>
     34  1.1  christos #include <dns/masterdump.h>
     35  1.1  christos #include <dns/rdata.h>
     36  1.1  christos #include <dns/rdatatype.h>
     37  1.1  christos #include <dns/rdataset.h>
     38  1.1  christos #include <dns/rdatalist.h>
     39  1.1  christos #include <dns/result.h>
     40  1.1  christos #include <dns/sdlz.h>
     41  1.1  christos #include <dns/ssu.h>
     42  1.1  christos #include <dns/stats.h>
     43  1.1  christos #include <dns/tsig.h>
     44  1.1  christos #include <dns/view.h>
     45  1.1  christos #include <dns/zone.h>
     46  1.1  christos 
     47  1.1  christos #include <ns/client.h>
     48  1.1  christos 
     49  1.1  christos #include <named/config.h>
     50  1.1  christos #include <named/globals.h>
     51  1.1  christos #include <named/log.h>
     52  1.1  christos #include <named/server.h>
     53  1.1  christos #include <named/zoneconf.h>
     54  1.1  christos 
     55  1.1  christos /* ACLs associated with zone */
     56  1.1  christos typedef enum {
     57  1.1  christos 	allow_notify,
     58  1.1  christos 	allow_query,
     59  1.1  christos 	allow_query_on,
     60  1.1  christos 	allow_transfer,
     61  1.1  christos 	allow_update,
     62  1.1  christos 	allow_update_forwarding
     63  1.1  christos } acl_type_t;
     64  1.1  christos 
     65  1.1  christos #define RETERR(x) do { \
     66  1.1  christos 	isc_result_t _r = (x); \
     67  1.1  christos 	if (_r != ISC_R_SUCCESS) \
     68  1.1  christos 		return (_r); \
     69  1.2  christos 	} while (/*CONSTCOND*/0)
     70  1.1  christos 
     71  1.1  christos #define CHECK(x) do { \
     72  1.1  christos 	result = (x); \
     73  1.1  christos 	if (result != ISC_R_SUCCESS) \
     74  1.1  christos 		goto cleanup; \
     75  1.2  christos 	} while (/*CONSTCOND*/0)
     76  1.1  christos 
     77  1.1  christos /*%
     78  1.1  christos  * Convenience function for configuring a single zone ACL.
     79  1.1  christos  */
     80  1.1  christos static isc_result_t
     81  1.1  christos configure_zone_acl(const cfg_obj_t *zconfig, const cfg_obj_t *vconfig,
     82  1.1  christos 		   const cfg_obj_t *config, acl_type_t acltype,
     83  1.1  christos 		   cfg_aclconfctx_t *actx, dns_zone_t *zone,
     84  1.1  christos 		   void (*setzacl)(dns_zone_t *, dns_acl_t *),
     85  1.1  christos 		   void (*clearzacl)(dns_zone_t *))
     86  1.1  christos {
     87  1.1  christos 	isc_result_t result;
     88  1.1  christos 	const cfg_obj_t *maps[5] = {NULL, NULL, NULL, NULL, NULL};
     89  1.1  christos 	const cfg_obj_t *aclobj = NULL;
     90  1.1  christos 	int i = 0;
     91  1.1  christos 	dns_acl_t **aclp = NULL, *acl = NULL;
     92  1.1  christos 	const char *aclname;
     93  1.1  christos 	dns_view_t *view;
     94  1.1  christos 
     95  1.1  christos 	view = dns_zone_getview(zone);
     96  1.1  christos 
     97  1.1  christos 	switch (acltype) {
     98  1.1  christos 	    case allow_notify:
     99  1.1  christos 		if (view != NULL)
    100  1.1  christos 			aclp = &view->notifyacl;
    101  1.1  christos 		aclname = "allow-notify";
    102  1.1  christos 		break;
    103  1.1  christos 	    case allow_query:
    104  1.1  christos 		if (view != NULL)
    105  1.1  christos 			aclp = &view->queryacl;
    106  1.1  christos 		aclname = "allow-query";
    107  1.1  christos 		break;
    108  1.1  christos 	    case allow_query_on:
    109  1.1  christos 		if (view != NULL)
    110  1.1  christos 			aclp = &view->queryonacl;
    111  1.1  christos 		aclname = "allow-query-on";
    112  1.1  christos 		break;
    113  1.1  christos 	    case allow_transfer:
    114  1.1  christos 		if (view != NULL)
    115  1.1  christos 			aclp = &view->transferacl;
    116  1.1  christos 		aclname = "allow-transfer";
    117  1.1  christos 		break;
    118  1.1  christos 	    case allow_update:
    119  1.1  christos 		if (view != NULL)
    120  1.1  christos 			aclp = &view->updateacl;
    121  1.1  christos 		aclname = "allow-update";
    122  1.1  christos 		break;
    123  1.1  christos 	    case allow_update_forwarding:
    124  1.1  christos 		if (view != NULL)
    125  1.1  christos 			aclp = &view->upfwdacl;
    126  1.1  christos 		aclname = "allow-update-forwarding";
    127  1.1  christos 		break;
    128  1.1  christos 	    default:
    129  1.1  christos 		INSIST(0);
    130  1.3  christos 		ISC_UNREACHABLE();
    131  1.1  christos 	}
    132  1.1  christos 
    133  1.1  christos 	/* First check to see if ACL is defined within the zone */
    134  1.1  christos 	if (zconfig != NULL) {
    135  1.1  christos 		maps[0] = cfg_tuple_get(zconfig, "options");
    136  1.1  christos 		(void)named_config_get(maps, aclname, &aclobj);
    137  1.1  christos 		if (aclobj != NULL) {
    138  1.1  christos 			aclp = NULL;
    139  1.1  christos 			goto parse_acl;
    140  1.1  christos 		}
    141  1.1  christos 	}
    142  1.1  christos 
    143  1.1  christos 	/* Failing that, see if there's a default ACL already in the view */
    144  1.1  christos 	if (aclp != NULL && *aclp != NULL) {
    145  1.1  christos 		(*setzacl)(zone, *aclp);
    146  1.1  christos 		return (ISC_R_SUCCESS);
    147  1.1  christos 	}
    148  1.1  christos 
    149  1.1  christos 	/* Check for default ACLs that haven't been parsed yet */
    150  1.1  christos 	if (vconfig != NULL) {
    151  1.1  christos 		const cfg_obj_t *options = cfg_tuple_get(vconfig, "options");
    152  1.1  christos 		if (options != NULL)
    153  1.1  christos 			maps[i++] = options;
    154  1.1  christos 	}
    155  1.1  christos 	if (config != NULL) {
    156  1.1  christos 		const cfg_obj_t *options = NULL;
    157  1.1  christos 		(void)cfg_map_get(config, "options", &options);
    158  1.1  christos 		if (options != NULL)
    159  1.1  christos 			maps[i++] = options;
    160  1.1  christos 	}
    161  1.1  christos 	maps[i++] = named_g_defaults;
    162  1.1  christos 	maps[i] = NULL;
    163  1.1  christos 
    164  1.1  christos 	(void)named_config_get(maps, aclname, &aclobj);
    165  1.1  christos 	if (aclobj == NULL) {
    166  1.1  christos 		(*clearzacl)(zone);
    167  1.1  christos 		return (ISC_R_SUCCESS);
    168  1.1  christos 	}
    169  1.1  christos 
    170  1.1  christos parse_acl:
    171  1.1  christos 	result = cfg_acl_fromconfig(aclobj, config, named_g_lctx, actx,
    172  1.1  christos 				    dns_zone_getmctx(zone), 0, &acl);
    173  1.1  christos 	if (result != ISC_R_SUCCESS)
    174  1.1  christos 		return (result);
    175  1.1  christos 	(*setzacl)(zone, acl);
    176  1.1  christos 
    177  1.1  christos 	/* Set the view default now */
    178  1.1  christos 	if (aclp != NULL)
    179  1.1  christos 		dns_acl_attach(acl, aclp);
    180  1.1  christos 
    181  1.1  christos 	dns_acl_detach(&acl);
    182  1.1  christos 	return (ISC_R_SUCCESS);
    183  1.1  christos }
    184  1.1  christos 
    185  1.1  christos /*%
    186  1.1  christos  * Parse the zone update-policy statement.
    187  1.1  christos  */
    188  1.1  christos static isc_result_t
    189  1.1  christos configure_zone_ssutable(const cfg_obj_t *zconfig, dns_zone_t *zone,
    190  1.1  christos 			const char *zname)
    191  1.1  christos {
    192  1.1  christos 	const cfg_obj_t *updatepolicy = NULL;
    193  1.1  christos 	const cfg_listelt_t *element, *element2;
    194  1.1  christos 	dns_ssutable_t *table = NULL;
    195  1.1  christos 	isc_mem_t *mctx = dns_zone_getmctx(zone);
    196  1.3  christos 	bool autoddns = false;
    197  1.1  christos 	isc_result_t result;
    198  1.1  christos 
    199  1.1  christos 	(void)cfg_map_get(zconfig, "update-policy", &updatepolicy);
    200  1.1  christos 
    201  1.1  christos 	if (updatepolicy == NULL) {
    202  1.1  christos 		dns_zone_setssutable(zone, NULL);
    203  1.1  christos 		return (ISC_R_SUCCESS);
    204  1.1  christos 	}
    205  1.1  christos 
    206  1.1  christos 	if (cfg_obj_isstring(updatepolicy) &&
    207  1.1  christos 	    strcmp("local", cfg_obj_asstring(updatepolicy)) == 0) {
    208  1.3  christos 		autoddns = true;
    209  1.1  christos 		updatepolicy = NULL;
    210  1.1  christos 	}
    211  1.1  christos 
    212  1.1  christos 	result = dns_ssutable_create(mctx, &table);
    213  1.1  christos 	if (result != ISC_R_SUCCESS)
    214  1.1  christos 		return (result);
    215  1.1  christos 
    216  1.1  christos 	for (element = cfg_list_first(updatepolicy);
    217  1.1  christos 	     element != NULL;
    218  1.1  christos 	     element = cfg_list_next(element))
    219  1.1  christos 	{
    220  1.1  christos 		const cfg_obj_t *stmt = cfg_listelt_value(element);
    221  1.1  christos 		const cfg_obj_t *mode = cfg_tuple_get(stmt, "mode");
    222  1.1  christos 		const cfg_obj_t *identity = cfg_tuple_get(stmt, "identity");
    223  1.1  christos 		const cfg_obj_t *matchtype = cfg_tuple_get(stmt, "matchtype");
    224  1.1  christos 		const cfg_obj_t *dname = cfg_tuple_get(stmt, "name");
    225  1.1  christos 		const cfg_obj_t *typelist = cfg_tuple_get(stmt, "types");
    226  1.1  christos 		const char *str;
    227  1.3  christos 		bool grant = false;
    228  1.3  christos 		bool usezone = false;
    229  1.3  christos 		dns_ssumatchtype_t mtype = dns_ssumatchtype_name;
    230  1.1  christos 		dns_fixedname_t fname, fident;
    231  1.1  christos 		isc_buffer_t b;
    232  1.1  christos 		dns_rdatatype_t *types;
    233  1.1  christos 		unsigned int i, n;
    234  1.1  christos 
    235  1.1  christos 		str = cfg_obj_asstring(mode);
    236  1.3  christos 		if (strcasecmp(str, "grant") == 0) {
    237  1.3  christos 			grant = true;
    238  1.3  christos 		} else if (strcasecmp(str, "deny") == 0) {
    239  1.3  christos 			grant = false;
    240  1.3  christos 		} else {
    241  1.1  christos 			INSIST(0);
    242  1.3  christos 			ISC_UNREACHABLE();
    243  1.3  christos 		}
    244  1.1  christos 
    245  1.1  christos 		str = cfg_obj_asstring(matchtype);
    246  1.1  christos 		CHECK(dns_ssu_mtypefromstring(str, &mtype));
    247  1.1  christos 		if (mtype == dns_ssumatchtype_subdomain) {
    248  1.3  christos 			usezone = true;
    249  1.1  christos 		}
    250  1.1  christos 
    251  1.1  christos 		dns_fixedname_init(&fident);
    252  1.1  christos 		str = cfg_obj_asstring(identity);
    253  1.1  christos 		isc_buffer_constinit(&b, str, strlen(str));
    254  1.1  christos 		isc_buffer_add(&b, strlen(str));
    255  1.1  christos 		result = dns_name_fromtext(dns_fixedname_name(&fident), &b,
    256  1.1  christos 					   dns_rootname, 0, NULL);
    257  1.1  christos 		if (result != ISC_R_SUCCESS) {
    258  1.1  christos 			cfg_obj_log(identity, named_g_lctx, ISC_LOG_ERROR,
    259  1.1  christos 				    "'%s' is not a valid name", str);
    260  1.1  christos 			goto cleanup;
    261  1.1  christos 		}
    262  1.1  christos 
    263  1.1  christos 		dns_fixedname_init(&fname);
    264  1.1  christos 		if (usezone) {
    265  1.1  christos 			result = dns_name_copy(dns_zone_getorigin(zone),
    266  1.1  christos 					       dns_fixedname_name(&fname),
    267  1.1  christos 					       NULL);
    268  1.1  christos 			if (result != ISC_R_SUCCESS) {
    269  1.1  christos 				cfg_obj_log(identity, named_g_lctx,
    270  1.1  christos 					    ISC_LOG_ERROR,
    271  1.1  christos 					    "error copying origin: %s",
    272  1.1  christos 					    isc_result_totext(result));
    273  1.1  christos 				goto cleanup;
    274  1.1  christos 			}
    275  1.1  christos 		} else {
    276  1.1  christos 			str = cfg_obj_asstring(dname);
    277  1.1  christos 			isc_buffer_constinit(&b, str, strlen(str));
    278  1.1  christos 			isc_buffer_add(&b, strlen(str));
    279  1.1  christos 			result = dns_name_fromtext(dns_fixedname_name(&fname),
    280  1.1  christos 						   &b, dns_rootname, 0, NULL);
    281  1.1  christos 			if (result != ISC_R_SUCCESS) {
    282  1.1  christos 				cfg_obj_log(identity, named_g_lctx,
    283  1.1  christos 					    ISC_LOG_ERROR,
    284  1.1  christos 					    "'%s' is not a valid name", str);
    285  1.1  christos 				goto cleanup;
    286  1.1  christos 			}
    287  1.1  christos 		}
    288  1.1  christos 
    289  1.1  christos 		n = named_config_listcount(typelist);
    290  1.1  christos 		if (n == 0)
    291  1.1  christos 			types = NULL;
    292  1.1  christos 		else {
    293  1.1  christos 			types = isc_mem_get(mctx, n * sizeof(dns_rdatatype_t));
    294  1.1  christos 			if (types == NULL) {
    295  1.1  christos 				result = ISC_R_NOMEMORY;
    296  1.1  christos 				goto cleanup;
    297  1.1  christos 			}
    298  1.1  christos 		}
    299  1.1  christos 
    300  1.1  christos 		i = 0;
    301  1.1  christos 		for (element2 = cfg_list_first(typelist);
    302  1.1  christos 		     element2 != NULL;
    303  1.1  christos 		     element2 = cfg_list_next(element2))
    304  1.1  christos 		{
    305  1.1  christos 			const cfg_obj_t *typeobj;
    306  1.1  christos 			isc_textregion_t r;
    307  1.1  christos 
    308  1.1  christos 			INSIST(i < n);
    309  1.1  christos 
    310  1.1  christos 			typeobj = cfg_listelt_value(element2);
    311  1.1  christos 			str = cfg_obj_asstring(typeobj);
    312  1.1  christos 			DE_CONST(str, r.base);
    313  1.1  christos 			r.length = strlen(str);
    314  1.1  christos 
    315  1.1  christos 			result = dns_rdatatype_fromtext(&types[i++], &r);
    316  1.1  christos 			if (result != ISC_R_SUCCESS) {
    317  1.1  christos 				cfg_obj_log(identity, named_g_lctx,
    318  1.1  christos 					    ISC_LOG_ERROR,
    319  1.1  christos 					    "'%s' is not a valid type", str);
    320  1.1  christos 				isc_mem_put(mctx, types,
    321  1.1  christos 					    n * sizeof(dns_rdatatype_t));
    322  1.1  christos 				goto cleanup;
    323  1.1  christos 			}
    324  1.1  christos 		}
    325  1.1  christos 		INSIST(i == n);
    326  1.1  christos 
    327  1.1  christos 		result = dns_ssutable_addrule(table, grant,
    328  1.1  christos 					      dns_fixedname_name(&fident),
    329  1.1  christos 					      mtype,
    330  1.1  christos 					      dns_fixedname_name(&fname),
    331  1.1  christos 					      n, types);
    332  1.1  christos 		if (types != NULL)
    333  1.1  christos 			isc_mem_put(mctx, types, n * sizeof(dns_rdatatype_t));
    334  1.1  christos 		if (result != ISC_R_SUCCESS) {
    335  1.1  christos 			goto cleanup;
    336  1.1  christos 		}
    337  1.1  christos 	}
    338  1.1  christos 
    339  1.1  christos 	/*
    340  1.1  christos 	 * If "update-policy local;" and a session key exists,
    341  1.1  christos 	 * then use the default policy, which is equivalent to:
    342  1.1  christos 	 * update-policy { grant <session-keyname> zonesub any; };
    343  1.1  christos 	 */
    344  1.1  christos 	if (autoddns) {
    345  1.1  christos 		dns_rdatatype_t any = dns_rdatatype_any;
    346  1.1  christos 
    347  1.1  christos 		if (named_g_server->session_keyname == NULL) {
    348  1.1  christos 			isc_log_write(named_g_lctx, NAMED_LOGCATEGORY_GENERAL,
    349  1.1  christos 				      NAMED_LOGMODULE_SERVER, ISC_LOG_ERROR,
    350  1.1  christos 				      "failed to enable auto DDNS policy "
    351  1.1  christos 				      "for zone %s: session key not found",
    352  1.1  christos 				      zname);
    353  1.1  christos 			result = ISC_R_NOTFOUND;
    354  1.1  christos 			goto cleanup;
    355  1.1  christos 		}
    356  1.1  christos 
    357  1.3  christos 		result = dns_ssutable_addrule(table, true,
    358  1.1  christos 					      named_g_server->session_keyname,
    359  1.1  christos 					      dns_ssumatchtype_local,
    360  1.1  christos 					      dns_zone_getorigin(zone),
    361  1.1  christos 					      1, &any);
    362  1.1  christos 
    363  1.1  christos 		if (result != ISC_R_SUCCESS)
    364  1.1  christos 			goto cleanup;
    365  1.1  christos 	}
    366  1.1  christos 
    367  1.1  christos 	result = ISC_R_SUCCESS;
    368  1.1  christos 	dns_zone_setssutable(zone, table);
    369  1.1  christos 
    370  1.1  christos  cleanup:
    371  1.1  christos 	dns_ssutable_detach(&table);
    372  1.1  christos 	return (result);
    373  1.1  christos }
    374  1.1  christos 
    375  1.1  christos /*
    376  1.1  christos  * This is the TTL used for internally generated RRsets for static-stub zones.
    377  1.1  christos  * The value doesn't matter because the mapping is static, but needs to be
    378  1.1  christos  * defined for the sake of implementation.
    379  1.1  christos  */
    380  1.1  christos #define STATICSTUB_SERVER_TTL 86400
    381  1.1  christos 
    382  1.1  christos /*%
    383  1.1  christos  * Configure an apex NS with glues for a static-stub zone.
    384  1.1  christos  * For example, for the zone named "example.com", the following RRs will be
    385  1.1  christos  * added to the zone DB:
    386  1.1  christos  * example.com. NS example.com.
    387  1.1  christos  * example.com. A 192.0.2.1
    388  1.1  christos  * example.com. AAAA 2001:db8::1
    389  1.1  christos  */
    390  1.1  christos static isc_result_t
    391  1.1  christos configure_staticstub_serveraddrs(const cfg_obj_t *zconfig, dns_zone_t *zone,
    392  1.1  christos 				 dns_rdatalist_t *rdatalist_ns,
    393  1.1  christos 				 dns_rdatalist_t *rdatalist_a,
    394  1.1  christos 				 dns_rdatalist_t *rdatalist_aaaa)
    395  1.1  christos {
    396  1.1  christos 	const cfg_listelt_t *element;
    397  1.1  christos 	isc_mem_t *mctx = dns_zone_getmctx(zone);
    398  1.1  christos 	isc_region_t region, sregion;
    399  1.1  christos 	dns_rdata_t *rdata;
    400  1.1  christos 	isc_result_t result = ISC_R_SUCCESS;
    401  1.1  christos 
    402  1.1  christos 	for (element = cfg_list_first(zconfig);
    403  1.1  christos 	     element != NULL;
    404  1.1  christos 	     element = cfg_list_next(element))
    405  1.1  christos 	{
    406  1.1  christos 		const isc_sockaddr_t* sa;
    407  1.1  christos 		isc_netaddr_t na;
    408  1.1  christos 		const cfg_obj_t *address = cfg_listelt_value(element);
    409  1.1  christos 		dns_rdatalist_t *rdatalist;
    410  1.1  christos 
    411  1.1  christos 		sa = cfg_obj_assockaddr(address);
    412  1.1  christos 		if (isc_sockaddr_getport(sa) != 0) {
    413  1.1  christos 			cfg_obj_log(zconfig, named_g_lctx, ISC_LOG_ERROR,
    414  1.1  christos 				    "port is not configurable for "
    415  1.1  christos 				    "static stub server-addresses");
    416  1.1  christos 			return (ISC_R_FAILURE);
    417  1.1  christos 		}
    418  1.1  christos 		isc_netaddr_fromsockaddr(&na, sa);
    419  1.1  christos 		if (isc_netaddr_getzone(&na) != 0) {
    420  1.1  christos 			cfg_obj_log(zconfig, named_g_lctx, ISC_LOG_ERROR,
    421  1.1  christos 					    "scoped address is not allowed "
    422  1.1  christos 					    "for static stub "
    423  1.1  christos 					    "server-addresses");
    424  1.1  christos 			return (ISC_R_FAILURE);
    425  1.1  christos 		}
    426  1.1  christos 
    427  1.1  christos 		switch (na.family) {
    428  1.1  christos 		case AF_INET:
    429  1.1  christos 			region.length = sizeof(na.type.in);
    430  1.1  christos 			rdatalist = rdatalist_a;
    431  1.1  christos 			break;
    432  1.1  christos 		default:
    433  1.1  christos 			INSIST(na.family == AF_INET6);
    434  1.1  christos 			region.length = sizeof(na.type.in6);
    435  1.1  christos 			rdatalist = rdatalist_aaaa;
    436  1.1  christos 			break;
    437  1.1  christos 		}
    438  1.1  christos 
    439  1.1  christos 		rdata = isc_mem_get(mctx, sizeof(*rdata) + region.length);
    440  1.1  christos 		if (rdata == NULL)
    441  1.1  christos 			return (ISC_R_NOMEMORY);
    442  1.1  christos 		region.base = (unsigned char *)(rdata + 1);
    443  1.1  christos 		memmove(region.base, &na.type, region.length);
    444  1.1  christos 		dns_rdata_init(rdata);
    445  1.1  christos 		dns_rdata_fromregion(rdata, dns_zone_getclass(zone),
    446  1.1  christos 				     rdatalist->type, &region);
    447  1.1  christos 		ISC_LIST_APPEND(rdatalist->rdata, rdata, link);
    448  1.1  christos 	}
    449  1.1  christos 
    450  1.1  christos 	/*
    451  1.1  christos 	 * If no address is specified (unlikely in this context, but possible),
    452  1.1  christos 	 * there's nothing to do anymore.
    453  1.1  christos 	 */
    454  1.1  christos 	if (ISC_LIST_EMPTY(rdatalist_a->rdata) &&
    455  1.1  christos 	    ISC_LIST_EMPTY(rdatalist_aaaa->rdata)) {
    456  1.1  christos 		return (ISC_R_SUCCESS);
    457  1.1  christos 	}
    458  1.1  christos 
    459  1.1  christos 	/* Add to the list an apex NS with the ns name being the origin name */
    460  1.1  christos 	dns_name_toregion(dns_zone_getorigin(zone), &sregion);
    461  1.1  christos 	rdata = isc_mem_get(mctx, sizeof(*rdata) + sregion.length);
    462  1.1  christos 	if (rdata == NULL) {
    463  1.1  christos 		/*
    464  1.1  christos 		 * Already allocated data will be freed in the caller, so
    465  1.1  christos 		 * we can simply return here.
    466  1.1  christos 		 */
    467  1.1  christos 		return (ISC_R_NOMEMORY);
    468  1.1  christos 	}
    469  1.1  christos 	region.length = sregion.length;
    470  1.1  christos 	region.base = (unsigned char *)(rdata + 1);
    471  1.1  christos 	memmove(region.base, sregion.base, region.length);
    472  1.1  christos 	dns_rdata_init(rdata);
    473  1.1  christos 	dns_rdata_fromregion(rdata, dns_zone_getclass(zone),
    474  1.1  christos 			     dns_rdatatype_ns, &region);
    475  1.1  christos 	ISC_LIST_APPEND(rdatalist_ns->rdata, rdata, link);
    476  1.1  christos 
    477  1.1  christos 	return (result);
    478  1.1  christos }
    479  1.1  christos 
    480  1.1  christos /*%
    481  1.1  christos  * Configure an apex NS with an out-of-zone NS names for a static-stub zone.
    482  1.1  christos  * For example, for the zone named "example.com", something like the following
    483  1.1  christos  * RRs will be added to the zone DB:
    484  1.1  christos  * example.com. NS ns.example.net.
    485  1.1  christos  */
    486  1.1  christos static isc_result_t
    487  1.1  christos configure_staticstub_servernames(const cfg_obj_t *zconfig, dns_zone_t *zone,
    488  1.1  christos 				 dns_rdatalist_t *rdatalist, const char *zname)
    489  1.1  christos {
    490  1.1  christos 	const cfg_listelt_t *element;
    491  1.1  christos 	isc_mem_t *mctx = dns_zone_getmctx(zone);
    492  1.1  christos 	dns_rdata_t *rdata;
    493  1.1  christos 	isc_region_t sregion, region;
    494  1.1  christos 	isc_result_t result = ISC_R_SUCCESS;
    495  1.1  christos 
    496  1.1  christos 	for (element = cfg_list_first(zconfig);
    497  1.1  christos 	     element != NULL;
    498  1.1  christos 	     element = cfg_list_next(element))
    499  1.1  christos 	{
    500  1.1  christos 		const cfg_obj_t *obj;
    501  1.1  christos 		const char *str;
    502  1.1  christos 		dns_fixedname_t fixed_name;
    503  1.1  christos 		dns_name_t *nsname;
    504  1.1  christos 		isc_buffer_t b;
    505  1.1  christos 
    506  1.1  christos 		obj = cfg_listelt_value(element);
    507  1.1  christos 		str = cfg_obj_asstring(obj);
    508  1.1  christos 
    509  1.1  christos 		nsname = dns_fixedname_initname(&fixed_name);
    510  1.1  christos 
    511  1.1  christos 		isc_buffer_constinit(&b, str, strlen(str));
    512  1.1  christos 		isc_buffer_add(&b, strlen(str));
    513  1.1  christos 		result = dns_name_fromtext(nsname, &b, dns_rootname, 0, NULL);
    514  1.1  christos 		if (result != ISC_R_SUCCESS) {
    515  1.1  christos 			cfg_obj_log(zconfig, named_g_lctx, ISC_LOG_ERROR,
    516  1.1  christos 					    "server-name '%s' is not a valid "
    517  1.1  christos 					    "name", str);
    518  1.1  christos 			return (result);
    519  1.1  christos 		}
    520  1.1  christos 		if (dns_name_issubdomain(nsname, dns_zone_getorigin(zone))) {
    521  1.1  christos 			cfg_obj_log(zconfig, named_g_lctx, ISC_LOG_ERROR,
    522  1.1  christos 				    "server-name '%s' must not be a "
    523  1.1  christos 				    "subdomain of zone name '%s'",
    524  1.1  christos 				    str, zname);
    525  1.1  christos 			return (ISC_R_FAILURE);
    526  1.1  christos 		}
    527  1.1  christos 
    528  1.1  christos 		dns_name_toregion(nsname, &sregion);
    529  1.1  christos 		rdata = isc_mem_get(mctx, sizeof(*rdata) + sregion.length);
    530  1.1  christos 		if (rdata == NULL)
    531  1.1  christos 			return (ISC_R_NOMEMORY);
    532  1.1  christos 		region.length = sregion.length;
    533  1.1  christos 		region.base = (unsigned char *)(rdata + 1);
    534  1.1  christos 		memmove(region.base, sregion.base, region.length);
    535  1.1  christos 		dns_rdata_init(rdata);
    536  1.1  christos 		dns_rdata_fromregion(rdata, dns_zone_getclass(zone),
    537  1.1  christos 				     dns_rdatatype_ns, &region);
    538  1.1  christos 		ISC_LIST_APPEND(rdatalist->rdata, rdata, link);
    539  1.1  christos 	}
    540  1.1  christos 
    541  1.1  christos 	return (result);
    542  1.1  christos }
    543  1.1  christos 
    544  1.1  christos /*%
    545  1.1  christos  * Configure static-stub zone.
    546  1.1  christos  */
    547  1.1  christos static isc_result_t
    548  1.1  christos configure_staticstub(const cfg_obj_t *zconfig, dns_zone_t *zone,
    549  1.1  christos 		     const char *zname, const char *dbtype)
    550  1.1  christos {
    551  1.1  christos 	int i = 0;
    552  1.1  christos 	const cfg_obj_t *obj;
    553  1.1  christos 	isc_mem_t *mctx = dns_zone_getmctx(zone);
    554  1.1  christos 	dns_db_t *db = NULL;
    555  1.1  christos 	dns_dbversion_t *dbversion = NULL;
    556  1.1  christos 	dns_dbnode_t *apexnode = NULL;
    557  1.1  christos 	dns_name_t apexname;
    558  1.1  christos 	isc_result_t result;
    559  1.1  christos 	dns_rdataset_t rdataset;
    560  1.1  christos 	dns_rdatalist_t rdatalist_ns, rdatalist_a, rdatalist_aaaa;
    561  1.1  christos 	dns_rdatalist_t* rdatalists[] = {
    562  1.1  christos 		&rdatalist_ns, &rdatalist_a, &rdatalist_aaaa, NULL
    563  1.1  christos 	};
    564  1.1  christos 	dns_rdata_t *rdata;
    565  1.1  christos 	isc_region_t region;
    566  1.1  christos 
    567  1.1  christos 	/* Create the DB beforehand */
    568  1.1  christos 	RETERR(dns_db_create(mctx, dbtype, dns_zone_getorigin(zone),
    569  1.1  christos 			     dns_dbtype_stub, dns_zone_getclass(zone),
    570  1.1  christos 			     0, NULL, &db));
    571  1.1  christos 	dns_zone_setdb(zone, db);
    572  1.1  christos 
    573  1.1  christos 	dns_rdatalist_init(&rdatalist_ns);
    574  1.1  christos 	rdatalist_ns.rdclass = dns_zone_getclass(zone);
    575  1.1  christos 	rdatalist_ns.type = dns_rdatatype_ns;
    576  1.1  christos 	rdatalist_ns.ttl = STATICSTUB_SERVER_TTL;
    577  1.1  christos 
    578  1.1  christos 	dns_rdatalist_init(&rdatalist_a);
    579  1.1  christos 	rdatalist_a.rdclass = dns_zone_getclass(zone);
    580  1.1  christos 	rdatalist_a.type = dns_rdatatype_a;
    581  1.1  christos 	rdatalist_a.ttl = STATICSTUB_SERVER_TTL;
    582  1.1  christos 
    583  1.1  christos 	dns_rdatalist_init(&rdatalist_aaaa);
    584  1.1  christos 	rdatalist_aaaa.rdclass = dns_zone_getclass(zone);
    585  1.1  christos 	rdatalist_aaaa.type = dns_rdatatype_aaaa;
    586  1.1  christos 	rdatalist_aaaa.ttl = STATICSTUB_SERVER_TTL;
    587  1.1  christos 
    588  1.1  christos 	/* Prepare zone RRs from the configuration */
    589  1.1  christos 	obj = NULL;
    590  1.1  christos 	result = cfg_map_get(zconfig, "server-addresses", &obj);
    591  1.1  christos 	if (result == ISC_R_SUCCESS) {
    592  1.1  christos 		INSIST(obj != NULL);
    593  1.1  christos 		result = configure_staticstub_serveraddrs(obj, zone,
    594  1.1  christos 							  &rdatalist_ns,
    595  1.1  christos 							  &rdatalist_a,
    596  1.1  christos 							  &rdatalist_aaaa);
    597  1.1  christos 		if (result != ISC_R_SUCCESS)
    598  1.1  christos 			goto cleanup;
    599  1.1  christos 	}
    600  1.1  christos 
    601  1.1  christos 	obj = NULL;
    602  1.1  christos 	result = cfg_map_get(zconfig, "server-names", &obj);
    603  1.1  christos 	if (result == ISC_R_SUCCESS) {
    604  1.1  christos 		INSIST(obj != NULL);
    605  1.1  christos 		result = configure_staticstub_servernames(obj, zone,
    606  1.1  christos 							  &rdatalist_ns,
    607  1.1  christos 							  zname);
    608  1.1  christos 		if (result != ISC_R_SUCCESS)
    609  1.1  christos 			goto cleanup;
    610  1.1  christos 	}
    611  1.1  christos 
    612  1.1  christos 	/*
    613  1.1  christos 	 * Sanity check: there should be at least one NS RR at the zone apex
    614  1.1  christos 	 * to trigger delegation.
    615  1.1  christos 	 */
    616  1.1  christos 	if (ISC_LIST_EMPTY(rdatalist_ns.rdata)) {
    617  1.1  christos 		isc_log_write(named_g_lctx, NAMED_LOGCATEGORY_GENERAL,
    618  1.1  christos 			      NAMED_LOGMODULE_SERVER, ISC_LOG_ERROR,
    619  1.1  christos 			      "No NS record is configured for a "
    620  1.1  christos 			      "static-stub zone '%s'", zname);
    621  1.1  christos 		result = ISC_R_FAILURE;
    622  1.1  christos 		goto cleanup;
    623  1.1  christos 	}
    624  1.1  christos 
    625  1.1  christos 	/*
    626  1.1  christos 	 * Now add NS and glue A/AAAA RRsets to the zone DB.
    627  1.1  christos 	 * First open a new version for the add operation and get a pointer
    628  1.1  christos 	 * to the apex node (all RRs are of the apex name).
    629  1.1  christos 	 */
    630  1.1  christos 	result = dns_db_newversion(db, &dbversion);
    631  1.1  christos 	if (result != ISC_R_SUCCESS)
    632  1.1  christos 		goto cleanup;
    633  1.1  christos 	dns_name_init(&apexname, NULL);
    634  1.1  christos 	dns_name_clone(dns_zone_getorigin(zone), &apexname);
    635  1.3  christos 	result = dns_db_findnode(db, &apexname, false, &apexnode);
    636  1.1  christos 	if (result != ISC_R_SUCCESS)
    637  1.1  christos 		goto cleanup;
    638  1.1  christos 
    639  1.1  christos 	/* Add NS RRset */
    640  1.1  christos 	dns_rdataset_init(&rdataset);
    641  1.1  christos 	RUNTIME_CHECK(dns_rdatalist_tordataset(&rdatalist_ns, &rdataset)
    642  1.1  christos 		      == ISC_R_SUCCESS);
    643  1.1  christos 	result = dns_db_addrdataset(db, apexnode, dbversion, 0, &rdataset,
    644  1.1  christos 				    0, NULL);
    645  1.1  christos 	dns_rdataset_disassociate(&rdataset);
    646  1.1  christos 	if (result != ISC_R_SUCCESS)
    647  1.1  christos 		goto cleanup;
    648  1.1  christos 
    649  1.1  christos 	/* Add glue A RRset, if any */
    650  1.1  christos 	if (!ISC_LIST_EMPTY(rdatalist_a.rdata)) {
    651  1.1  christos 		RUNTIME_CHECK(dns_rdatalist_tordataset(&rdatalist_a, &rdataset)
    652  1.1  christos 			      == ISC_R_SUCCESS);
    653  1.1  christos 		result = dns_db_addrdataset(db, apexnode, dbversion, 0,
    654  1.1  christos 					    &rdataset, 0, NULL);
    655  1.1  christos 		dns_rdataset_disassociate(&rdataset);
    656  1.1  christos 		if (result != ISC_R_SUCCESS)
    657  1.1  christos 			goto cleanup;
    658  1.1  christos 	}
    659  1.1  christos 
    660  1.1  christos 	/* Add glue AAAA RRset, if any */
    661  1.1  christos 	if (!ISC_LIST_EMPTY(rdatalist_aaaa.rdata)) {
    662  1.1  christos 		RUNTIME_CHECK(dns_rdatalist_tordataset(&rdatalist_aaaa,
    663  1.1  christos 						       &rdataset)
    664  1.1  christos 			      == ISC_R_SUCCESS);
    665  1.1  christos 		result = dns_db_addrdataset(db, apexnode, dbversion, 0,
    666  1.1  christos 					    &rdataset, 0, NULL);
    667  1.1  christos 		dns_rdataset_disassociate(&rdataset);
    668  1.1  christos 		if (result != ISC_R_SUCCESS)
    669  1.1  christos 			goto cleanup;
    670  1.1  christos 	}
    671  1.1  christos 
    672  1.1  christos 	result = ISC_R_SUCCESS;
    673  1.1  christos 
    674  1.1  christos   cleanup:
    675  1.1  christos 	if (apexnode != NULL)
    676  1.1  christos 		dns_db_detachnode(db, &apexnode);
    677  1.1  christos 	if (dbversion != NULL)
    678  1.3  christos 		dns_db_closeversion(db, &dbversion, true);
    679  1.1  christos 	if (db != NULL)
    680  1.1  christos 		dns_db_detach(&db);
    681  1.1  christos 	for (i = 0; rdatalists[i] != NULL; i++) {
    682  1.1  christos 		while ((rdata = ISC_LIST_HEAD(rdatalists[i]->rdata)) != NULL) {
    683  1.1  christos 			ISC_LIST_UNLINK(rdatalists[i]->rdata, rdata, link);
    684  1.1  christos 			dns_rdata_toregion(rdata, &region);
    685  1.1  christos 			isc_mem_put(mctx, rdata,
    686  1.1  christos 				    sizeof(*rdata) + region.length);
    687  1.1  christos 		}
    688  1.1  christos 	}
    689  1.1  christos 
    690  1.1  christos 	INSIST(dbversion == NULL);
    691  1.1  christos 
    692  1.1  christos 	return (result);
    693  1.1  christos }
    694  1.1  christos 
    695  1.1  christos /*%
    696  1.1  christos  * Convert a config file zone type into a server zone type.
    697  1.1  christos  */
    698  1.1  christos static inline dns_zonetype_t
    699  1.1  christos zonetype_fromconfig(const cfg_obj_t *map) {
    700  1.1  christos 	const cfg_obj_t *obj = NULL;
    701  1.1  christos 	isc_result_t result;
    702  1.1  christos 
    703  1.1  christos 	result = cfg_map_get(map, "type", &obj);
    704  1.1  christos 	INSIST(result == ISC_R_SUCCESS && obj != NULL);
    705  1.1  christos 	return (named_config_getzonetype(obj));
    706  1.1  christos }
    707  1.1  christos 
    708  1.1  christos /*%
    709  1.1  christos  * Helper function for strtoargv().  Pardon the gratuitous recursion.
    710  1.1  christos  */
    711  1.1  christos static isc_result_t
    712  1.1  christos strtoargvsub(isc_mem_t *mctx, char *s, unsigned int *argcp,
    713  1.1  christos 	     char ***argvp, unsigned int n)
    714  1.1  christos {
    715  1.1  christos 	isc_result_t result;
    716  1.1  christos 
    717  1.1  christos 	/* Discard leading whitespace. */
    718  1.1  christos 	while (*s == ' ' || *s == '\t')
    719  1.1  christos 		s++;
    720  1.1  christos 
    721  1.1  christos 	if (*s == '\0') {
    722  1.1  christos 		/* We have reached the end of the string. */
    723  1.1  christos 		*argcp = n;
    724  1.1  christos 		*argvp = isc_mem_get(mctx, n * sizeof(char *));
    725  1.1  christos 		if (*argvp == NULL)
    726  1.1  christos 			return (ISC_R_NOMEMORY);
    727  1.1  christos 	} else {
    728  1.1  christos 		char *p = s;
    729  1.1  christos 		while (*p != ' ' && *p != '\t' && *p != '\0')
    730  1.1  christos 			p++;
    731  1.1  christos 		if (*p != '\0')
    732  1.1  christos 			*p++ = '\0';
    733  1.1  christos 
    734  1.1  christos 		result = strtoargvsub(mctx, p, argcp, argvp, n + 1);
    735  1.1  christos 		if (result != ISC_R_SUCCESS)
    736  1.1  christos 			return (result);
    737  1.1  christos 		(*argvp)[n] = s;
    738  1.1  christos 	}
    739  1.1  christos 	return (ISC_R_SUCCESS);
    740  1.1  christos }
    741  1.1  christos 
    742  1.1  christos /*%
    743  1.1  christos  * Tokenize the string "s" into whitespace-separated words,
    744  1.1  christos  * return the number of words in '*argcp' and an array
    745  1.1  christos  * of pointers to the words in '*argvp'.  The caller
    746  1.1  christos  * must free the array using isc_mem_put().  The string
    747  1.1  christos  * is modified in-place.
    748  1.1  christos  */
    749  1.1  christos static isc_result_t
    750  1.1  christos strtoargv(isc_mem_t *mctx, char *s, unsigned int *argcp, char ***argvp) {
    751  1.1  christos 	return (strtoargvsub(mctx, s, argcp, argvp, 0));
    752  1.1  christos }
    753  1.1  christos 
    754  1.1  christos static void
    755  1.1  christos checknames(dns_zonetype_t ztype, const cfg_obj_t **maps,
    756  1.1  christos 	   const cfg_obj_t **objp)
    757  1.1  christos {
    758  1.1  christos 	const char *zone = NULL;
    759  1.1  christos 	isc_result_t result;
    760  1.1  christos 
    761  1.1  christos 	switch (ztype) {
    762  1.3  christos 	case dns_zone_slave:
    763  1.3  christos 	case dns_zone_mirror:
    764  1.3  christos 		zone = "slave";
    765  1.3  christos 		break;
    766  1.3  christos 	case dns_zone_master:
    767  1.3  christos 		zone = "master";
    768  1.3  christos 		break;
    769  1.1  christos 	default:
    770  1.1  christos 		INSIST(0);
    771  1.3  christos 		ISC_UNREACHABLE();
    772  1.1  christos 	}
    773  1.1  christos 	result = named_checknames_get(maps, zone, objp);
    774  1.1  christos 	INSIST(result == ISC_R_SUCCESS && objp != NULL && *objp != NULL);
    775  1.1  christos }
    776  1.1  christos 
    777  1.1  christos /*
    778  1.1  christos  * Callback to see if a non-recursive query coming from 'srcaddr' to
    779  1.1  christos  * 'destaddr', with optional key 'mykey' for class 'rdclass' would be
    780  1.1  christos  * delivered to 'myview'.
    781  1.1  christos  *
    782  1.1  christos  * We run this unlocked as both the view list and the interface list
    783  1.1  christos  * are updated when the appropriate task has exclusivity.
    784  1.1  christos  */
    785  1.3  christos static bool
    786  1.1  christos isself(dns_view_t *myview, dns_tsigkey_t *mykey,
    787  1.1  christos        const isc_sockaddr_t *srcaddr, const isc_sockaddr_t *dstaddr,
    788  1.1  christos        dns_rdataclass_t rdclass, void *arg)
    789  1.1  christos {
    790  1.1  christos 	ns_interfacemgr_t *interfacemgr = (ns_interfacemgr_t *) arg;
    791  1.1  christos 	dns_aclenv_t *env = ns_interfacemgr_getaclenv(interfacemgr);
    792  1.1  christos 	dns_view_t *view;
    793  1.1  christos 	dns_tsigkey_t *key = NULL;
    794  1.1  christos 	dns_name_t *tsig = NULL;
    795  1.1  christos 	isc_netaddr_t netsrc;
    796  1.1  christos 	isc_netaddr_t netdst;
    797  1.1  christos 
    798  1.1  christos 	if (interfacemgr == NULL)
    799  1.3  christos 		return (true);
    800  1.1  christos 
    801  1.1  christos 	if (!ns_interfacemgr_listeningon(interfacemgr, dstaddr))
    802  1.3  christos 		return (false);
    803  1.1  christos 
    804  1.1  christos 	isc_netaddr_fromsockaddr(&netsrc, srcaddr);
    805  1.1  christos 	isc_netaddr_fromsockaddr(&netdst, dstaddr);
    806  1.1  christos 
    807  1.1  christos 	for (view = ISC_LIST_HEAD(named_g_server->viewlist);
    808  1.1  christos 	     view != NULL;
    809  1.1  christos 	     view = ISC_LIST_NEXT(view, link)) {
    810  1.1  christos 
    811  1.1  christos 		if (view->matchrecursiveonly)
    812  1.1  christos 			continue;
    813  1.1  christos 
    814  1.1  christos 		if (rdclass != view->rdclass)
    815  1.1  christos 			continue;
    816  1.1  christos 
    817  1.1  christos 		if (mykey != NULL) {
    818  1.3  christos 			bool match;
    819  1.1  christos 			isc_result_t result;
    820  1.1  christos 
    821  1.1  christos 			result = dns_view_gettsig(view, &mykey->name, &key);
    822  1.1  christos 			if (result != ISC_R_SUCCESS)
    823  1.1  christos 				continue;
    824  1.1  christos 			match = dst_key_compare(mykey->key, key->key);
    825  1.1  christos 			dns_tsigkey_detach(&key);
    826  1.1  christos 			if (!match)
    827  1.1  christos 				continue;
    828  1.1  christos 			tsig = dns_tsigkey_identity(mykey);
    829  1.1  christos 		}
    830  1.1  christos 
    831  1.3  christos 		if (dns_acl_allowed(&netsrc, tsig, view->matchclients, env) &&
    832  1.3  christos 		    dns_acl_allowed(&netdst, tsig, view->matchdestinations,
    833  1.3  christos 				    env))
    834  1.3  christos 		{
    835  1.1  christos 			break;
    836  1.3  christos 		}
    837  1.1  christos 	}
    838  1.3  christos 	return (view == myview);
    839  1.1  christos }
    840  1.1  christos 
    841  1.3  christos /*%
    842  1.3  christos  * For mirror zones, change "notify yes;" to "notify explicit;", informing the
    843  1.3  christos  * user only if "notify" was explicitly configured rather than inherited from
    844  1.3  christos  * default configuration.
    845  1.3  christos  */
    846  1.3  christos static dns_notifytype_t
    847  1.3  christos process_notifytype(dns_notifytype_t ntype, dns_zonetype_t ztype,
    848  1.3  christos 		   const char *zname, const cfg_obj_t **maps)
    849  1.3  christos {
    850  1.3  christos 	const cfg_obj_t *obj = NULL;
    851  1.3  christos 
    852  1.3  christos 	/*
    853  1.3  christos 	 * Return the original setting if this is not a mirror zone or if the
    854  1.3  christos 	 * zone is configured with something else than "notify yes;".
    855  1.3  christos 	 */
    856  1.3  christos 	if (ztype != dns_zone_mirror || ntype != dns_notifytype_yes) {
    857  1.3  christos 		return (ntype);
    858  1.3  christos 	}
    859  1.3  christos 
    860  1.3  christos 	/*
    861  1.3  christos 	 * Only log a message if "notify" was set in the configuration
    862  1.3  christos 	 * hierarchy supplied in 'maps'.
    863  1.3  christos 	 */
    864  1.3  christos 	if (named_config_get(maps, "notify", &obj) == ISC_R_SUCCESS) {
    865  1.3  christos 		cfg_obj_log(obj, named_g_lctx, ISC_LOG_INFO,
    866  1.3  christos 			    "'notify explicit;' will be used for mirror zone "
    867  1.3  christos 			    "'%s'", zname);
    868  1.3  christos 	}
    869  1.3  christos 
    870  1.3  christos 	return (dns_notifytype_explicit);
    871  1.3  christos }
    872  1.1  christos 
    873  1.1  christos isc_result_t
    874  1.1  christos named_zone_configure(const cfg_obj_t *config, const cfg_obj_t *vconfig,
    875  1.1  christos 		  const cfg_obj_t *zconfig, cfg_aclconfctx_t *ac,
    876  1.1  christos 		  dns_zone_t *zone, dns_zone_t *raw)
    877  1.1  christos {
    878  1.1  christos 	isc_result_t result;
    879  1.1  christos 	const char *zname;
    880  1.1  christos 	dns_rdataclass_t zclass;
    881  1.1  christos 	dns_rdataclass_t vclass;
    882  1.1  christos 	const cfg_obj_t *maps[5];
    883  1.1  christos 	const cfg_obj_t *nodefault[4];
    884  1.1  christos 	const cfg_obj_t *zoptions = NULL;
    885  1.1  christos 	const cfg_obj_t *options = NULL;
    886  1.1  christos 	const cfg_obj_t *obj;
    887  1.1  christos 	const char *filename = NULL;
    888  1.1  christos 	const char *dupcheck;
    889  1.1  christos 	dns_notifytype_t notifytype = dns_notifytype_yes;
    890  1.3  christos 	uint32_t count;
    891  1.1  christos 	unsigned int dbargc;
    892  1.1  christos 	char **dbargv;
    893  1.1  christos 	static char default_dbtype[] = "rbt";
    894  1.1  christos 	static char dlz_dbtype[] = "dlz";
    895  1.1  christos 	char *cpval = default_dbtype;
    896  1.1  christos 	isc_mem_t *mctx = dns_zone_getmctx(zone);
    897  1.1  christos 	dns_dialuptype_t dialup = dns_dialuptype_no;
    898  1.1  christos 	dns_zonetype_t ztype;
    899  1.1  christos 	int i;
    900  1.3  christos 	int32_t journal_size;
    901  1.3  christos 	bool multi;
    902  1.3  christos 	bool alt;
    903  1.1  christos 	dns_view_t *view;
    904  1.3  christos 	bool check = false, fail = false;
    905  1.3  christos 	bool warn = false, ignore = false;
    906  1.3  christos 	bool ixfrdiff;
    907  1.1  christos 	dns_masterformat_t masterformat;
    908  1.1  christos 	const dns_master_style_t *masterstyle = &dns_master_style_default;
    909  1.1  christos 	isc_stats_t *zoneqrystats;
    910  1.1  christos 	dns_stats_t *rcvquerystats;
    911  1.4  christos 	dns_stats_t *dnssecsignstats;
    912  1.4  christos 	dns_stats_t *dnssecrefreshstats;
    913  1.3  christos 	dns_zonestat_level_t statlevel = dns_zonestat_none;
    914  1.1  christos 	int seconds;
    915  1.1  christos 	dns_zone_t *mayberaw = (raw != NULL) ? raw : zone;
    916  1.1  christos 	isc_dscp_t dscp;
    917  1.1  christos 
    918  1.1  christos 	i = 0;
    919  1.1  christos 	if (zconfig != NULL) {
    920  1.1  christos 		zoptions = cfg_tuple_get(zconfig, "options");
    921  1.1  christos 		nodefault[i] = maps[i] = zoptions;
    922  1.1  christos 		i++;
    923  1.1  christos 	}
    924  1.1  christos 	if (vconfig != NULL) {
    925  1.1  christos 		nodefault[i] = maps[i] = cfg_tuple_get(vconfig, "options");
    926  1.1  christos 		i++;
    927  1.1  christos 	}
    928  1.1  christos 	if (config != NULL) {
    929  1.1  christos 		(void)cfg_map_get(config, "options", &options);
    930  1.1  christos 		if (options != NULL) {
    931  1.1  christos 			nodefault[i] = maps[i] = options;
    932  1.1  christos 			i++;
    933  1.1  christos 		}
    934  1.1  christos 	}
    935  1.1  christos 	nodefault[i] = NULL;
    936  1.1  christos 	maps[i++] = named_g_defaults;
    937  1.1  christos 	maps[i] = NULL;
    938  1.1  christos 
    939  1.1  christos 	if (vconfig != NULL)
    940  1.1  christos 		RETERR(named_config_getclass(cfg_tuple_get(vconfig, "class"),
    941  1.1  christos 					  dns_rdataclass_in, &vclass));
    942  1.1  christos 	else
    943  1.1  christos 		vclass = dns_rdataclass_in;
    944  1.1  christos 
    945  1.1  christos 	/*
    946  1.1  christos 	 * Configure values common to all zone types.
    947  1.1  christos 	 */
    948  1.1  christos 
    949  1.1  christos 	zname = cfg_obj_asstring(cfg_tuple_get(zconfig, "name"));
    950  1.1  christos 
    951  1.1  christos 	RETERR(named_config_getclass(cfg_tuple_get(zconfig, "class"),
    952  1.1  christos 				  vclass, &zclass));
    953  1.1  christos 	dns_zone_setclass(zone, zclass);
    954  1.1  christos 	if (raw != NULL)
    955  1.1  christos 		dns_zone_setclass(raw, zclass);
    956  1.1  christos 
    957  1.1  christos 	ztype = zonetype_fromconfig(zoptions);
    958  1.1  christos 	if (raw != NULL) {
    959  1.1  christos 		dns_zone_settype(raw, ztype);
    960  1.1  christos 		dns_zone_settype(zone, dns_zone_master);
    961  1.1  christos 	} else
    962  1.1  christos 		dns_zone_settype(zone, ztype);
    963  1.1  christos 
    964  1.1  christos 	obj = NULL;
    965  1.1  christos 	result = cfg_map_get(zoptions, "database", &obj);
    966  1.1  christos 	if (result == ISC_R_SUCCESS)
    967  1.1  christos 		cpval = isc_mem_strdup(mctx, cfg_obj_asstring(obj));
    968  1.1  christos 	if (cpval == NULL)
    969  1.1  christos 		return(ISC_R_NOMEMORY);
    970  1.1  christos 
    971  1.1  christos 	obj = NULL;
    972  1.1  christos 	result = cfg_map_get(zoptions, "dlz", &obj);
    973  1.1  christos 	if (result == ISC_R_SUCCESS) {
    974  1.1  christos 		const char *dlzname = cfg_obj_asstring(obj);
    975  1.1  christos 		size_t len;
    976  1.1  christos 
    977  1.1  christos 		if (cpval != default_dbtype) {
    978  1.1  christos 		       isc_log_write(named_g_lctx, NAMED_LOGCATEGORY_GENERAL,
    979  1.1  christos 				     NAMED_LOGMODULE_SERVER, ISC_LOG_ERROR,
    980  1.1  christos 				     "zone '%s': both 'database' and 'dlz' "
    981  1.1  christos 				     "specified", zname);
    982  1.1  christos 		       return (ISC_R_FAILURE);
    983  1.1  christos 		}
    984  1.1  christos 
    985  1.1  christos 		len = strlen(dlzname) + 5;
    986  1.1  christos 		cpval = isc_mem_allocate(mctx, len);
    987  1.1  christos 		if (cpval == NULL)
    988  1.1  christos 			return (ISC_R_NOMEMORY);
    989  1.1  christos 		snprintf(cpval, len, "dlz %s", dlzname);
    990  1.1  christos 	}
    991  1.1  christos 
    992  1.1  christos 	result = strtoargv(mctx, cpval, &dbargc, &dbargv);
    993  1.1  christos 	if (result != ISC_R_SUCCESS && cpval != default_dbtype) {
    994  1.1  christos 		isc_mem_free(mctx, cpval);
    995  1.1  christos 		return (result);
    996  1.1  christos 	}
    997  1.1  christos 
    998  1.1  christos 	/*
    999  1.1  christos 	 * ANSI C is strange here.  There is no logical reason why (char **)
   1000  1.1  christos 	 * cannot be promoted automatically to (const char * const *) by the
   1001  1.1  christos 	 * compiler w/o generating a warning.
   1002  1.1  christos 	 */
   1003  1.1  christos 	result = dns_zone_setdbtype(zone, dbargc, (const char * const *)dbargv);
   1004  1.1  christos 	isc_mem_put(mctx, dbargv, dbargc * sizeof(*dbargv));
   1005  1.1  christos 	if (cpval != default_dbtype && cpval != dlz_dbtype)
   1006  1.1  christos 		isc_mem_free(mctx, cpval);
   1007  1.1  christos 	if (result != ISC_R_SUCCESS)
   1008  1.1  christos 		return (result);
   1009  1.1  christos 
   1010  1.1  christos 	obj = NULL;
   1011  1.1  christos 	result = cfg_map_get(zoptions, "file", &obj);
   1012  1.1  christos 	if (result == ISC_R_SUCCESS)
   1013  1.1  christos 		filename = cfg_obj_asstring(obj);
   1014  1.1  christos 
   1015  1.1  christos 	/*
   1016  1.1  christos 	 * Unless we're using some alternative database, a master zone
   1017  1.1  christos 	 * will be needing a master file.
   1018  1.1  christos 	 */
   1019  1.1  christos 	if (ztype == dns_zone_master && cpval == default_dbtype &&
   1020  1.1  christos 	    filename == NULL) {
   1021  1.1  christos 		isc_log_write(named_g_lctx, NAMED_LOGCATEGORY_GENERAL,
   1022  1.1  christos 			      NAMED_LOGMODULE_SERVER, ISC_LOG_ERROR,
   1023  1.1  christos 			      "zone '%s': 'file' not specified",
   1024  1.1  christos 			      zname);
   1025  1.1  christos 		return (ISC_R_FAILURE);
   1026  1.1  christos 	}
   1027  1.1  christos 
   1028  1.3  christos 	if (ztype == dns_zone_slave || ztype == dns_zone_mirror)
   1029  1.1  christos 		masterformat = dns_masterformat_raw;
   1030  1.1  christos 	else
   1031  1.1  christos 		masterformat = dns_masterformat_text;
   1032  1.1  christos 	obj = NULL;
   1033  1.1  christos 	result = named_config_get(maps, "masterfile-format", &obj);
   1034  1.1  christos 	if (result == ISC_R_SUCCESS) {
   1035  1.1  christos 		const char *masterformatstr = cfg_obj_asstring(obj);
   1036  1.1  christos 
   1037  1.3  christos 		if (strcasecmp(masterformatstr, "text") == 0) {
   1038  1.1  christos 			masterformat = dns_masterformat_text;
   1039  1.3  christos 		} else if (strcasecmp(masterformatstr, "raw") == 0) {
   1040  1.1  christos 			masterformat = dns_masterformat_raw;
   1041  1.3  christos 		} else if (strcasecmp(masterformatstr, "map") == 0) {
   1042  1.1  christos 			masterformat = dns_masterformat_map;
   1043  1.3  christos 		} else {
   1044  1.1  christos 			INSIST(0);
   1045  1.3  christos 			ISC_UNREACHABLE();
   1046  1.3  christos 		}
   1047  1.1  christos 	}
   1048  1.1  christos 
   1049  1.1  christos 	obj = NULL;
   1050  1.1  christos 	result = named_config_get(maps, "masterfile-style", &obj);
   1051  1.1  christos 	if (result == ISC_R_SUCCESS) {
   1052  1.1  christos 		const char *masterstylestr = cfg_obj_asstring(obj);
   1053  1.1  christos 
   1054  1.1  christos 		if (masterformat != dns_masterformat_text) {
   1055  1.1  christos 			cfg_obj_log(obj, named_g_lctx, ISC_LOG_ERROR,
   1056  1.1  christos 				    "zone '%s': 'masterfile-style' "
   1057  1.1  christos 				    "can only be used with "
   1058  1.1  christos 				    "'masterfile-format text'", zname);
   1059  1.1  christos 			return (ISC_R_FAILURE);
   1060  1.1  christos 		}
   1061  1.1  christos 
   1062  1.3  christos 		if (strcasecmp(masterstylestr, "full") == 0) {
   1063  1.1  christos 			masterstyle = &dns_master_style_full;
   1064  1.3  christos 		} else if (strcasecmp(masterstylestr, "relative") == 0) {
   1065  1.1  christos 			masterstyle = &dns_master_style_default;
   1066  1.3  christos 		} else {
   1067  1.1  christos 			INSIST(0);
   1068  1.3  christos 			ISC_UNREACHABLE();
   1069  1.3  christos 		}
   1070  1.1  christos 	}
   1071  1.1  christos 
   1072  1.1  christos 	obj = NULL;
   1073  1.1  christos 	result = named_config_get(maps, "max-zone-ttl", &obj);
   1074  1.1  christos 	if (result == ISC_R_SUCCESS && masterformat == dns_masterformat_map) {
   1075  1.1  christos 		isc_log_write(named_g_lctx, NAMED_LOGCATEGORY_GENERAL,
   1076  1.1  christos 			      NAMED_LOGMODULE_SERVER, ISC_LOG_ERROR,
   1077  1.1  christos 			      "zone '%s': 'max-zone-ttl' is not compatible "
   1078  1.1  christos 			      "with 'masterfile-format map'", zname);
   1079  1.1  christos 		return (ISC_R_FAILURE);
   1080  1.1  christos 	} else if (result == ISC_R_SUCCESS) {
   1081  1.1  christos 		dns_ttl_t maxttl = 0;	/* unlimited */
   1082  1.1  christos 
   1083  1.1  christos 		if (cfg_obj_isuint32(obj))
   1084  1.1  christos 			maxttl = cfg_obj_asuint32(obj);
   1085  1.1  christos 		dns_zone_setmaxttl(zone, maxttl);
   1086  1.1  christos 		if (raw != NULL)
   1087  1.1  christos 			dns_zone_setmaxttl(raw, maxttl);
   1088  1.1  christos 	}
   1089  1.1  christos 
   1090  1.1  christos 	obj = NULL;
   1091  1.1  christos 	result = named_config_get(maps, "max-records", &obj);
   1092  1.1  christos 	INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1093  1.1  christos 	dns_zone_setmaxrecords(mayberaw, cfg_obj_asuint32(obj));
   1094  1.1  christos 	if (zone != mayberaw)
   1095  1.1  christos 		dns_zone_setmaxrecords(zone, 0);
   1096  1.1  christos 
   1097  1.1  christos 	if (raw != NULL && filename != NULL) {
   1098  1.1  christos #define SIGNED ".signed"
   1099  1.1  christos 		size_t signedlen = strlen(filename) + sizeof(SIGNED);
   1100  1.1  christos 		char *signedname;
   1101  1.1  christos 
   1102  1.3  christos 		RETERR(dns_zone_setfile(raw, filename,
   1103  1.3  christos 					masterformat, masterstyle));
   1104  1.1  christos 		signedname = isc_mem_get(mctx, signedlen);
   1105  1.1  christos 		if (signedname == NULL)
   1106  1.1  christos 			return (ISC_R_NOMEMORY);
   1107  1.1  christos 
   1108  1.1  christos 		(void)snprintf(signedname, signedlen, "%s" SIGNED, filename);
   1109  1.3  christos 		result = dns_zone_setfile(zone, signedname,
   1110  1.3  christos 					  dns_masterformat_raw, NULL);
   1111  1.1  christos 		isc_mem_put(mctx, signedname, signedlen);
   1112  1.1  christos 		if (result != ISC_R_SUCCESS)
   1113  1.1  christos 			return (result);
   1114  1.1  christos 	} else
   1115  1.3  christos 		RETERR(dns_zone_setfile(zone, filename,
   1116  1.3  christos 					masterformat, masterstyle));
   1117  1.1  christos 
   1118  1.1  christos 	obj = NULL;
   1119  1.1  christos 	result = cfg_map_get(zoptions, "journal", &obj);
   1120  1.1  christos 	if (result == ISC_R_SUCCESS)
   1121  1.1  christos 		RETERR(dns_zone_setjournal(mayberaw, cfg_obj_asstring(obj)));
   1122  1.1  christos 
   1123  1.1  christos 	/*
   1124  1.1  christos 	 * Notify messages are processed by the raw zone if it exists.
   1125  1.1  christos 	 */
   1126  1.3  christos 	if (ztype == dns_zone_slave || ztype == dns_zone_mirror)
   1127  1.1  christos 		RETERR(configure_zone_acl(zconfig, vconfig, config,
   1128  1.1  christos 					  allow_notify, ac, mayberaw,
   1129  1.1  christos 					  dns_zone_setnotifyacl,
   1130  1.1  christos 					  dns_zone_clearnotifyacl));
   1131  1.1  christos 
   1132  1.1  christos 	/*
   1133  1.1  christos 	 * XXXAG This probably does not make sense for stubs.
   1134  1.1  christos 	 */
   1135  1.1  christos 	RETERR(configure_zone_acl(zconfig, vconfig, config,
   1136  1.1  christos 				  allow_query, ac, zone,
   1137  1.1  christos 				  dns_zone_setqueryacl,
   1138  1.1  christos 				  dns_zone_clearqueryacl));
   1139  1.1  christos 
   1140  1.1  christos 	RETERR(configure_zone_acl(zconfig, vconfig, config,
   1141  1.1  christos 				  allow_query_on, ac, zone,
   1142  1.1  christos 				  dns_zone_setqueryonacl,
   1143  1.1  christos 				  dns_zone_clearqueryonacl));
   1144  1.1  christos 
   1145  1.1  christos 	obj = NULL;
   1146  1.1  christos 	result = named_config_get(maps, "dialup", &obj);
   1147  1.1  christos 	INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1148  1.1  christos 	if (cfg_obj_isboolean(obj)) {
   1149  1.1  christos 		if (cfg_obj_asboolean(obj))
   1150  1.1  christos 			dialup = dns_dialuptype_yes;
   1151  1.1  christos 		else
   1152  1.1  christos 			dialup = dns_dialuptype_no;
   1153  1.1  christos 	} else {
   1154  1.1  christos 		const char *dialupstr = cfg_obj_asstring(obj);
   1155  1.3  christos 		if (strcasecmp(dialupstr, "notify") == 0) {
   1156  1.1  christos 			dialup = dns_dialuptype_notify;
   1157  1.3  christos 		} else if (strcasecmp(dialupstr, "notify-passive") == 0) {
   1158  1.1  christos 			dialup = dns_dialuptype_notifypassive;
   1159  1.3  christos 		} else if (strcasecmp(dialupstr, "refresh") == 0) {
   1160  1.1  christos 			dialup = dns_dialuptype_refresh;
   1161  1.3  christos 		} else if (strcasecmp(dialupstr, "passive") == 0) {
   1162  1.1  christos 			dialup = dns_dialuptype_passive;
   1163  1.3  christos 		} else {
   1164  1.1  christos 			INSIST(0);
   1165  1.3  christos 			ISC_UNREACHABLE();
   1166  1.3  christos 		}
   1167  1.1  christos 	}
   1168  1.1  christos 	if (raw != NULL)
   1169  1.1  christos 		dns_zone_setdialup(raw, dialup);
   1170  1.1  christos 	dns_zone_setdialup(zone, dialup);
   1171  1.1  christos 
   1172  1.1  christos 	obj = NULL;
   1173  1.1  christos 	result = named_config_get(maps, "zone-statistics", &obj);
   1174  1.1  christos 	INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1175  1.1  christos 	if (cfg_obj_isboolean(obj)) {
   1176  1.1  christos 		if (cfg_obj_asboolean(obj))
   1177  1.1  christos 			statlevel = dns_zonestat_full;
   1178  1.1  christos 		else
   1179  1.1  christos 			statlevel = dns_zonestat_none;
   1180  1.1  christos 	} else {
   1181  1.1  christos 		const char *levelstr = cfg_obj_asstring(obj);
   1182  1.3  christos 		if (strcasecmp(levelstr, "full") == 0) {
   1183  1.1  christos 			statlevel = dns_zonestat_full;
   1184  1.3  christos 		} else if (strcasecmp(levelstr, "terse") == 0) {
   1185  1.1  christos 			statlevel = dns_zonestat_terse;
   1186  1.3  christos 		} else if (strcasecmp(levelstr, "none") == 0) {
   1187  1.1  christos 			statlevel = dns_zonestat_none;
   1188  1.3  christos 		} else {
   1189  1.1  christos 			INSIST(0);
   1190  1.3  christos 			ISC_UNREACHABLE();
   1191  1.3  christos 		}
   1192  1.1  christos 	}
   1193  1.1  christos 	dns_zone_setstatlevel(zone, statlevel);
   1194  1.1  christos 
   1195  1.1  christos 	zoneqrystats  = NULL;
   1196  1.1  christos 	rcvquerystats = NULL;
   1197  1.4  christos 	dnssecsignstats = NULL;
   1198  1.4  christos 	dnssecrefreshstats = NULL;
   1199  1.1  christos 	if (statlevel == dns_zonestat_full) {
   1200  1.1  christos 		RETERR(isc_stats_create(mctx, &zoneqrystats,
   1201  1.1  christos 					ns_statscounter_max));
   1202  1.4  christos 		RETERR(dns_rdatatypestats_create(mctx, &rcvquerystats));
   1203  1.4  christos 		RETERR(dns_dnssecsignstats_create(mctx, &dnssecsignstats));
   1204  1.4  christos 		RETERR(dns_dnssecsignstats_create(mctx, &dnssecrefreshstats));
   1205  1.1  christos 	}
   1206  1.1  christos 	dns_zone_setrequeststats(zone,  zoneqrystats);
   1207  1.1  christos 	dns_zone_setrcvquerystats(zone, rcvquerystats);
   1208  1.4  christos 	dns_zone_setdnssecsignstats(zone, dnssecsignstats);
   1209  1.4  christos 	dns_zone_setdnssecrefreshstats(zone, dnssecrefreshstats);
   1210  1.1  christos 
   1211  1.1  christos 	if (zoneqrystats != NULL)
   1212  1.1  christos 		isc_stats_detach(&zoneqrystats);
   1213  1.1  christos 
   1214  1.1  christos 	if(rcvquerystats != NULL)
   1215  1.1  christos 		dns_stats_detach(&rcvquerystats);
   1216  1.1  christos 
   1217  1.4  christos 	if(dnssecsignstats != NULL) {
   1218  1.4  christos 		dns_stats_detach(&dnssecsignstats);
   1219  1.4  christos 	}
   1220  1.4  christos 
   1221  1.4  christos 	if(dnssecrefreshstats != NULL) {
   1222  1.4  christos 		dns_stats_detach(&dnssecrefreshstats);
   1223  1.4  christos 	}
   1224  1.4  christos 
   1225  1.1  christos 	/*
   1226  1.1  christos 	 * Configure master functionality.  This applies
   1227  1.1  christos 	 * to primary masters (type "master") and slaves
   1228  1.1  christos 	 * acting as masters (type "slave"), but not to stubs.
   1229  1.1  christos 	 */
   1230  1.1  christos 	if (ztype != dns_zone_stub && ztype != dns_zone_staticstub &&
   1231  1.1  christos 	    ztype != dns_zone_redirect) {
   1232  1.1  christos 		obj = NULL;
   1233  1.1  christos 		result = named_config_get(maps, "notify", &obj);
   1234  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1235  1.1  christos 		if (cfg_obj_isboolean(obj)) {
   1236  1.1  christos 			if (cfg_obj_asboolean(obj))
   1237  1.1  christos 				notifytype = dns_notifytype_yes;
   1238  1.1  christos 			else
   1239  1.1  christos 				notifytype = dns_notifytype_no;
   1240  1.1  christos 		} else {
   1241  1.1  christos 			const char *notifystr = cfg_obj_asstring(obj);
   1242  1.3  christos 			if (strcasecmp(notifystr, "explicit") == 0) {
   1243  1.1  christos 				notifytype = dns_notifytype_explicit;
   1244  1.3  christos 			} else if (strcasecmp(notifystr, "master-only") == 0) {
   1245  1.1  christos 				notifytype = dns_notifytype_masteronly;
   1246  1.3  christos 			} else {
   1247  1.1  christos 				INSIST(0);
   1248  1.3  christos 				ISC_UNREACHABLE();
   1249  1.3  christos 			}
   1250  1.1  christos 		}
   1251  1.3  christos 		notifytype = process_notifytype(notifytype, ztype, zname,
   1252  1.3  christos 						nodefault);
   1253  1.1  christos 		if (raw != NULL)
   1254  1.1  christos 			dns_zone_setnotifytype(raw, dns_notifytype_no);
   1255  1.1  christos 		dns_zone_setnotifytype(zone, notifytype);
   1256  1.1  christos 
   1257  1.1  christos 		obj = NULL;
   1258  1.1  christos 		result = named_config_get(maps, "also-notify", &obj);
   1259  1.1  christos 		if (result == ISC_R_SUCCESS &&
   1260  1.1  christos 		    (notifytype == dns_notifytype_yes ||
   1261  1.1  christos 		     notifytype == dns_notifytype_explicit ||
   1262  1.1  christos 		     (notifytype == dns_notifytype_masteronly &&
   1263  1.1  christos 		      ztype == dns_zone_master)))
   1264  1.1  christos 		{
   1265  1.1  christos 			dns_ipkeylist_t ipkl;
   1266  1.1  christos 			dns_ipkeylist_init(&ipkl);
   1267  1.1  christos 
   1268  1.1  christos 			RETERR(named_config_getipandkeylist(config, obj, mctx,
   1269  1.1  christos 							 &ipkl));
   1270  1.1  christos 			result = dns_zone_setalsonotifydscpkeys(zone,
   1271  1.1  christos 								ipkl.addrs,
   1272  1.1  christos 								ipkl.dscps,
   1273  1.1  christos 								ipkl.keys,
   1274  1.1  christos 								ipkl.count);
   1275  1.1  christos 			dns_ipkeylist_clear(mctx, &ipkl);
   1276  1.1  christos 			RETERR(result);
   1277  1.1  christos 		} else
   1278  1.1  christos 			RETERR(dns_zone_setalsonotify(zone, NULL, 0));
   1279  1.1  christos 
   1280  1.1  christos 		obj = NULL;
   1281  1.1  christos 		result = named_config_get(maps, "notify-source", &obj);
   1282  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1283  1.1  christos 		RETERR(dns_zone_setnotifysrc4(zone, cfg_obj_assockaddr(obj)));
   1284  1.1  christos 		dscp = cfg_obj_getdscp(obj);
   1285  1.1  christos 		if (dscp == -1)
   1286  1.1  christos 			dscp = named_g_dscp;
   1287  1.1  christos 		RETERR(dns_zone_setnotifysrc4dscp(zone, dscp));
   1288  1.1  christos 		named_add_reserved_dispatch(named_g_server,
   1289  1.1  christos 					    cfg_obj_assockaddr(obj));
   1290  1.1  christos 
   1291  1.1  christos 		obj = NULL;
   1292  1.1  christos 		result = named_config_get(maps, "notify-source-v6", &obj);
   1293  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1294  1.1  christos 		RETERR(dns_zone_setnotifysrc6(zone, cfg_obj_assockaddr(obj)));
   1295  1.1  christos 		dscp = cfg_obj_getdscp(obj);
   1296  1.1  christos 		if (dscp == -1)
   1297  1.1  christos 			dscp = named_g_dscp;
   1298  1.1  christos 		RETERR(dns_zone_setnotifysrc6dscp(zone, dscp));
   1299  1.1  christos 		named_add_reserved_dispatch(named_g_server,
   1300  1.1  christos 					    cfg_obj_assockaddr(obj));
   1301  1.1  christos 
   1302  1.1  christos 		obj = NULL;
   1303  1.1  christos 		result = named_config_get(maps, "notify-to-soa", &obj);
   1304  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1305  1.1  christos 		dns_zone_setoption(zone, DNS_ZONEOPT_NOTIFYTOSOA,
   1306  1.1  christos 				   cfg_obj_asboolean(obj));
   1307  1.1  christos 
   1308  1.1  christos 		dns_zone_setisself(zone, isself, named_g_server->interfacemgr);
   1309  1.1  christos 
   1310  1.1  christos 		RETERR(configure_zone_acl(zconfig, vconfig, config,
   1311  1.1  christos 					  allow_transfer, ac, zone,
   1312  1.1  christos 					  dns_zone_setxfracl,
   1313  1.1  christos 					  dns_zone_clearxfracl));
   1314  1.1  christos 
   1315  1.1  christos 		obj = NULL;
   1316  1.1  christos 		result = named_config_get(maps, "max-transfer-time-out", &obj);
   1317  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1318  1.1  christos 		dns_zone_setmaxxfrout(zone, cfg_obj_asuint32(obj) * 60);
   1319  1.1  christos 
   1320  1.1  christos 		obj = NULL;
   1321  1.1  christos 		result = named_config_get(maps, "max-transfer-idle-out", &obj);
   1322  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1323  1.1  christos 		dns_zone_setidleout(zone, cfg_obj_asuint32(obj) * 60);
   1324  1.1  christos 
   1325  1.1  christos 		obj = NULL;
   1326  1.1  christos 		result = named_config_get(maps, "max-journal-size", &obj);
   1327  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1328  1.1  christos 		if (raw != NULL)
   1329  1.1  christos 			dns_zone_setjournalsize(raw, -1);
   1330  1.1  christos 		dns_zone_setjournalsize(zone, -1);
   1331  1.1  christos 		if (cfg_obj_isstring(obj)) {
   1332  1.1  christos 			const char *str = cfg_obj_asstring(obj);
   1333  1.1  christos 			if (strcasecmp(str, "unlimited") == 0) {
   1334  1.1  christos 				journal_size = DNS_JOURNAL_SIZE_MAX;
   1335  1.1  christos 			} else {
   1336  1.1  christos 				INSIST(strcasecmp(str, "default") == 0);
   1337  1.1  christos 				journal_size = -1;
   1338  1.1  christos 			}
   1339  1.1  christos 		} else {
   1340  1.1  christos 			isc_resourcevalue_t value;
   1341  1.1  christos 			value = cfg_obj_asuint64(obj);
   1342  1.1  christos 			if (value > DNS_JOURNAL_SIZE_MAX) {
   1343  1.1  christos 				cfg_obj_log(obj, named_g_lctx,
   1344  1.1  christos 					    ISC_LOG_ERROR,
   1345  1.1  christos 					    "'max-journal-size "
   1346  1.3  christos 					    "%" PRId64 "' "
   1347  1.1  christos 					    "is too large",
   1348  1.1  christos 					    value);
   1349  1.1  christos 				RETERR(ISC_R_RANGE);
   1350  1.1  christos 			}
   1351  1.3  christos 			journal_size = (uint32_t)value;
   1352  1.1  christos 		}
   1353  1.1  christos 		if (raw != NULL)
   1354  1.1  christos 			dns_zone_setjournalsize(raw, journal_size);
   1355  1.1  christos 		dns_zone_setjournalsize(zone, journal_size);
   1356  1.1  christos 
   1357  1.1  christos 		obj = NULL;
   1358  1.1  christos 		result = named_config_get(maps, "ixfr-from-differences", &obj);
   1359  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1360  1.3  christos 		if (cfg_obj_isboolean(obj)) {
   1361  1.1  christos 			ixfrdiff = cfg_obj_asboolean(obj);
   1362  1.3  christos 		} else if ((strcasecmp(cfg_obj_asstring(obj),
   1363  1.3  christos 				       "primary") == 0 ||
   1364  1.3  christos 			   strcasecmp(cfg_obj_asstring(obj),
   1365  1.3  christos 				       "master") == 0) &&
   1366  1.3  christos 			   ztype == dns_zone_master)
   1367  1.3  christos 		{
   1368  1.3  christos 			ixfrdiff = true;
   1369  1.3  christos 		} else if ((strcasecmp(cfg_obj_asstring(obj),
   1370  1.3  christos 				       "secondary") == 0 ||
   1371  1.3  christos 			   strcasecmp(cfg_obj_asstring(obj),
   1372  1.3  christos 				       "slave") == 0) &&
   1373  1.3  christos 			   ztype == dns_zone_slave)
   1374  1.3  christos 		{
   1375  1.3  christos 			ixfrdiff = true;
   1376  1.3  christos 		} else {
   1377  1.3  christos 			ixfrdiff = false;
   1378  1.3  christos 		}
   1379  1.1  christos 		if (raw != NULL) {
   1380  1.1  christos 			dns_zone_setoption(raw, DNS_ZONEOPT_IXFRFROMDIFFS,
   1381  1.3  christos 					   true);
   1382  1.1  christos 			dns_zone_setoption(zone, DNS_ZONEOPT_IXFRFROMDIFFS,
   1383  1.3  christos 					   false);
   1384  1.1  christos 		} else
   1385  1.1  christos 			dns_zone_setoption(zone, DNS_ZONEOPT_IXFRFROMDIFFS,
   1386  1.1  christos 					   ixfrdiff);
   1387  1.1  christos 
   1388  1.1  christos 		obj = NULL;
   1389  1.1  christos 		result = named_config_get(maps, "request-expire", &obj);
   1390  1.1  christos 		INSIST(result == ISC_R_SUCCESS);
   1391  1.1  christos 		dns_zone_setrequestexpire(zone, cfg_obj_asboolean(obj));
   1392  1.1  christos 
   1393  1.1  christos 		obj = NULL;
   1394  1.1  christos 		result = named_config_get(maps, "request-ixfr", &obj);
   1395  1.1  christos 		INSIST(result == ISC_R_SUCCESS);
   1396  1.1  christos 		dns_zone_setrequestixfr(zone, cfg_obj_asboolean(obj));
   1397  1.1  christos 
   1398  1.1  christos 		checknames(ztype, maps, &obj);
   1399  1.1  christos 		INSIST(obj != NULL);
   1400  1.1  christos 		if (strcasecmp(cfg_obj_asstring(obj), "warn") == 0) {
   1401  1.3  christos 			fail = false;
   1402  1.3  christos 			check = true;
   1403  1.1  christos 		} else if (strcasecmp(cfg_obj_asstring(obj), "fail") == 0) {
   1404  1.3  christos 			fail = check = true;
   1405  1.1  christos 		} else if (strcasecmp(cfg_obj_asstring(obj), "ignore") == 0) {
   1406  1.3  christos 			fail = check = false;
   1407  1.3  christos 		} else {
   1408  1.1  christos 			INSIST(0);
   1409  1.3  christos 			ISC_UNREACHABLE();
   1410  1.3  christos 		}
   1411  1.1  christos 		if (raw != NULL) {
   1412  1.1  christos 			dns_zone_setoption(raw, DNS_ZONEOPT_CHECKNAMES,
   1413  1.1  christos 					   check);
   1414  1.1  christos 			dns_zone_setoption(raw, DNS_ZONEOPT_CHECKNAMESFAIL,
   1415  1.1  christos 					   fail);
   1416  1.1  christos 			dns_zone_setoption(zone, DNS_ZONEOPT_CHECKNAMES,
   1417  1.3  christos 					   false);
   1418  1.1  christos 			dns_zone_setoption(zone, DNS_ZONEOPT_CHECKNAMESFAIL,
   1419  1.3  christos 					   false);
   1420  1.1  christos 		} else {
   1421  1.1  christos 			dns_zone_setoption(zone, DNS_ZONEOPT_CHECKNAMES,
   1422  1.1  christos 					   check);
   1423  1.1  christos 			dns_zone_setoption(zone, DNS_ZONEOPT_CHECKNAMESFAIL,
   1424  1.1  christos 					   fail);
   1425  1.1  christos 		}
   1426  1.1  christos 
   1427  1.1  christos 		obj = NULL;
   1428  1.1  christos 		result = named_config_get(maps, "notify-delay", &obj);
   1429  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1430  1.1  christos 		dns_zone_setnotifydelay(zone, cfg_obj_asuint32(obj));
   1431  1.1  christos 
   1432  1.1  christos 		obj = NULL;
   1433  1.1  christos 		result = named_config_get(maps, "check-sibling", &obj);
   1434  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1435  1.1  christos 		dns_zone_setoption(zone, DNS_ZONEOPT_CHECKSIBLING,
   1436  1.1  christos 				   cfg_obj_asboolean(obj));
   1437  1.1  christos 
   1438  1.1  christos 		obj = NULL;
   1439  1.1  christos 		result = named_config_get(maps, "check-spf", &obj);
   1440  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1441  1.1  christos 		if (strcasecmp(cfg_obj_asstring(obj), "warn") == 0) {
   1442  1.3  christos 			check = true;
   1443  1.1  christos 		} else if (strcasecmp(cfg_obj_asstring(obj), "ignore") == 0) {
   1444  1.3  christos 			check = false;
   1445  1.3  christos 		} else {
   1446  1.1  christos 			INSIST(0);
   1447  1.3  christos 			ISC_UNREACHABLE();
   1448  1.3  christos 		}
   1449  1.1  christos 		dns_zone_setoption(zone, DNS_ZONEOPT_CHECKSPF, check);
   1450  1.1  christos 
   1451  1.1  christos 		obj = NULL;
   1452  1.1  christos 		result = named_config_get(maps, "zero-no-soa-ttl", &obj);
   1453  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1454  1.1  christos 		dns_zone_setzeronosoattl(zone, cfg_obj_asboolean(obj));
   1455  1.1  christos 
   1456  1.1  christos 		obj = NULL;
   1457  1.1  christos 		result = named_config_get(maps, "nsec3-test-zone", &obj);
   1458  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1459  1.1  christos 		dns_zone_setoption(zone, DNS_ZONEOPT_NSEC3TESTZONE,
   1460  1.1  christos 				   cfg_obj_asboolean(obj));
   1461  1.1  christos 	} else if (ztype == dns_zone_redirect) {
   1462  1.1  christos 		dns_zone_setnotifytype(zone, dns_notifytype_no);
   1463  1.1  christos 
   1464  1.1  christos 		obj = NULL;
   1465  1.1  christos 		result = named_config_get(maps, "max-journal-size", &obj);
   1466  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1467  1.1  christos 		dns_zone_setjournalsize(zone, -1);
   1468  1.1  christos 		if (cfg_obj_isstring(obj)) {
   1469  1.1  christos 			const char *str = cfg_obj_asstring(obj);
   1470  1.1  christos 			if (strcasecmp(str, "unlimited") == 0) {
   1471  1.1  christos 				journal_size = DNS_JOURNAL_SIZE_MAX;
   1472  1.1  christos 			} else {
   1473  1.1  christos 				INSIST(strcasecmp(str, "default") == 0);
   1474  1.1  christos 				journal_size = -1;
   1475  1.1  christos 			}
   1476  1.1  christos 		} else {
   1477  1.1  christos 			isc_resourcevalue_t value;
   1478  1.1  christos 			value = cfg_obj_asuint64(obj);
   1479  1.1  christos 			if (value > DNS_JOURNAL_SIZE_MAX) {
   1480  1.1  christos 				cfg_obj_log(obj, named_g_lctx,
   1481  1.1  christos 					    ISC_LOG_ERROR,
   1482  1.1  christos 					    "'max-journal-size "
   1483  1.3  christos 					    "%" PRId64 "' "
   1484  1.1  christos 					    "is too large",
   1485  1.1  christos 					    value);
   1486  1.1  christos 				RETERR(ISC_R_RANGE);
   1487  1.1  christos 			}
   1488  1.3  christos 			journal_size = (uint32_t)value;
   1489  1.1  christos 		}
   1490  1.1  christos 		dns_zone_setjournalsize(zone, journal_size);
   1491  1.1  christos 	}
   1492  1.1  christos 
   1493  1.1  christos 	/*
   1494  1.1  christos 	 * Configure update-related options.  These apply to
   1495  1.1  christos 	 * primary masters only.
   1496  1.1  christos 	 */
   1497  1.1  christos 	if (ztype == dns_zone_master) {
   1498  1.1  christos 		dns_acl_t *updateacl;
   1499  1.1  christos 
   1500  1.1  christos 		RETERR(configure_zone_acl(zconfig, vconfig, config,
   1501  1.1  christos 					  allow_update, ac, mayberaw,
   1502  1.1  christos 					  dns_zone_setupdateacl,
   1503  1.1  christos 					  dns_zone_clearupdateacl));
   1504  1.1  christos 
   1505  1.1  christos 		updateacl = dns_zone_getupdateacl(mayberaw);
   1506  1.1  christos 		if (updateacl != NULL  && dns_acl_isinsecure(updateacl))
   1507  1.1  christos 			isc_log_write(named_g_lctx, DNS_LOGCATEGORY_SECURITY,
   1508  1.1  christos 				      NAMED_LOGMODULE_SERVER, ISC_LOG_WARNING,
   1509  1.1  christos 				      "zone '%s' allows unsigned updates "
   1510  1.1  christos 				      "from remote hosts, which is insecure",
   1511  1.1  christos 				      zname);
   1512  1.1  christos 
   1513  1.1  christos 		RETERR(configure_zone_ssutable(zoptions, mayberaw, zname));
   1514  1.1  christos 	}
   1515  1.1  christos 
   1516  1.1  christos 	if (ztype == dns_zone_master || raw != NULL) {
   1517  1.1  christos 		const cfg_obj_t *validity, *resign;
   1518  1.3  christos 		bool allow = false, maint = false;
   1519  1.3  christos 		bool sigvalinsecs;
   1520  1.3  christos 
   1521  1.3  christos 		obj = NULL;
   1522  1.3  christos 		result = named_config_get(maps, "dnskey-sig-validity", &obj);
   1523  1.3  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1524  1.3  christos 		seconds = cfg_obj_asuint32(obj) * 86400;
   1525  1.3  christos 		dns_zone_setkeyvalidityinterval(zone, seconds);
   1526  1.1  christos 
   1527  1.1  christos 		obj = NULL;
   1528  1.1  christos 		result = named_config_get(maps, "sig-validity-interval", &obj);
   1529  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1530  1.1  christos 
   1531  1.1  christos 		sigvalinsecs = ns_server_getoption(named_g_server->sctx,
   1532  1.1  christos 						   NS_SERVER_SIGVALINSECS);
   1533  1.1  christos 		validity = cfg_tuple_get(obj, "validity");
   1534  1.1  christos 		seconds = cfg_obj_asuint32(validity);
   1535  1.1  christos 		if (!sigvalinsecs) {
   1536  1.1  christos 			seconds *= 86400;
   1537  1.1  christos 		}
   1538  1.1  christos 		dns_zone_setsigvalidityinterval(zone, seconds);
   1539  1.1  christos 
   1540  1.1  christos 		resign = cfg_tuple_get(obj, "re-sign");
   1541  1.1  christos 		if (cfg_obj_isvoid(resign)) {
   1542  1.1  christos 			seconds /= 4;
   1543  1.1  christos 		} else if (!sigvalinsecs) {
   1544  1.1  christos 			if (seconds > 7 * 86400) {
   1545  1.1  christos 				seconds = cfg_obj_asuint32(resign) * 86400;
   1546  1.1  christos 			} else {
   1547  1.1  christos 				seconds = cfg_obj_asuint32(resign) * 3600;
   1548  1.1  christos 			}
   1549  1.1  christos 		} else {
   1550  1.1  christos 			seconds = cfg_obj_asuint32(resign);
   1551  1.1  christos 		}
   1552  1.1  christos 		dns_zone_setsigresigninginterval(zone, seconds);
   1553  1.1  christos 
   1554  1.1  christos 		obj = NULL;
   1555  1.1  christos 		result = named_config_get(maps, "key-directory", &obj);
   1556  1.1  christos 		if (result == ISC_R_SUCCESS) {
   1557  1.1  christos 			filename = cfg_obj_asstring(obj);
   1558  1.1  christos 			RETERR(dns_zone_setkeydirectory(zone, filename));
   1559  1.1  christos 		}
   1560  1.1  christos 
   1561  1.1  christos 		obj = NULL;
   1562  1.1  christos 		result = named_config_get(maps, "sig-signing-signatures", &obj);
   1563  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1564  1.1  christos 		dns_zone_setsignatures(zone, cfg_obj_asuint32(obj));
   1565  1.1  christos 
   1566  1.1  christos 		obj = NULL;
   1567  1.1  christos 		result = named_config_get(maps, "sig-signing-nodes", &obj);
   1568  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1569  1.1  christos 		dns_zone_setnodes(zone, cfg_obj_asuint32(obj));
   1570  1.1  christos 
   1571  1.1  christos 		obj = NULL;
   1572  1.1  christos 		result = named_config_get(maps, "sig-signing-type", &obj);
   1573  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1574  1.1  christos 		dns_zone_setprivatetype(zone, cfg_obj_asuint32(obj));
   1575  1.1  christos 
   1576  1.1  christos 		obj = NULL;
   1577  1.1  christos 		result = named_config_get(maps, "update-check-ksk", &obj);
   1578  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1579  1.1  christos 		dns_zone_setoption(zone, DNS_ZONEOPT_UPDATECHECKKSK,
   1580  1.1  christos 				   cfg_obj_asboolean(obj));
   1581  1.1  christos 
   1582  1.1  christos 		obj = NULL;
   1583  1.1  christos 		result = named_config_get(maps, "dnssec-dnskey-kskonly", &obj);
   1584  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1585  1.1  christos 		dns_zone_setoption(zone, DNS_ZONEOPT_DNSKEYKSKONLY,
   1586  1.1  christos 				   cfg_obj_asboolean(obj));
   1587  1.1  christos 
   1588  1.1  christos 		obj = NULL;
   1589  1.1  christos 		result = named_config_get(maps, "dnssec-loadkeys-interval",
   1590  1.1  christos 					  &obj);
   1591  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1592  1.1  christos 		RETERR(dns_zone_setrefreshkeyinterval(zone,
   1593  1.1  christos 						      cfg_obj_asuint32(obj)));
   1594  1.1  christos 
   1595  1.1  christos 		obj = NULL;
   1596  1.1  christos 		result = cfg_map_get(zoptions, "auto-dnssec", &obj);
   1597  1.1  christos 		if (result == ISC_R_SUCCESS) {
   1598  1.1  christos 			const char *arg = cfg_obj_asstring(obj);
   1599  1.3  christos 			if (strcasecmp(arg, "allow") == 0) {
   1600  1.3  christos 				allow = true;
   1601  1.3  christos 			} else if (strcasecmp(arg, "maintain") == 0) {
   1602  1.3  christos 				allow = maint = true;
   1603  1.3  christos 			} else if (strcasecmp(arg, "off") == 0) {
   1604  1.1  christos 				;
   1605  1.3  christos 			} else {
   1606  1.1  christos 				INSIST(0);
   1607  1.3  christos 				ISC_UNREACHABLE();
   1608  1.3  christos 			}
   1609  1.1  christos 			dns_zone_setkeyopt(zone, DNS_ZONEKEY_ALLOW, allow);
   1610  1.1  christos 			dns_zone_setkeyopt(zone, DNS_ZONEKEY_MAINTAIN, maint);
   1611  1.1  christos 		}
   1612  1.1  christos 	}
   1613  1.1  christos 
   1614  1.3  christos 	if (ztype == dns_zone_slave || ztype == dns_zone_mirror) {
   1615  1.1  christos 		RETERR(configure_zone_acl(zconfig, vconfig, config,
   1616  1.1  christos 					  allow_update_forwarding, ac,
   1617  1.1  christos 					  mayberaw, dns_zone_setforwardacl,
   1618  1.1  christos 					  dns_zone_clearforwardacl));
   1619  1.1  christos 	}
   1620  1.1  christos 
   1621  1.1  christos 	/*%
   1622  1.1  christos 	 * Primary master functionality.
   1623  1.1  christos 	 */
   1624  1.1  christos 	if (ztype == dns_zone_master) {
   1625  1.1  christos 		obj = NULL;
   1626  1.1  christos 		result = named_config_get(maps, "check-wildcard", &obj);
   1627  1.1  christos 		if (result == ISC_R_SUCCESS)
   1628  1.1  christos 			check = cfg_obj_asboolean(obj);
   1629  1.1  christos 		else
   1630  1.3  christos 			check = false;
   1631  1.1  christos 		dns_zone_setoption(mayberaw, DNS_ZONEOPT_CHECKWILDCARD, check);
   1632  1.1  christos 
   1633  1.1  christos 		/*
   1634  1.1  christos 		 * With map files, the default is ignore duplicate
   1635  1.1  christos 		 * records.  With other master formats, the default is
   1636  1.1  christos 		 * taken from the global configuration.
   1637  1.1  christos 		 */
   1638  1.1  christos 		obj = NULL;
   1639  1.1  christos 		if (masterformat != dns_masterformat_map) {
   1640  1.1  christos 			result = named_config_get(maps, "check-dup-records",
   1641  1.1  christos 						  &obj);
   1642  1.1  christos 			INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1643  1.1  christos 			dupcheck = cfg_obj_asstring(obj);
   1644  1.1  christos 		} else {
   1645  1.1  christos 			result = named_config_get(nodefault,
   1646  1.1  christos 						  "check-dup-records",
   1647  1.1  christos 						  &obj);
   1648  1.1  christos 			if (result == ISC_R_SUCCESS)
   1649  1.1  christos 				dupcheck = cfg_obj_asstring(obj);
   1650  1.1  christos 			else
   1651  1.1  christos 				dupcheck = "ignore";
   1652  1.1  christos 
   1653  1.1  christos 		}
   1654  1.1  christos 		if (strcasecmp(dupcheck, "warn") == 0) {
   1655  1.3  christos 			fail = false;
   1656  1.3  christos 			check = true;
   1657  1.1  christos 		} else if (strcasecmp(dupcheck, "fail") == 0) {
   1658  1.3  christos 			fail = check = true;
   1659  1.1  christos 		} else if (strcasecmp(dupcheck, "ignore") == 0) {
   1660  1.3  christos 			fail = check = false;
   1661  1.3  christos 		} else {
   1662  1.1  christos 			INSIST(0);
   1663  1.3  christos 			ISC_UNREACHABLE();
   1664  1.3  christos 		}
   1665  1.1  christos 		dns_zone_setoption(mayberaw, DNS_ZONEOPT_CHECKDUPRR, check);
   1666  1.1  christos 		dns_zone_setoption(mayberaw, DNS_ZONEOPT_CHECKDUPRRFAIL, fail);
   1667  1.1  christos 
   1668  1.1  christos 		obj = NULL;
   1669  1.1  christos 		result = named_config_get(maps, "check-mx", &obj);
   1670  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1671  1.1  christos 		if (strcasecmp(cfg_obj_asstring(obj), "warn") == 0) {
   1672  1.3  christos 			fail = false;
   1673  1.3  christos 			check = true;
   1674  1.1  christos 		} else if (strcasecmp(cfg_obj_asstring(obj), "fail") == 0) {
   1675  1.3  christos 			fail = check = true;
   1676  1.1  christos 		} else if (strcasecmp(cfg_obj_asstring(obj), "ignore") == 0) {
   1677  1.3  christos 			fail = check = false;
   1678  1.3  christos 		} else {
   1679  1.1  christos 			INSIST(0);
   1680  1.3  christos 			ISC_UNREACHABLE();
   1681  1.3  christos 		}
   1682  1.1  christos 		dns_zone_setoption(mayberaw, DNS_ZONEOPT_CHECKMX, check);
   1683  1.1  christos 		dns_zone_setoption(mayberaw, DNS_ZONEOPT_CHECKMXFAIL, fail);
   1684  1.1  christos 
   1685  1.1  christos 		/*
   1686  1.1  christos 		 * With map files, the default is *not* to check
   1687  1.1  christos 		 * integrity.  With other master formats, the default is
   1688  1.1  christos 		 * taken from the global configuration.
   1689  1.1  christos 		 */
   1690  1.1  christos 		obj = NULL;
   1691  1.1  christos 		if (masterformat != dns_masterformat_map) {
   1692  1.1  christos 			result = named_config_get(maps, "check-integrity",
   1693  1.1  christos 						  &obj);
   1694  1.1  christos 			INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1695  1.1  christos 			dns_zone_setoption(mayberaw, DNS_ZONEOPT_CHECKINTEGRITY,
   1696  1.1  christos 					   cfg_obj_asboolean(obj));
   1697  1.1  christos 		} else {
   1698  1.3  christos 			check = false;
   1699  1.1  christos 			result = named_config_get(nodefault, "check-integrity",
   1700  1.1  christos 					       &obj);
   1701  1.1  christos 			if (result == ISC_R_SUCCESS)
   1702  1.1  christos 				check = cfg_obj_asboolean(obj);
   1703  1.1  christos 			dns_zone_setoption(mayberaw, DNS_ZONEOPT_CHECKINTEGRITY,
   1704  1.1  christos 					   check);
   1705  1.1  christos 		}
   1706  1.1  christos 
   1707  1.1  christos 		obj = NULL;
   1708  1.1  christos 		result = named_config_get(maps, "check-mx-cname", &obj);
   1709  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1710  1.1  christos 		if (strcasecmp(cfg_obj_asstring(obj), "warn") == 0) {
   1711  1.3  christos 			warn = true;
   1712  1.3  christos 			ignore = false;
   1713  1.1  christos 		} else if (strcasecmp(cfg_obj_asstring(obj), "fail") == 0) {
   1714  1.3  christos 			warn = ignore = false;
   1715  1.1  christos 		} else if (strcasecmp(cfg_obj_asstring(obj), "ignore") == 0) {
   1716  1.3  christos 			warn = ignore = true;
   1717  1.3  christos 		} else {
   1718  1.1  christos 			INSIST(0);
   1719  1.3  christos 			ISC_UNREACHABLE();
   1720  1.3  christos 		}
   1721  1.1  christos 		dns_zone_setoption(mayberaw, DNS_ZONEOPT_WARNMXCNAME, warn);
   1722  1.1  christos 		dns_zone_setoption(mayberaw, DNS_ZONEOPT_IGNOREMXCNAME, ignore);
   1723  1.1  christos 
   1724  1.1  christos 		obj = NULL;
   1725  1.1  christos 		result = named_config_get(maps, "check-srv-cname", &obj);
   1726  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1727  1.1  christos 		if (strcasecmp(cfg_obj_asstring(obj), "warn") == 0) {
   1728  1.3  christos 			warn = true;
   1729  1.3  christos 			ignore = false;
   1730  1.1  christos 		} else if (strcasecmp(cfg_obj_asstring(obj), "fail") == 0) {
   1731  1.3  christos 			warn = ignore = false;
   1732  1.1  christos 		} else if (strcasecmp(cfg_obj_asstring(obj), "ignore") == 0) {
   1733  1.3  christos 			warn = ignore = true;
   1734  1.3  christos 		} else {
   1735  1.1  christos 			INSIST(0);
   1736  1.3  christos 			ISC_UNREACHABLE();
   1737  1.3  christos 		}
   1738  1.1  christos 		dns_zone_setoption(mayberaw, DNS_ZONEOPT_WARNSRVCNAME, warn);
   1739  1.1  christos 		dns_zone_setoption(mayberaw, DNS_ZONEOPT_IGNORESRVCNAME,
   1740  1.1  christos 				   ignore);
   1741  1.1  christos 
   1742  1.1  christos 		obj = NULL;
   1743  1.1  christos 		result = named_config_get(maps, "dnssec-secure-to-insecure",
   1744  1.1  christos 					  &obj);
   1745  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1746  1.1  christos 		dns_zone_setoption(mayberaw, DNS_ZONEOPT_SECURETOINSECURE,
   1747  1.1  christos 				   cfg_obj_asboolean(obj));
   1748  1.1  christos 
   1749  1.1  christos 		obj = NULL;
   1750  1.1  christos 		result = cfg_map_get(zoptions, "dnssec-update-mode", &obj);
   1751  1.1  christos 		if (result == ISC_R_SUCCESS) {
   1752  1.1  christos 			const char *arg = cfg_obj_asstring(obj);
   1753  1.3  christos 			if (strcasecmp(arg, "no-resign") == 0) {
   1754  1.1  christos 				dns_zone_setkeyopt(zone, DNS_ZONEKEY_NORESIGN,
   1755  1.3  christos 						   true);
   1756  1.3  christos 			} else if (strcasecmp(arg, "maintain") == 0) {
   1757  1.1  christos 				;
   1758  1.3  christos 			} else {
   1759  1.1  christos 				INSIST(0);
   1760  1.3  christos 				ISC_UNREACHABLE();
   1761  1.3  christos 			}
   1762  1.1  christos 		}
   1763  1.1  christos 
   1764  1.1  christos 		obj = NULL;
   1765  1.1  christos 		result = named_config_get(maps, "serial-update-method", &obj);
   1766  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1767  1.1  christos 		if (strcasecmp(cfg_obj_asstring(obj), "unixtime") == 0)
   1768  1.1  christos 			dns_zone_setserialupdatemethod(zone,
   1769  1.1  christos 						    dns_updatemethod_unixtime);
   1770  1.1  christos 		else if (strcasecmp(cfg_obj_asstring(obj), "date") == 0)
   1771  1.1  christos 			dns_zone_setserialupdatemethod(zone,
   1772  1.1  christos 						       dns_updatemethod_date);
   1773  1.1  christos 		else
   1774  1.1  christos 			dns_zone_setserialupdatemethod(zone,
   1775  1.1  christos 						  dns_updatemethod_increment);
   1776  1.1  christos 	}
   1777  1.1  christos 
   1778  1.1  christos 	/*
   1779  1.1  christos 	 * Configure slave functionality.
   1780  1.1  christos 	 */
   1781  1.1  christos 	switch (ztype) {
   1782  1.3  christos 	case dns_zone_mirror:
   1783  1.3  christos 		/*
   1784  1.3  christos 		 * Disable outgoing zone transfers for mirror zones unless they
   1785  1.3  christos 		 * are explicitly enabled by zone configuration.
   1786  1.3  christos 		 */
   1787  1.3  christos 		obj = NULL;
   1788  1.3  christos 		(void)cfg_map_get(zoptions, "allow-transfer", &obj);
   1789  1.3  christos 		if (obj == NULL) {
   1790  1.3  christos 			dns_acl_t *none;
   1791  1.3  christos 			RETERR(dns_acl_none(mctx, &none));
   1792  1.3  christos 			dns_zone_setxfracl(zone, none);
   1793  1.3  christos 			dns_acl_detach(&none);
   1794  1.3  christos 		}
   1795  1.3  christos 		/* FALLTHROUGH */
   1796  1.1  christos 	case dns_zone_slave:
   1797  1.1  christos 	case dns_zone_stub:
   1798  1.1  christos 	case dns_zone_redirect:
   1799  1.1  christos 		count = 0;
   1800  1.1  christos 		obj = NULL;
   1801  1.1  christos 		(void)cfg_map_get(zoptions, "masters", &obj);
   1802  1.3  christos 		/*
   1803  1.3  christos 		 * Use the built-in master server list if one was not
   1804  1.3  christos 		 * explicitly specified and this is a root zone mirror.
   1805  1.3  christos 		 */
   1806  1.3  christos 		if (obj == NULL && ztype == dns_zone_mirror &&
   1807  1.3  christos 		    dns_name_equal(dns_zone_getorigin(zone), dns_rootname))
   1808  1.3  christos 		{
   1809  1.3  christos 			result = named_config_getmastersdef(named_g_config,
   1810  1.3  christos 						DEFAULT_IANA_ROOT_ZONE_MASTERS,
   1811  1.3  christos 						&obj);
   1812  1.3  christos 			RETERR(result);
   1813  1.3  christos 		}
   1814  1.1  christos 		if (obj != NULL) {
   1815  1.1  christos 			dns_ipkeylist_t ipkl;
   1816  1.1  christos 			dns_ipkeylist_init(&ipkl);
   1817  1.1  christos 
   1818  1.1  christos 			RETERR(named_config_getipandkeylist(config, obj, mctx,
   1819  1.1  christos 							 &ipkl));
   1820  1.1  christos 			result = dns_zone_setmasterswithkeys(mayberaw,
   1821  1.1  christos 							     ipkl.addrs,
   1822  1.1  christos 							     ipkl.keys,
   1823  1.1  christos 							     ipkl.count);
   1824  1.1  christos 			count = ipkl.count;
   1825  1.1  christos 			dns_ipkeylist_clear(mctx, &ipkl);
   1826  1.1  christos 			RETERR(result);
   1827  1.1  christos 		} else
   1828  1.1  christos 			result = dns_zone_setmasters(mayberaw, NULL, 0);
   1829  1.1  christos 		RETERR(result);
   1830  1.1  christos 
   1831  1.3  christos 		multi = false;
   1832  1.1  christos 		if (count > 1) {
   1833  1.1  christos 			obj = NULL;
   1834  1.1  christos 			result = named_config_get(maps, "multi-master", &obj);
   1835  1.1  christos 			INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1836  1.1  christos 			multi = cfg_obj_asboolean(obj);
   1837  1.1  christos 		}
   1838  1.1  christos 		dns_zone_setoption(mayberaw, DNS_ZONEOPT_MULTIMASTER, multi);
   1839  1.1  christos 
   1840  1.1  christos 		obj = NULL;
   1841  1.1  christos 		result = named_config_get(maps, "max-transfer-time-in", &obj);
   1842  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1843  1.1  christos 		dns_zone_setmaxxfrin(mayberaw, cfg_obj_asuint32(obj) * 60);
   1844  1.1  christos 
   1845  1.1  christos 		obj = NULL;
   1846  1.1  christos 		result = named_config_get(maps, "max-transfer-idle-in", &obj);
   1847  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1848  1.1  christos 		dns_zone_setidlein(mayberaw, cfg_obj_asuint32(obj) * 60);
   1849  1.1  christos 
   1850  1.1  christos 		obj = NULL;
   1851  1.1  christos 		result = named_config_get(maps, "max-refresh-time", &obj);
   1852  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1853  1.1  christos 		dns_zone_setmaxrefreshtime(mayberaw, cfg_obj_asuint32(obj));
   1854  1.1  christos 
   1855  1.1  christos 		obj = NULL;
   1856  1.1  christos 		result = named_config_get(maps, "min-refresh-time", &obj);
   1857  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1858  1.1  christos 		dns_zone_setminrefreshtime(mayberaw, cfg_obj_asuint32(obj));
   1859  1.1  christos 
   1860  1.1  christos 		obj = NULL;
   1861  1.1  christos 		result = named_config_get(maps, "max-retry-time", &obj);
   1862  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1863  1.1  christos 		dns_zone_setmaxretrytime(mayberaw, cfg_obj_asuint32(obj));
   1864  1.1  christos 
   1865  1.1  christos 		obj = NULL;
   1866  1.1  christos 		result = named_config_get(maps, "min-retry-time", &obj);
   1867  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1868  1.1  christos 		dns_zone_setminretrytime(mayberaw, cfg_obj_asuint32(obj));
   1869  1.1  christos 
   1870  1.1  christos 		obj = NULL;
   1871  1.1  christos 		result = named_config_get(maps, "transfer-source", &obj);
   1872  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1873  1.1  christos 		RETERR(dns_zone_setxfrsource4(mayberaw,
   1874  1.1  christos 					      cfg_obj_assockaddr(obj)));
   1875  1.1  christos 		dscp = cfg_obj_getdscp(obj);
   1876  1.1  christos 		if (dscp == -1)
   1877  1.1  christos 			dscp = named_g_dscp;
   1878  1.1  christos 		RETERR(dns_zone_setxfrsource4dscp(mayberaw, dscp));
   1879  1.1  christos 		named_add_reserved_dispatch(named_g_server,
   1880  1.1  christos 					    cfg_obj_assockaddr(obj));
   1881  1.1  christos 
   1882  1.1  christos 		obj = NULL;
   1883  1.1  christos 		result = named_config_get(maps, "transfer-source-v6", &obj);
   1884  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1885  1.1  christos 		RETERR(dns_zone_setxfrsource6(mayberaw,
   1886  1.1  christos 					      cfg_obj_assockaddr(obj)));
   1887  1.1  christos 		dscp = cfg_obj_getdscp(obj);
   1888  1.1  christos 		if (dscp == -1)
   1889  1.1  christos 			dscp = named_g_dscp;
   1890  1.1  christos 		RETERR(dns_zone_setxfrsource6dscp(mayberaw, dscp));
   1891  1.1  christos 		named_add_reserved_dispatch(named_g_server,
   1892  1.1  christos 					    cfg_obj_assockaddr(obj));
   1893  1.1  christos 
   1894  1.1  christos 		obj = NULL;
   1895  1.1  christos 		result = named_config_get(maps, "alt-transfer-source", &obj);
   1896  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1897  1.1  christos 		RETERR(dns_zone_setaltxfrsource4(mayberaw,
   1898  1.1  christos 						 cfg_obj_assockaddr(obj)));
   1899  1.1  christos 		dscp = cfg_obj_getdscp(obj);
   1900  1.1  christos 		if (dscp == -1)
   1901  1.1  christos 			dscp = named_g_dscp;
   1902  1.1  christos 		RETERR(dns_zone_setaltxfrsource4dscp(mayberaw, dscp));
   1903  1.1  christos 
   1904  1.1  christos 		obj = NULL;
   1905  1.1  christos 		result = named_config_get(maps, "alt-transfer-source-v6", &obj);
   1906  1.1  christos 		INSIST(result == ISC_R_SUCCESS && obj != NULL);
   1907  1.1  christos 		RETERR(dns_zone_setaltxfrsource6(mayberaw,
   1908  1.1  christos 						 cfg_obj_assockaddr(obj)));
   1909  1.1  christos 		dscp = cfg_obj_getdscp(obj);
   1910  1.1  christos 		if (dscp == -1)
   1911  1.1  christos 			dscp = named_g_dscp;
   1912  1.1  christos 		RETERR(dns_zone_setaltxfrsource6dscp(mayberaw, dscp));
   1913  1.1  christos 
   1914  1.1  christos 		obj = NULL;
   1915  1.1  christos 		(void)named_config_get(maps, "use-alt-transfer-source", &obj);
   1916  1.1  christos 		if (obj == NULL) {
   1917  1.1  christos 			/*
   1918  1.1  christos 			 * Default off when views are in use otherwise
   1919  1.1  christos 			 * on for BIND 8 compatibility.
   1920  1.1  christos 			 */
   1921  1.1  christos 			view = dns_zone_getview(zone);
   1922  1.1  christos 			if (view != NULL && strcmp(view->name, "_default") == 0)
   1923  1.3  christos 				alt = true;
   1924  1.1  christos 			else
   1925  1.3  christos 				alt = false;
   1926  1.1  christos 		} else
   1927  1.1  christos 			alt = cfg_obj_asboolean(obj);
   1928  1.1  christos 		dns_zone_setoption(mayberaw, DNS_ZONEOPT_USEALTXFRSRC, alt);
   1929  1.1  christos 
   1930  1.1  christos 		obj = NULL;
   1931  1.1  christos 		(void)named_config_get(maps, "try-tcp-refresh", &obj);
   1932  1.1  christos 		dns_zone_setoption(mayberaw, DNS_ZONEOPT_TRYTCPREFRESH,
   1933  1.1  christos 				   cfg_obj_asboolean(obj));
   1934  1.1  christos 		break;
   1935  1.1  christos 
   1936  1.1  christos 	case dns_zone_staticstub:
   1937  1.1  christos 		RETERR(configure_staticstub(zoptions, zone, zname,
   1938  1.1  christos 					    default_dbtype));
   1939  1.1  christos 		break;
   1940  1.1  christos 
   1941  1.1  christos 	default:
   1942  1.1  christos 		break;
   1943  1.1  christos 	}
   1944  1.1  christos 
   1945  1.1  christos 	return (ISC_R_SUCCESS);
   1946  1.1  christos }
   1947  1.1  christos 
   1948  1.1  christos /*
   1949  1.1  christos  * Set up a DLZ zone as writeable
   1950  1.1  christos  */
   1951  1.1  christos isc_result_t
   1952  1.1  christos named_zone_configure_writeable_dlz(dns_dlzdb_t *dlzdatabase,
   1953  1.1  christos 				     dns_zone_t *zone,
   1954  1.1  christos 				     dns_rdataclass_t rdclass,
   1955  1.1  christos 				     dns_name_t *name)
   1956  1.1  christos {
   1957  1.1  christos 	dns_db_t *db = NULL;
   1958  1.1  christos 	isc_time_t now;
   1959  1.1  christos 	isc_result_t result;
   1960  1.1  christos 
   1961  1.1  christos 	TIME_NOW(&now);
   1962  1.1  christos 
   1963  1.1  christos 	dns_zone_settype(zone, dns_zone_dlz);
   1964  1.1  christos 	result = dns_sdlz_setdb(dlzdatabase, rdclass, name, &db);
   1965  1.1  christos 	if (result != ISC_R_SUCCESS)
   1966  1.1  christos 		return (result);
   1967  1.1  christos 	result = dns_zone_dlzpostload(zone, db);
   1968  1.1  christos 	dns_db_detach(&db);
   1969  1.1  christos 	return (result);
   1970  1.1  christos }
   1971  1.1  christos 
   1972  1.3  christos bool
   1973  1.1  christos named_zone_reusable(dns_zone_t *zone, const cfg_obj_t *zconfig) {
   1974  1.1  christos 	const cfg_obj_t *zoptions = NULL;
   1975  1.1  christos 	const cfg_obj_t *obj = NULL;
   1976  1.1  christos 	const char *cfilename;
   1977  1.1  christos 	const char *zfilename;
   1978  1.1  christos 	dns_zone_t *raw = NULL;
   1979  1.3  christos 	bool has_raw;
   1980  1.1  christos 	dns_zonetype_t ztype;
   1981  1.1  christos 
   1982  1.1  christos 	zoptions = cfg_tuple_get(zconfig, "options");
   1983  1.1  christos 
   1984  1.1  christos 	/*
   1985  1.1  christos 	 * We always reconfigure a static-stub zone for simplicity, assuming
   1986  1.1  christos 	 * the amount of data to be loaded is small.
   1987  1.1  christos 	 */
   1988  1.1  christos 	if (zonetype_fromconfig(zoptions) == dns_zone_staticstub) {
   1989  1.1  christos 		dns_zone_log(zone, ISC_LOG_DEBUG(1),
   1990  1.1  christos 			     "not reusable: staticstub");
   1991  1.3  christos 		return (false);
   1992  1.1  christos 	}
   1993  1.1  christos 
   1994  1.1  christos 	/* If there's a raw zone, use that for filename and type comparison */
   1995  1.1  christos 	dns_zone_getraw(zone, &raw);
   1996  1.1  christos 	if (raw != NULL) {
   1997  1.1  christos 		zfilename = dns_zone_getfile(raw);
   1998  1.1  christos 		ztype = dns_zone_gettype(raw);
   1999  1.1  christos 		dns_zone_detach(&raw);
   2000  1.3  christos 		has_raw = true;
   2001  1.1  christos 	} else {
   2002  1.1  christos 		zfilename = dns_zone_getfile(zone);
   2003  1.1  christos 		ztype = dns_zone_gettype(zone);
   2004  1.3  christos 		has_raw = false;
   2005  1.1  christos 	}
   2006  1.1  christos 
   2007  1.1  christos 	obj = NULL;
   2008  1.1  christos 	(void)cfg_map_get(zoptions, "inline-signing", &obj);
   2009  1.1  christos 	if ((obj == NULL || !cfg_obj_asboolean(obj)) && has_raw) {
   2010  1.1  christos 		dns_zone_log(zone, ISC_LOG_DEBUG(1),
   2011  1.1  christos 			     "not reusable: old zone was inline-signing");
   2012  1.3  christos 		return (false);
   2013  1.1  christos 	} else if ((obj != NULL && cfg_obj_asboolean(obj)) && !has_raw) {
   2014  1.1  christos 		dns_zone_log(zone, ISC_LOG_DEBUG(1),
   2015  1.1  christos 			     "not reusable: old zone was not inline-signing");
   2016  1.3  christos 		return (false);
   2017  1.1  christos 	}
   2018  1.1  christos 
   2019  1.1  christos 	if (zonetype_fromconfig(zoptions) != ztype) {
   2020  1.1  christos 		dns_zone_log(zone, ISC_LOG_DEBUG(1),
   2021  1.1  christos 			     "not reusable: type mismatch");
   2022  1.3  christos 		return (false);
   2023  1.1  christos 	}
   2024  1.1  christos 
   2025  1.1  christos 	obj = NULL;
   2026  1.1  christos 	(void)cfg_map_get(zoptions, "file", &obj);
   2027  1.1  christos 	if (obj != NULL)
   2028  1.1  christos 		cfilename = cfg_obj_asstring(obj);
   2029  1.1  christos 	else
   2030  1.1  christos 		cfilename = NULL;
   2031  1.1  christos 	if (!((cfilename == NULL && zfilename == NULL) ||
   2032  1.1  christos 	      (cfilename != NULL && zfilename != NULL &&
   2033  1.1  christos 	       strcmp(cfilename, zfilename) == 0)))
   2034  1.1  christos 	{
   2035  1.1  christos 		dns_zone_log(zone, ISC_LOG_DEBUG(1),
   2036  1.1  christos 			     "not reusable: filename mismatch");
   2037  1.3  christos 		return (false);
   2038  1.1  christos 	}
   2039  1.1  christos 
   2040  1.3  christos 	return (true);
   2041  1.1  christos }
   2042