1b7579f77SDag-Erling Smørgrav /* 2*5469a995SCy Schubert * smallapp/unbound-checkconf.c - config file checker for unbound.conf file. 3b7579f77SDag-Erling Smørgrav * 4b7579f77SDag-Erling Smørgrav * Copyright (c) 2007, NLnet Labs. All rights reserved. 5b7579f77SDag-Erling Smørgrav * 6b7579f77SDag-Erling Smørgrav * This software is open source. 7b7579f77SDag-Erling Smørgrav * 8b7579f77SDag-Erling Smørgrav * Redistribution and use in source and binary forms, with or without 9b7579f77SDag-Erling Smørgrav * modification, are permitted provided that the following conditions 10b7579f77SDag-Erling Smørgrav * are met: 11b7579f77SDag-Erling Smørgrav * 12b7579f77SDag-Erling Smørgrav * Redistributions of source code must retain the above copyright notice, 13b7579f77SDag-Erling Smørgrav * this list of conditions and the following disclaimer. 14b7579f77SDag-Erling Smørgrav * 15b7579f77SDag-Erling Smørgrav * Redistributions in binary form must reproduce the above copyright notice, 16b7579f77SDag-Erling Smørgrav * this list of conditions and the following disclaimer in the documentation 17b7579f77SDag-Erling Smørgrav * and/or other materials provided with the distribution. 18b7579f77SDag-Erling Smørgrav * 19b7579f77SDag-Erling Smørgrav * Neither the name of the NLNET LABS nor the names of its contributors may 20b7579f77SDag-Erling Smørgrav * be used to endorse or promote products derived from this software without 21b7579f77SDag-Erling Smørgrav * specific prior written permission. 22b7579f77SDag-Erling Smørgrav * 23b7579f77SDag-Erling Smørgrav * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 2417d15b25SDag-Erling Smørgrav * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 2517d15b25SDag-Erling Smørgrav * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 2617d15b25SDag-Erling Smørgrav * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 2717d15b25SDag-Erling Smørgrav * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 2817d15b25SDag-Erling Smørgrav * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 2917d15b25SDag-Erling Smørgrav * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 3017d15b25SDag-Erling Smørgrav * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 3117d15b25SDag-Erling Smørgrav * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 3217d15b25SDag-Erling Smørgrav * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 3317d15b25SDag-Erling Smørgrav * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34b7579f77SDag-Erling Smørgrav */ 35b7579f77SDag-Erling Smørgrav 36b7579f77SDag-Erling Smørgrav /** 37b7579f77SDag-Erling Smørgrav * \file 38b7579f77SDag-Erling Smørgrav * 39b7579f77SDag-Erling Smørgrav * The config checker checks for syntax and other errors in the unbound.conf 40b7579f77SDag-Erling Smørgrav * file, and can be used to check for errors before the server is started 41b7579f77SDag-Erling Smørgrav * or sigHUPped. 42b7579f77SDag-Erling Smørgrav * Exit status 1 means an error. 43b7579f77SDag-Erling Smørgrav */ 44b7579f77SDag-Erling Smørgrav 45b7579f77SDag-Erling Smørgrav #include "config.h" 464c75e3aaSDag-Erling Smørgrav #include <ctype.h> 47b7579f77SDag-Erling Smørgrav #include "util/log.h" 48b7579f77SDag-Erling Smørgrav #include "util/config_file.h" 49b7579f77SDag-Erling Smørgrav #include "util/module.h" 50b7579f77SDag-Erling Smørgrav #include "util/net_help.h" 51b7579f77SDag-Erling Smørgrav #include "util/regional.h" 52b7579f77SDag-Erling Smørgrav #include "iterator/iterator.h" 53b7579f77SDag-Erling Smørgrav #include "iterator/iter_fwd.h" 54b7579f77SDag-Erling Smørgrav #include "iterator/iter_hints.h" 55b7579f77SDag-Erling Smørgrav #include "validator/validator.h" 56b7579f77SDag-Erling Smørgrav #include "services/localzone.h" 5765b390aaSDag-Erling Smørgrav #include "services/view.h" 5857bddd21SDag-Erling Smørgrav #include "services/authzone.h" 5965b390aaSDag-Erling Smørgrav #include "respip/respip.h" 6009a3aaf3SDag-Erling Smørgrav #include "sldns/sbuffer.h" 6125039b37SCy Schubert #include "sldns/str2wire.h" 62b7579f77SDag-Erling Smørgrav #ifdef HAVE_GETOPT_H 63b7579f77SDag-Erling Smørgrav #include <getopt.h> 64b7579f77SDag-Erling Smørgrav #endif 65b7579f77SDag-Erling Smørgrav #ifdef HAVE_PWD_H 66b7579f77SDag-Erling Smørgrav #include <pwd.h> 67b7579f77SDag-Erling Smørgrav #endif 68b7579f77SDag-Erling Smørgrav #ifdef HAVE_SYS_STAT_H 69b7579f77SDag-Erling Smørgrav #include <sys/stat.h> 70b7579f77SDag-Erling Smørgrav #endif 71b7579f77SDag-Erling Smørgrav #ifdef HAVE_GLOB_H 72b7579f77SDag-Erling Smørgrav #include <glob.h> 73b7579f77SDag-Erling Smørgrav #endif 74b7579f77SDag-Erling Smørgrav #ifdef WITH_PYTHONMODULE 75b7579f77SDag-Erling Smørgrav #include "pythonmod/pythonmod.h" 76b7579f77SDag-Erling Smørgrav #endif 77971980c3SDag-Erling Smørgrav #ifdef CLIENT_SUBNET 78971980c3SDag-Erling Smørgrav #include "edns-subnet/subnet-whitelist.h" 79971980c3SDag-Erling Smørgrav #endif 80b7579f77SDag-Erling Smørgrav 81b7579f77SDag-Erling Smørgrav /** Give checkconf usage, and exit (1). */ 82b7579f77SDag-Erling Smørgrav static void 83b5663de9SDag-Erling Smørgrav usage(void) 84b7579f77SDag-Erling Smørgrav { 85b70d78d6SDag-Erling Smørgrav printf("Usage: local-unbound-checkconf [file]\n"); 86b7579f77SDag-Erling Smørgrav printf(" Checks unbound configuration file for errors.\n"); 87b7579f77SDag-Erling Smørgrav printf("file if omitted %s is used.\n", CONFIGFILE); 88b7579f77SDag-Erling Smørgrav printf("-o option print value of option to stdout.\n"); 896480faa8SDag-Erling Smørgrav printf("-f output full pathname with chroot applied, eg. with -o pidfile.\n"); 90b7579f77SDag-Erling Smørgrav printf("-h show this usage help.\n"); 91b7579f77SDag-Erling Smørgrav printf("Version %s\n", PACKAGE_VERSION); 92b7579f77SDag-Erling Smørgrav printf("BSD licensed, see LICENSE in source package for details.\n"); 93b7579f77SDag-Erling Smørgrav printf("Report bugs to %s\n", PACKAGE_BUGREPORT); 94b7579f77SDag-Erling Smørgrav exit(1); 95b7579f77SDag-Erling Smørgrav } 96b7579f77SDag-Erling Smørgrav 97b7579f77SDag-Erling Smørgrav /** 98b7579f77SDag-Erling Smørgrav * Print given option to stdout 99b7579f77SDag-Erling Smørgrav * @param cfg: config 100b7579f77SDag-Erling Smørgrav * @param opt: option name without trailing :. 101b7579f77SDag-Erling Smørgrav * This is different from config_set_option. 1026480faa8SDag-Erling Smørgrav * @param final: if final pathname with chroot applied has to be printed. 103b7579f77SDag-Erling Smørgrav */ 104b7579f77SDag-Erling Smørgrav static void 1056480faa8SDag-Erling Smørgrav print_option(struct config_file* cfg, const char* opt, int final) 106b7579f77SDag-Erling Smørgrav { 1076480faa8SDag-Erling Smørgrav if(strcmp(opt, "pidfile") == 0 && final) { 108bc892140SDag-Erling Smørgrav char *p = fname_after_chroot(cfg->pidfile, cfg, 1); 109bc892140SDag-Erling Smørgrav if(!p) fatal_exit("out of memory"); 110bc892140SDag-Erling Smørgrav printf("%s\n", p); 111bc892140SDag-Erling Smørgrav free(p); 1126480faa8SDag-Erling Smørgrav return; 1136480faa8SDag-Erling Smørgrav } 11457bddd21SDag-Erling Smørgrav if(strcmp(opt, "auto-trust-anchor-file") == 0 && final) { 11557bddd21SDag-Erling Smørgrav struct config_strlist* s = cfg->auto_trust_anchor_file_list; 11657bddd21SDag-Erling Smørgrav for(; s; s=s->next) { 11757bddd21SDag-Erling Smørgrav char *p = fname_after_chroot(s->str, cfg, 1); 11857bddd21SDag-Erling Smørgrav if(!p) fatal_exit("out of memory"); 11957bddd21SDag-Erling Smørgrav printf("%s\n", p); 12057bddd21SDag-Erling Smørgrav free(p); 12157bddd21SDag-Erling Smørgrav } 12257bddd21SDag-Erling Smørgrav return; 12357bddd21SDag-Erling Smørgrav } 124b7579f77SDag-Erling Smørgrav if(!config_get_option(cfg, opt, config_print_func, stdout)) 125b7579f77SDag-Erling Smørgrav fatal_exit("cannot print option '%s'", opt); 126b7579f77SDag-Erling Smørgrav } 127b7579f77SDag-Erling Smørgrav 128b7579f77SDag-Erling Smørgrav /** check if module works with config */ 129b7579f77SDag-Erling Smørgrav static void 130b7579f77SDag-Erling Smørgrav check_mod(struct config_file* cfg, struct module_func_block* fb) 131b7579f77SDag-Erling Smørgrav { 132b7579f77SDag-Erling Smørgrav struct module_env env; 133b7579f77SDag-Erling Smørgrav memset(&env, 0, sizeof(env)); 134b7579f77SDag-Erling Smørgrav env.cfg = cfg; 135b7579f77SDag-Erling Smørgrav env.scratch = regional_create(); 13617d15b25SDag-Erling Smørgrav env.scratch_buffer = sldns_buffer_new(BUFSIZ); 137b7579f77SDag-Erling Smørgrav if(!env.scratch || !env.scratch_buffer) 138b7579f77SDag-Erling Smørgrav fatal_exit("out of memory"); 139bc892140SDag-Erling Smørgrav if(!edns_known_options_init(&env)) 140bc892140SDag-Erling Smørgrav fatal_exit("out of memory"); 141b7579f77SDag-Erling Smørgrav if(!(*fb->init)(&env, 0)) { 142b7579f77SDag-Erling Smørgrav fatal_exit("bad config for %s module", fb->name); 143b7579f77SDag-Erling Smørgrav } 144b7579f77SDag-Erling Smørgrav (*fb->deinit)(&env, 0); 14517d15b25SDag-Erling Smørgrav sldns_buffer_free(env.scratch_buffer); 146b7579f77SDag-Erling Smørgrav regional_destroy(env.scratch); 147bc892140SDag-Erling Smørgrav edns_known_options_delete(&env); 148b7579f77SDag-Erling Smørgrav } 149b7579f77SDag-Erling Smørgrav 1500eefd307SCy Schubert /** true if addr is a localhost address, 127.0.0.1 or ::1 (with maybe "@port" 1510eefd307SCy Schubert * after it) */ 1520eefd307SCy Schubert static int 1530eefd307SCy Schubert str_addr_is_localhost(const char* a) 1540eefd307SCy Schubert { 1550eefd307SCy Schubert if(strncmp(a, "127.", 4) == 0) return 1; 1560eefd307SCy Schubert if(strncmp(a, "::1", 3) == 0) return 1; 1570eefd307SCy Schubert return 0; 1580eefd307SCy Schubert } 1590eefd307SCy Schubert 1600eefd307SCy Schubert /** check do-not-query-localhost */ 1610eefd307SCy Schubert static void 1620eefd307SCy Schubert donotquerylocalhostcheck(struct config_file* cfg) 1630eefd307SCy Schubert { 1640eefd307SCy Schubert if(cfg->donotquery_localhost) { 1650eefd307SCy Schubert struct config_stub* p; 1660eefd307SCy Schubert struct config_strlist* s; 1670eefd307SCy Schubert for(p=cfg->forwards; p; p=p->next) { 1680eefd307SCy Schubert for(s=p->addrs; s; s=s->next) { 1690eefd307SCy Schubert if(str_addr_is_localhost(s->str)) { 1700eefd307SCy Schubert fprintf(stderr, "unbound-checkconf: warning: forward-addr: '%s' is specified for forward-zone: '%s', but do-not-query-localhost: yes means that the address will not be used for lookups.\n", 1710eefd307SCy Schubert s->str, p->name); 1720eefd307SCy Schubert } 1730eefd307SCy Schubert } 1740eefd307SCy Schubert } 1750eefd307SCy Schubert for(p=cfg->stubs; p; p=p->next) { 1760eefd307SCy Schubert for(s=p->addrs; s; s=s->next) { 1770eefd307SCy Schubert if(str_addr_is_localhost(s->str)) { 1780eefd307SCy Schubert fprintf(stderr, "unbound-checkconf: warning: stub-addr: '%s' is specified for stub-zone: '%s', but do-not-query-localhost: yes means that the address will not be used for lookups.\n", 1790eefd307SCy Schubert s->str, p->name); 1800eefd307SCy Schubert } 1810eefd307SCy Schubert } 1820eefd307SCy Schubert } 1830eefd307SCy Schubert } 1840eefd307SCy Schubert } 1850eefd307SCy Schubert 186b7579f77SDag-Erling Smørgrav /** check localzones */ 187b7579f77SDag-Erling Smørgrav static void 188b7579f77SDag-Erling Smørgrav localzonechecks(struct config_file* cfg) 189b7579f77SDag-Erling Smørgrav { 190b7579f77SDag-Erling Smørgrav struct local_zones* zs; 191b7579f77SDag-Erling Smørgrav if(!(zs = local_zones_create())) 192b7579f77SDag-Erling Smørgrav fatal_exit("out of memory"); 193b7579f77SDag-Erling Smørgrav if(!local_zones_apply_cfg(zs, cfg)) 194b7579f77SDag-Erling Smørgrav fatal_exit("failed local-zone, local-data configuration"); 195b7579f77SDag-Erling Smørgrav local_zones_delete(zs); 196b7579f77SDag-Erling Smørgrav } 197b7579f77SDag-Erling Smørgrav 19825039b37SCy Schubert /** checks for acl and views */ 19925039b37SCy Schubert static void 20025039b37SCy Schubert acl_view_tag_checks(struct config_file* cfg, struct views* views) 20125039b37SCy Schubert { 20225039b37SCy Schubert int d; 20325039b37SCy Schubert struct sockaddr_storage a; 20425039b37SCy Schubert socklen_t alen; 20525039b37SCy Schubert struct config_str2list* acl; 20625039b37SCy Schubert struct config_str3list* s3; 20725039b37SCy Schubert struct config_strbytelist* sb; 20825039b37SCy Schubert 20925039b37SCy Schubert /* acl_view */ 21025039b37SCy Schubert for(acl=cfg->acl_view; acl; acl = acl->next) { 21125039b37SCy Schubert struct view* v; 21225039b37SCy Schubert if(!netblockstrtoaddr(acl->str, UNBOUND_DNS_PORT, &a, &alen, 21325039b37SCy Schubert &d)) { 21425039b37SCy Schubert fatal_exit("cannot parse access-control-view " 21525039b37SCy Schubert "address %s %s", acl->str, acl->str2); 21625039b37SCy Schubert } 21725039b37SCy Schubert v = views_find_view(views, acl->str2, 0); 21825039b37SCy Schubert if(!v) { 21925039b37SCy Schubert fatal_exit("cannot find view for " 22025039b37SCy Schubert "access-control-view: %s %s", 22125039b37SCy Schubert acl->str, acl->str2); 22225039b37SCy Schubert } 22325039b37SCy Schubert lock_rw_unlock(&v->lock); 22425039b37SCy Schubert } 22525039b37SCy Schubert 22625039b37SCy Schubert /* acl_tags */ 22725039b37SCy Schubert for(sb=cfg->acl_tags; sb; sb = sb->next) { 22825039b37SCy Schubert if(!netblockstrtoaddr(sb->str, UNBOUND_DNS_PORT, &a, &alen, 22925039b37SCy Schubert &d)) { 23025039b37SCy Schubert fatal_exit("cannot parse access-control-tags " 23125039b37SCy Schubert "address %s", sb->str); 23225039b37SCy Schubert } 23325039b37SCy Schubert } 23425039b37SCy Schubert 23525039b37SCy Schubert /* acl_tag_actions */ 23625039b37SCy Schubert for(s3=cfg->acl_tag_actions; s3; s3 = s3->next) { 23725039b37SCy Schubert enum localzone_type t; 23825039b37SCy Schubert if(!netblockstrtoaddr(s3->str, UNBOUND_DNS_PORT, &a, &alen, 23925039b37SCy Schubert &d)) { 24025039b37SCy Schubert fatal_exit("cannot parse access-control-tag-actions " 24125039b37SCy Schubert "address %s %s %s", 24225039b37SCy Schubert s3->str, s3->str2, s3->str3); 24325039b37SCy Schubert } 24425039b37SCy Schubert if(find_tag_id(cfg, s3->str2) == -1) { 24525039b37SCy Schubert fatal_exit("cannot parse tag %s (define-tag it), " 24625039b37SCy Schubert "for access-control-tag-actions: %s %s %s", 24725039b37SCy Schubert s3->str2, s3->str, s3->str2, s3->str3); 24825039b37SCy Schubert } 24925039b37SCy Schubert if(!local_zone_str2type(s3->str3, &t)) { 25025039b37SCy Schubert fatal_exit("cannot parse access control action type %s" 25125039b37SCy Schubert " for access-control-tag-actions: %s %s %s", 25225039b37SCy Schubert s3->str3, s3->str, s3->str2, s3->str3); 25325039b37SCy Schubert } 25425039b37SCy Schubert } 25525039b37SCy Schubert 25625039b37SCy Schubert /* acl_tag_datas */ 25725039b37SCy Schubert for(s3=cfg->acl_tag_datas; s3; s3 = s3->next) { 25825039b37SCy Schubert char buf[65536]; 25925039b37SCy Schubert uint8_t rr[LDNS_RR_BUF_SIZE]; 26025039b37SCy Schubert size_t len = sizeof(rr); 26125039b37SCy Schubert int res; 26225039b37SCy Schubert if(!netblockstrtoaddr(s3->str, UNBOUND_DNS_PORT, &a, &alen, 26325039b37SCy Schubert &d)) { 26425039b37SCy Schubert fatal_exit("cannot parse access-control-tag-datas address %s %s '%s'", 26525039b37SCy Schubert s3->str, s3->str2, s3->str3); 26625039b37SCy Schubert } 26725039b37SCy Schubert if(find_tag_id(cfg, s3->str2) == -1) { 26825039b37SCy Schubert fatal_exit("cannot parse tag %s (define-tag it), " 26925039b37SCy Schubert "for access-control-tag-datas: %s %s '%s'", 27025039b37SCy Schubert s3->str2, s3->str, s3->str2, s3->str3); 27125039b37SCy Schubert } 27225039b37SCy Schubert /* '.' is sufficient for validation, and it makes the call to 27325039b37SCy Schubert * sldns_wirerr_get_type() simpler below. */ 27425039b37SCy Schubert snprintf(buf, sizeof(buf), "%s %s", ".", s3->str3); 27525039b37SCy Schubert res = sldns_str2wire_rr_buf(buf, rr, &len, NULL, 3600, NULL, 27625039b37SCy Schubert 0, NULL, 0); 27725039b37SCy Schubert if(res != 0) { 27825039b37SCy Schubert fatal_exit("cannot parse rr data [char %d] parse error %s, for access-control-tag-datas: %s %s '%s'", 27925039b37SCy Schubert (int)LDNS_WIREPARSE_OFFSET(res)-2, 28025039b37SCy Schubert sldns_get_errorstr_parse(res), 28125039b37SCy Schubert s3->str, s3->str2, s3->str3); 28225039b37SCy Schubert } 28325039b37SCy Schubert } 28425039b37SCy Schubert } 28525039b37SCy Schubert 28665b390aaSDag-Erling Smørgrav /** check view and response-ip configuration */ 28765b390aaSDag-Erling Smørgrav static void 28865b390aaSDag-Erling Smørgrav view_and_respipchecks(struct config_file* cfg) 28965b390aaSDag-Erling Smørgrav { 29065b390aaSDag-Erling Smørgrav struct views* views = NULL; 29165b390aaSDag-Erling Smørgrav struct respip_set* respip = NULL; 29265b390aaSDag-Erling Smørgrav int ignored = 0; 29365b390aaSDag-Erling Smørgrav if(!(views = views_create())) 29465b390aaSDag-Erling Smørgrav fatal_exit("Could not create views: out of memory"); 29565b390aaSDag-Erling Smørgrav if(!(respip = respip_set_create())) 29665b390aaSDag-Erling Smørgrav fatal_exit("Could not create respip set: out of memory"); 29765b390aaSDag-Erling Smørgrav if(!views_apply_cfg(views, cfg)) 29865b390aaSDag-Erling Smørgrav fatal_exit("Could not set up views"); 29965b390aaSDag-Erling Smørgrav if(!respip_global_apply_cfg(respip, cfg)) 30065b390aaSDag-Erling Smørgrav fatal_exit("Could not setup respip set"); 30165b390aaSDag-Erling Smørgrav if(!respip_views_apply_cfg(views, cfg, &ignored)) 30265b390aaSDag-Erling Smørgrav fatal_exit("Could not setup per-view respip sets"); 30325039b37SCy Schubert acl_view_tag_checks(cfg, views); 30465b390aaSDag-Erling Smørgrav views_delete(views); 30565b390aaSDag-Erling Smørgrav respip_set_delete(respip); 30665b390aaSDag-Erling Smørgrav } 30765b390aaSDag-Erling Smørgrav 308b7579f77SDag-Erling Smørgrav /** emit warnings for IP in hosts */ 309b7579f77SDag-Erling Smørgrav static void 310b7579f77SDag-Erling Smørgrav warn_hosts(const char* typ, struct config_stub* list) 311b7579f77SDag-Erling Smørgrav { 312b7579f77SDag-Erling Smørgrav struct sockaddr_storage a; 313b7579f77SDag-Erling Smørgrav socklen_t alen; 314b7579f77SDag-Erling Smørgrav struct config_stub* s; 315b7579f77SDag-Erling Smørgrav struct config_strlist* h; 316b7579f77SDag-Erling Smørgrav for(s=list; s; s=s->next) { 317b7579f77SDag-Erling Smørgrav for(h=s->hosts; h; h=h->next) { 318b7579f77SDag-Erling Smørgrav if(extstrtoaddr(h->str, &a, &alen)) { 319b7579f77SDag-Erling Smørgrav fprintf(stderr, "unbound-checkconf: warning:" 320b7579f77SDag-Erling Smørgrav " %s %s: \"%s\" is an IP%s address, " 321b7579f77SDag-Erling Smørgrav "and when looked up as a host name " 322b7579f77SDag-Erling Smørgrav "during use may not resolve.\n", 323b7579f77SDag-Erling Smørgrav s->name, typ, h->str, 324b7579f77SDag-Erling Smørgrav addr_is_ip6(&a, alen)?"6":"4"); 325b7579f77SDag-Erling Smørgrav } 326b7579f77SDag-Erling Smørgrav } 327b7579f77SDag-Erling Smørgrav } 328b7579f77SDag-Erling Smørgrav } 329b7579f77SDag-Erling Smørgrav 330b7579f77SDag-Erling Smørgrav /** check interface strings */ 331b7579f77SDag-Erling Smørgrav static void 332b7579f77SDag-Erling Smørgrav interfacechecks(struct config_file* cfg) 333b7579f77SDag-Erling Smørgrav { 334b5663de9SDag-Erling Smørgrav int d; 335b7579f77SDag-Erling Smørgrav struct sockaddr_storage a; 336b7579f77SDag-Erling Smørgrav socklen_t alen; 337b7579f77SDag-Erling Smørgrav int i, j; 338b7579f77SDag-Erling Smørgrav for(i=0; i<cfg->num_ifs; i++) { 339b7579f77SDag-Erling Smørgrav if(!extstrtoaddr(cfg->ifs[i], &a, &alen)) { 340b7579f77SDag-Erling Smørgrav fatal_exit("cannot parse interface specified as '%s'", 341b7579f77SDag-Erling Smørgrav cfg->ifs[i]); 342b7579f77SDag-Erling Smørgrav } 343b7579f77SDag-Erling Smørgrav for(j=0; j<cfg->num_ifs; j++) { 344b7579f77SDag-Erling Smørgrav if(i!=j && strcmp(cfg->ifs[i], cfg->ifs[j])==0) 345b7579f77SDag-Erling Smørgrav fatal_exit("interface: %s present twice, " 346b7579f77SDag-Erling Smørgrav "cannot bind same ports twice.", 347b7579f77SDag-Erling Smørgrav cfg->ifs[i]); 348b7579f77SDag-Erling Smørgrav } 349b7579f77SDag-Erling Smørgrav } 350b7579f77SDag-Erling Smørgrav for(i=0; i<cfg->num_out_ifs; i++) { 351b5663de9SDag-Erling Smørgrav if(!ipstrtoaddr(cfg->out_ifs[i], UNBOUND_DNS_PORT, &a, &alen) && 352b5663de9SDag-Erling Smørgrav !netblockstrtoaddr(cfg->out_ifs[i], UNBOUND_DNS_PORT, &a, &alen, &d)) { 353b7579f77SDag-Erling Smørgrav fatal_exit("cannot parse outgoing-interface " 354b7579f77SDag-Erling Smørgrav "specified as '%s'", cfg->out_ifs[i]); 355b7579f77SDag-Erling Smørgrav } 356b7579f77SDag-Erling Smørgrav for(j=0; j<cfg->num_out_ifs; j++) { 357b7579f77SDag-Erling Smørgrav if(i!=j && strcmp(cfg->out_ifs[i], cfg->out_ifs[j])==0) 358b7579f77SDag-Erling Smørgrav fatal_exit("outgoing-interface: %s present " 359b7579f77SDag-Erling Smørgrav "twice, cannot bind same ports twice.", 360b7579f77SDag-Erling Smørgrav cfg->out_ifs[i]); 361b7579f77SDag-Erling Smørgrav } 362b7579f77SDag-Erling Smørgrav } 363b7579f77SDag-Erling Smørgrav } 364b7579f77SDag-Erling Smørgrav 365b7579f77SDag-Erling Smørgrav /** check acl ips */ 366b7579f77SDag-Erling Smørgrav static void 367b7579f77SDag-Erling Smørgrav aclchecks(struct config_file* cfg) 368b7579f77SDag-Erling Smørgrav { 369b7579f77SDag-Erling Smørgrav int d; 370b7579f77SDag-Erling Smørgrav struct sockaddr_storage a; 371b7579f77SDag-Erling Smørgrav socklen_t alen; 372b7579f77SDag-Erling Smørgrav struct config_str2list* acl; 373b7579f77SDag-Erling Smørgrav for(acl=cfg->acls; acl; acl = acl->next) { 374b7579f77SDag-Erling Smørgrav if(!netblockstrtoaddr(acl->str, UNBOUND_DNS_PORT, &a, &alen, 375b7579f77SDag-Erling Smørgrav &d)) { 376b7579f77SDag-Erling Smørgrav fatal_exit("cannot parse access control address %s %s", 377b7579f77SDag-Erling Smørgrav acl->str, acl->str2); 378b7579f77SDag-Erling Smørgrav } 379b7579f77SDag-Erling Smørgrav } 380b7579f77SDag-Erling Smørgrav } 381b7579f77SDag-Erling Smørgrav 3824c75e3aaSDag-Erling Smørgrav /** check tcp connection limit ips */ 3834c75e3aaSDag-Erling Smørgrav static void 3844c75e3aaSDag-Erling Smørgrav tcpconnlimitchecks(struct config_file* cfg) 3854c75e3aaSDag-Erling Smørgrav { 3864c75e3aaSDag-Erling Smørgrav int d; 3874c75e3aaSDag-Erling Smørgrav struct sockaddr_storage a; 3884c75e3aaSDag-Erling Smørgrav socklen_t alen; 3894c75e3aaSDag-Erling Smørgrav struct config_str2list* tcl; 3904c75e3aaSDag-Erling Smørgrav for(tcl=cfg->tcp_connection_limits; tcl; tcl = tcl->next) { 3914c75e3aaSDag-Erling Smørgrav if(!netblockstrtoaddr(tcl->str, UNBOUND_DNS_PORT, &a, &alen, 3924c75e3aaSDag-Erling Smørgrav &d)) { 3934c75e3aaSDag-Erling Smørgrav fatal_exit("cannot parse tcp connection limit address %s %s", 3944c75e3aaSDag-Erling Smørgrav tcl->str, tcl->str2); 3954c75e3aaSDag-Erling Smørgrav } 3964c75e3aaSDag-Erling Smørgrav } 3974c75e3aaSDag-Erling Smørgrav } 3984c75e3aaSDag-Erling Smørgrav 399b7579f77SDag-Erling Smørgrav /** true if fname is a file */ 400b7579f77SDag-Erling Smørgrav static int 401b7579f77SDag-Erling Smørgrav is_file(const char* fname) 402b7579f77SDag-Erling Smørgrav { 403b7579f77SDag-Erling Smørgrav struct stat buf; 404b7579f77SDag-Erling Smørgrav if(stat(fname, &buf) < 0) { 405b7579f77SDag-Erling Smørgrav if(errno==EACCES) { 406b7579f77SDag-Erling Smørgrav printf("warning: no search permission for one of the directories in path: %s\n", fname); 407b7579f77SDag-Erling Smørgrav return 1; 408b7579f77SDag-Erling Smørgrav } 409b7579f77SDag-Erling Smørgrav perror(fname); 410b7579f77SDag-Erling Smørgrav return 0; 411b7579f77SDag-Erling Smørgrav } 412b7579f77SDag-Erling Smørgrav if(S_ISDIR(buf.st_mode)) { 413b7579f77SDag-Erling Smørgrav printf("%s is not a file\n", fname); 414b7579f77SDag-Erling Smørgrav return 0; 415b7579f77SDag-Erling Smørgrav } 416b7579f77SDag-Erling Smørgrav return 1; 417b7579f77SDag-Erling Smørgrav } 418b7579f77SDag-Erling Smørgrav 419b7579f77SDag-Erling Smørgrav /** true if fname is a directory */ 420b7579f77SDag-Erling Smørgrav static int 421b7579f77SDag-Erling Smørgrav is_dir(const char* fname) 422b7579f77SDag-Erling Smørgrav { 423b7579f77SDag-Erling Smørgrav struct stat buf; 424b7579f77SDag-Erling Smørgrav if(stat(fname, &buf) < 0) { 425b7579f77SDag-Erling Smørgrav if(errno==EACCES) { 426b7579f77SDag-Erling Smørgrav printf("warning: no search permission for one of the directories in path: %s\n", fname); 427b7579f77SDag-Erling Smørgrav return 1; 428b7579f77SDag-Erling Smørgrav } 429b7579f77SDag-Erling Smørgrav perror(fname); 430b7579f77SDag-Erling Smørgrav return 0; 431b7579f77SDag-Erling Smørgrav } 432b7579f77SDag-Erling Smørgrav if(!(S_ISDIR(buf.st_mode))) { 433b7579f77SDag-Erling Smørgrav printf("%s is not a directory\n", fname); 434b7579f77SDag-Erling Smørgrav return 0; 435b7579f77SDag-Erling Smørgrav } 436b7579f77SDag-Erling Smørgrav return 1; 437b7579f77SDag-Erling Smørgrav } 438b7579f77SDag-Erling Smørgrav 439b7579f77SDag-Erling Smørgrav /** get base dir of a fname */ 440b7579f77SDag-Erling Smørgrav static char* 441b7579f77SDag-Erling Smørgrav basedir(char* fname) 442b7579f77SDag-Erling Smørgrav { 443b7579f77SDag-Erling Smørgrav char* rev; 444b7579f77SDag-Erling Smørgrav if(!fname) fatal_exit("out of memory"); 445b7579f77SDag-Erling Smørgrav rev = strrchr(fname, '/'); 446b7579f77SDag-Erling Smørgrav if(!rev) return NULL; 447b7579f77SDag-Erling Smørgrav if(fname == rev) return NULL; 448b7579f77SDag-Erling Smørgrav rev[0] = 0; 449b7579f77SDag-Erling Smørgrav return fname; 450b7579f77SDag-Erling Smørgrav } 451b7579f77SDag-Erling Smørgrav 452b7579f77SDag-Erling Smørgrav /** check chroot for a file string */ 453b7579f77SDag-Erling Smørgrav static void 454b7579f77SDag-Erling Smørgrav check_chroot_string(const char* desc, char** ss, 455b7579f77SDag-Erling Smørgrav const char* chrootdir, struct config_file* cfg) 456b7579f77SDag-Erling Smørgrav { 457b7579f77SDag-Erling Smørgrav char* str = *ss; 458b7579f77SDag-Erling Smørgrav if(str && str[0]) { 459b7579f77SDag-Erling Smørgrav *ss = fname_after_chroot(str, cfg, 1); 460b7579f77SDag-Erling Smørgrav if(!*ss) fatal_exit("out of memory"); 461b7579f77SDag-Erling Smørgrav if(!is_file(*ss)) { 462b7579f77SDag-Erling Smørgrav if(chrootdir && chrootdir[0]) 463b7579f77SDag-Erling Smørgrav fatal_exit("%s: \"%s\" does not exist in " 464b7579f77SDag-Erling Smørgrav "chrootdir %s", desc, str, chrootdir); 465b7579f77SDag-Erling Smørgrav else 466b7579f77SDag-Erling Smørgrav fatal_exit("%s: \"%s\" does not exist", 467b7579f77SDag-Erling Smørgrav desc, str); 468b7579f77SDag-Erling Smørgrav } 469b7579f77SDag-Erling Smørgrav /* put in a new full path for continued checking */ 470b7579f77SDag-Erling Smørgrav free(str); 471b7579f77SDag-Erling Smørgrav } 472b7579f77SDag-Erling Smørgrav } 473b7579f77SDag-Erling Smørgrav 474b7579f77SDag-Erling Smørgrav /** check file list, every file must be inside the chroot location */ 475b7579f77SDag-Erling Smørgrav static void 476b7579f77SDag-Erling Smørgrav check_chroot_filelist(const char* desc, struct config_strlist* list, 477b7579f77SDag-Erling Smørgrav const char* chrootdir, struct config_file* cfg) 478b7579f77SDag-Erling Smørgrav { 479b7579f77SDag-Erling Smørgrav struct config_strlist* p; 480b7579f77SDag-Erling Smørgrav for(p=list; p; p=p->next) { 481b7579f77SDag-Erling Smørgrav check_chroot_string(desc, &p->str, chrootdir, cfg); 482b7579f77SDag-Erling Smørgrav } 483b7579f77SDag-Erling Smørgrav } 484b7579f77SDag-Erling Smørgrav 485b7579f77SDag-Erling Smørgrav /** check file list, with wildcard processing */ 486b7579f77SDag-Erling Smørgrav static void 487b7579f77SDag-Erling Smørgrav check_chroot_filelist_wild(const char* desc, struct config_strlist* list, 488b7579f77SDag-Erling Smørgrav const char* chrootdir, struct config_file* cfg) 489b7579f77SDag-Erling Smørgrav { 490b7579f77SDag-Erling Smørgrav struct config_strlist* p; 491b7579f77SDag-Erling Smørgrav for(p=list; p; p=p->next) { 492b7579f77SDag-Erling Smørgrav #ifdef HAVE_GLOB 493b7579f77SDag-Erling Smørgrav if(strchr(p->str, '*') || strchr(p->str, '[') || 494b7579f77SDag-Erling Smørgrav strchr(p->str, '?') || strchr(p->str, '{') || 495b7579f77SDag-Erling Smørgrav strchr(p->str, '~')) { 496b7579f77SDag-Erling Smørgrav char* s = p->str; 497b7579f77SDag-Erling Smørgrav /* adjust whole pattern for chroot and check later */ 498b7579f77SDag-Erling Smørgrav p->str = fname_after_chroot(p->str, cfg, 1); 499b7579f77SDag-Erling Smørgrav free(s); 500b7579f77SDag-Erling Smørgrav } else 501b7579f77SDag-Erling Smørgrav #endif /* HAVE_GLOB */ 502b7579f77SDag-Erling Smørgrav check_chroot_string(desc, &p->str, chrootdir, cfg); 503b7579f77SDag-Erling Smørgrav } 504b7579f77SDag-Erling Smørgrav } 505b7579f77SDag-Erling Smørgrav 506971980c3SDag-Erling Smørgrav #ifdef CLIENT_SUBNET 507971980c3SDag-Erling Smørgrav /** check ECS configuration */ 508971980c3SDag-Erling Smørgrav static void 509971980c3SDag-Erling Smørgrav ecs_conf_checks(struct config_file* cfg) 510971980c3SDag-Erling Smørgrav { 511971980c3SDag-Erling Smørgrav struct ecs_whitelist* whitelist = NULL; 512971980c3SDag-Erling Smørgrav if(!(whitelist = ecs_whitelist_create())) 513971980c3SDag-Erling Smørgrav fatal_exit("Could not create ednssubnet whitelist: out of memory"); 514971980c3SDag-Erling Smørgrav if(!ecs_whitelist_apply_cfg(whitelist, cfg)) 515971980c3SDag-Erling Smørgrav fatal_exit("Could not setup ednssubnet whitelist"); 516971980c3SDag-Erling Smørgrav ecs_whitelist_delete(whitelist); 517971980c3SDag-Erling Smørgrav } 518971980c3SDag-Erling Smørgrav #endif /* CLIENT_SUBNET */ 519971980c3SDag-Erling Smørgrav 5204c75e3aaSDag-Erling Smørgrav /** check that the modules exist, are compiled in */ 5214c75e3aaSDag-Erling Smørgrav static void 5224c75e3aaSDag-Erling Smørgrav check_modules_exist(const char* module_conf) 5234c75e3aaSDag-Erling Smørgrav { 5244c75e3aaSDag-Erling Smørgrav const char** names = module_list_avail(); 5254c75e3aaSDag-Erling Smørgrav const char* s = module_conf; 5264c75e3aaSDag-Erling Smørgrav while(*s) { 5274c75e3aaSDag-Erling Smørgrav int i = 0; 5284c75e3aaSDag-Erling Smørgrav int is_ok = 0; 5294c75e3aaSDag-Erling Smørgrav while(*s && isspace((unsigned char)*s)) 5304c75e3aaSDag-Erling Smørgrav s++; 5314c75e3aaSDag-Erling Smørgrav if(!*s) break; 5324c75e3aaSDag-Erling Smørgrav while(names[i]) { 5334c75e3aaSDag-Erling Smørgrav if(strncmp(names[i], s, strlen(names[i])) == 0) { 5344c75e3aaSDag-Erling Smørgrav is_ok = 1; 5354c75e3aaSDag-Erling Smørgrav break; 5364c75e3aaSDag-Erling Smørgrav } 5374c75e3aaSDag-Erling Smørgrav i++; 5384c75e3aaSDag-Erling Smørgrav } 5394c75e3aaSDag-Erling Smørgrav if(is_ok == 0) { 5404c75e3aaSDag-Erling Smørgrav char n[64]; 5414c75e3aaSDag-Erling Smørgrav size_t j; 5424c75e3aaSDag-Erling Smørgrav n[0]=0; 5434c75e3aaSDag-Erling Smørgrav n[sizeof(n)-1]=0; 5444c75e3aaSDag-Erling Smørgrav for(j=0; j<sizeof(n)-1; j++) { 5454c75e3aaSDag-Erling Smørgrav if(!s[j] || isspace((unsigned char)s[j])) { 5464c75e3aaSDag-Erling Smørgrav n[j] = 0; 5474c75e3aaSDag-Erling Smørgrav break; 5484c75e3aaSDag-Erling Smørgrav } 5494c75e3aaSDag-Erling Smørgrav n[j] = s[j]; 5504c75e3aaSDag-Erling Smørgrav } 5514c75e3aaSDag-Erling Smørgrav fatal_exit("module_conf lists module '%s' but that " 5524c75e3aaSDag-Erling Smørgrav "module is not available.", n); 5534c75e3aaSDag-Erling Smørgrav } 5544c75e3aaSDag-Erling Smørgrav s += strlen(names[i]); 5554c75e3aaSDag-Erling Smørgrav } 5564c75e3aaSDag-Erling Smørgrav } 5574c75e3aaSDag-Erling Smørgrav 558b7579f77SDag-Erling Smørgrav /** check configuration for errors */ 559b7579f77SDag-Erling Smørgrav static void 560e86b9096SDag-Erling Smørgrav morechecks(struct config_file* cfg) 561b7579f77SDag-Erling Smørgrav { 562b7579f77SDag-Erling Smørgrav warn_hosts("stub-host", cfg->stubs); 563b7579f77SDag-Erling Smørgrav warn_hosts("forward-host", cfg->forwards); 564b7579f77SDag-Erling Smørgrav interfacechecks(cfg); 565b7579f77SDag-Erling Smørgrav aclchecks(cfg); 5664c75e3aaSDag-Erling Smørgrav tcpconnlimitchecks(cfg); 567b7579f77SDag-Erling Smørgrav 568b7579f77SDag-Erling Smørgrav if(cfg->verbosity < 0) 569b7579f77SDag-Erling Smørgrav fatal_exit("verbosity value < 0"); 570b7579f77SDag-Erling Smørgrav if(cfg->num_threads <= 0 || cfg->num_threads > 10000) 571b7579f77SDag-Erling Smørgrav fatal_exit("num_threads value weird"); 572b7579f77SDag-Erling Smørgrav if(!cfg->do_ip4 && !cfg->do_ip6) 573b7579f77SDag-Erling Smørgrav fatal_exit("ip4 and ip6 are both disabled, pointless"); 57425039b37SCy Schubert if(!cfg->do_ip4 && cfg->prefer_ip4) 57525039b37SCy Schubert fatal_exit("cannot prefer and disable ip4, pointless"); 576b5663de9SDag-Erling Smørgrav if(!cfg->do_ip6 && cfg->prefer_ip6) 577b5663de9SDag-Erling Smørgrav fatal_exit("cannot prefer and disable ip6, pointless"); 578b7579f77SDag-Erling Smørgrav if(!cfg->do_udp && !cfg->do_tcp) 579b7579f77SDag-Erling Smørgrav fatal_exit("udp and tcp are both disabled, pointless"); 580b7579f77SDag-Erling Smørgrav if(cfg->edns_buffer_size > cfg->msg_buffer_size) 581b7579f77SDag-Erling Smørgrav fatal_exit("edns-buffer-size larger than msg-buffer-size, " 582b7579f77SDag-Erling Smørgrav "answers will not fit in processing buffer"); 58305ab2901SDag-Erling Smørgrav #ifdef UB_ON_WINDOWS 58405ab2901SDag-Erling Smørgrav w_config_adjust_directory(cfg); 58505ab2901SDag-Erling Smørgrav #endif 586b7579f77SDag-Erling Smørgrav if(cfg->chrootdir && cfg->chrootdir[0] && 587b7579f77SDag-Erling Smørgrav cfg->chrootdir[strlen(cfg->chrootdir)-1] == '/') 588b7579f77SDag-Erling Smørgrav fatal_exit("chootdir %s has trailing slash '/' please remove.", 589b7579f77SDag-Erling Smørgrav cfg->chrootdir); 590b7579f77SDag-Erling Smørgrav if(cfg->chrootdir && cfg->chrootdir[0] && 591b7579f77SDag-Erling Smørgrav !is_dir(cfg->chrootdir)) { 592b7579f77SDag-Erling Smørgrav fatal_exit("bad chroot directory"); 593b7579f77SDag-Erling Smørgrav } 594b7579f77SDag-Erling Smørgrav if(cfg->directory && cfg->directory[0]) { 595b7579f77SDag-Erling Smørgrav char* ad = fname_after_chroot(cfg->directory, cfg, 0); 596b7579f77SDag-Erling Smørgrav if(!ad) fatal_exit("out of memory"); 597b7579f77SDag-Erling Smørgrav if(!is_dir(ad)) fatal_exit("bad chdir directory"); 598b7579f77SDag-Erling Smørgrav free(ad); 599b7579f77SDag-Erling Smørgrav } 600b7579f77SDag-Erling Smørgrav if( (cfg->chrootdir && cfg->chrootdir[0]) || 601b7579f77SDag-Erling Smørgrav (cfg->directory && cfg->directory[0])) { 602b7579f77SDag-Erling Smørgrav if(cfg->pidfile && cfg->pidfile[0]) { 603b7579f77SDag-Erling Smørgrav char* ad = (cfg->pidfile[0]=='/')?strdup(cfg->pidfile): 604b7579f77SDag-Erling Smørgrav fname_after_chroot(cfg->pidfile, cfg, 1); 605b7579f77SDag-Erling Smørgrav char* bd = basedir(ad); 606b7579f77SDag-Erling Smørgrav if(bd && !is_dir(bd)) 607b7579f77SDag-Erling Smørgrav fatal_exit("pidfile directory does not exist"); 608b7579f77SDag-Erling Smørgrav free(ad); 609b7579f77SDag-Erling Smørgrav } 610b7579f77SDag-Erling Smørgrav if(cfg->logfile && cfg->logfile[0]) { 611b7579f77SDag-Erling Smørgrav char* ad = fname_after_chroot(cfg->logfile, cfg, 1); 612b7579f77SDag-Erling Smørgrav char* bd = basedir(ad); 613b7579f77SDag-Erling Smørgrav if(bd && !is_dir(bd)) 614b7579f77SDag-Erling Smørgrav fatal_exit("logfile directory does not exist"); 615b7579f77SDag-Erling Smørgrav free(ad); 616b7579f77SDag-Erling Smørgrav } 617b7579f77SDag-Erling Smørgrav } 618b7579f77SDag-Erling Smørgrav 619b7579f77SDag-Erling Smørgrav check_chroot_filelist("file with root-hints", 620b7579f77SDag-Erling Smørgrav cfg->root_hints, cfg->chrootdir, cfg); 621b7579f77SDag-Erling Smørgrav check_chroot_filelist("trust-anchor-file", 622b7579f77SDag-Erling Smørgrav cfg->trust_anchor_file_list, cfg->chrootdir, cfg); 623b7579f77SDag-Erling Smørgrav check_chroot_filelist("auto-trust-anchor-file", 624b7579f77SDag-Erling Smørgrav cfg->auto_trust_anchor_file_list, cfg->chrootdir, cfg); 625b7579f77SDag-Erling Smørgrav check_chroot_filelist_wild("trusted-keys-file", 626b7579f77SDag-Erling Smørgrav cfg->trusted_keys_file_list, cfg->chrootdir, cfg); 627c7f4d7adSDag-Erling Smørgrav #ifdef USE_IPSECMOD 628971980c3SDag-Erling Smørgrav if(cfg->ipsecmod_enabled && strstr(cfg->module_conf, "ipsecmod")) { 629971980c3SDag-Erling Smørgrav /* only check hook if enabled */ 630971980c3SDag-Erling Smørgrav check_chroot_string("ipsecmod-hook", &cfg->ipsecmod_hook, 631971980c3SDag-Erling Smørgrav cfg->chrootdir, cfg); 632971980c3SDag-Erling Smørgrav } 633c7f4d7adSDag-Erling Smørgrav #endif 634b7579f77SDag-Erling Smørgrav /* remove chroot setting so that modules are not stripping pathnames*/ 635b7579f77SDag-Erling Smørgrav free(cfg->chrootdir); 636b7579f77SDag-Erling Smørgrav cfg->chrootdir = NULL; 637b7579f77SDag-Erling Smørgrav 6384c75e3aaSDag-Erling Smørgrav /* check that the modules listed in module_conf exist */ 6394c75e3aaSDag-Erling Smørgrav check_modules_exist(cfg->module_conf); 6404c75e3aaSDag-Erling Smørgrav 641091e9e46SCy Schubert /* Respip is known to *not* work with dns64. */ 642b7579f77SDag-Erling Smørgrav if(strcmp(cfg->module_conf, "iterator") != 0 643b7579f77SDag-Erling Smørgrav && strcmp(cfg->module_conf, "validator iterator") != 0 644ff825849SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 validator iterator") != 0 645ff825849SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 iterator") != 0 64665b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "respip iterator") != 0 64765b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "respip validator iterator") != 0 648b7579f77SDag-Erling Smørgrav #ifdef WITH_PYTHONMODULE 649b7579f77SDag-Erling Smørgrav && strcmp(cfg->module_conf, "python iterator") != 0 650091e9e46SCy Schubert && strcmp(cfg->module_conf, "python respip iterator") != 0 651b7579f77SDag-Erling Smørgrav && strcmp(cfg->module_conf, "python validator iterator") != 0 652091e9e46SCy Schubert && strcmp(cfg->module_conf, "python respip validator iterator") != 0 653b7579f77SDag-Erling Smørgrav && strcmp(cfg->module_conf, "validator python iterator") != 0 654ff825849SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 python iterator") != 0 655ff825849SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 python validator iterator") != 0 656ff825849SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 validator python iterator") != 0 657ff825849SDag-Erling Smørgrav && strcmp(cfg->module_conf, "python dns64 iterator") != 0 658ff825849SDag-Erling Smørgrav && strcmp(cfg->module_conf, "python dns64 validator iterator") != 0 659b7579f77SDag-Erling Smørgrav #endif 66025039b37SCy Schubert #ifdef WITH_DYNLIBMODULE 66125039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib iterator") != 0 66225039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib dynlib iterator") != 0 66325039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib dynlib dynlib iterator") != 0 66425039b37SCy Schubert && strcmp(cfg->module_conf, "python dynlib iterator") != 0 66525039b37SCy Schubert && strcmp(cfg->module_conf, "python dynlib dynlib iterator") != 0 66625039b37SCy Schubert && strcmp(cfg->module_conf, "python dynlib dynlib dynlib iterator") != 0 66725039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib respip iterator") != 0 66825039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib validator iterator") != 0 66925039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib dynlib validator iterator") != 0 67025039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib dynlib dynlib validator iterator") != 0 67125039b37SCy Schubert && strcmp(cfg->module_conf, "python dynlib validator iterator") != 0 67225039b37SCy Schubert && strcmp(cfg->module_conf, "python dynlib dynlib validator iterator") != 0 67325039b37SCy Schubert && strcmp(cfg->module_conf, "python dynlib dynlib dynlib validator iterator") != 0 67425039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib respip validator iterator") != 0 67525039b37SCy Schubert && strcmp(cfg->module_conf, "validator dynlib iterator") != 0 67625039b37SCy Schubert && strcmp(cfg->module_conf, "dns64 dynlib iterator") != 0 67725039b37SCy Schubert && strcmp(cfg->module_conf, "dns64 dynlib validator iterator") != 0 67825039b37SCy Schubert && strcmp(cfg->module_conf, "dns64 validator dynlib iterator") != 0 67925039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib dns64 iterator") != 0 68025039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib dns64 validator iterator") != 0 68125039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib dns64 cachedb iterator") != 0 68225039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib dns64 validator cachedb iterator") != 0 68325039b37SCy Schubert && strcmp(cfg->module_conf, "dns64 dynlib cachedb iterator") != 0 68425039b37SCy Schubert && strcmp(cfg->module_conf, "dns64 dynlib validator cachedb iterator") != 0 68525039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib cachedb iterator") != 0 68625039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib respip cachedb iterator") != 0 68725039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib validator cachedb iterator") != 0 68825039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib respip validator cachedb iterator") != 0 68925039b37SCy Schubert && strcmp(cfg->module_conf, "cachedb dynlib iterator") != 0 69025039b37SCy Schubert && strcmp(cfg->module_conf, "respip cachedb dynlib iterator") != 0 69125039b37SCy Schubert && strcmp(cfg->module_conf, "validator cachedb dynlib iterator") != 0 69225039b37SCy Schubert && strcmp(cfg->module_conf, "respip validator cachedb dynlib iterator") != 0 69325039b37SCy Schubert && strcmp(cfg->module_conf, "validator dynlib cachedb iterator") != 0 69425039b37SCy Schubert && strcmp(cfg->module_conf, "respip validator dynlib cachedb iterator") != 0 69525039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib subnetcache iterator") != 0 69625039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib respip subnetcache iterator") != 0 69725039b37SCy Schubert && strcmp(cfg->module_conf, "subnetcache dynlib iterator") != 0 69825039b37SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache dynlib iterator") != 0 69925039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib subnetcache validator iterator") != 0 70025039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib respip subnetcache validator iterator") != 0 70125039b37SCy Schubert && strcmp(cfg->module_conf, "subnetcache dynlib validator iterator") != 0 70225039b37SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache dynlib validator iterator") != 0 70325039b37SCy Schubert && strcmp(cfg->module_conf, "subnetcache validator dynlib iterator") != 0 70425039b37SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache validator dynlib iterator") != 0 70525039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib ipsecmod iterator") != 0 70625039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib ipsecmod respip iterator") != 0 70725039b37SCy Schubert && strcmp(cfg->module_conf, "ipsecmod dynlib iterator") != 0 70825039b37SCy Schubert && strcmp(cfg->module_conf, "ipsecmod dynlib respip iterator") != 0 70925039b37SCy Schubert && strcmp(cfg->module_conf, "ipsecmod validator iterator") != 0 71025039b37SCy Schubert && strcmp(cfg->module_conf, "ipsecmod respip validator iterator") != 0 71125039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib ipsecmod validator iterator") != 0 71225039b37SCy Schubert && strcmp(cfg->module_conf, "dynlib ipsecmod respip validator iterator") != 0 71325039b37SCy Schubert && strcmp(cfg->module_conf, "ipsecmod dynlib validator iterator") != 0 71425039b37SCy Schubert && strcmp(cfg->module_conf, "ipsecmod dynlib respip validator iterator") != 0 71525039b37SCy Schubert && strcmp(cfg->module_conf, "ipsecmod validator dynlib iterator") != 0 71625039b37SCy Schubert && strcmp(cfg->module_conf, "ipsecmod respip validator dynlib iterator") != 0 71725039b37SCy Schubert #endif 718e2d15004SDag-Erling Smørgrav #ifdef USE_CACHEDB 719e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "validator cachedb iterator") != 0 720091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip validator cachedb iterator") != 0 721e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "cachedb iterator") != 0 722091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip cachedb iterator") != 0 723e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 validator cachedb iterator") != 0 724e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 cachedb iterator") != 0 72565b390aaSDag-Erling Smørgrav #endif 72665b390aaSDag-Erling Smørgrav #if defined(WITH_PYTHONMODULE) && defined(USE_CACHEDB) 727e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "python dns64 cachedb iterator") != 0 728e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "python dns64 validator cachedb iterator") != 0 729e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 python cachedb iterator") != 0 730e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 python validator cachedb iterator") != 0 731e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "python cachedb iterator") != 0 732091e9e46SCy Schubert && strcmp(cfg->module_conf, "python respip cachedb iterator") != 0 733e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "python validator cachedb iterator") != 0 734091e9e46SCy Schubert && strcmp(cfg->module_conf, "python respip validator cachedb iterator") != 0 735e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "cachedb python iterator") != 0 736091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip cachedb python iterator") != 0 737e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "validator cachedb python iterator") != 0 738091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip validator cachedb python iterator") != 0 739e2d15004SDag-Erling Smørgrav && strcmp(cfg->module_conf, "validator python cachedb iterator") != 0 740091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip validator python cachedb iterator") != 0 741e2d15004SDag-Erling Smørgrav #endif 74265b390aaSDag-Erling Smørgrav #ifdef CLIENT_SUBNET 74365b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "subnetcache iterator") != 0 744091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache iterator") != 0 74565b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "subnetcache validator iterator") != 0 746091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache validator iterator") != 0 747971980c3SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 subnetcache iterator") != 0 748971980c3SDag-Erling Smørgrav && strcmp(cfg->module_conf, "dns64 subnetcache validator iterator") != 0 74925039b37SCy Schubert && strcmp(cfg->module_conf, "dns64 subnetcache respip iterator") != 0 75025039b37SCy Schubert && strcmp(cfg->module_conf, "dns64 subnetcache respip validator iterator") != 0 75165b390aaSDag-Erling Smørgrav #endif 75265b390aaSDag-Erling Smørgrav #if defined(WITH_PYTHONMODULE) && defined(CLIENT_SUBNET) 75365b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "python subnetcache iterator") != 0 754091e9e46SCy Schubert && strcmp(cfg->module_conf, "python respip subnetcache iterator") != 0 75565b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "subnetcache python iterator") != 0 756091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache python iterator") != 0 75765b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "python subnetcache validator iterator") != 0 758091e9e46SCy Schubert && strcmp(cfg->module_conf, "python respip subnetcache validator iterator") != 0 75965b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "subnetcache python validator iterator") != 0 760091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache python validator iterator") != 0 76165b390aaSDag-Erling Smørgrav && strcmp(cfg->module_conf, "subnetcache validator python iterator") != 0 762091e9e46SCy Schubert && strcmp(cfg->module_conf, "respip subnetcache validator python iterator") != 0 76365b390aaSDag-Erling Smørgrav #endif 764c7f4d7adSDag-Erling Smørgrav #ifdef USE_IPSECMOD 765c7f4d7adSDag-Erling Smørgrav && strcmp(cfg->module_conf, "ipsecmod iterator") != 0 766091e9e46SCy Schubert && strcmp(cfg->module_conf, "ipsecmod respip iterator") != 0 767c7f4d7adSDag-Erling Smørgrav && strcmp(cfg->module_conf, "ipsecmod validator iterator") != 0 768091e9e46SCy Schubert && strcmp(cfg->module_conf, "ipsecmod respip validator iterator") != 0 769c7f4d7adSDag-Erling Smørgrav #endif 770c7f4d7adSDag-Erling Smørgrav #if defined(WITH_PYTHONMODULE) && defined(USE_IPSECMOD) 771c7f4d7adSDag-Erling Smørgrav && strcmp(cfg->module_conf, "python ipsecmod iterator") != 0 772091e9e46SCy Schubert && strcmp(cfg->module_conf, "python ipsecmod respip iterator") != 0 773c7f4d7adSDag-Erling Smørgrav && strcmp(cfg->module_conf, "ipsecmod python iterator") != 0 774091e9e46SCy Schubert && strcmp(cfg->module_conf, "ipsecmod python respip iterator") != 0 775c7f4d7adSDag-Erling Smørgrav && strcmp(cfg->module_conf, "ipsecmod validator iterator") != 0 776091e9e46SCy Schubert && strcmp(cfg->module_conf, "ipsecmod respip validator iterator") != 0 777c7f4d7adSDag-Erling Smørgrav && strcmp(cfg->module_conf, "python ipsecmod validator iterator") != 0 778091e9e46SCy Schubert && strcmp(cfg->module_conf, "python ipsecmod respip validator iterator") != 0 779c7f4d7adSDag-Erling Smørgrav && strcmp(cfg->module_conf, "ipsecmod python validator iterator") != 0 780091e9e46SCy Schubert && strcmp(cfg->module_conf, "ipsecmod python respip validator iterator") != 0 781c7f4d7adSDag-Erling Smørgrav && strcmp(cfg->module_conf, "ipsecmod validator python iterator") != 0 782091e9e46SCy Schubert && strcmp(cfg->module_conf, "ipsecmod respip validator python iterator") != 0 783c7f4d7adSDag-Erling Smørgrav #endif 7840eefd307SCy Schubert #ifdef USE_IPSET 7850eefd307SCy Schubert && strcmp(cfg->module_conf, "validator ipset iterator") != 0 786091e9e46SCy Schubert && strcmp(cfg->module_conf, "validator ipset respip iterator") != 0 7870eefd307SCy Schubert && strcmp(cfg->module_conf, "ipset iterator") != 0 788091e9e46SCy Schubert && strcmp(cfg->module_conf, "ipset respip iterator") != 0 7890eefd307SCy Schubert #endif 790b7579f77SDag-Erling Smørgrav ) { 791b7579f77SDag-Erling Smørgrav fatal_exit("module conf '%s' is not known to work", 792b7579f77SDag-Erling Smørgrav cfg->module_conf); 793b7579f77SDag-Erling Smørgrav } 794b7579f77SDag-Erling Smørgrav 795b7579f77SDag-Erling Smørgrav #ifdef HAVE_GETPWNAM 796b7579f77SDag-Erling Smørgrav if(cfg->username && cfg->username[0]) { 797b7579f77SDag-Erling Smørgrav if(getpwnam(cfg->username) == NULL) 798b7579f77SDag-Erling Smørgrav fatal_exit("user '%s' does not exist.", cfg->username); 799b5663de9SDag-Erling Smørgrav # ifdef HAVE_ENDPWENT 800b7579f77SDag-Erling Smørgrav endpwent(); 801b5663de9SDag-Erling Smørgrav # endif 802b7579f77SDag-Erling Smørgrav } 803b7579f77SDag-Erling Smørgrav #endif 8047da0adf7SDag-Erling Smørgrav if(cfg->remote_control_enable && options_remote_is_address(cfg) 8057da0adf7SDag-Erling Smørgrav && cfg->control_use_cert) { 806b7579f77SDag-Erling Smørgrav check_chroot_string("server-key-file", &cfg->server_key_file, 807b7579f77SDag-Erling Smørgrav cfg->chrootdir, cfg); 808b7579f77SDag-Erling Smørgrav check_chroot_string("server-cert-file", &cfg->server_cert_file, 809b7579f77SDag-Erling Smørgrav cfg->chrootdir, cfg); 810b7579f77SDag-Erling Smørgrav if(!is_file(cfg->control_key_file)) 811b7579f77SDag-Erling Smørgrav fatal_exit("control-key-file: \"%s\" does not exist", 812b7579f77SDag-Erling Smørgrav cfg->control_key_file); 813b7579f77SDag-Erling Smørgrav if(!is_file(cfg->control_cert_file)) 814b7579f77SDag-Erling Smørgrav fatal_exit("control-cert-file: \"%s\" does not exist", 815b7579f77SDag-Erling Smørgrav cfg->control_cert_file); 816b7579f77SDag-Erling Smørgrav } 817b7579f77SDag-Erling Smørgrav 8180eefd307SCy Schubert donotquerylocalhostcheck(cfg); 819b7579f77SDag-Erling Smørgrav localzonechecks(cfg); 82065b390aaSDag-Erling Smørgrav view_and_respipchecks(cfg); 821971980c3SDag-Erling Smørgrav #ifdef CLIENT_SUBNET 822971980c3SDag-Erling Smørgrav ecs_conf_checks(cfg); 823971980c3SDag-Erling Smørgrav #endif 824b7579f77SDag-Erling Smørgrav } 825b7579f77SDag-Erling Smørgrav 826b7579f77SDag-Erling Smørgrav /** check forwards */ 827b7579f77SDag-Erling Smørgrav static void 828b7579f77SDag-Erling Smørgrav check_fwd(struct config_file* cfg) 829b7579f77SDag-Erling Smørgrav { 830b7579f77SDag-Erling Smørgrav struct iter_forwards* fwd = forwards_create(); 831b7579f77SDag-Erling Smørgrav if(!fwd || !forwards_apply_cfg(fwd, cfg)) { 832b7579f77SDag-Erling Smørgrav fatal_exit("Could not set forward zones"); 833b7579f77SDag-Erling Smørgrav } 834b7579f77SDag-Erling Smørgrav forwards_delete(fwd); 835b7579f77SDag-Erling Smørgrav } 836b7579f77SDag-Erling Smørgrav 837b7579f77SDag-Erling Smørgrav /** check hints */ 838b7579f77SDag-Erling Smørgrav static void 839b7579f77SDag-Erling Smørgrav check_hints(struct config_file* cfg) 840b7579f77SDag-Erling Smørgrav { 841b7579f77SDag-Erling Smørgrav struct iter_hints* hints = hints_create(); 842b7579f77SDag-Erling Smørgrav if(!hints || !hints_apply_cfg(hints, cfg)) { 843b7579f77SDag-Erling Smørgrav fatal_exit("Could not set root or stub hints"); 844b7579f77SDag-Erling Smørgrav } 845b7579f77SDag-Erling Smørgrav hints_delete(hints); 846b7579f77SDag-Erling Smørgrav } 847b7579f77SDag-Erling Smørgrav 84857bddd21SDag-Erling Smørgrav /** check auth zones */ 84957bddd21SDag-Erling Smørgrav static void 85057bddd21SDag-Erling Smørgrav check_auth(struct config_file* cfg) 85157bddd21SDag-Erling Smørgrav { 852091e9e46SCy Schubert int is_rpz = 0; 85357bddd21SDag-Erling Smørgrav struct auth_zones* az = auth_zones_create(); 854*5469a995SCy Schubert if(!az || !auth_zones_apply_cfg(az, cfg, 0, &is_rpz, NULL, NULL)) { 85557bddd21SDag-Erling Smørgrav fatal_exit("Could not setup authority zones"); 85657bddd21SDag-Erling Smørgrav } 85757bddd21SDag-Erling Smørgrav auth_zones_delete(az); 85857bddd21SDag-Erling Smørgrav } 85957bddd21SDag-Erling Smørgrav 860b7579f77SDag-Erling Smørgrav /** check config file */ 861b7579f77SDag-Erling Smørgrav static void 8626480faa8SDag-Erling Smørgrav checkconf(const char* cfgfile, const char* opt, int final) 863b7579f77SDag-Erling Smørgrav { 864bc892140SDag-Erling Smørgrav char oldwd[4096]; 865b7579f77SDag-Erling Smørgrav struct config_file* cfg = config_create(); 866b7579f77SDag-Erling Smørgrav if(!cfg) 867b7579f77SDag-Erling Smørgrav fatal_exit("out of memory"); 868b5663de9SDag-Erling Smørgrav oldwd[0] = 0; 869b5663de9SDag-Erling Smørgrav if(!getcwd(oldwd, sizeof(oldwd))) { 870b5663de9SDag-Erling Smørgrav log_err("cannot getcwd: %s", strerror(errno)); 871b5663de9SDag-Erling Smørgrav oldwd[0] = 0; 872b5663de9SDag-Erling Smørgrav } 873b7579f77SDag-Erling Smørgrav if(!config_read(cfg, cfgfile, NULL)) { 874b7579f77SDag-Erling Smørgrav /* config_read prints messages to stderr */ 875b7579f77SDag-Erling Smørgrav config_delete(cfg); 876b7579f77SDag-Erling Smørgrav exit(1); 877b7579f77SDag-Erling Smørgrav } 878b5663de9SDag-Erling Smørgrav if(oldwd[0] && chdir(oldwd) == -1) 879b5663de9SDag-Erling Smørgrav log_err("cannot chdir(%s): %s", oldwd, strerror(errno)); 880ff825849SDag-Erling Smørgrav if(opt) { 8816480faa8SDag-Erling Smørgrav print_option(cfg, opt, final); 882ff825849SDag-Erling Smørgrav config_delete(cfg); 883ff825849SDag-Erling Smørgrav return; 884ff825849SDag-Erling Smørgrav } 885e86b9096SDag-Erling Smørgrav morechecks(cfg); 886b7579f77SDag-Erling Smørgrav check_mod(cfg, iter_get_funcblock()); 887b7579f77SDag-Erling Smørgrav check_mod(cfg, val_get_funcblock()); 888b7579f77SDag-Erling Smørgrav #ifdef WITH_PYTHONMODULE 889b7579f77SDag-Erling Smørgrav if(strstr(cfg->module_conf, "python")) 890b7579f77SDag-Erling Smørgrav check_mod(cfg, pythonmod_get_funcblock()); 891b7579f77SDag-Erling Smørgrav #endif 892b7579f77SDag-Erling Smørgrav check_fwd(cfg); 893b7579f77SDag-Erling Smørgrav check_hints(cfg); 89457bddd21SDag-Erling Smørgrav check_auth(cfg); 895ff825849SDag-Erling Smørgrav printf("unbound-checkconf: no errors in %s\n", cfgfile); 896b7579f77SDag-Erling Smørgrav config_delete(cfg); 897b7579f77SDag-Erling Smørgrav } 898b7579f77SDag-Erling Smørgrav 899b7579f77SDag-Erling Smørgrav /** getopt global, in case header files fail to declare it. */ 900b7579f77SDag-Erling Smørgrav extern int optind; 901b7579f77SDag-Erling Smørgrav /** getopt global, in case header files fail to declare it. */ 902b7579f77SDag-Erling Smørgrav extern char* optarg; 903b7579f77SDag-Erling Smørgrav 904b7579f77SDag-Erling Smørgrav /** Main routine for checkconf */ 905b7579f77SDag-Erling Smørgrav int main(int argc, char* argv[]) 906b7579f77SDag-Erling Smørgrav { 907b7579f77SDag-Erling Smørgrav int c; 9086480faa8SDag-Erling Smørgrav int final = 0; 909b7579f77SDag-Erling Smørgrav const char* f; 910b7579f77SDag-Erling Smørgrav const char* opt = NULL; 911b7579f77SDag-Erling Smørgrav const char* cfgfile = CONFIGFILE; 912b7579f77SDag-Erling Smørgrav log_ident_set("unbound-checkconf"); 913b7579f77SDag-Erling Smørgrav log_init(NULL, 0, NULL); 914b7579f77SDag-Erling Smørgrav checklock_start(); 915b7579f77SDag-Erling Smørgrav #ifdef USE_WINSOCK 916b7579f77SDag-Erling Smørgrav /* use registry config file in preference to compiletime location */ 917b7579f77SDag-Erling Smørgrav if(!(cfgfile=w_lookup_reg_str("Software\\Unbound", "ConfigFile"))) 918b7579f77SDag-Erling Smørgrav cfgfile = CONFIGFILE; 919b7579f77SDag-Erling Smørgrav #endif /* USE_WINSOCK */ 920b7579f77SDag-Erling Smørgrav /* parse the options */ 9216480faa8SDag-Erling Smørgrav while( (c=getopt(argc, argv, "fho:")) != -1) { 922b7579f77SDag-Erling Smørgrav switch(c) { 9236480faa8SDag-Erling Smørgrav case 'f': 9246480faa8SDag-Erling Smørgrav final = 1; 9256480faa8SDag-Erling Smørgrav break; 926b7579f77SDag-Erling Smørgrav case 'o': 927b7579f77SDag-Erling Smørgrav opt = optarg; 928b7579f77SDag-Erling Smørgrav break; 929b7579f77SDag-Erling Smørgrav case '?': 930b7579f77SDag-Erling Smørgrav case 'h': 931b7579f77SDag-Erling Smørgrav default: 932b7579f77SDag-Erling Smørgrav usage(); 933b7579f77SDag-Erling Smørgrav } 934b7579f77SDag-Erling Smørgrav } 935b7579f77SDag-Erling Smørgrav argc -= optind; 936b7579f77SDag-Erling Smørgrav argv += optind; 937b7579f77SDag-Erling Smørgrav if(argc != 0 && argc != 1) 938b7579f77SDag-Erling Smørgrav usage(); 939b7579f77SDag-Erling Smørgrav if(argc == 1) 940b7579f77SDag-Erling Smørgrav f = argv[0]; 941b7579f77SDag-Erling Smørgrav else f = cfgfile; 9426480faa8SDag-Erling Smørgrav checkconf(f, opt, final); 943b7579f77SDag-Erling Smørgrav checklock_stop(); 944b7579f77SDag-Erling Smørgrav return 0; 945b7579f77SDag-Erling Smørgrav } 946