dnsrpc: Use TALLOC_FREE instead of an explicit if-statement
[Samba.git] / source4 / rpc_server / dnsserver / dnsdata.c
bloba7b8e74685b571ee13d4e7fbc022ef40c96718f0
1 /*
2 Unix SMB/CIFS implementation.
4 DNS Server
6 Copyright (C) Amitay Isaacs 2011
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "includes.h"
23 #include "dnsserver.h"
24 #include "dns_server/dnsserver_common.h"
25 #include "lib/replace/system/network.h"
26 #include "librpc/gen_ndr/ndr_dnsp.h"
27 #include "librpc/gen_ndr/ndr_dnsserver.h"
30 struct IP4_ARRAY *ip4_array_copy(TALLOC_CTX *mem_ctx, struct IP4_ARRAY *ip4)
32 struct IP4_ARRAY *ret;
34 if (!ip4) {
35 return NULL;
38 ret = talloc_zero(mem_ctx, struct IP4_ARRAY);
39 if (!ret) {
40 return ret;
43 ret->AddrCount = ip4->AddrCount;
44 if (ip4->AddrCount > 0) {
45 ret->AddrArray = talloc_zero_array(mem_ctx, unsigned int, ip4->AddrCount);
46 if (ret->AddrArray) {
47 memcpy(ret->AddrArray, ip4->AddrArray,
48 sizeof(unsigned int) * ip4->AddrCount);
49 } else {
50 talloc_free(ret);
51 return NULL;
54 return ret;
58 struct DNS_ADDR_ARRAY *ip4_array_to_dns_addr_array(TALLOC_CTX *mem_ctx,
59 struct IP4_ARRAY *ip4)
61 struct DNS_ADDR_ARRAY *ret;
62 int i;
64 if (!ip4) {
65 return NULL;
68 ret = talloc_zero(mem_ctx, struct DNS_ADDR_ARRAY);
69 if (!ret) {
70 return ret;
73 ret->MaxCount = ip4->AddrCount;
74 ret->AddrCount = ip4->AddrCount;
75 ret->Family = AF_INET;
76 if (ip4->AddrCount > 0) {
77 ret->AddrArray = talloc_zero_array(mem_ctx, struct DNS_ADDR, ip4->AddrCount);
78 if (ret->AddrArray) {
79 for (i=0; i<ip4->AddrCount; i++) {
80 ret->AddrArray[i].MaxSa[0] = 0x02;
81 ret->AddrArray[i].MaxSa[3] = 53;
82 memcpy(&ret->AddrArray[i].MaxSa[4], ip4->AddrArray,
83 sizeof(unsigned int));
84 ret->AddrArray[i].DnsAddrUserDword[0] = 6;
87 } else {
88 talloc_free(ret);
89 return NULL;
92 return ret;
95 struct IP4_ARRAY *dns_addr_array_to_ip4_array(TALLOC_CTX *mem_ctx,
96 struct DNS_ADDR_ARRAY *ip)
98 struct IP4_ARRAY *ret;
99 size_t i, count, curr;
101 if (ip == NULL) {
102 return NULL;
104 /* We must only return IPv4 addresses.
105 The passed DNS_ADDR_ARRAY may contain:
106 - only ipv4 addresses
107 - only ipv6 addresses
108 - a mixture of both
109 - an empty array
111 ret = talloc_zero(mem_ctx, struct IP4_ARRAY);
112 if (!ret) {
113 return ret;
115 if (ip->AddrCount == 0 || ip->Family == AF_INET6) {
116 ret->AddrCount = 0;
117 return ret;
119 /* Now only ipv4 addresses or a mixture are left */
120 count = 0;
121 for (i = 0; i < ip->AddrCount; i++) {
122 if (ip->AddrArray[i].MaxSa[0] == 0x02) {
123 /* Is ipv4 */
124 count++;
127 if (count == 0) {
128 /* should not happen */
129 ret->AddrCount = 0;
130 return ret;
132 ret->AddrArray = talloc_zero_array(mem_ctx, uint32_t, count);
133 if (ret->AddrArray) {
134 curr = 0;
135 for (i = 0; i < ip->AddrCount; i++) {
136 if (ip->AddrArray[i].MaxSa[0] == 0x02) {
137 /* Is ipv4 */
138 memcpy(&ret->AddrArray[curr],
139 &ip->AddrArray[i].MaxSa[4],
140 sizeof(uint32_t));
141 curr++;
144 } else {
145 talloc_free(ret);
146 return NULL;
148 ret->AddrCount = curr;
149 return ret;
152 struct DNS_ADDR_ARRAY *dns_addr_array_copy(TALLOC_CTX *mem_ctx,
153 struct DNS_ADDR_ARRAY *addr)
155 struct DNS_ADDR_ARRAY *ret;
157 if (!addr) {
158 return NULL;
161 ret = talloc_zero(mem_ctx, struct DNS_ADDR_ARRAY);
162 if (!ret) {
163 return ret;
166 ret->MaxCount = addr->MaxCount;
167 ret->AddrCount = addr->AddrCount;
168 ret->Family = addr->Family;
169 if (addr->AddrCount > 0) {
170 ret->AddrArray = talloc_zero_array(mem_ctx, struct DNS_ADDR, addr->AddrCount);
171 if (ret->AddrArray) {
172 memcpy(ret->AddrArray, addr->AddrArray,
173 sizeof(struct DNS_ADDR) * addr->AddrCount);
174 } else {
175 talloc_free(ret);
176 return NULL;
179 return ret;
183 int dns_split_name_components(TALLOC_CTX *tmp_ctx, const char *name, char ***components)
185 char *str = NULL, *ptr, **list;
186 int count = 0;
188 if (name == NULL) {
189 return 0;
192 str = talloc_strdup(tmp_ctx, name);
193 if (!str) {
194 goto failed;
197 list = talloc_zero_array(tmp_ctx, char *, 0);
198 if (!list) {
199 goto failed;
202 ptr = strtok(str, ".");
203 while (ptr != NULL) {
204 count++;
205 list = talloc_realloc(tmp_ctx, list, char *, count);
206 if (!list) {
207 goto failed;
209 list[count-1] = talloc_strdup(tmp_ctx, ptr);
210 if (list[count-1] == NULL) {
211 goto failed;
213 ptr = strtok(NULL, ".");
216 talloc_free(str);
218 *components = list;
219 return count;
221 failed:
222 TALLOC_FREE(str);
223 return -1;
227 char *dns_split_node_name(TALLOC_CTX *tmp_ctx, const char *node_name, const char *zone_name)
229 char **nlist, **zlist;
230 char *prefix;
231 int ncount, zcount, i, match;
234 * If node_name is "@", return the zone_name
235 * If node_name is ".", return NULL
236 * If there is no '.' in node_name, return the node_name as is.
238 * If node_name does not have zone_name in it, return the node_name as is.
240 * If node_name has additional components as compared to zone_name
241 * return only the additional components as a prefix.
244 if (strcmp(node_name, "@") == 0) {
245 prefix = talloc_strdup(tmp_ctx, zone_name);
246 } else if (strcmp(node_name, ".") == 0) {
247 prefix = NULL;
248 } else if (strchr(node_name, '.') == NULL) {
249 prefix = talloc_strdup(tmp_ctx, node_name);
250 } else {
251 zcount = dns_split_name_components(tmp_ctx, zone_name, &zlist);
252 ncount = dns_split_name_components(tmp_ctx, node_name, &nlist);
253 if (zcount < 0 || ncount < 0) {
254 return NULL;
257 if (ncount < zcount) {
258 prefix = talloc_strdup(tmp_ctx, node_name);
259 } else {
260 match = 0;
261 for (i=1; i<=zcount; i++) {
262 if (strcasecmp(nlist[ncount-i], zlist[zcount-i]) != 0) {
263 break;
265 match++;
268 if (match == ncount) {
269 prefix = talloc_strdup(tmp_ctx, zone_name);
270 } else {
271 prefix = talloc_strdup(tmp_ctx, nlist[0]);
272 if (prefix != NULL) {
273 for (i=1; i<ncount-match; i++) {
274 prefix = talloc_asprintf_append(prefix, ".%s", nlist[i]);
275 if (prefix == NULL) {
276 break;
283 talloc_free(zlist);
284 talloc_free(nlist);
287 return prefix;
291 void dnsp_to_dns_copy(TALLOC_CTX *mem_ctx, struct dnsp_DnssrvRpcRecord *dnsp,
292 struct DNS_RPC_RECORD *dns)
294 int i, len;
296 ZERO_STRUCTP(dns);
298 dns->wDataLength = dnsp->wDataLength;
299 dns->wType = dnsp->wType;
300 dns->dwFlags = dnsp->rank;
301 dns->dwSerial = dnsp->dwSerial;
302 dns->dwTtlSeconds = dnsp->dwTtlSeconds;
303 dns->dwTimeStamp = dnsp->dwTimeStamp;
305 switch (dnsp->wType) {
307 case DNS_TYPE_TOMBSTONE:
308 dns->data.timestamp = dnsp->data.timestamp;
309 break;
311 case DNS_TYPE_A:
312 dns->data.ipv4 = talloc_strdup(mem_ctx, dnsp->data.ipv4);
313 break;
315 case DNS_TYPE_NS:
316 len = strlen(dnsp->data.ns);
317 if (dnsp->data.ns[len-1] == '.') {
318 dns->data.name.len = len;
319 dns->data.name.str = talloc_strdup(mem_ctx, dnsp->data.ns);
320 } else {
321 dns->data.name.len = len+1;
322 dns->data.name.str = talloc_asprintf(mem_ctx, "%s.", dnsp->data.ns);
324 break;
326 case DNS_TYPE_CNAME:
327 len = strlen(dnsp->data.cname);
328 if (dnsp->data.cname[len-1] == '.') {
329 dns->data.name.len = len;
330 dns->data.name.str = talloc_strdup(mem_ctx, dnsp->data.cname);
331 } else {
332 dns->data.name.len = len+1;
333 dns->data.name.str = talloc_asprintf(mem_ctx, "%s.", dnsp->data.cname);
335 break;
337 case DNS_TYPE_SOA:
338 dns->data.soa.dwSerialNo = dnsp->data.soa.serial;
339 dns->data.soa.dwRefresh = dnsp->data.soa.refresh;
340 dns->data.soa.dwRetry = dnsp->data.soa.retry;
341 dns->data.soa.dwExpire = dnsp->data.soa.expire;
342 dns->data.soa.dwMinimumTtl = dnsp->data.soa.minimum;
344 len = strlen(dnsp->data.soa.mname);
345 if (dnsp->data.soa.mname[len-1] == '.') {
346 dns->data.soa.NamePrimaryServer.len = len;
347 dns->data.soa.NamePrimaryServer.str = talloc_strdup(mem_ctx, dnsp->data.soa.mname);
348 } else {
349 dns->data.soa.NamePrimaryServer.len = len+1;
350 dns->data.soa.NamePrimaryServer.str = talloc_asprintf(mem_ctx, "%s.", dnsp->data.soa.mname);
353 len = strlen(dnsp->data.soa.rname);
354 if (dnsp->data.soa.rname[len-1] == '.') {
355 dns->data.soa.ZoneAdministratorEmail.len = len;
356 dns->data.soa.ZoneAdministratorEmail.str = talloc_strdup(mem_ctx, dnsp->data.soa.rname);
357 } else {
358 dns->data.soa.ZoneAdministratorEmail.len = len+1;
359 dns->data.soa.ZoneAdministratorEmail.str = talloc_asprintf(mem_ctx, "%s.", dnsp->data.soa.rname);
361 break;
363 case DNS_TYPE_PTR:
364 dns->data.ptr.len = strlen(dnsp->data.ptr);
365 dns->data.ptr.str = talloc_strdup(mem_ctx, dnsp->data.ptr);
366 break;
368 case DNS_TYPE_MX:
369 dns->data.mx.wPreference = dnsp->data.mx.wPriority;
370 len = strlen(dnsp->data.mx.nameTarget);
371 if (dnsp->data.mx.nameTarget[len-1] == '.') {
372 dns->data.mx.nameExchange.len = len;
373 dns->data.mx.nameExchange.str = talloc_strdup(mem_ctx, dnsp->data.mx.nameTarget);
374 } else {
375 dns->data.mx.nameExchange.len = len+1;
376 dns->data.mx.nameExchange.str = talloc_asprintf(mem_ctx, "%s.", dnsp->data.mx.nameTarget);
378 break;
380 case DNS_TYPE_TXT:
381 dns->data.txt.count = dnsp->data.txt.count;
382 dns->data.txt.str = talloc_array(mem_ctx, struct DNS_RPC_NAME, dnsp->data.txt.count);
383 for (i=0; i<dnsp->data.txt.count; i++) {
384 dns->data.txt.str[i].str = talloc_strdup(mem_ctx, dnsp->data.txt.str[i]);
385 dns->data.txt.str[i].len = strlen(dnsp->data.txt.str[i]);
387 break;
389 case DNS_TYPE_AAAA:
390 dns->data.ipv6 = talloc_strdup(mem_ctx, dnsp->data.ipv6);
391 break;
393 case DNS_TYPE_SRV:
394 dns->data.srv.wPriority = dnsp->data.srv.wPriority;
395 dns->data.srv.wWeight = dnsp->data.srv.wWeight;
396 dns->data.srv.wPort = dnsp->data.srv.wPort;
397 len = strlen(dnsp->data.srv.nameTarget);
398 if (dnsp->data.srv.nameTarget[len-1] == '.') {
399 dns->data.srv.nameTarget.len = len;
400 dns->data.srv.nameTarget.str = talloc_strdup(mem_ctx, dnsp->data.srv.nameTarget);
401 } else {
402 dns->data.srv.nameTarget.len = len+1;
403 dns->data.srv.nameTarget.str = talloc_asprintf(mem_ctx, "%s.", dnsp->data.srv.nameTarget);
405 break;
407 default:
408 memcpy(&dns->data, &dnsp->data, sizeof(union DNS_RPC_DATA));
409 DEBUG(0, ("dnsserver: Found Unhandled DNS record type=%d", dnsp->wType));
414 WERROR dns_to_dnsp_convert(TALLOC_CTX *mem_ctx, struct DNS_RPC_RECORD *dns,
415 struct dnsp_DnssrvRpcRecord **out_dnsp, bool check_name)
417 WERROR res;
418 int i, len;
419 const char *name;
420 char *talloc_res = NULL;
421 struct dnsp_DnssrvRpcRecord *dnsp = NULL;
423 dnsp = talloc_zero(mem_ctx, struct dnsp_DnssrvRpcRecord);
424 if (dnsp == NULL) {
425 return WERR_NOT_ENOUGH_MEMORY;
428 dnsp->wDataLength = dns->wDataLength;
429 dnsp->wType = dns->wType;
430 dnsp->version = 5;
431 dnsp->rank = dns->dwFlags & 0x000000FF;
432 dnsp->dwSerial = dns->dwSerial;
433 dnsp->dwTtlSeconds = dns->dwTtlSeconds;
434 dnsp->dwTimeStamp = dns->dwTimeStamp;
436 switch (dns->wType) {
438 case DNS_TYPE_TOMBSTONE:
439 dnsp->data.timestamp = dns->data.timestamp;
440 break;
442 case DNS_TYPE_A:
443 talloc_res = talloc_strdup(mem_ctx, dns->data.ipv4);
444 if (talloc_res == NULL) {
445 goto fail_nomemory;
447 dnsp->data.ipv4 = talloc_res;
448 break;
450 case DNS_TYPE_NS:
451 name = dns->data.name.str;
452 len = dns->data.name.len;
454 if (check_name) {
455 res = dns_name_check(mem_ctx, len, name);
456 if (!W_ERROR_IS_OK(res)) {
457 return res;
461 if (len > 0 && name[len-1] == '.') {
462 talloc_res = talloc_strndup(mem_ctx, name, len-1);
463 if (talloc_res == NULL) {
464 goto fail_nomemory;
466 dnsp->data.ns = talloc_res;
467 } else {
468 talloc_res = talloc_strdup(mem_ctx, name);
469 if (talloc_res == NULL) {
470 goto fail_nomemory;
472 dnsp->data.ns = talloc_res;
475 break;
477 case DNS_TYPE_CNAME:
478 name = dns->data.name.str;
479 len = dns->data.name.len;
481 if (check_name) {
482 res = dns_name_check(mem_ctx, len, name);
483 if (!W_ERROR_IS_OK(res)) {
484 return res;
488 if (len > 0 && name[len-1] == '.') {
489 talloc_res = talloc_strndup(mem_ctx, name, len-1);
490 if (talloc_res == NULL) {
491 goto fail_nomemory;
493 dnsp->data.cname = talloc_res;
494 } else {
495 talloc_res = talloc_strdup(mem_ctx, name);
496 if (talloc_res == NULL) {
497 goto fail_nomemory;
499 dnsp->data.cname = talloc_res;
502 break;
504 case DNS_TYPE_SOA:
505 dnsp->data.soa.serial = dns->data.soa.dwSerialNo;
506 dnsp->data.soa.refresh = dns->data.soa.dwRefresh;
507 dnsp->data.soa.retry = dns->data.soa.dwRetry;
508 dnsp->data.soa.expire = dns->data.soa.dwExpire;
509 dnsp->data.soa.minimum = dns->data.soa.dwMinimumTtl;
511 name = dns->data.soa.NamePrimaryServer.str;
512 len = dns->data.soa.NamePrimaryServer.len;
514 if (check_name) {
515 res = dns_name_check(mem_ctx, len, name);
516 if (!W_ERROR_IS_OK(res)) {
517 return res;
521 if (len > 0 && name[len-1] == '.') {
522 talloc_res = talloc_strndup(mem_ctx, name, len-1);
523 if (talloc_res == NULL) {
524 goto fail_nomemory;
526 dnsp->data.soa.mname = talloc_res;
527 } else {
528 talloc_res = talloc_strdup(mem_ctx, name);
529 if (talloc_res == NULL) {
530 goto fail_nomemory;
532 dnsp->data.soa.mname = talloc_res;
535 name = dns->data.soa.ZoneAdministratorEmail.str;
536 len = dns->data.soa.ZoneAdministratorEmail.len;
538 res = dns_name_check(mem_ctx, len, name);
539 if (!W_ERROR_IS_OK(res)) {
540 return res;
543 if (len > 0 && name[len-1] == '.') {
544 talloc_res = talloc_strndup(mem_ctx, name, len-1);
545 if (talloc_res == NULL) {
546 goto fail_nomemory;
548 dnsp->data.soa.rname = talloc_res;
549 } else {
550 talloc_res = talloc_strdup(mem_ctx, name);
551 if (talloc_res == NULL) {
552 goto fail_nomemory;
554 dnsp->data.soa.rname = talloc_res;
557 break;
559 case DNS_TYPE_PTR:
560 name = dns->data.ptr.str;
561 len = dns->data.ptr.len;
563 if (check_name) {
564 res = dns_name_check(mem_ctx, len, name);
565 if (!W_ERROR_IS_OK(res)) {
566 return res;
570 talloc_res = talloc_strdup(mem_ctx, name);
571 if (talloc_res == NULL) {
572 goto fail_nomemory;
574 dnsp->data.ptr = talloc_res;
576 break;
578 case DNS_TYPE_MX:
579 dnsp->data.mx.wPriority = dns->data.mx.wPreference;
581 name = dns->data.mx.nameExchange.str;
582 len = dns->data.mx.nameExchange.len;
584 if (check_name) {
585 res = dns_name_check(mem_ctx, len, name);
586 if (!W_ERROR_IS_OK(res)) {
587 return res;
591 if (len > 0 && name[len-1] == '.') {
592 talloc_res = talloc_strndup(mem_ctx, name, len-1);
593 if (talloc_res == NULL) {
594 goto fail_nomemory;
596 dnsp->data.mx.nameTarget = talloc_res;
597 } else {
598 talloc_res = talloc_strdup(mem_ctx, name);
599 if (talloc_res == NULL) {
600 goto fail_nomemory;
602 dnsp->data.mx.nameTarget = talloc_res;
605 break;
607 case DNS_TYPE_TXT:
608 dnsp->data.txt.count = dns->data.txt.count;
609 dnsp->data.txt.str = talloc_array(mem_ctx, const char *, dns->data.txt.count);
610 for (i=0; i<dns->data.txt.count; i++) {
611 talloc_res = talloc_strdup(mem_ctx, dns->data.txt.str[i].str);
612 if (talloc_res == NULL) {
613 goto fail_nomemory;
615 dnsp->data.txt.str[i] = talloc_res;
617 break;
619 case DNS_TYPE_AAAA:
620 dnsp->data.ipv6 = talloc_strdup(mem_ctx, dns->data.ipv6);
621 break;
623 case DNS_TYPE_SRV:
624 dnsp->data.srv.wPriority = dns->data.srv.wPriority;
625 dnsp->data.srv.wWeight = dns->data.srv.wWeight;
626 dnsp->data.srv.wPort = dns->data.srv.wPort;
628 name = dns->data.srv.nameTarget.str;
629 len = dns->data.srv.nameTarget.len;
631 if (check_name) {
632 res = dns_name_check(mem_ctx, len, name);
633 if (!W_ERROR_IS_OK(res)) {
634 return res;
638 if (len > 0 && name[len-1] == '.') {
639 talloc_res = talloc_strndup(mem_ctx, name, len-1);
640 if (talloc_res == NULL) {
641 goto fail_nomemory;
643 dnsp->data.srv.nameTarget = talloc_res;
644 } else {
645 talloc_res = talloc_strdup(mem_ctx, name);
646 if (talloc_res == NULL) {
647 goto fail_nomemory;
649 dnsp->data.srv.nameTarget = talloc_res;
652 break;
654 default:
655 memcpy(&dnsp->data, &dns->data, sizeof(union dnsRecordData));
656 DEBUG(0, ("dnsserver: Found Unhandled DNS record type=%d", dns->wType));
659 *out_dnsp = dnsp;
660 return WERR_OK;
662 fail_nomemory:
663 return WERR_NOT_ENOUGH_MEMORY;
666 /* Intialize tree with given name as the root */
667 static struct dns_tree *dns_tree_init(TALLOC_CTX *mem_ctx, const char *name, void *data)
669 struct dns_tree *tree;
671 tree = talloc_zero(mem_ctx, struct dns_tree);
672 if (tree == NULL) {
673 return NULL;
676 tree->name = talloc_strdup(tree, name);
677 if (tree->name == NULL) {
678 talloc_free(tree);
679 return NULL;
682 tree->data = data;
684 return tree;
688 /* Add a child one level below */
689 static struct dns_tree *dns_tree_add(struct dns_tree *tree, const char *name, void *data)
691 struct dns_tree *node;
693 node = talloc_zero(tree, struct dns_tree);
694 if (node == NULL) {
695 return NULL;
698 node->name = talloc_strdup(tree, name);
699 if (node->name == NULL) {
700 talloc_free(node);
701 return NULL;
703 node->level = tree->level + 1;
704 node->num_children = 0;
705 node->children = NULL;
706 node->data = data;
708 if (tree->num_children == 0) {
709 tree->children = talloc_zero(tree, struct dns_tree *);
710 } else {
711 tree->children = talloc_realloc(tree, tree->children, struct dns_tree *,
712 tree->num_children+1);
714 if (tree->children == NULL) {
715 talloc_free(node);
716 return NULL;
718 tree->children[tree->num_children] = node;
719 tree->num_children++;
721 return node;
724 /* Find a node that matches the name components */
725 static struct dns_tree *dns_tree_find(struct dns_tree *tree, int ncount, char **nlist, int *match_count)
727 struct dns_tree *node, *next;
728 int i, j, start;
730 *match_count = -1;
732 if (strcmp(tree->name, "@") == 0) {
733 start = 0;
734 } else {
735 if (strcasecmp(tree->name, nlist[ncount-1]) != 0) {
736 return NULL;
738 start = 1;
739 *match_count = 0;
742 node = tree;
743 for (i=start; i<ncount; i++) {
744 if (node->num_children == 0) {
745 break;
747 next = NULL;
748 for (j=0; j<node->num_children; j++) {
749 if (strcasecmp(nlist[(ncount-1)-i], node->children[j]->name) == 0) {
750 next = node->children[j];
751 *match_count = i;
752 break;
755 if (next == NULL) {
756 break;
757 } else {
758 node = next;
762 return node;
765 /* Build a 2-level tree for resulting dns names */
766 struct dns_tree *dns_build_tree(TALLOC_CTX *mem_ctx, const char *name, struct ldb_result *res)
768 struct dns_tree *root, *base, *tree, *node;
769 const char *ptr;
770 int rootcount, ncount;
771 char **nlist;
772 int i, level, match_count;
774 rootcount = dns_split_name_components(mem_ctx, name, &nlist);
775 if (rootcount <= 0) {
776 return NULL;
779 root = dns_tree_init(mem_ctx, nlist[rootcount-1], NULL);
780 if (root == NULL) {
781 return NULL;
784 tree = root;
785 for (i=rootcount-2; i>=0; i--) {
786 tree = dns_tree_add(tree, nlist[i], NULL);
787 if (tree == NULL) {
788 goto failed;
792 base = tree;
794 /* Add all names in the result in a tree */
795 for (i=0; i<res->count; i++) {
796 ptr = ldb_msg_find_attr_as_string(res->msgs[i], "name", NULL);
798 if (strcmp(ptr, "@") == 0) {
799 base->data = res->msgs[i];
800 continue;
801 } else if (strcasecmp(ptr, name) == 0) {
802 base->data = res->msgs[i];
803 continue;
806 ncount = dns_split_name_components(root, ptr, &nlist);
807 if (ncount < 0) {
808 goto failed;
811 /* Find matching node */
812 tree = dns_tree_find(root, ncount, nlist, &match_count);
813 if (tree == NULL) {
814 goto failed;
817 /* If the node is on leaf, then add record data */
818 if (match_count+1 == ncount) {
819 tree->data = res->msgs[i];
822 /* Add missing name components */
823 for (level=match_count+1; level<ncount; level++) {
824 if (tree->level == rootcount+1) {
825 break;
827 if (level == ncount-1) {
828 node = dns_tree_add(tree, nlist[(ncount-1)-level], res->msgs[i]);
829 } else {
830 node = dns_tree_add(tree, nlist[(ncount-1)-level], NULL);
832 if (node == NULL) {
833 goto failed;
835 tree = node;
838 talloc_free(nlist);
841 /* Mark the base record, so it can be found easily */
842 base->level = -1;
844 return root;
846 failed:
847 talloc_free(root);
848 return NULL;
852 static void _dns_add_name(TALLOC_CTX *mem_ctx, const char *name, char ***add_names, int *add_count)
854 int i;
855 char **ptr = *add_names;
856 int count = *add_count;
858 for (i=0; i<count; i++) {
859 if (strcasecmp(ptr[i], name) == 0) {
860 return;
864 ptr = talloc_realloc(mem_ctx, ptr, char *, count+1);
865 if (ptr == NULL) {
866 return;
869 ptr[count] = talloc_strdup(mem_ctx, name);
870 if (ptr[count] == NULL) {
871 return;
874 *add_names = ptr;
875 *add_count = count+1;
879 static void dns_find_additional_names(TALLOC_CTX *mem_ctx, struct dnsp_DnssrvRpcRecord *rec, char ***add_names, int *add_count)
881 if (add_names == NULL) {
882 return;
885 switch (rec->wType) {
887 case DNS_TYPE_NS:
888 _dns_add_name(mem_ctx, rec->data.ns, add_names, add_count);
889 break;
891 case DNS_TYPE_CNAME:
892 _dns_add_name(mem_ctx, rec->data.cname, add_names, add_count);
893 break;
895 case DNS_TYPE_SOA:
896 _dns_add_name(mem_ctx, rec->data.soa.mname, add_names, add_count);
897 break;
899 case DNS_TYPE_MX:
900 _dns_add_name(mem_ctx, rec->data.mx.nameTarget, add_names, add_count);
901 break;
903 case DNS_TYPE_SRV:
904 _dns_add_name(mem_ctx, rec->data.srv.nameTarget, add_names, add_count);
905 break;
907 default:
908 break;
913 WERROR dns_fill_records_array(TALLOC_CTX *mem_ctx,
914 struct dnsserver_zone *z,
915 enum dns_record_type record_type,
916 unsigned int select_flag,
917 const char *branch_name,
918 struct ldb_message *msg,
919 int num_children,
920 struct DNS_RPC_RECORDS_ARRAY *recs,
921 char ***add_names,
922 int *add_count)
924 struct ldb_message_element *el;
925 const char *ptr;
926 int i, j;
927 bool found;
929 if (recs->count == 0) {
930 recs->rec = talloc_zero(recs, struct DNS_RPC_RECORDS);
931 } else {
932 recs->rec = talloc_realloc(recs, recs->rec, struct DNS_RPC_RECORDS, recs->count+1);
934 if (recs->rec == NULL) {
935 return WERR_NOT_ENOUGH_MEMORY;
937 i = recs->count;
938 recs->rec[i].wLength = 0;
939 recs->rec[i].wRecordCount = 0;
940 recs->rec[i].dwChildCount = num_children;
941 recs->rec[i].dwFlags = 0;
943 /* The base records returned with empty name */
944 /* Children records returned with names */
945 if (branch_name == NULL) {
946 recs->rec[i].dnsNodeName.str = talloc_strdup(recs, "");
947 recs->rec[i].dnsNodeName.len = 0;
948 } else {
949 recs->rec[i].dnsNodeName.str = talloc_strdup(recs, branch_name);
950 recs->rec[i].dnsNodeName.len = strlen(branch_name);
952 recs->rec[i].records = talloc_zero_array(recs, struct DNS_RPC_RECORD, 0);
953 recs->count++;
955 /* Allow empty records */
956 if (msg == NULL) {
957 return WERR_OK;
960 /* Do not return RR records, if the node has children */
961 if (branch_name != NULL && num_children > 0) {
962 return WERR_OK;
965 ptr = ldb_msg_find_attr_as_string(msg, "name", NULL);
966 el = ldb_msg_find_element(msg, "dnsRecord");
967 if (el == NULL || el->values == 0) {
968 return WERR_OK;
971 /* Add RR records */
972 for (j=0; j<el->num_values; j++) {
973 struct dnsp_DnssrvRpcRecord dnsp_rec;
974 struct DNS_RPC_RECORD *dns_rec;
975 enum ndr_err_code ndr_err;
977 ndr_err = ndr_pull_struct_blob(&el->values[j], mem_ctx, &dnsp_rec,
978 (ndr_pull_flags_fn_t)ndr_pull_dnsp_DnssrvRpcRecord);
979 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
980 DEBUG(0, ("dnsserver: Unable to parse dns record (%s)", ldb_dn_get_linearized(msg->dn)));
981 return WERR_INTERNAL_DB_ERROR;
984 /* Match the records based on search criteria */
985 if (record_type == DNS_TYPE_ALL || dnsp_rec.wType == record_type) {
986 found = false;
988 if (select_flag & DNS_RPC_VIEW_AUTHORITY_DATA) {
989 if (dnsp_rec.rank == DNS_RANK_ZONE) {
990 found = true;
991 } else if (dnsp_rec.rank == DNS_RANK_NS_GLUE) {
993 * If branch_name is NULL, we're
994 * explicitly asked to also return
995 * DNS_RANK_NS_GLUE records
997 if (branch_name == NULL) {
998 found = true;
1002 if (select_flag & DNS_RPC_VIEW_CACHE_DATA) {
1003 if (dnsp_rec.rank == DNS_RANK_ZONE) {
1004 found = true;
1007 if (select_flag & DNS_RPC_VIEW_GLUE_DATA) {
1008 if (dnsp_rec.rank == DNS_RANK_GLUE) {
1009 found = true;
1012 if (select_flag & DNS_RPC_VIEW_ROOT_HINT_DATA) {
1013 if (dnsp_rec.rank == DNS_RANK_ROOT_HINT) {
1014 found = true;
1018 if (found) {
1019 recs->rec[i].records = talloc_realloc(recs,
1020 recs->rec[i].records,
1021 struct DNS_RPC_RECORD,
1022 recs->rec[i].wRecordCount+1);
1023 if (recs->rec[i].records == NULL) {
1024 return WERR_NOT_ENOUGH_MEMORY;
1027 dns_rec = &recs->rec[i].records[recs->rec[i].wRecordCount];
1028 dnsp_to_dns_copy(recs, &dnsp_rec, dns_rec);
1030 /* Fix record flags */
1031 if (strcmp(ptr, "@") == 0) {
1032 dns_rec->dwFlags |= DNS_RPC_FLAG_ZONE_ROOT;
1034 if (dnsp_rec.rank == DNS_RANK_ZONE) {
1035 dns_rec->dwFlags |= DNS_RPC_FLAG_AUTH_ZONE_ROOT;
1039 if (dns_rec->dwFlags == DNS_RANK_NS_GLUE) {
1040 dns_rec->dwFlags |= DNS_RPC_FLAG_ZONE_ROOT;
1043 recs->rec[i].wRecordCount++;
1045 dns_find_additional_names(mem_ctx, &dnsp_rec, add_names, add_count);
1050 return WERR_OK;
1054 int dns_name_compare(const struct ldb_message **m1, const struct ldb_message **m2,
1055 char *search_name)
1057 const char *name1, *name2;
1058 const char *ptr1, *ptr2;
1060 name1 = ldb_msg_find_attr_as_string(*m1, "name", NULL);
1061 name2 = ldb_msg_find_attr_as_string(*m2, "name", NULL);
1062 if (name1 == NULL || name2 == NULL) {
1063 return 0;
1066 /* '@' record and the search_name record gets preference */
1067 if (name1[0] == '@') {
1068 return -1;
1070 if (search_name && strcasecmp(name1, search_name) == 0) {
1071 return -1;
1074 if (name2[0] == '@') {
1075 return 1;
1077 if (search_name && strcasecmp(name2, search_name) == 0) {
1078 return 1;
1081 /* Compare the last components of names.
1082 * If search_name is not NULL, compare the second last components of names */
1083 ptr1 = strrchr(name1, '.');
1084 if (ptr1 == NULL) {
1085 ptr1 = name1;
1086 } else {
1087 if (search_name && strcasecmp(ptr1+1, search_name) == 0) {
1088 ptr1--;
1089 while (ptr1 != name1) {
1090 ptr1--;
1091 if (*ptr1 == '.') {
1092 break;
1096 if (*ptr1 == '.') {
1097 ptr1 = &ptr1[1];
1101 ptr2 = strrchr(name2, '.');
1102 if (ptr2 == NULL) {
1103 ptr2 = name2;
1104 } else {
1105 if (search_name && strcasecmp(ptr2+1, search_name) == 0) {
1106 ptr2--;
1107 while (ptr2 != name2) {
1108 ptr2--;
1109 if (*ptr2 == '.') {
1110 break;
1114 if (*ptr2 == '.') {
1115 ptr2 = &ptr2[1];
1119 return strcasecmp(ptr1, ptr2);
1123 bool dns_name_equal(const char *name1, const char *name2)
1125 size_t len1 = strlen(name1);
1126 size_t len2 = strlen(name2);
1128 if (len1 > 0 && name1[len1-1] == '.') len1--;
1129 if (len2 > 0 && name2[len2-1] == '.') len2--;
1130 if (len1 != len2) {
1131 return false;
1133 return strncasecmp(name1, name2, len1) == 0;
1137 bool dns_record_match(struct dnsp_DnssrvRpcRecord *rec1, struct dnsp_DnssrvRpcRecord *rec2)
1139 bool status;
1140 int i;
1142 if (rec1->wType != rec2->wType) {
1143 return false;
1146 switch(rec1->wType) {
1147 case DNS_TYPE_TOMBSTONE:
1148 return true;
1150 case DNS_TYPE_A:
1151 return strcmp(rec1->data.ipv4, rec2->data.ipv4) == 0;
1153 case DNS_TYPE_NS:
1154 return dns_name_equal(rec1->data.ns, rec2->data.ns);
1156 case DNS_TYPE_CNAME:
1157 return dns_name_equal(rec1->data.cname, rec2->data.cname);
1159 case DNS_TYPE_SOA:
1160 return dns_name_equal(rec1->data.soa.mname, rec2->data.soa.mname) &&
1161 dns_name_equal(rec1->data.soa.rname, rec2->data.soa.rname) &&
1162 rec1->data.soa.serial == rec2->data.soa.serial &&
1163 rec1->data.soa.refresh == rec2->data.soa.refresh &&
1164 rec1->data.soa.retry == rec2->data.soa.retry &&
1165 rec1->data.soa.expire == rec2->data.soa.expire &&
1166 rec1->data.soa.minimum == rec2->data.soa.minimum;
1168 case DNS_TYPE_PTR:
1169 return dns_name_equal(rec1->data.ptr, rec2->data.ptr);
1171 case DNS_TYPE_MX:
1172 return rec1->data.mx.wPriority == rec2->data.mx.wPriority &&
1173 dns_name_equal(rec1->data.mx.nameTarget, rec2->data.mx.nameTarget);
1175 case DNS_TYPE_TXT:
1176 if (rec1->data.txt.count != rec2->data.txt.count) {
1177 return false;
1179 status = true;
1180 for (i=0; i<rec1->data.txt.count; i++) {
1181 status = status && (strcmp(rec1->data.txt.str[i],
1182 rec2->data.txt.str[i]) == 0);
1184 return status;
1186 case DNS_TYPE_AAAA:
1187 return strcmp(rec1->data.ipv6, rec2->data.ipv6) == 0;
1189 case DNS_TYPE_SRV:
1190 return rec1->data.srv.wPriority == rec2->data.srv.wPriority &&
1191 rec1->data.srv.wWeight == rec2->data.srv.wWeight &&
1192 rec1->data.srv.wPort == rec2->data.srv.wPort &&
1193 dns_name_equal(rec1->data.srv.nameTarget, rec2->data.srv.nameTarget);
1195 default:
1196 DEBUG(0, ("dnsserver: unhandled record type %u", rec1->wType));
1197 break;
1200 return false;