dns/_examples/q/q.go

130 lines
3.2 KiB
Go
Raw Normal View History

package main
2011-02-09 06:22:43 +11:00
import (
"net"
"dns"
"os"
"flag"
"fmt"
2011-02-25 02:13:23 +11:00
"strconv"
"strings"
)
func main() {
var dnssec *bool = flag.Bool("dnssec", false, "Request DNSSEC records")
var port *string = flag.String("port", "53", "Set the query port")
var aa *bool = flag.Bool("aa", false, "Set AA flag in query")
var ad *bool = flag.Bool("ad", false, "Set AD flag in query")
var cd *bool = flag.Bool("cd", false, "Set CD flag in query")
var rd *bool = flag.Bool("rd", true, "Unset RD flag in query")
2010-12-31 04:56:12 +11:00
var tcp *bool = flag.Bool("tcp", false, "TCP mode")
2011-02-25 02:13:23 +11:00
var nsid *bool = flag.Bool("nsid", false, "Ask for the NSID")
flag.Usage = func() {
fmt.Fprintf(os.Stderr, "Usage: %s [@server] [qtype] [qclass] [name ...]\n", os.Args[0])
flag.PrintDefaults()
}
2010-12-31 03:15:59 +11:00
nameserver := "@127.0.0.1" // Default nameserver
qtype := uint16(dns.TypeA) // Default qtype
qclass := uint16(dns.ClassINET) // Default qclass
var qname []string
flag.Parse()
2011-02-24 01:25:11 +11:00
Flags:
for i := 0; i < flag.NArg(); i++ {
// If it starts with @ it is a nameserver
if flag.Arg(i)[0] == '@' {
nameserver = flag.Arg(i)
2011-02-24 01:25:11 +11:00
continue Flags
}
2011-02-25 02:13:23 +11:00
// First class, then type, to make ANY queries possible
2011-01-19 01:44:30 +11:00
// And if it looks like type, it is a type
for k, v := range dns.Rr_str {
if v == strings.ToUpper(flag.Arg(i)) {
2011-01-19 01:44:30 +11:00
qtype = k
2011-02-24 01:25:11 +11:00
continue Flags
}
}
2011-01-19 01:44:30 +11:00
// If it looks like a class, it is a class
for k, v := range dns.Class_str {
if v == strings.ToUpper(flag.Arg(i)) {
2011-01-19 01:44:30 +11:00
qclass = k
2011-02-24 01:25:11 +11:00
continue Flags
}
}
2011-02-25 02:13:23 +11:00
// If it starts with TYPExxx it is unknown rr
if strings.HasPrefix(flag.Arg(i), "TYPE") {
i, e := strconv.Atoi(string([]byte(flag.Arg(i))[4:]))
if e == nil {
qtype = uint16(i)
continue Flags
}
}
2011-02-22 02:00:30 +11:00
// Anything else is a qname
qname = append(qname, flag.Arg(i))
}
2011-02-09 06:22:43 +11:00
r := new(dns.Resolver)
2011-02-25 02:13:23 +11:00
r.FromFile("/etc/resolv.conf")
r.Timeout = 2
r.Port = *port
2010-12-31 04:56:12 +11:00
r.Tcp = *tcp
r.Attempts = 1
// @server may be a name, resolv that
var err os.Error
nameserver = string([]byte(nameserver)[1:]) // chop off @
2010-12-31 04:42:40 +11:00
_, addr, err := net.LookupHost(nameserver)
if err == nil {
r.Servers = addr
} else {
r.Servers = []string{nameserver}
}
m := new(dns.Msg)
m.MsgHdr.Authoritative = *aa
m.MsgHdr.AuthenticatedData = *ad
m.MsgHdr.CheckingDisabled = *cd
m.MsgHdr.RecursionDesired = *rd
m.Question = make([]dns.Question, 1)
2011-01-17 20:51:33 +11:00
if *dnssec || *nsid {
opt := new(dns.RR_OPT)
opt.Hdr = dns.RR_Header{Name: "", Rrtype: dns.TypeOPT}
opt.SetVersion(0)
opt.SetDo()
2011-01-27 19:40:18 +11:00
opt.SetUDPSize(dns.DefaultMsgSize)
2011-02-25 02:13:23 +11:00
if *nsid {
opt.SetNsid("")
}
2010-12-31 03:15:59 +11:00
m.Extra = make([]dns.RR, 1)
m.Extra[0] = opt
2010-12-31 03:15:59 +11:00
}
2011-01-17 20:51:33 +11:00
for _, v := range qname {
m.Question[0] = dns.Question{v, qtype, qclass}
2011-02-25 02:13:23 +11:00
m.SetId()
in, err := r.Query(m)
2011-02-09 06:22:43 +11:00
if in != nil {
2011-02-25 02:13:23 +11:00
if m.Id != in.Id {
fmt.Printf("Id mismatch\n")
}
2011-02-09 06:22:43 +11:00
fmt.Printf("%v\n", in)
2011-01-03 22:18:17 +11:00
} else {
2011-02-25 02:13:23 +11:00
fmt.Printf("%v\n", err.String())
}
}
}
2011-02-09 06:15:54 +11:00
/*
41 func (m *Meta) String() string {
42 s := ";; Query time: " + strconv.Itoa(int(m.QueryEnd-m.QueryStart)) + " nsec"
43 s += "\n;; MSG SIZE rcvd: " + strconv.Itoa(m.RLen) + ", sent: " + strconv.Itoa(m.QLen)
44 rf := float32(m.RLen)
45 qf := float32(m.QLen)
46 if qf != 0 {
47 s += " (" + strconv.Ftoa32(rf/qf, 'f', 2) + ":1)"
48 }
49 // WHEN??
50 return s
51 }
*/