diff options
-rw-r--r-- | source4/dns_server/dlz_bind9.c | 355 | ||||
-rw-r--r-- | source4/dns_server/dlz_bind9.h | 52 | ||||
-rw-r--r-- | source4/dns_server/dlz_minimal.h | 140 |
3 files changed, 448 insertions, 99 deletions
diff --git a/source4/dns_server/dlz_bind9.c b/source4/dns_server/dlz_bind9.c index 573a0e8fab..51971f676c 100644 --- a/source4/dns_server/dlz_bind9.c +++ b/source4/dns_server/dlz_bind9.c @@ -31,12 +31,13 @@ #include "lib/cmdline/popt_common.h" #include "lib/cmdline/popt_credentials.h" #include "ldb_module.h" -#include "dlz_bind9.h" +#include "dlz_minimal.h" struct dlz_bind9_data { struct ldb_context *samdb; struct tevent_context *ev_ctx; struct loadparm_context *lp; + bool transaction_started; /* helper functions from the dlz_dlopen driver */ void (*log)(int level, const char *fmt, ...); @@ -44,6 +45,14 @@ struct dlz_bind9_data { dns_ttl_t ttl, const char *data); isc_result_t (*putnamedrr)(dns_sdlzlookup_t *handle, const char *name, const char *type, dns_ttl_t ttl, const char *data); + isc_result_t (*writeable_zone)(dns_view_t *view, const char *zone_name); +}; + + +static const char *zone_prefixes[] = { + "CN=MicrosoftDNS,DC=DomainDnsZones", + "CN=MicrosoftDNS,DC=ForestDnsZones", + NULL }; /* @@ -68,6 +77,9 @@ static void b9_add_helper(struct dlz_bind9_data *state, const char *helper_name, if (strcmp(helper_name, "putnamedrr") == 0) { state->putnamedrr = ptr; } + if (strcmp(helper_name, "writeable_zone") == 0) { + state->writeable_zone = ptr; + } } /* @@ -154,6 +166,17 @@ static bool b9_format(struct dlz_bind9_data *state, } /* + parse a record from bind9 + */ +static bool b9_parse(struct dlz_bind9_data *state, + TALLOC_CTX *mem_ctx, + struct dnsp_DnssrvRpcRecord *rec, + const char **type, const char **data) +{ + return false; +} + +/* send a resource recond to bind9 */ static isc_result_t b9_putrr(struct dlz_bind9_data *state, @@ -277,7 +300,7 @@ static isc_result_t parse_options(struct dlz_bind9_data *state, */ _PUBLIC_ isc_result_t dlz_create(const char *dlzname, unsigned int argc, char *argv[], - void *driverarg, void **dbdata, ...) + void **dbdata, ...) { struct dlz_bind9_data *state; const char *helper_name; @@ -377,7 +400,7 @@ failed: /* shutdown the backend */ -_PUBLIC_ void dlz_destroy(void *driverarg, void *dbdata) +_PUBLIC_ void dlz_destroy(void *dbdata) { struct dlz_bind9_data *state = talloc_get_type_abort(dbdata, struct dlz_bind9_data); state->log(ISC_LOG_INFO, "samba dlz_bind9: shutting down"); @@ -388,12 +411,38 @@ _PUBLIC_ void dlz_destroy(void *driverarg, void *dbdata) /* see if we handle a given zone */ -_PUBLIC_ isc_result_t dlz_findzonedb(void *driverarg, void *dbdata, const char *name) +_PUBLIC_ isc_result_t dlz_findzonedb(void *dbdata, const char *name) { struct dlz_bind9_data *state = talloc_get_type_abort(dbdata, struct dlz_bind9_data); - if (strcasecmp(lpcfg_dnsdomain(state->lp), name) == 0) { - return ISC_R_SUCCESS; + int ret; + TALLOC_CTX *tmp_ctx = talloc_new(state); + const char *attrs[] = { NULL }; + int i; + + for (i=0; zone_prefixes[i]; i++) { + struct ldb_dn *dn; + struct ldb_result *res; + + dn = ldb_dn_copy(tmp_ctx, ldb_get_default_basedn(state->samdb)); + if (dn == NULL) { + talloc_free(tmp_ctx); + return ISC_R_NOMEMORY; + } + + if (!ldb_dn_add_child_fmt(dn, "DC=%s,%s", name, zone_prefixes[i])) { + talloc_free(tmp_ctx); + return ISC_R_NOMEMORY; + } + + ret = ldb_search(state->samdb, tmp_ctx, &res, dn, LDB_SCOPE_BASE, attrs, "objectClass=dnsZone"); + if (ret == LDB_SUCCESS) { + talloc_free(tmp_ctx); + return ISC_R_SUCCESS; + } + talloc_free(dn); } + + talloc_free(tmp_ctx); return ISC_R_NOTFOUND; } @@ -403,30 +452,34 @@ _PUBLIC_ isc_result_t dlz_findzonedb(void *driverarg, void *dbdata, const char * */ static isc_result_t dlz_lookup_types(struct dlz_bind9_data *state, const char *zone, const char *name, - void *driverarg, dns_sdlzlookup_t *lookup, + dns_sdlzlookup_t *lookup, const char **types) { - struct ldb_dn *dn; TALLOC_CTX *tmp_ctx = talloc_new(state); const char *attrs[] = { "dnsRecord", NULL }; int ret, i; struct ldb_result *res; struct ldb_message_element *el; + struct ldb_dn *dn; - dn = ldb_dn_copy(tmp_ctx, ldb_get_default_basedn(state->samdb)); - if (dn == NULL) { - talloc_free(tmp_ctx); - return ISC_R_NOMEMORY; - } + for (i=0; zone_prefixes[i]; i++) { + dn = ldb_dn_copy(tmp_ctx, ldb_get_default_basedn(state->samdb)); + if (dn == NULL) { + talloc_free(tmp_ctx); + return ISC_R_NOMEMORY; + } - if (!ldb_dn_add_child_fmt(dn, "DC=%s,DC=%s,CN=MicrosoftDNS,DC=DomainDnsZones", - name, zone)) { - talloc_free(tmp_ctx); - return ISC_R_NOMEMORY; - } + if (!ldb_dn_add_child_fmt(dn, "DC=%s,DC=%s,%s", name, zone, zone_prefixes[i])) { + talloc_free(tmp_ctx); + return ISC_R_NOMEMORY; + } - ret = ldb_search(state->samdb, tmp_ctx, &res, dn, LDB_SCOPE_BASE, - attrs, "objectClass=dnsNode"); + ret = ldb_search(state->samdb, tmp_ctx, &res, dn, LDB_SCOPE_BASE, + attrs, "objectClass=dnsNode"); + if (ret == LDB_SUCCESS) { + break; + } + } if (ret != LDB_SUCCESS) { talloc_free(tmp_ctx); return ISC_R_NOTFOUND; @@ -434,8 +487,6 @@ static isc_result_t dlz_lookup_types(struct dlz_bind9_data *state, el = ldb_msg_find_element(res->msgs[0], "dnsRecord"); if (el == NULL || el->num_values == 0) { - state->log(ISC_LOG_INFO, "failed to find %s", - ldb_dn_get_linearized(dn)); talloc_free(tmp_ctx); return ISC_R_NOTFOUND; } @@ -468,35 +519,27 @@ static isc_result_t dlz_lookup_types(struct dlz_bind9_data *state, /* lookup one record */ -_PUBLIC_ isc_result_t dlz_lookup(const char *zone, const char *name, void *driverarg, +_PUBLIC_ isc_result_t dlz_lookup(const char *zone, const char *name, void *dbdata, dns_sdlzlookup_t *lookup) { struct dlz_bind9_data *state = talloc_get_type_abort(dbdata, struct dlz_bind9_data); - return dlz_lookup_types(state, zone, name, driverarg, lookup, NULL); + return dlz_lookup_types(state, zone, name, lookup, NULL); } /* see if a zone transfer is allowed */ -_PUBLIC_ isc_result_t dlz_allowzonexfr(void *driverarg, void *dbdata, const char *name, - const char *client) +_PUBLIC_ isc_result_t dlz_allowzonexfr(void *dbdata, const char *name, const char *client) { - struct dlz_bind9_data *state = talloc_get_type_abort(dbdata, struct dlz_bind9_data); - - if (strcasecmp(lpcfg_dnsdomain(state->lp), name) == 0) { - /* TODO: check an ACL here? client is the IP of the requester */ - state->log(ISC_LOG_INFO, "samba dlz_bind9: allowing zone transfer for '%s' by '%s'", - name, client); - return ISC_R_SUCCESS; - } - return ISC_R_NOTFOUND; + /* just say yes for all our zones for now */ + return dlz_findzonedb(dbdata, name); } /* perform a zone transfer */ -_PUBLIC_ isc_result_t dlz_allnodes(const char *zone, void *driverarg, void *dbdata, +_PUBLIC_ isc_result_t dlz_allnodes(const char *zone, void *dbdata, dns_sdlzallnodes_t *allnodes) { struct dlz_bind9_data *state = talloc_get_type_abort(dbdata, struct dlz_bind9_data); @@ -506,20 +549,24 @@ _PUBLIC_ isc_result_t dlz_allnodes(const char *zone, void *driverarg, void *dbda struct ldb_result *res; TALLOC_CTX *tmp_ctx = talloc_new(state); + for (i=0; zone_prefixes[i]; i++) { + dn = ldb_dn_copy(tmp_ctx, ldb_get_default_basedn(state->samdb)); + if (dn == NULL) { + talloc_free(tmp_ctx); + return ISC_R_NOMEMORY; + } - dn = ldb_dn_copy(tmp_ctx, ldb_get_default_basedn(state->samdb)); - if (dn == NULL) { - talloc_free(tmp_ctx); - return ISC_R_NOMEMORY; - } + if (!ldb_dn_add_child_fmt(dn, "DC=%s,%s", zone, zone_prefixes[i])) { + talloc_free(tmp_ctx); + return ISC_R_NOMEMORY; + } - if (!ldb_dn_add_child_fmt(dn, "DC=%s,CN=MicrosoftDNS,DC=DomainDnsZones", zone)) { - talloc_free(tmp_ctx); - return ISC_R_NOMEMORY; + ret = ldb_search(state->samdb, tmp_ctx, &res, dn, LDB_SCOPE_SUBTREE, + attrs, "objectClass=dnsNode"); + if (ret == LDB_SUCCESS) { + break; + } } - - ret = ldb_search(state->samdb, tmp_ctx, &res, dn, LDB_SCOPE_SUBTREE, - attrs, "objectClass=dnsNode"); if (ret != LDB_SUCCESS) { talloc_free(tmp_ctx); return ISC_R_NOTFOUND; @@ -589,3 +636,217 @@ _PUBLIC_ isc_result_t dlz_allnodes(const char *zone, void *driverarg, void *dbda return ISC_R_SUCCESS; } + + +/* + start a transaction + */ +_PUBLIC_ isc_result_t dlz_newversion(const char *zone, void *dbdata, void **versionp) +{ + struct dlz_bind9_data *state = talloc_get_type_abort(dbdata, struct dlz_bind9_data); + + state->log(ISC_LOG_INFO, "samba dlz_bind9: starting transaction on zone %s", zone); + + if (state->transaction_started) { + state->log(ISC_LOG_INFO, "samba dlz_bind9: transaction already started for zone %s", zone); + return ISC_R_FAILURE; + } + + state->transaction_started = true; + + *versionp = (void *) &state->transaction_started; + + return ISC_R_SUCCESS; +} + +/* + end a transaction + */ +_PUBLIC_ void dlz_closeversion(const char *zone, isc_boolean_t commit, + void *dbdata, void **versionp) +{ + struct dlz_bind9_data *state = talloc_get_type_abort(dbdata, struct dlz_bind9_data); + + if (!state->transaction_started) { + state->log(ISC_LOG_INFO, "samba dlz_bind9: transaction not started for zone %s", zone); + *versionp = NULL; + return; + } + + state->transaction_started = false; + + *versionp = NULL; + + if (commit) { + state->log(ISC_LOG_INFO, "samba dlz_bind9: committing transaction on zone %s", zone); + } else { + state->log(ISC_LOG_INFO, "samba dlz_bind9: cancelling transaction on zone %s", zone); + } +} + + +/* + see if there is a SOA record for a zone + */ +static bool b9_has_soa(struct dlz_bind9_data *state, struct ldb_dn *dn, const char *zone) +{ + const char *attrs[] = { "dnsRecord", NULL }; + struct ldb_result *res; + struct ldb_message_element *el; + TALLOC_CTX *tmp_ctx = talloc_new(state); + int ret, i; + + if (!ldb_dn_add_child_fmt(dn, "DC=@,DC=%s", zone)) { + talloc_free(tmp_ctx); + return false; + } + + ret = ldb_search(state->samdb, tmp_ctx, &res, dn, LDB_SCOPE_BASE, + attrs, "objectClass=dnsNode"); + if (ret != LDB_SUCCESS) { + talloc_free(tmp_ctx); + return false; + } + + el = ldb_msg_find_element(res->msgs[0], "dnsRecord"); + if (el == NULL) { + talloc_free(tmp_ctx); + return false; + } + for (i=0; i<el->num_values; i++) { + struct dnsp_DnssrvRpcRecord rec; + enum ndr_err_code ndr_err; + + ndr_err = ndr_pull_struct_blob(&el->values[i], tmp_ctx, &rec, + (ndr_pull_flags_fn_t)ndr_pull_dnsp_DnssrvRpcRecord); + if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) { + continue; + } + if (rec.wType == DNS_TYPE_SOA) { + talloc_free(tmp_ctx); + return true; + } + } + + talloc_free(tmp_ctx); + return false; +} + +/* + configure a writeable zone + */ +_PUBLIC_ isc_result_t dlz_configure(dns_view_t *view, void *dbdata) +{ + struct dlz_bind9_data *state = talloc_get_type_abort(dbdata, struct dlz_bind9_data); + TALLOC_CTX *tmp_ctx; + struct ldb_dn *dn; + int i; + + state->log(ISC_LOG_INFO, "samba dlz_bind9: starting configure"); + if (state->writeable_zone == NULL) { + state->log(ISC_LOG_INFO, "samba dlz_bind9: no writeable_zone method available"); + return ISC_R_FAILURE; + } + + tmp_ctx = talloc_new(state); + + for (i=0; zone_prefixes[i]; i++) { + const char *attrs[] = { "name", NULL }; + int j, ret; + struct ldb_result *res; + + dn = ldb_dn_copy(tmp_ctx, ldb_get_default_basedn(state->samdb)); + if (dn == NULL) { + talloc_free(tmp_ctx); + return ISC_R_NOMEMORY; + } + + if (!ldb_dn_add_child_fmt(dn, "%s", zone_prefixes[i])) { + talloc_free(tmp_ctx); + return ISC_R_NOMEMORY; + } + + ret = ldb_search(state->samdb, tmp_ctx, &res, dn, LDB_SCOPE_SUBTREE, + attrs, "objectClass=dnsZone"); + if (ret != LDB_SUCCESS) { + continue; + } + + for (j=0; j<res->count; j++) { + isc_result_t result; + const char *zone = ldb_msg_find_attr_as_string(res->msgs[j], "name", NULL); + if (zone == NULL) { + continue; + } + if (!b9_has_soa(state, dn, zone)) { + continue; + } + result = state->writeable_zone(view, zone); + if (result != ISC_R_SUCCESS) { + state->log(ISC_LOG_ERROR, "samba dlz_bind9: Failed to configure zone '%s'", + zone); + talloc_free(tmp_ctx); + return result; + } + state->log(ISC_LOG_INFO, "samba dlz_bind9: configured writeable zone '%s'", zone); + } + } + + talloc_free(tmp_ctx); + return ISC_R_SUCCESS; +} + +/* + authorize a zone update + */ +_PUBLIC_ isc_boolean_t dlz_ssumatch(const char *signer, const char *name, const char *tcpaddr, + const char *type, const char *key, uint32_t keydatalen, uint8_t *keydata, + void *dbdata) +{ + struct dlz_bind9_data *state = talloc_get_type_abort(dbdata, struct dlz_bind9_data); + + state->log(ISC_LOG_INFO, "samba dlz_bind9: allowing update of signer=%s name=%s tcpaddr=%s type=%s key=%s keydatalen=%u", + signer, name, tcpaddr, type, key, keydatalen); + return true; +} + + +_PUBLIC_ isc_result_t dlz_addrdataset(const char *name, const char *rdatastr, void *dbdata, void *version) +{ + struct dlz_bind9_data *state = talloc_get_type_abort(dbdata, struct dlz_bind9_data); + + if (version != (void *) &state->transaction_started) { + return ISC_R_FAILURE; + } + + state->log(ISC_LOG_INFO, "samba dlz_bind9: adding rdataset %s '%s'", name, rdatastr); + + return ISC_R_SUCCESS; +} + +_PUBLIC_ isc_result_t dlz_subrdataset(const char *name, const char *rdatastr, void *dbdata, void *version) +{ + struct dlz_bind9_data *state = talloc_get_type_abort(dbdata, struct dlz_bind9_data); + + if (version != (void *) &state->transaction_started) { + return ISC_R_FAILURE; + } + + state->log(ISC_LOG_INFO, "samba dlz_bind9: subtracting rdataset %s '%s'", name, rdatastr); + + return ISC_R_SUCCESS; +} + + +_PUBLIC_ isc_result_t dlz_delrdataset(const char *name, void *dbdata, void *version) +{ + struct dlz_bind9_data *state = talloc_get_type_abort(dbdata, struct dlz_bind9_data); + + if (version != (void *) &state->transaction_started) { + return ISC_R_FAILURE; + } + + state->log(ISC_LOG_INFO, "samba dlz_bind9: deleting rdataset %s", name); + + return ISC_R_SUCCESS; +} diff --git a/source4/dns_server/dlz_bind9.h b/source4/dns_server/dlz_bind9.h deleted file mode 100644 index 34f9605b12..0000000000 --- a/source4/dns_server/dlz_bind9.h +++ /dev/null @@ -1,52 +0,0 @@ -/* - Unix SMB/CIFS implementation. - - bind9 dlz driver for Samba - - Copyright (C) 2010 Andrew Tridgell - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 3 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program. If not, see <http://www.gnu.org/licenses/>. -*/ - -/* - provide the minimal set of prototypes and defines for bind9 interop - The aim is to not require the bind9 source when building the - dlz_bind9 module - */ -typedef unsigned int isc_result_t; -typedef uint32_t dns_ttl_t; - -#define DLZ_DLOPEN_VERSION 1 - -/* return this in flags to dlz_version() if thread safe */ -#define DNS_SDLZFLAG_THREADSAFE 0x00000001U - -/* result codes */ -#define ISC_R_SUCCESS 0 -#define ISC_R_NOMEMORY 1 -#define ISC_R_NOTFOUND 23 -#define ISC_R_FAILURE 25 - -/* log levels */ -#define ISC_LOG_INFO (-1) -#define ISC_LOG_NOTICE (-2) -#define ISC_LOG_WARNING (-3) -#define ISC_LOG_ERROR (-4) -#define ISC_LOG_CRITICAL (-5) - -/* a couple of opaque structures */ -struct dns_sdlzlookup; -typedef struct dns_sdlzlookup dns_sdlzlookup_t; -struct dns_sdlzallnodes; -typedef struct dns_sdlzallnodes dns_sdlzallnodes_t; diff --git a/source4/dns_server/dlz_minimal.h b/source4/dns_server/dlz_minimal.h new file mode 100644 index 0000000000..2e60c70580 --- /dev/null +++ b/source4/dns_server/dlz_minimal.h @@ -0,0 +1,140 @@ +/* + * Copyright (C) 2010 Andrew Tridgell + * + * Permission to use, copy, modify, and distribute this software for any + * purpose with or without fee is hereby granted, provided that the + * above copyright notice and this permission notice appear in all + * copies. + * + * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR + * DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL + * THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR + * CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS + * OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE + * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE + * USE OR PERFORMANCE OF THIS SOFTWARE. + */ + +/* + This header provides a minimal set of defines and typedefs needed + for building an external DLZ module for bind9. When creating a new + external DLZ driver, please copy this header into your own source + tree. + */ +typedef unsigned int isc_result_t; +typedef bool isc_boolean_t; +typedef uint32_t dns_ttl_t; + +#define DLZ_DLOPEN_VERSION 1 + +/* return this in flags to dlz_version() if thread safe */ +#define DNS_SDLZFLAG_THREADSAFE 0x00000001U + +/* result codes */ +#define ISC_R_SUCCESS 0 +#define ISC_R_NOMEMORY 1 +#define ISC_R_NOTFOUND 23 +#define ISC_R_FAILURE 25 + +/* log levels */ +#define ISC_LOG_INFO (-1) +#define ISC_LOG_NOTICE (-2) +#define ISC_LOG_WARNING (-3) +#define ISC_LOG_ERROR (-4) +#define ISC_LOG_CRITICAL (-5) + +/* some opaque structures */ +typedef void *dns_sdlzlookup_t; +typedef void *dns_sdlzallnodes_t; +typedef void *dns_view_t; + +/* + * prototypes for the functions you can include in your driver + */ + + +/* + * dlz_version() is required for all DLZ external drivers. It should + * return DLZ_DLOPEN_VERSION + */ +int dlz_version(unsigned int *flags); + +/* + * dlz_create() is required for all DLZ external drivers. + */ +isc_result_t dlz_create(const char *dlzname, unsigned int argc, char *argv[], void **dbdata, ...); + +/* + * dlz_destroy() is optional, and will be called when the driver is + * unloaded if supplied + */ +void dlz_destroy(void *dbdata); + +/* + dlz_findzonedb is required for all DLZ external drivers + */ +isc_result_t dlz_findzonedb(void *dbdata, const char *name); + +/* + dlz_lookup is required for all DLZ external drivers + */ +isc_result_t dlz_lookup(const char *zone, const char *name, + void *dbdata, dns_sdlzlookup_t *lookup); + +/* + dlz_allowzonexfr() is optional, and should be supplied if you want + to support zone transfers + */ +isc_result_t dlz_allowzonexfr(void *dbdata, const char *name, const char *client); + + +/* + dlz_allnodes() is optional, but must be supplied if supply a + dlz_allowzonexfr() function + */ +isc_result_t dlz_allnodes(const char *zone, void *dbdata, dns_sdlzallnodes_t *allnodes); + +/* + dlz_newversion() is optional. It should be supplied if you want to + support dynamic updates. + */ +isc_result_t dlz_newversion(const char *zone, void *dbdata, void **versionp); + +/* + dlz_closeversion() is optional, but must be supplied if you supply + a dlz_newversion() function + */ +void dlz_closeversion(const char *zone, isc_boolean_t commit, void *dbdata, void **versionp); + +/* + dlz_configure() is optional, but must be supplied if you want to + support dynamic updates + */ +isc_result_t dlz_configure(dns_view_t *view, void *dbdata); + +/* + dlz_ssumatch() is optional, but must be supplied if you want to + support dynamic updates + */ +isc_boolean_t dlz_ssumatch(const char *signer, const char *name, const char *tcpaddr, + const char *type, const char *key, uint32_t keydatalen, uint8_t *keydata, + void *dbdata); + +/* + dlz_addrdataset() is optional, but must be supplied if you want to + support dynamic updates + */ +isc_result_t dlz_addrdataset(const char *name, const char *rdatastr, void *dbdata, void *version); + +/* + dlz_subrdataset() is optional, but must be supplied if you want to + support dynamic updates + */ +isc_result_t dlz_subrdataset(const char *name, const char *rdatastr, void *dbdata, void *version); + +/* + dlz_delrdataset() is optional, but must be supplied if you want to + support dynamic updates + */ +isc_result_t dlz_delrdataset(const char *name, void *dbdata, void *version); |