aboutsummaryrefslogtreecommitdiff
path: root/plugin/normalize.go
diff options
context:
space:
mode:
authorGravatar Miek Gieben <miek@miek.nl> 2021-05-17 22:19:54 +0200
committerGravatar GitHub <noreply@github.com> 2021-05-17 13:19:54 -0700
commit5f41d8eb1f74621ada05968dd6b0d24f9ae742df (patch)
tree9a75f00225cea18ea04224d882eb2fc11f5933df /plugin/normalize.go
parent540937964890ad36b56841374f7f83ef7a2a0247 (diff)
downloadcoredns-5f41d8eb1f74621ada05968dd6b0d24f9ae742df.tar.gz
coredns-5f41d8eb1f74621ada05968dd6b0d24f9ae742df.tar.zst
coredns-5f41d8eb1f74621ada05968dd6b0d24f9ae742df.zip
reverse zone: fix Normalize (#4621)
Make normalize return multiple "hosts" (= reverse zones) when a non-octet boundary cidr is given. Added pkg/cidr package that holds the cidr calculation routines; felt they didn't really fit dnsutil. This change means the IPNet return parameter isn't needed, the hosts are all correct. The tests that tests this is also removed: TestSplitHostPortReverse The fallout was that zoneAddr _also_ doesn't need the IPNet member, that in turn make it visible that zoneAddr in address.go duplicated a bunch of stuff from register.go; removed/refactored that too. Created a plugin.OriginsFromArgsOrServerBlock to help plugins do the right things, by consuming ZONE arguments; this now expands reverse zones correctly. This is mostly mechanical. Remove the reverse test in plugin/kubernetes which is a copy-paste from a core test (which has since been fixed). Remove MustNormalize as it has no plugin users. This change is not backwards compatible to plugins that have a ZONE argument that they parse in the setup util. All in-tree plugins have been updated. Signed-off-by: Miek Gieben <miek@miek.nl>
Diffstat (limited to 'plugin/normalize.go')
-rw-r--r--plugin/normalize.go96
1 files changed, 46 insertions, 50 deletions
diff --git a/plugin/normalize.go b/plugin/normalize.go
index 56b086fcd..96ec59c76 100644
--- a/plugin/normalize.go
+++ b/plugin/normalize.go
@@ -6,6 +6,7 @@ import (
"strconv"
"strings"
+ "github.com/coredns/coredns/plugin/pkg/cidr"
"github.com/coredns/coredns/plugin/pkg/parse"
"github.com/miekg/dns"
@@ -62,82 +63,77 @@ type (
// Normalize will return the host portion of host, stripping
// of any port or transport. The host will also be fully qualified and lowercased.
-// An empty string is returned on failure
-func (h Host) Normalize() string {
+// An empty slice is returned on failure
+func (h Host) Normalize() []string {
// The error can be ignored here, because this function should only be called after the corefile has already been vetted.
- host, _ := h.MustNormalize()
- return host
-}
-
-// MustNormalize will return the host portion of host, stripping
-// of any port or transport. The host will also be fully qualified and lowercased.
-// An error is returned on error
-func (h Host) MustNormalize() (string, error) {
s := string(h)
_, s = parse.Transport(s)
- // The error can be ignored here, because this function is called after the corefile has already been vetted.
- host, _, _, err := SplitHostPort(s)
+ hosts, _, err := SplitHostPort(s)
if err != nil {
- return "", err
+ return nil
+ }
+ for i := range hosts {
+ hosts[i] = Name(hosts[i]).Normalize()
+
}
- return Name(host).Normalize(), nil
+ return hosts
}
-// SplitHostPort splits s up in a host and port portion, taking reverse address notation into account.
-// String the string s should *not* be prefixed with any protocols, i.e. dns://. The returned ipnet is the
-// *net.IPNet that is used when the zone is a reverse and a netmask is given.
-func SplitHostPort(s string) (host, port string, ipnet *net.IPNet, err error) {
+// SplitHostPort splits s up in a host(s) and port portion, taking reverse address notation into account.
+// String the string s should *not* be prefixed with any protocols, i.e. dns://. SplitHostPort can return
+// multiple hosts when a reverse notation on a non-octet boundary is given.
+func SplitHostPort(s string) (hosts []string, port string, err error) {
// If there is: :[0-9]+ on the end we assume this is the port. This works for (ascii) domain
// names and our reverse syntax, which always needs a /mask *before* the port.
// So from the back, find first colon, and then check if it's a number.
- host = s
-
colon := strings.LastIndex(s, ":")
if colon == len(s)-1 {
- return "", "", nil, fmt.Errorf("expecting data after last colon: %q", s)
+ return nil, "", fmt.Errorf("expecting data after last colon: %q", s)
}
if colon != -1 {
if p, err := strconv.Atoi(s[colon+1:]); err == nil {
port = strconv.Itoa(p)
- host = s[:colon]
+ s = s[:colon]
}
}
// TODO(miek): this should take escaping into account.
- if len(host) > 255 {
- return "", "", nil, fmt.Errorf("specified zone is too long: %d > 255", len(host))
+ if len(s) > 255 {
+ return nil, "", fmt.Errorf("specified zone is too long: %d > 255", len(s))
}
- _, d := dns.IsDomainName(host)
- if !d {
- return "", "", nil, fmt.Errorf("zone is not a valid domain name: %s", host)
+ if _, ok := dns.IsDomainName(s); !ok {
+ return nil, "", fmt.Errorf("zone is not a valid domain name: %s", s)
}
// Check if it parses as a reverse zone, if so we use that. Must be fully specified IP and mask.
- ip, n, err := net.ParseCIDR(host)
- ones, bits := 0, 0
- if err == nil {
- if rev, e := dns.ReverseAddr(ip.String()); e == nil {
- ones, bits = n.Mask.Size()
- // get the size, in bits, of each portion of hostname defined in the reverse address. (8 for IPv4, 4 for IPv6)
- sizeDigit := 8
- if len(n.IP) == net.IPv6len {
- sizeDigit = 4
- }
- // Get the first lower octet boundary to see what encompassing zone we should be authoritative for.
- mod := (bits - ones) % sizeDigit
- nearest := (bits - ones) + mod
- offset := 0
- var end bool
- for i := 0; i < nearest/sizeDigit; i++ {
- offset, end = dns.NextLabel(rev, offset)
- if end {
- break
- }
- }
- host = rev[offset:]
+ _, n, err := net.ParseCIDR(s)
+ if err != nil {
+ return []string{s}, port, nil
+ }
+
+ // now check if multiple hosts must be returned.
+ nets := cidr.Class(n)
+ hosts = cidr.Reverse(nets)
+ return hosts, port, nil
+}
+
+// OriginsFromArgsOrServerBlock returns the normalized args if that slice
+// is not empty, otherwise the serverblock slice is returned (in a newly copied slice).
+func OriginsFromArgsOrServerBlock(args, serverblock []string) []string {
+ if len(args) == 0 {
+ s := make([]string, len(serverblock))
+ copy(s, serverblock)
+ for i := range s {
+ s[i] = Host(s[i]).Normalize()[0] // expansion of these already happened in dnsserver/registrer.go
}
+ return s
+ }
+ s := []string{}
+ for i := range args {
+ s = append(s, Host(args[i]).Normalize()...)
}
- return host, port, n, nil
+
+ return s
}