| 
									
										
										
										
											2016-03-28 12:08:05 +01:00
										 |  |  | package file
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import (
 | 
					
						
							| 
									
										
										
										
											2018-04-22 08:34:35 +01:00
										 |  |  | 	"context"
 | 
					
						
							| 
									
										
										
										
											2016-03-28 12:08:05 +01:00
										 |  |  | 	"fmt"
 | 
					
						
							| 
									
										
										
										
											2019-07-03 07:01:57 +01:00
										 |  |  | 	"sync"
 | 
					
						
							| 
									
										
										
										
											2016-03-28 12:08:05 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-09-14 09:36:06 +01:00
										 |  |  | 	"github.com/coredns/coredns/plugin"
 | 
					
						
							| 
									
										
										
										
											2017-02-21 22:51:47 -08:00
										 |  |  | 	"github.com/coredns/coredns/request"
 | 
					
						
							| 
									
										
										
										
											2016-03-28 12:08:05 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	"github.com/miekg/dns"
 | 
					
						
							|  |  |  | )
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-09-23 09:14:12 +01:00
										 |  |  | // Xfr serves up an AXFR.
 | 
					
						
							|  |  |  | type Xfr struct {
 | 
					
						
							|  |  |  | 	*Zone
 | 
					
						
							|  |  |  | }
 | 
					
						
							| 
									
										
										
										
											2016-03-28 12:08:05 +01:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-09-14 09:36:06 +01:00
										 |  |  | // ServeDNS implements the plugin.Handler interface.
 | 
					
						
							| 
									
										
										
										
											2016-03-28 12:08:05 +01:00
										 |  |  | func (x Xfr) ServeDNS(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (int, error) {
 | 
					
						
							| 
									
										
										
										
											2016-09-07 11:10:16 +01:00
										 |  |  | 	state := request.Request{W: w, Req: r}
 | 
					
						
							| 
									
										
										
										
											2016-03-28 12:08:05 +01:00
										 |  |  | 	if !x.TransferAllowed(state) {
 | 
					
						
							|  |  |  | 		return dns.RcodeServerFailure, nil
 | 
					
						
							|  |  |  | 	}
 | 
					
						
							| 
									
										
										
										
											2016-04-09 16:39:50 +01:00
										 |  |  | 	if state.QType() != dns.TypeAXFR && state.QType() != dns.TypeIXFR {
 | 
					
						
							| 
									
										
										
										
											2017-09-14 09:36:06 +01:00
										 |  |  | 		return 0, plugin.Error(x.Name(), fmt.Errorf("xfr called with non transfer type: %d", state.QType()))
 | 
					
						
							| 
									
										
										
										
											2016-03-28 12:08:05 +01:00
										 |  |  | 	}
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-08-26 08:14:43 +00:00
										 |  |  | 	// For IXFR we take the SOA in the IXFR message (if there), compare it what we have and then decide to do an
 | 
					
						
							|  |  |  | 	// AXFR or just reply with one SOA message back.
 | 
					
						
							|  |  |  | 	if state.QType() == dns.TypeIXFR {
 | 
					
						
							|  |  |  | 		code, _ := x.ServeIxfr(ctx, w, r)
 | 
					
						
							|  |  |  | 		if plugin.ClientWrite(code) {
 | 
					
						
							|  |  |  | 			return code, nil
 | 
					
						
							|  |  |  | 		}
 | 
					
						
							|  |  |  | 	}
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-03-28 12:08:05 +01:00
										 |  |  | 	records := x.All()
 | 
					
						
							|  |  |  | 	if len(records) == 0 {
 | 
					
						
							|  |  |  | 		return dns.RcodeServerFailure, nil
 | 
					
						
							|  |  |  | 	}
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ch := make(chan *dns.Envelope)
 | 
					
						
							|  |  |  | 	tr := new(dns.Transfer)
 | 
					
						
							| 
									
										
										
										
											2019-07-03 07:01:57 +01:00
										 |  |  | 	wg := new(sync.WaitGroup)
 | 
					
						
							|  |  |  | 	go func() {
 | 
					
						
							|  |  |  | 		wg.Add(1)
 | 
					
						
							|  |  |  | 		tr.Out(w, r, ch)
 | 
					
						
							|  |  |  | 		wg.Done()
 | 
					
						
							|  |  |  | 	}()
 | 
					
						
							| 
									
										
										
										
											2016-03-28 12:08:05 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	j, l := 0, 0
 | 
					
						
							| 
									
										
										
										
											2016-04-03 09:02:34 +01:00
										 |  |  | 	records = append(records, records[0]) // add closing SOA to the end
 | 
					
						
							| 
									
										
										
										
											2019-07-24 22:09:07 +04:30
										 |  |  | 	log.Infof("Outgoing transfer of %d records of zone %s to %s started with %d SOA serial", len(records), x.origin, state.IP(), x.SOASerialIfDefined())
 | 
					
						
							| 
									
										
										
										
											2016-03-28 12:08:05 +01:00
										 |  |  | 	for i, r := range records {
 | 
					
						
							|  |  |  | 		l += dns.Len(r)
 | 
					
						
							|  |  |  | 		if l > transferLength {
 | 
					
						
							|  |  |  | 			ch <- &dns.Envelope{RR: records[j:i]}
 | 
					
						
							|  |  |  | 			l = 0
 | 
					
						
							|  |  |  | 			j = i
 | 
					
						
							|  |  |  | 		}
 | 
					
						
							|  |  |  | 	}
 | 
					
						
							|  |  |  | 	if j < len(records) {
 | 
					
						
							|  |  |  | 		ch <- &dns.Envelope{RR: records[j:]}
 | 
					
						
							|  |  |  | 	}
 | 
					
						
							| 
									
										
										
										
											2019-07-03 07:01:57 +01:00
										 |  |  | 	close(ch) // Even though we close the channel here, we still have
 | 
					
						
							|  |  |  | 	wg.Wait() // to wait before we can return and close the connection.
 | 
					
						
							| 
									
										
										
										
											2016-03-28 12:08:05 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	return dns.RcodeSuccess, nil
 | 
					
						
							|  |  |  | }
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-08-14 17:55:55 +02:00
										 |  |  | // Name implements the plugin.Handler interface.
 | 
					
						
							| 
									
										
										
										
											2017-06-21 23:46:20 -07:00
										 |  |  | func (x Xfr) Name() string { return "xfr" }
 | 
					
						
							| 
									
										
										
										
											2016-12-20 18:58:05 +00:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-08-26 08:14:43 +00:00
										 |  |  | // ServeIxfr checks if we need to serve a simpler IXFR for the incoming message.
 | 
					
						
							|  |  |  | // See RFC 1995 Section 3: "... and the authority section containing the SOA record of client's version of the zone."
 | 
					
						
							|  |  |  | // and Section 2, paragraph 4 where we only need to echo the SOA record back.
 | 
					
						
							|  |  |  | // This function must be called when the qtype is IXFR. It returns a plugin.ClientWrite(code) == false, when it didn't
 | 
					
						
							|  |  |  | // write anything and we should perform an AXFR.
 | 
					
						
							|  |  |  | func (x Xfr) ServeIxfr(ctx context.Context, w dns.ResponseWriter, r *dns.Msg) (int, error) {
 | 
					
						
							|  |  |  | 	if len(r.Ns) != 1 {
 | 
					
						
							|  |  |  | 		return dns.RcodeServerFailure, nil
 | 
					
						
							|  |  |  | 	}
 | 
					
						
							|  |  |  | 	soa, ok := r.Ns[0].(*dns.SOA)
 | 
					
						
							|  |  |  | 	if !ok {
 | 
					
						
							|  |  |  | 		return dns.RcodeServerFailure, nil
 | 
					
						
							|  |  |  | 	}
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	x.RLock()
 | 
					
						
							|  |  |  | 	if x.Apex.SOA == nil {
 | 
					
						
							|  |  |  | 		x.RUnlock()
 | 
					
						
							|  |  |  | 		return dns.RcodeServerFailure, nil
 | 
					
						
							|  |  |  | 	}
 | 
					
						
							|  |  |  | 	serial := x.Apex.SOA.Serial
 | 
					
						
							|  |  |  | 	x.RUnlock()
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	if soa.Serial == serial { // Section 2, para 4; echo SOA back. We have the same zone
 | 
					
						
							|  |  |  | 		m := new(dns.Msg)
 | 
					
						
							|  |  |  | 		m.SetReply(r)
 | 
					
						
							|  |  |  | 		m.Answer = []dns.RR{soa}
 | 
					
						
							|  |  |  | 		w.WriteMsg(m)
 | 
					
						
							|  |  |  | 		return 0, nil
 | 
					
						
							|  |  |  | 	}
 | 
					
						
							|  |  |  | 	return dns.RcodeServerFailure, nil
 | 
					
						
							|  |  |  | }
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-04-05 15:54:06 +01:00
										 |  |  | const transferLength = 1000 // Start a new envelop after message reaches this size in bytes. Intentionally small to test multi envelope parsing.
 |