mirror of
https://github.com/isc-projects/bind9.git
synced 2026-03-18 08:32:17 -04:00
3811 lines
79 KiB
Text
3811 lines
79 KiB
Text
%{
|
|
#if !defined(lint) && !defined(SABER)
|
|
static char rcsid[] = "$Id: confparser.y,v 1.1 1999/07/20 20:19:24 brister Exp $";
|
|
#endif /* not lint */
|
|
|
|
/*
|
|
* Copyright (c) 1996-1999 by Internet Software Consortium.
|
|
*
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
* copyright notice and this permission notice appear in all copies.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS
|
|
* ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE
|
|
* CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
|
|
* DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
|
|
* PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
|
|
* ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
|
|
* SOFTWARE.
|
|
*/
|
|
|
|
|
|
#include <config.h>
|
|
|
|
#include <stdarg.h>
|
|
#include <stdio.h>
|
|
#include <ctype.h>
|
|
#include <errno.h>
|
|
#include <limits.h>
|
|
#include <string.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/types.h>
|
|
|
|
#include <syslog.h>
|
|
|
|
#include <isc/assertions.h>
|
|
#include <isc/mutex.h>
|
|
#include <isc/lex.h>
|
|
#include <isc/symtab.h>
|
|
#include <isc/error.h>
|
|
#include <isc/once.h>
|
|
|
|
|
|
#include <dns/confparser.h>
|
|
#include <dns/confctx.h>
|
|
|
|
#include <dns/result.h>
|
|
#include <dns/rdatatype.h>
|
|
#include <dns/rdataclass.h>
|
|
|
|
#include <dns/types.h>
|
|
|
|
#include <dns/confcommon.h>
|
|
|
|
|
|
/* Type keys for symtab lookup */
|
|
#define KEYWORD_SYM_TYPE 0x1
|
|
#define CLASS_SYM_TYPE 0x2
|
|
#define ACL_SYM_TYPE 0x3
|
|
|
|
|
|
static isc_mutex_t yacc_mutex;
|
|
|
|
/* All these statics are protected by the above yacc_mutex */
|
|
static dns_c_ctx_t *currcfg;
|
|
static isc_mem_t *memctx; /* used for internal allocations */
|
|
static isc_lex_t *mylexer;
|
|
static isc_symtab_t *keywords;
|
|
static dns_c_cbks_t *callbacks;
|
|
static isc_lexspecials_t specials;
|
|
|
|
#define CONF_MAX_IDENT 1024
|
|
|
|
/* This should be sufficient to permit multiple parsers and lexers if needed */
|
|
#define yyparse confyyparse
|
|
#define yylex confyylex
|
|
|
|
#define YYDEBUG 1
|
|
|
|
static isc_result_t tmpres;
|
|
static int debug_lexer;
|
|
|
|
|
|
%}
|
|
|
|
%union {
|
|
char *text;
|
|
int number;
|
|
isc_int32_t l_int;
|
|
isc_uint32_t ul_int;
|
|
isc_uint16_t port_int;
|
|
dns_c_zonetype_t ztype;
|
|
struct in_addr ip4_addr;
|
|
struct in6_addr ip6_addr;
|
|
dns_c_addr_t ipaddress;
|
|
|
|
isc_boolean_t boolean;
|
|
dns_rdataclass_t rrclass;
|
|
dns_c_severity_t severity;
|
|
dns_c_trans_t transport;
|
|
dns_transfer_format_t tformat;
|
|
dns_c_category_t logcat;
|
|
|
|
dns_c_ipmatch_element_t *ime;
|
|
dns_c_ipmatch_list_t *iml;
|
|
|
|
dns_c_forw_t forward;
|
|
dns_c_rrso_t *rrorder;
|
|
dns_c_rrso_list_t *rrolist;
|
|
dns_rdatatype_t ordertype;
|
|
dns_rdataclass_t orderclass;
|
|
dns_c_ordering_t ordering;
|
|
dns_c_iplist_t *iplist;
|
|
}
|
|
|
|
/* Misc */
|
|
%token <text> L_STRING
|
|
%token <text> L_QSTRING
|
|
%token <l_int> L_INTEGER
|
|
%token <ip4_addr> L_IP4ADDR
|
|
%token <ip6_addr> L_IP6ADDR
|
|
|
|
%token L_LBRACE
|
|
%token L_RBRACE
|
|
%token L_EOS
|
|
%token L_SLASH
|
|
%token L_BANG
|
|
%token L_QUOTE
|
|
|
|
%token L_MASTER
|
|
%token L_SLAVE
|
|
%token L_SORTLIST
|
|
%token L_HINT
|
|
%token L_STUB
|
|
%token L_FORWARD
|
|
|
|
%token L_INCLUDE
|
|
%token L_END_INCLUDE
|
|
|
|
%token L_OPTIONS
|
|
%token L_DIRECTORY
|
|
%token L_DIRECTORY
|
|
%token L_PIDFILE
|
|
%token L_NAMED_XFER
|
|
%token L_DUMP_FILE
|
|
%token L_STATS_FILE
|
|
%token L_MEMSTATS_FILE
|
|
%token L_FAKE_IQUERY
|
|
%token L_RECURSION
|
|
%token L_FETCH_GLUE
|
|
%token L_QUERY_SOURCE
|
|
%token L_LISTEN_ON
|
|
%token L_PORT
|
|
%token L_ACL
|
|
%token L_ADDRESS
|
|
%token L_ALGID
|
|
%token L_ALLOW_QUERY
|
|
%token L_ALLOW_TRANSFER
|
|
%token L_ALLOW_UPDATE
|
|
%token L_ALSO_NOTIFY
|
|
%token L_BLACKHOLE
|
|
%token L_BOGUS
|
|
%token L_CATEGORY
|
|
%token L_CHANNEL
|
|
%token L_CHECK_NAMES
|
|
%token L_DEBUG
|
|
%token L_DIALUP
|
|
%token L_DYNAMIC
|
|
%token L_FAIL
|
|
%token L_FIRST
|
|
%token L_FORWARDERS
|
|
%token L_IF_NO_ANSWER
|
|
%token L_IF_NO_DOMAIN
|
|
%token L_IGNORE
|
|
%token L_FILE_IXFR
|
|
%token L_IXFR_TMP
|
|
%token L_SEC_KEY
|
|
%token L_KEYS
|
|
%token L_LOGGING
|
|
%token L_MASTERS
|
|
%token L_NULL_OUTPUT
|
|
%token L_ONLY
|
|
%token L_PRINT_CATEGORY
|
|
%token L_PRINT_SEVERITY
|
|
%token L_PRINT_TIME
|
|
%token L_PUBKEY
|
|
%token L_RESPONSE
|
|
%token L_SECRET
|
|
%token L_SERVER
|
|
%token L_SEVERITY
|
|
%token L_SIZE
|
|
%token L_SUPPORT_IXFR
|
|
%token L_SYSLOG
|
|
%token L_TOPOLOGY
|
|
%token L_TRANSFER_SOURCE
|
|
%token L_TRANSFERS
|
|
%token L_TRUSTED_KEYS
|
|
%token L_VERSIONS
|
|
%token L_WARN
|
|
%token L_RRSET_ORDER
|
|
%token L_ORDER
|
|
%token L_NAME
|
|
%token L_CLASS
|
|
%token L_CONTROLS
|
|
%token L_INET
|
|
%token L_UNIX
|
|
%token L_PERM
|
|
%token L_OWNER
|
|
%token L_GROUP
|
|
%token L_ALLOW
|
|
%token L_DATASIZE
|
|
%token L_STACKSIZE
|
|
%token L_CORESIZE
|
|
%token L_DEFAULT
|
|
%token L_UNLIMITED
|
|
%token L_FILES
|
|
%token L_VERSION
|
|
%token L_HOSTSTATS
|
|
%token L_DEALLOC_ON_EXIT
|
|
%token L_TRANSFERS_IN
|
|
%token L_TRANSFERS_OUT
|
|
%token L_TRANSFERS_PER_NS
|
|
%token L_TRANSFER_FORMAT
|
|
%token L_MAX_TRANSFER_TIME_IN
|
|
%token L_ONE_ANSWER
|
|
%token L_MANY_ANSWERS
|
|
%token L_NOTIFY
|
|
%token L_AUTH_NXDOMAIN
|
|
%token L_MULTIPLE_CNAMES
|
|
%token L_USE_IXFR
|
|
%token L_MAINTAIN_IXFR_BASE
|
|
%token L_CLEAN_INTERVAL
|
|
%token L_INTERFACE_INTERVAL
|
|
%token L_STATS_INTERVAL
|
|
%token L_MAX_LOG_SIZE_IXFR
|
|
%token L_HEARTBEAT
|
|
%token L_USE_ID_POOL
|
|
%token L_MAX_NCACHE_TTL
|
|
%token L_HAS_OLD_CLIENTS
|
|
%token L_EXPERT_MODE
|
|
%token L_ZONE
|
|
%token L_TYPE
|
|
%token L_FILE
|
|
%token L_YES
|
|
%token L_TRUE
|
|
%token L_NO
|
|
%token L_FALSE
|
|
|
|
|
|
%type <boolean> yea_or_nay
|
|
|
|
%type <forward> forward_opt
|
|
%type <forward> zone_forward_opt
|
|
|
|
%type <ime> address_match_element
|
|
%type <ime> address_match_simple
|
|
%type <ime> address_name
|
|
|
|
%type <iml> address_match_list
|
|
|
|
%type <ipaddress> in_addr_elem
|
|
%type <ipaddress> ip4_address
|
|
%type <ipaddress> ip6_address
|
|
%type <ipaddress> ip_address
|
|
%type <ipaddress> maybe_wild_addr
|
|
|
|
%type <iplist> in_addr_list
|
|
%type <iplist> master_in_addr_list
|
|
%type <iplist> master_in_addr_list
|
|
%type <iplist> master_in_addr_list
|
|
%type <iplist> notify_in_addr_list
|
|
%type <iplist> opt_in_addr_list
|
|
%type <iplist> opt_zone_forwarders_list
|
|
|
|
%type <logcat> category_name
|
|
|
|
%type <number> facility_name
|
|
%type <number> maybe_syslog_facility
|
|
|
|
%type <orderclass> ordering_class
|
|
|
|
%type <ordertype> ordering_type
|
|
|
|
%type <port_int> in_port
|
|
%type <port_int> maybe_port
|
|
%type <port_int> maybe_wild_port
|
|
%type <port_int> maybe_zero_port
|
|
|
|
%type <rrclass> class_name
|
|
%type <rrclass> optional_class
|
|
|
|
%type <severity> check_names_opt;
|
|
|
|
%type <text> algorithm_id
|
|
%type <text> any_string
|
|
%type <text> channel_name
|
|
%type <text> domain_name
|
|
%type <text> key_ref
|
|
%type <text> ordering_name
|
|
%type <text> secret
|
|
|
|
%type <tformat> transfer_format
|
|
|
|
%type <transport> check_names_type;
|
|
|
|
%type <ul_int> size_spec
|
|
|
|
%type <ztype> zone_type
|
|
|
|
/* Miscellaneous items (used in several places): */
|
|
|
|
%%
|
|
|
|
config_file: statement_list
|
|
;
|
|
|
|
statement_list: statement
|
|
| statement_list statement
|
|
;
|
|
|
|
statement: include_stmt
|
|
| options_stmt
|
|
| controls_stmt
|
|
| logging_stmt
|
|
| server_stmt
|
|
| zone_stmt
|
|
| trusted_keys_stmt
|
|
| acl_stmt
|
|
| key_stmt
|
|
| L_END_INCLUDE
|
|
;
|
|
|
|
|
|
include_stmt: L_INCLUDE L_QSTRING L_EOS
|
|
{
|
|
if (isc_lex_openfile(mylexer, $2) != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE ,"Can't open file %s\n",
|
|
$2);
|
|
YYABORT;
|
|
}
|
|
|
|
isc_mem_free(memctx, $2);
|
|
}
|
|
;
|
|
|
|
options_stmt: L_OPTIONS
|
|
{
|
|
dns_c_options_t *options;
|
|
|
|
tmpres = dns_c_ctx_get_options(currcfg, &options);
|
|
if (tmpres == ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "Cannot redefine options");
|
|
|
|
/*
|
|
* Clean out options so rest of config won't fail
|
|
* or issue extra error messages
|
|
*/
|
|
dns_c_ctx_options_delete(&currcfg->options);
|
|
}
|
|
|
|
tmpres = dns_c_ctx_options_new(currcfg->mem,
|
|
&currcfg->options);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to create options structure: %s",
|
|
isc_result_totext(tmpres));
|
|
YYABORT;
|
|
}
|
|
|
|
} L_LBRACE options L_RBRACE L_EOS {
|
|
if (callbacks != NULL && callbacks->optscbk != NULL) {
|
|
tmpres = callbacks->optscbk(currcfg,
|
|
callbacks->optscbkuap);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
YYABORT;
|
|
}
|
|
}
|
|
}
|
|
;
|
|
|
|
options: option L_EOS
|
|
| options option L_EOS
|
|
;
|
|
|
|
|
|
option: /* Empty */
|
|
| L_VERSION L_QSTRING
|
|
{
|
|
tmpres = dns_c_ctx_set_version(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining version.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"set version error %s: %s",
|
|
isc_result_totext(tmpres), $2);
|
|
YYABORT;
|
|
}
|
|
|
|
isc_mem_free(memctx, $2);
|
|
}
|
|
| L_DIRECTORY L_QSTRING
|
|
{
|
|
tmpres = dns_c_ctx_set_directory(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining directory");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"error setting directory: %s: %s",
|
|
isc_result_totext(tmpres), $2);
|
|
YYABORT;
|
|
}
|
|
|
|
isc_mem_free(memctx, $2);
|
|
}
|
|
| L_NAMED_XFER L_QSTRING
|
|
{
|
|
tmpres = dns_c_ctx_set_named_xfer(currcfg, $2);
|
|
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining named-xfer");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "set named-xfer error: %s: %s",
|
|
isc_result_totext(tmpres), $2);
|
|
YYABORT;
|
|
}
|
|
|
|
isc_mem_free(memctx, $2);
|
|
}
|
|
| L_PIDFILE L_QSTRING
|
|
{
|
|
tmpres = dns_c_ctx_set_pid_filename(currcfg, $2);
|
|
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining pid-file");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "set pidfile error %s: %s",
|
|
isc_result_totext(tmpres), $2);
|
|
YYABORT;
|
|
}
|
|
|
|
isc_mem_free(memctx, $2);
|
|
}
|
|
| L_STATS_FILE L_QSTRING
|
|
{
|
|
tmpres = dns_c_ctx_set_stats_filename(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining statistics-file");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "set statsfile error %s: %s",
|
|
isc_result_totext(tmpres), $2);
|
|
YYABORT;
|
|
}
|
|
|
|
isc_mem_free(memctx, $2);
|
|
}
|
|
| L_MEMSTATS_FILE L_QSTRING
|
|
{
|
|
tmpres = dns_c_ctx_set_memstats_filename(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining memstatistics-file");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"set memstatsfile error %s: %s",
|
|
isc_result_totext(tmpres), $2);
|
|
YYABORT;
|
|
}
|
|
|
|
isc_mem_free(memctx, $2);
|
|
}
|
|
| L_DUMP_FILE L_QSTRING
|
|
{
|
|
tmpres = dns_c_ctx_set_dump_filename(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining dump-file");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "set dumpfile error %s: %s",
|
|
isc_result_totext(tmpres), $2);
|
|
YYABORT;
|
|
}
|
|
|
|
isc_mem_free(memctx, $2);
|
|
}
|
|
| L_EXPERT_MODE yea_or_nay
|
|
{
|
|
tmpres = dns_c_ctx_set_expert_mode(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining fake-iquery.");
|
|
}
|
|
}
|
|
| L_FAKE_IQUERY yea_or_nay
|
|
{
|
|
tmpres = dns_c_ctx_set_fake_iquery(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining fake-iquery.");
|
|
}
|
|
}
|
|
| L_RECURSION yea_or_nay
|
|
{
|
|
tmpres = dns_c_ctx_set_recursion(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining recursion");
|
|
}
|
|
}
|
|
| L_FETCH_GLUE yea_or_nay
|
|
{
|
|
tmpres = dns_c_ctx_set_fetch_glue(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining fetch-glue.");
|
|
}
|
|
}
|
|
| L_NOTIFY yea_or_nay
|
|
{
|
|
tmpres = dns_c_ctx_set_notify(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining notify.");
|
|
}
|
|
}
|
|
| L_HOSTSTATS yea_or_nay
|
|
{
|
|
tmpres = dns_c_ctx_set_host_statistics(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining host-statistics.");
|
|
}
|
|
}
|
|
| L_DEALLOC_ON_EXIT yea_or_nay
|
|
{
|
|
tmpres = dns_c_ctx_set_dealloc_on_exit(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining deallocate-on-exit.");
|
|
}
|
|
}
|
|
| L_USE_IXFR yea_or_nay
|
|
{
|
|
tmpres = dns_c_ctx_set_use_ixfr(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining use-ixfr.");
|
|
}
|
|
}
|
|
| L_MAINTAIN_IXFR_BASE yea_or_nay
|
|
{
|
|
tmpres = dns_c_ctx_set_maintain_ixfr_base(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining maintain-ixfr-base.");
|
|
}
|
|
}
|
|
| L_HAS_OLD_CLIENTS yea_or_nay
|
|
{
|
|
tmpres = dns_c_ctx_set_has_old_clients(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining has-old-clients.");
|
|
}
|
|
}
|
|
| L_AUTH_NXDOMAIN yea_or_nay
|
|
{
|
|
tmpres = dns_c_ctx_set_auth_nx_domain(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining auth-nxdomain.");
|
|
}
|
|
}
|
|
| L_MULTIPLE_CNAMES yea_or_nay
|
|
{
|
|
tmpres = dns_c_ctx_set_multiple_cnames(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining multiple-cnames.");
|
|
}
|
|
}
|
|
| L_CHECK_NAMES check_names_type check_names_opt
|
|
{
|
|
tmpres = dns_c_ctx_set_checknames(currcfg, $2, $3);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining check-names.");
|
|
}
|
|
}
|
|
| L_USE_ID_POOL yea_or_nay
|
|
{
|
|
tmpres = dns_c_ctx_set_use_id_pool(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining use-id-pool.");
|
|
}
|
|
}
|
|
| L_LISTEN_ON maybe_port L_LBRACE address_match_list L_RBRACE
|
|
{
|
|
if ($4 == NULL) {
|
|
parser_warning(ISC_FALSE,
|
|
"address-match-list empty. "
|
|
"listen statement ignored.");
|
|
} else {
|
|
tmpres = dns_c_ctx_add_listen_on(currcfg, $2, $4,
|
|
ISC_FALSE);
|
|
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to add listen statement");
|
|
YYABORT;
|
|
}
|
|
}
|
|
}
|
|
| L_FORWARD forward_opt
|
|
{
|
|
tmpres = dns_c_ctx_set_forward(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining forward");
|
|
}
|
|
}
|
|
| L_FORWARDERS {
|
|
dns_c_ipmatch_list_t *forwarders;
|
|
|
|
tmpres = dns_c_ctx_get_forwarders(currcfg, &forwarders);
|
|
if (tmpres != ISC_R_NOTFOUND) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining options forwarders");
|
|
dns_c_ipmatch_list_empty(forwarders);
|
|
} else {
|
|
tmpres = dns_c_ipmatch_list_new(currcfg->mem,
|
|
&forwarders);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to create "
|
|
"forwarders list");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_ctx_set_forwarders(currcfg, forwarders,
|
|
ISC_FALSE);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set forwarders list.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
} L_LBRACE opt_forwarders_list L_RBRACE
|
|
| L_QUERY_SOURCE query_source
|
|
| L_ALLOW_QUERY L_LBRACE address_match_list L_RBRACE
|
|
{
|
|
tmpres = dns_c_ctx_set_queryacl(currcfg, ISC_FALSE, $3);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining allow-query list");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set allow-query");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_ALLOW_TRANSFER L_LBRACE address_match_list L_RBRACE
|
|
{
|
|
tmpres = dns_c_ctx_set_transferacl(currcfg, ISC_FALSE, $3);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining allow-transfer list");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set allow-transfer");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_SORTLIST L_LBRACE address_match_list L_RBRACE
|
|
{
|
|
tmpres = dns_c_ctx_set_sortlist(currcfg, ISC_FALSE, $3);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining sortlist.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "Failed to set sortlist");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_BLACKHOLE L_LBRACE address_match_list L_RBRACE
|
|
{
|
|
tmpres = dns_c_ctx_set_blackhole(currcfg, ISC_FALSE, $3);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining blackhole.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "Failed to set blackhole");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_TOPOLOGY L_LBRACE address_match_list L_RBRACE
|
|
{
|
|
tmpres = dns_c_ctx_set_topology(currcfg, ISC_FALSE, $3);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining topology.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "Failed to set topology.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| size_clause
|
|
| transfer_clause
|
|
| L_TRANSFER_FORMAT transfer_format
|
|
{
|
|
tmpres = dns_c_ctx_set_transfer_format(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining transfer-format.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set transfer-format.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_MAX_TRANSFER_TIME_IN L_INTEGER
|
|
{
|
|
tmpres = dns_c_ctx_set_max_transfer_time_in(currcfg, $2 * 60);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining max-transfer-time-in.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set max-transfer-time-in.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_CLEAN_INTERVAL L_INTEGER
|
|
{
|
|
tmpres = dns_c_ctx_set_clean_interval(currcfg, $2 * 60);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining cleaning-interval.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set cleaning-interval.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_INTERFACE_INTERVAL L_INTEGER
|
|
{
|
|
tmpres = dns_c_ctx_set_interface_interval(currcfg, $2 *
|
|
60);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining interface-interval.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set interface-interval.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_STATS_INTERVAL L_INTEGER
|
|
{
|
|
tmpres = dns_c_ctx_set_stats_interval(currcfg, $2 * 60);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining statistics-interval.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set statistics-interval.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_MAX_LOG_SIZE_IXFR L_INTEGER
|
|
{
|
|
tmpres = dns_c_ctx_set_max_log_size_ixfr(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining max-ixfr-log-size.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set max-ixfr-log-size.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_MAX_NCACHE_TTL L_INTEGER
|
|
{
|
|
tmpres = dns_c_ctx_set_max_ncache_ttl(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining max-ncache-ttl.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set max-ncache-ttl.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_HEARTBEAT L_INTEGER
|
|
{
|
|
tmpres = dns_c_ctx_set_heartbeat_interval(currcfg, $2 *
|
|
60);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining heartbeat-interval.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set heartbeat-interval.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_DIALUP yea_or_nay
|
|
{
|
|
tmpres = dns_c_ctx_set_dialup(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining dialup.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "Failed to set dialup.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_RRSET_ORDER
|
|
{
|
|
dns_c_rrso_list_t *ordering;
|
|
|
|
tmpres = dns_c_ctx_get_rrsetorder_list(currcfg, &ordering);
|
|
if (tmpres != ISC_R_NOTFOUND) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining rrset-order list");
|
|
dns_c_rrso_list_clear(ordering);
|
|
} else {
|
|
tmpres = dns_c_rrso_list_new(currcfg->mem, &ordering);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to create rrset-order "
|
|
"list");
|
|
YYABORT;
|
|
}
|
|
tmpres = dns_c_ctx_set_rrsetorder_list(currcfg,
|
|
ISC_FALSE,
|
|
ordering);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set rrset-order.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
} L_LBRACE rrset_ordering_list L_RBRACE
|
|
;
|
|
|
|
|
|
/*
|
|
* Controls.
|
|
*/
|
|
controls_stmt: L_CONTROLS L_LBRACE controls L_RBRACE L_EOS
|
|
;
|
|
|
|
controls: control L_EOS
|
|
| controls control L_EOS
|
|
;
|
|
|
|
control: /* Empty */
|
|
| L_INET maybe_wild_addr L_PORT in_port
|
|
L_ALLOW L_LBRACE address_match_list L_RBRACE
|
|
{
|
|
dns_c_ctrl_t *control;
|
|
|
|
tmpres = dns_c_ctrl_inet_new(currcfg->mem, &control,
|
|
$2, $4, $7, ISC_FALSE);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to build inet control structure");
|
|
YYABORT;
|
|
}
|
|
|
|
ISC_LIST_APPEND(currcfg->controls->elements, control, next);
|
|
}
|
|
| L_UNIX L_QSTRING L_PERM L_INTEGER L_OWNER L_INTEGER L_GROUP L_INTEGER
|
|
{
|
|
dns_c_ctrl_t *control;
|
|
|
|
tmpres = dns_c_ctrl_unix_new(currcfg->mem, &control,
|
|
$2, $4, $6, $8);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to build unix control structure");
|
|
YYABORT;
|
|
}
|
|
|
|
ISC_LIST_APPEND(currcfg->controls->elements, control, next);
|
|
|
|
isc_mem_free(memctx, $2);
|
|
}
|
|
;
|
|
|
|
rrset_ordering_list: rrset_ordering_element L_EOS
|
|
| rrset_ordering_list rrset_ordering_element L_EOS
|
|
;
|
|
|
|
ordering_class: /* nothing */
|
|
{
|
|
$$ = dns_rdataclass_any;
|
|
}
|
|
| L_CLASS class_name
|
|
{
|
|
$$ = $2;
|
|
}
|
|
;
|
|
|
|
ordering_type: /* nothing */
|
|
{
|
|
$$ = dns_rdatatype_any;
|
|
}
|
|
| L_TYPE any_string
|
|
{
|
|
isc_textregion_t reg;
|
|
dns_rdatatype_t ty;
|
|
|
|
if (strcmp($2, "*") == 0) {
|
|
ty = dns_rdatatype_any;
|
|
} else {
|
|
reg.base = $2;
|
|
reg.length = strlen($2);
|
|
|
|
tmpres = dns_rdatatype_fromtext(&ty, ®);
|
|
if (tmpres != DNS_R_SUCCESS) {
|
|
parser_warning(ISC_TRUE,
|
|
"Unknown type. Assuming ``*''");
|
|
ty = dns_rdatatype_any;
|
|
}
|
|
}
|
|
|
|
isc_mem_free(memctx, $2);
|
|
$$ = ty;
|
|
}
|
|
;
|
|
|
|
|
|
ordering_name: /* nothing */
|
|
{
|
|
$$ = isc_mem_strdup(memctx, "*");
|
|
}
|
|
| L_NAME domain_name
|
|
{
|
|
$$ = $2;
|
|
}
|
|
|
|
|
|
rrset_ordering_element: ordering_class ordering_type ordering_name
|
|
L_ORDER L_STRING
|
|
{
|
|
dns_c_rrso_t *orderelem;
|
|
dns_c_ordering_t o;
|
|
|
|
tmpres = dns_c_string2ordering($5, &o);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_warning(ISC_FALSE,
|
|
"Unknown ordering type ``%s''."
|
|
" Using default", $5);
|
|
o = DNS_DEFAULT_ORDERING;
|
|
}
|
|
|
|
tmpres = dns_c_rrso_new(currcfg->mem,
|
|
&orderelem, $1, $2, $3, o);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to create rrset-order element");
|
|
YYABORT;
|
|
}
|
|
|
|
ISC_LIST_APPEND(currcfg->options->ordering->elements,
|
|
orderelem, next);
|
|
|
|
isc_mem_free(memctx, $5);
|
|
isc_mem_free(memctx, $3);
|
|
}
|
|
|
|
|
|
transfer_format: L_ONE_ANSWER
|
|
{
|
|
$$ = dns_one_answer;
|
|
}
|
|
| L_MANY_ANSWERS
|
|
{
|
|
$$ = dns_many_answers;
|
|
}
|
|
;
|
|
|
|
|
|
maybe_wild_addr: ip_address
|
|
{
|
|
$$ = $1;
|
|
}
|
|
| L_STRING
|
|
{
|
|
$$.a_family = AF_INET;
|
|
$$.u.a.s_addr = htonl(INADDR_ANY);
|
|
|
|
if (strcmp($1, "*") != 0) {
|
|
parser_error(ISC_TRUE,
|
|
"Bad ip-address. Using ``*''");
|
|
}
|
|
|
|
isc_mem_free(memctx, $1);
|
|
}
|
|
;
|
|
|
|
maybe_wild_port: in_port
|
|
{
|
|
$$ = $1;
|
|
}
|
|
| L_STRING
|
|
{
|
|
$$ = htons(0);
|
|
|
|
if (strcmp ($1, "*") != 0) {
|
|
parser_error(ISC_TRUE,
|
|
"Bad port specification. Using ``*''");
|
|
}
|
|
|
|
isc_mem_free(memctx, $1);
|
|
}
|
|
;
|
|
|
|
query_source_address: L_ADDRESS maybe_wild_addr
|
|
{
|
|
tmpres = dns_c_ctx_set_query_source_addr(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining query-source address.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set query-source address.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
;
|
|
|
|
query_source_port: L_PORT maybe_wild_port
|
|
{
|
|
tmpres = dns_c_ctx_set_query_source_port(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining query-source port.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set query-source port.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
;
|
|
|
|
query_source: query_source_address
|
|
| query_source_port
|
|
| query_source_address query_source_port
|
|
| query_source_port query_source_address
|
|
;
|
|
|
|
maybe_port: /* nothing */
|
|
{
|
|
$$ = htons(DNS_C_DEFAULTPORT);
|
|
}
|
|
| L_PORT in_port
|
|
{
|
|
$$ = $2;
|
|
}
|
|
;
|
|
|
|
maybe_zero_port : /* nothing */
|
|
{
|
|
$$ = htons(0);
|
|
}
|
|
| L_PORT in_port
|
|
{
|
|
$$ = $2;
|
|
}
|
|
;
|
|
|
|
yea_or_nay: L_YES
|
|
{
|
|
$$ = isc_boolean_true;
|
|
}
|
|
| L_TRUE
|
|
{
|
|
$$ = isc_boolean_true;
|
|
}
|
|
| L_NO
|
|
{
|
|
$$ = isc_boolean_false;
|
|
}
|
|
| L_FALSE
|
|
{
|
|
$$ = isc_boolean_false;
|
|
}
|
|
| L_INTEGER
|
|
{
|
|
if ($1 == 1) {
|
|
$$ = isc_boolean_true;
|
|
} else if ($1 == 0) {
|
|
$$ = isc_boolean_false;
|
|
} else {
|
|
parser_warning(ISC_TRUE,
|
|
"number should be 0 or 1; assuming 1");
|
|
$$ = isc_boolean_true;
|
|
}
|
|
}
|
|
;
|
|
|
|
check_names_type: L_MASTER
|
|
{
|
|
$$ = dns_trans_primary;
|
|
}
|
|
| L_SLAVE
|
|
{
|
|
$$ = dns_trans_secondary;
|
|
}
|
|
| L_RESPONSE
|
|
{
|
|
$$ = dns_trans_response;
|
|
}
|
|
;
|
|
|
|
check_names_opt: L_WARN
|
|
{
|
|
$$ = dns_c_severity_warn;
|
|
}
|
|
| L_FAIL
|
|
{
|
|
$$ = dns_c_severity_fail;
|
|
}
|
|
| L_IGNORE
|
|
{
|
|
$$ = dns_c_severity_ignore;
|
|
}
|
|
;
|
|
|
|
forward_opt: L_ONLY
|
|
{
|
|
$$ = dns_c_forw_only;
|
|
}
|
|
| L_FIRST
|
|
{
|
|
$$ = dns_c_forw_first;
|
|
}
|
|
| L_IF_NO_ANSWER
|
|
{
|
|
$$ = dns_c_forw_no_answer;
|
|
}
|
|
| L_IF_NO_DOMAIN
|
|
{
|
|
$$ = dns_c_forw_no_domain;
|
|
}
|
|
;
|
|
|
|
|
|
|
|
size_clause: L_DATASIZE size_spec
|
|
{
|
|
tmpres = dns_c_ctx_set_data_size(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining datasize.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "Failed to set datasize.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_STACKSIZE size_spec
|
|
{
|
|
tmpres = dns_c_ctx_set_stack_size(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining stacksize.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "Failed to set stacksize.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_CORESIZE size_spec
|
|
{
|
|
tmpres = dns_c_ctx_set_core_size(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining coresize.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "Failed to set coresize.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_FILES size_spec
|
|
{
|
|
tmpres = dns_c_ctx_set_files(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining files.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "Failed to set files.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
;
|
|
|
|
|
|
size_spec: any_string
|
|
{
|
|
isc_uint32_t result;
|
|
|
|
if (unit_to_uint32($1, &result)) {
|
|
$$ = result;
|
|
if ($$ == DNS_C_SIZE_SPEC_DEFAULT) {
|
|
isc_uint32_t newi = DNS_C_SIZE_SPEC_DEFAULT-1;
|
|
parser_warning(ISC_FALSE,
|
|
"value (%lu) too big. "
|
|
"Reducing to %lu",
|
|
(unsigned long)$$,
|
|
(unsigned long)newi);
|
|
$$ = newi; }
|
|
} else {
|
|
parser_warning(ISC_FALSE,
|
|
"invalid unit string '%s'. Using "
|
|
"default", $1);
|
|
$$ = DNS_C_SIZE_SPEC_DEFAULT;
|
|
}
|
|
isc_mem_free(memctx, $1);
|
|
}
|
|
| L_INTEGER
|
|
{
|
|
$$ = (isc_uint32_t)$1;
|
|
if ($$ == DNS_C_SIZE_SPEC_DEFAULT) {
|
|
isc_uint32_t newi = DNS_C_SIZE_SPEC_DEFAULT - 1;
|
|
parser_warning(ISC_FALSE,
|
|
"value (%lu) too big. Reducing to %lu",
|
|
(unsigned long) $$,
|
|
(unsigned long) newi);
|
|
$$ = newi;
|
|
}
|
|
}
|
|
| L_DEFAULT
|
|
{
|
|
$$ = DNS_C_SIZE_SPEC_DEFAULT;
|
|
}
|
|
| L_UNLIMITED
|
|
{
|
|
$$ = DNS_C_SIZE_SPEC_UNLIM;
|
|
}
|
|
;
|
|
|
|
|
|
|
|
transfer_clause: L_TRANSFERS_IN L_INTEGER
|
|
{
|
|
tmpres = dns_c_ctx_set_transfers_in(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE, "Redefining transfers-in.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "Failed to set transfers-in.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_TRANSFERS_OUT L_INTEGER
|
|
{
|
|
tmpres = dns_c_ctx_set_transfers_out(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining transfers-out.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set transfers-out.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_TRANSFERS_PER_NS L_INTEGER
|
|
{
|
|
tmpres = dns_c_ctx_set_transfers_per_ns(currcfg, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_error(ISC_FALSE,
|
|
"Redefining transfers-per-ns.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set transfers-per-ns.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
;
|
|
|
|
|
|
opt_forwarders_list: /* nothing */ {
|
|
}
|
|
| forwarders_in_addr_list
|
|
;
|
|
|
|
forwarders_in_addr_list: forwarders_in_addr L_EOS
|
|
| forwarders_in_addr_list forwarders_in_addr L_EOS
|
|
;
|
|
|
|
forwarders_in_addr: ip_address
|
|
{
|
|
dns_c_ipmatch_element_t *ime = NULL;
|
|
|
|
INSIST(currcfg->options != NULL);
|
|
INSIST(currcfg->options->forwarders != NULL);
|
|
|
|
tmpres = dns_c_ipmatch_pattern_new(currcfg->mem, &ime,
|
|
$1, 0);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to create forwarders "
|
|
"address element.");
|
|
YYABORT;
|
|
}
|
|
|
|
ISC_LIST_APPEND(currcfg->options->forwarders->elements,
|
|
ime, next);
|
|
}
|
|
;
|
|
|
|
|
|
/*
|
|
* Logging
|
|
*/
|
|
|
|
logging_stmt: L_LOGGING
|
|
{
|
|
/* initialized in logging_init() */
|
|
INSIST(currcfg->logging != NULL);
|
|
}
|
|
L_LBRACE logging_opts_list L_RBRACE L_EOS
|
|
;
|
|
|
|
logging_opts_list: logging_opt L_EOS
|
|
| logging_opts_list logging_opt L_EOS
|
|
;
|
|
|
|
logging_opt: category_stmt
|
|
| channel_stmt
|
|
;
|
|
|
|
|
|
channel_stmt:
|
|
L_CHANNEL channel_name L_LBRACE L_FILE L_QSTRING {
|
|
dns_c_logchan_t *newc;
|
|
|
|
tmpres = dns_c_ctx_add_file_channel(currcfg, $2, &newc);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE,
|
|
"Redefing channel %s\n", $2);
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to add new file channel.");
|
|
YYABORT;
|
|
}
|
|
|
|
INSIST(newc != NULL);
|
|
|
|
tmpres = dns_c_logchan_set_path(newc, $5);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to add file channel's path.");
|
|
YYABORT;
|
|
}
|
|
|
|
isc_mem_free(memctx, $2);
|
|
isc_mem_free(memctx, $5);
|
|
} maybe_file_modifiers L_EOS optional_channel_opt_list L_RBRACE
|
|
| L_CHANNEL channel_name L_LBRACE L_SYSLOG maybe_syslog_facility {
|
|
dns_c_logchan_t *newc;
|
|
|
|
tmpres = dns_c_ctx_add_syslog_channel(currcfg, $2, &newc);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE, "Redefining channel %s", $2);
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to add new syslog channel.");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_logchan_set_facility(newc, $5);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get set channel facility.");
|
|
YYABORT;
|
|
}
|
|
isc_mem_free(memctx, $2);
|
|
} L_EOS optional_channel_opt_list L_RBRACE
|
|
| L_CHANNEL channel_name L_LBRACE L_NULL_OUTPUT {
|
|
dns_c_logchan_t *newc;
|
|
|
|
tmpres = dns_c_ctx_add_null_channel(currcfg, $2, &newc);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE, "Redefining channel %s", $2);
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to add new channel ``%s''", $2);
|
|
YYABORT;
|
|
}
|
|
|
|
isc_mem_free(memctx, $2);
|
|
} L_EOS optional_channel_opt_list L_RBRACE
|
|
| L_CHANNEL channel_name L_LBRACE logging_non_type_keywords {
|
|
parser_error(ISC_FALSE,
|
|
"First statment inside a channel definition "
|
|
"must be ``file'' or ``syslog'' or ``null''.");
|
|
YYABORT;
|
|
}
|
|
;
|
|
|
|
|
|
logging_non_type_keywords: L_SEVERITY | L_PRINT_TIME | L_PRINT_CATEGORY |
|
|
L_PRINT_SEVERITY
|
|
;
|
|
|
|
|
|
optional_channel_opt_list: /* empty */
|
|
| channel_opt_list
|
|
;
|
|
|
|
category_stmt: L_CATEGORY category_name {
|
|
dns_c_logcat_t *cat;
|
|
|
|
tmpres = dns_c_ctx_add_category(currcfg, $2, &cat);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining category ``%s''", $2);
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to add new logging category.");
|
|
YYABORT;
|
|
}
|
|
} L_LBRACE channel_list L_RBRACE
|
|
;
|
|
|
|
|
|
channel_severity: any_string
|
|
{
|
|
dns_c_log_severity_t severity;
|
|
dns_c_logchan_t *chan;
|
|
|
|
tmpres = dns_c_string2logseverity($1, &severity);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Unknown severity ``%s''", $1);
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_ctx_currchannel(currcfg, &chan);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get current channel.");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_logchan_set_severity(chan, severity);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE, "Redefining severity.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get set channel severity.");
|
|
YYABORT;
|
|
}
|
|
|
|
isc_mem_free(memctx, $1);
|
|
}
|
|
| L_DEBUG
|
|
{
|
|
dns_c_logchan_t *chan;
|
|
|
|
tmpres = dns_c_ctx_currchannel(currcfg, &chan);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get current channel.");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_logchan_set_severity(chan, dns_c_log_debug);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE, "Redefining severity.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get set channel severity(debug).");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_DEBUG L_INTEGER
|
|
{
|
|
dns_c_logchan_t *chan;
|
|
|
|
tmpres = dns_c_ctx_currchannel(currcfg, &chan);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get current channel.");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_logchan_set_severity(chan, dns_c_log_debug);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE, "Redefining severity.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get set channel "
|
|
"severity (debug).");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_logchan_set_debug_level(chan, $2);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get set channel "
|
|
"severity debug level.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_DYNAMIC
|
|
{
|
|
dns_c_logchan_t *chan;
|
|
|
|
tmpres = dns_c_ctx_currchannel(currcfg, &chan);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get current channel.");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_logchan_set_severity(chan, dns_c_log_dynamic);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE, "Redefining severity.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get set channel "
|
|
"severity (dynamic).");
|
|
YYABORT;
|
|
}
|
|
}
|
|
;
|
|
|
|
version_modifier: L_VERSIONS L_INTEGER
|
|
{
|
|
dns_c_logchan_t *chan;
|
|
|
|
tmpres = dns_c_ctx_currchannel(currcfg, &chan);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get current channel.");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_logchan_set_versions(chan, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE, "Redefining versions.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get set channel versions.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_VERSIONS L_UNLIMITED
|
|
{
|
|
dns_c_logchan_t *chan;
|
|
|
|
tmpres = dns_c_ctx_currchannel(currcfg, &chan);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get current channel.");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_logchan_set_versions(chan, -1);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE, "Redefining versions.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get set channel "
|
|
"versions (unlimited).");
|
|
YYABORT;
|
|
}
|
|
}
|
|
;
|
|
|
|
size_modifier: L_SIZE size_spec
|
|
{
|
|
dns_c_logchan_t *chan;
|
|
|
|
tmpres = dns_c_ctx_currchannel(currcfg, &chan);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get current channel.");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_logchan_set_size(chan, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE, "Redefining size.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get set channel size.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
;
|
|
|
|
maybe_file_modifiers: /* nothing */
|
|
| version_modifier
|
|
| size_modifier
|
|
| version_modifier size_modifier
|
|
| size_modifier version_modifier
|
|
;
|
|
|
|
facility_name: any_string
|
|
{
|
|
tmpres = dns_c_string2facility($1, &$$);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_TRUE, "Unknown syslog facility.");
|
|
$$ = LOG_DAEMON;
|
|
}
|
|
|
|
isc_mem_free(memctx, $1);
|
|
}
|
|
| L_SYSLOG
|
|
{
|
|
$$ = LOG_SYSLOG;
|
|
}
|
|
;
|
|
|
|
maybe_syslog_facility: /* nothing */
|
|
{
|
|
$$ = LOG_DAEMON;
|
|
}
|
|
| facility_name
|
|
{
|
|
$$ = $1;
|
|
}
|
|
;
|
|
|
|
|
|
channel_opt_list: channel_opt L_EOS
|
|
| channel_opt_list channel_opt L_EOS
|
|
;
|
|
|
|
|
|
channel_opt: L_SEVERITY channel_severity { /* nothing to do */ }
|
|
| L_PRINT_TIME yea_or_nay
|
|
{
|
|
dns_c_logchan_t *chan;
|
|
|
|
tmpres = dns_c_ctx_currchannel(currcfg, &chan);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get current channel.");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_logchan_set_printtime(chan, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE, "Redefining print-time.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get set channel print-time.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_PRINT_CATEGORY yea_or_nay
|
|
{
|
|
dns_c_logchan_t *chan;
|
|
|
|
tmpres = dns_c_ctx_currchannel(currcfg, &chan);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get current channel.");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_logchan_set_printcat(chan, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining print-category.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get set channel print-category.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
| L_PRINT_SEVERITY yea_or_nay
|
|
{
|
|
dns_c_logchan_t *chan;
|
|
|
|
tmpres = dns_c_ctx_currchannel(currcfg, &chan);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get current channel.");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_logchan_set_printsev(chan, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining print-severity.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get set channel print-severity.");
|
|
YYABORT;
|
|
}
|
|
}
|
|
;
|
|
|
|
|
|
channel_name: any_string
|
|
| L_NULL_OUTPUT
|
|
{
|
|
$$ = isc_mem_strdup(memctx, "null");
|
|
}
|
|
;
|
|
|
|
|
|
channel: channel_name
|
|
{
|
|
dns_c_logcat_t *cat;
|
|
|
|
/*
|
|
* XXX validate the channel name refers to a previously
|
|
* defined channel
|
|
*/
|
|
tmpres = dns_c_ctx_currcategory(currcfg, &cat);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't get current category.");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_logcat_add_name(cat, $1);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Can't add new name to category.");
|
|
}
|
|
|
|
isc_mem_free(memctx, $1);
|
|
}
|
|
;
|
|
|
|
|
|
channel_list: channel L_EOS
|
|
| channel_list channel L_EOS
|
|
;
|
|
|
|
|
|
category_name: any_string
|
|
{
|
|
dns_c_category_t cat;
|
|
|
|
tmpres = dns_c_string2category($1, &cat);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "Unknown category ``%s''", $1);
|
|
YYABORT;
|
|
}
|
|
|
|
isc_mem_free(memctx, $1);
|
|
|
|
$$ = cat;
|
|
}
|
|
| L_DEFAULT
|
|
{
|
|
$$ = dns_c_cat_default;
|
|
}
|
|
| L_NOTIFY
|
|
{
|
|
$$ = dns_c_cat_notify;
|
|
}
|
|
;
|
|
|
|
/*
|
|
* Server Information
|
|
*/
|
|
|
|
server_stmt: L_SERVER ip_address
|
|
{
|
|
dns_c_srv_t *server;
|
|
dns_c_srv_t *tmpserver;
|
|
dns_c_srv_list_t *servers = currcfg->servers;
|
|
|
|
if (servers == NULL) {
|
|
tmpres = dns_c_srv_list_new(currcfg->mem,
|
|
&currcfg->servers);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to create server list");
|
|
YYABORT;
|
|
}
|
|
servers = currcfg->servers;
|
|
}
|
|
|
|
/*
|
|
* Check that this IP hasn't already bee used and if it has
|
|
* remove the old definition.
|
|
*/
|
|
server = ISC_LIST_HEAD(servers->elements);
|
|
while (server != NULL) {
|
|
tmpserver = ISC_LIST_NEXT(server, next);
|
|
if (memcmp(&server->address, &$2,
|
|
sizeof(dns_c_addr_t)) == 0) {
|
|
parser_error(ISC_TRUE, "Redefining server");
|
|
ISC_LIST_UNLINK(servers->elements,
|
|
server, next);
|
|
dns_c_srv_delete(&server);
|
|
break;
|
|
}
|
|
server = tmpserver;
|
|
}
|
|
|
|
tmpres = dns_c_srv_new(currcfg->mem, $2, &server);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to create server structure");
|
|
YYABORT;
|
|
}
|
|
|
|
ISC_LIST_APPEND(currcfg->servers->elements, server, next);
|
|
}
|
|
L_LBRACE server_info_list L_RBRACE L_EOS
|
|
;
|
|
|
|
server_info_list: server_info L_EOS
|
|
| server_info_list server_info L_EOS
|
|
;
|
|
|
|
server_info: L_BOGUS yea_or_nay
|
|
{
|
|
dns_c_srv_t *server;
|
|
isc_boolean_t tv;
|
|
|
|
INSIST(currcfg->servers != NULL);
|
|
server = ISC_LIST_TAIL(currcfg->servers->elements);
|
|
|
|
INSIST(server != NULL);
|
|
|
|
tmpres = dns_c_srv_get_bogus(server, &tv);
|
|
if (tmpres != ISC_R_NOTFOUND) {
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining server bogus value");
|
|
}
|
|
|
|
dns_c_srv_set_bogus(server, $2);
|
|
}
|
|
| L_SUPPORT_IXFR yea_or_nay
|
|
{
|
|
dns_c_srv_t *server;
|
|
isc_boolean_t tv;
|
|
|
|
INSIST(currcfg->servers != NULL);
|
|
server = ISC_LIST_TAIL(currcfg->servers->elements);
|
|
|
|
INSIST(server != NULL);
|
|
|
|
tmpres = dns_c_srv_get_support_ixfr(server, &tv);
|
|
if(tmpres != ISC_R_NOTFOUND) {
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining server support-ixfr value");
|
|
}
|
|
|
|
dns_c_srv_set_support_ixfr(server, $2);
|
|
}
|
|
| L_TRANSFERS L_INTEGER
|
|
{
|
|
dns_c_srv_t *server;
|
|
isc_int32_t tv;
|
|
|
|
INSIST(currcfg->servers != NULL);
|
|
server = ISC_LIST_TAIL(currcfg->servers->elements);
|
|
|
|
INSIST(server != NULL);
|
|
|
|
tmpres = dns_c_srv_get_transfers(server, &tv);
|
|
if (tmpres != ISC_R_NOTFOUND) {
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining server transfers value");
|
|
}
|
|
|
|
dns_c_srv_set_transfers(server, $2);
|
|
}
|
|
| L_TRANSFER_FORMAT transfer_format
|
|
{
|
|
dns_c_srv_t *server;
|
|
dns_transfer_format_t tv;
|
|
|
|
INSIST(currcfg->servers != NULL);
|
|
server = ISC_LIST_TAIL(currcfg->servers->elements);
|
|
|
|
INSIST(server != NULL);
|
|
|
|
tmpres = dns_c_srv_get_transfer_format(server, &tv);
|
|
if (tmpres != ISC_R_NOTFOUND) {
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining server transfer-format "
|
|
"value");
|
|
}
|
|
|
|
|
|
dns_c_srv_set_transfer_format(server, $2);
|
|
}
|
|
| L_KEYS L_LBRACE {
|
|
dns_c_srv_t *server;
|
|
|
|
INSIST(currcfg->servers != NULL);
|
|
server = ISC_LIST_TAIL(currcfg->servers->elements);
|
|
INSIST(server != NULL);
|
|
|
|
if (server->keys == NULL) {
|
|
tmpres = dns_c_kid_list_new(currcfg->mem,
|
|
&server->keys);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to create keyid_list");
|
|
YYABORT;
|
|
}
|
|
}
|
|
} key_list L_RBRACE
|
|
;
|
|
|
|
/*
|
|
* Address Matching
|
|
*/
|
|
|
|
address_match_list: address_match_element L_EOS
|
|
{
|
|
dns_c_ipmatch_list_t *ml = 0;
|
|
|
|
if ($1 != NULL) {
|
|
tmpres = dns_c_ipmatch_list_new(currcfg->mem, &ml);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "Insufficient memory");
|
|
dns_c_ipmatch_element_delete(currcfg->mem,
|
|
&$1);
|
|
YYABORT;
|
|
}
|
|
|
|
ISC_LIST_APPEND(ml->elements, $1, next);
|
|
}
|
|
|
|
$$ = ml;
|
|
}
|
|
| address_match_list address_match_element L_EOS
|
|
{
|
|
dns_c_ipmatch_list_t *ml = $1;
|
|
|
|
if (ml == NULL && $2 != NULL) {
|
|
tmpres = dns_c_ipmatch_list_new(currcfg->mem, &ml);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE, "Insufficient memory");
|
|
dns_c_ipmatch_element_delete(currcfg->mem,
|
|
&$2);
|
|
YYABORT;
|
|
}
|
|
}
|
|
|
|
if ($2 != NULL) {
|
|
ISC_LIST_APPEND(ml->elements, $2, next);
|
|
}
|
|
|
|
$$ = ml;
|
|
}
|
|
;
|
|
|
|
address_match_element: address_match_simple
|
|
| L_BANG address_match_simple
|
|
{
|
|
if ($2 != NULL) {
|
|
dns_c_ipmatch_negate($2);
|
|
}
|
|
$$ = $2;
|
|
}
|
|
| L_SEC_KEY L_STRING
|
|
{
|
|
dns_c_ipmatch_element_t *ime = NULL;
|
|
|
|
if (!dns_c_ctx_key_defined_p(currcfg, $2)) {
|
|
parser_error(ISC_FALSE,
|
|
"Address match key element (%s) "
|
|
"referenced before defined", $2);
|
|
YYABORT;
|
|
} else {
|
|
tmpres = dns_c_ipmatch_key_new(currcfg->mem, &ime, $2);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_TRUE,
|
|
"Failed to create address match "
|
|
"key element for %s", $2);
|
|
YYABORT;
|
|
}
|
|
}
|
|
|
|
isc_mem_free(memctx, $2);
|
|
$$ = ime;
|
|
}
|
|
;
|
|
|
|
address_match_simple: ip_address
|
|
{
|
|
dns_c_ipmatch_element_t *ime = NULL;
|
|
|
|
tmpres = dns_c_ipmatch_pattern_new(currcfg->mem, &ime, $1, 0);
|
|
switch (tmpres) {
|
|
case ISC_R_FAILURE:
|
|
parser_error(ISC_FALSE, "bad address match element.");
|
|
YYABORT;
|
|
break;
|
|
|
|
case ISC_R_NOMEMORY:
|
|
FATAL_ERROR(__FILE__, __LINE__,
|
|
"Insufficient memory available.\n");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
break;
|
|
}
|
|
|
|
$$ = ime;
|
|
}
|
|
| ip4_address L_SLASH L_INTEGER
|
|
{
|
|
dns_c_ipmatch_element_t *ime = NULL;
|
|
|
|
if ($3 < 0 || $3 > 32) {
|
|
parser_warning(ISC_FALSE,
|
|
"mask bits (%d) out of range: "
|
|
"skipping", (int)$3);
|
|
$$ = NULL;
|
|
} else {
|
|
tmpres = dns_c_ipmatch_pattern_new(currcfg->mem, &ime,
|
|
$1, $3);
|
|
switch (tmpres) {
|
|
case ISC_R_FAILURE:
|
|
parser_error(ISC_FALSE,
|
|
"bad address match element.");
|
|
YYABORT;
|
|
break;
|
|
|
|
case ISC_R_NOMEMORY:
|
|
FATAL_ERROR(__FILE__, __LINE__,
|
|
"Insufficient memory available.\n");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
break;
|
|
}
|
|
}
|
|
|
|
$$ = ime;
|
|
}
|
|
| L_INTEGER L_SLASH L_INTEGER
|
|
{
|
|
struct in_addr ia;
|
|
dns_c_ipmatch_element_t *ime = NULL;
|
|
dns_c_addr_t address;
|
|
|
|
if ($1 > 255) {
|
|
parser_error(ISC_FALSE,
|
|
"address out of range; skipping");
|
|
YYABORT;
|
|
} else {
|
|
if ($3 < 0 || $3 > 32) {
|
|
parser_warning(ISC_FALSE,
|
|
"mask bits out of range; skipping");
|
|
$$ = NULL;
|
|
} else {
|
|
ia.s_addr = htonl(($1 & 0xff) << 24);
|
|
|
|
address.a_family = AF_INET;
|
|
address.u.a = ia;
|
|
|
|
tmpres = dns_c_ipmatch_pattern_new(currcfg->mem,
|
|
&ime,
|
|
address,
|
|
$3);
|
|
switch (tmpres) {
|
|
case ISC_R_FAILURE:
|
|
parser_error(ISC_FALSE,
|
|
"bad address match "
|
|
"element.");
|
|
break;
|
|
|
|
case ISC_R_NOMEMORY:
|
|
FATAL_ERROR(__FILE__, __LINE__,
|
|
"Insufficient memory "
|
|
"available.\n");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
$$ = ime;
|
|
}
|
|
| address_name
|
|
| L_LBRACE address_match_list L_RBRACE
|
|
{
|
|
dns_c_ipmatch_element_t *ime = NULL;
|
|
|
|
if ($2 != NULL) {
|
|
tmpres = dns_c_ipmatch_indirect_new(currcfg->mem, &ime,
|
|
$2, NULL);
|
|
switch (tmpres) {
|
|
case ISC_R_SUCCESS:
|
|
break;
|
|
|
|
case ISC_R_NOMEMORY:
|
|
FATAL_ERROR(__FILE__, __LINE__,
|
|
"Insufficient memory "
|
|
"available.\n");
|
|
break;
|
|
}
|
|
}
|
|
|
|
dns_c_ipmatch_list_delete(&$2);
|
|
|
|
$$ = ime;
|
|
}
|
|
;
|
|
|
|
address_name: any_string
|
|
{
|
|
dns_c_ipmatch_element_t *elem;
|
|
dns_c_acl_t *acl;
|
|
|
|
tmpres = dns_c_acl_table_get_acl(currcfg->acls, $1, &acl);
|
|
if (tmpres == ISC_R_NOTFOUND) {
|
|
parser_warning(ISC_FALSE,
|
|
"Undefined acl ``%s'' referenced",
|
|
$1);
|
|
elem = NULL;
|
|
} else {
|
|
tmpres = dns_c_ipmatch_acl_new(currcfg->mem, &elem, $1);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to create IPE-ACL\n");
|
|
YYABORT;
|
|
}
|
|
}
|
|
|
|
isc_mem_free(memctx, $1);
|
|
$$ = elem;
|
|
}
|
|
;
|
|
|
|
/*
|
|
* Keys
|
|
*/
|
|
|
|
key_ref: any_string
|
|
;
|
|
|
|
key_list_element: key_ref
|
|
{
|
|
dns_c_srv_t *currserver;
|
|
dns_c_kid_t *keyid;
|
|
|
|
INSIST(currcfg->servers != NULL);
|
|
currserver = ISC_LIST_TAIL(currcfg->servers->elements);
|
|
INSIST(currserver != NULL);
|
|
|
|
INSIST(currserver->keys != NULL);
|
|
|
|
if (!dns_c_ctx_key_defined_p(currcfg, $1)) {
|
|
parser_error(ISC_FALSE,
|
|
"Server keys key_id (%s) "
|
|
"referenced before defined", $1);
|
|
YYABORT;
|
|
} else {
|
|
tmpres = dns_c_kid_new(currserver->keys, $1, &keyid);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to create keyid\n");
|
|
YYABORT;
|
|
}
|
|
}
|
|
|
|
isc_mem_free(memctx, $1);
|
|
}
|
|
;
|
|
|
|
|
|
/*
|
|
* The grammer in the man page implies a semicolon is not required before
|
|
* key_list_elements. We'll support either way.
|
|
*/
|
|
maybe_eos: | L_EOS
|
|
;
|
|
|
|
key_list: key_list_element maybe_eos
|
|
| key_list key_list_element maybe_eos
|
|
;
|
|
|
|
key_stmt: L_SEC_KEY any_string
|
|
{
|
|
dns_c_kdef_t *keydef;
|
|
|
|
if (currcfg->keydefs == NULL) {
|
|
tmpres = dns_c_kdef_list_new(currcfg->mem,
|
|
&currcfg->keydefs);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to create keylist");
|
|
YYABORT;
|
|
}
|
|
}
|
|
|
|
tmpres = dns_c_kdef_new(currcfg->keydefs, $2, &keydef);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to create key definition");
|
|
YYABORT;
|
|
}
|
|
|
|
isc_mem_free(memctx, $2);
|
|
}
|
|
L_LBRACE key_definition L_RBRACE L_EOS
|
|
;
|
|
|
|
key_definition: algorithm_id secret
|
|
{
|
|
dns_c_kdef_t *keydef;
|
|
|
|
INSIST(currcfg->keydefs != NULL);
|
|
|
|
keydef = ISC_LIST_TAIL(currcfg->keydefs->keydefs);
|
|
INSIST(keydef != NULL);
|
|
|
|
dns_c_kdef_set_algorithm(keydef, $1);
|
|
dns_c_kdef_set_secret(keydef, $2);
|
|
|
|
isc_mem_free(memctx, $1);
|
|
isc_mem_free(memctx, $2);
|
|
}
|
|
| secret algorithm_id
|
|
{
|
|
dns_c_kdef_t *keydef;
|
|
|
|
INSIST(currcfg->keydefs != NULL);
|
|
|
|
keydef = ISC_LIST_TAIL(currcfg->keydefs->keydefs);
|
|
INSIST(keydef != NULL);
|
|
|
|
dns_c_kdef_set_secret(keydef, $1);
|
|
dns_c_kdef_set_algorithm(keydef, $2);
|
|
|
|
isc_mem_free(memctx, $1);
|
|
isc_mem_free(memctx, $2);
|
|
}
|
|
;
|
|
|
|
algorithm_id: L_ALGID any_string L_EOS
|
|
{
|
|
$$ = $2;
|
|
}
|
|
;
|
|
|
|
secret: L_SECRET any_string L_EOS
|
|
{
|
|
$$ = $2;
|
|
}
|
|
;
|
|
|
|
/*
|
|
* ACLs
|
|
*/
|
|
|
|
acl_stmt: L_ACL any_string L_LBRACE address_match_list L_RBRACE L_EOS
|
|
{
|
|
dns_c_acl_t *acl;
|
|
|
|
INSIST(currcfg->acls != NULL);
|
|
|
|
tmpres = dns_c_acl_new(currcfg->acls, $2, ISC_FALSE, &acl);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to create acl %s", $2);
|
|
YYABORT;
|
|
}
|
|
|
|
dns_c_acl_set_ipml(acl, $4, ISC_FALSE);
|
|
|
|
isc_mem_free(memctx, $2);
|
|
}
|
|
;
|
|
|
|
|
|
/*
|
|
* Zones
|
|
*/
|
|
|
|
domain_name: L_QSTRING
|
|
{
|
|
$$ = $1;
|
|
}
|
|
;
|
|
|
|
/*
|
|
* ``type'' is no longer optional and must be the first statement in the
|
|
* zone block.
|
|
*/
|
|
zone_stmt: L_ZONE domain_name optional_class L_LBRACE L_TYPE zone_type L_EOS
|
|
{
|
|
dns_c_zone_t *zone;
|
|
|
|
if (currcfg->zlist == NULL) {
|
|
tmpres = dns_c_zone_list_new(currcfg->mem,
|
|
&currcfg->zlist);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
dns_c_error(tmpres,
|
|
"Failed to create zone list");
|
|
YYABORT;
|
|
}
|
|
}
|
|
|
|
tmpres = dns_c_zone_new(currcfg->zlist, $6, $3, $2, &zone);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
dns_c_error(tmpres, "Error creating new zone.");
|
|
YYABORT;
|
|
}
|
|
|
|
if (currcfg->options != NULL) {
|
|
zone->afteropts = ISC_TRUE;
|
|
}
|
|
|
|
isc_mem_free(memctx, $2);
|
|
} optional_zone_options_list L_RBRACE L_EOS {
|
|
dns_c_zone_t *zone;
|
|
|
|
if (callbacks != NULL && callbacks->zonecbk != NULL) {
|
|
zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
tmpres = callbacks->zonecbk(currcfg,
|
|
zone,
|
|
callbacks->zonecbkuap);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
YYABORT;
|
|
}
|
|
|
|
dns_c_zone_list_rmzone(currcfg->zlist, zone);
|
|
}
|
|
}
|
|
| L_ZONE domain_name optional_class L_LBRACE zone_non_type_keywords
|
|
{
|
|
parser_error(ISC_FALSE,
|
|
"First statement in a zone definition must "
|
|
"be ``type''");
|
|
YYABORT;
|
|
}
|
|
;
|
|
|
|
optional_zone_options_list: /* Empty */
|
|
| zone_option_list
|
|
;
|
|
|
|
class_name: any_string
|
|
{
|
|
isc_textregion_t reg;
|
|
dns_rdataclass_t cl;
|
|
|
|
if (strcmp($1, "*") == 0) {
|
|
cl = dns_rdataclass_any;
|
|
} else {
|
|
reg.base = $1;
|
|
reg.length = strlen($1);
|
|
|
|
tmpres = dns_rdataclass_fromtext(&cl, ®);
|
|
if (tmpres != DNS_R_SUCCESS) {
|
|
parser_error(ISC_TRUE,
|
|
"Unknown class assuming ``*''.");
|
|
cl = dns_rdataclass_any;
|
|
}
|
|
}
|
|
|
|
isc_mem_free(memctx, $1);
|
|
$$ = cl;
|
|
}
|
|
|
|
optional_class: /* Empty */
|
|
{
|
|
$$ = dns_rdataclass_in;
|
|
}
|
|
| class_name
|
|
;
|
|
|
|
zone_type: L_MASTER
|
|
{
|
|
$$ = dns_c_zone_master;
|
|
}
|
|
| L_SLAVE
|
|
{
|
|
$$ = dns_c_zone_slave;
|
|
}
|
|
| L_HINT
|
|
{
|
|
$$ = dns_c_zone_hint;
|
|
}
|
|
| L_STUB
|
|
{
|
|
$$ = dns_c_zone_stub;
|
|
}
|
|
| L_FORWARD
|
|
{
|
|
$$ = dns_c_zone_forward;
|
|
}
|
|
;
|
|
|
|
|
|
|
|
zone_option_list: zone_option L_EOS
|
|
| zone_option_list zone_option L_EOS
|
|
;
|
|
|
|
|
|
zone_non_type_keywords: L_FILE | L_FILE_IXFR | L_IXFR_TMP | L_MASTERS |
|
|
L_TRANSFER_SOURCE | L_CHECK_NAMES | L_ALLOW_UPDATE | L_ALLOW_QUERY |
|
|
L_ALLOW_TRANSFER | L_FORWARD | L_FORWARDERS | L_MAX_TRANSFER_TIME_IN |
|
|
L_MAX_LOG_SIZE_IXFR | L_NOTIFY | L_MAINTAIN_IXFR_BASE | L_PUBKEY |
|
|
L_ALSO_NOTIFY | L_DIALUP
|
|
;
|
|
|
|
|
|
zone_option: L_FILE L_QSTRING
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_zone_set_file(zone, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE,
|
|
"redefining zone filename.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone file name");
|
|
}
|
|
isc_mem_free(memctx, $2);
|
|
}
|
|
| L_FILE_IXFR L_QSTRING
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_zone_set_ixfr_base(zone, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining ixfr-base.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone ixfr_base.");
|
|
}
|
|
isc_mem_free(memctx, $2);
|
|
}
|
|
| L_IXFR_TMP L_QSTRING
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_zone_set_ixfr_tmp(zone, $2);
|
|
if (tmpres == ISC_R_EXISTS) {
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining ixfr-tmp-file.");
|
|
} else if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone ixfr_tmp-file.");
|
|
}
|
|
isc_mem_free(memctx, $2);
|
|
}
|
|
| L_MASTERS maybe_zero_port L_LBRACE master_in_addr_list L_RBRACE
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_zone_set_master_port(zone, $2);
|
|
switch (tmpres) {
|
|
case ISC_R_EXISTS:
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining zone master's port.");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
/* nothing */
|
|
break;
|
|
|
|
default:
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone master port.");
|
|
}
|
|
|
|
tmpres = dns_c_zone_set_master_ips(zone, $4, ISC_FALSE);
|
|
switch (tmpres) {
|
|
case ISC_R_EXISTS:
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining zone masters ips.");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
/* nothing */
|
|
break;
|
|
|
|
default:
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone masters ips.");
|
|
}
|
|
}
|
|
| L_TRANSFER_SOURCE maybe_wild_addr
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_zone_set_transfer_source(zone, $2);
|
|
switch (tmpres) {
|
|
case ISC_R_EXISTS:
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining zone transfer-source.");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
/* nothing */
|
|
break;
|
|
|
|
default:
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone transfer-source.");
|
|
}
|
|
}
|
|
| L_CHECK_NAMES check_names_opt
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_zone_set_checknames(zone, $2);
|
|
switch (tmpres) {
|
|
case ISC_R_EXISTS:
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining zone check-names.");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
/* nothing */
|
|
break;
|
|
|
|
default:
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone check-names.");
|
|
}
|
|
}
|
|
| L_ALLOW_UPDATE L_LBRACE address_match_list L_RBRACE
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_zone_set_allow_upd(zone, $3, ISC_FALSE);
|
|
switch (tmpres) {
|
|
case ISC_R_EXISTS:
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining zone allow-update.");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
/* nothing */
|
|
break;
|
|
|
|
default:
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone allow-update.");
|
|
}
|
|
}
|
|
| L_ALLOW_QUERY L_LBRACE address_match_list L_RBRACE
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_zone_set_allow_query(zone, $3, ISC_FALSE);
|
|
switch (tmpres) {
|
|
case ISC_R_EXISTS:
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining zone allow-query.");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
/* nothing */
|
|
break;
|
|
|
|
default:
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone allow-query.");
|
|
}
|
|
}
|
|
| L_ALLOW_TRANSFER L_LBRACE address_match_list L_RBRACE
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_zone_set_allow_transfer(zone, $3, ISC_FALSE);
|
|
switch (tmpres) {
|
|
case ISC_R_EXISTS:
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining zone allow-transfer.");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
/* nothing */
|
|
break;
|
|
|
|
default:
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone allow-transfer.");
|
|
}
|
|
}
|
|
| L_FORWARD zone_forward_opt
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_zone_set_forward(zone, $2);
|
|
switch (tmpres) {
|
|
case ISC_R_EXISTS:
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining zone forward.");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
/* nothing */
|
|
break;
|
|
|
|
default:
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone forward.");
|
|
}
|
|
}
|
|
| L_FORWARDERS L_LBRACE opt_zone_forwarders_list L_RBRACE
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
dns_c_iplist_t *iplist;
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
if ($3 == NULL) { /* user defined empty list */
|
|
tmpres = dns_c_iplist_new(currcfg->mem, 5, &iplist);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_TRUE,
|
|
"Failed to create new zone "
|
|
"iplist");
|
|
YYABORT;
|
|
}
|
|
} else {
|
|
iplist = $3;
|
|
}
|
|
|
|
tmpres = dns_c_zone_set_forwarders(zone, iplist, ISC_FALSE);
|
|
switch (tmpres) {
|
|
case ISC_R_EXISTS:
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining zone forwarders.");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
/* nothing */
|
|
break;
|
|
|
|
default:
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone forwarders.");
|
|
}
|
|
}
|
|
| L_MAX_TRANSFER_TIME_IN L_INTEGER
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_zone_set_max_trans_time_in(zone, $2);
|
|
switch (tmpres) {
|
|
case ISC_R_EXISTS:
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining zone "
|
|
"max-transfer-time-in.");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
/* nothing */
|
|
break;
|
|
|
|
default:
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone "
|
|
"max-transfer-time-in.");
|
|
}
|
|
}
|
|
| L_MAX_LOG_SIZE_IXFR L_INTEGER
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_zone_set_max_ixfr_log(zone, $2);
|
|
switch (tmpres) {
|
|
case ISC_R_EXISTS:
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining zone max-ixfr-log-size.");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
/* nothing */
|
|
break;
|
|
|
|
default:
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone max-ixfr-log-size.");
|
|
}
|
|
}
|
|
| L_NOTIFY yea_or_nay
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_zone_set_notify(zone, $2);
|
|
switch (tmpres) {
|
|
case ISC_R_EXISTS:
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining zone notify.");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
/* nothing */
|
|
break;
|
|
|
|
default:
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone notify.");
|
|
}
|
|
}
|
|
| L_MAINTAIN_IXFR_BASE yea_or_nay
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_zone_set_maint_ixfr_base(zone, $2);
|
|
switch (tmpres) {
|
|
case ISC_R_EXISTS:
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining zone maintain-ixfr-base.");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
/* nothing */
|
|
break;
|
|
|
|
default:
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone maintain-ixfr-base.");
|
|
}
|
|
}
|
|
| L_PUBKEY L_INTEGER L_INTEGER L_INTEGER L_QSTRING
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
dns_c_pubkey_t *pubkey;
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_pubkey_new(currcfg->mem, $2,
|
|
$3, $4, $5, &pubkey);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_TRUE,
|
|
"Failed to create a zone pubkey");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_zone_set_pubkey(zone, pubkey, ISC_FALSE);
|
|
switch (tmpres) {
|
|
case ISC_R_EXISTS:
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining zone pubkey.");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
/* nothing */
|
|
break;
|
|
|
|
default:
|
|
dns_c_pubkey_delete(&pubkey);
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone pubkey.");
|
|
}
|
|
|
|
isc_mem_free(memctx, $5);
|
|
}
|
|
| L_ALSO_NOTIFY L_LBRACE notify_in_addr_list L_RBRACE
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_zone_set_also_notify(zone, $3, ISC_FALSE);
|
|
switch (tmpres) {
|
|
case ISC_R_EXISTS:
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining zone also-notify.");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
/* nothing */
|
|
break;
|
|
|
|
default:
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone also-notify.");
|
|
}
|
|
}
|
|
| L_DIALUP yea_or_nay
|
|
{
|
|
dns_c_zone_t *zone = ISC_LIST_TAIL(currcfg->zlist->zones);
|
|
|
|
INSIST(zone != NULL);
|
|
|
|
tmpres = dns_c_zone_set_dialup(zone, $2);
|
|
switch (tmpres) {
|
|
case ISC_R_EXISTS:
|
|
parser_warning(ISC_FALSE,
|
|
"Redefining zone dialup.");
|
|
break;
|
|
|
|
case ISC_R_SUCCESS:
|
|
/* nothing */
|
|
break;
|
|
|
|
default:
|
|
parser_error(ISC_FALSE,
|
|
"Failed to set zone dialup.");
|
|
}
|
|
}
|
|
;
|
|
|
|
|
|
master_in_addr_list: in_addr_list
|
|
;
|
|
|
|
notify_in_addr_list: opt_in_addr_list
|
|
;
|
|
|
|
ip4_address: L_IP4ADDR
|
|
{
|
|
$$.a_family = AF_INET;
|
|
$$.u.a = $1;
|
|
}
|
|
;
|
|
|
|
ip6_address: L_IP6ADDR
|
|
{
|
|
$$.a_family = AF_INET6;
|
|
$$.u.a6 = $1;
|
|
}
|
|
|
|
|
|
ip_address: ip4_address
|
|
{
|
|
$$ = $1;
|
|
}
|
|
| ip6_address
|
|
{
|
|
$$ = $1;
|
|
}
|
|
;
|
|
|
|
in_addr_elem: ip_address
|
|
;
|
|
|
|
opt_in_addr_list: /* nothing */
|
|
{
|
|
dns_c_iplist_t *list;
|
|
|
|
tmpres = dns_c_iplist_new(currcfg->mem, 5, &list);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_TRUE,
|
|
"Failed to create new iplist");
|
|
YYABORT;
|
|
}
|
|
|
|
$$ = list;
|
|
}
|
|
| in_addr_list
|
|
;
|
|
|
|
in_addr_list: in_addr_elem L_EOS
|
|
{
|
|
dns_c_iplist_t *list;
|
|
|
|
tmpres = dns_c_iplist_new(currcfg->mem, 5, &list);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_TRUE,
|
|
"Failed to create new iplist");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_iplist_append(list, $1);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_TRUE,
|
|
"Failed to append master address");
|
|
YYABORT;
|
|
}
|
|
|
|
$$ = list;
|
|
}
|
|
| in_addr_list in_addr_elem L_EOS
|
|
{
|
|
tmpres = dns_c_iplist_append($1, $2);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
parser_error(ISC_TRUE,
|
|
"Failed to append master address");
|
|
YYABORT;
|
|
}
|
|
|
|
$$ = $1;
|
|
}
|
|
;
|
|
|
|
zone_forward_opt: L_ONLY
|
|
{
|
|
$$ = dns_c_forw_only;
|
|
}
|
|
| L_FIRST
|
|
{
|
|
$$ = dns_c_forw_first;
|
|
}
|
|
;
|
|
|
|
opt_zone_forwarders_list: opt_in_addr_list
|
|
;
|
|
|
|
/*
|
|
* Trusted Key statement
|
|
*/
|
|
|
|
trusted_keys_stmt: L_TRUSTED_KEYS
|
|
{
|
|
dns_c_tkey_list_t *newlist;
|
|
|
|
tmpres = dns_c_ctx_get_trusted_keys(currcfg, &newlist);
|
|
if (tmpres == ISC_R_NOTFOUND) {
|
|
tmpres = dns_c_tkey_list_new(currcfg->mem, &newlist);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
dns_c_error(tmpres,
|
|
"Failed to create trusted key list.");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_ctx_set_trusted_keys(currcfg,
|
|
newlist,
|
|
ISC_FALSE);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
dns_c_error(tmpres,
|
|
"Failed to set trusted keys");
|
|
YYABORT;
|
|
}
|
|
}
|
|
} L_LBRACE trusted_keys_list L_RBRACE L_EOS
|
|
;
|
|
|
|
trusted_keys_list: trusted_key L_EOS
|
|
| trusted_keys_list trusted_key L_EOS
|
|
;
|
|
|
|
|
|
trusted_key: domain_name L_INTEGER L_INTEGER L_INTEGER L_QSTRING
|
|
{
|
|
dns_c_tkey_t *tkey;
|
|
dns_c_tkey_list_t *list;
|
|
|
|
tmpres = dns_c_ctx_get_trusted_keys(currcfg, &list);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
dns_c_error(tmpres, "No trusted key list defined!");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_tkey_new(currcfg->mem, $1, $2, $3,
|
|
$4, $5, &tkey);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
dns_c_error(tmpres, "Failed to create trusted key");
|
|
YYABORT;
|
|
}
|
|
|
|
tmpres = dns_c_tkey_list_append(list, tkey, ISC_FALSE);
|
|
if (tmpres != ISC_R_SUCCESS) {
|
|
dns_c_error(tmpres, "Failed to append trusted key.");
|
|
YYABORT;
|
|
}
|
|
|
|
isc_mem_free(memctx, $1);
|
|
isc_mem_free(memctx, $5);
|
|
}
|
|
;
|
|
|
|
|
|
|
|
/*
|
|
* Misc.
|
|
*/
|
|
|
|
in_port: L_INTEGER
|
|
{
|
|
if ($1 < 0 || $1 > 65535) {
|
|
parser_warning(ISC_TRUE,
|
|
"invalid IP port number '%d'; setting port to 0",
|
|
(int)$1);
|
|
$1 = 0;
|
|
} else
|
|
$$ = htons($1);
|
|
}
|
|
;
|
|
|
|
|
|
any_string: L_STRING
|
|
| L_QSTRING
|
|
;
|
|
|
|
%%
|
|
|
|
static void parser_error(isc_boolean_t lasttoken,
|
|
const char *fmt, ...);
|
|
static void parser_warning(isc_boolean_t lasttoken,
|
|
const char *fmt, ...);
|
|
static void parser_complain(isc_boolean_t is_warning,
|
|
isc_boolean_t last_token,
|
|
const char *format, va_list args);
|
|
static int intuit_token(const char *string);
|
|
|
|
static isc_boolean_t unit_to_uint32(char *in, isc_uint32_t *out);
|
|
static isc_boolean_t is_ip4addr(const char *string, struct in_addr *addr);
|
|
static isc_boolean_t is_ip6addr(const char *string, struct in6_addr *addr);
|
|
static isc_result_t keyword_init(void);
|
|
static char * token_to_text(int token, YYSTYPE lval);
|
|
static int token_value(isc_token_t *token,
|
|
isc_symtab_t *symtable);
|
|
static void init_action(void);
|
|
|
|
|
|
static void yyerror(const char *);
|
|
static int yylex(void);
|
|
int yyparse(void);
|
|
|
|
|
|
YYSTYPE lastyylval;
|
|
int lasttoken;
|
|
|
|
|
|
/*
|
|
* Definition of all unique keyword tokens to be recognised by the
|
|
* lexer. All the ``L_'' tokens defined in parser.y must be defined here too.
|
|
*/
|
|
struct token
|
|
{
|
|
char *token;
|
|
int yaccval;
|
|
};
|
|
|
|
static struct token keyword_tokens [] = {
|
|
{ "{", L_LBRACE },
|
|
{ "}", L_RBRACE },
|
|
{ ";", L_EOS },
|
|
{ "/", L_SLASH },
|
|
{ "!", L_BANG },
|
|
|
|
{ "acl", L_ACL },
|
|
{ "address", L_ADDRESS },
|
|
{ "algorithm", L_ALGID },
|
|
{ "allow", L_ALLOW },
|
|
{ "allow-query", L_ALLOW_QUERY },
|
|
{ "allow-transfer", L_ALLOW_TRANSFER },
|
|
{ "allow-update", L_ALLOW_UPDATE },
|
|
{ "also-notify", L_ALSO_NOTIFY },
|
|
{ "auth-nxdomain", L_AUTH_NXDOMAIN },
|
|
{ "blackhole", L_BLACKHOLE },
|
|
{ "bogus", L_BOGUS },
|
|
{ "category", L_CATEGORY },
|
|
{ "class", L_CLASS },
|
|
{ "channel", L_CHANNEL },
|
|
{ "check-names", L_CHECK_NAMES },
|
|
{ "cleaning-interval", L_CLEAN_INTERVAL },
|
|
{ "controls", L_CONTROLS },
|
|
{ "coresize", L_CORESIZE },
|
|
{ "datasize", L_DATASIZE },
|
|
{ "deallocate-on-exit", L_DEALLOC_ON_EXIT },
|
|
{ "debug", L_DEBUG },
|
|
{ "default", L_DEFAULT },
|
|
{ "dialup", L_DIALUP },
|
|
{ "directory", L_DIRECTORY },
|
|
{ "dump-file", L_DUMP_FILE },
|
|
{ "dynamic", L_DYNAMIC },
|
|
{ "expert-mode", L_EXPERT_MODE },
|
|
{ "fail", L_FAIL },
|
|
{ "fake-iquery", L_FAKE_IQUERY },
|
|
{ "false", L_FALSE },
|
|
{ "fetch-glue", L_FETCH_GLUE },
|
|
{ "file", L_FILE },
|
|
{ "files", L_FILES },
|
|
{ "first", L_FIRST },
|
|
{ "forward", L_FORWARD },
|
|
{ "forwarders", L_FORWARDERS },
|
|
{ "group", L_GROUP },
|
|
{ "has-old-clients", L_HAS_OLD_CLIENTS },
|
|
{ "heartbeat-interval", L_HEARTBEAT },
|
|
{ "hint", L_HINT },
|
|
{ "host-statistics", L_HOSTSTATS },
|
|
{ "if-no-answer", L_IF_NO_ANSWER },
|
|
{ "if-no-domain", L_IF_NO_DOMAIN },
|
|
{ "ignore", L_IGNORE },
|
|
{ "include", L_INCLUDE },
|
|
{ "inet", L_INET },
|
|
{ "interface-interval", L_INTERFACE_INTERVAL },
|
|
{ "ixfr-base", L_FILE_IXFR },
|
|
{ "ixfr-tmp-file", L_IXFR_TMP },
|
|
{ "key", L_SEC_KEY },
|
|
{ "keys", L_KEYS },
|
|
{ "listen-on", L_LISTEN_ON },
|
|
{ "logging", L_LOGGING },
|
|
{ "maintain-ixfr-base", L_MAINTAIN_IXFR_BASE },
|
|
{ "many-answers", L_MANY_ANSWERS },
|
|
{ "master", L_MASTER },
|
|
{ "masters", L_MASTERS },
|
|
{ "max-ixfr-log-size", L_MAX_LOG_SIZE_IXFR },
|
|
{ "max-ncache-ttl", L_MAX_NCACHE_TTL },
|
|
{ "max-transfer-time-in", L_MAX_TRANSFER_TIME_IN },
|
|
{ "memstatistics-file", L_MEMSTATS_FILE },
|
|
{ "multiple-cnames", L_MULTIPLE_CNAMES },
|
|
{ "name", L_NAME },
|
|
{ "named-xfer", L_NAMED_XFER },
|
|
{ "no", L_NO },
|
|
{ "notify", L_NOTIFY },
|
|
{ "null", L_NULL_OUTPUT },
|
|
{ "one-answer", L_ONE_ANSWER },
|
|
{ "only", L_ONLY },
|
|
{ "order", L_ORDER },
|
|
{ "options", L_OPTIONS },
|
|
{ "owner", L_OWNER },
|
|
{ "perm", L_PERM },
|
|
{ "pid-file", L_PIDFILE },
|
|
{ "port", L_PORT },
|
|
{ "print-category", L_PRINT_CATEGORY },
|
|
{ "print-severity", L_PRINT_SEVERITY },
|
|
{ "print-time", L_PRINT_TIME },
|
|
{ "pubkey", L_PUBKEY },
|
|
{ "query-source", L_QUERY_SOURCE },
|
|
{ "rrset-order", L_RRSET_ORDER },
|
|
{ "recursion", L_RECURSION },
|
|
{ "response", L_RESPONSE },
|
|
{ "secret", L_SECRET },
|
|
{ "server", L_SERVER },
|
|
{ "severity", L_SEVERITY },
|
|
{ "size", L_SIZE },
|
|
{ "slave", L_SLAVE },
|
|
{ "sortlist", L_SORTLIST },
|
|
{ "stacksize", L_STACKSIZE },
|
|
{ "statistics-file", L_STATS_FILE },
|
|
{ "statistics-interval", L_STATS_INTERVAL },
|
|
{ "stub", L_STUB },
|
|
{ "support-ixfr", L_SUPPORT_IXFR },
|
|
{ "syslog", L_SYSLOG },
|
|
{ "topology", L_TOPOLOGY },
|
|
{ "transfer-format", L_TRANSFER_FORMAT },
|
|
{ "transfer-source", L_TRANSFER_SOURCE },
|
|
{ "transfers", L_TRANSFERS },
|
|
{ "transfers-in", L_TRANSFERS_IN },
|
|
{ "transfers-out", L_TRANSFERS_OUT },
|
|
{ "transfers-per-ns", L_TRANSFERS_PER_NS },
|
|
{ "true", L_TRUE },
|
|
{ "trusted-keys", L_TRUSTED_KEYS },
|
|
{ "type", L_TYPE },
|
|
{ "unix", L_UNIX },
|
|
{ "unlimited", L_UNLIMITED },
|
|
{ "use-id-pool", L_USE_ID_POOL },
|
|
{ "use-ixfr", L_USE_IXFR },
|
|
{ "version", L_VERSION },
|
|
{ "versions", L_VERSIONS },
|
|
{ "warn", L_WARN },
|
|
{ "yes", L_YES },
|
|
{ "zone", L_ZONE },
|
|
|
|
{ NULL, 0 }
|
|
};
|
|
|
|
|
|
static struct token class_symbol_tokens[] = {
|
|
{ "IN", dns_rdataclass_in },
|
|
#if 0 /* XXX expand */
|
|
{ "CHAOS", dns_rdataclass_chaos },
|
|
{ "HS", dns_rdataclass_hs },
|
|
{ "HESIOD", dns_rdataclass_hs },
|
|
#endif
|
|
{ "ANY", dns_rdataclass_any },
|
|
{ "NONE", dns_rdataclass_none },
|
|
{ NULL, 0 }
|
|
};
|
|
|
|
|
|
static isc_once_t once = ISC_ONCE_INIT;
|
|
|
|
|
|
static void
|
|
init_action(void)
|
|
{
|
|
isc_mutex_init(&yacc_mutex);
|
|
}
|
|
|
|
|
|
/*
|
|
* XXX Need a parameter to specify where error messages should go (syslog,
|
|
* FILE, /dev/null etc.) Also some way to tell the function to obey logging
|
|
* statments as appropriate.
|
|
*/
|
|
|
|
isc_result_t
|
|
dns_c_parse_namedconf(const char *filename, isc_mem_t *mem,
|
|
dns_c_ctx_t **configctx, dns_c_cbks_t *cbks)
|
|
{
|
|
isc_result_t res;
|
|
const char *funcname = "dns_parse_namedconf";
|
|
|
|
RUNTIME_CHECK(isc_once_do(&once, init_action) == ISC_R_SUCCESS);
|
|
|
|
/* Lock down whole parser. */
|
|
if (isc_mutex_lock(&yacc_mutex) != ISC_R_SUCCESS) {
|
|
return (ISC_R_UNEXPECTED);
|
|
}
|
|
|
|
REQUIRE(currcfg == NULL);
|
|
REQUIRE(filename != NULL);
|
|
REQUIRE(strlen(filename) > 0);
|
|
REQUIRE(configctx != NULL);
|
|
INSIST(mylexer == NULL);
|
|
INSIST(memctx == NULL);
|
|
INSIST(keywords == NULL);
|
|
INSIST(callbacks == NULL);
|
|
|
|
if (getenv("DEBUG_LEXER") != NULL) { /* XXX debug */
|
|
debug_lexer++;
|
|
}
|
|
|
|
specials['{'] = 1;
|
|
specials['}'] = 1;
|
|
specials[';'] = 1;
|
|
specials['/'] = 1;
|
|
specials['"'] = 1;
|
|
specials['!'] = 1;
|
|
#if 0
|
|
specials['*'] = 1;
|
|
#endif
|
|
|
|
/*
|
|
* This memory context is only used by the lexer routines (and must
|
|
* stay that way). Any memory that must live past the return of
|
|
* yyparse() must be allocated via the 'mem' parameter to this
|
|
* function.
|
|
*/
|
|
res = isc_mem_create(0, 0, &memctx);
|
|
if (res != ISC_R_SUCCESS) {
|
|
dns_c_error(res, "%s: Error creating mem context.",
|
|
funcname);
|
|
goto done;
|
|
}
|
|
|
|
res = keyword_init();
|
|
if (res != ISC_R_SUCCESS) {
|
|
dns_c_error(res, "%s: Error initializing keywords.",
|
|
funcname);
|
|
goto done;
|
|
}
|
|
|
|
res = dns_c_ctx_new(mem, &currcfg);
|
|
if (res != ISC_R_SUCCESS) {
|
|
dns_c_error(res, "%s: Error creating config context.",
|
|
funcname);
|
|
goto done;
|
|
}
|
|
|
|
res = isc_lex_create(memctx, CONF_MAX_IDENT, &mylexer);
|
|
if (res != ISC_R_SUCCESS) {
|
|
dns_c_error(res, "%s: Error creating lexer",
|
|
funcname);
|
|
goto done;
|
|
}
|
|
|
|
isc_lex_setspecials(mylexer, specials);
|
|
isc_lex_setcomments(mylexer, (ISC_LEXCOMMENT_C |
|
|
ISC_LEXCOMMENT_CPLUSPLUS |
|
|
ISC_LEXCOMMENT_SHELL));
|
|
|
|
res = isc_lex_openfile(mylexer, (char *)filename) ; /* remove const */
|
|
if (res != ISC_R_SUCCESS) {
|
|
dns_c_error(res, "%s: Error opening file %s.",
|
|
funcname, filename);
|
|
goto done;
|
|
}
|
|
|
|
callbacks = cbks;
|
|
|
|
if (yyparse() != 0) {
|
|
res = ISC_R_FAILURE;
|
|
|
|
/* Syntax errors in the config file make it very difficult
|
|
* to clean up memory properly (which causes assertion
|
|
* failure when the memory manager is destroyed).
|
|
*/
|
|
isc_mem_destroy_check(memctx, ISC_FALSE);
|
|
|
|
dns_c_ctx_delete(&currcfg);
|
|
currcfg = NULL;
|
|
} else {
|
|
res = ISC_R_SUCCESS;
|
|
}
|
|
|
|
|
|
done:
|
|
if (mylexer != NULL)
|
|
isc_lex_destroy(&mylexer);
|
|
|
|
isc_symtab_destroy(&keywords);
|
|
|
|
isc_mem_destroy(&memctx);
|
|
|
|
*configctx = currcfg;
|
|
|
|
callbacks = NULL;
|
|
currcfg = NULL;
|
|
memctx = NULL;
|
|
mylexer = NULL;
|
|
|
|
RUNTIME_CHECK(isc_mutex_unlock(&yacc_mutex) == ISC_R_SUCCESS);
|
|
|
|
return (res);
|
|
}
|
|
|
|
|
|
|
|
/***
|
|
*** PRIVATE
|
|
***/
|
|
|
|
static isc_result_t
|
|
keyword_init(void)
|
|
{
|
|
struct token *tok;
|
|
isc_symvalue_t symval;
|
|
|
|
RUNTIME_CHECK(isc_symtab_create(memctx, 97 /* prime < 100 */,
|
|
NULL, NULL, ISC_FALSE,
|
|
&keywords) == ISC_R_SUCCESS);
|
|
|
|
|
|
/* Stick all the keywords into the main symbol table. */
|
|
for (tok = &keyword_tokens[0] ; tok->token != NULL ; tok++) {
|
|
symval.as_integer = tok->yaccval;
|
|
RUNTIME_CHECK(isc_symtab_define(keywords, tok->token,
|
|
KEYWORD_SYM_TYPE, symval,
|
|
isc_symexists_reject) ==
|
|
ISC_R_SUCCESS);
|
|
}
|
|
|
|
/* Now the class names */
|
|
for (tok = &class_symbol_tokens[0] ; tok->token != NULL ; tok++) {
|
|
symval.as_integer = tok->yaccval;
|
|
RUNTIME_CHECK(isc_symtab_define(keywords, tok->token,
|
|
CLASS_SYM_TYPE, symval,
|
|
isc_symexists_reject) ==
|
|
ISC_R_SUCCESS);
|
|
}
|
|
|
|
return (ISC_R_SUCCESS);
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
yylex(void)
|
|
{
|
|
isc_token_t token;
|
|
isc_result_t res;
|
|
int options = (ISC_LEXOPT_EOF |
|
|
ISC_LEXOPT_NUMBER |
|
|
ISC_LEXOPT_QSTRING |
|
|
ISC_LEXOPT_NOMORE);
|
|
|
|
INSIST(mylexer != NULL);
|
|
|
|
res = isc_lex_gettoken(mylexer, options, &token);
|
|
|
|
switch(res) {
|
|
case ISC_R_SUCCESS:
|
|
res = token_value(&token, keywords); /* modifies yylval */
|
|
break;
|
|
|
|
case ISC_R_EOF:
|
|
res = 0;
|
|
break;
|
|
|
|
case ISC_R_UNBALANCED:
|
|
parser_error(ISC_TRUE,
|
|
"%s: %d: unbalanced parentheses",
|
|
isc_lex_getsourcename(mylexer),
|
|
(int)isc_lex_getsourceline(mylexer));
|
|
res = -1;
|
|
break;
|
|
|
|
case ISC_R_NOSPACE:
|
|
parser_error(ISC_TRUE,
|
|
"%s: %d: token too big.",
|
|
isc_lex_getsourcename(mylexer),
|
|
(int)isc_lex_getsourceline(mylexer));
|
|
res = -1;
|
|
break;
|
|
|
|
case ISC_R_UNEXPECTEDEND:
|
|
parser_error(ISC_TRUE,
|
|
"%s: %d: unexpected EOF",
|
|
isc_lex_getsourcename(mylexer),
|
|
(int)isc_lex_getsourceline(mylexer));
|
|
res = -1;
|
|
break;
|
|
|
|
default:
|
|
parser_error(ISC_TRUE,
|
|
"%s: %d unknown lexer error (%d)",
|
|
isc_lex_getsourcename(mylexer),
|
|
(int)isc_lex_getsourceline(mylexer),
|
|
(int)res);
|
|
res = -1;
|
|
break;
|
|
}
|
|
|
|
|
|
lastyylval = yylval;
|
|
lasttoken = res;
|
|
|
|
return (res);
|
|
}
|
|
|
|
|
|
|
|
static char *
|
|
token_to_text(int token, YYSTYPE lval) {
|
|
static char buffer[1024];
|
|
int i;
|
|
|
|
/* Yacc keeps token numbers above 128, it seems. */
|
|
if (token < 128) {
|
|
if (token == 0)
|
|
strncpy(buffer, "<end of file>", sizeof buffer);
|
|
else
|
|
if ((unsigned int) sprintf(buffer, "'%c'", token)
|
|
>= sizeof buffer) {
|
|
abort();
|
|
}
|
|
} else {
|
|
switch (token) {
|
|
case L_STRING:
|
|
if ((unsigned int) sprintf(buffer, "'%s'",
|
|
lval.text) >=
|
|
sizeof buffer) {
|
|
abort();
|
|
}
|
|
break;
|
|
case L_QSTRING:
|
|
if ((unsigned int) sprintf(buffer, "\"%s\"",
|
|
lval.text) >=
|
|
sizeof buffer) {
|
|
abort();
|
|
}
|
|
break;
|
|
case L_IP6ADDR:
|
|
strcpy(buffer, "UNAVAILABLE-IPV6-ADDRESS");
|
|
inet_ntop(AF_INET6, &lval.ip6_addr.s6_addr,
|
|
buffer, sizeof buffer);
|
|
break;
|
|
case L_IP4ADDR:
|
|
strcpy(buffer, "UNAVAILABLE-IPV4-ADDRESS");
|
|
inet_ntop(AF_INET, &lval.ip4_addr.s_addr,
|
|
buffer, sizeof buffer);
|
|
break;
|
|
case L_INTEGER:
|
|
sprintf(buffer, "%ld", (long)lval.ul_int);
|
|
break;
|
|
case L_END_INCLUDE:
|
|
strcpy (buffer, "<end of include>");
|
|
break;
|
|
default:
|
|
for (i = 0 ; keyword_tokens[i].token != NULL ; i++) {
|
|
if (keyword_tokens[i].yaccval == token)
|
|
break;
|
|
}
|
|
|
|
if (keyword_tokens[i].token == NULL) {
|
|
sprintf(buffer, "UNKNOWN-TOKEN-TYPE (%d)",
|
|
(int)token);
|
|
} else {
|
|
strncpy(buffer, keyword_tokens[i].token,
|
|
sizeof buffer - 1);
|
|
buffer[sizeof buffer - 1] = '\0';
|
|
}
|
|
}
|
|
}
|
|
|
|
return (buffer);
|
|
}
|
|
|
|
|
|
static void
|
|
parser_complain(isc_boolean_t is_warning, isc_boolean_t print_last_token,
|
|
const char *format, va_list args)
|
|
{
|
|
static char where[PATH_MAX + 100];
|
|
static char message[20480];
|
|
|
|
const char *filename = isc_lex_getsourcename(mylexer);
|
|
int lineno = isc_lex_getsourceline(mylexer);
|
|
|
|
/*
|
|
* We can't get a trace of the include files we may be nested in
|
|
* (lex.c has the structures hidden). So we only report the current
|
|
* file.
|
|
*/
|
|
if (filename == NULL) {
|
|
filename = "(none)";
|
|
}
|
|
|
|
sprintf(where, "%s:%d ", filename, lineno);
|
|
if ((unsigned int)vsprintf(message, format, args) >= sizeof message) {
|
|
abort();
|
|
}
|
|
|
|
/* XXX this needs to use the log system instead of stdio. */
|
|
(void) is_warning; /* lint happiness */
|
|
|
|
if (print_last_token) {
|
|
fprintf(stderr, "%s%s near ``%s''\n", where, message,
|
|
token_to_text(lasttoken, lastyylval));
|
|
} else {
|
|
fprintf(stderr, "%s%s\n", where, message);
|
|
}
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
|
* For reporting items that are semantic, but not syntactic errors
|
|
*/
|
|
static void
|
|
parser_error(isc_boolean_t lasttoken, const char *fmt, ...)
|
|
{
|
|
va_list args;
|
|
|
|
va_start(args, fmt);
|
|
parser_complain(ISC_TRUE, lasttoken, fmt, args);
|
|
va_end(args);
|
|
|
|
currcfg->errors++;
|
|
}
|
|
|
|
|
|
static void
|
|
parser_warning(isc_boolean_t lasttoken, const char *fmt, ...)
|
|
{
|
|
va_list args;
|
|
|
|
va_start(args, fmt);
|
|
parser_complain(ISC_FALSE, lasttoken, fmt, args);
|
|
va_end(args);
|
|
|
|
currcfg->warnings++;
|
|
}
|
|
|
|
|
|
static void
|
|
yyerror(const char *string)
|
|
{
|
|
parser_error(ISC_TRUE, string);
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
token_value(isc_token_t *token, isc_symtab_t *symtable)
|
|
{
|
|
int res = -1;
|
|
const char *tokstring;
|
|
char tmpident [2];
|
|
isc_symvalue_t keywordtok;
|
|
|
|
switch (token->type) {
|
|
case isc_tokentype_unknown:
|
|
if (debug_lexer) {
|
|
fprintf(stderr, "unknown lexer token\n");
|
|
}
|
|
|
|
res = -1;
|
|
break;
|
|
|
|
case isc_tokentype_special:
|
|
case isc_tokentype_string:
|
|
if (token->type == isc_tokentype_special) {
|
|
tmpident[0] = token->value.as_char;
|
|
tmpident[1] = '\0';
|
|
tokstring = tmpident;
|
|
} else {
|
|
tokstring = token->value.as_textregion.base;
|
|
}
|
|
|
|
if (debug_lexer) {
|
|
fprintf(stderr, "lexer token: %s : %s\n",
|
|
(token->type == isc_tokentype_special ?
|
|
"special" : "string"), tokstring);
|
|
}
|
|
|
|
res = isc_symtab_lookup(symtable, tokstring,
|
|
KEYWORD_SYM_TYPE, &keywordtok);
|
|
|
|
if (res != ISC_R_SUCCESS) {
|
|
res = intuit_token(tokstring);
|
|
} else {
|
|
res = keywordtok.as_integer;
|
|
}
|
|
break;
|
|
|
|
case isc_tokentype_number:
|
|
yylval.ul_int = (isc_uint32_t)token->value.as_ulong;
|
|
res = L_INTEGER;
|
|
|
|
if(debug_lexer) {
|
|
fprintf(stderr, "lexer token: number : %lu\n",
|
|
(unsigned long)yylval.ul_int);
|
|
}
|
|
|
|
break;
|
|
|
|
case isc_tokentype_qstring:
|
|
yylval.text = isc_mem_strdup(memctx,
|
|
token->value.as_textregion.base);
|
|
if (yylval.text == NULL) {
|
|
res = -1;
|
|
} else {
|
|
res = L_QSTRING;
|
|
}
|
|
|
|
if (debug_lexer) {
|
|
fprintf(stderr, "lexer token: qstring : \"%s\"\n",
|
|
yylval.text);
|
|
}
|
|
|
|
break;
|
|
|
|
case isc_tokentype_eof:
|
|
res = isc_lex_close(mylexer);
|
|
INSIST(res == ISC_R_NOMORE || res == ISC_R_SUCCESS);
|
|
|
|
if (isc_lex_getsourcename(mylexer) == NULL) {
|
|
/* the only way to tell that we
|
|
* closed the main file and not an included file
|
|
*/
|
|
if (debug_lexer) {
|
|
fprintf(stderr, "lexer token: EOF\n");
|
|
}
|
|
res = 0;
|
|
} else {
|
|
if (debug_lexer) {
|
|
fprintf(stderr, "lexer token: EOF (main)\n");
|
|
}
|
|
res = L_END_INCLUDE;
|
|
}
|
|
break;
|
|
|
|
case isc_tokentype_initialws:
|
|
if (debug_lexer) {
|
|
fprintf(stderr, "lexer token: initial ws\n");
|
|
}
|
|
res = -1;
|
|
break;
|
|
|
|
case isc_tokentype_eol:
|
|
if (debug_lexer) {
|
|
fprintf(stderr, "lexer token: eol\n");
|
|
}
|
|
res = -1;
|
|
break;
|
|
|
|
case isc_tokentype_nomore:
|
|
if (debug_lexer) {
|
|
fprintf(stderr, "lexer token: nomore\n");
|
|
}
|
|
res = -1;
|
|
break;
|
|
}
|
|
|
|
return (res);
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
|
intuit_token(const char *string)
|
|
{
|
|
int resval;
|
|
|
|
if (is_ip4addr(string, &yylval.ip4_addr)) {
|
|
resval = L_IP4ADDR;
|
|
} else if (is_ip6addr(string, &yylval.ip6_addr)) {
|
|
resval = L_IP6ADDR;
|
|
} else {
|
|
yylval.text = isc_mem_strdup(memctx, string);
|
|
if (yylval.text == NULL) {
|
|
resval = -1;
|
|
} else {
|
|
resval = L_STRING;
|
|
}
|
|
}
|
|
|
|
return (resval);
|
|
}
|
|
|
|
|
|
/*
|
|
* Conversion Routines
|
|
*/
|
|
|
|
static isc_boolean_t
|
|
unit_to_uint32(char *in, isc_uint32_t *out) {
|
|
int c, units_done = 0;
|
|
isc_uint32_t result = 0L;
|
|
|
|
INSIST(in != NULL);
|
|
|
|
for (; (c = *in) != '\0'; in++) {
|
|
if (units_done)
|
|
return (0);
|
|
if (isdigit(c)) {
|
|
result *= 10;
|
|
result += (c - '0');
|
|
} else {
|
|
switch (c) {
|
|
case 'k':
|
|
case 'K':
|
|
result *= 1024;
|
|
units_done = 1;
|
|
break;
|
|
case 'm':
|
|
case 'M':
|
|
result *= (1024*1024);
|
|
units_done = 1;
|
|
break;
|
|
case 'g':
|
|
case 'G':
|
|
result *= (1024*1024*1024);
|
|
units_done = 1;
|
|
break;
|
|
default:
|
|
return (0);
|
|
}
|
|
}
|
|
}
|
|
|
|
*out = result;
|
|
return (1);
|
|
}
|
|
|
|
|
|
static isc_boolean_t
|
|
is_ip6addr(const char *string, struct in6_addr *addr)
|
|
{
|
|
#if 1
|
|
/* XXX this need to be properly fixed for IPv6 */
|
|
if (inet_pton(AF_INET6, string, addr) != 1) {
|
|
return ISC_FALSE;
|
|
}
|
|
return ISC_TRUE;
|
|
#else
|
|
(void)string;
|
|
(void)addr;
|
|
return ISC_FALSE;
|
|
#endif
|
|
}
|
|
|
|
|
|
|
|
static isc_boolean_t
|
|
is_ip4addr(const char *string, struct in_addr *addr)
|
|
{
|
|
char addrbuf[sizeof "xxx.xxx.xxx.xxx" + 1];
|
|
const char *p = string;
|
|
int dots = 0;
|
|
char dot = '.';
|
|
|
|
while (*p) {
|
|
if (!isdigit(*p) && *p != dot) {
|
|
return (ISC_FALSE);
|
|
} else if (!isdigit(*p)) {
|
|
dots++;
|
|
}
|
|
p++;
|
|
}
|
|
|
|
if (dots > 3) {
|
|
return (ISC_FALSE);
|
|
} else if (dots < 3) {
|
|
if (dots == 1) {
|
|
if (strlen(string) + 5 <= sizeof (addrbuf)) {
|
|
strcpy(addrbuf, string);
|
|
strcat(addrbuf, ".0.0");
|
|
} else {
|
|
return (ISC_FALSE);
|
|
}
|
|
} else if (dots == 2) {
|
|
if (strlen(string) + 3 <= sizeof (addrbuf)) {
|
|
strcpy(addrbuf, string);
|
|
strcat(addrbuf, ".0");
|
|
} else {
|
|
return (ISC_FALSE);
|
|
}
|
|
}
|
|
} else if (strlen(string) < sizeof addrbuf) {
|
|
strcpy (addrbuf, string);
|
|
} else {
|
|
return (ISC_FALSE);
|
|
}
|
|
|
|
if (inet_pton(AF_INET, addrbuf, addr) != 1) {
|
|
return ISC_FALSE;
|
|
}
|
|
return ISC_TRUE;
|
|
}
|