xref: /freebsd/contrib/unbound/smallapp/unbound-checkconf.c (revision 5469a9953005a9a4d4aad7be88545d441622e9a0)
1b7579f77SDag-Erling Smørgrav /*
2*5469a995SCy Schubert  * smallapp/unbound-checkconf.c - config file checker for unbound.conf file.
3b7579f77SDag-Erling Smørgrav  *
4b7579f77SDag-Erling Smørgrav  * Copyright (c) 2007, NLnet Labs. All rights reserved.
5b7579f77SDag-Erling Smørgrav  *
6b7579f77SDag-Erling Smørgrav  * This software is open source.
7b7579f77SDag-Erling Smørgrav  *
8b7579f77SDag-Erling Smørgrav  * Redistribution and use in source and binary forms, with or without
9b7579f77SDag-Erling Smørgrav  * modification, are permitted provided that the following conditions
10b7579f77SDag-Erling Smørgrav  * are met:
11b7579f77SDag-Erling Smørgrav  *
12b7579f77SDag-Erling Smørgrav  * Redistributions of source code must retain the above copyright notice,
13b7579f77SDag-Erling Smørgrav  * this list of conditions and the following disclaimer.
14b7579f77SDag-Erling Smørgrav  *
15b7579f77SDag-Erling Smørgrav  * Redistributions in binary form must reproduce the above copyright notice,
16b7579f77SDag-Erling Smørgrav  * this list of conditions and the following disclaimer in the documentation
17b7579f77SDag-Erling Smørgrav  * and/or other materials provided with the distribution.
18b7579f77SDag-Erling Smørgrav  *
19b7579f77SDag-Erling Smørgrav  * Neither the name of the NLNET LABS nor the names of its contributors may
20b7579f77SDag-Erling Smørgrav  * be used to endorse or promote products derived from this software without
21b7579f77SDag-Erling Smørgrav  * specific prior written permission.
22b7579f77SDag-Erling Smørgrav  *
23b7579f77SDag-Erling Smørgrav  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
2417d15b25SDag-Erling Smørgrav  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
2517d15b25SDag-Erling Smørgrav  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
2617d15b25SDag-Erling Smørgrav  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
2717d15b25SDag-Erling Smørgrav  * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
2817d15b25SDag-Erling Smørgrav  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
2917d15b25SDag-Erling Smørgrav  * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
3017d15b25SDag-Erling Smørgrav  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
3117d15b25SDag-Erling Smørgrav  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
3217d15b25SDag-Erling Smørgrav  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
3317d15b25SDag-Erling Smørgrav  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34b7579f77SDag-Erling Smørgrav  */
35b7579f77SDag-Erling Smørgrav 
36b7579f77SDag-Erling Smørgrav /**
37b7579f77SDag-Erling Smørgrav  * \file
38b7579f77SDag-Erling Smørgrav  *
39b7579f77SDag-Erling Smørgrav  * The config checker checks for syntax and other errors in the unbound.conf
40b7579f77SDag-Erling Smørgrav  * file, and can be used to check for errors before the server is started
41b7579f77SDag-Erling Smørgrav  * or sigHUPped.
42b7579f77SDag-Erling Smørgrav  * Exit status 1 means an error.
43b7579f77SDag-Erling Smørgrav  */
44b7579f77SDag-Erling Smørgrav 
45b7579f77SDag-Erling Smørgrav #include "config.h"
464c75e3aaSDag-Erling Smørgrav #include <ctype.h>
47b7579f77SDag-Erling Smørgrav #include "util/log.h"
48b7579f77SDag-Erling Smørgrav #include "util/config_file.h"
49b7579f77SDag-Erling Smørgrav #include "util/module.h"
50b7579f77SDag-Erling Smørgrav #include "util/net_help.h"
51b7579f77SDag-Erling Smørgrav #include "util/regional.h"
52b7579f77SDag-Erling Smørgrav #include "iterator/iterator.h"
53b7579f77SDag-Erling Smørgrav #include "iterator/iter_fwd.h"
54b7579f77SDag-Erling Smørgrav #include "iterator/iter_hints.h"
55b7579f77SDag-Erling Smørgrav #include "validator/validator.h"
56b7579f77SDag-Erling Smørgrav #include "services/localzone.h"
5765b390aaSDag-Erling Smørgrav #include "services/view.h"
5857bddd21SDag-Erling Smørgrav #include "services/authzone.h"
5965b390aaSDag-Erling Smørgrav #include "respip/respip.h"
6009a3aaf3SDag-Erling Smørgrav #include "sldns/sbuffer.h"
6125039b37SCy Schubert #include "sldns/str2wire.h"
62b7579f77SDag-Erling Smørgrav #ifdef HAVE_GETOPT_H
63b7579f77SDag-Erling Smørgrav #include <getopt.h>
64b7579f77SDag-Erling Smørgrav #endif
65b7579f77SDag-Erling Smørgrav #ifdef HAVE_PWD_H
66b7579f77SDag-Erling Smørgrav #include <pwd.h>
67b7579f77SDag-Erling Smørgrav #endif
68b7579f77SDag-Erling Smørgrav #ifdef HAVE_SYS_STAT_H
69b7579f77SDag-Erling Smørgrav #include <sys/stat.h>
70b7579f77SDag-Erling Smørgrav #endif
71b7579f77SDag-Erling Smørgrav #ifdef HAVE_GLOB_H
72b7579f77SDag-Erling Smørgrav #include <glob.h>
73b7579f77SDag-Erling Smørgrav #endif
74b7579f77SDag-Erling Smørgrav #ifdef WITH_PYTHONMODULE
75b7579f77SDag-Erling Smørgrav #include "pythonmod/pythonmod.h"
76b7579f77SDag-Erling Smørgrav #endif
77971980c3SDag-Erling Smørgrav #ifdef CLIENT_SUBNET
78971980c3SDag-Erling Smørgrav #include "edns-subnet/subnet-whitelist.h"
79971980c3SDag-Erling Smørgrav #endif
80b7579f77SDag-Erling Smørgrav 
81b7579f77SDag-Erling Smørgrav /** Give checkconf usage, and exit (1). */
82b7579f77SDag-Erling Smørgrav static void
83b5663de9SDag-Erling Smørgrav usage(void)
84b7579f77SDag-Erling Smørgrav {
85b70d78d6SDag-Erling Smørgrav 	printf("Usage:	local-unbound-checkconf [file]\n");
86b7579f77SDag-Erling Smørgrav 	printf("	Checks unbound configuration file for errors.\n");
87b7579f77SDag-Erling Smørgrav 	printf("file	if omitted %s is used.\n", CONFIGFILE);
88b7579f77SDag-Erling Smørgrav 	printf("-o option	print value of option to stdout.\n");
896480faa8SDag-Erling Smørgrav 	printf("-f 		output full pathname with chroot applied, eg. with -o pidfile.\n");
90b7579f77SDag-Erling Smørgrav 	printf("-h		show this usage help.\n");
91b7579f77SDag-Erling Smørgrav 	printf("Version %s\n", PACKAGE_VERSION);
92b7579f77SDag-Erling Smørgrav 	printf("BSD licensed, see LICENSE in source package for details.\n");
93b7579f77SDag-Erling Smørgrav 	printf("Report bugs to %s\n", PACKAGE_BUGREPORT);
94b7579f77SDag-Erling Smørgrav 	exit(1);
95b7579f77SDag-Erling Smørgrav }
96b7579f77SDag-Erling Smørgrav 
97b7579f77SDag-Erling Smørgrav /**
98b7579f77SDag-Erling Smørgrav  * Print given option to stdout
99b7579f77SDag-Erling Smørgrav  * @param cfg: config
100b7579f77SDag-Erling Smørgrav  * @param opt: option name without trailing :.
101b7579f77SDag-Erling Smørgrav  *	This is different from config_set_option.
1026480faa8SDag-Erling Smørgrav  * @param final: if final pathname with chroot applied has to be printed.
103b7579f77SDag-Erling Smørgrav  */
104b7579f77SDag-Erling Smørgrav static void
1056480faa8SDag-Erling Smørgrav print_option(struct config_file* cfg, const char* opt, int final)
106b7579f77SDag-Erling Smørgrav {
1076480faa8SDag-Erling Smørgrav 	if(strcmp(opt, "pidfile") == 0 && final) {
108bc892140SDag-Erling Smørgrav 		char *p = fname_after_chroot(cfg->pidfile, cfg, 1);
109bc892140SDag-Erling Smørgrav 		if(!p) fatal_exit("out of memory");
110bc892140SDag-Erling Smørgrav 		printf("%s\n", p);
111bc892140SDag-Erling Smørgrav 		free(p);
1126480faa8SDag-Erling Smørgrav 		return;
1136480faa8SDag-Erling Smørgrav 	}
11457bddd21SDag-Erling Smørgrav 	if(strcmp(opt, "auto-trust-anchor-file") == 0 && final) {
11557bddd21SDag-Erling Smørgrav 		struct config_strlist* s = cfg->auto_trust_anchor_file_list;
11657bddd21SDag-Erling Smørgrav 		for(; s; s=s->next) {
11757bddd21SDag-Erling Smørgrav 			char *p = fname_after_chroot(s->str, cfg, 1);
11857bddd21SDag-Erling Smørgrav 			if(!p) fatal_exit("out of memory");
11957bddd21SDag-Erling Smørgrav 			printf("%s\n", p);
12057bddd21SDag-Erling Smørgrav 			free(p);
12157bddd21SDag-Erling Smørgrav 		}
12257bddd21SDag-Erling Smørgrav 		return;
12357bddd21SDag-Erling Smørgrav 	}
124b7579f77SDag-Erling Smørgrav 	if(!config_get_option(cfg, opt, config_print_func, stdout))
125b7579f77SDag-Erling Smørgrav 		fatal_exit("cannot print option '%s'", opt);
126b7579f77SDag-Erling Smørgrav }
127b7579f77SDag-Erling Smørgrav 
128b7579f77SDag-Erling Smørgrav /** check if module works with config */
129b7579f77SDag-Erling Smørgrav static void
130b7579f77SDag-Erling Smørgrav check_mod(struct config_file* cfg, struct module_func_block* fb)
131b7579f77SDag-Erling Smørgrav {
132b7579f77SDag-Erling Smørgrav 	struct module_env env;
133b7579f77SDag-Erling Smørgrav 	memset(&env, 0, sizeof(env));
134b7579f77SDag-Erling Smørgrav 	env.cfg = cfg;
135b7579f77SDag-Erling Smørgrav 	env.scratch = regional_create();
13617d15b25SDag-Erling Smørgrav 	env.scratch_buffer = sldns_buffer_new(BUFSIZ);
137b7579f77SDag-Erling Smørgrav 	if(!env.scratch || !env.scratch_buffer)
138b7579f77SDag-Erling Smørgrav 		fatal_exit("out of memory");
139bc892140SDag-Erling Smørgrav 	if(!edns_known_options_init(&env))
140bc892140SDag-Erling Smørgrav 		fatal_exit("out of memory");
141b7579f77SDag-Erling Smørgrav 	if(!(*fb->init)(&env, 0)) {
142b7579f77SDag-Erling Smørgrav 		fatal_exit("bad config for %s module", fb->name);
143b7579f77SDag-Erling Smørgrav 	}
144b7579f77SDag-Erling Smørgrav 	(*fb->deinit)(&env, 0);
14517d15b25SDag-Erling Smørgrav 	sldns_buffer_free(env.scratch_buffer);
146b7579f77SDag-Erling Smørgrav 	regional_destroy(env.scratch);
147bc892140SDag-Erling Smørgrav 	edns_known_options_delete(&env);
148b7579f77SDag-Erling Smørgrav }
149b7579f77SDag-Erling Smørgrav 
1500eefd307SCy Schubert /** true if addr is a localhost address, 127.0.0.1 or ::1 (with maybe "@port"
1510eefd307SCy Schubert  * after it) */
1520eefd307SCy Schubert static int
1530eefd307SCy Schubert str_addr_is_localhost(const char* a)
1540eefd307SCy Schubert {
1550eefd307SCy Schubert 	if(strncmp(a, "127.", 4) == 0) return 1;
1560eefd307SCy Schubert 	if(strncmp(a, "::1", 3) == 0) return 1;
1570eefd307SCy Schubert 	return 0;
1580eefd307SCy Schubert }
1590eefd307SCy Schubert 
1600eefd307SCy Schubert /** check do-not-query-localhost */
1610eefd307SCy Schubert static void
1620eefd307SCy Schubert donotquerylocalhostcheck(struct config_file* cfg)
1630eefd307SCy Schubert {
1640eefd307SCy Schubert 	if(cfg->donotquery_localhost) {
1650eefd307SCy Schubert 		struct config_stub* p;
1660eefd307SCy Schubert 		struct config_strlist* s;
1670eefd307SCy Schubert 		for(p=cfg->forwards; p; p=p->next) {
1680eefd307SCy Schubert 			for(s=p->addrs; s; s=s->next) {
1690eefd307SCy Schubert 				if(str_addr_is_localhost(s->str)) {
1700eefd307SCy Schubert 					fprintf(stderr, "unbound-checkconf: warning: forward-addr: '%s' is specified for forward-zone: '%s', but do-not-query-localhost: yes means that the address will not be used for lookups.\n",
1710eefd307SCy Schubert 						s->str, p->name);
1720eefd307SCy Schubert 				}
1730eefd307SCy Schubert 			}
1740eefd307SCy Schubert 		}
1750eefd307SCy Schubert 		for(p=cfg->stubs; p; p=p->next) {
1760eefd307SCy Schubert 			for(s=p->addrs; s; s=s->next) {
1770eefd307SCy Schubert 				if(str_addr_is_localhost(s->str)) {
1780eefd307SCy Schubert 					fprintf(stderr, "unbound-checkconf: warning: stub-addr: '%s' is specified for stub-zone: '%s', but do-not-query-localhost: yes means that the address will not be used for lookups.\n",
1790eefd307SCy Schubert 						s->str, p->name);
1800eefd307SCy Schubert 				}
1810eefd307SCy Schubert 			}
1820eefd307SCy Schubert 		}
1830eefd307SCy Schubert 	}
1840eefd307SCy Schubert }
1850eefd307SCy Schubert 
186b7579f77SDag-Erling Smørgrav /** check localzones */
187b7579f77SDag-Erling Smørgrav static void
188b7579f77SDag-Erling Smørgrav localzonechecks(struct config_file* cfg)
189b7579f77SDag-Erling Smørgrav {
190b7579f77SDag-Erling Smørgrav 	struct local_zones* zs;
191b7579f77SDag-Erling Smørgrav 	if(!(zs = local_zones_create()))
192b7579f77SDag-Erling Smørgrav 		fatal_exit("out of memory");
193b7579f77SDag-Erling Smørgrav 	if(!local_zones_apply_cfg(zs, cfg))
194b7579f77SDag-Erling Smørgrav 		fatal_exit("failed local-zone, local-data configuration");
195b7579f77SDag-Erling Smørgrav 	local_zones_delete(zs);
196b7579f77SDag-Erling Smørgrav }
197b7579f77SDag-Erling Smørgrav 
19825039b37SCy Schubert /** checks for acl and views */
19925039b37SCy Schubert static void
20025039b37SCy Schubert acl_view_tag_checks(struct config_file* cfg, struct views* views)
20125039b37SCy Schubert {
20225039b37SCy Schubert 	int d;
20325039b37SCy Schubert 	struct sockaddr_storage a;
20425039b37SCy Schubert 	socklen_t alen;
20525039b37SCy Schubert 	struct config_str2list* acl;
20625039b37SCy Schubert 	struct config_str3list* s3;
20725039b37SCy Schubert 	struct config_strbytelist* sb;
20825039b37SCy Schubert 
20925039b37SCy Schubert 	/* acl_view */
21025039b37SCy Schubert 	for(acl=cfg->acl_view; acl; acl = acl->next) {
21125039b37SCy Schubert 		struct view* v;
21225039b37SCy Schubert 		if(!netblockstrtoaddr(acl->str, UNBOUND_DNS_PORT, &a, &alen,
21325039b37SCy Schubert 			&d)) {
21425039b37SCy Schubert 			fatal_exit("cannot parse access-control-view "
21525039b37SCy Schubert 				"address %s %s", acl->str, acl->str2);
21625039b37SCy Schubert 		}
21725039b37SCy Schubert 		v = views_find_view(views, acl->str2, 0);
21825039b37SCy Schubert 		if(!v) {
21925039b37SCy Schubert 			fatal_exit("cannot find view for "
22025039b37SCy Schubert 				"access-control-view: %s %s",
22125039b37SCy Schubert 				acl->str, acl->str2);
22225039b37SCy Schubert 		}
22325039b37SCy Schubert 		lock_rw_unlock(&v->lock);
22425039b37SCy Schubert 	}
22525039b37SCy Schubert 
22625039b37SCy Schubert 	/* acl_tags */
22725039b37SCy Schubert 	for(sb=cfg->acl_tags; sb; sb = sb->next) {
22825039b37SCy Schubert 		if(!netblockstrtoaddr(sb->str, UNBOUND_DNS_PORT, &a, &alen,
22925039b37SCy Schubert 			&d)) {
23025039b37SCy Schubert 			fatal_exit("cannot parse access-control-tags "
23125039b37SCy Schubert 				"address %s", sb->str);
23225039b37SCy Schubert 		}
23325039b37SCy Schubert 	}
23425039b37SCy Schubert 
23525039b37SCy Schubert 	/* acl_tag_actions */
23625039b37SCy Schubert 	for(s3=cfg->acl_tag_actions; s3; s3 = s3->next) {
23725039b37SCy Schubert 		enum localzone_type t;
23825039b37SCy Schubert 		if(!netblockstrtoaddr(s3->str, UNBOUND_DNS_PORT, &a, &alen,
23925039b37SCy Schubert 			&d)) {
24025039b37SCy Schubert 			fatal_exit("cannot parse access-control-tag-actions "
24125039b37SCy Schubert 				"address %s %s %s",
24225039b37SCy Schubert 				s3->str, s3->str2, s3->str3);
24325039b37SCy Schubert 		}
24425039b37SCy Schubert 		if(find_tag_id(cfg, s3->str2) == -1) {
24525039b37SCy Schubert 			fatal_exit("cannot parse tag %s (define-tag it), "
24625039b37SCy Schubert 				"for access-control-tag-actions: %s %s %s",
24725039b37SCy Schubert 				s3->str2, s3->str, s3->str2, s3->str3);
24825039b37SCy Schubert 		}
24925039b37SCy Schubert 		if(!local_zone_str2type(s3->str3, &t)) {
25025039b37SCy Schubert 			fatal_exit("cannot parse access control action type %s"
25125039b37SCy Schubert 				" for access-control-tag-actions: %s %s %s",
25225039b37SCy Schubert 				s3->str3, s3->str, s3->str2, s3->str3);
25325039b37SCy Schubert 		}
25425039b37SCy Schubert 	}
25525039b37SCy Schubert 
25625039b37SCy Schubert 	/* acl_tag_datas */
25725039b37SCy Schubert 	for(s3=cfg->acl_tag_datas; s3; s3 = s3->next) {
25825039b37SCy Schubert 		char buf[65536];
25925039b37SCy Schubert 		uint8_t rr[LDNS_RR_BUF_SIZE];
26025039b37SCy Schubert 		size_t len = sizeof(rr);
26125039b37SCy Schubert 		int res;
26225039b37SCy Schubert 		if(!netblockstrtoaddr(s3->str, UNBOUND_DNS_PORT, &a, &alen,
26325039b37SCy Schubert 			&d)) {
26425039b37SCy Schubert 			fatal_exit("cannot parse access-control-tag-datas address %s %s '%s'",
26525039b37SCy Schubert 				s3->str, s3->str2, s3->str3);
26625039b37SCy Schubert 		}
26725039b37SCy Schubert 		if(find_tag_id(cfg, s3->str2) == -1) {
26825039b37SCy Schubert 			fatal_exit("cannot parse tag %s (define-tag it), "
26925039b37SCy Schubert 				"for access-control-tag-datas: %s %s '%s'",
27025039b37SCy Schubert 				s3->str2, s3->str, s3->str2, s3->str3);
27125039b37SCy Schubert 		}
27225039b37SCy Schubert 		/* '.' is sufficient for validation, and it makes the call to
27325039b37SCy Schubert 		 * sldns_wirerr_get_type() simpler below. */
27425039b37SCy Schubert 		snprintf(buf, sizeof(buf), "%s %s", ".", s3->str3);
27525039b37SCy Schubert 		res = sldns_str2wire_rr_buf(buf, rr, &len, NULL, 3600, NULL,
27625039b37SCy Schubert 			0, NULL, 0);
27725039b37SCy Schubert 		if(res != 0) {
27825039b37SCy Schubert 			fatal_exit("cannot parse rr data [char %d] parse error %s, for access-control-tag-datas: %s %s '%s'",
27925039b37SCy Schubert 				(int)LDNS_WIREPARSE_OFFSET(res)-2,
28025039b37SCy Schubert 				sldns_get_errorstr_parse(res),
28125039b37SCy Schubert 				s3->str, s3->str2, s3->str3);
28225039b37SCy Schubert 		}
28325039b37SCy Schubert 	}
28425039b37SCy Schubert }
28525039b37SCy Schubert 
28665b390aaSDag-Erling Smørgrav /** check view and response-ip configuration */
28765b390aaSDag-Erling Smørgrav static void
28865b390aaSDag-Erling Smørgrav view_and_respipchecks(struct config_file* cfg)
28965b390aaSDag-Erling Smørgrav {
29065b390aaSDag-Erling Smørgrav 	struct views* views = NULL;
29165b390aaSDag-Erling Smørgrav 	struct respip_set* respip = NULL;
29265b390aaSDag-Erling Smørgrav 	int ignored = 0;
29365b390aaSDag-Erling Smørgrav 	if(!(views = views_create()))
29465b390aaSDag-Erling Smørgrav 		fatal_exit("Could not create views: out of memory");
29565b390aaSDag-Erling Smørgrav 	if(!(respip = respip_set_create()))
29665b390aaSDag-Erling Smørgrav 		fatal_exit("Could not create respip set: out of memory");
29765b390aaSDag-Erling Smørgrav 	if(!views_apply_cfg(views, cfg))
29865b390aaSDag-Erling Smørgrav 		fatal_exit("Could not set up views");
29965b390aaSDag-Erling Smørgrav 	if(!respip_global_apply_cfg(respip, cfg))
30065b390aaSDag-Erling Smørgrav 		fatal_exit("Could not setup respip set");
30165b390aaSDag-Erling Smørgrav 	if(!respip_views_apply_cfg(views, cfg, &ignored))
30265b390aaSDag-Erling Smørgrav 		fatal_exit("Could not setup per-view respip sets");
30325039b37SCy Schubert 	acl_view_tag_checks(cfg, views);
30465b390aaSDag-Erling Smørgrav 	views_delete(views);
30565b390aaSDag-Erling Smørgrav 	respip_set_delete(respip);
30665b390aaSDag-Erling Smørgrav }
30765b390aaSDag-Erling Smørgrav 
308b7579f77SDag-Erling Smørgrav /** emit warnings for IP in hosts */
309b7579f77SDag-Erling Smørgrav static void
310b7579f77SDag-Erling Smørgrav warn_hosts(const char* typ, struct config_stub* list)
311b7579f77SDag-Erling Smørgrav {
312b7579f77SDag-Erling Smørgrav 	struct sockaddr_storage a;
313b7579f77SDag-Erling Smørgrav 	socklen_t alen;
314b7579f77SDag-Erling Smørgrav 	struct config_stub* s;
315b7579f77SDag-Erling Smørgrav 	struct config_strlist* h;
316b7579f77SDag-Erling Smørgrav 	for(s=list; s; s=s->next) {
317b7579f77SDag-Erling Smørgrav 		for(h=s->hosts; h; h=h->next) {
318b7579f77SDag-Erling Smørgrav 			if(extstrtoaddr(h->str, &a, &alen)) {
319b7579f77SDag-Erling Smørgrav 				fprintf(stderr, "unbound-checkconf: warning:"
320b7579f77SDag-Erling Smørgrav 				  " %s %s: \"%s\" is an IP%s address, "
321b7579f77SDag-Erling Smørgrav 				  "and when looked up as a host name "
322b7579f77SDag-Erling Smørgrav 				  "during use may not resolve.\n",
323b7579f77SDag-Erling Smørgrav 				  s->name, typ, h->str,
324b7579f77SDag-Erling Smørgrav 				  addr_is_ip6(&a, alen)?"6":"4");
325b7579f77SDag-Erling Smørgrav 			}
326b7579f77SDag-Erling Smørgrav 		}
327b7579f77SDag-Erling Smørgrav 	}
328b7579f77SDag-Erling Smørgrav }
329b7579f77SDag-Erling Smørgrav 
330b7579f77SDag-Erling Smørgrav /** check interface strings */
331b7579f77SDag-Erling Smørgrav static void
332b7579f77SDag-Erling Smørgrav interfacechecks(struct config_file* cfg)
333b7579f77SDag-Erling Smørgrav {
334b5663de9SDag-Erling Smørgrav 	int d;
335b7579f77SDag-Erling Smørgrav 	struct sockaddr_storage a;
336b7579f77SDag-Erling Smørgrav 	socklen_t alen;
337b7579f77SDag-Erling Smørgrav 	int i, j;
338b7579f77SDag-Erling Smørgrav 	for(i=0; i<cfg->num_ifs; i++) {
339b7579f77SDag-Erling Smørgrav 		if(!extstrtoaddr(cfg->ifs[i], &a, &alen)) {
340b7579f77SDag-Erling Smørgrav 			fatal_exit("cannot parse interface specified as '%s'",
341b7579f77SDag-Erling Smørgrav 				cfg->ifs[i]);
342b7579f77SDag-Erling Smørgrav 		}
343b7579f77SDag-Erling Smørgrav 		for(j=0; j<cfg->num_ifs; j++) {
344b7579f77SDag-Erling Smørgrav 			if(i!=j && strcmp(cfg->ifs[i], cfg->ifs[j])==0)
345b7579f77SDag-Erling Smørgrav 				fatal_exit("interface: %s present twice, "
346b7579f77SDag-Erling Smørgrav 					"cannot bind same ports twice.",
347b7579f77SDag-Erling Smørgrav 					cfg->ifs[i]);
348b7579f77SDag-Erling Smørgrav 		}
349b7579f77SDag-Erling Smørgrav 	}
350b7579f77SDag-Erling Smørgrav 	for(i=0; i<cfg->num_out_ifs; i++) {
351b5663de9SDag-Erling Smørgrav 		if(!ipstrtoaddr(cfg->out_ifs[i], UNBOUND_DNS_PORT, &a, &alen) &&
352b5663de9SDag-Erling Smørgrav 		   !netblockstrtoaddr(cfg->out_ifs[i], UNBOUND_DNS_PORT, &a, &alen, &d)) {
353b7579f77SDag-Erling Smørgrav 			fatal_exit("cannot parse outgoing-interface "
354b7579f77SDag-Erling Smørgrav 				"specified as '%s'", cfg->out_ifs[i]);
355b7579f77SDag-Erling Smørgrav 		}
356b7579f77SDag-Erling Smørgrav 		for(j=0; j<cfg->num_out_ifs; j++) {
357b7579f77SDag-Erling Smørgrav 			if(i!=j && strcmp(cfg->out_ifs[i], cfg->out_ifs[j])==0)
358b7579f77SDag-Erling Smørgrav 				fatal_exit("outgoing-interface: %s present "
359b7579f77SDag-Erling Smørgrav 					"twice, cannot bind same ports twice.",
360b7579f77SDag-Erling Smørgrav 					cfg->out_ifs[i]);
361b7579f77SDag-Erling Smørgrav 		}
362b7579f77SDag-Erling Smørgrav 	}
363b7579f77SDag-Erling Smørgrav }
364b7579f77SDag-Erling Smørgrav 
365b7579f77SDag-Erling Smørgrav /** check acl ips */
366b7579f77SDag-Erling Smørgrav static void
367b7579f77SDag-Erling Smørgrav aclchecks(struct config_file* cfg)
368b7579f77SDag-Erling Smørgrav {
369b7579f77SDag-Erling Smørgrav 	int d;
370b7579f77SDag-Erling Smørgrav 	struct sockaddr_storage a;
371b7579f77SDag-Erling Smørgrav 	socklen_t alen;
372b7579f77SDag-Erling Smørgrav 	struct config_str2list* acl;
373b7579f77SDag-Erling Smørgrav 	for(acl=cfg->acls; acl; acl = acl->next) {
374b7579f77SDag-Erling Smørgrav 		if(!netblockstrtoaddr(acl->str, UNBOUND_DNS_PORT, &a, &alen,
375b7579f77SDag-Erling Smørgrav 			&d)) {
376b7579f77SDag-Erling Smørgrav 			fatal_exit("cannot parse access control address %s %s",
377b7579f77SDag-Erling Smørgrav 				acl->str, acl->str2);
378b7579f77SDag-Erling Smørgrav 		}
379b7579f77SDag-Erling Smørgrav 	}
380b7579f77SDag-Erling Smørgrav }
381b7579f77SDag-Erling Smørgrav 
3824c75e3aaSDag-Erling Smørgrav /** check tcp connection limit ips */
3834c75e3aaSDag-Erling Smørgrav static void
3844c75e3aaSDag-Erling Smørgrav tcpconnlimitchecks(struct config_file* cfg)
3854c75e3aaSDag-Erling Smørgrav {
3864c75e3aaSDag-Erling Smørgrav 	int d;
3874c75e3aaSDag-Erling Smørgrav 	struct sockaddr_storage a;
3884c75e3aaSDag-Erling Smørgrav 	socklen_t alen;
3894c75e3aaSDag-Erling Smørgrav 	struct config_str2list* tcl;
3904c75e3aaSDag-Erling Smørgrav 	for(tcl=cfg->tcp_connection_limits; tcl; tcl = tcl->next) {
3914c75e3aaSDag-Erling Smørgrav 		if(!netblockstrtoaddr(tcl->str, UNBOUND_DNS_PORT, &a, &alen,
3924c75e3aaSDag-Erling Smørgrav 			&d)) {
3934c75e3aaSDag-Erling Smørgrav 			fatal_exit("cannot parse tcp connection limit address %s %s",
3944c75e3aaSDag-Erling Smørgrav 				tcl->str, tcl->str2);
3954c75e3aaSDag-Erling Smørgrav 		}
3964c75e3aaSDag-Erling Smørgrav 	}
3974c75e3aaSDag-Erling Smørgrav }
3984c75e3aaSDag-Erling Smørgrav 
399b7579f77SDag-Erling Smørgrav /** true if fname is a file */
400b7579f77SDag-Erling Smørgrav static int
401b7579f77SDag-Erling Smørgrav is_file(const char* fname)
402b7579f77SDag-Erling Smørgrav {
403b7579f77SDag-Erling Smørgrav 	struct stat buf;
404b7579f77SDag-Erling Smørgrav 	if(stat(fname, &buf) < 0) {
405b7579f77SDag-Erling Smørgrav 		if(errno==EACCES) {
406b7579f77SDag-Erling Smørgrav 			printf("warning: no search permission for one of the directories in path: %s\n", fname);
407b7579f77SDag-Erling Smørgrav 			return 1;
408b7579f77SDag-Erling Smørgrav 		}
409b7579f77SDag-Erling Smørgrav 		perror(fname);
410b7579f77SDag-Erling Smørgrav 		return 0;
411b7579f77SDag-Erling Smørgrav 	}
412b7579f77SDag-Erling Smørgrav 	if(S_ISDIR(buf.st_mode)) {
413b7579f77SDag-Erling Smørgrav 		printf("%s is not a file\n", fname);
414b7579f77SDag-Erling Smørgrav 		return 0;
415b7579f77SDag-Erling Smørgrav 	}
416b7579f77SDag-Erling Smørgrav 	return 1;
417b7579f77SDag-Erling Smørgrav }
418b7579f77SDag-Erling Smørgrav 
419b7579f77SDag-Erling Smørgrav /** true if fname is a directory */
420b7579f77SDag-Erling Smørgrav static int
421b7579f77SDag-Erling Smørgrav is_dir(const char* fname)
422b7579f77SDag-Erling Smørgrav {
423b7579f77SDag-Erling Smørgrav 	struct stat buf;
424b7579f77SDag-Erling Smørgrav 	if(stat(fname, &buf) < 0) {
425b7579f77SDag-Erling Smørgrav 		if(errno==EACCES) {
426b7579f77SDag-Erling Smørgrav 			printf("warning: no search permission for one of the directories in path: %s\n", fname);
427b7579f77SDag-Erling Smørgrav 			return 1;
428b7579f77SDag-Erling Smørgrav 		}
429b7579f77SDag-Erling Smørgrav 		perror(fname);
430b7579f77SDag-Erling Smørgrav 		return 0;
431b7579f77SDag-Erling Smørgrav 	}
432b7579f77SDag-Erling Smørgrav 	if(!(S_ISDIR(buf.st_mode))) {
433b7579f77SDag-Erling Smørgrav 		printf("%s is not a directory\n", fname);
434b7579f77SDag-Erling Smørgrav 		return 0;
435b7579f77SDag-Erling Smørgrav 	}
436b7579f77SDag-Erling Smørgrav 	return 1;
437b7579f77SDag-Erling Smørgrav }
438b7579f77SDag-Erling Smørgrav 
439b7579f77SDag-Erling Smørgrav /** get base dir of a fname */
440b7579f77SDag-Erling Smørgrav static char*
441b7579f77SDag-Erling Smørgrav basedir(char* fname)
442b7579f77SDag-Erling Smørgrav {
443b7579f77SDag-Erling Smørgrav 	char* rev;
444b7579f77SDag-Erling Smørgrav 	if(!fname) fatal_exit("out of memory");
445b7579f77SDag-Erling Smørgrav 	rev = strrchr(fname, '/');
446b7579f77SDag-Erling Smørgrav 	if(!rev) return NULL;
447b7579f77SDag-Erling Smørgrav 	if(fname == rev) return NULL;
448b7579f77SDag-Erling Smørgrav 	rev[0] = 0;
449b7579f77SDag-Erling Smørgrav 	return fname;
450b7579f77SDag-Erling Smørgrav }
451b7579f77SDag-Erling Smørgrav 
452b7579f77SDag-Erling Smørgrav /** check chroot for a file string */
453b7579f77SDag-Erling Smørgrav static void
454b7579f77SDag-Erling Smørgrav check_chroot_string(const char* desc, char** ss,
455b7579f77SDag-Erling Smørgrav 	const char* chrootdir, struct config_file* cfg)
456b7579f77SDag-Erling Smørgrav {
457b7579f77SDag-Erling Smørgrav 	char* str = *ss;
458b7579f77SDag-Erling Smørgrav 	if(str && str[0]) {
459b7579f77SDag-Erling Smørgrav 		*ss = fname_after_chroot(str, cfg, 1);
460b7579f77SDag-Erling Smørgrav 		if(!*ss) fatal_exit("out of memory");
461b7579f77SDag-Erling Smørgrav 		if(!is_file(*ss)) {
462b7579f77SDag-Erling Smørgrav 			if(chrootdir && chrootdir[0])
463b7579f77SDag-Erling Smørgrav 				fatal_exit("%s: \"%s\" does not exist in "
464b7579f77SDag-Erling Smørgrav 					"chrootdir %s", desc, str, chrootdir);
465b7579f77SDag-Erling Smørgrav 			else
466b7579f77SDag-Erling Smørgrav 				fatal_exit("%s: \"%s\" does not exist",
467b7579f77SDag-Erling Smørgrav 					desc, str);
468b7579f77SDag-Erling Smørgrav 		}
469b7579f77SDag-Erling Smørgrav 		/* put in a new full path for continued checking */
470b7579f77SDag-Erling Smørgrav 		free(str);
471b7579f77SDag-Erling Smørgrav 	}
472b7579f77SDag-Erling Smørgrav }
473b7579f77SDag-Erling Smørgrav 
474b7579f77SDag-Erling Smørgrav /** check file list, every file must be inside the chroot location */
475b7579f77SDag-Erling Smørgrav static void
476b7579f77SDag-Erling Smørgrav check_chroot_filelist(const char* desc, struct config_strlist* list,
477b7579f77SDag-Erling Smørgrav 	const char* chrootdir, struct config_file* cfg)
478b7579f77SDag-Erling Smørgrav {
479b7579f77SDag-Erling Smørgrav 	struct config_strlist* p;
480b7579f77SDag-Erling Smørgrav 	for(p=list; p; p=p->next) {
481b7579f77SDag-Erling Smørgrav 		check_chroot_string(desc, &p->str, chrootdir, cfg);
482b7579f77SDag-Erling Smørgrav 	}
483b7579f77SDag-Erling Smørgrav }
484b7579f77SDag-Erling Smørgrav 
485b7579f77SDag-Erling Smørgrav /** check file list, with wildcard processing */
486b7579f77SDag-Erling Smørgrav static void
487b7579f77SDag-Erling Smørgrav check_chroot_filelist_wild(const char* desc, struct config_strlist* list,
488b7579f77SDag-Erling Smørgrav 	const char* chrootdir, struct config_file* cfg)
489b7579f77SDag-Erling Smørgrav {
490b7579f77SDag-Erling Smørgrav 	struct config_strlist* p;
491b7579f77SDag-Erling Smørgrav 	for(p=list; p; p=p->next) {
492b7579f77SDag-Erling Smørgrav #ifdef HAVE_GLOB
493b7579f77SDag-Erling Smørgrav 		if(strchr(p->str, '*') || strchr(p->str, '[') ||
494b7579f77SDag-Erling Smørgrav 			strchr(p->str, '?') || strchr(p->str, '{') ||
495b7579f77SDag-Erling Smørgrav 			strchr(p->str, '~')) {
496b7579f77SDag-Erling Smørgrav 			char* s = p->str;
497b7579f77SDag-Erling Smørgrav 			/* adjust whole pattern for chroot and check later */
498b7579f77SDag-Erling Smørgrav 			p->str = fname_after_chroot(p->str, cfg, 1);
499b7579f77SDag-Erling Smørgrav 			free(s);
500b7579f77SDag-Erling Smørgrav 		} else
501b7579f77SDag-Erling Smørgrav #endif /* HAVE_GLOB */
502b7579f77SDag-Erling Smørgrav 			check_chroot_string(desc, &p->str, chrootdir, cfg);
503b7579f77SDag-Erling Smørgrav 	}
504b7579f77SDag-Erling Smørgrav }
505b7579f77SDag-Erling Smørgrav 
506971980c3SDag-Erling Smørgrav #ifdef CLIENT_SUBNET
507971980c3SDag-Erling Smørgrav /** check ECS configuration */
508971980c3SDag-Erling Smørgrav static void
509971980c3SDag-Erling Smørgrav ecs_conf_checks(struct config_file* cfg)
510971980c3SDag-Erling Smørgrav {
511971980c3SDag-Erling Smørgrav 	struct ecs_whitelist* whitelist = NULL;
512971980c3SDag-Erling Smørgrav 	if(!(whitelist = ecs_whitelist_create()))
513971980c3SDag-Erling Smørgrav 		fatal_exit("Could not create ednssubnet whitelist: out of memory");
514971980c3SDag-Erling Smørgrav         if(!ecs_whitelist_apply_cfg(whitelist, cfg))
515971980c3SDag-Erling Smørgrav 		fatal_exit("Could not setup ednssubnet whitelist");
516971980c3SDag-Erling Smørgrav 	ecs_whitelist_delete(whitelist);
517971980c3SDag-Erling Smørgrav }
518971980c3SDag-Erling Smørgrav #endif /* CLIENT_SUBNET */
519971980c3SDag-Erling Smørgrav 
5204c75e3aaSDag-Erling Smørgrav /** check that the modules exist, are compiled in */
5214c75e3aaSDag-Erling Smørgrav static void
5224c75e3aaSDag-Erling Smørgrav check_modules_exist(const char* module_conf)
5234c75e3aaSDag-Erling Smørgrav {
5244c75e3aaSDag-Erling Smørgrav 	const char** names = module_list_avail();
5254c75e3aaSDag-Erling Smørgrav 	const char* s = module_conf;
5264c75e3aaSDag-Erling Smørgrav 	while(*s) {
5274c75e3aaSDag-Erling Smørgrav 		int i = 0;
5284c75e3aaSDag-Erling Smørgrav 		int is_ok = 0;
5294c75e3aaSDag-Erling Smørgrav 		while(*s && isspace((unsigned char)*s))
5304c75e3aaSDag-Erling Smørgrav 			s++;
5314c75e3aaSDag-Erling Smørgrav 		if(!*s) break;
5324c75e3aaSDag-Erling Smørgrav 		while(names[i]) {
5334c75e3aaSDag-Erling Smørgrav 			if(strncmp(names[i], s, strlen(names[i])) == 0) {
5344c75e3aaSDag-Erling Smørgrav 				is_ok = 1;
5354c75e3aaSDag-Erling Smørgrav 				break;
5364c75e3aaSDag-Erling Smørgrav 			}
5374c75e3aaSDag-Erling Smørgrav 			i++;
5384c75e3aaSDag-Erling Smørgrav 		}
5394c75e3aaSDag-Erling Smørgrav 		if(is_ok == 0) {
5404c75e3aaSDag-Erling Smørgrav 			char n[64];
5414c75e3aaSDag-Erling Smørgrav 			size_t j;
5424c75e3aaSDag-Erling Smørgrav 			n[0]=0;
5434c75e3aaSDag-Erling Smørgrav 			n[sizeof(n)-1]=0;
5444c75e3aaSDag-Erling Smørgrav 			for(j=0; j<sizeof(n)-1; j++) {
5454c75e3aaSDag-Erling Smørgrav 				if(!s[j] || isspace((unsigned char)s[j])) {
5464c75e3aaSDag-Erling Smørgrav 					n[j] = 0;
5474c75e3aaSDag-Erling Smørgrav 					break;
5484c75e3aaSDag-Erling Smørgrav 				}
5494c75e3aaSDag-Erling Smørgrav 				n[j] = s[j];
5504c75e3aaSDag-Erling Smørgrav 			}
5514c75e3aaSDag-Erling Smørgrav 			fatal_exit("module_conf lists module '%s' but that "
5524c75e3aaSDag-Erling Smørgrav 				"module is not available.", n);
5534c75e3aaSDag-Erling Smørgrav 		}
5544c75e3aaSDag-Erling Smørgrav 		s += strlen(names[i]);
5554c75e3aaSDag-Erling Smørgrav 	}
5564c75e3aaSDag-Erling Smørgrav }
5574c75e3aaSDag-Erling Smørgrav 
558b7579f77SDag-Erling Smørgrav /** check configuration for errors */
559b7579f77SDag-Erling Smørgrav static void
560e86b9096SDag-Erling Smørgrav morechecks(struct config_file* cfg)
561b7579f77SDag-Erling Smørgrav {
562b7579f77SDag-Erling Smørgrav 	warn_hosts("stub-host", cfg->stubs);
563b7579f77SDag-Erling Smørgrav 	warn_hosts("forward-host", cfg->forwards);
564b7579f77SDag-Erling Smørgrav 	interfacechecks(cfg);
565b7579f77SDag-Erling Smørgrav 	aclchecks(cfg);
5664c75e3aaSDag-Erling Smørgrav 	tcpconnlimitchecks(cfg);
567b7579f77SDag-Erling Smørgrav 
568b7579f77SDag-Erling Smørgrav 	if(cfg->verbosity < 0)
569b7579f77SDag-Erling Smørgrav 		fatal_exit("verbosity value < 0");
570b7579f77SDag-Erling Smørgrav 	if(cfg->num_threads <= 0 || cfg->num_threads > 10000)
571b7579f77SDag-Erling Smørgrav 		fatal_exit("num_threads value weird");
572b7579f77SDag-Erling Smørgrav 	if(!cfg->do_ip4 && !cfg->do_ip6)
573b7579f77SDag-Erling Smørgrav 		fatal_exit("ip4 and ip6 are both disabled, pointless");
57425039b37SCy Schubert 	if(!cfg->do_ip4 && cfg->prefer_ip4)
57525039b37SCy Schubert 		fatal_exit("cannot prefer and disable ip4, pointless");
576b5663de9SDag-Erling Smørgrav 	if(!cfg->do_ip6 && cfg->prefer_ip6)
577b5663de9SDag-Erling Smørgrav 		fatal_exit("cannot prefer and disable ip6, pointless");
578b7579f77SDag-Erling Smørgrav 	if(!cfg->do_udp && !cfg->do_tcp)
579b7579f77SDag-Erling Smørgrav 		fatal_exit("udp and tcp are both disabled, pointless");
580b7579f77SDag-Erling Smørgrav 	if(cfg->edns_buffer_size > cfg->msg_buffer_size)
581b7579f77SDag-Erling Smørgrav 		fatal_exit("edns-buffer-size larger than msg-buffer-size, "
582b7579f77SDag-Erling Smørgrav 			"answers will not fit in processing buffer");
58305ab2901SDag-Erling Smørgrav #ifdef UB_ON_WINDOWS
58405ab2901SDag-Erling Smørgrav 	w_config_adjust_directory(cfg);
58505ab2901SDag-Erling Smørgrav #endif
586b7579f77SDag-Erling Smørgrav 	if(cfg->chrootdir && cfg->chrootdir[0] &&
587b7579f77SDag-Erling Smørgrav 		cfg->chrootdir[strlen(cfg->chrootdir)-1] == '/')
588b7579f77SDag-Erling Smørgrav 		fatal_exit("chootdir %s has trailing slash '/' please remove.",
589b7579f77SDag-Erling Smørgrav 			cfg->chrootdir);
590b7579f77SDag-Erling Smørgrav 	if(cfg->chrootdir && cfg->chrootdir[0] &&
591b7579f77SDag-Erling Smørgrav 		!is_dir(cfg->chrootdir)) {
592b7579f77SDag-Erling Smørgrav 		fatal_exit("bad chroot directory");
593b7579f77SDag-Erling Smørgrav 	}
594b7579f77SDag-Erling Smørgrav 	if(cfg->directory && cfg->directory[0]) {
595b7579f77SDag-Erling Smørgrav 		char* ad = fname_after_chroot(cfg->directory, cfg, 0);
596b7579f77SDag-Erling Smørgrav 		if(!ad) fatal_exit("out of memory");
597b7579f77SDag-Erling Smørgrav 		if(!is_dir(ad)) fatal_exit("bad chdir directory");
598b7579f77SDag-Erling Smørgrav 		free(ad);
599b7579f77SDag-Erling Smørgrav 	}
600b7579f77SDag-Erling Smørgrav 	if( (cfg->chrootdir && cfg->chrootdir[0]) ||
601b7579f77SDag-Erling Smørgrav 	    (cfg->directory && cfg->directory[0])) {
602b7579f77SDag-Erling Smørgrav 		if(cfg->pidfile && cfg->pidfile[0]) {
603b7579f77SDag-Erling Smørgrav 			char* ad = (cfg->pidfile[0]=='/')?strdup(cfg->pidfile):
604b7579f77SDag-Erling Smørgrav 				fname_after_chroot(cfg->pidfile, cfg, 1);
605b7579f77SDag-Erling Smørgrav 			char* bd = basedir(ad);
606b7579f77SDag-Erling Smørgrav 			if(bd && !is_dir(bd))
607b7579f77SDag-Erling Smørgrav 				fatal_exit("pidfile directory does not exist");
608b7579f77SDag-Erling Smørgrav 			free(ad);
609b7579f77SDag-Erling Smørgrav 		}
610b7579f77SDag-Erling Smørgrav 		if(cfg->logfile && cfg->logfile[0]) {
611b7579f77SDag-Erling Smørgrav 			char* ad = fname_after_chroot(cfg->logfile, cfg, 1);
612b7579f77SDag-Erling Smørgrav 			char* bd = basedir(ad);
613b7579f77SDag-Erling Smørgrav 			if(bd && !is_dir(bd))
614b7579f77SDag-Erling Smørgrav 				fatal_exit("logfile directory does not exist");
615b7579f77SDag-Erling Smørgrav 			free(ad);
616b7579f77SDag-Erling Smørgrav 		}
617b7579f77SDag-Erling Smørgrav 	}
618b7579f77SDag-Erling Smørgrav 
619b7579f77SDag-Erling Smørgrav 	check_chroot_filelist("file with root-hints",
620b7579f77SDag-Erling Smørgrav 		cfg->root_hints, cfg->chrootdir, cfg);
621b7579f77SDag-Erling Smørgrav 	check_chroot_filelist("trust-anchor-file",
622b7579f77SDag-Erling Smørgrav 		cfg->trust_anchor_file_list, cfg->chrootdir, cfg);
623b7579f77SDag-Erling Smørgrav 	check_chroot_filelist("auto-trust-anchor-file",
624b7579f77SDag-Erling Smørgrav 		cfg->auto_trust_anchor_file_list, cfg->chrootdir, cfg);
625b7579f77SDag-Erling Smørgrav 	check_chroot_filelist_wild("trusted-keys-file",
626b7579f77SDag-Erling Smørgrav 		cfg->trusted_keys_file_list, cfg->chrootdir, cfg);
627c7f4d7adSDag-Erling Smørgrav #ifdef USE_IPSECMOD
628971980c3SDag-Erling Smørgrav 	if(cfg->ipsecmod_enabled && strstr(cfg->module_conf, "ipsecmod")) {
629971980c3SDag-Erling Smørgrav 		/* only check hook if enabled */
630971980c3SDag-Erling Smørgrav 		check_chroot_string("ipsecmod-hook", &cfg->ipsecmod_hook,
631971980c3SDag-Erling Smørgrav 			cfg->chrootdir, cfg);
632971980c3SDag-Erling Smørgrav 	}
633c7f4d7adSDag-Erling Smørgrav #endif
634b7579f77SDag-Erling Smørgrav 	/* remove chroot setting so that modules are not stripping pathnames*/
635b7579f77SDag-Erling Smørgrav 	free(cfg->chrootdir);
636b7579f77SDag-Erling Smørgrav 	cfg->chrootdir = NULL;
637b7579f77SDag-Erling Smørgrav 
6384c75e3aaSDag-Erling Smørgrav 	/* check that the modules listed in module_conf exist */
6394c75e3aaSDag-Erling Smørgrav 	check_modules_exist(cfg->module_conf);
6404c75e3aaSDag-Erling Smørgrav 
641091e9e46SCy Schubert 	/* Respip is known to *not* work with dns64. */
642b7579f77SDag-Erling Smørgrav 	if(strcmp(cfg->module_conf, "iterator") != 0
643b7579f77SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "validator iterator") != 0
644ff825849SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 validator iterator") != 0
645ff825849SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 iterator") != 0
64665b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "respip iterator") != 0
64765b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "respip validator iterator") != 0
648b7579f77SDag-Erling Smørgrav #ifdef WITH_PYTHONMODULE
649b7579f77SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python iterator") != 0
650091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "python respip iterator") != 0
651b7579f77SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python validator iterator") != 0
652091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "python respip validator iterator") != 0
653b7579f77SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "validator python iterator") != 0
654ff825849SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 python iterator") != 0
655ff825849SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 python validator iterator") != 0
656ff825849SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 validator python iterator") != 0
657ff825849SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python dns64 iterator") != 0
658ff825849SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python dns64 validator iterator") != 0
659b7579f77SDag-Erling Smørgrav #endif
66025039b37SCy Schubert #ifdef WITH_DYNLIBMODULE
66125039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib iterator") != 0
66225039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib dynlib iterator") != 0
66325039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib dynlib dynlib iterator") != 0
66425039b37SCy Schubert 		&& strcmp(cfg->module_conf, "python dynlib iterator") != 0
66525039b37SCy Schubert 		&& strcmp(cfg->module_conf, "python dynlib dynlib iterator") != 0
66625039b37SCy Schubert 		&& strcmp(cfg->module_conf, "python dynlib dynlib dynlib iterator") != 0
66725039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib respip iterator") != 0
66825039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib validator iterator") != 0
66925039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib dynlib validator iterator") != 0
67025039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib dynlib dynlib validator iterator") != 0
67125039b37SCy Schubert 		&& strcmp(cfg->module_conf, "python dynlib validator iterator") != 0
67225039b37SCy Schubert 		&& strcmp(cfg->module_conf, "python dynlib dynlib validator iterator") != 0
67325039b37SCy Schubert 		&& strcmp(cfg->module_conf, "python dynlib dynlib dynlib validator iterator") != 0
67425039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib respip validator iterator") != 0
67525039b37SCy Schubert 		&& strcmp(cfg->module_conf, "validator dynlib iterator") != 0
67625039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dns64 dynlib iterator") != 0
67725039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dns64 dynlib validator iterator") != 0
67825039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dns64 validator dynlib iterator") != 0
67925039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib dns64 iterator") != 0
68025039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib dns64 validator iterator") != 0
68125039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib dns64 cachedb iterator") != 0
68225039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib dns64 validator cachedb iterator") != 0
68325039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dns64 dynlib cachedb iterator") != 0
68425039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dns64 dynlib validator cachedb iterator") != 0
68525039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib cachedb iterator") != 0
68625039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib respip cachedb iterator") != 0
68725039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib validator cachedb iterator") != 0
68825039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib respip validator cachedb iterator") != 0
68925039b37SCy Schubert 		&& strcmp(cfg->module_conf, "cachedb dynlib iterator") != 0
69025039b37SCy Schubert 		&& strcmp(cfg->module_conf, "respip cachedb dynlib iterator") != 0
69125039b37SCy Schubert 		&& strcmp(cfg->module_conf, "validator cachedb dynlib iterator") != 0
69225039b37SCy Schubert 		&& strcmp(cfg->module_conf, "respip validator cachedb dynlib iterator") != 0
69325039b37SCy Schubert 		&& strcmp(cfg->module_conf, "validator dynlib cachedb iterator") != 0
69425039b37SCy Schubert 		&& strcmp(cfg->module_conf, "respip validator dynlib cachedb iterator") != 0
69525039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib subnetcache iterator") != 0
69625039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib respip subnetcache iterator") != 0
69725039b37SCy Schubert 		&& strcmp(cfg->module_conf, "subnetcache dynlib iterator") != 0
69825039b37SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache dynlib iterator") != 0
69925039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib subnetcache validator iterator") != 0
70025039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib respip subnetcache validator iterator") != 0
70125039b37SCy Schubert 		&& strcmp(cfg->module_conf, "subnetcache dynlib validator iterator") != 0
70225039b37SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache dynlib validator iterator") != 0
70325039b37SCy Schubert 		&& strcmp(cfg->module_conf, "subnetcache validator dynlib iterator") != 0
70425039b37SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache validator dynlib iterator") != 0
70525039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib ipsecmod iterator") != 0
70625039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib ipsecmod respip iterator") != 0
70725039b37SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod dynlib iterator") != 0
70825039b37SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod dynlib respip iterator") != 0
70925039b37SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod validator iterator") != 0
71025039b37SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod respip validator iterator") != 0
71125039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib ipsecmod validator iterator") != 0
71225039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dynlib ipsecmod respip validator iterator") != 0
71325039b37SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod dynlib validator iterator") != 0
71425039b37SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod dynlib respip validator iterator") != 0
71525039b37SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod validator dynlib iterator") != 0
71625039b37SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod respip validator dynlib iterator") != 0
71725039b37SCy Schubert #endif
718e2d15004SDag-Erling Smørgrav #ifdef USE_CACHEDB
719e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "validator cachedb iterator") != 0
720091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip validator cachedb iterator") != 0
721e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "cachedb iterator") != 0
722091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip cachedb iterator") != 0
723e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 validator cachedb iterator") != 0
724e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 cachedb iterator") != 0
72565b390aaSDag-Erling Smørgrav #endif
72665b390aaSDag-Erling Smørgrav #if defined(WITH_PYTHONMODULE) && defined(USE_CACHEDB)
727e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python dns64 cachedb iterator") != 0
728e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python dns64 validator cachedb iterator") != 0
729e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 python cachedb iterator") != 0
730e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 python validator cachedb iterator") != 0
731e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python cachedb iterator") != 0
732091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "python respip cachedb iterator") != 0
733e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python validator cachedb iterator") != 0
734091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "python respip validator cachedb iterator") != 0
735e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "cachedb python iterator") != 0
736091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip cachedb python iterator") != 0
737e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "validator cachedb python iterator") != 0
738091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip validator cachedb python iterator") != 0
739e2d15004SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "validator python cachedb iterator") != 0
740091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip validator python cachedb iterator") != 0
741e2d15004SDag-Erling Smørgrav #endif
74265b390aaSDag-Erling Smørgrav #ifdef CLIENT_SUBNET
74365b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "subnetcache iterator") != 0
744091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache iterator") != 0
74565b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "subnetcache validator iterator") != 0
746091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache validator iterator") != 0
747971980c3SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 subnetcache iterator") != 0
748971980c3SDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "dns64 subnetcache validator iterator") != 0
74925039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dns64 subnetcache respip iterator") != 0
75025039b37SCy Schubert 		&& strcmp(cfg->module_conf, "dns64 subnetcache respip validator iterator") != 0
75165b390aaSDag-Erling Smørgrav #endif
75265b390aaSDag-Erling Smørgrav #if defined(WITH_PYTHONMODULE) && defined(CLIENT_SUBNET)
75365b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python subnetcache iterator") != 0
754091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "python respip subnetcache iterator") != 0
75565b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "subnetcache python iterator") != 0
756091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache python iterator") != 0
75765b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python subnetcache validator iterator") != 0
758091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "python respip subnetcache validator iterator") != 0
75965b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "subnetcache python validator iterator") != 0
760091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache python validator iterator") != 0
76165b390aaSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "subnetcache validator python iterator") != 0
762091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "respip subnetcache validator python iterator") != 0
76365b390aaSDag-Erling Smørgrav #endif
764c7f4d7adSDag-Erling Smørgrav #ifdef USE_IPSECMOD
765c7f4d7adSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "ipsecmod iterator") != 0
766091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod respip iterator") != 0
767c7f4d7adSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "ipsecmod validator iterator") != 0
768091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod respip validator iterator") != 0
769c7f4d7adSDag-Erling Smørgrav #endif
770c7f4d7adSDag-Erling Smørgrav #if defined(WITH_PYTHONMODULE) && defined(USE_IPSECMOD)
771c7f4d7adSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python ipsecmod iterator") != 0
772091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "python ipsecmod respip iterator") != 0
773c7f4d7adSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "ipsecmod python iterator") != 0
774091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod python respip iterator") != 0
775c7f4d7adSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "ipsecmod validator iterator") != 0
776091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod respip validator iterator") != 0
777c7f4d7adSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "python ipsecmod validator iterator") != 0
778091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "python ipsecmod respip validator iterator") != 0
779c7f4d7adSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "ipsecmod python validator iterator") != 0
780091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod python respip validator iterator") != 0
781c7f4d7adSDag-Erling Smørgrav 		&& strcmp(cfg->module_conf, "ipsecmod validator python iterator") != 0
782091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "ipsecmod respip validator python iterator") != 0
783c7f4d7adSDag-Erling Smørgrav #endif
7840eefd307SCy Schubert #ifdef USE_IPSET
7850eefd307SCy Schubert 		&& strcmp(cfg->module_conf, "validator ipset iterator") != 0
786091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "validator ipset respip iterator") != 0
7870eefd307SCy Schubert 		&& strcmp(cfg->module_conf, "ipset iterator") != 0
788091e9e46SCy Schubert 		&& strcmp(cfg->module_conf, "ipset respip iterator") != 0
7890eefd307SCy Schubert #endif
790b7579f77SDag-Erling Smørgrav 		) {
791b7579f77SDag-Erling Smørgrav 		fatal_exit("module conf '%s' is not known to work",
792b7579f77SDag-Erling Smørgrav 			cfg->module_conf);
793b7579f77SDag-Erling Smørgrav 	}
794b7579f77SDag-Erling Smørgrav 
795b7579f77SDag-Erling Smørgrav #ifdef HAVE_GETPWNAM
796b7579f77SDag-Erling Smørgrav 	if(cfg->username && cfg->username[0]) {
797b7579f77SDag-Erling Smørgrav 		if(getpwnam(cfg->username) == NULL)
798b7579f77SDag-Erling Smørgrav 			fatal_exit("user '%s' does not exist.", cfg->username);
799b5663de9SDag-Erling Smørgrav #  ifdef HAVE_ENDPWENT
800b7579f77SDag-Erling Smørgrav 		endpwent();
801b5663de9SDag-Erling Smørgrav #  endif
802b7579f77SDag-Erling Smørgrav 	}
803b7579f77SDag-Erling Smørgrav #endif
8047da0adf7SDag-Erling Smørgrav 	if(cfg->remote_control_enable && options_remote_is_address(cfg)
8057da0adf7SDag-Erling Smørgrav 		&& cfg->control_use_cert) {
806b7579f77SDag-Erling Smørgrav 		check_chroot_string("server-key-file", &cfg->server_key_file,
807b7579f77SDag-Erling Smørgrav 			cfg->chrootdir, cfg);
808b7579f77SDag-Erling Smørgrav 		check_chroot_string("server-cert-file", &cfg->server_cert_file,
809b7579f77SDag-Erling Smørgrav 			cfg->chrootdir, cfg);
810b7579f77SDag-Erling Smørgrav 		if(!is_file(cfg->control_key_file))
811b7579f77SDag-Erling Smørgrav 			fatal_exit("control-key-file: \"%s\" does not exist",
812b7579f77SDag-Erling Smørgrav 				cfg->control_key_file);
813b7579f77SDag-Erling Smørgrav 		if(!is_file(cfg->control_cert_file))
814b7579f77SDag-Erling Smørgrav 			fatal_exit("control-cert-file: \"%s\" does not exist",
815b7579f77SDag-Erling Smørgrav 				cfg->control_cert_file);
816b7579f77SDag-Erling Smørgrav 	}
817b7579f77SDag-Erling Smørgrav 
8180eefd307SCy Schubert 	donotquerylocalhostcheck(cfg);
819b7579f77SDag-Erling Smørgrav 	localzonechecks(cfg);
82065b390aaSDag-Erling Smørgrav 	view_and_respipchecks(cfg);
821971980c3SDag-Erling Smørgrav #ifdef CLIENT_SUBNET
822971980c3SDag-Erling Smørgrav 	ecs_conf_checks(cfg);
823971980c3SDag-Erling Smørgrav #endif
824b7579f77SDag-Erling Smørgrav }
825b7579f77SDag-Erling Smørgrav 
826b7579f77SDag-Erling Smørgrav /** check forwards */
827b7579f77SDag-Erling Smørgrav static void
828b7579f77SDag-Erling Smørgrav check_fwd(struct config_file* cfg)
829b7579f77SDag-Erling Smørgrav {
830b7579f77SDag-Erling Smørgrav 	struct iter_forwards* fwd = forwards_create();
831b7579f77SDag-Erling Smørgrav 	if(!fwd || !forwards_apply_cfg(fwd, cfg)) {
832b7579f77SDag-Erling Smørgrav 		fatal_exit("Could not set forward zones");
833b7579f77SDag-Erling Smørgrav 	}
834b7579f77SDag-Erling Smørgrav 	forwards_delete(fwd);
835b7579f77SDag-Erling Smørgrav }
836b7579f77SDag-Erling Smørgrav 
837b7579f77SDag-Erling Smørgrav /** check hints */
838b7579f77SDag-Erling Smørgrav static void
839b7579f77SDag-Erling Smørgrav check_hints(struct config_file* cfg)
840b7579f77SDag-Erling Smørgrav {
841b7579f77SDag-Erling Smørgrav 	struct iter_hints* hints = hints_create();
842b7579f77SDag-Erling Smørgrav 	if(!hints || !hints_apply_cfg(hints, cfg)) {
843b7579f77SDag-Erling Smørgrav 		fatal_exit("Could not set root or stub hints");
844b7579f77SDag-Erling Smørgrav 	}
845b7579f77SDag-Erling Smørgrav 	hints_delete(hints);
846b7579f77SDag-Erling Smørgrav }
847b7579f77SDag-Erling Smørgrav 
84857bddd21SDag-Erling Smørgrav /** check auth zones */
84957bddd21SDag-Erling Smørgrav static void
85057bddd21SDag-Erling Smørgrav check_auth(struct config_file* cfg)
85157bddd21SDag-Erling Smørgrav {
852091e9e46SCy Schubert 	int is_rpz = 0;
85357bddd21SDag-Erling Smørgrav 	struct auth_zones* az = auth_zones_create();
854*5469a995SCy Schubert 	if(!az || !auth_zones_apply_cfg(az, cfg, 0, &is_rpz, NULL, NULL)) {
85557bddd21SDag-Erling Smørgrav 		fatal_exit("Could not setup authority zones");
85657bddd21SDag-Erling Smørgrav 	}
85757bddd21SDag-Erling Smørgrav 	auth_zones_delete(az);
85857bddd21SDag-Erling Smørgrav }
85957bddd21SDag-Erling Smørgrav 
860b7579f77SDag-Erling Smørgrav /** check config file */
861b7579f77SDag-Erling Smørgrav static void
8626480faa8SDag-Erling Smørgrav checkconf(const char* cfgfile, const char* opt, int final)
863b7579f77SDag-Erling Smørgrav {
864bc892140SDag-Erling Smørgrav 	char oldwd[4096];
865b7579f77SDag-Erling Smørgrav 	struct config_file* cfg = config_create();
866b7579f77SDag-Erling Smørgrav 	if(!cfg)
867b7579f77SDag-Erling Smørgrav 		fatal_exit("out of memory");
868b5663de9SDag-Erling Smørgrav 	oldwd[0] = 0;
869b5663de9SDag-Erling Smørgrav 	if(!getcwd(oldwd, sizeof(oldwd))) {
870b5663de9SDag-Erling Smørgrav 		log_err("cannot getcwd: %s", strerror(errno));
871b5663de9SDag-Erling Smørgrav 		oldwd[0] = 0;
872b5663de9SDag-Erling Smørgrav 	}
873b7579f77SDag-Erling Smørgrav 	if(!config_read(cfg, cfgfile, NULL)) {
874b7579f77SDag-Erling Smørgrav 		/* config_read prints messages to stderr */
875b7579f77SDag-Erling Smørgrav 		config_delete(cfg);
876b7579f77SDag-Erling Smørgrav 		exit(1);
877b7579f77SDag-Erling Smørgrav 	}
878b5663de9SDag-Erling Smørgrav 	if(oldwd[0] && chdir(oldwd) == -1)
879b5663de9SDag-Erling Smørgrav 		log_err("cannot chdir(%s): %s", oldwd, strerror(errno));
880ff825849SDag-Erling Smørgrav 	if(opt) {
8816480faa8SDag-Erling Smørgrav 		print_option(cfg, opt, final);
882ff825849SDag-Erling Smørgrav 		config_delete(cfg);
883ff825849SDag-Erling Smørgrav 		return;
884ff825849SDag-Erling Smørgrav 	}
885e86b9096SDag-Erling Smørgrav 	morechecks(cfg);
886b7579f77SDag-Erling Smørgrav 	check_mod(cfg, iter_get_funcblock());
887b7579f77SDag-Erling Smørgrav 	check_mod(cfg, val_get_funcblock());
888b7579f77SDag-Erling Smørgrav #ifdef WITH_PYTHONMODULE
889b7579f77SDag-Erling Smørgrav 	if(strstr(cfg->module_conf, "python"))
890b7579f77SDag-Erling Smørgrav 		check_mod(cfg, pythonmod_get_funcblock());
891b7579f77SDag-Erling Smørgrav #endif
892b7579f77SDag-Erling Smørgrav 	check_fwd(cfg);
893b7579f77SDag-Erling Smørgrav 	check_hints(cfg);
89457bddd21SDag-Erling Smørgrav 	check_auth(cfg);
895ff825849SDag-Erling Smørgrav 	printf("unbound-checkconf: no errors in %s\n", cfgfile);
896b7579f77SDag-Erling Smørgrav 	config_delete(cfg);
897b7579f77SDag-Erling Smørgrav }
898b7579f77SDag-Erling Smørgrav 
899b7579f77SDag-Erling Smørgrav /** getopt global, in case header files fail to declare it. */
900b7579f77SDag-Erling Smørgrav extern int optind;
901b7579f77SDag-Erling Smørgrav /** getopt global, in case header files fail to declare it. */
902b7579f77SDag-Erling Smørgrav extern char* optarg;
903b7579f77SDag-Erling Smørgrav 
904b7579f77SDag-Erling Smørgrav /** Main routine for checkconf */
905b7579f77SDag-Erling Smørgrav int main(int argc, char* argv[])
906b7579f77SDag-Erling Smørgrav {
907b7579f77SDag-Erling Smørgrav 	int c;
9086480faa8SDag-Erling Smørgrav 	int final = 0;
909b7579f77SDag-Erling Smørgrav 	const char* f;
910b7579f77SDag-Erling Smørgrav 	const char* opt = NULL;
911b7579f77SDag-Erling Smørgrav 	const char* cfgfile = CONFIGFILE;
912b7579f77SDag-Erling Smørgrav 	log_ident_set("unbound-checkconf");
913b7579f77SDag-Erling Smørgrav 	log_init(NULL, 0, NULL);
914b7579f77SDag-Erling Smørgrav 	checklock_start();
915b7579f77SDag-Erling Smørgrav #ifdef USE_WINSOCK
916b7579f77SDag-Erling Smørgrav 	/* use registry config file in preference to compiletime location */
917b7579f77SDag-Erling Smørgrav 	if(!(cfgfile=w_lookup_reg_str("Software\\Unbound", "ConfigFile")))
918b7579f77SDag-Erling Smørgrav 		cfgfile = CONFIGFILE;
919b7579f77SDag-Erling Smørgrav #endif /* USE_WINSOCK */
920b7579f77SDag-Erling Smørgrav 	/* parse the options */
9216480faa8SDag-Erling Smørgrav 	while( (c=getopt(argc, argv, "fho:")) != -1) {
922b7579f77SDag-Erling Smørgrav 		switch(c) {
9236480faa8SDag-Erling Smørgrav 		case 'f':
9246480faa8SDag-Erling Smørgrav 			final = 1;
9256480faa8SDag-Erling Smørgrav 			break;
926b7579f77SDag-Erling Smørgrav 		case 'o':
927b7579f77SDag-Erling Smørgrav 			opt = optarg;
928b7579f77SDag-Erling Smørgrav 			break;
929b7579f77SDag-Erling Smørgrav 		case '?':
930b7579f77SDag-Erling Smørgrav 		case 'h':
931b7579f77SDag-Erling Smørgrav 		default:
932b7579f77SDag-Erling Smørgrav 			usage();
933b7579f77SDag-Erling Smørgrav 		}
934b7579f77SDag-Erling Smørgrav 	}
935b7579f77SDag-Erling Smørgrav 	argc -= optind;
936b7579f77SDag-Erling Smørgrav 	argv += optind;
937b7579f77SDag-Erling Smørgrav 	if(argc != 0 && argc != 1)
938b7579f77SDag-Erling Smørgrav 		usage();
939b7579f77SDag-Erling Smørgrav 	if(argc == 1)
940b7579f77SDag-Erling Smørgrav 		f = argv[0];
941b7579f77SDag-Erling Smørgrav 	else	f = cfgfile;
9426480faa8SDag-Erling Smørgrav 	checkconf(f, opt, final);
943b7579f77SDag-Erling Smørgrav 	checklock_stop();
944b7579f77SDag-Erling Smørgrav 	return 0;
945b7579f77SDag-Erling Smørgrav }
946