2 * Copyright (C) 2004-2012 Internet Systems Consortium, Inc. ("ISC")
3 * Copyright (C) 2002, 2003 Internet Software Consortium.
5 * Permission to use, copy, modify, and/or distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
9 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15 * PERFORMANCE OF THIS SOFTWARE.
26 #include <isc/result.h>
27 #include <isc/string.h>
30 #include <isccfg/cfg.h>
31 #include <isccfg/grammar.h>
32 #include <isccfg/log.h>
34 #define TOKEN_STRING(pctx) (pctx->token.value.as_textregion.base)
36 /*% Check a return value. */
39 if (result != ISC_R_SUCCESS) goto cleanup; \
42 /*% Clean up a configuration object if non-NULL. */
43 #define CLEANUP_OBJ(obj) \
44 do { if ((obj) != NULL) cfg_obj_destroy(pctx, &(obj)); } while (0)
48 * Forward declarations of static functions.
52 parse_enum_or_other(cfg_parser_t *pctx, const cfg_type_t *enumtype,
53 const cfg_type_t *othertype, cfg_obj_t **ret);
56 parse_keyvalue(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret);
59 parse_optional_keyvalue(cfg_parser_t *pctx, const cfg_type_t *type,
63 parse_updatepolicy(cfg_parser_t *pctx, const cfg_type_t *type,
66 print_updatepolicy(cfg_printer_t *pctx, const cfg_obj_t *obj);
69 doc_updatepolicy(cfg_printer_t *pctx, const cfg_type_t *type);
72 print_keyvalue(cfg_printer_t *pctx, const cfg_obj_t *obj);
75 doc_keyvalue(cfg_printer_t *pctx, const cfg_type_t *type);
78 doc_optional_keyvalue(cfg_printer_t *pctx, const cfg_type_t *type);
80 static cfg_type_t cfg_type_acl;
81 static cfg_type_t cfg_type_addrmatchelt;
82 static cfg_type_t cfg_type_bracketed_aml;
83 static cfg_type_t cfg_type_bracketed_namesockaddrkeylist;
84 static cfg_type_t cfg_type_bracketed_sockaddrlist;
85 static cfg_type_t cfg_type_bracketed_sockaddrnameportlist;
86 static cfg_type_t cfg_type_controls;
87 static cfg_type_t cfg_type_controls_sockaddr;
88 static cfg_type_t cfg_type_destinationlist;
89 static cfg_type_t cfg_type_dialuptype;
90 static cfg_type_t cfg_type_ixfrdifftype;
91 static cfg_type_t cfg_type_key;
92 static cfg_type_t cfg_type_logfile;
93 static cfg_type_t cfg_type_logging;
94 static cfg_type_t cfg_type_logseverity;
95 static cfg_type_t cfg_type_lwres;
96 static cfg_type_t cfg_type_masterselement;
97 static cfg_type_t cfg_type_nameportiplist;
98 static cfg_type_t cfg_type_negated;
99 static cfg_type_t cfg_type_notifytype;
100 static cfg_type_t cfg_type_optional_allow;
101 static cfg_type_t cfg_type_optional_class;
102 static cfg_type_t cfg_type_optional_facility;
103 static cfg_type_t cfg_type_optional_keyref;
104 static cfg_type_t cfg_type_optional_port;
105 static cfg_type_t cfg_type_options;
106 static cfg_type_t cfg_type_portiplist;
107 static cfg_type_t cfg_type_querysource4;
108 static cfg_type_t cfg_type_querysource6;
109 static cfg_type_t cfg_type_querysource;
110 static cfg_type_t cfg_type_server;
111 static cfg_type_t cfg_type_server_key_kludge;
112 static cfg_type_t cfg_type_size;
113 static cfg_type_t cfg_type_sizenodefault;
114 static cfg_type_t cfg_type_sockaddr4wild;
115 static cfg_type_t cfg_type_sockaddr6wild;
116 static cfg_type_t cfg_type_statschannels;
117 static cfg_type_t cfg_type_view;
118 static cfg_type_t cfg_type_viewopts;
119 static cfg_type_t cfg_type_zone;
120 static cfg_type_t cfg_type_zoneopts;
121 static cfg_type_t cfg_type_dynamically_loadable_zones;
122 static cfg_type_t cfg_type_dynamically_loadable_zones_opts;
123 static cfg_type_t cfg_type_v4_aaaa;
126 * Clauses that can be found in a 'dynamically loadable zones' statement
128 static cfg_clausedef_t
129 dynamically_loadable_zones_clauses[] = {
130 { "database", &cfg_type_astring, 0 },
135 * A dynamically loadable zones statement.
137 static cfg_tuplefielddef_t dynamically_loadable_zones_fields[] = {
138 { "name", &cfg_type_astring, 0 },
139 { "options", &cfg_type_dynamically_loadable_zones_opts, 0 },
143 static cfg_type_t cfg_type_dynamically_loadable_zones = {
144 "dlz", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
146 dynamically_loadable_zones_fields
152 static cfg_tuplefielddef_t tkey_dhkey_fields[] = {
153 { "name", &cfg_type_qstring, 0 },
154 { "keyid", &cfg_type_uint32, 0 },
158 static cfg_type_t cfg_type_tkey_dhkey = {
159 "tkey-dhkey", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple, &cfg_rep_tuple,
165 static cfg_tuplefielddef_t listenon_fields[] = {
166 { "port", &cfg_type_optional_port, 0 },
167 { "acl", &cfg_type_bracketed_aml, 0 },
170 static cfg_type_t cfg_type_listenon = {
171 "listenon", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple, &cfg_rep_tuple, listenon_fields };
175 static cfg_tuplefielddef_t acl_fields[] = {
176 { "name", &cfg_type_astring, 0 },
177 { "value", &cfg_type_bracketed_aml, 0 },
181 static cfg_type_t cfg_type_acl = {
182 "acl", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple, &cfg_rep_tuple, acl_fields };
185 static cfg_tuplefielddef_t masters_fields[] = {
186 { "name", &cfg_type_astring, 0 },
187 { "port", &cfg_type_optional_port, 0 },
188 { "addresses", &cfg_type_bracketed_namesockaddrkeylist, 0 },
192 static cfg_type_t cfg_type_masters = {
193 "masters", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple, &cfg_rep_tuple, masters_fields };
196 * "sockaddrkeylist", a list of socket addresses with optional keys
197 * and an optional default port, as used in the masters option.
199 * "port 1234 { mymasters; 10.0.0.1 key foo; 1::2 port 69; }"
202 static cfg_tuplefielddef_t namesockaddrkey_fields[] = {
203 { "masterselement", &cfg_type_masterselement, 0 },
204 { "key", &cfg_type_optional_keyref, 0 },
208 static cfg_type_t cfg_type_namesockaddrkey = {
209 "namesockaddrkey", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple, &cfg_rep_tuple,
210 namesockaddrkey_fields
213 static cfg_type_t cfg_type_bracketed_namesockaddrkeylist = {
214 "bracketed_namesockaddrkeylist", cfg_parse_bracketed_list,
215 cfg_print_bracketed_list, cfg_doc_bracketed_list, &cfg_rep_list, &cfg_type_namesockaddrkey
218 static cfg_tuplefielddef_t namesockaddrkeylist_fields[] = {
219 { "port", &cfg_type_optional_port, 0 },
220 { "addresses", &cfg_type_bracketed_namesockaddrkeylist, 0 },
223 static cfg_type_t cfg_type_namesockaddrkeylist = {
224 "sockaddrkeylist", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple, &cfg_rep_tuple,
225 namesockaddrkeylist_fields
229 * A list of socket addresses with an optional default port,
230 * as used in the also-notify option. E.g.,
231 * "port 1234 { 10.0.0.1; 1::2 port 69; }"
233 static cfg_tuplefielddef_t portiplist_fields[] = {
234 { "port", &cfg_type_optional_port, 0 },
235 { "addresses", &cfg_type_bracketed_sockaddrlist, 0 },
238 static cfg_type_t cfg_type_portiplist = {
239 "portiplist", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple, &cfg_rep_tuple,
244 * A public key, as in the "pubkey" statement.
246 static cfg_tuplefielddef_t pubkey_fields[] = {
247 { "flags", &cfg_type_uint32, 0 },
248 { "protocol", &cfg_type_uint32, 0 },
249 { "algorithm", &cfg_type_uint32, 0 },
250 { "key", &cfg_type_qstring, 0 },
253 static cfg_type_t cfg_type_pubkey = {
254 "pubkey", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
255 &cfg_rep_tuple, pubkey_fields };
258 * A list of RR types, used in grant statements.
259 * Note that the old parser allows quotes around the RR type names.
261 static cfg_type_t cfg_type_rrtypelist = {
262 "rrtypelist", cfg_parse_spacelist, cfg_print_spacelist,
263 cfg_doc_terminal, &cfg_rep_list, &cfg_type_astring
266 static const char *mode_enums[] = { "grant", "deny", NULL };
267 static cfg_type_t cfg_type_mode = {
268 "mode", cfg_parse_enum, cfg_print_ustring, cfg_doc_enum,
269 &cfg_rep_string, &mode_enums
273 parse_matchtype(cfg_parser_t *pctx, const cfg_type_t *type,
277 CHECK(cfg_peektoken(pctx, 0));
278 if (pctx->token.type == isc_tokentype_string &&
279 strcasecmp(TOKEN_STRING(pctx), "zonesub") == 0) {
280 pctx->flags |= CFG_PCTX_SKIP;
282 return (cfg_parse_enum(pctx, type, ret));
289 parse_matchname(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret) {
291 cfg_obj_t *obj = NULL;
293 if ((pctx->flags & CFG_PCTX_SKIP) != 0) {
294 pctx->flags &= ~CFG_PCTX_SKIP;
295 CHECK(cfg_parse_void(pctx, NULL, &obj));
297 result = cfg_parse_astring(pctx, type, &obj);
305 doc_matchname(cfg_printer_t *pctx, const cfg_type_t *type) {
306 cfg_print_chars(pctx, "[ ", 2);
307 cfg_doc_obj(pctx, type->of);
308 cfg_print_chars(pctx, " ]", 2);
311 static const char *matchtype_enums[] = {
312 "name", "subdomain", "wildcard", "self", "selfsub", "selfwild",
313 "krb5-self", "ms-self", "krb5-subdomain", "ms-subdomain",
314 "tcp-self", "6to4-self", "zonesub", "external", NULL };
316 static cfg_type_t cfg_type_matchtype = {
317 "matchtype", parse_matchtype, cfg_print_ustring,
318 cfg_doc_enum, &cfg_rep_string, &matchtype_enums
321 static cfg_type_t cfg_type_matchname = {
322 "optional_matchname", parse_matchname, cfg_print_ustring,
323 &doc_matchname, &cfg_rep_tuple, &cfg_type_ustring
327 * A grant statement, used in the update policy.
329 static cfg_tuplefielddef_t grant_fields[] = {
330 { "mode", &cfg_type_mode, 0 },
331 { "identity", &cfg_type_astring, 0 }, /* domain name */
332 { "matchtype", &cfg_type_matchtype, 0 },
333 { "name", &cfg_type_matchname, 0 }, /* domain name */
334 { "types", &cfg_type_rrtypelist, 0 },
337 static cfg_type_t cfg_type_grant = {
338 "grant", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
339 &cfg_rep_tuple, grant_fields
342 static cfg_type_t cfg_type_updatepolicy = {
343 "update_policy", parse_updatepolicy, print_updatepolicy,
344 doc_updatepolicy, &cfg_rep_list, &cfg_type_grant
348 parse_updatepolicy(cfg_parser_t *pctx, const cfg_type_t *type,
351 CHECK(cfg_gettoken(pctx, 0));
352 if (pctx->token.type == isc_tokentype_special &&
353 pctx->token.value.as_char == '{') {
354 cfg_ungettoken(pctx);
355 return (cfg_parse_bracketed_list(pctx, type, ret));
358 if (pctx->token.type == isc_tokentype_string &&
359 strcasecmp(TOKEN_STRING(pctx), "local") == 0) {
360 cfg_obj_t *obj = NULL;
361 CHECK(cfg_create_obj(pctx, &cfg_type_ustring, &obj));
362 obj->value.string.length = strlen("local");
363 obj->value.string.base = isc_mem_get(pctx->mctx,
364 obj->value.string.length + 1);
365 if (obj->value.string.base == NULL) {
366 isc_mem_put(pctx->mctx, obj, sizeof(*obj));
367 return (ISC_R_NOMEMORY);
369 memcpy(obj->value.string.base, "local", 5);
370 obj->value.string.base[5] = '\0';
372 return (ISC_R_SUCCESS);
375 cfg_ungettoken(pctx);
376 return (ISC_R_UNEXPECTEDTOKEN);
383 print_updatepolicy(cfg_printer_t *pctx, const cfg_obj_t *obj) {
384 if (cfg_obj_isstring(obj))
385 cfg_print_ustring(pctx, obj);
387 cfg_print_bracketed_list(pctx, obj);
391 doc_updatepolicy(cfg_printer_t *pctx, const cfg_type_t *type) {
392 cfg_print_cstr(pctx, "( local | { ");
393 cfg_doc_obj(pctx, type->of);
394 cfg_print_cstr(pctx, "; ... }");
400 static cfg_tuplefielddef_t view_fields[] = {
401 { "name", &cfg_type_astring, 0 },
402 { "class", &cfg_type_optional_class, 0 },
403 { "options", &cfg_type_viewopts, 0 },
406 static cfg_type_t cfg_type_view = {
407 "view", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
408 &cfg_rep_tuple, view_fields
414 static cfg_tuplefielddef_t zone_fields[] = {
415 { "name", &cfg_type_astring, 0 },
416 { "class", &cfg_type_optional_class, 0 },
417 { "options", &cfg_type_zoneopts, 0 },
420 static cfg_type_t cfg_type_zone = {
421 "zone", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
422 &cfg_rep_tuple, zone_fields
426 * A "category" clause in the "logging" statement.
428 static cfg_tuplefielddef_t category_fields[] = {
429 { "name", &cfg_type_astring, 0 },
430 { "destinations", &cfg_type_destinationlist,0 },
433 static cfg_type_t cfg_type_category = {
434 "category", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
435 &cfg_rep_tuple, category_fields
440 * A dnssec key, as used in the "trusted-keys" statement.
442 static cfg_tuplefielddef_t dnsseckey_fields[] = {
443 { "name", &cfg_type_astring, 0 },
444 { "flags", &cfg_type_uint32, 0 },
445 { "protocol", &cfg_type_uint32, 0 },
446 { "algorithm", &cfg_type_uint32, 0 },
447 { "key", &cfg_type_qstring, 0 },
450 static cfg_type_t cfg_type_dnsseckey = {
451 "dnsseckey", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
452 &cfg_rep_tuple, dnsseckey_fields
456 * A managed key initialization specifier, as used in the
457 * "managed-keys" statement.
459 static cfg_tuplefielddef_t managedkey_fields[] = {
460 { "name", &cfg_type_astring, 0 },
461 { "init", &cfg_type_ustring, 0 }, /* must be literal "initial-key" */
462 { "flags", &cfg_type_uint32, 0 },
463 { "protocol", &cfg_type_uint32, 0 },
464 { "algorithm", &cfg_type_uint32, 0 },
465 { "key", &cfg_type_qstring, 0 },
468 static cfg_type_t cfg_type_managedkey = {
469 "managedkey", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
470 &cfg_rep_tuple, managedkey_fields
473 static keyword_type_t wild_class_kw = { "class", &cfg_type_ustring };
475 static cfg_type_t cfg_type_optional_wild_class = {
476 "optional_wild_class", parse_optional_keyvalue, print_keyvalue,
477 doc_optional_keyvalue, &cfg_rep_string, &wild_class_kw
480 static keyword_type_t wild_type_kw = { "type", &cfg_type_ustring };
482 static cfg_type_t cfg_type_optional_wild_type = {
483 "optional_wild_type", parse_optional_keyvalue,
484 print_keyvalue, doc_optional_keyvalue, &cfg_rep_string, &wild_type_kw
487 static keyword_type_t wild_name_kw = { "name", &cfg_type_qstring };
489 static cfg_type_t cfg_type_optional_wild_name = {
490 "optional_wild_name", parse_optional_keyvalue,
491 print_keyvalue, doc_optional_keyvalue, &cfg_rep_string, &wild_name_kw
495 * An rrset ordering element.
497 static cfg_tuplefielddef_t rrsetorderingelement_fields[] = {
498 { "class", &cfg_type_optional_wild_class, 0 },
499 { "type", &cfg_type_optional_wild_type, 0 },
500 { "name", &cfg_type_optional_wild_name, 0 },
501 { "order", &cfg_type_ustring, 0 }, /* must be literal "order" */
502 { "ordering", &cfg_type_ustring, 0 },
505 static cfg_type_t cfg_type_rrsetorderingelement = {
506 "rrsetorderingelement", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple, &cfg_rep_tuple,
507 rrsetorderingelement_fields
511 * A global or view "check-names" option. Note that the zone
512 * "check-names" option has a different syntax.
515 static const char *checktype_enums[] = { "master", "slave", "response", NULL };
516 static cfg_type_t cfg_type_checktype = {
517 "checktype", cfg_parse_enum, cfg_print_ustring, cfg_doc_enum,
518 &cfg_rep_string, &checktype_enums
521 static const char *checkmode_enums[] = { "fail", "warn", "ignore", NULL };
522 static cfg_type_t cfg_type_checkmode = {
523 "checkmode", cfg_parse_enum, cfg_print_ustring, cfg_doc_enum,
524 &cfg_rep_string, &checkmode_enums
527 static cfg_tuplefielddef_t checknames_fields[] = {
528 { "type", &cfg_type_checktype, 0 },
529 { "mode", &cfg_type_checkmode, 0 },
533 static cfg_type_t cfg_type_checknames = {
534 "checknames", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple, &cfg_rep_tuple,
538 static cfg_type_t cfg_type_bracketed_sockaddrlist = {
539 "bracketed_sockaddrlist", cfg_parse_bracketed_list, cfg_print_bracketed_list, cfg_doc_bracketed_list,
540 &cfg_rep_list, &cfg_type_sockaddr
543 static const char *autodnssec_enums[] = { "allow", "maintain", "off", NULL };
544 static cfg_type_t cfg_type_autodnssec = {
545 "autodnssec", cfg_parse_enum, cfg_print_ustring, cfg_doc_enum,
546 &cfg_rep_string, &autodnssec_enums
549 static cfg_type_t cfg_type_rrsetorder = {
550 "rrsetorder", cfg_parse_bracketed_list, cfg_print_bracketed_list, cfg_doc_bracketed_list,
551 &cfg_rep_list, &cfg_type_rrsetorderingelement
554 static keyword_type_t port_kw = { "port", &cfg_type_uint32 };
556 static cfg_type_t cfg_type_optional_port = {
557 "optional_port", parse_optional_keyvalue, print_keyvalue,
558 doc_optional_keyvalue, &cfg_rep_uint32, &port_kw
561 /*% A list of keys, as in the "key" clause of the controls statement. */
562 static cfg_type_t cfg_type_keylist = {
563 "keylist", cfg_parse_bracketed_list, cfg_print_bracketed_list,
564 cfg_doc_bracketed_list, &cfg_rep_list, &cfg_type_astring
567 /*% A list of dnssec keys, as in "trusted-keys" */
568 static cfg_type_t cfg_type_dnsseckeys = {
569 "dnsseckeys", cfg_parse_bracketed_list, cfg_print_bracketed_list,
570 cfg_doc_bracketed_list, &cfg_rep_list, &cfg_type_dnsseckey
574 * A list of managed key entries, as in "trusted-keys". Currently
575 * (9.7.0) this has a format similar to dnssec keys, except the keyname
576 * is followed by the keyword "initial-key". In future releases, this
577 * keyword may take other values indicating different methods for the
578 * key to be initialized.
581 static cfg_type_t cfg_type_managedkeys = {
582 "managedkeys", cfg_parse_bracketed_list, cfg_print_bracketed_list,
583 cfg_doc_bracketed_list, &cfg_rep_list, &cfg_type_managedkey
586 static const char *forwardtype_enums[] = { "first", "only", NULL };
587 static cfg_type_t cfg_type_forwardtype = {
588 "forwardtype", cfg_parse_enum, cfg_print_ustring, cfg_doc_enum, &cfg_rep_string,
592 static const char *zonetype_enums[] = {
593 "master", "slave", "stub", "static-stub", "hint", "forward",
594 "delegation-only", NULL };
595 static cfg_type_t cfg_type_zonetype = {
596 "zonetype", cfg_parse_enum, cfg_print_ustring, cfg_doc_enum,
597 &cfg_rep_string, &zonetype_enums
600 static const char *loglevel_enums[] = {
601 "critical", "error", "warning", "notice", "info", "dynamic", NULL };
602 static cfg_type_t cfg_type_loglevel = {
603 "loglevel", cfg_parse_enum, cfg_print_ustring, cfg_doc_enum, &cfg_rep_string,
607 static const char *transferformat_enums[] = {
608 "many-answers", "one-answer", NULL };
609 static cfg_type_t cfg_type_transferformat = {
610 "transferformat", cfg_parse_enum, cfg_print_ustring, cfg_doc_enum, &cfg_rep_string,
611 &transferformat_enums
615 * The special keyword "none", as used in the pid-file option.
619 print_none(cfg_printer_t *pctx, const cfg_obj_t *obj) {
621 cfg_print_cstr(pctx, "none");
624 static cfg_type_t cfg_type_none = {
625 "none", NULL, print_none, NULL, &cfg_rep_void, NULL
629 * A quoted string or the special keyword "none". Used in the pid-file option.
632 parse_qstringornone(cfg_parser_t *pctx, const cfg_type_t *type,
637 CHECK(cfg_gettoken(pctx, CFG_LEXOPT_QSTRING));
638 if (pctx->token.type == isc_tokentype_string &&
639 strcasecmp(TOKEN_STRING(pctx), "none") == 0)
640 return (cfg_create_obj(pctx, &cfg_type_none, ret));
641 cfg_ungettoken(pctx);
642 return (cfg_parse_qstring(pctx, type, ret));
648 doc_qstringornone(cfg_printer_t *pctx, const cfg_type_t *type) {
650 cfg_print_cstr(pctx, "( <quoted_string> | none )");
653 static cfg_type_t cfg_type_qstringornone = {
654 "qstringornone", parse_qstringornone, NULL, doc_qstringornone,
659 * A boolean ("yes" or "no"), or the special keyword "auto".
660 * Used in the dnssec-validation option.
663 print_auto(cfg_printer_t *pctx, const cfg_obj_t *obj) {
665 cfg_print_cstr(pctx, "auto");
668 static cfg_type_t cfg_type_auto = {
669 "auto", NULL, print_auto, NULL, &cfg_rep_void, NULL
673 parse_boolorauto(cfg_parser_t *pctx, const cfg_type_t *type,
678 CHECK(cfg_gettoken(pctx, CFG_LEXOPT_QSTRING));
679 if (pctx->token.type == isc_tokentype_string &&
680 strcasecmp(TOKEN_STRING(pctx), "auto") == 0)
681 return (cfg_create_obj(pctx, &cfg_type_auto, ret));
682 cfg_ungettoken(pctx);
683 return (cfg_parse_boolean(pctx, type, ret));
689 print_boolorauto(cfg_printer_t *pctx, const cfg_obj_t *obj) {
690 if (obj->type->rep == &cfg_rep_void)
691 cfg_print_chars(pctx, "auto", 4);
692 else if (obj->value.boolean)
693 cfg_print_chars(pctx, "yes", 3);
695 cfg_print_chars(pctx, "no", 2);
699 doc_boolorauto(cfg_printer_t *pctx, const cfg_type_t *type) {
701 cfg_print_cstr(pctx, "( yes | no | auto )");
704 static cfg_type_t cfg_type_boolorauto = {
705 "boolorauto", parse_boolorauto, print_boolorauto,
706 doc_boolorauto, NULL, NULL
713 print_hostname(cfg_printer_t *pctx, const cfg_obj_t *obj) {
715 cfg_print_cstr(pctx, "hostname");
718 static cfg_type_t cfg_type_hostname = {
719 "hostname", NULL, print_hostname, NULL, &cfg_rep_boolean, NULL
723 * "server-id" argument.
727 parse_serverid(cfg_parser_t *pctx, const cfg_type_t *type,
731 CHECK(cfg_gettoken(pctx, CFG_LEXOPT_QSTRING));
732 if (pctx->token.type == isc_tokentype_string &&
733 strcasecmp(TOKEN_STRING(pctx), "none") == 0)
734 return (cfg_create_obj(pctx, &cfg_type_none, ret));
735 if (pctx->token.type == isc_tokentype_string &&
736 strcasecmp(TOKEN_STRING(pctx), "hostname") == 0) {
737 return (cfg_create_obj(pctx, &cfg_type_hostname, ret));
739 cfg_ungettoken(pctx);
740 return (cfg_parse_qstring(pctx, type, ret));
746 doc_serverid(cfg_printer_t *pctx, const cfg_type_t *type) {
748 cfg_print_cstr(pctx, "( <quoted_string> | none | hostname )");
751 static cfg_type_t cfg_type_serverid = {
752 "serverid", parse_serverid, NULL, doc_serverid, NULL, NULL };
757 static cfg_tuplefielddef_t porttuple_fields[] = {
758 { "loport", &cfg_type_uint32, 0 },
759 { "hiport", &cfg_type_uint32, 0 },
762 static cfg_type_t cfg_type_porttuple = {
763 "porttuple", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
764 &cfg_rep_tuple, porttuple_fields
768 parse_port(cfg_parser_t *pctx, cfg_obj_t **ret) {
771 CHECK(cfg_parse_uint32(pctx, NULL, ret));
772 if ((*ret)->value.uint32 > 0xffff) {
773 cfg_parser_error(pctx, CFG_LOG_NEAR, "invalid port");
774 cfg_obj_destroy(pctx, ret);
775 result = ISC_R_RANGE;
783 parse_portrange(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret) {
785 cfg_obj_t *obj = NULL;
789 CHECK(cfg_peektoken(pctx, ISC_LEXOPT_NUMBER | ISC_LEXOPT_CNUMBER));
790 if (pctx->token.type == isc_tokentype_number)
791 CHECK(parse_port(pctx, ret));
793 CHECK(cfg_gettoken(pctx, 0));
794 if (pctx->token.type != isc_tokentype_string ||
795 strcasecmp(TOKEN_STRING(pctx), "range") != 0) {
796 cfg_parser_error(pctx, CFG_LOG_NEAR,
797 "expected integer or 'range'");
798 return (ISC_R_UNEXPECTEDTOKEN);
800 CHECK(cfg_create_tuple(pctx, &cfg_type_porttuple, &obj));
801 CHECK(parse_port(pctx, &obj->value.tuple[0]));
802 CHECK(parse_port(pctx, &obj->value.tuple[1]));
803 if (obj->value.tuple[0]->value.uint32 >
804 obj->value.tuple[1]->value.uint32) {
805 cfg_parser_error(pctx, CFG_LOG_NOPREP,
806 "low port '%u' must not be larger "
808 obj->value.tuple[0]->value.uint32);
809 result = ISC_R_RANGE;
818 cfg_obj_destroy(pctx, &obj);
822 static cfg_type_t cfg_type_portrange = {
823 "portrange", parse_portrange, NULL, cfg_doc_terminal,
827 static cfg_type_t cfg_type_bracketed_portlist = {
828 "bracketed_sockaddrlist", cfg_parse_bracketed_list,
829 cfg_print_bracketed_list, cfg_doc_bracketed_list,
830 &cfg_rep_list, &cfg_type_portrange
834 * Clauses that can be found within the top level of the named.conf
837 static cfg_clausedef_t
838 namedconf_clauses[] = {
839 { "options", &cfg_type_options, 0 },
840 { "controls", &cfg_type_controls, CFG_CLAUSEFLAG_MULTI },
841 { "acl", &cfg_type_acl, CFG_CLAUSEFLAG_MULTI },
842 { "masters", &cfg_type_masters, CFG_CLAUSEFLAG_MULTI },
843 { "logging", &cfg_type_logging, 0 },
844 { "view", &cfg_type_view, CFG_CLAUSEFLAG_MULTI },
845 { "lwres", &cfg_type_lwres, CFG_CLAUSEFLAG_MULTI },
846 { "statistics-channels", &cfg_type_statschannels,
847 CFG_CLAUSEFLAG_MULTI },
852 * Clauses that can occur at the top level or in the view
853 * statement, but not in the options block.
855 static cfg_clausedef_t
856 namedconf_or_view_clauses[] = {
857 { "key", &cfg_type_key, CFG_CLAUSEFLAG_MULTI },
858 { "zone", &cfg_type_zone, CFG_CLAUSEFLAG_MULTI },
859 /* only 1 DLZ per view allowed */
860 { "dlz", &cfg_type_dynamically_loadable_zones, 0 },
861 { "server", &cfg_type_server, CFG_CLAUSEFLAG_MULTI },
862 { "trusted-keys", &cfg_type_dnsseckeys, CFG_CLAUSEFLAG_MULTI },
863 { "managed-keys", &cfg_type_managedkeys, CFG_CLAUSEFLAG_MULTI },
868 * Clauses that can occur in the bind.keys file.
870 static cfg_clausedef_t
871 bindkeys_clauses[] = {
872 { "trusted-keys", &cfg_type_dnsseckeys, CFG_CLAUSEFLAG_MULTI },
873 { "managed-keys", &cfg_type_managedkeys, CFG_CLAUSEFLAG_MULTI },
878 * Clauses that can be found within the 'options' statement.
880 static cfg_clausedef_t
881 options_clauses[] = {
882 { "avoid-v4-udp-ports", &cfg_type_bracketed_portlist, 0 },
883 { "avoid-v6-udp-ports", &cfg_type_bracketed_portlist, 0 },
884 { "bindkeys-file", &cfg_type_qstring, 0 },
885 { "blackhole", &cfg_type_bracketed_aml, 0 },
886 { "coresize", &cfg_type_size, 0 },
887 { "datasize", &cfg_type_size, 0 },
888 { "session-keyfile", &cfg_type_qstringornone, 0 },
889 { "session-keyname", &cfg_type_astring, 0 },
890 { "session-keyalg", &cfg_type_astring, 0 },
891 { "deallocate-on-exit", &cfg_type_boolean, CFG_CLAUSEFLAG_OBSOLETE },
892 { "directory", &cfg_type_qstring, CFG_CLAUSEFLAG_CALLBACK },
893 { "dump-file", &cfg_type_qstring, 0 },
894 { "fake-iquery", &cfg_type_boolean, CFG_CLAUSEFLAG_OBSOLETE },
895 { "files", &cfg_type_size, 0 },
896 { "flush-zones-on-shutdown", &cfg_type_boolean, 0 },
897 { "has-old-clients", &cfg_type_boolean, CFG_CLAUSEFLAG_OBSOLETE },
898 { "heartbeat-interval", &cfg_type_uint32, 0 },
899 { "host-statistics", &cfg_type_boolean, CFG_CLAUSEFLAG_NOTIMP },
900 { "host-statistics-max", &cfg_type_uint32, CFG_CLAUSEFLAG_NOTIMP },
901 { "hostname", &cfg_type_qstringornone, 0 },
902 { "interface-interval", &cfg_type_uint32, 0 },
903 { "listen-on", &cfg_type_listenon, CFG_CLAUSEFLAG_MULTI },
904 { "listen-on-v6", &cfg_type_listenon, CFG_CLAUSEFLAG_MULTI },
905 { "managed-keys-directory", &cfg_type_qstring, 0 },
906 { "match-mapped-addresses", &cfg_type_boolean, 0 },
907 { "memstatistics-file", &cfg_type_qstring, 0 },
908 { "memstatistics", &cfg_type_boolean, 0 },
909 { "multiple-cnames", &cfg_type_boolean, CFG_CLAUSEFLAG_OBSOLETE },
910 { "named-xfer", &cfg_type_qstring, CFG_CLAUSEFLAG_OBSOLETE },
911 { "pid-file", &cfg_type_qstringornone, 0 },
912 { "port", &cfg_type_uint32, 0 },
913 { "querylog", &cfg_type_boolean, 0 },
914 { "recursing-file", &cfg_type_qstring, 0 },
915 { "random-device", &cfg_type_qstring, 0 },
916 { "recursive-clients", &cfg_type_uint32, 0 },
917 { "reserved-sockets", &cfg_type_uint32, 0 },
918 { "secroots-file", &cfg_type_qstring, 0 },
919 { "serial-queries", &cfg_type_uint32, CFG_CLAUSEFLAG_OBSOLETE },
920 { "serial-query-rate", &cfg_type_uint32, 0 },
921 { "server-id", &cfg_type_serverid, 0 },
922 { "stacksize", &cfg_type_size, 0 },
923 { "statistics-file", &cfg_type_qstring, 0 },
924 { "statistics-interval", &cfg_type_uint32, CFG_CLAUSEFLAG_NYI },
925 { "tcp-clients", &cfg_type_uint32, 0 },
926 { "tcp-listen-queue", &cfg_type_uint32, 0 },
927 { "tkey-dhkey", &cfg_type_tkey_dhkey, 0 },
928 { "tkey-gssapi-credential", &cfg_type_qstring, 0 },
929 { "tkey-gssapi-keytab", &cfg_type_qstring, 0 },
930 { "tkey-domain", &cfg_type_qstring, 0 },
931 { "transfers-per-ns", &cfg_type_uint32, 0 },
932 { "transfers-in", &cfg_type_uint32, 0 },
933 { "transfers-out", &cfg_type_uint32, 0 },
934 { "treat-cr-as-space", &cfg_type_boolean, CFG_CLAUSEFLAG_OBSOLETE },
935 { "use-id-pool", &cfg_type_boolean, CFG_CLAUSEFLAG_OBSOLETE },
936 { "use-ixfr", &cfg_type_boolean, 0 },
937 { "use-v4-udp-ports", &cfg_type_bracketed_portlist, 0 },
938 { "use-v6-udp-ports", &cfg_type_bracketed_portlist, 0 },
939 { "version", &cfg_type_qstringornone, 0 },
943 static cfg_type_t cfg_type_namelist = {
944 "namelist", cfg_parse_bracketed_list, cfg_print_bracketed_list,
945 cfg_doc_bracketed_list, &cfg_rep_list, &cfg_type_qstring };
947 static keyword_type_t exclude_kw = { "exclude", &cfg_type_namelist };
949 static cfg_type_t cfg_type_optional_exclude = {
950 "optional_exclude", parse_optional_keyvalue, print_keyvalue,
951 doc_optional_keyvalue, &cfg_rep_list, &exclude_kw };
953 static keyword_type_t exceptionnames_kw = { "except-from", &cfg_type_namelist };
955 static cfg_type_t cfg_type_optional_exceptionnames = {
956 "optional_allow", parse_optional_keyvalue, print_keyvalue,
957 doc_optional_keyvalue, &cfg_rep_list, &exceptionnames_kw };
959 static cfg_tuplefielddef_t denyaddresses_fields[] = {
960 { "acl", &cfg_type_bracketed_aml, 0 },
961 { "except-from", &cfg_type_optional_exceptionnames, 0 },
965 static cfg_type_t cfg_type_denyaddresses = {
966 "denyaddresses", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
967 &cfg_rep_tuple, denyaddresses_fields
970 static cfg_tuplefielddef_t denyaliases_fields[] = {
971 { "name", &cfg_type_namelist, 0 },
972 { "except-from", &cfg_type_optional_exceptionnames, 0 },
976 static cfg_type_t cfg_type_denyaliases = {
977 "denyaliases", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
978 &cfg_rep_tuple, denyaliases_fields
981 static cfg_type_t cfg_type_algorithmlist = {
982 "algorithmlist", cfg_parse_bracketed_list, cfg_print_bracketed_list,
983 cfg_doc_bracketed_list, &cfg_rep_list, &cfg_type_astring };
985 static cfg_tuplefielddef_t disablealgorithm_fields[] = {
986 { "name", &cfg_type_astring, 0 },
987 { "algorithms", &cfg_type_algorithmlist, 0 },
991 static cfg_type_t cfg_type_disablealgorithm = {
992 "disablealgorithm", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
993 &cfg_rep_tuple, disablealgorithm_fields
996 static cfg_tuplefielddef_t mustbesecure_fields[] = {
997 { "name", &cfg_type_astring, 0 },
998 { "value", &cfg_type_boolean, 0 },
1002 static cfg_type_t cfg_type_mustbesecure = {
1003 "mustbesecure", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
1004 &cfg_rep_tuple, mustbesecure_fields
1007 static const char *masterformat_enums[] = { "text", "raw", NULL };
1008 static cfg_type_t cfg_type_masterformat = {
1009 "masterformat", cfg_parse_enum, cfg_print_ustring, cfg_doc_enum,
1010 &cfg_rep_string, &masterformat_enums
1017 * zone <string> [ policy (given|disabled|passthru|
1018 * nxdomain|nodata|cname <domain> ) ]
1019 * [ recursive-only yes|no ]
1020 * [ max-policy-ttl number ] ;
1021 * } [ recursive-only yes|no ] [ break-dnssec yes|no ]
1022 * [ max-policy-ttl number ] ;
1026 doc_rpz_policy(cfg_printer_t *pctx, const cfg_type_t *type) {
1027 const char * const *p;
1029 * This is cfg_doc_enum() without the trailing " )".
1031 cfg_print_chars(pctx, "( ", 2);
1032 for (p = type->of; *p != NULL; p++) {
1033 cfg_print_cstr(pctx, *p);
1035 cfg_print_chars(pctx, " | ", 3);
1040 doc_rpz_cname(cfg_printer_t *pctx, const cfg_type_t *type) {
1041 cfg_doc_terminal(pctx, type);
1042 cfg_print_chars(pctx, " )", 2);
1047 * given|disabled|passthru|nxdomain|nodata|cname <domain>
1050 cfg_parse_rpz_policy(cfg_parser_t *pctx, const cfg_type_t *type,
1053 isc_result_t result;
1055 const cfg_tuplefielddef_t *fields;
1057 CHECK(cfg_create_tuple(pctx, type, &obj));
1060 CHECK(cfg_parse_obj(pctx, fields[0].type, &obj->value.tuple[0]));
1062 * parse cname domain only after "policy cname"
1064 if (strcasecmp("cname", cfg_obj_asstring(obj->value.tuple[0])) != 0) {
1065 CHECK(cfg_parse_void(pctx, NULL, &obj->value.tuple[1]));
1067 CHECK(cfg_parse_obj(pctx, fields[1].type,
1068 &obj->value.tuple[1]));
1072 return (ISC_R_SUCCESS);
1080 * Parse a tuple consisting of any kind of required field followed
1081 * by 2 or more optional keyvalues that can be in any order.
1084 cfg_parse_kv_tuple(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret) {
1085 const cfg_tuplefielddef_t *fields, *f;
1088 isc_result_t result;
1091 CHECK(cfg_create_tuple(pctx, type, &obj));
1094 * The zone first field is required and always first.
1097 CHECK(cfg_parse_obj(pctx, fields[0].type, &obj->value.tuple[0]));
1100 CHECK(cfg_peektoken(pctx, CFG_LEXOPT_QSTRING));
1101 if (pctx->token.type != isc_tokentype_string)
1104 for (fn = 1, f = &fields[1]; ; ++fn, ++f) {
1105 if (f->name == NULL) {
1106 cfg_parser_error(pctx, 0, "unexpected '%s'",
1107 TOKEN_STRING(pctx));
1108 result = ISC_R_UNEXPECTEDTOKEN;
1111 if (obj->value.tuple[fn] == NULL &&
1112 strcasecmp(f->name, TOKEN_STRING(pctx)) == 0)
1116 CHECK(cfg_gettoken(pctx, 0));
1117 CHECK(cfg_parse_obj(pctx, f->type, &obj->value.tuple[fn]));
1120 for (fn = 1, f = &fields[1]; f->name != NULL; ++fn, ++f) {
1121 if (obj->value.tuple[fn] == NULL)
1122 CHECK(cfg_parse_void(pctx, NULL,
1123 &obj->value.tuple[fn]));
1127 return (ISC_R_SUCCESS);
1135 cfg_print_kv_tuple(cfg_printer_t *pctx, const cfg_obj_t *obj) {
1137 const cfg_tuplefielddef_t *fields, *f;
1138 const cfg_obj_t *fieldobj;
1140 fields = obj->type->of;
1141 for (f = fields, i = 0; f->name != NULL; f++, i++) {
1142 fieldobj = obj->value.tuple[i];
1143 if (fieldobj->type->print == cfg_print_void)
1146 cfg_print_chars(pctx, " ", 1);
1147 cfg_print_cstr(pctx, f->name);
1148 cfg_print_chars(pctx, " ", 1);
1150 cfg_print_obj(pctx, fieldobj);
1155 cfg_doc_kv_tuple(cfg_printer_t *pctx, const cfg_type_t *type) {
1156 const cfg_tuplefielddef_t *fields, *f;
1159 for (f = fields; f->name != NULL; f++) {
1161 cfg_print_chars(pctx, " [ ", 3);
1162 cfg_print_cstr(pctx, f->name);
1163 if (f->type->doc != cfg_doc_void)
1164 cfg_print_chars(pctx, " ", 1);
1166 cfg_doc_obj(pctx, f->type);
1168 cfg_print_chars(pctx, " ]", 2);
1172 static keyword_type_t zone_kw = {"zone", &cfg_type_qstring};
1173 static cfg_type_t cfg_type_rpz_zone = {
1174 "zone", parse_keyvalue, print_keyvalue,
1175 doc_keyvalue, &cfg_rep_string,
1178 static const char *rpz_policies[] = {
1179 "given", "disabled", "passthru", "no-op", "nxdomain", "nodata",
1182 static cfg_type_t cfg_type_rpz_policy_name = {
1183 "policy name", cfg_parse_enum, cfg_print_ustring,
1184 doc_rpz_policy, &cfg_rep_string,
1187 static cfg_type_t cfg_type_rpz_cname = {
1188 "quoted_string", cfg_parse_astring, NULL,
1189 doc_rpz_cname, &cfg_rep_string,
1192 static cfg_tuplefielddef_t rpz_policy_fields[] = {
1193 { "policy name", &cfg_type_rpz_policy_name, 0 },
1194 { "cname", &cfg_type_rpz_cname, 0 },
1197 static cfg_type_t cfg_type_rpz_policy = {
1198 "policy tuple", cfg_parse_rpz_policy,
1199 cfg_print_tuple, cfg_doc_tuple, &cfg_rep_tuple,
1202 static cfg_tuplefielddef_t rpz_zone_fields[] = {
1203 { "zone name", &cfg_type_rpz_zone, 0 },
1204 { "policy", &cfg_type_rpz_policy, 0 },
1205 { "recursive-only", &cfg_type_boolean, 0 },
1206 { "max-policy-ttl", &cfg_type_uint32, 0 },
1209 static cfg_type_t cfg_type_rpz_tuple = {
1210 "rpz tuple", cfg_parse_kv_tuple,
1211 cfg_print_kv_tuple, cfg_doc_kv_tuple, &cfg_rep_tuple,
1214 static cfg_type_t cfg_type_rpz_list = {
1215 "zone list", cfg_parse_bracketed_list, cfg_print_bracketed_list,
1216 cfg_doc_bracketed_list, &cfg_rep_list,
1219 static cfg_tuplefielddef_t rpz_fields[] = {
1220 { "zone list", &cfg_type_rpz_list, 0 },
1221 { "recursive-only", &cfg_type_boolean, 0 },
1222 { "break-dnssec", &cfg_type_boolean, 0 },
1223 { "max-policy-ttl", &cfg_type_uint32, 0 },
1226 static cfg_type_t cfg_type_rpz = {
1227 "rpz", cfg_parse_kv_tuple,
1228 cfg_print_kv_tuple, cfg_doc_kv_tuple, &cfg_rep_tuple,
1238 print_lookaside(cfg_printer_t *pctx, const cfg_obj_t *obj)
1240 const cfg_obj_t *domain = obj->value.tuple[0];
1242 if (domain->value.string.length == 4 &&
1243 strncmp(domain->value.string.base, "auto", 4) == 0)
1244 cfg_print_cstr(pctx, "auto");
1246 cfg_print_tuple(pctx, obj);
1250 doc_lookaside(cfg_printer_t *pctx, const cfg_type_t *type) {
1252 cfg_print_cstr(pctx, "( <string> trust-anchor <string> | auto | no )");
1255 static keyword_type_t trustanchor_kw = { "trust-anchor", &cfg_type_astring };
1257 static cfg_type_t cfg_type_optional_trustanchor = {
1258 "optional_trustanchor", parse_optional_keyvalue, print_keyvalue,
1259 doc_keyvalue, &cfg_rep_string, &trustanchor_kw
1262 static cfg_tuplefielddef_t lookaside_fields[] = {
1263 { "domain", &cfg_type_astring, 0 },
1264 { "trust-anchor", &cfg_type_optional_trustanchor, 0 },
1268 static cfg_type_t cfg_type_lookaside = {
1269 "lookaside", cfg_parse_tuple, print_lookaside, doc_lookaside,
1270 &cfg_rep_tuple, lookaside_fields
1276 static cfg_clausedef_t
1278 { "clients", &cfg_type_bracketed_aml, 0 },
1279 { "mapped", &cfg_type_bracketed_aml, 0 },
1280 { "exclude", &cfg_type_bracketed_aml, 0 },
1281 { "suffix", &cfg_type_netaddr6, 0 },
1282 { "recursive-only", &cfg_type_boolean, 0 },
1283 { "break-dnssec", &cfg_type_boolean, 0 },
1287 static cfg_clausedef_t *
1288 dns64_clausesets[] = {
1293 static cfg_type_t cfg_type_dns64 = {
1294 "dns64", cfg_parse_netprefix_map, cfg_print_map, cfg_doc_map,
1295 &cfg_rep_map, dns64_clausesets
1299 * Clauses that can be found within the 'view' statement,
1300 * with defaults in the 'options' statement.
1303 static cfg_clausedef_t
1305 { "acache-cleaning-interval", &cfg_type_uint32, 0 },
1306 { "acache-enable", &cfg_type_boolean, 0 },
1307 { "additional-from-auth", &cfg_type_boolean, 0 },
1308 { "additional-from-cache", &cfg_type_boolean, 0 },
1309 { "allow-new-zones", &cfg_type_boolean, 0 },
1310 { "allow-query-cache", &cfg_type_bracketed_aml, 0 },
1311 { "allow-query-cache-on", &cfg_type_bracketed_aml, 0 },
1312 { "allow-recursion", &cfg_type_bracketed_aml, 0 },
1313 { "allow-recursion-on", &cfg_type_bracketed_aml, 0 },
1314 { "allow-v6-synthesis", &cfg_type_bracketed_aml,
1315 CFG_CLAUSEFLAG_OBSOLETE },
1316 { "attach-cache", &cfg_type_astring, 0 },
1317 { "auth-nxdomain", &cfg_type_boolean, CFG_CLAUSEFLAG_NEWDEFAULT },
1318 { "cache-file", &cfg_type_qstring, 0 },
1319 { "check-names", &cfg_type_checknames, CFG_CLAUSEFLAG_MULTI },
1320 { "cleaning-interval", &cfg_type_uint32, 0 },
1321 { "clients-per-query", &cfg_type_uint32, 0 },
1322 { "deny-answer-addresses", &cfg_type_denyaddresses, 0 },
1323 { "deny-answer-aliases", &cfg_type_denyaliases, 0 },
1324 { "disable-algorithms", &cfg_type_disablealgorithm,
1325 CFG_CLAUSEFLAG_MULTI },
1326 { "disable-empty-zone", &cfg_type_astring, CFG_CLAUSEFLAG_MULTI },
1327 { "dns64", &cfg_type_dns64, CFG_CLAUSEFLAG_MULTI },
1328 { "dns64-server", &cfg_type_astring, 0 },
1329 { "dns64-contact", &cfg_type_astring, 0 },
1330 { "dnssec-accept-expired", &cfg_type_boolean, 0 },
1331 { "dnssec-enable", &cfg_type_boolean, 0 },
1332 { "dnssec-lookaside", &cfg_type_lookaside, CFG_CLAUSEFLAG_MULTI },
1333 { "dnssec-must-be-secure", &cfg_type_mustbesecure,
1334 CFG_CLAUSEFLAG_MULTI },
1335 { "dnssec-validation", &cfg_type_boolorauto, 0 },
1336 { "dual-stack-servers", &cfg_type_nameportiplist, 0 },
1337 { "edns-udp-size", &cfg_type_uint32, 0 },
1338 { "empty-contact", &cfg_type_astring, 0 },
1339 { "empty-server", &cfg_type_astring, 0 },
1340 { "empty-zones-enable", &cfg_type_boolean, 0 },
1341 { "fetch-glue", &cfg_type_boolean, CFG_CLAUSEFLAG_OBSOLETE },
1342 { "ixfr-from-differences", &cfg_type_ixfrdifftype, 0 },
1343 { "lame-ttl", &cfg_type_uint32, 0 },
1344 { "max-acache-size", &cfg_type_sizenodefault, 0 },
1345 { "max-cache-size", &cfg_type_sizenodefault, 0 },
1346 { "max-cache-ttl", &cfg_type_uint32, 0 },
1347 { "max-clients-per-query", &cfg_type_uint32, 0 },
1348 { "max-ncache-ttl", &cfg_type_uint32, 0 },
1349 { "max-recursion-depth", &cfg_type_uint32, 0 },
1350 { "max-recursion-queries", &cfg_type_uint32, 0 },
1351 { "max-udp-size", &cfg_type_uint32, 0 },
1352 { "min-roots", &cfg_type_uint32, CFG_CLAUSEFLAG_NOTIMP },
1353 { "minimal-responses", &cfg_type_boolean, 0 },
1354 { "preferred-glue", &cfg_type_astring, 0 },
1355 { "provide-ixfr", &cfg_type_boolean, 0 },
1357 * Note that the query-source option syntax is different
1358 * from the other -source options.
1360 { "query-source", &cfg_type_querysource4, 0 },
1361 { "query-source-v6", &cfg_type_querysource6, 0 },
1362 { "queryport-pool-ports", &cfg_type_uint32, CFG_CLAUSEFLAG_OBSOLETE },
1363 { "queryport-pool-updateinterval", &cfg_type_uint32,
1364 CFG_CLAUSEFLAG_OBSOLETE },
1365 { "recursion", &cfg_type_boolean, 0 },
1366 { "request-ixfr", &cfg_type_boolean, 0 },
1367 { "request-nsid", &cfg_type_boolean, 0 },
1368 { "resolver-query-timeout", &cfg_type_uint32, 0 },
1369 { "rfc2308-type1", &cfg_type_boolean, CFG_CLAUSEFLAG_NYI },
1370 { "root-delegation-only", &cfg_type_optional_exclude, 0 },
1371 { "rrset-order", &cfg_type_rrsetorder, 0 },
1372 { "sortlist", &cfg_type_bracketed_aml, 0 },
1373 { "suppress-initial-notify", &cfg_type_boolean, CFG_CLAUSEFLAG_NYI },
1374 { "topology", &cfg_type_bracketed_aml, CFG_CLAUSEFLAG_NOTIMP },
1375 { "transfer-format", &cfg_type_transferformat, 0 },
1376 { "use-queryport-pool", &cfg_type_boolean, CFG_CLAUSEFLAG_OBSOLETE },
1377 { "zero-no-soa-ttl-cache", &cfg_type_boolean, 0 },
1378 #ifdef ALLOW_FILTER_AAAA_ON_V4
1379 { "filter-aaaa", &cfg_type_bracketed_aml, 0 },
1380 { "filter-aaaa-on-v4", &cfg_type_v4_aaaa, 0 },
1382 { "filter-aaaa", &cfg_type_bracketed_aml,
1383 CFG_CLAUSEFLAG_NOTCONFIGURED },
1384 { "filter-aaaa-on-v4", &cfg_type_v4_aaaa,
1385 CFG_CLAUSEFLAG_NOTCONFIGURED },
1387 { "response-policy", &cfg_type_rpz, 0 },
1392 * Clauses that can be found within the 'view' statement only.
1394 static cfg_clausedef_t
1395 view_only_clauses[] = {
1396 { "match-clients", &cfg_type_bracketed_aml, 0 },
1397 { "match-destinations", &cfg_type_bracketed_aml, 0 },
1398 { "match-recursive-only", &cfg_type_boolean, 0 },
1403 * Sig-validity-interval.
1406 parse_optional_uint32(cfg_parser_t *pctx, const cfg_type_t *type,
1409 isc_result_t result;
1412 CHECK(cfg_peektoken(pctx, ISC_LEXOPT_NUMBER | ISC_LEXOPT_CNUMBER));
1413 if (pctx->token.type == isc_tokentype_number) {
1414 CHECK(cfg_parse_obj(pctx, &cfg_type_uint32, ret));
1416 CHECK(cfg_parse_obj(pctx, &cfg_type_void, ret));
1423 doc_optional_uint32(cfg_printer_t *pctx, const cfg_type_t *type) {
1425 cfg_print_cstr(pctx, "[ <integer> ]");
1428 static cfg_type_t cfg_type_optional_uint32 = {
1429 "optional_uint32", parse_optional_uint32, NULL, doc_optional_uint32,
1432 static cfg_tuplefielddef_t validityinterval_fields[] = {
1433 { "validity", &cfg_type_uint32, 0 },
1434 { "re-sign", &cfg_type_optional_uint32, 0 },
1438 static cfg_type_t cfg_type_validityinterval = {
1439 "validityinterval", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
1440 &cfg_rep_tuple, validityinterval_fields
1444 * Clauses that can be found in a 'zone' statement,
1445 * with defaults in the 'view' or 'options' statement.
1447 static cfg_clausedef_t
1449 { "allow-notify", &cfg_type_bracketed_aml, 0 },
1450 { "allow-query", &cfg_type_bracketed_aml, 0 },
1451 { "allow-query-on", &cfg_type_bracketed_aml, 0 },
1452 { "allow-transfer", &cfg_type_bracketed_aml, 0 },
1453 { "allow-update", &cfg_type_bracketed_aml, 0 },
1454 { "allow-update-forwarding", &cfg_type_bracketed_aml, 0 },
1455 { "also-notify", &cfg_type_portiplist, 0 },
1456 { "alt-transfer-source", &cfg_type_sockaddr4wild, 0 },
1457 { "alt-transfer-source-v6", &cfg_type_sockaddr6wild, 0 },
1458 { "auto-dnssec", &cfg_type_autodnssec, 0 },
1459 { "check-dup-records", &cfg_type_checkmode, 0 },
1460 { "check-integrity", &cfg_type_boolean, 0 },
1461 { "check-mx", &cfg_type_checkmode, 0 },
1462 { "check-mx-cname", &cfg_type_checkmode, 0 },
1463 { "check-sibling", &cfg_type_boolean, 0 },
1464 { "check-srv-cname", &cfg_type_checkmode, 0 },
1465 { "check-wildcard", &cfg_type_boolean, 0 },
1466 { "dialup", &cfg_type_dialuptype, 0 },
1467 { "dnssec-dnskey-kskonly", &cfg_type_boolean, 0 },
1468 { "dnssec-secure-to-insecure", &cfg_type_boolean, 0 },
1469 { "forward", &cfg_type_forwardtype, 0 },
1470 { "forwarders", &cfg_type_portiplist, 0 },
1471 { "key-directory", &cfg_type_qstring, 0 },
1472 { "maintain-ixfr-base", &cfg_type_boolean, CFG_CLAUSEFLAG_OBSOLETE },
1473 { "masterfile-format", &cfg_type_masterformat, 0 },
1474 { "max-ixfr-log-size", &cfg_type_size, CFG_CLAUSEFLAG_OBSOLETE },
1475 { "max-journal-size", &cfg_type_sizenodefault, 0 },
1476 { "max-refresh-time", &cfg_type_uint32, 0 },
1477 { "max-retry-time", &cfg_type_uint32, 0 },
1478 { "max-transfer-idle-in", &cfg_type_uint32, 0 },
1479 { "max-transfer-idle-out", &cfg_type_uint32, 0 },
1480 { "max-transfer-time-in", &cfg_type_uint32, 0 },
1481 { "max-transfer-time-out", &cfg_type_uint32, 0 },
1482 { "min-refresh-time", &cfg_type_uint32, 0 },
1483 { "min-retry-time", &cfg_type_uint32, 0 },
1484 { "multi-master", &cfg_type_boolean, 0 },
1485 { "notify", &cfg_type_notifytype, 0 },
1486 { "notify-delay", &cfg_type_uint32, 0 },
1487 { "notify-source", &cfg_type_sockaddr4wild, 0 },
1488 { "notify-source-v6", &cfg_type_sockaddr6wild, 0 },
1489 { "notify-to-soa", &cfg_type_boolean, 0 },
1490 { "nsec3-test-zone", &cfg_type_boolean, CFG_CLAUSEFLAG_TESTONLY },
1491 { "sig-signing-nodes", &cfg_type_uint32, 0 },
1492 { "sig-signing-signatures", &cfg_type_uint32, 0 },
1493 { "sig-signing-type", &cfg_type_uint32, 0 },
1494 { "sig-validity-interval", &cfg_type_validityinterval, 0 },
1495 { "transfer-source", &cfg_type_sockaddr4wild, 0 },
1496 { "transfer-source-v6", &cfg_type_sockaddr6wild, 0 },
1497 { "try-tcp-refresh", &cfg_type_boolean, 0 },
1498 { "update-check-ksk", &cfg_type_boolean, 0 },
1499 { "use-alt-transfer-source", &cfg_type_boolean, 0 },
1500 { "zero-no-soa-ttl", &cfg_type_boolean, 0 },
1501 { "zone-statistics", &cfg_type_boolean, 0 },
1506 * Clauses that can be found in a 'zone' statement
1509 static cfg_clausedef_t
1510 zone_only_clauses[] = {
1511 { "type", &cfg_type_zonetype, 0 },
1512 { "file", &cfg_type_qstring, 0 },
1513 { "journal", &cfg_type_qstring, 0 },
1514 { "ixfr-base", &cfg_type_qstring, CFG_CLAUSEFLAG_OBSOLETE },
1515 { "ixfr-tmp-file", &cfg_type_qstring, CFG_CLAUSEFLAG_OBSOLETE },
1516 { "masters", &cfg_type_namesockaddrkeylist, 0 },
1517 { "pubkey", &cfg_type_pubkey,
1518 CFG_CLAUSEFLAG_MULTI | CFG_CLAUSEFLAG_OBSOLETE },
1519 { "update-policy", &cfg_type_updatepolicy, 0 },
1520 { "database", &cfg_type_astring, 0 },
1521 { "delegation-only", &cfg_type_boolean, 0 },
1523 * Note that the format of the check-names option is different between
1524 * the zone options and the global/view options. Ugh.
1526 { "check-names", &cfg_type_checkmode, 0 },
1527 { "ixfr-from-differences", &cfg_type_boolean, 0 },
1528 { "server-addresses", &cfg_type_bracketed_sockaddrlist, 0 },
1529 { "server-names", &cfg_type_namelist, 0 },
1534 /*% The top-level named.conf syntax. */
1536 static cfg_clausedef_t *
1537 namedconf_clausesets[] = {
1539 namedconf_or_view_clauses,
1542 LIBISCCFG_EXTERNAL_DATA cfg_type_t cfg_type_namedconf = {
1543 "namedconf", cfg_parse_mapbody, cfg_print_mapbody, cfg_doc_mapbody,
1544 &cfg_rep_map, namedconf_clausesets
1547 /*% The bind.keys syntax (trusted-keys/managed-keys only). */
1548 static cfg_clausedef_t *
1549 bindkeys_clausesets[] = {
1553 LIBISCCFG_EXTERNAL_DATA cfg_type_t cfg_type_bindkeys = {
1554 "bindkeys", cfg_parse_mapbody, cfg_print_mapbody, cfg_doc_mapbody,
1555 &cfg_rep_map, bindkeys_clausesets
1558 /*% The new-zone-file syntax (for zones added by 'rndc addzone') */
1559 static cfg_clausedef_t
1560 newzones_clauses[] = {
1561 { "zone", &cfg_type_zone, CFG_CLAUSEFLAG_MULTI },
1565 static cfg_clausedef_t *
1566 newzones_clausesets[] = {
1571 LIBISCCFG_EXTERNAL_DATA cfg_type_t cfg_type_newzones = {
1572 "newzones", cfg_parse_mapbody, cfg_print_mapbody, cfg_doc_mapbody,
1573 &cfg_rep_map, newzones_clausesets
1576 /*% The "options" statement syntax. */
1578 static cfg_clausedef_t *
1579 options_clausesets[] = {
1585 static cfg_type_t cfg_type_options = {
1586 "options", cfg_parse_map, cfg_print_map, cfg_doc_map, &cfg_rep_map, options_clausesets };
1588 /*% The "view" statement syntax. */
1590 static cfg_clausedef_t *
1591 view_clausesets[] = {
1593 namedconf_or_view_clauses,
1596 dynamically_loadable_zones_clauses,
1599 static cfg_type_t cfg_type_viewopts = {
1600 "view", cfg_parse_map, cfg_print_map, cfg_doc_map, &cfg_rep_map, view_clausesets };
1602 /*% The "zone" statement syntax. */
1604 static cfg_clausedef_t *
1605 zone_clausesets[] = {
1610 static cfg_type_t cfg_type_zoneopts = {
1611 "zoneopts", cfg_parse_map, cfg_print_map,
1612 cfg_doc_map, &cfg_rep_map, zone_clausesets };
1614 /*% The "dynamically loadable zones" statement syntax. */
1616 static cfg_clausedef_t *
1617 dynamically_loadable_zones_clausesets[] = {
1618 dynamically_loadable_zones_clauses,
1621 static cfg_type_t cfg_type_dynamically_loadable_zones_opts = {
1622 "dynamically_loadable_zones_opts", cfg_parse_map,
1623 cfg_print_map, cfg_doc_map, &cfg_rep_map,
1624 dynamically_loadable_zones_clausesets
1628 * Clauses that can be found within the 'key' statement.
1630 static cfg_clausedef_t
1632 { "algorithm", &cfg_type_astring, 0 },
1633 { "secret", &cfg_type_astring, 0 },
1637 static cfg_clausedef_t *
1638 key_clausesets[] = {
1642 static cfg_type_t cfg_type_key = {
1643 "key", cfg_parse_named_map, cfg_print_map,
1644 cfg_doc_map, &cfg_rep_map, key_clausesets
1649 * Clauses that can be found in a 'server' statement.
1651 static cfg_clausedef_t
1652 server_clauses[] = {
1653 { "bogus", &cfg_type_boolean, 0 },
1654 { "provide-ixfr", &cfg_type_boolean, 0 },
1655 { "request-ixfr", &cfg_type_boolean, 0 },
1656 { "support-ixfr", &cfg_type_boolean, CFG_CLAUSEFLAG_OBSOLETE },
1657 { "transfers", &cfg_type_uint32, 0 },
1658 { "transfer-format", &cfg_type_transferformat, 0 },
1659 { "keys", &cfg_type_server_key_kludge, 0 },
1660 { "edns", &cfg_type_boolean, 0 },
1661 { "edns-udp-size", &cfg_type_uint32, 0 },
1662 { "max-udp-size", &cfg_type_uint32, 0 },
1663 { "notify-source", &cfg_type_sockaddr4wild, 0 },
1664 { "notify-source-v6", &cfg_type_sockaddr6wild, 0 },
1665 { "query-source", &cfg_type_querysource4, 0 },
1666 { "query-source-v6", &cfg_type_querysource6, 0 },
1667 { "transfer-source", &cfg_type_sockaddr4wild, 0 },
1668 { "transfer-source-v6", &cfg_type_sockaddr6wild, 0 },
1671 static cfg_clausedef_t *
1672 server_clausesets[] = {
1676 static cfg_type_t cfg_type_server = {
1677 "server", cfg_parse_netprefix_map, cfg_print_map, cfg_doc_map, &cfg_rep_map,
1683 * Clauses that can be found in a 'channel' clause in the
1684 * 'logging' statement.
1686 * These have some additional constraints that need to be
1687 * checked after parsing:
1688 * - There must exactly one of file/syslog/null/stderr
1691 static cfg_clausedef_t
1692 channel_clauses[] = {
1693 /* Destinations. We no longer require these to be first. */
1694 { "file", &cfg_type_logfile, 0 },
1695 { "syslog", &cfg_type_optional_facility, 0 },
1696 { "null", &cfg_type_void, 0 },
1697 { "stderr", &cfg_type_void, 0 },
1698 /* Options. We now accept these for the null channel, too. */
1699 { "severity", &cfg_type_logseverity, 0 },
1700 { "print-time", &cfg_type_boolean, 0 },
1701 { "print-severity", &cfg_type_boolean, 0 },
1702 { "print-category", &cfg_type_boolean, 0 },
1705 static cfg_clausedef_t *
1706 channel_clausesets[] = {
1710 static cfg_type_t cfg_type_channel = {
1711 "channel", cfg_parse_named_map, cfg_print_map, cfg_doc_map,
1712 &cfg_rep_map, channel_clausesets
1715 /*% A list of log destination, used in the "category" clause. */
1716 static cfg_type_t cfg_type_destinationlist = {
1717 "destinationlist", cfg_parse_bracketed_list, cfg_print_bracketed_list, cfg_doc_bracketed_list,
1718 &cfg_rep_list, &cfg_type_astring };
1721 * Clauses that can be found in a 'logging' statement.
1723 static cfg_clausedef_t
1724 logging_clauses[] = {
1725 { "channel", &cfg_type_channel, CFG_CLAUSEFLAG_MULTI },
1726 { "category", &cfg_type_category, CFG_CLAUSEFLAG_MULTI },
1729 static cfg_clausedef_t *
1730 logging_clausesets[] = {
1734 static cfg_type_t cfg_type_logging = {
1735 "logging", cfg_parse_map, cfg_print_map, cfg_doc_map, &cfg_rep_map, logging_clausesets };
1739 * For parsing an 'addzone' statement
1742 static cfg_tuplefielddef_t addzone_fields[] = {
1743 { "name", &cfg_type_astring, 0 },
1744 { "class", &cfg_type_optional_class, 0 },
1745 { "view", &cfg_type_optional_class, 0 },
1746 { "options", &cfg_type_zoneopts, 0 },
1749 static cfg_type_t cfg_type_addzone = {
1750 "addzone", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple, &cfg_rep_tuple, addzone_fields };
1752 static cfg_clausedef_t
1753 addzoneconf_clauses[] = {
1754 { "addzone", &cfg_type_addzone, 0 },
1758 static cfg_clausedef_t *
1759 addzoneconf_clausesets[] = {
1760 addzoneconf_clauses,
1764 LIBISCCFG_EXTERNAL_DATA cfg_type_t cfg_type_addzoneconf = {
1765 "addzoneconf", cfg_parse_mapbody, cfg_print_mapbody, cfg_doc_mapbody,
1766 &cfg_rep_map, addzoneconf_clausesets
1771 parse_unitstring(char *str, isc_resourcevalue_t *valuep) {
1777 value = isc_string_touint64(str, &endp, 10);
1780 return (ISC_R_SUCCESS);
1784 if (len < 2 || endp[1] != '\0')
1785 return (ISC_R_FAILURE);
1787 switch (str[len - 1]) {
1798 unit = 1024 * 1024 * 1024;
1801 return (ISC_R_FAILURE);
1803 if (value > ISC_UINT64_MAX / unit)
1804 return (ISC_R_FAILURE);
1805 *valuep = value * unit;
1806 return (ISC_R_SUCCESS);
1810 parse_sizeval(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret) {
1811 isc_result_t result;
1812 cfg_obj_t *obj = NULL;
1817 CHECK(cfg_gettoken(pctx, 0));
1818 if (pctx->token.type != isc_tokentype_string) {
1819 result = ISC_R_UNEXPECTEDTOKEN;
1822 CHECK(parse_unitstring(TOKEN_STRING(pctx), &val));
1824 CHECK(cfg_create_obj(pctx, &cfg_type_uint64, &obj));
1825 obj->value.uint64 = val;
1827 return (ISC_R_SUCCESS);
1830 cfg_parser_error(pctx, CFG_LOG_NEAR, "expected integer and optional unit");
1835 * A size value (number + optional unit).
1837 static cfg_type_t cfg_type_sizeval = {
1838 "sizeval", parse_sizeval, cfg_print_uint64, cfg_doc_terminal,
1839 &cfg_rep_uint64, NULL };
1842 * A size, "unlimited", or "default".
1846 parse_size(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret) {
1847 return (parse_enum_or_other(pctx, type, &cfg_type_sizeval, ret));
1850 static const char *size_enums[] = { "unlimited", "default", NULL };
1851 static cfg_type_t cfg_type_size = {
1852 "size", parse_size, cfg_print_ustring, cfg_doc_terminal,
1853 &cfg_rep_string, size_enums
1857 * A size or "unlimited", but not "default".
1859 static const char *sizenodefault_enums[] = { "unlimited", NULL };
1860 static cfg_type_t cfg_type_sizenodefault = {
1861 "size_no_default", parse_size, cfg_print_ustring, cfg_doc_terminal,
1862 &cfg_rep_string, sizenodefault_enums
1869 parse_maybe_optional_keyvalue(cfg_parser_t *pctx, const cfg_type_t *type,
1870 isc_boolean_t optional, cfg_obj_t **ret)
1872 isc_result_t result;
1873 cfg_obj_t *obj = NULL;
1874 const keyword_type_t *kw = type->of;
1876 CHECK(cfg_peektoken(pctx, 0));
1877 if (pctx->token.type == isc_tokentype_string &&
1878 strcasecmp(TOKEN_STRING(pctx), kw->name) == 0) {
1879 CHECK(cfg_gettoken(pctx, 0));
1880 CHECK(kw->type->parse(pctx, kw->type, &obj));
1881 obj->type = type; /* XXX kludge */
1884 CHECK(cfg_parse_void(pctx, NULL, &obj));
1886 cfg_parser_error(pctx, CFG_LOG_NEAR, "expected '%s'",
1888 result = ISC_R_UNEXPECTEDTOKEN;
1898 parse_enum_or_other(cfg_parser_t *pctx, const cfg_type_t *enumtype,
1899 const cfg_type_t *othertype, cfg_obj_t **ret)
1901 isc_result_t result;
1902 CHECK(cfg_peektoken(pctx, 0));
1903 if (pctx->token.type == isc_tokentype_string &&
1904 cfg_is_enum(TOKEN_STRING(pctx), enumtype->of)) {
1905 CHECK(cfg_parse_enum(pctx, enumtype, ret));
1907 CHECK(cfg_parse_obj(pctx, othertype, ret));
1914 doc_enum_or_other(cfg_printer_t *pctx, const cfg_type_t *type) {
1915 cfg_doc_terminal(pctx, type);
1917 cfg_print_chars(pctx, "( ", 2);...
1923 parse_keyvalue(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret) {
1924 return (parse_maybe_optional_keyvalue(pctx, type, ISC_FALSE, ret));
1928 parse_optional_keyvalue(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret) {
1929 return (parse_maybe_optional_keyvalue(pctx, type, ISC_TRUE, ret));
1933 print_keyvalue(cfg_printer_t *pctx, const cfg_obj_t *obj) {
1934 const keyword_type_t *kw = obj->type->of;
1935 cfg_print_cstr(pctx, kw->name);
1936 cfg_print_chars(pctx, " ", 1);
1937 kw->type->print(pctx, obj);
1941 doc_keyvalue(cfg_printer_t *pctx, const cfg_type_t *type) {
1942 const keyword_type_t *kw = type->of;
1943 cfg_print_cstr(pctx, kw->name);
1944 cfg_print_chars(pctx, " ", 1);
1945 cfg_doc_obj(pctx, kw->type);
1949 doc_optional_keyvalue(cfg_printer_t *pctx, const cfg_type_t *type) {
1950 const keyword_type_t *kw = type->of;
1951 cfg_print_chars(pctx, "[ ", 2);
1952 cfg_print_cstr(pctx, kw->name);
1953 cfg_print_chars(pctx, " ", 1);
1954 cfg_doc_obj(pctx, kw->type);
1955 cfg_print_chars(pctx, " ]", 2);
1958 static const char *dialup_enums[] = {
1959 "notify", "notify-passive", "refresh", "passive", NULL };
1961 parse_dialup_type(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret) {
1962 return (parse_enum_or_other(pctx, type, &cfg_type_boolean, ret));
1964 static cfg_type_t cfg_type_dialuptype = {
1965 "dialuptype", parse_dialup_type, cfg_print_ustring, doc_enum_or_other,
1966 &cfg_rep_string, dialup_enums
1969 static const char *notify_enums[] = { "explicit", "master-only", NULL };
1971 parse_notify_type(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret) {
1972 return (parse_enum_or_other(pctx, type, &cfg_type_boolean, ret));
1974 static cfg_type_t cfg_type_notifytype = {
1975 "notifytype", parse_notify_type, cfg_print_ustring, doc_enum_or_other,
1976 &cfg_rep_string, notify_enums,
1979 static const char *ixfrdiff_enums[] = { "master", "slave", NULL };
1981 parse_ixfrdiff_type(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret) {
1982 return (parse_enum_or_other(pctx, type, &cfg_type_boolean, ret));
1984 static cfg_type_t cfg_type_ixfrdifftype = {
1985 "ixfrdiff", parse_ixfrdiff_type, cfg_print_ustring, doc_enum_or_other,
1986 &cfg_rep_string, ixfrdiff_enums,
1989 static const char *v4_aaaa_enums[] = { "break-dnssec", NULL };
1991 parse_v4_aaaa(cfg_parser_t *pctx, const cfg_type_t *type,
1993 return (parse_enum_or_other(pctx, type, &cfg_type_boolean, ret));
1995 static cfg_type_t cfg_type_v4_aaaa = {
1996 "v4_aaaa", parse_v4_aaaa, cfg_print_ustring,
1997 doc_enum_or_other, &cfg_rep_string, v4_aaaa_enums,
2000 static keyword_type_t key_kw = { "key", &cfg_type_astring };
2002 LIBISCCFG_EXTERNAL_DATA cfg_type_t cfg_type_keyref = {
2003 "keyref", parse_keyvalue, print_keyvalue, doc_keyvalue,
2004 &cfg_rep_string, &key_kw
2007 static cfg_type_t cfg_type_optional_keyref = {
2008 "optional_keyref", parse_optional_keyvalue, print_keyvalue,
2009 doc_optional_keyvalue, &cfg_rep_string, &key_kw
2013 * A "controls" statement is represented as a map with the multivalued
2014 * "inet" and "unix" clauses.
2017 static keyword_type_t controls_allow_kw = {
2018 "allow", &cfg_type_bracketed_aml };
2020 static cfg_type_t cfg_type_controls_allow = {
2021 "controls_allow", parse_keyvalue,
2022 print_keyvalue, doc_keyvalue,
2023 &cfg_rep_list, &controls_allow_kw
2026 static keyword_type_t controls_keys_kw = {
2027 "keys", &cfg_type_keylist };
2029 static cfg_type_t cfg_type_controls_keys = {
2030 "controls_keys", parse_optional_keyvalue,
2031 print_keyvalue, doc_optional_keyvalue,
2032 &cfg_rep_list, &controls_keys_kw
2035 static cfg_tuplefielddef_t inetcontrol_fields[] = {
2036 { "address", &cfg_type_controls_sockaddr, 0 },
2037 { "allow", &cfg_type_controls_allow, 0 },
2038 { "keys", &cfg_type_controls_keys, 0 },
2042 static cfg_type_t cfg_type_inetcontrol = {
2043 "inetcontrol", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple, &cfg_rep_tuple,
2047 static keyword_type_t controls_perm_kw = {
2048 "perm", &cfg_type_uint32 };
2050 static cfg_type_t cfg_type_controls_perm = {
2051 "controls_perm", parse_keyvalue,
2052 print_keyvalue, doc_keyvalue,
2053 &cfg_rep_uint32, &controls_perm_kw
2056 static keyword_type_t controls_owner_kw = {
2057 "owner", &cfg_type_uint32 };
2059 static cfg_type_t cfg_type_controls_owner = {
2060 "controls_owner", parse_keyvalue,
2061 print_keyvalue, doc_keyvalue,
2062 &cfg_rep_uint32, &controls_owner_kw
2065 static keyword_type_t controls_group_kw = {
2066 "group", &cfg_type_uint32 };
2068 static cfg_type_t cfg_type_controls_group = {
2069 "controls_allow", parse_keyvalue,
2070 print_keyvalue, doc_keyvalue,
2071 &cfg_rep_uint32, &controls_group_kw
2074 static cfg_tuplefielddef_t unixcontrol_fields[] = {
2075 { "path", &cfg_type_qstring, 0 },
2076 { "perm", &cfg_type_controls_perm, 0 },
2077 { "owner", &cfg_type_controls_owner, 0 },
2078 { "group", &cfg_type_controls_group, 0 },
2079 { "keys", &cfg_type_controls_keys, 0 },
2083 static cfg_type_t cfg_type_unixcontrol = {
2084 "unixcontrol", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple, &cfg_rep_tuple,
2088 static cfg_clausedef_t
2089 controls_clauses[] = {
2090 { "inet", &cfg_type_inetcontrol, CFG_CLAUSEFLAG_MULTI },
2091 { "unix", &cfg_type_unixcontrol, CFG_CLAUSEFLAG_MULTI },
2095 static cfg_clausedef_t *
2096 controls_clausesets[] = {
2100 static cfg_type_t cfg_type_controls = {
2101 "controls", cfg_parse_map, cfg_print_map, cfg_doc_map, &cfg_rep_map, &controls_clausesets
2105 * A "statistics-channels" statement is represented as a map with the
2106 * multivalued "inet" clauses.
2109 doc_optional_bracketed_list(cfg_printer_t *pctx, const cfg_type_t *type) {
2110 const keyword_type_t *kw = type->of;
2111 cfg_print_chars(pctx, "[ ", 2);
2112 cfg_print_cstr(pctx, kw->name);
2113 cfg_print_chars(pctx, " ", 1);
2114 cfg_doc_obj(pctx, kw->type);
2115 cfg_print_chars(pctx, " ]", 2);
2118 static cfg_type_t cfg_type_optional_allow = {
2119 "optional_allow", parse_optional_keyvalue, print_keyvalue,
2120 doc_optional_bracketed_list, &cfg_rep_list, &controls_allow_kw
2123 static cfg_tuplefielddef_t statserver_fields[] = {
2124 { "address", &cfg_type_controls_sockaddr, 0 }, /* reuse controls def */
2125 { "allow", &cfg_type_optional_allow, 0 },
2129 static cfg_type_t cfg_type_statschannel = {
2130 "statschannel", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
2131 &cfg_rep_tuple, statserver_fields
2134 static cfg_clausedef_t
2135 statservers_clauses[] = {
2136 { "inet", &cfg_type_statschannel, CFG_CLAUSEFLAG_MULTI },
2140 static cfg_clausedef_t *
2141 statservers_clausesets[] = {
2142 statservers_clauses,
2146 static cfg_type_t cfg_type_statschannels = {
2147 "statistics-channels", cfg_parse_map, cfg_print_map, cfg_doc_map,
2148 &cfg_rep_map, &statservers_clausesets
2152 * An optional class, as used in view and zone statements.
2155 parse_optional_class(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret) {
2156 isc_result_t result;
2158 CHECK(cfg_peektoken(pctx, 0));
2159 if (pctx->token.type == isc_tokentype_string)
2160 CHECK(cfg_parse_obj(pctx, &cfg_type_ustring, ret));
2162 CHECK(cfg_parse_obj(pctx, &cfg_type_void, ret));
2167 static cfg_type_t cfg_type_optional_class = {
2168 "optional_class", parse_optional_class, NULL, cfg_doc_terminal,
2173 parse_querysource(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret) {
2174 isc_result_t result;
2175 cfg_obj_t *obj = NULL;
2176 isc_netaddr_t netaddr;
2178 unsigned int have_address = 0;
2179 unsigned int have_port = 0;
2180 const unsigned int *flagp = type->of;
2182 if ((*flagp & CFG_ADDR_V4OK) != 0)
2183 isc_netaddr_any(&netaddr);
2184 else if ((*flagp & CFG_ADDR_V6OK) != 0)
2185 isc_netaddr_any6(&netaddr);
2192 CHECK(cfg_peektoken(pctx, 0));
2193 if (pctx->token.type == isc_tokentype_string) {
2194 if (strcasecmp(TOKEN_STRING(pctx),
2197 /* read "address" */
2198 CHECK(cfg_gettoken(pctx, 0));
2199 CHECK(cfg_parse_rawaddr(pctx, *flagp,
2202 } else if (strcasecmp(TOKEN_STRING(pctx), "port") == 0)
2205 CHECK(cfg_gettoken(pctx, 0));
2206 CHECK(cfg_parse_rawport(pctx,
2210 } else if (have_port == 0 && have_address == 0) {
2211 return (cfg_parse_sockaddr(pctx, type, ret));
2213 cfg_parser_error(pctx, CFG_LOG_NEAR,
2214 "expected 'address' or 'port'");
2215 return (ISC_R_UNEXPECTEDTOKEN);
2220 if (have_address > 1 || have_port > 1 ||
2221 have_address + have_port == 0) {
2222 cfg_parser_error(pctx, 0, "expected one address and/or port");
2223 return (ISC_R_UNEXPECTEDTOKEN);
2226 CHECK(cfg_create_obj(pctx, &cfg_type_querysource, &obj));
2227 isc_sockaddr_fromnetaddr(&obj->value.sockaddr, &netaddr, port);
2229 return (ISC_R_SUCCESS);
2232 cfg_parser_error(pctx, CFG_LOG_NEAR, "invalid query source");
2238 print_querysource(cfg_printer_t *pctx, const cfg_obj_t *obj) {
2240 isc_netaddr_fromsockaddr(&na, &obj->value.sockaddr);
2241 cfg_print_cstr(pctx, "address ");
2242 cfg_print_rawaddr(pctx, &na);
2243 cfg_print_cstr(pctx, " port ");
2244 cfg_print_rawuint(pctx, isc_sockaddr_getport(&obj->value.sockaddr));
2247 static unsigned int sockaddr4wild_flags = CFG_ADDR_WILDOK | CFG_ADDR_V4OK;
2248 static unsigned int sockaddr6wild_flags = CFG_ADDR_WILDOK | CFG_ADDR_V6OK;
2250 static cfg_type_t cfg_type_querysource4 = {
2251 "querysource4", parse_querysource, NULL, cfg_doc_terminal,
2252 NULL, &sockaddr4wild_flags
2255 static cfg_type_t cfg_type_querysource6 = {
2256 "querysource6", parse_querysource, NULL, cfg_doc_terminal,
2257 NULL, &sockaddr6wild_flags
2260 static cfg_type_t cfg_type_querysource = {
2261 "querysource", NULL, print_querysource, NULL, &cfg_rep_sockaddr, NULL
2267 parse_addrmatchelt(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret) {
2268 isc_result_t result;
2271 CHECK(cfg_peektoken(pctx, CFG_LEXOPT_QSTRING));
2273 if (pctx->token.type == isc_tokentype_string ||
2274 pctx->token.type == isc_tokentype_qstring) {
2275 if (pctx->token.type == isc_tokentype_string &&
2276 (strcasecmp(TOKEN_STRING(pctx), "key") == 0)) {
2277 CHECK(cfg_parse_obj(pctx, &cfg_type_keyref, ret));
2279 if (cfg_lookingat_netaddr(pctx, CFG_ADDR_V4OK |
2280 CFG_ADDR_V4PREFIXOK |
2283 CHECK(cfg_parse_netprefix(pctx, NULL, ret));
2285 CHECK(cfg_parse_astring(pctx, NULL, ret));
2288 } else if (pctx->token.type == isc_tokentype_special) {
2289 if (pctx->token.value.as_char == '{') {
2290 /* Nested match list. */
2291 CHECK(cfg_parse_obj(pctx, &cfg_type_bracketed_aml, ret));
2292 } else if (pctx->token.value.as_char == '!') {
2293 CHECK(cfg_gettoken(pctx, 0)); /* read "!" */
2294 CHECK(cfg_parse_obj(pctx, &cfg_type_negated, ret));
2300 cfg_parser_error(pctx, CFG_LOG_NEAR,
2301 "expected IP match list element");
2302 return (ISC_R_UNEXPECTEDTOKEN);
2309 * A negated address match list element (like "! 10.0.0.1").
2310 * Somewhat sneakily, the caller is expected to parse the
2311 * "!", but not to print it.
2314 static cfg_tuplefielddef_t negated_fields[] = {
2315 { "value", &cfg_type_addrmatchelt, 0 },
2320 print_negated(cfg_printer_t *pctx, const cfg_obj_t *obj) {
2321 cfg_print_chars(pctx, "!", 1);
2322 cfg_print_tuple(pctx, obj);
2325 static cfg_type_t cfg_type_negated = {
2326 "negated", cfg_parse_tuple, print_negated, NULL, &cfg_rep_tuple,
2330 /*% An address match list element */
2332 static cfg_type_t cfg_type_addrmatchelt = {
2333 "address_match_element", parse_addrmatchelt, NULL, cfg_doc_terminal,
2337 /*% A bracketed address match list */
2339 static cfg_type_t cfg_type_bracketed_aml = {
2340 "bracketed_aml", cfg_parse_bracketed_list, cfg_print_bracketed_list,
2341 cfg_doc_bracketed_list, &cfg_rep_list, &cfg_type_addrmatchelt
2345 * The socket address syntax in the "controls" statement is silly.
2346 * It allows both socket address families, but also allows "*",
2347 * whis is gratuitously interpreted as the IPv4 wildcard address.
2349 static unsigned int controls_sockaddr_flags =
2350 CFG_ADDR_V4OK | CFG_ADDR_V6OK | CFG_ADDR_WILDOK;
2351 static cfg_type_t cfg_type_controls_sockaddr = {
2352 "controls_sockaddr", cfg_parse_sockaddr, cfg_print_sockaddr,
2353 cfg_doc_sockaddr, &cfg_rep_sockaddr, &controls_sockaddr_flags
2357 * Handle the special kludge syntax of the "keys" clause in the "server"
2358 * statement, which takes a single key with or without braces and semicolon.
2361 parse_server_key_kludge(cfg_parser_t *pctx, const cfg_type_t *type,
2364 isc_result_t result;
2365 isc_boolean_t braces = ISC_FALSE;
2368 /* Allow opening brace. */
2369 CHECK(cfg_peektoken(pctx, 0));
2370 if (pctx->token.type == isc_tokentype_special &&
2371 pctx->token.value.as_char == '{') {
2372 CHECK(cfg_gettoken(pctx, 0));
2376 CHECK(cfg_parse_obj(pctx, &cfg_type_astring, ret));
2379 /* Skip semicolon if present. */
2380 CHECK(cfg_peektoken(pctx, 0));
2381 if (pctx->token.type == isc_tokentype_special &&
2382 pctx->token.value.as_char == ';')
2383 CHECK(cfg_gettoken(pctx, 0));
2385 CHECK(cfg_parse_special(pctx, '}'));
2390 static cfg_type_t cfg_type_server_key_kludge = {
2391 "server_key", parse_server_key_kludge, NULL, cfg_doc_terminal,
2397 * An optional logging facility.
2401 parse_optional_facility(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret)
2403 isc_result_t result;
2406 CHECK(cfg_peektoken(pctx, CFG_LEXOPT_QSTRING));
2407 if (pctx->token.type == isc_tokentype_string ||
2408 pctx->token.type == isc_tokentype_qstring) {
2409 CHECK(cfg_parse_obj(pctx, &cfg_type_astring, ret));
2411 CHECK(cfg_parse_obj(pctx, &cfg_type_void, ret));
2417 static cfg_type_t cfg_type_optional_facility = {
2418 "optional_facility", parse_optional_facility, NULL, cfg_doc_terminal,
2423 * A log severity. Return as a string, except "debug N",
2424 * which is returned as a keyword object.
2427 static keyword_type_t debug_kw = { "debug", &cfg_type_uint32 };
2428 static cfg_type_t cfg_type_debuglevel = {
2429 "debuglevel", parse_keyvalue,
2430 print_keyvalue, doc_keyvalue,
2431 &cfg_rep_uint32, &debug_kw
2435 parse_logseverity(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret) {
2436 isc_result_t result;
2439 CHECK(cfg_peektoken(pctx, 0));
2440 if (pctx->token.type == isc_tokentype_string &&
2441 strcasecmp(TOKEN_STRING(pctx), "debug") == 0) {
2442 CHECK(cfg_gettoken(pctx, 0)); /* read "debug" */
2443 CHECK(cfg_peektoken(pctx, ISC_LEXOPT_NUMBER));
2444 if (pctx->token.type == isc_tokentype_number) {
2445 CHECK(cfg_parse_uint32(pctx, NULL, ret));
2448 * The debug level is optional and defaults to 1.
2449 * This makes little sense, but we support it for
2450 * compatibility with BIND 8.
2452 CHECK(cfg_create_obj(pctx, &cfg_type_uint32, ret));
2453 (*ret)->value.uint32 = 1;
2455 (*ret)->type = &cfg_type_debuglevel; /* XXX kludge */
2457 CHECK(cfg_parse_obj(pctx, &cfg_type_loglevel, ret));
2463 static cfg_type_t cfg_type_logseverity = {
2464 "log_severity", parse_logseverity, NULL, cfg_doc_terminal,
2468 * The "file" clause of the "channel" statement.
2469 * This is yet another special case.
2472 static const char *logversions_enums[] = { "unlimited", NULL };
2474 parse_logversions(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret) {
2475 return (parse_enum_or_other(pctx, type, &cfg_type_uint32, ret));
2478 static cfg_type_t cfg_type_logversions = {
2479 "logversions", parse_logversions, cfg_print_ustring, cfg_doc_terminal,
2480 &cfg_rep_string, logversions_enums
2483 static cfg_tuplefielddef_t logfile_fields[] = {
2484 { "file", &cfg_type_qstring, 0 },
2485 { "versions", &cfg_type_logversions, 0 },
2486 { "size", &cfg_type_size, 0 },
2491 parse_logfile(cfg_parser_t *pctx, const cfg_type_t *type, cfg_obj_t **ret) {
2492 isc_result_t result;
2493 cfg_obj_t *obj = NULL;
2494 const cfg_tuplefielddef_t *fields = type->of;
2496 CHECK(cfg_create_tuple(pctx, type, &obj));
2498 /* Parse the mandatory "file" field */
2499 CHECK(cfg_parse_obj(pctx, fields[0].type, &obj->value.tuple[0]));
2501 /* Parse "versions" and "size" fields in any order. */
2503 CHECK(cfg_peektoken(pctx, 0));
2504 if (pctx->token.type == isc_tokentype_string) {
2505 CHECK(cfg_gettoken(pctx, 0));
2506 if (strcasecmp(TOKEN_STRING(pctx),
2508 obj->value.tuple[1] == NULL) {
2509 CHECK(cfg_parse_obj(pctx, fields[1].type,
2510 &obj->value.tuple[1]));
2511 } else if (strcasecmp(TOKEN_STRING(pctx),
2513 obj->value.tuple[2] == NULL) {
2514 CHECK(cfg_parse_obj(pctx, fields[2].type,
2515 &obj->value.tuple[2]));
2524 /* Create void objects for missing optional values. */
2525 if (obj->value.tuple[1] == NULL)
2526 CHECK(cfg_parse_void(pctx, NULL, &obj->value.tuple[1]));
2527 if (obj->value.tuple[2] == NULL)
2528 CHECK(cfg_parse_void(pctx, NULL, &obj->value.tuple[2]));
2531 return (ISC_R_SUCCESS);
2539 print_logfile(cfg_printer_t *pctx, const cfg_obj_t *obj) {
2540 cfg_print_obj(pctx, obj->value.tuple[0]); /* file */
2541 if (obj->value.tuple[1]->type->print != cfg_print_void) {
2542 cfg_print_cstr(pctx, " versions ");
2543 cfg_print_obj(pctx, obj->value.tuple[1]);
2545 if (obj->value.tuple[2]->type->print != cfg_print_void) {
2546 cfg_print_cstr(pctx, " size ");
2547 cfg_print_obj(pctx, obj->value.tuple[2]);
2553 doc_logfile(cfg_printer_t *pctx, const cfg_type_t *type) {
2555 cfg_print_cstr(pctx, "<quoted_string>");
2556 cfg_print_chars(pctx, " ", 1);
2557 cfg_print_cstr(pctx, "[ versions ( \"unlimited\" | <integer> ) ]");
2558 cfg_print_chars(pctx, " ", 1);
2559 cfg_print_cstr(pctx, "[ size <size> ]");
2562 static cfg_type_t cfg_type_logfile = {
2563 "log_file", parse_logfile, print_logfile, doc_logfile,
2564 &cfg_rep_tuple, logfile_fields
2567 /*% An IPv4 address with optional port, "*" accepted as wildcard. */
2568 static cfg_type_t cfg_type_sockaddr4wild = {
2569 "sockaddr4wild", cfg_parse_sockaddr, cfg_print_sockaddr,
2570 cfg_doc_sockaddr, &cfg_rep_sockaddr, &sockaddr4wild_flags
2573 /*% An IPv6 address with optional port, "*" accepted as wildcard. */
2574 static cfg_type_t cfg_type_sockaddr6wild = {
2575 "v6addrportwild", cfg_parse_sockaddr, cfg_print_sockaddr,
2576 cfg_doc_sockaddr, &cfg_rep_sockaddr, &sockaddr6wild_flags
2583 static cfg_tuplefielddef_t lwres_view_fields[] = {
2584 { "name", &cfg_type_astring, 0 },
2585 { "class", &cfg_type_optional_class, 0 },
2588 static cfg_type_t cfg_type_lwres_view = {
2589 "lwres_view", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple, &cfg_rep_tuple,
2593 static cfg_type_t cfg_type_lwres_searchlist = {
2594 "lwres_searchlist", cfg_parse_bracketed_list, cfg_print_bracketed_list,
2595 cfg_doc_bracketed_list, &cfg_rep_list, &cfg_type_astring };
2597 static cfg_clausedef_t
2599 { "listen-on", &cfg_type_portiplist, 0 },
2600 { "view", &cfg_type_lwres_view, 0 },
2601 { "search", &cfg_type_lwres_searchlist, 0 },
2602 { "ndots", &cfg_type_uint32, 0 },
2606 static cfg_clausedef_t *
2607 lwres_clausesets[] = {
2611 static cfg_type_t cfg_type_lwres = {
2612 "lwres", cfg_parse_map, cfg_print_map, cfg_doc_map, &cfg_rep_map,
2620 static cfg_clausedef_t
2621 rndcconf_options_clauses[] = {
2622 { "default-key", &cfg_type_astring, 0 },
2623 { "default-port", &cfg_type_uint32, 0 },
2624 { "default-server", &cfg_type_astring, 0 },
2625 { "default-source-address", &cfg_type_netaddr4wild, 0 },
2626 { "default-source-address-v6", &cfg_type_netaddr6wild, 0 },
2630 static cfg_clausedef_t *
2631 rndcconf_options_clausesets[] = {
2632 rndcconf_options_clauses,
2636 static cfg_type_t cfg_type_rndcconf_options = {
2637 "rndcconf_options", cfg_parse_map, cfg_print_map, cfg_doc_map,
2638 &cfg_rep_map, rndcconf_options_clausesets
2641 static cfg_clausedef_t
2642 rndcconf_server_clauses[] = {
2643 { "key", &cfg_type_astring, 0 },
2644 { "port", &cfg_type_uint32, 0 },
2645 { "source-address", &cfg_type_netaddr4wild, 0 },
2646 { "source-address-v6", &cfg_type_netaddr6wild, 0 },
2647 { "addresses", &cfg_type_bracketed_sockaddrnameportlist, 0 },
2651 static cfg_clausedef_t *
2652 rndcconf_server_clausesets[] = {
2653 rndcconf_server_clauses,
2657 static cfg_type_t cfg_type_rndcconf_server = {
2658 "rndcconf_server", cfg_parse_named_map, cfg_print_map, cfg_doc_map,
2659 &cfg_rep_map, rndcconf_server_clausesets
2662 static cfg_clausedef_t
2663 rndcconf_clauses[] = {
2664 { "key", &cfg_type_key, CFG_CLAUSEFLAG_MULTI },
2665 { "server", &cfg_type_rndcconf_server, CFG_CLAUSEFLAG_MULTI },
2666 { "options", &cfg_type_rndcconf_options, 0 },
2670 static cfg_clausedef_t *
2671 rndcconf_clausesets[] = {
2676 LIBISCCFG_EXTERNAL_DATA cfg_type_t cfg_type_rndcconf = {
2677 "rndcconf", cfg_parse_mapbody, cfg_print_mapbody, cfg_doc_mapbody,
2678 &cfg_rep_map, rndcconf_clausesets
2681 static cfg_clausedef_t
2682 rndckey_clauses[] = {
2683 { "key", &cfg_type_key, 0 },
2687 static cfg_clausedef_t *
2688 rndckey_clausesets[] = {
2693 LIBISCCFG_EXTERNAL_DATA cfg_type_t cfg_type_rndckey = {
2694 "rndckey", cfg_parse_mapbody, cfg_print_mapbody, cfg_doc_mapbody,
2695 &cfg_rep_map, rndckey_clausesets
2699 * session.key has exactly the same syntax as rndc.key, but it's defined
2700 * separately for clarity (and so we can extend it someday, if needed).
2702 LIBISCCFG_EXTERNAL_DATA cfg_type_t cfg_type_sessionkey = {
2703 "sessionkey", cfg_parse_mapbody, cfg_print_mapbody, cfg_doc_mapbody,
2704 &cfg_rep_map, rndckey_clausesets
2707 static cfg_tuplefielddef_t nameport_fields[] = {
2708 { "name", &cfg_type_astring, 0 },
2709 { "port", &cfg_type_optional_port, 0 },
2712 static cfg_type_t cfg_type_nameport = {
2713 "nameport", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
2714 &cfg_rep_tuple, nameport_fields
2718 doc_sockaddrnameport(cfg_printer_t *pctx, const cfg_type_t *type) {
2720 cfg_print_chars(pctx, "( ", 2);
2721 cfg_print_cstr(pctx, "<quoted_string>");
2722 cfg_print_chars(pctx, " ", 1);
2723 cfg_print_cstr(pctx, "[ port <integer> ]");
2724 cfg_print_chars(pctx, " | ", 3);
2725 cfg_print_cstr(pctx, "<ipv4_address>");
2726 cfg_print_chars(pctx, " ", 1);
2727 cfg_print_cstr(pctx, "[ port <integer> ]");
2728 cfg_print_chars(pctx, " | ", 3);
2729 cfg_print_cstr(pctx, "<ipv6_address>");
2730 cfg_print_chars(pctx, " ", 1);
2731 cfg_print_cstr(pctx, "[ port <integer> ]");
2732 cfg_print_chars(pctx, " )", 2);
2736 parse_sockaddrnameport(cfg_parser_t *pctx, const cfg_type_t *type,
2739 isc_result_t result;
2740 cfg_obj_t *obj = NULL;
2743 CHECK(cfg_peektoken(pctx, CFG_LEXOPT_QSTRING));
2744 if (pctx->token.type == isc_tokentype_string ||
2745 pctx->token.type == isc_tokentype_qstring) {
2746 if (cfg_lookingat_netaddr(pctx, CFG_ADDR_V4OK | CFG_ADDR_V6OK))
2747 CHECK(cfg_parse_sockaddr(pctx, &cfg_type_sockaddr, ret));
2749 const cfg_tuplefielddef_t *fields =
2750 cfg_type_nameport.of;
2751 CHECK(cfg_create_tuple(pctx, &cfg_type_nameport,
2753 CHECK(cfg_parse_obj(pctx, fields[0].type,
2754 &obj->value.tuple[0]));
2755 CHECK(cfg_parse_obj(pctx, fields[1].type,
2756 &obj->value.tuple[1]));
2761 cfg_parser_error(pctx, CFG_LOG_NEAR,
2762 "expected IP address or hostname");
2763 return (ISC_R_UNEXPECTEDTOKEN);
2770 static cfg_type_t cfg_type_sockaddrnameport = {
2771 "sockaddrnameport_element", parse_sockaddrnameport, NULL,
2772 doc_sockaddrnameport, NULL, NULL
2775 static cfg_type_t cfg_type_bracketed_sockaddrnameportlist = {
2776 "bracketed_sockaddrnameportlist", cfg_parse_bracketed_list,
2777 cfg_print_bracketed_list, cfg_doc_bracketed_list,
2778 &cfg_rep_list, &cfg_type_sockaddrnameport
2782 * A list of socket addresses or name with an optional default port,
2783 * as used in the dual-stack-servers option. E.g.,
2784 * "port 1234 { dual-stack-servers.net; 10.0.0.1; 1::2 port 69; }"
2786 static cfg_tuplefielddef_t nameportiplist_fields[] = {
2787 { "port", &cfg_type_optional_port, 0 },
2788 { "addresses", &cfg_type_bracketed_sockaddrnameportlist, 0 },
2792 static cfg_type_t cfg_type_nameportiplist = {
2793 "nameportiplist", cfg_parse_tuple, cfg_print_tuple, cfg_doc_tuple,
2794 &cfg_rep_tuple, nameportiplist_fields
2802 doc_masterselement(cfg_printer_t *pctx, const cfg_type_t *type) {
2804 cfg_print_chars(pctx, "( ", 2);
2805 cfg_print_cstr(pctx, "<masters>");
2806 cfg_print_chars(pctx, " | ", 3);
2807 cfg_print_cstr(pctx, "<ipv4_address>");
2808 cfg_print_chars(pctx, " ", 1);
2809 cfg_print_cstr(pctx, "[ port <integer> ]");
2810 cfg_print_chars(pctx, " | ", 3);
2811 cfg_print_cstr(pctx, "<ipv6_address>");
2812 cfg_print_chars(pctx, " ", 1);
2813 cfg_print_cstr(pctx, "[ port <integer> ]");
2814 cfg_print_chars(pctx, " )", 2);
2818 parse_masterselement(cfg_parser_t *pctx, const cfg_type_t *type,
2821 isc_result_t result;
2822 cfg_obj_t *obj = NULL;
2825 CHECK(cfg_peektoken(pctx, CFG_LEXOPT_QSTRING));
2826 if (pctx->token.type == isc_tokentype_string ||
2827 pctx->token.type == isc_tokentype_qstring) {
2828 if (cfg_lookingat_netaddr(pctx, CFG_ADDR_V4OK | CFG_ADDR_V6OK))
2829 CHECK(cfg_parse_sockaddr(pctx, &cfg_type_sockaddr, ret));
2831 CHECK(cfg_parse_astring(pctx, &cfg_type_astring, ret));
2833 cfg_parser_error(pctx, CFG_LOG_NEAR,
2834 "expected IP address or masters name");
2835 return (ISC_R_UNEXPECTEDTOKEN);
2842 static cfg_type_t cfg_type_masterselement = {
2843 "masters_element", parse_masterselement, NULL,
2844 doc_masterselement, NULL, NULL