diff options
author | 2021-05-17 22:19:54 +0200 | |
---|---|---|
committer | 2021-05-17 13:19:54 -0700 | |
commit | 5f41d8eb1f74621ada05968dd6b0d24f9ae742df (patch) | |
tree | 9a75f00225cea18ea04224d882eb2fc11f5933df /plugin/normalize.go | |
parent | 540937964890ad36b56841374f7f83ef7a2a0247 (diff) | |
download | coredns-5f41d8eb1f74621ada05968dd6b0d24f9ae742df.tar.gz coredns-5f41d8eb1f74621ada05968dd6b0d24f9ae742df.tar.zst coredns-5f41d8eb1f74621ada05968dd6b0d24f9ae742df.zip |
reverse zone: fix Normalize (#4621)
Make normalize return multiple "hosts" (= reverse zones) when a
non-octet boundary cidr is given.
Added pkg/cidr package that holds the cidr calculation routines; felt
they didn't really fit dnsutil.
This change means the IPNet return parameter isn't needed, the hosts are
all correct. The tests that tests this is also removed: TestSplitHostPortReverse
The fallout was that zoneAddr _also_ doesn't need the IPNet member, that
in turn make it visible that zoneAddr in address.go duplicated a bunch
of stuff from register.go; removed/refactored that too.
Created a plugin.OriginsFromArgsOrServerBlock to help plugins do the
right things, by consuming ZONE arguments; this now expands reverse
zones correctly. This is mostly mechanical.
Remove the reverse test in plugin/kubernetes which is a copy-paste from
a core test (which has since been fixed).
Remove MustNormalize as it has no plugin users.
This change is not backwards compatible to plugins that have a ZONE
argument that they parse in the setup util.
All in-tree plugins have been updated.
Signed-off-by: Miek Gieben <miek@miek.nl>
Diffstat (limited to 'plugin/normalize.go')
-rw-r--r-- | plugin/normalize.go | 96 |
1 files changed, 46 insertions, 50 deletions
diff --git a/plugin/normalize.go b/plugin/normalize.go index 56b086fcd..96ec59c76 100644 --- a/plugin/normalize.go +++ b/plugin/normalize.go @@ -6,6 +6,7 @@ import ( "strconv" "strings" + "github.com/coredns/coredns/plugin/pkg/cidr" "github.com/coredns/coredns/plugin/pkg/parse" "github.com/miekg/dns" @@ -62,82 +63,77 @@ type ( // Normalize will return the host portion of host, stripping // of any port or transport. The host will also be fully qualified and lowercased. -// An empty string is returned on failure -func (h Host) Normalize() string { +// An empty slice is returned on failure +func (h Host) Normalize() []string { // The error can be ignored here, because this function should only be called after the corefile has already been vetted. - host, _ := h.MustNormalize() - return host -} - -// MustNormalize will return the host portion of host, stripping -// of any port or transport. The host will also be fully qualified and lowercased. -// An error is returned on error -func (h Host) MustNormalize() (string, error) { s := string(h) _, s = parse.Transport(s) - // The error can be ignored here, because this function is called after the corefile has already been vetted. - host, _, _, err := SplitHostPort(s) + hosts, _, err := SplitHostPort(s) if err != nil { - return "", err + return nil + } + for i := range hosts { + hosts[i] = Name(hosts[i]).Normalize() + } - return Name(host).Normalize(), nil + return hosts } -// SplitHostPort splits s up in a host and port portion, taking reverse address notation into account. -// String the string s should *not* be prefixed with any protocols, i.e. dns://. The returned ipnet is the -// *net.IPNet that is used when the zone is a reverse and a netmask is given. -func SplitHostPort(s string) (host, port string, ipnet *net.IPNet, err error) { +// SplitHostPort splits s up in a host(s) and port portion, taking reverse address notation into account. +// String the string s should *not* be prefixed with any protocols, i.e. dns://. SplitHostPort can return +// multiple hosts when a reverse notation on a non-octet boundary is given. +func SplitHostPort(s string) (hosts []string, port string, err error) { // If there is: :[0-9]+ on the end we assume this is the port. This works for (ascii) domain // names and our reverse syntax, which always needs a /mask *before* the port. // So from the back, find first colon, and then check if it's a number. - host = s - colon := strings.LastIndex(s, ":") if colon == len(s)-1 { - return "", "", nil, fmt.Errorf("expecting data after last colon: %q", s) + return nil, "", fmt.Errorf("expecting data after last colon: %q", s) } if colon != -1 { if p, err := strconv.Atoi(s[colon+1:]); err == nil { port = strconv.Itoa(p) - host = s[:colon] + s = s[:colon] } } // TODO(miek): this should take escaping into account. - if len(host) > 255 { - return "", "", nil, fmt.Errorf("specified zone is too long: %d > 255", len(host)) + if len(s) > 255 { + return nil, "", fmt.Errorf("specified zone is too long: %d > 255", len(s)) } - _, d := dns.IsDomainName(host) - if !d { - return "", "", nil, fmt.Errorf("zone is not a valid domain name: %s", host) + if _, ok := dns.IsDomainName(s); !ok { + return nil, "", fmt.Errorf("zone is not a valid domain name: %s", s) } // Check if it parses as a reverse zone, if so we use that. Must be fully specified IP and mask. - ip, n, err := net.ParseCIDR(host) - ones, bits := 0, 0 - if err == nil { - if rev, e := dns.ReverseAddr(ip.String()); e == nil { - ones, bits = n.Mask.Size() - // get the size, in bits, of each portion of hostname defined in the reverse address. (8 for IPv4, 4 for IPv6) - sizeDigit := 8 - if len(n.IP) == net.IPv6len { - sizeDigit = 4 - } - // Get the first lower octet boundary to see what encompassing zone we should be authoritative for. - mod := (bits - ones) % sizeDigit - nearest := (bits - ones) + mod - offset := 0 - var end bool - for i := 0; i < nearest/sizeDigit; i++ { - offset, end = dns.NextLabel(rev, offset) - if end { - break - } - } - host = rev[offset:] + _, n, err := net.ParseCIDR(s) + if err != nil { + return []string{s}, port, nil + } + + // now check if multiple hosts must be returned. + nets := cidr.Class(n) + hosts = cidr.Reverse(nets) + return hosts, port, nil +} + +// OriginsFromArgsOrServerBlock returns the normalized args if that slice +// is not empty, otherwise the serverblock slice is returned (in a newly copied slice). +func OriginsFromArgsOrServerBlock(args, serverblock []string) []string { + if len(args) == 0 { + s := make([]string, len(serverblock)) + copy(s, serverblock) + for i := range s { + s[i] = Host(s[i]).Normalize()[0] // expansion of these already happened in dnsserver/registrer.go } + return s + } + s := []string{} + for i := range args { + s = append(s, Host(args[i]).Normalize()...) } - return host, port, n, nil + + return s } |