#!/bin/sh # # $FreeBSD$ # # PROVIDE: named # REQUIRE: SERVERS cleanvar # KEYWORD: shutdown . /etc/rc.subr name="named" rcvar=named_enable command="/usr/sbin/named" extra_commands="reload" start_precmd="named_precmd" start_postcmd="named_poststart" reload_cmd="named_reload" stop_cmd="named_stop" stop_postcmd="named_poststop" # If running in a chroot cage, ensure that the appropriate files # exist inside the cage, as well as helper symlinks into the cage # from outside. # # As this is called after the is_running and required_dir checks # are made in run_rc_command(), we can safely assume ${named_chrootdir} # exists and named isn't running at this point (unless forcestart # is used). # chroot_autoupdate() { local file # Create (or update) the chroot directory structure # if [ -r /etc/mtree/BIND.chroot.dist ]; then mtree -deU -f /etc/mtree/BIND.chroot.dist \ -p ${named_chrootdir} else warn "/etc/mtree/BIND.chroot.dist missing," warn "chroot directory structure not updated" fi # Create /etc/namedb symlink # if [ ! -L /etc/namedb ]; then if [ -d /etc/namedb ]; then warn "named chroot: /etc/namedb is a directory!" elif [ -e /etc/namedb ]; then warn "named chroot: /etc/namedb exists!" else ln -s ${named_chrootdir}/etc/namedb /etc/namedb fi else # Make sure it points to the right place. ln -shf ${named_chrootdir}/etc/namedb /etc/namedb fi # Mount a devfs in the chroot directory if needed # if [ `${SYSCTL_N} security.jail.jailed` -eq 0 ]; then umount ${named_chrootdir}/dev 2>/dev/null devfs_domount ${named_chrootdir}/dev devfsrules_hide_all devfs -m ${named_chrootdir}/dev rule apply path null unhide devfs -m ${named_chrootdir}/dev rule apply path random unhide else if [ -c ${named_chrootdir}/dev/null -a \ -c ${named_chrootdir}/dev/random ]; then info "named chroot: using pre-mounted devfs." else err 1 "named chroot: devfs cannot be mounted from" \ "within a jail. Thus a chrooted named cannot" \ "be run from within a jail." \ "To run named without chrooting it, set" \ "named_chrootdir=\"\" in /etc/rc.conf." fi fi # Copy and/or update key files to the chroot /etc # for file in localtime protocols services; do if [ -r /etc/$file ]; then cmp -s /etc/$file "${named_chrootdir}/etc/$file" || cp -p /etc/$file "${named_chrootdir}/etc/$file" fi done } # Make symlinks to the correct pid file # make_symlinks() { checkyesno named_symlink_enable && ln -fs "${named_chrootdir}${pidfile}" ${pidfile} } named_poststart () { make_symlinks if checkyesno named_wait; then until ${command%/sbin/named}/bin/host $named_wait_host >/dev/null 2>&1; do echo " Waiting for nameserver to resolve $named_wait_host" sleep 1 done fi } named_reload() { ${command%/named}/rndc reload } named_stop() { # This duplicates an undesirably large amount of code from the stop # routine in rc.subr in order to use rndc to shut down the process, # and to give it a second chance in case rndc fails. rc_pid=$(check_pidfile $pidfile $command) if [ -z "$rc_pid" ]; then [ -n "$rc_fast" ] && return 0 _run_rc_notrunning return 1 fi echo 'Stopping named.' if ${command%/named}/rndc stop 2>/dev/null; then wait_for_pids $rc_pid else echo -n 'rndc failed, trying kill: ' kill -TERM $rc_pid wait_for_pids $rc_pid fi } named_poststop() { if [ -n "${named_chrootdir}" -a -c ${named_chrootdir}/dev/null ]; then if [ `${SYSCTL_N} security.jail.jailed` -eq 0 ]; then umount ${named_chrootdir}/dev 2>/dev/null || true else warn "named chroot:" \ "cannot unmount devfs from inside jail!" fi fi } create_file () { if [ -e "$1" ]; then unlink $1 fi > $1 chown root:wheel $1 chmod 644 $1 } named_precmd() { local line nsip firstns # Is the user using a sandbox? # if [ -n "$named_chrootdir" ]; then rc_flags="$rc_flags -t $named_chrootdir" checkyesno named_chroot_autoupdate && chroot_autoupdate else named_symlink_enable=NO fi # Create an rndc.key file for the user if none exists # if [ -s "${named_chrootdir}/etc/namedb/rndc.conf" ]; then return 0 fi confgen_command="${command%/named}/rndc-confgen -a -b256 -u $named_uid \ -c ${named_chrootdir}/etc/namedb/rndc.key" if [ -s "${named_chrootdir}/etc/namedb/rndc.key" ]; then case `stat -f%Su ${named_chrootdir}/etc/namedb/rndc.key` in root|$named_uid) ;; *) $confgen_command ;; esac else $confgen_command fi # Create a forwarder configuration based on /etc/resolv.conf if checkyesno named_auto_forward; then if [ ! -s /etc/resolv.conf ]; then warn "named_auto_forward enabled, but no /etc/resolv.conf" # Empty the file in case it is included in named.conf [ -s "${named_chrootdir}/etc/namedb/auto_forward.conf" ] && create_file ${named_chrootdir}/etc/namedb/auto_forward.conf ${command%/named}/named-checkconf $named_conf || err 3 'named-checkconf for $named_conf failed' return fi create_file /var/run/naf-resolv.conf create_file /var/run/auto_forward.conf echo ' forwarders {' > /var/run/auto_forward.conf while read line; do case "$line" in 'nameserver '*|'nameserver '*) nsip=${line##nameserver[ ]} if [ -z "$firstns" ]; then if [ ! "$nsip" = '127.0.0.1' ]; then echo 'nameserver 127.0.0.1' echo " ${nsip};" >> /var/run/auto_forward.conf fi firstns=1 else [ "$nsip" = '127.0.0.1' ] && continue echo " ${nsip};" >> /var/run/auto_forward.conf fi ;; esac echo $line done < /etc/resolv.conf > /var/run/naf-resolv.conf echo ' };' >> /var/run/auto_forward.conf echo '' >> /var/run/auto_forward.conf if checkyesno named_auto_forward_only; then echo " forward only;" >> /var/run/auto_forward.conf else echo " forward first;" >> /var/run/auto_forward.conf fi if cmp -s /etc/resolv.conf /var/run/naf-resolv.conf; then unlink /var/run/naf-resolv.conf else [ -e /etc/resolv.conf ] && unlink /etc/resolv.conf mv /var/run/naf-resolv.conf /etc/resolv.conf fi if cmp -s ${named_chrootdir}/etc/namedb/auto_forward.conf \ /var/run/auto_forward.conf; then unlink /var/run/auto_forward.conf else [ -e "${named_chrootdir}/etc/namedb/auto_forward.conf" ] && unlink ${named_chrootdir}/etc/namedb/auto_forward.conf mv /var/run/auto_forward.conf \ ${named_chrootdir}/etc/namedb/auto_forward.conf fi else # Empty the file in case it is included in named.conf [ -s "${named_chrootdir}/etc/namedb/auto_forward.conf" ] && create_file ${named_chrootdir}/etc/namedb/auto_forward.conf fi ${command%/named}/named-checkconf $named_conf || err 3 'named-checkconf for $named_conf failed' } load_rc_config $name # Updating the following variables requires that rc.conf be loaded first # required_dirs="$named_chrootdir" # if it is set, it must exist pidfile="${named_pidfile:-/var/run/named/pid}" command_args="-u ${named_uid:=root}" run_rc_command "$1"