dns/xfr.go

211 lines
4.7 KiB
Go

package dns
import (
"os"
)
// Perform an incoming Ixfr or Axfr. If the message q's question
// section contains an AXFR type an Axfr is performed. If q's question
// section contains an IXFR type an Ixfr is performed.
func (c *Client) XfrReceive(q *Msg, a string) ([]*Msg, os.Error) {
w := new(reply)
w.client = c
w.addr = a
w.req = q // is this needed TODO(mg)
if err := w.Send(q); err != nil {
return nil, err
}
// conn should be set now
switch q.Question[0].Qtype {
case TypeAXFR:
return w.axfrReceive()
case TypeIXFR:
// return w.ixfrReceive()
}
panic("not reached")
return nil, nil
}
func (w *reply) axfrReceive() ([]*Msg, os.Error) {
axfr := make([]*Msg, 0) // use append ALL the time?
first := true
for {
in, err := w.Receive()
axfr = append(axfr, in)
if err != nil {
return axfr, err
}
if first {
if !checkXfrSOA(in, true) {
return axfr, ErrXfrSoa
}
first = !first
}
if !first {
w.tsigTimersOnly = true // Subsequent envelopes use this.
if !checkXfrSOA(in, false) {
// Soa record not the last one
continue
} else {
return axfr, nil
}
}
}
panic("not reached")
return nil, nil
}
/*
// Perform an outgoing Ixfr or Axfr. If the message q's question
// section contains an AXFR type an Axfr is performed. If q's question
// section contains an IXFR type an Ixfr is performed.
// The actual records to send are given on the channel m. And errors
// during transport are return on channel e.
func (d *Conn) XfrWrite(q *Msg, m chan *Xfr, e chan os.Error) {
switch q.Question[0].Qtype {
case TypeAXFR:
d.axfrWrite(q, m, e)
case TypeIXFR:
// d.ixfrWrite(q, m)
default:
e <- &Error{Error: "Xfr Qtype not recognized"}
close(m)
}
}
// Just send the zone
func (d *Conn) axfrWrite(q *Msg, m chan *Xfr, e chan os.Error) {
out := new(Msg)
out.Id = q.Id
out.Question = q.Question
out.Answer = make([]RR, 1001) // TODO(mg) look at this number
out.MsgHdr.Response = true
out.MsgHdr.Authoritative = true
first := true
var soa *RR_SOA
i := 0
for r := range m {
out.Answer[i] = r.RR
if soa == nil {
if r.RR.Header().Rrtype != TypeSOA {
e <- ErrXfrSoa
return
} else {
soa = r.RR.(*RR_SOA)
}
}
i++
if i > 1000 {
// Send it
err := d.WriteMsg(out)
if err != nil {
e <- err
return
}
i = 0
// Gaat dit goed?
out.Answer = out.Answer[:0]
if first {
if d.Tsig != nil {
d.Tsig.TimersOnly = true
}
first = !first
}
}
}
// Everything is sent, only the closing soa is left.
out.Answer[i] = soa
out.Answer = out.Answer[:i+1]
err := d.WriteMsg(out)
if err != nil {
e <- err
}
}
func (d *Conn) ixfrReceive(q *Msg, m chan *Xfr) {
defer close(m)
var serial uint32 // The first serial seen is the current server serial
var x *Xfr
first := true
in := new(Msg)
for {
err := d.ReadMsg(in)
if err != nil {
m <- &Xfr{true, nil, err}
return
}
if in.Id != q.Id {
m <- &Xfr{true, nil, ErrId}
return
}
if first {
// A single SOA RR signals "no changes"
if len(in.Answer) == 1 && checkXfrSOA(in, true) {
return
}
// But still check if the returned answer is ok
if !checkXfrSOA(in, true) {
m <- &Xfr{true, nil, ErrXfrSoa}
return
}
// This serial is important
serial = in.Answer[0].(*RR_SOA).Serial
first = !first
}
// Now we need to check each message for SOA records, to see what we need to do
x.Add = true
if !first {
if d.Tsig != nil {
d.Tsig.TimersOnly = true
}
for k, r := range in.Answer {
// If the last record in the IXFR contains the servers' SOA, we should quit
if r.Header().Rrtype == TypeSOA {
switch {
case r.(*RR_SOA).Serial == serial:
if k == len(in.Answer)-1 {
// last rr is SOA with correct serial
//m <- r dont' send it
return
}
x.Add = true
if k != 0 {
// Intermediate SOA
continue
}
case r.(*RR_SOA).Serial != serial:
x.Add = false
continue // Don't need to see this SOA
}
}
x.RR = r
m <- x
}
}
}
panic("not reached")
return
}
*/
// Check if he SOA record exists in the Answer section of
// the packet. If first is true the first RR must be a soa
// if false, the last one should be a SOA
func checkXfrSOA(in *Msg, first bool) bool {
if len(in.Answer) > 0 {
if first {
return in.Answer[0].Header().Rrtype == TypeSOA
} else {
return in.Answer[len(in.Answer)-1].Header().Rrtype == TypeSOA
}
}
return false
}