diff options
author | 2021-03-15 15:42:13 +0100 | |
---|---|---|
committer | 2021-03-15 15:42:13 +0100 | |
commit | 064d6cdd0ac4936fd4d180d25abe199a4cf14d1d (patch) | |
tree | 7dd058727db83e3d852fb4eaa71d669cfc094410 /plugin | |
parent | c04d112b8313a83159fd9bc0ec5760d40d802a12 (diff) | |
download | coredns-064d6cdd0ac4936fd4d180d25abe199a4cf14d1d.tar.gz coredns-064d6cdd0ac4936fd4d180d25abe199a4cf14d1d.tar.zst coredns-064d6cdd0ac4936fd4d180d25abe199a4cf14d1d.zip |
Revert "plugin/sign: track zone file's mtime (#4431)" (#4511)
This reverts commit c4720b8ad238fc5e0603c7f96fdd5982024404a2.
Diffstat (limited to 'plugin')
-rw-r--r-- | plugin/sign/README.md | 13 | ||||
-rw-r--r-- | plugin/sign/resign_test.go | 52 | ||||
-rw-r--r-- | plugin/sign/signer.go | 12 |
3 files changed, 4 insertions, 73 deletions
diff --git a/plugin/sign/README.md b/plugin/sign/README.md index 64cb7e7af..6eb4ba8af 100644 --- a/plugin/sign/README.md +++ b/plugin/sign/README.md @@ -7,9 +7,9 @@ ## Description The *sign* plugin is used to sign (see RFC 6781) zones. In this process DNSSEC resource records are -added to the zone. The signatures that sign the resource records sets have an expiration date. This -means the signing process must be repeated before this expiration data is reached. Otherwise the -zone's data will go BAD (RFC 4035, Section 5.5). The *sign* plugin takes care of this. +added. The signatures that sign the resource records sets have an expiration date, this means the +signing process must be repeated before this expiration data is reached. Otherwise the zone's data +will go BAD (RFC 4035, Section 5.5). The *sign* plugin takes care of this. Only NSEC is supported, *sign* does *not* support NSEC3. @@ -29,12 +29,7 @@ it do key or algorithm rollovers - it just signs. - the signature only has 14 days left before expiring. - Both these dates are only checked on the SOA's signature(s). This concerns the DNSSEC data, the - *sign* plugin will also take into account and resign if: - - - the **mtime** of the zone file has changed, since the last time it was checked. - - - the signed zone file doesn't exist on disk. + Both these dates are only checked on the SOA's signature(s). * Create RRSIGs that have an inception of -3 hours (minus a jitter between 0 and 18 hours) and a expiration of +32 (plus a jitter between 0 and 5 days) days for every given DNSKEY. diff --git a/plugin/sign/resign_test.go b/plugin/sign/resign_test.go index af8d22904..2f67f52aa 100644 --- a/plugin/sign/resign_test.go +++ b/plugin/sign/resign_test.go @@ -1,12 +1,9 @@ package sign import ( - "os" "strings" "testing" "time" - - "github.com/coredns/caddy" ) func TestResignInception(t *testing.T) { @@ -41,52 +38,3 @@ func TestResignExpire(t *testing.T) { t.Errorf("Expected RRSIG to be invalid for %s, got valid", then.Format(timeFmt)) } } - -func TestResignModTime(t *testing.T) { - input := `sign testdata/db.miek.nl miek.nl { - key file testdata/Kmiek.nl.+013+59725 - directory testdata - }` - c := caddy.NewTestController("dns", input) - sign, err := parse(c) - if err != nil { - t.Fatal(err) - } - defer os.Remove("testdata/db.miek.nl.signed") - - if len(sign.signers) != 1 { - t.Fatalf("Expected 1 signer, got %d", len(sign.signers)) - } - signer := sign.signers[0] - - why := signer.resign() - if !strings.Contains(why.Error(), "no such file or directory") { - t.Fatalf("Expected %q, got: %s", "no such file or directory", why.Error()) - } - - // Slightly harder to properly test this, as we need to pull in the zone writing as well. - z, err := signer.Sign(time.Now().UTC()) - if err != nil { - t.Fatal(err) - } - if err := signer.write(z); err != nil { - t.Fatal(err) - } - if x := signer.modTime; x.IsZero() { - t.Errorf("Expected non zero modification time: got: %s", x.Format(timeFmt)) - } - - why = signer.resign() - if why != nil { - t.Errorf("Expected not to have to resign the zone, got: %s", why) - } - - // set mtime on original zone file and see if we pick it up as a cue to resign - if err := os.Chtimes("testdata/db.miek.nl", time.Now(), time.Now()); err != nil { - t.Fatal(err) - } - why = signer.resign() - if !strings.Contains(why.Error(), "differs from last seen modification") { - t.Errorf("Expecting to resign the zone, but got: %s", why.Error()) - } -} diff --git a/plugin/sign/signer.go b/plugin/sign/signer.go index 5753077c8..d1ea22356 100644 --- a/plugin/sign/signer.go +++ b/plugin/sign/signer.go @@ -22,7 +22,6 @@ type Signer struct { origin string dbfile string directory string - modTime time.Time jitterIncep time.Duration jitterExpir time.Duration @@ -42,11 +41,6 @@ func (s *Signer) Sign(now time.Time) (*file.Zone, error) { return nil, err } - // s.dbfile is a parseable zone file, track the mtime - if fi, err := os.Stat(s.dbfile); err == nil { - s.modTime = fi.ModTime() - } - mttl := z.Apex.SOA.Minttl ttl := z.Apex.SOA.Header().Ttl inception, expiration := lifetime(now, s.jitterIncep, s.jitterExpir) @@ -121,12 +115,6 @@ func (s *Signer) resign() error { if err != nil && os.IsNotExist(err) { return err } - // if modtime of the input zone file has changed, we will also resign. - if fi, err := os.Stat(s.dbfile); err == nil { - if !s.modTime.IsZero() && fi.ModTime() != s.modTime { - return fmt.Errorf("zone's modification time %s; differs from last seen modification time: %s", fi.ModTime().Format(timeFmt), s.modTime.Format(timeFmt)) - } - } now := time.Now().UTC() return resign(rd, now) |