remove config.go

This commit is contained in:
Miek Gieben 2011-04-18 22:08:12 +02:00
parent bce6b62bc0
commit 19bfc93c5a
7 changed files with 217 additions and 247 deletions

View File

@ -9,7 +9,6 @@ TARG=dns
GOFILES=\
clientconfig.go\
client.go\
config.go\
defaults.go\
dns.go\
dnssec.go\

104
client.go
View File

@ -28,10 +28,11 @@ type RequestWriter interface {
// hijacked connections...?
type reply struct {
client *Client
addr string
req *Msg
conn net.Conn
client *Client
addr string
req *Msg
conn net.Conn
tsigTimersOnly bool
}
type Request struct {
@ -118,14 +119,15 @@ func (mux *QueryMux) QueryDNS(w RequestWriter, r *Msg) {
// TODO add: LocalAddr
type Client struct {
Net string // if "tcp" a TCP query will be initiated, otherwise an UDP one
Addr string // address to call
Attempts int // number of attempts
Retry bool // retry with TCP
ChannelQuery chan *Request // read DNS request from this channel
ChannelReply chan []*Msg // read DNS request from this channel
ReadTimeout int64 // the net.Conn.SetReadTimeout value for new connections
WriteTimeout int64 // the net.Conn.SetWriteTimeout value for new connections
Net string // if "tcp" a TCP query will be initiated, otherwise an UDP one
Addr string // address to call
Attempts int // number of attempts
Retry bool // retry with TCP
ChannelQuery chan *Request // read DNS request from this channel
ChannelReply chan []*Msg // read DNS request from this channel
ReadTimeout int64 // the net.Conn.SetReadTimeout value for new connections
WriteTimeout int64 // the net.Conn.SetWriteTimeout value for new connections
TsigSecret map[string]string // secret(s) for Tsig map[<zonename>]<base64 secret>
}
func NewClient() *Client {
@ -234,15 +236,15 @@ func (w *reply) Receive() (*Msg, os.Error) {
p = make([]byte, MaxMsgSize)
case "udp":
p = make([]byte, DefaultMsgSize)
}
n, err := w.readClient(p)
if err != nil {
return nil, err
}
p = p[:n]
if ok := m.Unpack(p); !ok {
return nil, ErrUnpack
}
}
n, err := w.readClient(p)
if err != nil {
return nil, err
}
p = p[:n]
if ok := m.Unpack(p); !ok {
return nil, ErrUnpack
}
return m, nil
}
@ -253,32 +255,32 @@ func (w *reply) readClient(p []byte) (n int, err os.Error) {
switch w.Client().Net {
case "tcp":
if len(p) < 1 {
return 0, io.ErrShortBuffer
}
n, err = w.conn.(*net.TCPConn).Read(p[0:2])
if err != nil || n != 2 {
return n, err
}
l, _ := unpackUint16(p[0:2], 0)
if l == 0 {
return 0, ErrShortRead
}
if int(l) > len(p) {
return int(l), io.ErrShortBuffer
}
n, err = w.conn.(*net.TCPConn).Read(p[:l])
if err != nil {
return n, err
}
i := n
for i < int(l) {
j, err := w.conn.(*net.TCPConn).Read(p[i:int(l)])
if err != nil {
return i, err
}
i += j
}
n = i
return 0, io.ErrShortBuffer
}
n, err = w.conn.(*net.TCPConn).Read(p[0:2])
if err != nil || n != 2 {
return n, err
}
l, _ := unpackUint16(p[0:2], 0)
if l == 0 {
return 0, ErrShortRead
}
if int(l) > len(p) {
return int(l), io.ErrShortBuffer
}
n, err = w.conn.(*net.TCPConn).Read(p[:l])
if err != nil {
return n, err
}
i := n
for i < int(l) {
j, err := w.conn.(*net.TCPConn).Read(p[i:int(l)])
if err != nil {
return i, err
}
i += j
}
n = i
case "udp":
n, _, err = w.conn.(*net.UDPConn).ReadFromUDP(p)
if err != nil {
@ -288,7 +290,15 @@ func (w *reply) readClient(p []byte) (n int, err os.Error) {
return
}
// Send a msg to the address specified in w.
// If the message m contains a TSIG record the transaction
// signature is calculated.
func (w *reply) Send(m *Msg) os.Error {
if m.IsTsig() {
// Do tsig
}
out, ok := m.Pack()
if !ok {
return ErrPack

View File

@ -1,13 +0,0 @@
// Copyright 2009 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Generic configuration that is used for nameserver.
// It is meant to be as generic as possible.
package dns
type Config interface {
// Returns any Tsig information.
Tsig() *Tsig
}

View File

@ -47,7 +47,7 @@ func (dns *Msg) IsNotify() (ok bool) {
ok = dns.MsgHdr.Opcode == OpcodeNotify
ok = ok && dns.Question[0].Qclass == ClassINET
ok = ok && dns.Question[0].Qtype == TypeSOA
return ok
return
}
// Create a dns msg suitable for requesting an ixfr.
@ -78,7 +78,7 @@ func (dns *Msg) IsAxfr() (ok bool) {
ok = dns.MsgHdr.Opcode == OpcodeQuery
ok = ok && dns.Question[0].Qclass == ClassINET
ok = ok && dns.Question[0].Qtype == TypeAXFR
return ok
return
}
// Is the message a valid ixfr request packet?
@ -89,5 +89,22 @@ func (dns *Msg) IsIxfr() (ok bool) {
ok = dns.MsgHdr.Opcode == OpcodeQuery
ok = ok && dns.Question[0].Qclass == ClassINET
ok = ok && dns.Question[0].Qtype == TypeIXFR
return ok
return
}
// Has a message a TSIG record as the last record?
func (dns *Msg) IsTsig() (ok bool) {
if len(dns.Extra) > 0 {
return dns.Extra[0].Header().Rrtype == TypeTSIG
}
return
}
func (dns *Msg) SetTsig(z, algo string, fudge uint16, timesigned uint64) {
t := new(RR_TSIG)
t.Hdr = RR_Header{z, TypeTSIG, ClassANY, 0, 0}
t.Algorithm = algo
t.Fudge = fudge
t.TimeSigned = timesigned
dns.Extra = append(dns.Extra, t)
}

154
server.go
View File

@ -70,19 +70,19 @@ func (f HandlerFunc) ServeDNS(w ResponseWriter, r *Msg) {
// Helper handlers
func Refused(w ResponseWriter, r *Msg) {
m := new(Msg)
m.SetReply(r)
m.MsgHdr.Rcode = RcodeRefused
m.MsgHdr.Authoritative = false
buf, _ := m.Pack()
w.Write(buf)
m := new(Msg)
m.SetReply(r)
m.MsgHdr.Rcode = RcodeRefused
m.MsgHdr.Authoritative = false
buf, _ := m.Pack()
w.Write(buf)
}
// RefusedHandler return a REFUSED answer
func RefusedHandler() Handler { return HandlerFunc(Refused) }
func ListenAndServe(addr string, network string, handler Handler) os.Error {
server := &Server{Addr: addr, Network: network, Handler: handler}
server := &Server{Addr: addr, Net: network, Handler: handler}
return server.ListenAndServe()
}
@ -90,19 +90,19 @@ func zoneMatch(pattern, zone string) (ok bool) {
if len(pattern) == 0 {
return
}
i:=0
for {
ok = pattern[len(pattern)-1-i] == zone[len(zone)-1-i]
i++
i := 0
for {
ok = pattern[len(pattern)-1-i] == zone[len(zone)-1-i]
i++
if !ok {
break
}
if len(pattern)-1-i < 0 || len(zone)-1-i < 0{
break
}
if !ok {
break
}
if len(pattern)-1-i < 0 || len(zone)-1-i < 0 {
break
}
}
}
return
}
@ -125,11 +125,11 @@ func (mux *ServeMux) Handle(pattern string, handler Handler) {
if pattern == "" {
panic("dns: invalid pattern " + pattern)
}
if pattern[len(pattern)-1] != '.' { // no ending .
mux.m[pattern + "."] = handler
} else {
mux.m[pattern]= handler
}
if pattern[len(pattern)-1] != '.' { // no ending .
mux.m[pattern+"."] = handler
} else {
mux.m[pattern] = handler
}
}
func (mux *ServeMux) HandleFunc(pattern string, handler func(ResponseWriter, *Msg)) {
@ -158,7 +158,7 @@ func HandleFunc(pattern string, handler func(ResponseWriter, *Msg)) {
// A Server defines parameters for running an DNS server.
type Server struct {
Addr string // address to listen on, ":dns" if empty
Network string // if "tcp" it will invoke a TCP listener, otherwise an UDP one
Net string // if "tcp" it will invoke a TCP listener, otherwise an UDP one
Handler Handler // handler to invoke, dns.DefaultServeMux if nil
ReadTimeout int64 // the net.Conn.SetReadTimeout value for new connections
WriteTimeout int64 // the net.Conn.SetWriteTimeout value for new connections
@ -169,7 +169,7 @@ type Server struct {
// read requests and then call handler to reply to them.
// Handler is typically nil, in which case the DefaultServeMux is used.
func ServeTCP(l *net.TCPListener, handler Handler) os.Error {
srv := &Server{Handler: handler, Network: "tcp"}
srv := &Server{Handler: handler, Net: "tcp"}
return srv.ServeTCP(l)
}
@ -178,7 +178,7 @@ func ServeTCP(l *net.TCPListener, handler Handler) os.Error {
// read requests and then call handler to reply to them.
// Handler is typically nil, in which case the DefaultServeMux is used.
func ServeUDP(l *net.UDPConn, handler Handler) os.Error {
srv := &Server{Handler: handler, Network: "udp"}
srv := &Server{Handler: handler, Net: "udp"}
return srv.ServeUDP(l)
}
@ -188,7 +188,7 @@ func (srv *Server) ListenAndServe() os.Error {
if addr == "" {
addr = ":domain"
}
switch srv.Network {
switch srv.Net {
case "tcp":
a, e := net.ResolveTCPAddr(addr)
if e != nil {
@ -323,60 +323,60 @@ func (c *conn) close() {
// Serve a new connection.
func (c *conn) serve() {
for {
// Request has been read in ServeUDP or ServeTCP
w := new(response)
w.conn = c
req := new(Msg)
if !req.Unpack(c.request) {
break
}
w.req = req
c.handler.ServeDNS(w, w.req) // this does the writing back to the client
if c.hijacked {
return
}
break // TODO(mg) Why is this a loop anyway
}
if c._TCP != nil {
c.close() // Listen and Serve is closed then
}
for {
// Request has been read in ServeUDP or ServeTCP
w := new(response)
w.conn = c
req := new(Msg)
if !req.Unpack(c.request) {
break
}
w.req = req
c.handler.ServeDNS(w, w.req) // this does the writing back to the client
if c.hijacked {
return
}
break // TODO(mg) Why is this a loop anyway
}
if c._TCP != nil {
c.close() // Listen and Serve is closed then
}
}
func (w *response) Write(data []byte) (n int, err os.Error) {
switch {
case w.conn._UDP != nil:
n, err = w.conn._UDP.WriteTo(data, w.conn.remoteAddr)
if err != nil {
return 0, err
}
case w.conn._TCP != nil:
// TODO(mg) len(data) > 64K
l := make([]byte, 2)
l[0], l[1] = packUint16(uint16(len(data)))
n, err = w.conn._TCP.Write(l)
if err != nil {
return n, err
}
if n != 2 {
return n, io.ErrShortWrite
}
n, err = w.conn._TCP.Write(data)
if err != nil {
return n, err
}
i := n
if i < len(data) {
j, err := w.conn._TCP.Write(data[i:len(data)])
if err != nil {
return i, err
}
i += j
}
n = i
}
return n, nil
switch {
case w.conn._UDP != nil:
n, err = w.conn._UDP.WriteTo(data, w.conn.remoteAddr)
if err != nil {
return 0, err
}
case w.conn._TCP != nil:
// TODO(mg) len(data) > 64K
l := make([]byte, 2)
l[0], l[1] = packUint16(uint16(len(data)))
n, err = w.conn._TCP.Write(l)
if err != nil {
return n, err
}
if n != 2 {
return n, io.ErrShortWrite
}
n, err = w.conn._TCP.Write(data)
if err != nil {
return n, err
}
i := n
if i < len(data) {
j, err := w.conn._TCP.Write(data[i:len(data)])
if err != nil {
return i, err
}
i += j
}
n = i
}
return n, nil
}
// RemoteAddr implements the ResponseWriter.RemoteAddr method

139
tsig.go
View File

@ -21,49 +21,6 @@ import (
// tsig.TimeSigned = uint64(time.Seconds())
// tsig.Secret = "so6ZGir4GPAqINNh9U5c3A==" // Secret encoded in base64.
type TsigWriter struct {
secrets map[string]string
w io.Writer
name string
fudge uint16
algorithm string
timersOnly bool
}
// NewTsigWriter creates a new writer that implements TSIG, secrets
// should contain a mapping from key names to secrets. A message
// should be written with the TSIG record appends. Tsig
func NewTsigWriter(w io.Writer, secrets map[string]string) *TsigWriter {
t := new(TsigWriter)
t.secrets = secrets
return t
}
func (t *TsigWriter) Write(p []byte) (int, os.Error) {
return 0, nil
}
type Tsig struct {
// The name of the key.
Name string
// Fudge to take into account.
Fudge uint16
// When is the TSIG created
TimeSigned uint64
// Which algorithm is used.
Algorithm string
// Tsig secret encoded in base64.
Secret string
// MAC (if known)
MAC string
// Request MAC
RequestMAC string
// Only include the timers in the MAC if set to true.
TimersOnly bool
}
// HMAC hashing codes. These are transmitted as domain names.
const (
HmacMD5 = "hmac-md5.sig-alg.reg.int."
@ -101,50 +58,42 @@ type timerWireFmt struct {
Fudge uint16
}
// Add a Tsig to add message.
func (t *Tsig) Generate(msg []byte) ([]byte, os.Error) {
rawsecret, err := packBase64([]byte(t.Secret))
// Add a Tsig to an message. // Must return the mac
func TsigGenerate(m *Msg, secret string, timersOnly bool) (*Msg, os.Error) {
if !m.IsTsig() {
panic("TSIG not last RR in additional")
}
rawsecret, err := packBase64([]byte(secret))
if err != nil {
return nil, err
}
if t.Fudge == 0 {
t.Fudge = 300
}
if t.TimeSigned == 0 {
t.TimeSigned = uint64(time.Seconds())
}
buf, err := t.Buffer(msg)
rr := m.Extra[len(m.Extra)-1].(*RR_TSIG)
m.Extra = m.Extra[0:len(m.Extra)-1] // kill the TSIG from the msg
buf, err := tsigBuffer(m, rr, timersOnly)
if err != nil {
return nil, err
}
t := new(RR_TSIG)
h := hmac.NewMD5([]byte(rawsecret))
io.WriteString(h, string(buf))
t.MAC = hex.EncodeToString(h.Sum()) // Size is half!
// Create TSIG and add it to the message.
q := new(Msg)
if !q.Unpack(msg) {
return nil, ErrUnpack
}
t.Hdr = RR_Header{Name: rr.Hdr.Name, Rrtype: TypeTSIG, Class: ClassANY, Ttl: 0}
t.Fudge = t.Fudge
t.TimeSigned = t.TimeSigned
t.Algorithm = t.Algorithm
t.OrigId = m.MsgHdr.Id
t.MAC = t.MAC
t.MACSize = uint16(len(t.MAC) / 2)
rr := new(RR_TSIG)
rr.Hdr = RR_Header{Name: t.Name, Rrtype: TypeTSIG, Class: ClassANY, Ttl: 0}
rr.Fudge = t.Fudge
rr.TimeSigned = t.TimeSigned
rr.Algorithm = t.Algorithm
rr.OrigId = q.Id
rr.MAC = t.MAC
rr.MACSize = uint16(len(t.MAC) / 2)
q.Extra = append(q.Extra, rr)
send, ok := q.Pack()
if !ok {
return send, ErrPack
}
return send, nil
m.Extra = append(m.Extra, t)
return m, nil
}
/*
// Verify a TSIG on a message.
// If the signature does not validate err contains the
// error. If the it validates err is nil
@ -164,25 +113,32 @@ func (t *Tsig) Verify(msg []byte) (bool, os.Error) {
return false, err
}
// Time needs to be checked */
// Time needs to be checked
h := hmac.NewMD5([]byte(rawsecret))
io.WriteString(h, string(buf))
return strings.ToUpper(hex.EncodeToString(h.Sum())) == strings.ToUpper(t.MAC), nil
}
*/
// Create a wiredata buffer for the MAC calculation.
func (t *Tsig) Buffer(msg []byte) ([]byte, os.Error) {
func tsigBuffer(msg *Msg, rr *RR_TSIG, timersOnly bool) ([]byte, os.Error) {
var (
macbuf []byte
buf []byte
)
if rr.TimeSigned == 0 {
rr.TimeSigned = uint64(time.Seconds())
}
if rr.Fudge == 0 {
rr.Fudge = 300
}
if t.RequestMAC != "" {
if rr.MAC != "" {
m := new(macWireFmt)
m.MACSize = uint16(len(t.RequestMAC) / 2)
m.MAC = t.RequestMAC
macbuf = make([]byte, len(t.RequestMAC)) // reqmac should be twice as long
m.MACSize = uint16(len(rr.MAC) / 2)
m.MAC = rr.MAC
macbuf = make([]byte, len(rr.MAC)) // reqmac should be twice as long
n, ok := packStruct(m, macbuf, 0)
if !ok {
return nil, ErrSigGen
@ -191,10 +147,10 @@ func (t *Tsig) Buffer(msg []byte) ([]byte, os.Error) {
}
tsigvar := make([]byte, DefaultMsgSize)
if t.TimersOnly {
if timersOnly {
tsig := new(timerWireFmt)
tsig.TimeSigned = t.TimeSigned
tsig.Fudge = t.Fudge
tsig.TimeSigned = rr.TimeSigned
tsig.Fudge = rr.Fudge
n, ok1 := packStruct(tsig, tsigvar, 0)
if !ok1 {
return nil, ErrSigGen
@ -202,12 +158,12 @@ func (t *Tsig) Buffer(msg []byte) ([]byte, os.Error) {
tsigvar = tsigvar[:n]
} else {
tsig := new(tsigWireFmt)
tsig.Name = strings.ToLower(t.Name)
tsig.Name = strings.ToLower(rr.Hdr.Name)
tsig.Class = ClassANY
tsig.Ttl = 0
tsig.Algorithm = strings.ToLower(t.Algorithm)
tsig.TimeSigned = t.TimeSigned
tsig.Fudge = t.Fudge
tsig.Algorithm = strings.ToLower(rr.Algorithm)
tsig.TimeSigned = rr.TimeSigned
tsig.Fudge = rr.Fudge
tsig.Error = 0
tsig.OtherLen = 0
tsig.OtherData = ""
@ -217,15 +173,17 @@ func (t *Tsig) Buffer(msg []byte) ([]byte, os.Error) {
}
tsigvar = tsigvar[:n]
}
if t.RequestMAC != "" {
x := append(macbuf, msg...)
if rr.MAC != "" {
msgbuf, _ := msg.Pack()
x := append(macbuf, msgbuf...)
buf = append(x, tsigvar...)
} else {
buf = append(msg, tsigvar...)
msgbuf, _ := msg.Pack()
buf = append(msgbuf, tsigvar...)
}
return buf, nil
}
/*
// Strip the TSIG from the pkt.
func (t *Tsig) stripTsig(orig []byte) ([]byte, os.Error) {
// Copied from msg.go's Unpack()
@ -292,3 +250,4 @@ func (t *Tsig) stripTsig(orig []byte) ([]byte, os.Error) {
}
return msg[:tsigoff], nil
}
*/

30
xfr.go
View File

@ -8,31 +8,31 @@ import (
// section contains an AXFR type an Axfr is performed. If q's question
// section contains an IXFR type an Ixfr is performed.
func (c *Client) XfrReceive(q *Msg, a string) ([]*Msg, os.Error) {
w := new(reply)
w.client = c
w.addr = a
w.req = q // is this needed??
w := new(reply)
w.client = c
w.addr = a
w.req = q // is this needed TODO(mg)
if err := w.Send(q); err != nil {
return nil, err
}
// conn should be set now
return nil, err
}
// conn should be set now
switch q.Question[0].Qtype {
case TypeAXFR:
return w.axfrReceive()
case TypeIXFR:
// return w.ixfrReceive()
// return w.ixfrReceive()
}
panic("not reached")
return nil, nil
panic("not reached")
return nil, nil
}
func (w *reply) axfrReceive() ([]*Msg, os.Error) {
axfr := make([]*Msg, 0) // use append ALL the time?
first := true
axfr := make([]*Msg, 0) // use append ALL the time?
first := true
for {
in, err := w.Receive()
axfr = append(axfr, in)
axfr = append(axfr, in)
if err != nil {
return axfr, err
}
@ -45,9 +45,7 @@ func (w *reply) axfrReceive() ([]*Msg, os.Error) {
}
if !first {
//if d.Tsig != nil {
// d.Tsig.TimersOnly = true // Subsequent envelopes use this.
//}
w.tsigTimersOnly = true // Subsequent envelopes use this.
if !checkXfrSOA(in, false) {
// Soa record not the last one
continue