blob: 5b9b51e863198ba8793f4230bc6c74b7dcb6e900 [file] [log] [blame]
Jiewen Tan870b29b2014-11-17 19:09:49 -08001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
Yumin Xia2c509c22017-02-09 14:37:36 -08002/*
Alexander Afanasyev60514ec2020-06-03 14:18:53 -04003 * Copyright (c) 2014-2020, Regents of the University of California.
Jiewen Tan870b29b2014-11-17 19:09:49 -08004 *
5 * This file is part of NDNS (Named Data Networking Domain Name Service).
6 * See AUTHORS.md for complete list of NDNS authors and contributors.
7 *
8 * NDNS is free software: you can redistribute it and/or modify it under the terms
9 * of the GNU General Public License as published by the Free Software Foundation,
10 * either version 3 of the License, or (at your option) any later version.
11 *
12 * NDNS is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
13 * without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
14 * PURPOSE. See the GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License along with
17 * NDNS, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
18 */
19
20#ifndef NDNS_MGMT_MANAGEMENT_TOOL_HPP
21#define NDNS_MGMT_MANAGEMENT_TOOL_HPP
22
23#include "config.hpp"
24#include "ndns-enum.hpp"
Junxiao Shi15e51bc2018-12-12 13:48:56 -070025#include "clients/response.hpp"
26#include "daemon/db-mgr.hpp"
27#include "daemon/rrset.hpp"
28#include "daemon/rrset-factory.hpp"
29#include "daemon/zone.hpp"
Jiewen Tan870b29b2014-11-17 19:09:49 -080030
Yumin Xia2c509c22017-02-09 14:37:36 -080031#include <ndn-cxx/security/key-chain.hpp>
Jiewen Tan74d745c2015-03-20 01:40:41 -070032#include <ndn-cxx/util/io.hpp>
Jiewen Tan870b29b2014-11-17 19:09:49 -080033
Junxiao Shi15e51bc2018-12-12 13:48:56 -070034#include <stdexcept>
35
Jiewen Tan870b29b2014-11-17 19:09:49 -080036namespace ndn {
37namespace ndns {
38
39static const Name DEFAULT_CERT;
40static const Name ROOT_ZONE;
41static const time::seconds DEFAULT_CACHE_TTL = time::seconds(3600);
42static const time::seconds DEFAULT_CERT_TTL = time::days(365);
43static const std::vector<std::string> DEFAULT_CONTENTS;
44static const std::string DEFAULT_IO = "-";
45static const time::seconds DEFAULT_RR_TTL = time::seconds(0);
46static constexpr uint64_t VERSION_USE_UNIX_TIMESTAMP = std::numeric_limits<uint64_t>::max();
47
48/**
49 * @brief provides management tools to the NDNS system, such as zone creation, zone delegation, DSK
50 * generation and root zone creation.
51 */
52class ManagementTool : noncopyable
53{
54public:
55 /** @brief Represents an error might be thrown during runtime
56 */
57 class Error : public std::runtime_error
58 {
59 public:
60 explicit
61 Error(const std::string& what) : std::runtime_error(what)
62 {
63 }
64 };
65
Alexander Afanasyevdf2e9392016-03-10 11:50:53 -080066 /**
67 * @brief Create instance of the tool
68 *
69 * @param dbFile Path to the local database
70 * @param keyChain Keychain instance
Jiewen Tan870b29b2014-11-17 19:09:49 -080071 */
Alexander Afanasyevd6b3bda2014-11-25 17:33:58 -080072 ManagementTool(const std::string& dbFile, KeyChain& keyChain);
Jiewen Tan870b29b2014-11-17 19:09:49 -080073
74 /** @brief Create a Zone according to a given name.
75 *
76 * Specifically, It will generate a KSK and a DSK (and their certificates) to the following
77 * places:
Yumin Xiaacd21332016-11-28 22:54:48 -080078 * 1. Local NDNS database: a new zone is added.
Yumin Xia2c509c22017-02-09 14:37:36 -080079 * 2. Local NDNS database: an CERT of the DSK is added.
Yumin Xiaacd21332016-11-28 22:54:48 -080080 * 3. KeyChain: an identity named with zone name is added.
81 * 4. KeyChain: a KSK and its self-signed certificate is added. The ownership of the KSK is the
Jiewen Tan870b29b2014-11-17 19:09:49 -080082 * parent zone.
Yumin Xiaacd21332016-11-28 22:54:48 -080083 * 5. KeyChain: a DSK and its KSK signed certificate is added.
Jiewen Tan870b29b2014-11-17 19:09:49 -080084 *
Yumin Xiaacd21332016-11-28 22:54:48 -080085 * - SS.cert (self-signed)
86 * - SKS.cert (self's Key signed)
87 * - PKS.cert (parent's Key Signed)
Jiewen Tan870b29b2014-11-17 19:09:49 -080088 *
Yumin Xiaacd21332016-11-28 22:54:48 -080089 * @note To create root zone, supply zoneName and parentZoneName both with ROOT_ZONE
Jiewen Tan870b29b2014-11-17 19:09:49 -080090 *
91 * @param zoneName zone's name
92 * @param parentZoneName parent zone's name
Alexander Afanasyevd6b3bda2014-11-25 17:33:58 -080093 * @param cacheTtl default TTL for RR sets in the zone
94 * @param certValidity validity for automatically created DSK certificate (@p dskCertName
95 * should not be empty)
Jiewen Tan01693fd2015-03-25 20:34:45 -070096 * @param kskCertName if given, a zone will be created with this ksk certificate
97 * @param dskCertName if given, a zone will be created with this dsk certificate and provided
Yumin Xiaacd21332016-11-28 22:54:48 -080098 * ksk certificate will be ignored
Yumin Xia2c509c22017-02-09 14:37:36 -080099 * @param dkeyCertName if given, ksk will be signed by this d-key.
Jiewen Tan870b29b2014-11-17 19:09:49 -0800100 */
Yumin Xia2c509c22017-02-09 14:37:36 -0800101 Zone
Jiewen Tan870b29b2014-11-17 19:09:49 -0800102 createZone(const Name& zoneName,
103 const Name& parentZoneName,
104 const time::seconds& cacheTtl = DEFAULT_CACHE_TTL,
Alexander Afanasyevd6b3bda2014-11-25 17:33:58 -0800105 const time::seconds& certValidity = DEFAULT_CERT_TTL,
Jiewen Tan870b29b2014-11-17 19:09:49 -0800106 const Name& kskCertName = DEFAULT_CERT,
Yumin Xia2c509c22017-02-09 14:37:36 -0800107 const Name& dskCertName = DEFAULT_CERT,
108 const Name& dkeyCertName = DEFAULT_CERT);
Jiewen Tan870b29b2014-11-17 19:09:49 -0800109
110 /** @brief Delete a Zone according to a given name.
111 *
112 * Specifically, It will do the following things:
113 * 1) KeyChain System: delete the Identity with zone name and all its keys/certificates
114 * 2) Local NDNS database: delete the zone record
Yumin Xia2c509c22017-02-09 14:37:36 -0800115 * 3) Local NDNS database: delete the CERT of the zone's DSK
Jiewen Tan870b29b2014-11-17 19:09:49 -0800116 */
117 void
118 deleteZone(const Name& zoneName);
119
120 /** @brief Export the certificate to file system
121 *
122 * @param certName the name of the certificate to be exported
Alexander Afanasyevdf2e9392016-03-10 11:50:53 -0800123 * @param outFile the path to output to-be exported file, including the file name
Jiewen Tan870b29b2014-11-17 19:09:49 -0800124 */
125 void
126 exportCertificate(const Name& certName, const std::string& outFile = DEFAULT_IO);
127
Yumin Xiac5ed63f2017-01-26 13:44:38 -0800128 /** @brief Add rrset to the NDNS local database from a file
Jiewen Tan870b29b2014-11-17 19:09:49 -0800129 *
Yumin Xiac5ed63f2017-01-26 13:44:38 -0800130 * The function Loads data from file and then adds it to the rrset without modification
131 * Loaded data is assummed to be valid
132 * Data will be resigned by zone's DSK, if needResign is true.
Jiewen Tan870b29b2014-11-17 19:09:49 -0800133 *
134 * @param zoneName the name of the zone to hold the rrset
Alexander Afanasyevdf2e9392016-03-10 11:50:53 -0800135 * @param inFile the path to the supplied data
Jiewen Tan870b29b2014-11-17 19:09:49 -0800136 * @param ttl the ttl of the rrset
Alexander Afanasyevdf2e9392016-03-10 11:50:53 -0800137 * @param dskCertName the DSK to signed the special case, default is the zone's DSK
Jiewen Tan74d745c2015-03-20 01:40:41 -0700138 * @param encoding the encoding of the input file
Yumin Xiac5ed63f2017-01-26 13:44:38 -0800139 * @param needResign whether data should be resigned by DSK
Alexander Afanasyevdf2e9392016-03-10 11:50:53 -0800140 */
Jiewen Tan870b29b2014-11-17 19:09:49 -0800141 void
Yumin Xiac5ed63f2017-01-26 13:44:38 -0800142 addRrsetFromFile(const Name& zoneName,
143 const std::string& inFile = DEFAULT_IO,
144 const time::seconds& ttl = DEFAULT_RR_TTL,
145 const Name& dskCertName = DEFAULT_CERT,
146 const ndn::io::IoEncoding encoding = ndn::io::BASE64,
147 bool needResign = false);
Jiewen Tan870b29b2014-11-17 19:09:49 -0800148
Yumin Xiaacd21332016-11-28 22:54:48 -0800149 /** @brief Add rrset to the NDNS local database
150 *
Yumin Xia5dd9f2b2016-10-26 20:48:05 -0700151 * @param rrset rrset
152 */
153 void
154 addRrset(Rrset& rrset);
155
Yumin Xiaacd21332016-11-28 22:54:48 -0800156 /** @brief Add rrset with multi-level label to the NDNS local database
157 *
158 * The appropriate AUTH records will be created automatically if they do not yet exist. The
159 * existing records are kept intact.
160 *
161 * @throw Error If one of the levels has been delegated to another zone. For example, if
162 * there is an NS record with label `/foo`, then inserting @p rrset having a
163 * multi-level label that use `/foo` as prefix will cause an error.
164 *
165 * @throw Error If @p rrset will override an AUTH record. For example, if there is already
166 * an AUTH record with label `/foo/bar`, then inserting NS-type @p rrset that
167 * has the the same label will cause an error.
168 *
169 * For example, inserting a rrset with `/foo/bar/test` label and TXT type into zone `/zone/NDNS`
170 * will create:
171 * - `/zone/NDNS/foo/NS` (.ContentType AUTH)
172 * - `/zone/NDNS/foo/bar/NS` (.ContentType AUTH)
173 * - `/zone/NDNS/foo/bar/test/TXT` (.ContentType NDNS-Resp)
174 *
175 * @param rrset rrset
176 * @param zoneRrFactory that is used for generate AUTH packet
177 * @param authTtl
178 */
179 void
180 addMultiLevelLabelRrset(Rrset& rrset,
181 RrsetFactory& zoneRrFactory,
182 const time::seconds& authTtl);
183
Jiewen Tan870b29b2014-11-17 19:09:49 -0800184 /** @brief remove rrset from the NDNS local database
185 *
Alexander Afanasyevdf2e9392016-03-10 11:50:53 -0800186 * @param zoneName the name of the zone holding the rrset
Jiewen Tan870b29b2014-11-17 19:09:49 -0800187 * @param label rrset's label
188 * @param type rrset's type
Alexander Afanasyevdf2e9392016-03-10 11:50:53 -0800189 */
Jiewen Tan870b29b2014-11-17 19:09:49 -0800190 void
191 removeRrSet(const Name& zoneName, const Name& label, const name::Component& type);
192
193 /** @brief output the raw data of the selected rrset
194 *
Alexander Afanasyevdf2e9392016-03-10 11:50:53 -0800195 * @param zoneName the name of the zone holding the rrset
Jiewen Tan870b29b2014-11-17 19:09:49 -0800196 * @param label rrset's label
197 * @param type rrset's type
198 * @param os the ostream to print information to
Alexander Afanasyevd6b3bda2014-11-25 17:33:58 -0800199 */
Jiewen Tan870b29b2014-11-17 19:09:49 -0800200 void
201 getRrSet(const Name& zoneName,
202 const Name& label,
203 const name::Component& type,
204 std::ostream& os);
205
Alexander Afanasyev60514ec2020-06-03 14:18:53 -0400206 security::Certificate
Yumin Xia2c509c22017-02-09 14:37:36 -0800207 getZoneDkey(Zone& zone);
208
Jiewen Tan870b29b2014-11-17 19:09:49 -0800209 /** @brief generates an output like DNS zone file. Reference:
210 * http://en.wikipedia.org/wiki/Zone_file
211 *
212 * @param zoneName the name of the zone to investigate
213 * @param os the ostream to print information to
214 * @param printRaw set to print content of ndns-raw rrset
Alexander Afanasyevd6b3bda2014-11-25 17:33:58 -0800215 * @throw Error if zoneName does not exist in the database
216 */
Jiewen Tan870b29b2014-11-17 19:09:49 -0800217 void
218 listZone(const Name& zoneName, std::ostream& os, const bool printRaw = false);
219
220 /** @brief lists all existing zones within this name server.
221 *
222 * @param os the ostream to print information to
Alexander Afanasyevdf2e9392016-03-10 11:50:53 -0800223 */
Jiewen Tan870b29b2014-11-17 19:09:49 -0800224 void
225 listAllZones(std::ostream& os);
226
227private:
Yumin Xia2c509c22017-02-09 14:37:36 -0800228 /** @brief add CERT to the NDNS local database
Alexander Afanasyevdf2e9392016-03-10 11:50:53 -0800229 */
Jiewen Tan870b29b2014-11-17 19:09:49 -0800230 void
Alexander Afanasyev60514ec2020-06-03 14:18:53 -0400231 addIdCert(Zone& zone, const ndn::security::Certificate& cert,
Yumin Xia2c509c22017-02-09 14:37:36 -0800232 const time::seconds& ttl,
Alexander Afanasyev60514ec2020-06-03 14:18:53 -0400233 const ndn::security::Certificate& dskCertName);
Jiewen Tan870b29b2014-11-17 19:09:49 -0800234
235 /** @brief add zone to the NDNS local database
Alexander Afanasyevdf2e9392016-03-10 11:50:53 -0800236 */
Jiewen Tan870b29b2014-11-17 19:09:49 -0800237 void
238 addZone(Zone& zone);
239
240 /** @brief remove zone from the NDNS local database
Alexander Afanasyevdf2e9392016-03-10 11:50:53 -0800241 */
Jiewen Tan870b29b2014-11-17 19:09:49 -0800242 void
243 removeZone(Zone& zone);
244
245 /** @brief determine whether a certificate matches with both the identity and key type
246 */
247 bool
248 matchCertificate(const Name& certName, const Name& identity);
249
Jiewen Tan8cd35ea2015-03-20 00:44:23 -0700250 /** @brief determine whether an older version of the rrset exists
251 */
252 void
253 checkRrsetVersion(const Rrset& rrset);
254
Yumin Xia55a7cc42017-05-14 18:43:34 -0700255 /**
256 @brief generate all Doe records
257 */
258 void generateDoe(Zone& zone);
259
Jiewen Tan870b29b2014-11-17 19:09:49 -0800260private:
Alexander Afanasyevd6b3bda2014-11-25 17:33:58 -0800261 KeyChain& m_keyChain;
Jiewen Tan870b29b2014-11-17 19:09:49 -0800262 DbMgr m_dbMgr;
263};
264
265} // namespace ndns
266} // namespace ndn
Alexander Afanasyevd6b3bda2014-11-25 17:33:58 -0800267
Jiewen Tan870b29b2014-11-17 19:09:49 -0800268#endif // NDNS_MGMT_MANAGEMENT_TOOL_HPP