Commit graph

3630 commits

Author SHA1 Message Date
Andreas Gustafsson
2c24bbb10b clarified warning messages 2000-07-12 16:17:38 +00:00
James Brister
8af589aea3 It's no longer a fatal error if a keys{} clause is missing on a control
channel definition, nor if the keys{} clause is empty. Warnings are
issued.
2000-07-12 15:36:09 +00:00
Brian Wellington
a6f31a3fd0 Only install default handlers for SIGTERM and SIGWAIT if we haven't installed
other handlers already.
2000-07-12 01:46:57 +00:00
Andreas Gustafsson
403cc93b27 typo in log message 2000-07-11 22:44:33 +00:00
David Lawrence
ce2be9b721 329. [func] omapi_auth_register() now takes a size_t argument for
the length of a key's secret data.  Previously
			OMAPI only stored secrets up to the first NUL byte.

This change was made to cope with decoded base64 secrets, so in this
revision omapiconf.c and rndc.c also decode the secret.
2000-07-11 22:03:12 +00:00
David Lawrence
9bf765ab3a 328. [func] Added isc_base64_decodestring().
(This is basically bin/named/server.c:base64_cstring_tobuffer(), which I
will remove in another revision that will not need to be pulled up.  I also
would like to change isc_base64_totext() and isc_base64_tobuffer() to be
isc_base64_encoderegion() and isc_base64_decodelexer(), unless there are
exceptions.  I find their existing names to be quite confusing with regard to
what translation function each performs.)
2000-07-11 21:51:13 +00:00
James Brister
f4d9f465cd 327. [bug] rndc.conf parser wasn't correctly recognising an IP
address where a host specification was required.
2000-07-11 20:13:09 +00:00
Brian Wellington
838f13fbdc Set default signal handlers for SIGINT and SIGTERM (SIGHUP already had one).
This doesn't appear to have an effect on any platform, but it seems like a
good idea.
2000-07-11 19:18:05 +00:00
James Brister
adade77942 326. [func] 'keys' in an 'inet' control statement is now
required and must have at least one item in it.

                        warning is issued if a 'unix' control channel is
                        defined (not supported).
2000-07-11 19:09:10 +00:00
Mark Andrews
5c0a406664 325. [bug] isc_lex_gettoken was processing octal strings when
ISC_LEXOPT_CNUMBER was not set.
2000-07-11 02:44:54 +00:00
Andreas Gustafsson
a4db2a47f5 incremented library version numbers to 1.0.0 2000-07-10 22:20:43 +00:00
Michael Graff
d2762d6c37 If the name is a dynamic name, free its memory 2000-07-10 20:46:02 +00:00
Michael Graff
401bea7527 set connected and bound when the connect completes 2000-07-10 19:40:06 +00:00
Andreas Gustafsson
28059de4ef when a master file ends in a place where a newline is expected,
make the warning message say 'file does not end with newline' instead of
'unexpected end of file' to lead the user on the right tracks to fixing
the most likely cause.  Also, don't include the function name in the message.
2000-07-10 19:07:19 +00:00
David Lawrence
d4868faf3f removed the port member from dns_c_ctrl_t; the port is put in the sockaddr. 2000-07-10 11:28:31 +00:00
David Lawrence
838281ed55 318. [func] dns_c_ndcctx_destroy() could never return anything
except ISC_R_SUCCESS; made it have void return instead.
2000-07-10 11:27:12 +00:00
David Lawrence
89e57b472d 317. [func] Use callbacks from libomapi to determine if a
new connection is valid, and if a key requested
			to be used with that connection is valid.
2000-07-10 11:23:00 +00:00
Mark Andrews
fd4810861c Warn on unexpected <eof> if input source is a file, treat as <eol><eof>
regardless of input source.
2000-07-10 05:15:04 +00:00
Mark Andrews
b47f3dc885 Add isc_lex_isfile(). 2000-07-10 05:11:18 +00:00
Mark Andrews
d1e971ba02 316. [bug] EOF mid line should be a error.
315.   [bug]           Handle non-empty blanks lines.
2000-07-09 12:52:34 +00:00
Andreas Gustafsson
f405ffddc8 added missing requirements 2000-07-08 17:27:28 +00:00
James Brister
475c936d4c 314. [func] Inet controls named.conf statement can now have
any non-negative number of keys specified.
2000-07-07 23:11:48 +00:00
James Brister
b4124351ad typo in printing additional-data definition.. 2000-07-07 22:57:53 +00:00
David Lawrence
d20d22616b A socket result of ISC_R_SUCCESS can still possibly be posted even after
isc_socket_cancel() has been called.  resquery_senddone() has been fixed
to account for this (there was a race condition because of the faulty
assumption that only ISC_R_CANCELED would be returned after
isc_socket_cancel()).

The interaction of resquery_response() with the dispatcher now has to be
closely reviewed to make sure it does not have a similar problem with
a canceled query.  If the faulty assumption hadn't been faulty, it was
fine, but now I'm not so sure.
2000-07-07 19:43:14 +00:00
Brian Wellington
0308460880 Some of the lwres functions weren't calling lwres_conf_parse. 2000-07-07 19:43:10 +00:00
Brian Wellington
68aa880dd5 remove unnecessary calls to fcntl(). 2000-07-07 19:10:00 +00:00
Brian Wellington
d8c8722f28 313. [bug] When parsing resolv.conf, don't terminate on an
error.  Instead, parse as much as possible, but
                        still return an error if one was found.
2000-07-07 18:58:46 +00:00
Brian Wellington
03968c0f5e removed dead code 2000-07-07 18:28:58 +00:00
Brian Wellington
4b7167e96a 312. [bug] Increase the number of allowed elements in the
resolv.conf search path from 6 to 8.  If there
                        are more than this, ignore the remainder rather
                        than returning a failure in lwres_conf_parse.
2000-07-07 18:24:11 +00:00
Brian Wellington
a4b496f2ab 311. [bug] lwres_conf_parse failed when the first line of
resolv.conf was empty or a comment.
2000-07-07 18:16:46 +00:00
James Brister
524c8ea0dc typo in print statement. 2000-07-07 14:30:00 +00:00
James Brister
952e9025b0 310. [func] Changes to named.conf "controls" statement (inet
subtype only)

                          - support "keys" clause

                                controls {
                                   inet * port 1024
                                        allow { any; } keys { "foo"; }
                                }

                          - allow "port xxx" to be left out of statement,
                            in which case it defaults to omapi's default port
                            of 953.
2000-07-07 13:56:14 +00:00
Brian Wellington
25496cebad If trying to validate a key set that happens to be a security root, the
validation should only consist of checking that each key in the key set
is also in the list of security root keys.

Strangeness occurs when the key set is signed, since the key set is marked
as secure, but the sig set is not, since it wasn't used in the validation
process.  This means that a query for a key set at a security root will
have the AD bit set if the key set is unsigned and not if the key set is signed.
2000-07-07 00:44:01 +00:00
David Lawrence
3658cf5419 comment cleanup (missing "not", spaces where tabs should have been) 2000-07-07 00:25:47 +00:00
David Lawrence
9fb4b3f08a Do not return an exact match from dns_rbt_findnode() when the exact
match does not have associated data and DNS_RBTFIND_EMPTYDATA is not set.
Return DNS_R_PARTIALMATCH instead if there is a superdomain with
data, or ISC_R_NOTFOUND if no superdomain has data.

Make dns_rbt_findname() honor DNS_RBTFIND_EMPTYDATA, per the rbt.h
documentation that has been saying it will.  It didn't.
2000-07-06 23:54:45 +00:00
Brian Wellington
861df15904 The includes were in the wrong order, causing digital unix to fail. 2000-07-06 22:13:15 +00:00
Brian Wellington
23efeb1a58 Check LWRES_PLATFORM_HAVESALEN, not ISC_PLATFORM_HAVESALEN 2000-07-06 21:42:05 +00:00
Brian Wellington
23ce1c7cca Lots of the comments were wrong. 2000-07-06 20:05:13 +00:00
Brian Wellington
ca93ad9b9e If we're asking for a key and need to call dns_view_findzonecut(), set
the DNS_DB_NOEXACT flag.  This means that the resolver will start look for the
key at or above the parent zone, and will return the key set from the parent
zone if key sets are present in both the parent and child.
2000-07-06 02:33:43 +00:00
Andreas Gustafsson
b7b5dd0d10 treat all responses to AXFR requests as AXFR responses 2000-07-05 20:28:34 +00:00
Michael Graff
8681403c16 Shut up a gcc warning 2000-07-05 20:26:46 +00:00
Mark Andrews
8c1aa8573d 308. [bug] Treat a SOA record not at top of zone as an error
when loading a zone. (RT #154)
2000-07-04 04:28:44 +00:00
Mark Andrews
3cf456d58e zone_get_from_db() now does as much as is possible. 2000-07-04 04:21:38 +00:00
Mark Andrews
84cb41f729 new error code DNS_R_NOTZONETOP 2000-07-04 03:59:54 +00:00
David Lawrence
24675e8e13 In dns_dispatch_createtcp(), REQUIRE() that attributes not include
DNS_DISPATCHATTR_UDP, and document that requirement as well as the
existing requirement for needing DNS_DISPATCHATTR_TCP.

No need to pull up.
2000-07-04 01:48:13 +00:00
Brian Wellington
9e37579870 Check that zone->view is not NULL before checking that zone->view->adb is not
NULL.  It appears that zone maintenance can occur when the zone is shutting
down and the view pointer is NULL.  We don't want to do zone maintenance in
this case.
2000-07-04 01:32:40 +00:00
David Lawrence
c7c2522a32 query-replace-o in error message; no need to pull up since no code in 9.0.0
will use the function in which the error appears
2000-07-04 01:29:48 +00:00
David Lawrence
96ab25294b 307. [bug] When canceling a query, the resolver didn't check for
isc_socket_sendto() calls that did not yet have their
			completion events posted, so it could (rarely) end up
			destroying the query context and then want to use
			it again when the send event posted, triggering an
			assertion as it tried to cancel an already-canceled
			query.  (RT #77)

... so now the resolver counts the number of outstanding isc_socket_sendto()s
and only destroys the query context when there are no more.
2000-07-04 01:19:20 +00:00
Brian Wellington
e68de4a7db 306. [bug] Reading HMAC-MD5 private key files didn't work. 2000-07-03 23:27:45 +00:00
Andreas Gustafsson
b3e4ce3059 alternative fix to 303. [RT #157] 2000-07-03 22:42:36 +00:00