inc/dns.inc.php
author peter
Mon, 10 Mar 2008 19:15:59 +0000
changeset 79 0c0aa144356a
parent 71 e1b918eaf69a
child 82 c255196bc447
permissions -rwxr-xr-x
[feladat @ 156] Made a lot of small changes to allow PHP to run with error_reporting E_ALL without giving notices. Most functions have been checked but some situations might give a notice.
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
71
e1b918eaf69a [feladat @ 118]
peter
parents: 65
diff changeset
     1
<?php
1
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
     2
47
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
     3
/*  PowerAdmin, a friendly web-based admin tool for PowerDNS.
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
     4
 *  See <https://rejo.zenger.nl/poweradmin> for more details.
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
     5
 *
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
     6
 *  Copyright 2007, 2008  Rejo Zenger <rejo@zenger.nl>
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
     7
 *
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
     8
 *  This program is free software: you can redistribute it and/or modify
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
     9
 *  it under the terms of the GNU General Public License as published by
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
    10
 *  the Free Software Foundation, either version 3 of the License, or
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
    11
 *  (at your option) any later version.
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
    12
 *
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
    13
 *  This program is distributed in the hope that it will be useful,
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
    14
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
    15
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
    16
 *  GNU General Public License for more details.
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
    17
 *
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
    18
 *  You should have received a copy of the GNU General Public License
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
    19
 *  along with this program.  If not, see <http://www.gnu.org/licenses/>.
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
    20
 */
ae140472d97c [feladat @ 94]
rejo
parents: 16
diff changeset
    21
1
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    22
/*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    23
 * Validates an IPv4 IP.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    24
 * returns true if valid.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    25
 */
16
79b09e1e2985 [feladat @ 63]
rejo
parents: 12
diff changeset
    26
function validate_input($zoneid, $type, &$content, &$name, &$prio, &$ttl)
1
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    27
{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    28
	global $db;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    29
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    30
	// Has to validate content first then it can do the rest
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    31
	// Since if content is invalid already it can aswell be just removed
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    32
	// Check first if content is IPv4, IPv6 or Hostname
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    33
	// We accomplish this by just running all tests over it
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    34
	// We start with IPv6 since its not able to have these ip's in domains.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    35
	//
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    36
	// <TODO>
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    37
	// The nocheck has to move to the configuration file
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    38
	// </TODO>
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    39
	//
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    40
	$domain = get_domain_name_from_id($zoneid);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    41
	$nocheck = array('SOA', 'HINFO', 'NAPTR', 'URL', 'MBOXFW', 'TXT');
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    42
	$hostname = false;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    43
	$ip4 = false;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    44
	$ip6 = false;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    45
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    46
	if(!in_array(strtoupper($type), $nocheck))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    47
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    48
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    49
		if(!is_valid_ip6($content))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    50
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    51
			if(!is_valid_ip($content))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    52
			{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    53
				if(!is_valid_hostname($content))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    54
				{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    55
					error(ERR_DNS_CONTENT);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    56
				}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    57
				else
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    58
				{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    59
					$hostname = true;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    60
				}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    61
			}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    62
			else
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    63
			{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    64
				$ip4 = true;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    65
			}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    66
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    67
		else
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    68
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    69
			$ip6 = true;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    70
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    71
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    72
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    73
	// Prepare total hostname.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    74
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    75
	if($name == '*')
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    76
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    77
		$wildcard = true;
79
0c0aa144356a [feladat @ 156]
peter
parents: 71
diff changeset
    78
	} else {
0c0aa144356a [feladat @ 156]
peter
parents: 71
diff changeset
    79
		$wildcard = false;
1
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    80
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    81
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    82
	if ($name=="0") {
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    83
	   $name=$name.".".$domain;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    84
	} else {
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    85
	   $name = ($name) ? $name.".".$domain : $domain;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    86
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    87
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    88
	if (preg_match('!@\.!i', $name))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    89
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    90
		$name = str_replace('@.', '@', $name);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    91
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    92
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    93
	if(!$wildcard)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    94
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    95
		if(!is_valid_hostname($name))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    96
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    97
			error(ERR_DNS_HOSTNAME);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    98
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
    99
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   100
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   101
	// Check record type (if it exists in our allowed list.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   102
	if (!in_array(strtoupper($type), get_record_types()))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   103
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   104
		error(ERR_DNS_RECORDTYPE);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   105
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   106
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   107
	// Start handling the demands for the functions.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   108
	// Validation for IN A records. Can only have an IP. Nothing else.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   109
	if ($type == 'A' && !$ip4)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   110
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   111
		error(ERR_DNS_IPV4);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   112
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   113
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   114
	if ($type == 'AAAA' && !$ip6)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   115
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   116
		error(ERR_DNS_IPV6);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   117
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   118
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   119
	if ($type == 'CNAME' && $hostname)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   120
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   121
		if(!is_valid_cname($name))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   122
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   123
			error(ERR_DNS_CNAME);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   124
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   125
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   126
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   127
	if ($type == 'NS')
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   128
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   129
		$status = is_valid_ns($content, $hostname);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   130
		if($status == -1)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   131
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   132
			error(ERR_DNS_NS_HNAME);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   133
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   134
		elseif($status == -2)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   135
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   136
			error(ERR_DNS_NS_CNAME);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   137
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   138
		// Otherwise its ok
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   139
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   140
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   141
	if ($type == 'SOA')
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   142
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   143
		$status = is_valid_soa($content, $zoneid);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   144
		if($status == -1)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   145
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   146
			error(ERR_DNS_SOA_UNIQUE);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   147
			// Make nicer error
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   148
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   149
		elseif($status == -2)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   150
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   151
			error(ERR_DNS_SOA_NUMERIC);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   152
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   153
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   154
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   155
	// HINFO and TXT require no validation.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   156
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   157
	if ($type == 'URL')
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   158
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   159
		if(!is_valid_url($content))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   160
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   161
			error(ERR_INV_URL);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   162
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   163
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   164
	if ($type == 'MBOXFW')
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   165
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   166
		if(!is_valid_mboxfw($content))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   167
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   168
			error(ERR_INV_EMAIL);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   169
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   170
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   171
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   172
	// NAPTR has to be done.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   173
	// Do we want that?
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   174
	// http://www.ietf.org/rfc/rfc2915.txt
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   175
	// http://www.zvon.org/tmRFC/RFC2915/Output/chapter2.html
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   176
	// http://www.zvon.org/tmRFC/RFC3403/Output/chapter4.html
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   177
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   178
	// See if the prio field is valid and if we have one.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   179
	// If we dont have one and the type is MX record, give it value '10'
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   180
	if($type == 'NAPTR')
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   181
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   182
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   183
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   184
	
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   185
	if($type == 'MX')
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   186
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   187
		if($hostname)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   188
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   189
			$status = is_valid_mx($content, $prio);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   190
			if($status == -1)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   191
			{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   192
				error(ERR_DNS_MX_CNAME);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   193
			}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   194
			elseif($status == -2)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   195
			{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   196
				error(ERR_DNS_MX_PRIO);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   197
			}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   198
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   199
		else
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   200
		{
6
9fcac40c1b0e [feladat @ 7]
rejo
parents: 1
diff changeset
   201
			error( _('If you specify an MX record it must be a hostname.') );
1
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   202
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   203
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   204
	else
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   205
	{
55
a885f557678f [feladat @ 102]
peter
parents: 47
diff changeset
   206
		$prio=0;
1
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   207
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   208
	// Validate the TTL, it has to be numeric.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   209
	$ttl = (!isset($ttl) || !is_numeric($ttl)) ? $DEFAULT_TTL : $ttl;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   210
}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   211
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   212
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   213
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   214
		/****************************************
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   215
		 *					*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   216
		 * RECORD VALIDATING PART.		*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   217
		 * CHANGES HERE SHOULD BE CONSIDERED	*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   218
		 * THEY REQUIRE KNOWLEDGE ABOUT THE 	*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   219
		 * DNS SPECIFICATIONS			*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   220
		 *					*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   221
		 ***************************************/
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   222
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   223
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   224
/*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   225
 * Validatis a CNAME record by the name it will have and its destination
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   226
 *
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   227
 */
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   228
function is_valid_cname($dest)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   229
{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   230
	/*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   231
	 * This is really EVIL.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   232
	 * If the new record (a CNAME) record is being pointed to by a MX record or NS record we have to bork.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   233
	 * this is the idea.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   234
	 *
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   235
	 * MX record: blaat.nl MX mail.blaat.nl
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   236
	 * Now we look what mail.blaat.nl is
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   237
	 * We discover the following:
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   238
	 * mail.blaat.nl CNAME bork.blaat.nl
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   239
	 * This is NOT allowed! mail.onthanet.nl can not be a CNAME!
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   240
	 * The same goes for NS. mail.blaat.nl must have a normal IN A record.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   241
	 * It MAY point to a CNAME record but its not wished. Lets not support it.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   242
	 */
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   243
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   244
	global $db;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   245
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   246
	// Check if there are other records with this information of the following types.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   247
	// P.S. we might add CNAME to block CNAME recursion and chains.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   248
	$blockedtypes = " AND (type='MX' OR type='NS')";
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   249
65
ce1c4d5e1576 [feladat @ 112]
peter
parents: 62
diff changeset
   250
	$cnamec = "SELECT type, content FROM records WHERE content=".$db->quote($dest) . $blockedtypes;
1
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   251
	$result = $db->query($cnamec);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   252
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   253
	if($result->numRows() > 0)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   254
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   255
		return false;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   256
		// Lets inform the user he is doing something EVIL.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   257
		// Ok we found a record that has our content field in their content field.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   258
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   259
	return true;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   260
}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   261
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   262
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   263
/*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   264
 * Checks if something is a valid domain.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   265
 * Checks for domainname with the allowed characters <a,b,...z,A,B,...Z> and - and _.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   266
 * This part must be followed by a 2 to 4 character TLD.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   267
 */
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   268
function is_valid_domain($domain)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   269
{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   270
	if ((eregi("^[0-9a-z]([-.]?[0-9a-z])*\\.[a-z]{2,4}$", $domain)) && (strlen($domain) <= 128))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   271
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   272
		return true;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   273
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   274
	return false;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   275
}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   276
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   277
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   278
/*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   279
 * Validates if given hostname is allowed.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   280
 * returns true if allowed.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   281
 */
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   282
function is_valid_hostname($host)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   283
{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   284
	if(count(explode(".", $host)) == 1)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   285
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   286
		return false;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   287
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   288
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   289
	// Its not perfect (in_addr.int is allowed) but works for now.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   290
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   291
	if(preg_match('!(ip6|in-addr).(arpa|int)$!i', $host))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   292
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   293
		if(preg_match('!^(([A-Z\d]|[A-Z\d][A-Z\d-]*[A-Z\d])\.)*[A-Z\d]+$!i', $host))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   294
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   295
			return true;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   296
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   297
		return false;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   298
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   299
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   300
	// Validate further.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   301
	return (preg_match('!^(([A-Z\d]|[A-Z\d][A-Z\d-]*[A-Z\d])\.)*[A-Z\d]+$!i', $host)) ? true : false;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   302
}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   303
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   304
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   305
/*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   306
 * Validates an IPv4 IP.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   307
 * returns true if valid.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   308
 */
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   309
function is_valid_ip($ip)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   310
{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   311
	// Stop reading at this point. Scroll down to the next function...
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   312
	// Ok... you didn't stop reading... now you have to rewrite the whole function! enjoy ;-)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   313
	// Trance unborked it. Twice even!
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   314
	return ($ip == long2ip(ip2long($ip))) ? true : false;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   315
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   316
}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   317
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   318
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   319
/*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   320
 * Validates an IPv6 IP.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   321
 * returns true if valid.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   322
 */
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   323
function is_valid_ip6($ip)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   324
{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   325
	// Validates if the given IP is truly an IPv6 address.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   326
	// Precondition: have a string
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   327
	// Postcondition: false: Error in IP
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   328
	//                true: IP is correct
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   329
	// Requires: String
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   330
	// Date: 10-sep-2002
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   331
	if(preg_match('!^[A-F0-9:]{1,39}$!i', $ip) == true)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   332
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   333
		// Not 3 ":" or more.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   334
		$p = explode(':::', $ip);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   335
		if(sizeof($p) > 1)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   336
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   337
			return false;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   338
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   339
		// Find if there is only one occurence of "::".
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   340
		$p = explode('::', $ip);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   341
		if(sizeof($p) > 2)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   342
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   343
			return false;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   344
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   345
		// Not more than 8 octects
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   346
		$p = explode(':', $ip);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   347
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   348
		if(sizeof($p) > 8)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   349
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   350
			return false;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   351
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   352
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   353
		// Check octet length
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   354
		foreach($p as $checkPart)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   355
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   356
			if(strlen($checkPart) > 4)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   357
			{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   358
				return false;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   359
			}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   360
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   361
		return true;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   362
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   363
	return false;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   364
}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   365
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   366
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   367
/*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   368
 * FANCY RECORD.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   369
 * Validates if the fancy record mboxfw is an actual email address.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   370
 */
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   371
function is_valid_mboxfw($email)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   372
{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   373
	return is_valid_email($email);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   374
}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   375
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   376
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   377
/*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   378
 * Validates MX records.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   379
 * an MX record cant point to a CNAME record. This has to be checked.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   380
 * this function also sets a proper priority.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   381
 */
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   382
function is_valid_mx($content, &$prio)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   383
{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   384
	global $db;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   385
	// See if the destination to which this MX is pointing is NOT a CNAME record.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   386
	// Check inside our dns server.
65
ce1c4d5e1576 [feladat @ 112]
peter
parents: 62
diff changeset
   387
	if($db->queryOne("SELECT count(id) FROM records WHERE name=".$db->quote($content)." AND type='CNAME'") > 0)
1
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   388
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   389
		return -1;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   390
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   391
	else
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   392
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   393
		// Fix the proper priority for the record.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   394
		// Bugfix, thanks Oscar :)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   395
		if(!isset($prio))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   396
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   397
			$prio = 10;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   398
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   399
		if(!is_numeric($prio))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   400
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   401
			if($prio == '')
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   402
			{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   403
				$prio = 10;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   404
			}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   405
			else
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   406
			{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   407
				return -2;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   408
			}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   409
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   410
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   411
	return 1;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   412
}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   413
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   414
/*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   415
 * Validates NS records.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   416
 * an NS record cant point to a CNAME record. This has to be checked.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   417
 * $hostname directive means if its a hostname or not (this to avoid that NS records get ip fields)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   418
 * NS must have a hostname, it is not allowed to have an IP.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   419
 */
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   420
function is_valid_ns($content, $hostname)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   421
{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   422
	global $db;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   423
	// Check if the field is a hostname, it MUST be a hostname.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   424
	if(!$hostname)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   425
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   426
		return -1;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   427
		// "an IN NS field must be a hostname."
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   428
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   429
65
ce1c4d5e1576 [feladat @ 112]
peter
parents: 62
diff changeset
   430
	if($db->queryOne("SELECT count(id) FROM records WHERE name=".$db->quote($content)." AND type='CNAME'") > 0)
1
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   431
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   432
		return -2;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   433
		// "You can not point a NS record to a CNAME record. Remove/rename the CNAME record first or take another name."
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   434
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   435
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   436
	return 1;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   437
}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   438
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   439
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   440
/*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   441
 * Function to check the validity of SOA records.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   442
 * return values: true if succesful
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   443
 */
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   444
function is_valid_soa(&$content, $zoneid)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   445
{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   446
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   447
	/*
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   448
	 * SOA (start of authority)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   449
	 * there is only _ONE_ SOA record allowed in every zone.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   450
	 * Validate SOA record
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   451
	 * The Start of Authority record is one of the most complex available. It specifies a lot
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   452
	 * about a domain: the name of the master nameserver ('the primary'), the hostmaster and
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   453
	 * a set of numbers indicating how the data in this domain expires and how often it needs
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   454
	 * to be checked. Further more, it contains a serial number which should rise on each change
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   455
	 * of the domain.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   456
	 					    2002120902 28800 7200 604800 10800
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   457
	 * The stored format is: primary hostmaster serial refresh retry expire default_ttl
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   458
	 * From the powerdns documentation.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   459
	 */
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   460
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   461
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   462
	// Check if there already is an occurence of a SOA, if so see if its not the one we are currently changing
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   463
	$return = get_records_by_type_from_domid("SOA", $zoneid);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   464
	if($return->numRows() > 1)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   465
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   466
		return -1;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   467
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   468
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   469
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   470
	$soacontent = explode(" ", $content);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   471
	// Field is at least one otherwise it wouldnt even get here.
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   472
	if(is_valid_hostname($soacontent[0]))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   473
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   474
		$totalsoa = $soacontent[0];
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   475
		// It doesnt matter what field 2 contains, but lets check if its there
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   476
		// We assume the 2nd field wont have numbers, otherwise its a TTL field
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   477
		if(count($soacontent) > 1)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   478
		{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   479
			if(is_numeric($soacontent[1]))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   480
			{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   481
				// its a TTL field, or at least not hostmaster or alike
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   482
				// Set final string to the default hostmaster addy
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   483
				global $HOSTMASTER;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   484
				$totalsoa .= " ". $HOSTMASTER;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   485
			}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   486
			else
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   487
			{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   488
				$totalsoa .= " ".$soacontent[1];
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   489
			}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   490
			// For loop to iterate over the numbers
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   491
			$imax = count($soacontent);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   492
			for($i = 2; ($i < $imax) && ($i < 7); $i++)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   493
			{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   494
				if(!is_numeric($soacontent[$i]))
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   495
				{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   496
					return -2;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   497
				}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   498
				else
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   499
				{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   500
					$totalsoa .= " ".$soacontent[$i];
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   501
				}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   502
			}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   503
			if($i > 7)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   504
			{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   505
				error(ERR_DNS_SOA_NUMERIC_FIELDS);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   506
			}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   507
		}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   508
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   509
	else
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   510
	{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   511
		error(ERR_DNS_SOA_HOSTNAME);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   512
	}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   513
	$content = $totalsoa;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   514
	return 1;
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   515
}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   516
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   517
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   518
function is_valid_url($url)
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   519
{
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   520
	return preg_match('!^(http://)(([A-Z\d]|[A-Z\d][A-Z\d-]*[A-Z\d])\.)*[A-Z\d]+([//]([0-9a-z//~#%&\'_\-+=:?.]*))?$!i',  $url);
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   521
}
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   522
62
ce4919f37489 [feladat @ 109]
rejo
parents: 55
diff changeset
   523
function is_valid_search($holygrail)
ce4919f37489 [feladat @ 109]
rejo
parents: 55
diff changeset
   524
{
ce4919f37489 [feladat @ 109]
rejo
parents: 55
diff changeset
   525
	// Only allow for alphanumeric, numeric, dot, dash, underscore and 
ce4919f37489 [feladat @ 109]
rejo
parents: 55
diff changeset
   526
	// percent in search string. The last two are wildcards for SQL.
ce4919f37489 [feladat @ 109]
rejo
parents: 55
diff changeset
   527
	// Needs extension probably for more usual record types.
ce4919f37489 [feladat @ 109]
rejo
parents: 55
diff changeset
   528
ce4919f37489 [feladat @ 109]
rejo
parents: 55
diff changeset
   529
	return preg_match('/^[a-z0-9.\-%_]+$/i', $holygrail);
ce4919f37489 [feladat @ 109]
rejo
parents: 55
diff changeset
   530
}
ce4919f37489 [feladat @ 109]
rejo
parents: 55
diff changeset
   531
ce4919f37489 [feladat @ 109]
rejo
parents: 55
diff changeset
   532
1
58094faf794d [feladat @ 2]
rejo
parents:
diff changeset
   533
?>