aboutsummaryrefslogtreecommitdiff
path: root/plugin/dnssec/cache.go
blob: 4dfe48d0cea4ea363c8758f5d8b6339ff4292e72 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
package dnssec

import (
	"hash/fnv"
	"io"
	"time"

	"github.com/coredns/coredns/plugin/pkg/cache"

	"github.com/miekg/dns"
)

// hash serializes the RRset and returns a signature cache key.
func hash(rrs []dns.RR) uint64 {
	h := fnv.New64()
	// we need to hash the entire RRset to pick the correct sig, if the rrset
	// changes for whatever reason we should resign.
	// We could use wirefmt, or the string format, both create garbage when creating
	// the hash key. And of course is a uint64 big enough?
	for _, rr := range rrs {
		io.WriteString(h, rr.String())
	}
	return h.Sum64()
}

func periodicClean(c *cache.Cache, stop <-chan struct{}) {
	tick := time.NewTicker(8 * time.Hour)
	defer tick.Stop()
	for {
		select {
		case <-tick.C:
			// we sign for 8 days, check if a signature in the cache reached 75% of that (i.e. 6), if found delete
			// the signature
			is75 := time.Now().UTC().Add(sixDays)
			c.Walk(func(items map[uint64]interface{}, key uint64) bool {
				sig := items[key].(*dns.RRSIG)
				if !sig.ValidityPeriod(is75) {
					delete(items, key)
				}
				return true
			})

		case <-stop:
			return

		}
	}
}