rndc.c revision 1.13 1 1.13 christos /* $NetBSD: rndc.c,v 1.13 2025/01/26 16:24:35 christos Exp $ */
2 1.1 christos
3 1.1 christos /*
4 1.1 christos * Copyright (C) Internet Systems Consortium, Inc. ("ISC")
5 1.1 christos *
6 1.8 christos * SPDX-License-Identifier: MPL-2.0
7 1.8 christos *
8 1.1 christos * This Source Code Form is subject to the terms of the Mozilla Public
9 1.1 christos * License, v. 2.0. If a copy of the MPL was not distributed with this
10 1.6 christos * file, you can obtain one at https://mozilla.org/MPL/2.0/.
11 1.1 christos *
12 1.1 christos * See the COPYRIGHT file distributed with this work for additional
13 1.1 christos * information regarding copyright ownership.
14 1.1 christos */
15 1.1 christos
16 1.1 christos /*! \file */
17 1.1 christos
18 1.3 christos #include <inttypes.h>
19 1.3 christos #include <stdbool.h>
20 1.1 christos #include <stdlib.h>
21 1.1 christos
22 1.11 christos #include <isc/attributes.h>
23 1.1 christos #include <isc/buffer.h>
24 1.1 christos #include <isc/commandline.h>
25 1.1 christos #include <isc/file.h>
26 1.13 christos #include <isc/getaddresses.h>
27 1.1 christos #include <isc/log.h>
28 1.13 christos #include <isc/loop.h>
29 1.7 christos #include <isc/managers.h>
30 1.4 christos #include <isc/mem.h>
31 1.1 christos #include <isc/net.h>
32 1.11 christos #include <isc/netmgr.h>
33 1.1 christos #include <isc/random.h>
34 1.4 christos #include <isc/refcount.h>
35 1.11 christos #include <isc/result.h>
36 1.1 christos #include <isc/stdtime.h>
37 1.1 christos #include <isc/string.h>
38 1.1 christos #include <isc/thread.h>
39 1.1 christos #include <isc/util.h>
40 1.1 christos
41 1.4 christos #include <dns/name.h>
42 1.1 christos
43 1.1 christos #include <isccc/alist.h>
44 1.1 christos #include <isccc/base64.h>
45 1.1 christos #include <isccc/cc.h>
46 1.1 christos #include <isccc/ccmsg.h>
47 1.1 christos #include <isccc/sexpr.h>
48 1.1 christos #include <isccc/types.h>
49 1.1 christos #include <isccc/util.h>
50 1.1 christos
51 1.4 christos #include <isccfg/namedconf.h>
52 1.1 christos
53 1.1 christos #include "util.h"
54 1.1 christos
55 1.11 christos #define SERVERADDRS 10
56 1.11 christos #define RNDC_TIMEOUT 60 * 1000
57 1.1 christos
58 1.11 christos const char *progname = NULL;
59 1.3 christos bool verbose;
60 1.1 christos
61 1.11 christos static isc_nm_t *netmgr = NULL;
62 1.13 christos static isc_loopmgr_t *loopmgr = NULL;
63 1.11 christos
64 1.11 christos static const char *admin_conffile = NULL;
65 1.11 christos static const char *admin_keyfile = NULL;
66 1.11 christos static const char *version = PACKAGE_VERSION;
67 1.1 christos static const char *servername = NULL;
68 1.1 christos static isc_sockaddr_t serveraddrs[SERVERADDRS];
69 1.1 christos static isc_sockaddr_t local4, local6;
70 1.3 christos static bool local4set = false, local6set = false;
71 1.1 christos static int nserveraddrs;
72 1.1 christos static int currentaddr = 0;
73 1.1 christos static unsigned int remoteport = 0;
74 1.11 christos static isc_buffer_t *databuf = NULL;
75 1.11 christos static isccc_ccmsg_t rndc_ccmsg;
76 1.3 christos static uint32_t algorithm;
77 1.1 christos static isccc_region_t secret;
78 1.3 christos static bool failed = false;
79 1.3 christos static bool c_flag = false;
80 1.11 christos static isc_mem_t *rndc_mctx = NULL;
81 1.11 christos static char *command = NULL;
82 1.11 christos static char *args = NULL;
83 1.1 christos static char program[256];
84 1.3 christos static uint32_t serial;
85 1.3 christos static bool quiet = false;
86 1.3 christos static bool showresult = false;
87 1.13 christos static int32_t timeout = RNDC_TIMEOUT;
88 1.1 christos
89 1.4 christos static void
90 1.11 christos rndc_startconnect(isc_sockaddr_t *addr);
91 1.1 christos
92 1.11 christos noreturn static void
93 1.11 christos usage(int status);
94 1.1 christos
95 1.1 christos static void
96 1.1 christos usage(int status) {
97 1.1 christos fprintf(stderr, "\
98 1.1 christos Usage: %s [-b address] [-c config] [-s server] [-p port]\n\
99 1.1 christos [-k key-file ] [-y key] [-r] [-V] [-4 | -6] command\n\
100 1.1 christos \n\
101 1.1 christos command is one of the following:\n\
102 1.1 christos \n\
103 1.1 christos addzone zone [class [view]] { zone-options }\n\
104 1.1 christos Add zone to given view. Requires allow-new-zones option.\n\
105 1.1 christos delzone [-clean] zone [class [view]]\n\
106 1.1 christos Removes zone from given view.\n\
107 1.6 christos dnssec -checkds [-key id [-alg algorithm]] [-when time] (published|withdrawn) zone [class [view]]\n\
108 1.6 christos Mark the DS record for the KSK of the given zone as seen\n\
109 1.6 christos in the parent. If the zone has multiple KSKs, select a\n\
110 1.6 christos specific key by providing the keytag with -key id and\n\
111 1.6 christos optionally the key's algorithm with -alg algorithm.\n\
112 1.6 christos Requires the zone to have a dnssec-policy.\n\
113 1.6 christos dnssec -rollover -key id [-alg algorithm] [-when time] zone [class [view]]\n\
114 1.6 christos Rollover key with id of the given zone. Requires the zone\n\
115 1.6 christos to have a dnssec-policy.\n\
116 1.5 christos dnssec -status zone [class [view]]\n\
117 1.5 christos Show the DNSSEC signing state for the specified zone.\n\
118 1.5 christos Requires the zone to have a dnssec-policy.\n\
119 1.1 christos dnstap -reopen\n\
120 1.1 christos Close, truncate and re-open the DNSTAP output file.\n\
121 1.10 christos dnstap -roll [count]\n\
122 1.1 christos Close, rename and re-open the DNSTAP output file(s).\n\
123 1.6 christos dumpdb [-all|-cache|-zones|-adb|-bad|-expired|-fail] [view ...]\n\
124 1.1 christos Dump cache(s) to the dump file (named_dump.db).\n\
125 1.11 christos flush Flushes all of the server's caches.\n\
126 1.1 christos flush [view] Flushes the server's cache for a view.\n\
127 1.1 christos flushname name [view]\n\
128 1.1 christos Flush the given name from the server's cache(s)\n\
129 1.1 christos flushtree name [view]\n\
130 1.1 christos Flush all names under the given name from the server's cache(s)\n\
131 1.1 christos freeze Suspend updates to all dynamic zones.\n\
132 1.1 christos freeze zone [class [view]]\n\
133 1.1 christos Suspend updates to a dynamic zone.\n\
134 1.1 christos halt Stop the server without saving pending updates.\n\
135 1.1 christos halt -p Stop the server without saving pending updates reporting\n\
136 1.1 christos process id.\n\
137 1.13 christos skr -import file zone [class [view]]\n\
138 1.13 christos Import a SKR file for the specified zone, for offline KSK\n\
139 1.13 christos signing.\n\
140 1.1 christos loadkeys zone [class [view]]\n\
141 1.1 christos Update keys without signing immediately.\n\
142 1.1 christos managed-keys refresh [class [view]]\n\
143 1.1 christos Check trust anchor for RFC 5011 key changes\n\
144 1.1 christos managed-keys status [class [view]]\n\
145 1.1 christos Display RFC 5011 managed keys information\n\
146 1.1 christos managed-keys sync [class [view]]\n\
147 1.1 christos Write RFC 5011 managed keys to disk\n\
148 1.1 christos modzone zone [class [view]] { zone-options }\n\
149 1.1 christos Modify a zone's configuration.\n\
150 1.1 christos Requires allow-new-zones option.\n\
151 1.1 christos notify zone [class [view]]\n\
152 1.1 christos Resend NOTIFY messages for the zone.\n\
153 1.1 christos notrace Set debugging level to 0.\n\
154 1.1 christos nta -dump\n\
155 1.1 christos List all negative trust anchors.\n\
156 1.1 christos nta [-lifetime duration] [-force] domain [view]\n\
157 1.1 christos Set a negative trust anchor, disabling DNSSEC validation\n\
158 1.1 christos for the given domain.\n\
159 1.1 christos Using -lifetime specifies the duration of the NTA, up\n\
160 1.1 christos to one week.\n\
161 1.1 christos Using -force prevents the NTA from expiring before its\n\
162 1.1 christos full lifetime, even if the domain can validate sooner.\n\
163 1.1 christos nta -remove domain [view]\n\
164 1.1 christos Remove a negative trust anchor, re-enabling validation\n\
165 1.1 christos for the given domain.\n\
166 1.1 christos querylog [ on | off ]\n\
167 1.1 christos Enable / disable query logging.\n\
168 1.1 christos reconfig Reload configuration file and new zones only.\n\
169 1.1 christos recursing Dump the queries that are currently recursing (named.recursing)\n\
170 1.1 christos refresh zone [class [view]]\n\
171 1.1 christos Schedule immediate maintenance for a zone.\n\
172 1.1 christos reload Reload configuration file and zones.\n\
173 1.1 christos reload zone [class [view]]\n\
174 1.1 christos Reload a single zone.\n\
175 1.1 christos retransfer zone [class [view]]\n\
176 1.1 christos Retransfer a single zone without checking serial number.\n\
177 1.1 christos scan Scan available network interfaces for changes.\n\
178 1.1 christos secroots [view ...]\n\
179 1.1 christos Write security roots to the secroots file.\n\
180 1.4 christos serve-stale [ on | off | reset | status ] [class [view]]\n\
181 1.1 christos Control whether stale answers are returned\n\
182 1.1 christos showzone zone [class [view]]\n\
183 1.1 christos Print a zone's configuration.\n\
184 1.1 christos sign zone [class [view]]\n\
185 1.1 christos Update zone keys, and sign as needed.\n\
186 1.1 christos signing -clear all zone [class [view]]\n\
187 1.1 christos Remove the private records for all keys that have\n\
188 1.1 christos finished signing the given zone.\n\
189 1.1 christos signing -clear <keyid>/<algorithm> zone [class [view]]\n\
190 1.1 christos Remove the private record that indicating the given key\n\
191 1.1 christos has finished signing the given zone.\n\
192 1.1 christos signing -list zone [class [view]]\n\
193 1.1 christos List the private records showing the state of DNSSEC\n\
194 1.1 christos signing in the given zone.\n\
195 1.1 christos signing -nsec3param hash flags iterations salt zone [class [view]]\n\
196 1.1 christos Add NSEC3 chain to zone if already signed.\n\
197 1.1 christos Prime zone with NSEC3 chain if not yet signed.\n\
198 1.1 christos signing -nsec3param none zone [class [view]]\n\
199 1.1 christos Remove NSEC3 chains from zone.\n\
200 1.1 christos signing -serial <value> zone [class [view]]\n\
201 1.1 christos Set the zones's serial to <value>.\n\
202 1.1 christos stats Write server statistics to the statistics file.\n\
203 1.1 christos status Display status of the server.\n\
204 1.1 christos stop Save pending updates to master files and stop the server.\n\
205 1.1 christos stop -p Save pending updates to master files and stop the server\n\
206 1.1 christos reporting process id.\n\
207 1.1 christos sync [-clean] Dump changes to all dynamic zones to disk, and optionally\n\
208 1.1 christos remove their journal files.\n\
209 1.1 christos sync [-clean] zone [class [view]]\n\
210 1.1 christos Dump a single zone's changes to disk, and optionally\n\
211 1.1 christos remove its journal file.\n\
212 1.1 christos tcp-timeouts Display the tcp-*-timeout option values\n\
213 1.1 christos tcp-timeouts initial idle keepalive advertised\n\
214 1.1 christos Update the tcp-*-timeout option values\n\
215 1.1 christos thaw Enable updates to all dynamic zones and reload them.\n\
216 1.1 christos thaw zone [class [view]]\n\
217 1.1 christos Enable updates to a frozen dynamic zone and reload it.\n\
218 1.1 christos trace Increment debugging level by one.\n\
219 1.1 christos trace level Change the debugging level.\n\
220 1.4 christos validation [ on | off | status ] [view]\n\
221 1.1 christos Enable / disable DNSSEC validation.\n\
222 1.1 christos zonestatus zone [class [view]]\n\
223 1.1 christos Display the current status of a zone.\n\
224 1.1 christos \n\
225 1.1 christos Version: %s\n",
226 1.1 christos progname, version);
227 1.1 christos
228 1.1 christos exit(status);
229 1.1 christos }
230 1.1 christos
231 1.13 christos #define CMDLINE_FLAGS "46b:c:hk:Mmp:qrs:t:Vy:"
232 1.1 christos
233 1.1 christos static void
234 1.1 christos preparse_args(int argc, char **argv) {
235 1.3 christos bool ipv4only = false, ipv6only = false;
236 1.1 christos int ch;
237 1.1 christos
238 1.1 christos while ((ch = isc_commandline_parse(argc, argv, CMDLINE_FLAGS)) != -1) {
239 1.1 christos switch (ch) {
240 1.1 christos case '4':
241 1.1 christos if (ipv6only) {
242 1.1 christos fatal("only one of -4 and -6 allowed");
243 1.1 christos }
244 1.3 christos ipv4only = true;
245 1.1 christos break;
246 1.1 christos case '6':
247 1.1 christos if (ipv4only) {
248 1.1 christos fatal("only one of -4 and -6 allowed");
249 1.1 christos }
250 1.3 christos ipv6only = true;
251 1.1 christos break;
252 1.1 christos default:
253 1.1 christos break;
254 1.1 christos }
255 1.1 christos }
256 1.1 christos
257 1.3 christos isc_commandline_reset = true;
258 1.1 christos isc_commandline_index = 1;
259 1.1 christos }
260 1.1 christos
261 1.1 christos static void
262 1.1 christos get_addresses(const char *host, in_port_t port) {
263 1.1 christos isc_result_t result;
264 1.1 christos int found = 0, count;
265 1.1 christos
266 1.4 christos REQUIRE(host != NULL);
267 1.4 christos
268 1.13 christos count = SERVERADDRS - nserveraddrs;
269 1.13 christos result = isc_getaddresses(host, port, &serveraddrs[nserveraddrs], count,
270 1.13 christos &found);
271 1.13 christos nserveraddrs += found;
272 1.13 christos
273 1.4 christos if (result != ISC_R_SUCCESS) {
274 1.4 christos fatal("couldn't get address for '%s': %s", host,
275 1.4 christos isc_result_totext(result));
276 1.4 christos }
277 1.1 christos INSIST(nserveraddrs > 0);
278 1.1 christos }
279 1.1 christos
280 1.1 christos static void
281 1.13 christos rndc_senddone(isc_nmhandle_t *handle ISC_ATTR_UNUSED, isc_result_t result,
282 1.13 christos void *arg ISC_ATTR_UNUSED) {
283 1.11 christos if (result != ISC_R_SUCCESS) {
284 1.11 christos fatal("send failed: %s", isc_result_totext(result));
285 1.4 christos }
286 1.1 christos }
287 1.1 christos
288 1.1 christos static void
289 1.11 christos rndc_recvdone(isc_nmhandle_t *handle, isc_result_t result, void *arg) {
290 1.11 christos isccc_ccmsg_t *ccmsg = (isccc_ccmsg_t *)arg;
291 1.1 christos isccc_sexpr_t *response = NULL;
292 1.11 christos isccc_sexpr_t *data = NULL;
293 1.1 christos isccc_region_t source;
294 1.1 christos char *errormsg = NULL;
295 1.1 christos char *textmsg = NULL;
296 1.1 christos
297 1.13 christos REQUIRE(handle != NULL);
298 1.11 christos REQUIRE(ccmsg != NULL);
299 1.1 christos
300 1.13 christos if (result == ISC_R_EOF) {
301 1.11 christos fatal("connection to remote host closed.\n"
302 1.11 christos "* This may indicate that the\n"
303 1.11 christos "* remote server is using an older\n"
304 1.11 christos "* version of the command protocol,\n"
305 1.1 christos "* this host is not authorized to connect,\n"
306 1.11 christos "* the clocks are not synchronized,\n"
307 1.11 christos "* the key signing algorithm is incorrect,\n"
308 1.11 christos "* or the key is invalid.");
309 1.11 christos } else if (result != ISC_R_SUCCESS) {
310 1.11 christos fatal("recv failed: %s", isc_result_totext(result));
311 1.4 christos }
312 1.1 christos
313 1.13 christos isccc_ccmsg_toregion(ccmsg, &source);
314 1.1 christos
315 1.1 christos DO("parse message",
316 1.1 christos isccc_cc_fromwire(&source, &response, algorithm, &secret));
317 1.1 christos
318 1.1 christos data = isccc_alist_lookup(response, "_data");
319 1.4 christos if (!isccc_alist_alistp(data)) {
320 1.1 christos fatal("bad or missing data section in response");
321 1.4 christos }
322 1.1 christos result = isccc_cc_lookupstring(data, "err", &errormsg);
323 1.1 christos if (result == ISC_R_SUCCESS) {
324 1.3 christos failed = true;
325 1.4 christos fprintf(stderr, "%s: '%s' failed: %s\n", progname, command,
326 1.4 christos errormsg);
327 1.4 christos } else if (result != ISC_R_NOTFOUND) {
328 1.4 christos fprintf(stderr, "%s: parsing response failed: %s\n", progname,
329 1.4 christos isc_result_totext(result));
330 1.1 christos }
331 1.1 christos
332 1.1 christos result = isccc_cc_lookupstring(data, "text", &textmsg);
333 1.1 christos if (result == ISC_R_SUCCESS) {
334 1.4 christos if ((!quiet || failed) && strlen(textmsg) != 0U) {
335 1.1 christos fprintf(failed ? stderr : stdout, "%s\n", textmsg);
336 1.4 christos }
337 1.4 christos } else if (result != ISC_R_NOTFOUND) {
338 1.4 christos fprintf(stderr, "%s: parsing response failed: %s\n", progname,
339 1.4 christos isc_result_totext(result));
340 1.4 christos }
341 1.1 christos
342 1.1 christos if (showresult) {
343 1.1 christos isc_result_t eresult;
344 1.1 christos
345 1.1 christos result = isccc_cc_lookupuint32(data, "result", &eresult);
346 1.4 christos if (result == ISC_R_SUCCESS) {
347 1.1 christos printf("%s %u\n", isc_result_toid(eresult), eresult);
348 1.4 christos } else {
349 1.1 christos printf("NONE -1\n");
350 1.4 christos }
351 1.1 christos }
352 1.1 christos
353 1.1 christos isccc_sexpr_free(&response);
354 1.11 christos
355 1.13 christos isccc_ccmsg_disconnect(ccmsg);
356 1.13 christos isc_loopmgr_shutdown(loopmgr);
357 1.1 christos }
358 1.1 christos
359 1.1 christos static void
360 1.13 christos rndc_recvnonce(isc_nmhandle_t *handle ISC_ATTR_UNUSED, isc_result_t result,
361 1.13 christos void *arg) {
362 1.11 christos isccc_ccmsg_t *ccmsg = (isccc_ccmsg_t *)arg;
363 1.1 christos isccc_sexpr_t *response = NULL;
364 1.11 christos isccc_sexpr_t *_ctrl = NULL;
365 1.1 christos isccc_region_t source;
366 1.3 christos uint32_t nonce;
367 1.1 christos isccc_sexpr_t *request = NULL;
368 1.13 christos isccc_time_t now = isc_stdtime_now();
369 1.1 christos isc_region_t r;
370 1.11 christos isccc_sexpr_t *data = NULL;
371 1.1 christos isc_buffer_t b;
372 1.1 christos
373 1.11 christos REQUIRE(ccmsg != NULL);
374 1.1 christos
375 1.13 christos if (result == ISC_R_EOF) {
376 1.11 christos fatal("connection to remote host closed.\n"
377 1.11 christos "* This may indicate that the\n"
378 1.11 christos "* remote server is using an older\n"
379 1.11 christos "* version of the command protocol,\n"
380 1.1 christos "* this host is not authorized to connect,\n"
381 1.1 christos "* the clocks are not synchronized,\n"
382 1.11 christos "* the key signing algorithm is incorrect\n"
383 1.11 christos "* or the key is invalid.");
384 1.11 christos } else if (result != ISC_R_SUCCESS) {
385 1.11 christos fatal("recv failed: %s", isc_result_totext(result));
386 1.4 christos }
387 1.1 christos
388 1.13 christos isccc_ccmsg_toregion(ccmsg, &source);
389 1.1 christos
390 1.1 christos DO("parse message",
391 1.1 christos isccc_cc_fromwire(&source, &response, algorithm, &secret));
392 1.1 christos
393 1.1 christos _ctrl = isccc_alist_lookup(response, "_ctrl");
394 1.4 christos if (!isccc_alist_alistp(_ctrl)) {
395 1.1 christos fatal("bad or missing ctrl section in response");
396 1.4 christos }
397 1.1 christos nonce = 0;
398 1.4 christos if (isccc_cc_lookupuint32(_ctrl, "_nonce", &nonce) != ISC_R_SUCCESS) {
399 1.1 christos nonce = 0;
400 1.4 christos }
401 1.1 christos
402 1.1 christos DO("create message", isccc_cc_createmessage(1, NULL, NULL, ++serial,
403 1.1 christos now, now + 60, &request));
404 1.1 christos data = isccc_alist_lookup(request, "_data");
405 1.4 christos if (data == NULL) {
406 1.1 christos fatal("_data section missing");
407 1.4 christos }
408 1.4 christos if (isccc_cc_definestring(data, "type", args) == NULL) {
409 1.1 christos fatal("out of memory");
410 1.4 christos }
411 1.1 christos if (nonce != 0) {
412 1.1 christos _ctrl = isccc_alist_lookup(request, "_ctrl");
413 1.4 christos if (_ctrl == NULL) {
414 1.1 christos fatal("_ctrl section missing");
415 1.4 christos }
416 1.4 christos if (isccc_cc_defineuint32(_ctrl, "_nonce", nonce) == NULL) {
417 1.1 christos fatal("out of memory");
418 1.4 christos }
419 1.1 christos }
420 1.1 christos
421 1.1 christos isc_buffer_clear(databuf);
422 1.1 christos /* Skip the length field (4 bytes) */
423 1.1 christos isc_buffer_add(databuf, 4);
424 1.1 christos
425 1.1 christos DO("render message",
426 1.1 christos isccc_cc_towire(request, &databuf, algorithm, &secret));
427 1.1 christos
428 1.1 christos isc_buffer_init(&b, databuf->base, 4);
429 1.1 christos isc_buffer_putuint32(&b, databuf->used - 4);
430 1.1 christos
431 1.1 christos r.base = databuf->base;
432 1.1 christos r.length = databuf->used;
433 1.1 christos
434 1.11 christos isccc_ccmsg_readmessage(ccmsg, rndc_recvdone, ccmsg);
435 1.13 christos isccc_ccmsg_sendmessage(ccmsg, &r, rndc_senddone, NULL);
436 1.1 christos
437 1.1 christos isccc_sexpr_free(&response);
438 1.1 christos isccc_sexpr_free(&request);
439 1.1 christos return;
440 1.1 christos }
441 1.1 christos
442 1.1 christos static void
443 1.11 christos rndc_connected(isc_nmhandle_t *handle, isc_result_t result, void *arg) {
444 1.11 christos isccc_ccmsg_t *ccmsg = (isccc_ccmsg_t *)arg;
445 1.1 christos char socktext[ISC_SOCKADDR_FORMATSIZE];
446 1.1 christos isccc_sexpr_t *request = NULL;
447 1.11 christos isccc_sexpr_t *data = NULL;
448 1.13 christos isccc_time_t now = isc_stdtime_now();
449 1.1 christos isc_region_t r;
450 1.1 christos isc_buffer_t b;
451 1.1 christos
452 1.11 christos REQUIRE(ccmsg != NULL);
453 1.1 christos
454 1.11 christos if (result != ISC_R_SUCCESS) {
455 1.1 christos isc_sockaddr_format(&serveraddrs[currentaddr], socktext,
456 1.1 christos sizeof(socktext));
457 1.11 christos if (++currentaddr < nserveraddrs) {
458 1.1 christos notify("connection failed: %s: %s", socktext,
459 1.11 christos isc_result_totext(result));
460 1.11 christos rndc_startconnect(&serveraddrs[currentaddr]);
461 1.1 christos return;
462 1.4 christos }
463 1.11 christos
464 1.11 christos fatal("connect failed: %s: %s", socktext,
465 1.11 christos isc_result_totext(result));
466 1.1 christos }
467 1.1 christos
468 1.1 christos DO("create message", isccc_cc_createmessage(1, NULL, NULL, ++serial,
469 1.1 christos now, now + 60, &request));
470 1.1 christos data = isccc_alist_lookup(request, "_data");
471 1.4 christos if (data == NULL) {
472 1.1 christos fatal("_data section missing");
473 1.4 christos }
474 1.4 christos if (isccc_cc_definestring(data, "type", "null") == NULL) {
475 1.1 christos fatal("out of memory");
476 1.4 christos }
477 1.1 christos
478 1.1 christos isc_buffer_clear(databuf);
479 1.1 christos /* Skip the length field (4 bytes) */
480 1.1 christos isc_buffer_add(databuf, 4);
481 1.1 christos
482 1.1 christos DO("render message",
483 1.1 christos isccc_cc_towire(request, &databuf, algorithm, &secret));
484 1.1 christos
485 1.1 christos isc_buffer_init(&b, databuf->base, 4);
486 1.1 christos isc_buffer_putuint32(&b, databuf->used - 4);
487 1.1 christos
488 1.1 christos r.base = databuf->base;
489 1.1 christos r.length = databuf->used;
490 1.1 christos
491 1.13 christos /* isccc_ccmsg_init() attaches to the handle */
492 1.11 christos isccc_ccmsg_init(rndc_mctx, handle, ccmsg);
493 1.11 christos isccc_ccmsg_setmaxsize(ccmsg, 1024 * 1024);
494 1.1 christos
495 1.11 christos isccc_ccmsg_readmessage(ccmsg, rndc_recvnonce, ccmsg);
496 1.13 christos isccc_ccmsg_sendmessage(ccmsg, &r, rndc_senddone, NULL);
497 1.11 christos
498 1.1 christos isccc_sexpr_free(&request);
499 1.1 christos }
500 1.1 christos
501 1.1 christos static void
502 1.11 christos rndc_startconnect(isc_sockaddr_t *addr) {
503 1.1 christos char socktext[ISC_SOCKADDR_FORMATSIZE];
504 1.11 christos isc_sockaddr_t *local = NULL;
505 1.1 christos
506 1.1 christos isc_sockaddr_format(addr, socktext, sizeof(socktext));
507 1.1 christos
508 1.1 christos notify("using server %s (%s)", servername, socktext);
509 1.1 christos
510 1.1 christos switch (isc_sockaddr_pf(addr)) {
511 1.1 christos case AF_INET:
512 1.11 christos local = &local4;
513 1.1 christos break;
514 1.1 christos case AF_INET6:
515 1.11 christos local = &local6;
516 1.1 christos break;
517 1.1 christos default:
518 1.11 christos UNREACHABLE();
519 1.1 christos }
520 1.11 christos
521 1.11 christos isc_nm_tcpconnect(netmgr, local, addr, rndc_connected, &rndc_ccmsg,
522 1.13 christos timeout);
523 1.1 christos }
524 1.1 christos
525 1.1 christos static void
526 1.13 christos rndc_start(void *arg) {
527 1.13 christos UNUSED(arg);
528 1.11 christos
529 1.1 christos currentaddr = 0;
530 1.11 christos rndc_startconnect(&serveraddrs[currentaddr]);
531 1.1 christos }
532 1.1 christos
533 1.1 christos static void
534 1.1 christos parse_config(isc_mem_t *mctx, isc_log_t *log, const char *keyname,
535 1.4 christos cfg_parser_t **pctxp, cfg_obj_t **configp) {
536 1.1 christos isc_result_t result;
537 1.1 christos const char *conffile = admin_conffile;
538 1.1 christos const cfg_obj_t *addresses = NULL;
539 1.1 christos const cfg_obj_t *defkey = NULL;
540 1.1 christos const cfg_obj_t *options = NULL;
541 1.1 christos const cfg_obj_t *servers = NULL;
542 1.1 christos const cfg_obj_t *server = NULL;
543 1.1 christos const cfg_obj_t *keys = NULL;
544 1.1 christos const cfg_obj_t *key = NULL;
545 1.1 christos const cfg_obj_t *defport = NULL;
546 1.1 christos const cfg_obj_t *secretobj = NULL;
547 1.1 christos const cfg_obj_t *algorithmobj = NULL;
548 1.1 christos cfg_obj_t *config = NULL;
549 1.1 christos const cfg_obj_t *address = NULL;
550 1.1 christos const cfg_listelt_t *elt;
551 1.1 christos const char *secretstr;
552 1.1 christos const char *algorithmstr;
553 1.1 christos static char secretarray[1024];
554 1.1 christos const cfg_type_t *conftype = &cfg_type_rndcconf;
555 1.3 christos bool key_only = false;
556 1.1 christos const cfg_listelt_t *element;
557 1.1 christos
558 1.4 christos if (!isc_file_exists(conffile)) {
559 1.1 christos conffile = admin_keyfile;
560 1.1 christos conftype = &cfg_type_rndckey;
561 1.1 christos
562 1.4 christos if (c_flag) {
563 1.1 christos fatal("%s does not exist", admin_conffile);
564 1.4 christos }
565 1.1 christos
566 1.4 christos if (!isc_file_exists(conffile)) {
567 1.4 christos fatal("neither %s nor %s was found", admin_conffile,
568 1.4 christos admin_keyfile);
569 1.4 christos }
570 1.3 christos key_only = true;
571 1.4 christos } else if (!c_flag && isc_file_exists(admin_keyfile)) {
572 1.4 christos fprintf(stderr,
573 1.4 christos "WARNING: key file (%s) exists, but using "
574 1.1 christos "default configuration file (%s)\n",
575 1.1 christos admin_keyfile, admin_conffile);
576 1.1 christos }
577 1.1 christos
578 1.1 christos DO("create parser", cfg_parser_create(mctx, log, pctxp));
579 1.1 christos
580 1.1 christos /*
581 1.1 christos * The parser will output its own errors, so DO() is not used.
582 1.1 christos */
583 1.1 christos result = cfg_parse_file(*pctxp, conffile, conftype, &config);
584 1.4 christos if (result != ISC_R_SUCCESS) {
585 1.1 christos fatal("could not load rndc configuration");
586 1.4 christos }
587 1.1 christos
588 1.4 christos if (!key_only) {
589 1.1 christos (void)cfg_map_get(config, "options", &options);
590 1.4 christos }
591 1.1 christos
592 1.4 christos if (key_only && servername == NULL) {
593 1.1 christos servername = "127.0.0.1";
594 1.4 christos } else if (servername == NULL && options != NULL) {
595 1.1 christos const cfg_obj_t *defserverobj = NULL;
596 1.1 christos (void)cfg_map_get(options, "default-server", &defserverobj);
597 1.4 christos if (defserverobj != NULL) {
598 1.1 christos servername = cfg_obj_asstring(defserverobj);
599 1.4 christos }
600 1.1 christos }
601 1.1 christos
602 1.4 christos if (servername == NULL) {
603 1.1 christos fatal("no server specified and no default");
604 1.4 christos }
605 1.1 christos
606 1.1 christos if (!key_only) {
607 1.1 christos (void)cfg_map_get(config, "server", &servers);
608 1.1 christos if (servers != NULL) {
609 1.4 christos for (elt = cfg_list_first(servers); elt != NULL;
610 1.9 christos elt = cfg_list_next(elt))
611 1.9 christos {
612 1.11 christos const char *name = NULL;
613 1.1 christos server = cfg_listelt_value(elt);
614 1.4 christos name = cfg_obj_asstring(
615 1.4 christos cfg_map_getname(server));
616 1.4 christos if (strcasecmp(name, servername) == 0) {
617 1.1 christos break;
618 1.4 christos }
619 1.1 christos server = NULL;
620 1.1 christos }
621 1.1 christos }
622 1.1 christos }
623 1.1 christos
624 1.1 christos /*
625 1.1 christos * Look for the name of the key to use.
626 1.1 christos */
627 1.4 christos if (keyname != NULL) {
628 1.4 christos /* Was set on command line, do nothing. */
629 1.4 christos } else if (server != NULL) {
630 1.1 christos DO("get key for server", cfg_map_get(server, "key", &defkey));
631 1.1 christos keyname = cfg_obj_asstring(defkey);
632 1.1 christos } else if (options != NULL) {
633 1.4 christos DO("get default key",
634 1.4 christos cfg_map_get(options, "default-key", &defkey));
635 1.1 christos keyname = cfg_obj_asstring(defkey);
636 1.4 christos } else if (!key_only) {
637 1.1 christos fatal("no key for server and no default");
638 1.4 christos }
639 1.1 christos
640 1.1 christos /*
641 1.1 christos * Get the key's definition.
642 1.1 christos */
643 1.4 christos if (key_only) {
644 1.1 christos DO("get key", cfg_map_get(config, "key", &key));
645 1.4 christos } else {
646 1.1 christos DO("get config key list", cfg_map_get(config, "key", &keys));
647 1.4 christos for (elt = cfg_list_first(keys); elt != NULL;
648 1.9 christos elt = cfg_list_next(elt))
649 1.9 christos {
650 1.11 christos const char *name = NULL;
651 1.11 christos
652 1.1 christos key = cfg_listelt_value(elt);
653 1.11 christos name = cfg_obj_asstring(cfg_map_getname(key));
654 1.11 christos if (strcasecmp(name, keyname) == 0) {
655 1.1 christos break;
656 1.4 christos }
657 1.1 christos }
658 1.4 christos if (elt == NULL) {
659 1.1 christos fatal("no key definition for name %s", keyname);
660 1.4 christos }
661 1.1 christos }
662 1.1 christos (void)cfg_map_get(key, "secret", &secretobj);
663 1.1 christos (void)cfg_map_get(key, "algorithm", &algorithmobj);
664 1.4 christos if (secretobj == NULL || algorithmobj == NULL) {
665 1.1 christos fatal("key must have algorithm and secret");
666 1.4 christos }
667 1.1 christos
668 1.1 christos secretstr = cfg_obj_asstring(secretobj);
669 1.1 christos algorithmstr = cfg_obj_asstring(algorithmobj);
670 1.1 christos
671 1.3 christos if (strcasecmp(algorithmstr, "hmac-md5") == 0) {
672 1.1 christos algorithm = ISCCC_ALG_HMACMD5;
673 1.3 christos } else if (strcasecmp(algorithmstr, "hmac-sha1") == 0) {
674 1.1 christos algorithm = ISCCC_ALG_HMACSHA1;
675 1.3 christos } else if (strcasecmp(algorithmstr, "hmac-sha224") == 0) {
676 1.1 christos algorithm = ISCCC_ALG_HMACSHA224;
677 1.3 christos } else if (strcasecmp(algorithmstr, "hmac-sha256") == 0) {
678 1.1 christos algorithm = ISCCC_ALG_HMACSHA256;
679 1.3 christos } else if (strcasecmp(algorithmstr, "hmac-sha384") == 0) {
680 1.1 christos algorithm = ISCCC_ALG_HMACSHA384;
681 1.3 christos } else if (strcasecmp(algorithmstr, "hmac-sha512") == 0) {
682 1.1 christos algorithm = ISCCC_ALG_HMACSHA512;
683 1.3 christos } else {
684 1.1 christos fatal("unsupported algorithm: %s", algorithmstr);
685 1.3 christos }
686 1.1 christos
687 1.1 christos secret.rstart = (unsigned char *)secretarray;
688 1.1 christos secret.rend = (unsigned char *)secretarray + sizeof(secretarray);
689 1.1 christos DO("decode base64 secret", isccc_base64_decode(secretstr, &secret));
690 1.1 christos secret.rend = secret.rstart;
691 1.1 christos secret.rstart = (unsigned char *)secretarray;
692 1.1 christos
693 1.1 christos /*
694 1.1 christos * Find the port to connect to.
695 1.1 christos */
696 1.4 christos if (remoteport != 0) {
697 1.4 christos /* Was set on command line, do nothing. */
698 1.4 christos } else {
699 1.4 christos if (server != NULL) {
700 1.1 christos (void)cfg_map_get(server, "port", &defport);
701 1.4 christos }
702 1.4 christos if (defport == NULL && options != NULL) {
703 1.1 christos (void)cfg_map_get(options, "default-port", &defport);
704 1.4 christos }
705 1.1 christos }
706 1.1 christos if (defport != NULL) {
707 1.1 christos remoteport = cfg_obj_asuint32(defport);
708 1.4 christos if (remoteport > 65535 || remoteport == 0) {
709 1.1 christos fatal("port %u out of range", remoteport);
710 1.4 christos }
711 1.4 christos } else if (remoteport == 0) {
712 1.1 christos remoteport = NS_CONTROL_PORT;
713 1.4 christos }
714 1.1 christos
715 1.4 christos if (server != NULL) {
716 1.1 christos result = cfg_map_get(server, "addresses", &addresses);
717 1.4 christos } else {
718 1.1 christos result = ISC_R_NOTFOUND;
719 1.4 christos }
720 1.1 christos if (result == ISC_R_SUCCESS) {
721 1.4 christos for (element = cfg_list_first(addresses); element != NULL;
722 1.1 christos element = cfg_list_next(element))
723 1.1 christos {
724 1.1 christos isc_sockaddr_t sa;
725 1.1 christos
726 1.1 christos address = cfg_listelt_value(element);
727 1.1 christos if (!cfg_obj_issockaddr(address)) {
728 1.1 christos unsigned int myport;
729 1.1 christos const char *name;
730 1.1 christos const cfg_obj_t *obj;
731 1.1 christos
732 1.1 christos obj = cfg_tuple_get(address, "name");
733 1.1 christos name = cfg_obj_asstring(obj);
734 1.1 christos obj = cfg_tuple_get(address, "port");
735 1.1 christos if (cfg_obj_isuint32(obj)) {
736 1.1 christos myport = cfg_obj_asuint32(obj);
737 1.4 christos if (myport > UINT16_MAX || myport == 0)
738 1.4 christos {
739 1.1 christos fatal("port %u out of range",
740 1.1 christos myport);
741 1.4 christos }
742 1.4 christos } else {
743 1.1 christos myport = remoteport;
744 1.4 christos }
745 1.4 christos if (nserveraddrs < SERVERADDRS) {
746 1.4 christos get_addresses(name, (in_port_t)myport);
747 1.4 christos } else {
748 1.4 christos fprintf(stderr,
749 1.4 christos "too many address: "
750 1.4 christos "%s: dropped\n",
751 1.4 christos name);
752 1.4 christos }
753 1.1 christos continue;
754 1.1 christos }
755 1.1 christos sa = *cfg_obj_assockaddr(address);
756 1.4 christos if (isc_sockaddr_getport(&sa) == 0) {
757 1.1 christos isc_sockaddr_setport(&sa, remoteport);
758 1.4 christos }
759 1.4 christos if (nserveraddrs < SERVERADDRS) {
760 1.1 christos serveraddrs[nserveraddrs++] = sa;
761 1.4 christos } else {
762 1.1 christos char socktext[ISC_SOCKADDR_FORMATSIZE];
763 1.1 christos
764 1.1 christos isc_sockaddr_format(&sa, socktext,
765 1.1 christos sizeof(socktext));
766 1.1 christos fprintf(stderr,
767 1.1 christos "too many address: %s: dropped\n",
768 1.1 christos socktext);
769 1.1 christos }
770 1.1 christos }
771 1.1 christos }
772 1.1 christos
773 1.1 christos if (!local4set && server != NULL) {
774 1.1 christos address = NULL;
775 1.1 christos cfg_map_get(server, "source-address", &address);
776 1.1 christos if (address != NULL) {
777 1.1 christos local4 = *cfg_obj_assockaddr(address);
778 1.3 christos local4set = true;
779 1.1 christos }
780 1.1 christos }
781 1.1 christos if (!local4set && options != NULL) {
782 1.1 christos address = NULL;
783 1.1 christos cfg_map_get(options, "default-source-address", &address);
784 1.1 christos if (address != NULL) {
785 1.1 christos local4 = *cfg_obj_assockaddr(address);
786 1.3 christos local4set = true;
787 1.1 christos }
788 1.1 christos }
789 1.1 christos
790 1.1 christos if (!local6set && server != NULL) {
791 1.1 christos address = NULL;
792 1.1 christos cfg_map_get(server, "source-address-v6", &address);
793 1.1 christos if (address != NULL) {
794 1.1 christos local6 = *cfg_obj_assockaddr(address);
795 1.3 christos local6set = true;
796 1.1 christos }
797 1.1 christos }
798 1.1 christos if (!local6set && options != NULL) {
799 1.1 christos address = NULL;
800 1.1 christos cfg_map_get(options, "default-source-address-v6", &address);
801 1.1 christos if (address != NULL) {
802 1.1 christos local6 = *cfg_obj_assockaddr(address);
803 1.3 christos local6set = true;
804 1.1 christos }
805 1.1 christos }
806 1.1 christos
807 1.1 christos *configp = config;
808 1.1 christos }
809 1.1 christos
810 1.1 christos int
811 1.1 christos main(int argc, char **argv) {
812 1.1 christos isc_result_t result = ISC_R_SUCCESS;
813 1.3 christos bool show_final_mem = false;
814 1.1 christos isc_log_t *log = NULL;
815 1.1 christos isc_logconfig_t *logconfig = NULL;
816 1.1 christos isc_logdestination_t logdest;
817 1.1 christos cfg_parser_t *pctx = NULL;
818 1.1 christos cfg_obj_t *config = NULL;
819 1.1 christos const char *keyname = NULL;
820 1.1 christos struct in_addr in;
821 1.1 christos struct in6_addr in6;
822 1.13 christos char *p = NULL;
823 1.1 christos size_t argslen;
824 1.1 christos int ch;
825 1.1 christos int i;
826 1.1 christos
827 1.1 christos result = isc_file_progname(*argv, program, sizeof(program));
828 1.4 christos if (result != ISC_R_SUCCESS) {
829 1.1 christos memmove(program, "rndc", 5);
830 1.4 christos }
831 1.1 christos progname = program;
832 1.1 christos
833 1.1 christos admin_conffile = RNDC_CONFFILE;
834 1.1 christos admin_keyfile = RNDC_KEYFILE;
835 1.1 christos
836 1.1 christos isc_sockaddr_any(&local4);
837 1.1 christos isc_sockaddr_any6(&local6);
838 1.1 christos
839 1.3 christos isc_commandline_errprint = false;
840 1.1 christos
841 1.1 christos preparse_args(argc, argv);
842 1.1 christos
843 1.1 christos while ((ch = isc_commandline_parse(argc, argv, CMDLINE_FLAGS)) != -1) {
844 1.1 christos switch (ch) {
845 1.1 christos case '4':
846 1.1 christos if (isc_net_probeipv4() != ISC_R_SUCCESS) {
847 1.1 christos fatal("can't find IPv4 networking");
848 1.1 christos }
849 1.1 christos isc_net_disableipv6();
850 1.1 christos break;
851 1.1 christos case '6':
852 1.1 christos if (isc_net_probeipv6() != ISC_R_SUCCESS) {
853 1.1 christos fatal("can't find IPv6 networking");
854 1.1 christos }
855 1.1 christos isc_net_disableipv4();
856 1.1 christos break;
857 1.1 christos case 'b':
858 1.4 christos if (inet_pton(AF_INET, isc_commandline_argument, &in) ==
859 1.9 christos 1)
860 1.9 christos {
861 1.1 christos isc_sockaddr_fromin(&local4, &in, 0);
862 1.3 christos local4set = true;
863 1.1 christos } else if (inet_pton(AF_INET6, isc_commandline_argument,
864 1.9 christos &in6) == 1)
865 1.9 christos {
866 1.1 christos isc_sockaddr_fromin6(&local6, &in6, 0);
867 1.3 christos local6set = true;
868 1.1 christos }
869 1.1 christos break;
870 1.1 christos
871 1.1 christos case 'c':
872 1.1 christos admin_conffile = isc_commandline_argument;
873 1.3 christos c_flag = true;
874 1.1 christos break;
875 1.1 christos
876 1.1 christos case 'k':
877 1.1 christos admin_keyfile = isc_commandline_argument;
878 1.1 christos break;
879 1.1 christos
880 1.1 christos case 'M':
881 1.1 christos isc_mem_debugging = ISC_MEM_DEBUGTRACE;
882 1.1 christos break;
883 1.1 christos
884 1.1 christos case 'm':
885 1.3 christos show_final_mem = true;
886 1.1 christos break;
887 1.1 christos
888 1.1 christos case 'p':
889 1.1 christos remoteport = atoi(isc_commandline_argument);
890 1.4 christos if (remoteport > 65535 || remoteport == 0) {
891 1.1 christos fatal("port '%s' out of range",
892 1.1 christos isc_commandline_argument);
893 1.4 christos }
894 1.1 christos break;
895 1.1 christos
896 1.1 christos case 'q':
897 1.3 christos quiet = true;
898 1.1 christos break;
899 1.1 christos
900 1.1 christos case 'r':
901 1.3 christos showresult = true;
902 1.1 christos break;
903 1.1 christos
904 1.1 christos case 's':
905 1.1 christos servername = isc_commandline_argument;
906 1.1 christos break;
907 1.1 christos
908 1.13 christos case 't':
909 1.13 christos timeout = strtol(isc_commandline_argument, &p, 10);
910 1.13 christos if (*p != '\0' || timeout < 0 || timeout > 86400) {
911 1.13 christos fatal("invalid timeout '%s'",
912 1.13 christos isc_commandline_argument);
913 1.13 christos }
914 1.13 christos timeout *= 1000;
915 1.13 christos break;
916 1.13 christos
917 1.1 christos case 'V':
918 1.3 christos verbose = true;
919 1.1 christos break;
920 1.1 christos
921 1.1 christos case 'y':
922 1.1 christos keyname = isc_commandline_argument;
923 1.1 christos break;
924 1.1 christos
925 1.1 christos case '?':
926 1.1 christos if (isc_commandline_option != '?') {
927 1.1 christos fprintf(stderr, "%s: invalid argument -%c\n",
928 1.1 christos program, isc_commandline_option);
929 1.1 christos usage(1);
930 1.1 christos }
931 1.8 christos FALLTHROUGH;
932 1.1 christos case 'h':
933 1.1 christos usage(0);
934 1.1 christos break;
935 1.1 christos default:
936 1.4 christos fprintf(stderr, "%s: unhandled option -%c\n", program,
937 1.4 christos isc_commandline_option);
938 1.12 christos exit(EXIT_FAILURE);
939 1.1 christos }
940 1.1 christos }
941 1.1 christos
942 1.1 christos argc -= isc_commandline_index;
943 1.1 christos argv += isc_commandline_index;
944 1.1 christos
945 1.11 christos if (argv[0] == NULL) {
946 1.1 christos usage(1);
947 1.11 christos } else {
948 1.11 christos command = argv[0];
949 1.11 christos if (strcmp(command, "restart") == 0) {
950 1.11 christos fatal("'%s' is not implemented", command);
951 1.11 christos }
952 1.11 christos notify("%s", command);
953 1.4 christos }
954 1.1 christos
955 1.3 christos serial = isc_random32();
956 1.1 christos
957 1.13 christos isc_managers_create(&rndc_mctx, 1, &loopmgr, &netmgr);
958 1.13 christos isc_loopmgr_setup(loopmgr, rndc_start, NULL);
959 1.11 christos
960 1.13 christos isc_nm_settimeouts(netmgr, timeout, timeout, timeout, 0);
961 1.1 christos
962 1.4 christos isc_log_create(rndc_mctx, &log, &logconfig);
963 1.1 christos isc_log_setcontext(log);
964 1.4 christos isc_log_settag(logconfig, progname);
965 1.1 christos logdest.file.stream = stderr;
966 1.1 christos logdest.file.name = NULL;
967 1.1 christos logdest.file.versions = ISC_LOG_ROLLNEVER;
968 1.1 christos logdest.file.maximum_size = 0;
969 1.4 christos isc_log_createchannel(logconfig, "stderr", ISC_LOG_TOFILEDESC,
970 1.4 christos ISC_LOG_INFO, &logdest,
971 1.4 christos ISC_LOG_PRINTTAG | ISC_LOG_PRINTLEVEL);
972 1.4 christos DO("enabling log channel",
973 1.4 christos isc_log_usechannel(logconfig, "stderr", NULL, NULL));
974 1.1 christos
975 1.1 christos parse_config(rndc_mctx, log, keyname, &pctx, &config);
976 1.1 christos
977 1.4 christos isc_buffer_allocate(rndc_mctx, &databuf, 2048);
978 1.1 christos
979 1.1 christos /*
980 1.1 christos * Convert argc/argv into a space-delimited command string
981 1.1 christos * similar to what the user might enter in interactive mode
982 1.1 christos * (if that were implemented).
983 1.1 christos */
984 1.1 christos argslen = 0;
985 1.4 christos for (i = 0; i < argc; i++) {
986 1.1 christos argslen += strlen(argv[i]) + 1;
987 1.4 christos }
988 1.1 christos
989 1.1 christos args = isc_mem_get(rndc_mctx, argslen);
990 1.1 christos
991 1.1 christos p = args;
992 1.1 christos for (i = 0; i < argc; i++) {
993 1.1 christos size_t len = strlen(argv[i]);
994 1.1 christos memmove(p, argv[i], len);
995 1.1 christos p += len;
996 1.1 christos *p++ = ' ';
997 1.1 christos }
998 1.1 christos
999 1.1 christos p--;
1000 1.1 christos *p++ = '\0';
1001 1.1 christos INSIST(p == args + argslen);
1002 1.1 christos
1003 1.4 christos if (nserveraddrs == 0 && servername != NULL) {
1004 1.4 christos get_addresses(servername, (in_port_t)remoteport);
1005 1.4 christos }
1006 1.1 christos
1007 1.13 christos isc_loopmgr_run(loopmgr);
1008 1.11 christos
1009 1.11 christos isccc_ccmsg_invalidate(&rndc_ccmsg);
1010 1.1 christos
1011 1.1 christos isc_log_destroy(&log);
1012 1.1 christos isc_log_setcontext(NULL);
1013 1.1 christos
1014 1.1 christos cfg_obj_destroy(pctx, &config);
1015 1.1 christos cfg_parser_destroy(&pctx);
1016 1.1 christos
1017 1.1 christos isc_mem_put(rndc_mctx, args, argslen);
1018 1.1 christos
1019 1.1 christos isc_buffer_free(&databuf);
1020 1.1 christos
1021 1.4 christos if (show_final_mem) {
1022 1.1 christos isc_mem_stats(rndc_mctx, stderr);
1023 1.4 christos }
1024 1.1 christos
1025 1.13 christos isc_managers_destroy(&rndc_mctx, &loopmgr, &netmgr);
1026 1.1 christos
1027 1.4 christos if (failed) {
1028 1.13 christos return 1;
1029 1.4 christos }
1030 1.1 christos
1031 1.13 christos return 0;
1032 1.1 christos }
1033