declare(suffix,"port","Database backend port to connect to","0");
declare(suffix,"socket","Pdns backend socket to connect to","");
declare(suffix,"password","Pdns backend password to connect with","");
- declare(suffix,"dnssec","Assume DNSSEC Schema is in place","false");
+ declare(suffix,"dnssec","Assume DNSSEC Schema is in place","no");
declare(suffix,"basic-query","Basic query","select content,ttl,prio,type,domain_id,name from records where type='%s' and name='%s'");
declare(suffix,"id-query","Basic with ID query","select content,ttl,prio,type,domain_id,name from records where type='%s' and name='%s' and domain_id=%d");
declare(suffix,"port","Database backend port to connect to","");
declare(suffix,"socket","Pdns backend socket to connect to","");
declare(suffix,"password","Pdns backend password to connect with","");
-
+ declare(suffix, "dnssec", "Assume DNSSEC Schema is in place","no");
declare(suffix,"basic-query","Basic query","select content,ttl,prio,type,domain_id,name from records where type='%s' and name='%s'");
declare(suffix,"id-query","Basic with ID query","select content,ttl,prio,type,domain_id,name from records where type='%s' and name='%s' and domain_id=%d");
declare(suffix,"wildcard-query","Wildcard query","select content,ttl,prio,type,domain_id,name from records where type='%s' and name like '%s'");
declare( suffix, "info-all-master-query", "", "select id,name,master,last_check,notified_serial,type from domains where type='MASTER'");
declare( suffix, "delete-zone-query", "", "delete from records where domain_id=%d");
declare( suffix, "check-acl-query","", "select value from acls where acl_type='%s' and acl_key='%s'");
- declare(suffix, "dnssec", "Assume DNSSEC Schema is in place","false");
+ declare(suffix, "dnssec", "Assume DNSSEC Schema is in place","no");
declare(suffix,"add-domain-key-query","", "insert into cryptokeys (domain_id, flags, active, content) select id, %d, %d, '%s' from domains where name='%s'");
declare(suffix,"list-domain-keys-query","", "select cryptokeys.id, flags, active, content from domains, cryptokeys where domain_id=domains.id and name='%s'");
bool GSQLBackend::updateDNSSECOrderAndAuth(uint32_t domain_id, const std::string& zonename, const std::string& qname, bool auth)
{
+ if(!d_dnssecQueries)
+ return false;
string ins=toLower(labelReverse(makeRelative(qname, zonename)));
return this->updateDNSSECOrderAndAuthAbsolute(domain_id, qname, ins, auth);
}
bool GSQLBackend::updateDNSSECOrderAndAuthAbsolute(uint32_t domain_id, const std::string& qname, const std::string& ordername, bool auth)
{
+ if(!d_dnssecQueries)
+ return false;
char output[1024];
// ordername='%s',auth=%d where name='%s' and domain_id='%d'
}
bool GSQLBackend::getBeforeAndAfterNamesAbsolute(uint32_t id, const std::string& qname, std::string& unhashed, std::string& before, std::string& after)
{
+ if(!d_dnssecQueries)
+ return false;
cerr<<"gsql before/after called for id="<<id<<", qname='"<<qname<<"'"<<endl;
unhashed.clear(); before.clear(); after.clear();
string lcqname=toLower(qname);
int GSQLBackend::addDomainKey(const string& name, const KeyData& key)
{
+ if(!d_dnssecQueries)
+ return -1;
char output[16384];
snprintf(output,sizeof(output)-1,d_AddDomainKeyQuery.c_str(),
key.flags, (int)key.active, sqlEscape(key.content).c_str(), sqlEscape(toLower(name)).c_str());
bool GSQLBackend::activateDomainKey(const string& name, unsigned int id)
{
+ if(!d_dnssecQueries)
+ return false;
char output[1024];
snprintf(output,sizeof(output)-1,d_ActivateDomainKeyQuery.c_str(), sqlEscape(toLower(name)).c_str(), id);
bool GSQLBackend::deactivateDomainKey(const string& name, unsigned int id)
{
+ if(!d_dnssecQueries)
+ return false;
char output[1024];
snprintf(output,sizeof(output)-1,d_DeactivateDomainKeyQuery.c_str(), sqlEscape(toLower(name)).c_str(), id);
bool GSQLBackend::removeDomainKey(const string& name, unsigned int id)
{
+ if(!d_dnssecQueries)
+ return false;
char output[1024];
snprintf(output,sizeof(output)-1,d_RemoveDomainKeyQuery.c_str(), sqlEscape(toLower(name)).c_str(), id);
bool GSQLBackend::getDomainKeys(const string& name, unsigned int kind, std::vector<KeyData>& keys)
{
+ if(!d_dnssecQueries)
+ return false;
char output[1024];
snprintf(output,sizeof(output)-1,d_ListDomainKeysQuery.c_str(), sqlEscape(toLower(name)).c_str());
bool GSQLBackend::getDomainMetadata(const string& name, const std::string& kind, std::vector<std::string>& meta)
{
+ if(!d_dnssecQueries)
+ return false;
char output[1024];
snprintf(output,sizeof(output)-1,d_GetDomainMetadataQuery.c_str(), sqlEscape(name).c_str(), sqlEscape(kind).c_str());
bool GSQLBackend::setDomainMetadata(const string& name, const std::string& kind, const std::vector<std::string>& meta)
{
char output[16384];
+ if(!d_dnssecQueries)
+ return false;
if(!meta.empty())
snprintf(output,sizeof(output)-1,d_SetDomainMetadataQuery.c_str(),