summaryrefslogtreecommitdiff
path: root/vendor/github.com/miekg/dns/xfr.go
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/github.com/miekg/dns/xfr.go')
-rw-r--r--vendor/github.com/miekg/dns/xfr.go287
1 files changed, 0 insertions, 287 deletions
diff --git a/vendor/github.com/miekg/dns/xfr.go b/vendor/github.com/miekg/dns/xfr.go
deleted file mode 100644
index 5cfbb516a..000000000
--- a/vendor/github.com/miekg/dns/xfr.go
+++ /dev/null
@@ -1,287 +0,0 @@
-package dns
-
-import (
- "crypto/tls"
- "fmt"
- "time"
-)
-
-// Envelope is used when doing a zone transfer with a remote server.
-type Envelope struct {
- RR []RR // The set of RRs in the answer section of the xfr reply message.
- Error error // If something went wrong, this contains the error.
-}
-
-// A Transfer defines parameters that are used during a zone transfer.
-type Transfer struct {
- *Conn
- DialTimeout time.Duration // net.DialTimeout, defaults to 2 seconds
- ReadTimeout time.Duration // net.Conn.SetReadTimeout value for connections, defaults to 2 seconds
- WriteTimeout time.Duration // net.Conn.SetWriteTimeout value for connections, defaults to 2 seconds
- TsigProvider TsigProvider // An implementation of the TsigProvider interface. If defined it replaces TsigSecret and is used for all TSIG operations.
- TsigSecret map[string]string // Secret(s) for Tsig map[<zonename>]<base64 secret>, zonename must be in canonical form (lowercase, fqdn, see RFC 4034 Section 6.2)
- tsigTimersOnly bool
- TLS *tls.Config // TLS config. If Xfr over TLS will be attempted
-}
-
-func (t *Transfer) tsigProvider() TsigProvider {
- if t.TsigProvider != nil {
- return t.TsigProvider
- }
- if t.TsigSecret != nil {
- return tsigSecretProvider(t.TsigSecret)
- }
- return nil
-}
-
-// TODO: Think we need to away to stop the transfer
-
-// In performs an incoming transfer with the server in a.
-// If you would like to set the source IP, or some other attribute
-// of a Dialer for a Transfer, you can do so by specifying the attributes
-// in the Transfer.Conn:
-//
-// d := net.Dialer{LocalAddr: transfer_source}
-// con, err := d.Dial("tcp", master)
-// dnscon := &dns.Conn{Conn:con}
-// transfer = &dns.Transfer{Conn: dnscon}
-// channel, err := transfer.In(message, master)
-func (t *Transfer) In(q *Msg, a string) (env chan *Envelope, err error) {
- switch q.Question[0].Qtype {
- case TypeAXFR, TypeIXFR:
- default:
- return nil, &Error{"unsupported question type"}
- }
-
- timeout := dnsTimeout
- if t.DialTimeout != 0 {
- timeout = t.DialTimeout
- }
-
- if t.Conn == nil {
- if t.TLS != nil {
- t.Conn, err = DialTimeoutWithTLS("tcp-tls", a, t.TLS, timeout)
- } else {
- t.Conn, err = DialTimeout("tcp", a, timeout)
- }
- if err != nil {
- return nil, err
- }
- }
-
- if err := t.WriteMsg(q); err != nil {
- return nil, err
- }
-
- env = make(chan *Envelope)
- switch q.Question[0].Qtype {
- case TypeAXFR:
- go t.inAxfr(q, env)
- case TypeIXFR:
- go t.inIxfr(q, env)
- }
-
- return env, nil
-}
-
-func (t *Transfer) inAxfr(q *Msg, c chan *Envelope) {
- first := true
- defer func() {
- // First close the connection, then the channel. This allows functions blocked on
- // the channel to assume that the connection is closed and no further operations are
- // pending when they resume.
- t.Close()
- close(c)
- }()
- timeout := dnsTimeout
- if t.ReadTimeout != 0 {
- timeout = t.ReadTimeout
- }
- for {
- t.Conn.SetReadDeadline(time.Now().Add(timeout))
- in, err := t.ReadMsg()
- if err != nil {
- c <- &Envelope{nil, err}
- return
- }
- if q.Id != in.Id {
- c <- &Envelope{in.Answer, ErrId}
- return
- }
- if first {
- if in.Rcode != RcodeSuccess {
- c <- &Envelope{in.Answer, &Error{err: fmt.Sprintf(errXFR, in.Rcode)}}
- return
- }
- if !isSOAFirst(in) {
- c <- &Envelope{in.Answer, ErrSoa}
- return
- }
- first = !first
- // only one answer that is SOA, receive more
- if len(in.Answer) == 1 {
- t.tsigTimersOnly = true
- c <- &Envelope{in.Answer, nil}
- continue
- }
- }
-
- if !first {
- t.tsigTimersOnly = true // Subsequent envelopes use this.
- if isSOALast(in) {
- c <- &Envelope{in.Answer, nil}
- return
- }
- c <- &Envelope{in.Answer, nil}
- }
- }
-}
-
-func (t *Transfer) inIxfr(q *Msg, c chan *Envelope) {
- var serial uint32 // The first serial seen is the current server serial
- axfr := true
- n := 0
- qser := q.Ns[0].(*SOA).Serial
- defer func() {
- // First close the connection, then the channel. This allows functions blocked on
- // the channel to assume that the connection is closed and no further operations are
- // pending when they resume.
- t.Close()
- close(c)
- }()
- timeout := dnsTimeout
- if t.ReadTimeout != 0 {
- timeout = t.ReadTimeout
- }
- for {
- t.SetReadDeadline(time.Now().Add(timeout))
- in, err := t.ReadMsg()
- if err != nil {
- c <- &Envelope{nil, err}
- return
- }
- if q.Id != in.Id {
- c <- &Envelope{in.Answer, ErrId}
- return
- }
- if in.Rcode != RcodeSuccess {
- c <- &Envelope{in.Answer, &Error{err: fmt.Sprintf(errXFR, in.Rcode)}}
- return
- }
- if n == 0 {
- // Check if the returned answer is ok
- if !isSOAFirst(in) {
- c <- &Envelope{in.Answer, ErrSoa}
- return
- }
- // This serial is important
- serial = in.Answer[0].(*SOA).Serial
- // Check if there are no changes in zone
- if qser >= serial {
- c <- &Envelope{in.Answer, nil}
- return
- }
- }
- // Now we need to check each message for SOA records, to see what we need to do
- t.tsigTimersOnly = true
- for _, rr := range in.Answer {
- if v, ok := rr.(*SOA); ok {
- if v.Serial == serial {
- n++
- // quit if it's a full axfr or the servers' SOA is repeated the third time
- if axfr && n == 2 || n == 3 {
- c <- &Envelope{in.Answer, nil}
- return
- }
- } else if axfr {
- // it's an ixfr
- axfr = false
- }
- }
- }
- c <- &Envelope{in.Answer, nil}
- }
-}
-
-// Out performs an outgoing transfer with the client connecting in w.
-// Basic use pattern:
-//
-// ch := make(chan *dns.Envelope)
-// tr := new(dns.Transfer)
-// var wg sync.WaitGroup
-// wg.Add(1)
-// go func() {
-// tr.Out(w, r, ch)
-// wg.Done()
-// }()
-// ch <- &dns.Envelope{RR: []dns.RR{soa, rr1, rr2, rr3, soa}}
-// close(ch)
-// wg.Wait() // wait until everything is written out
-// w.Close() // close connection
-//
-// The server is responsible for sending the correct sequence of RRs through the channel ch.
-func (t *Transfer) Out(w ResponseWriter, q *Msg, ch chan *Envelope) error {
- for x := range ch {
- r := new(Msg)
- // Compress?
- r.SetReply(q)
- r.Authoritative = true
- // assume it fits TODO(miek): fix
- r.Answer = append(r.Answer, x.RR...)
- if tsig := q.IsTsig(); tsig != nil && w.TsigStatus() == nil {
- r.SetTsig(tsig.Hdr.Name, tsig.Algorithm, tsig.Fudge, time.Now().Unix())
- }
- if err := w.WriteMsg(r); err != nil {
- return err
- }
- w.TsigTimersOnly(true)
- }
- return nil
-}
-
-// ReadMsg reads a message from the transfer connection t.
-func (t *Transfer) ReadMsg() (*Msg, error) {
- m := new(Msg)
- p := make([]byte, MaxMsgSize)
- n, err := t.Read(p)
- if err != nil && n == 0 {
- return nil, err
- }
- p = p[:n]
- if err := m.Unpack(p); err != nil {
- return nil, err
- }
- if ts, tp := m.IsTsig(), t.tsigProvider(); ts != nil && tp != nil {
- // Need to work on the original message p, as that was used to calculate the tsig.
- err = TsigVerifyWithProvider(p, tp, t.tsigRequestMAC, t.tsigTimersOnly)
- t.tsigRequestMAC = ts.MAC
- }
- return m, err
-}
-
-// WriteMsg writes a message through the transfer connection t.
-func (t *Transfer) WriteMsg(m *Msg) (err error) {
- var out []byte
- if ts, tp := m.IsTsig(), t.tsigProvider(); ts != nil && tp != nil {
- out, t.tsigRequestMAC, err = TsigGenerateWithProvider(m, tp, t.tsigRequestMAC, t.tsigTimersOnly)
- } else {
- out, err = m.Pack()
- }
- if err != nil {
- return err
- }
- _, err = t.Write(out)
- return err
-}
-
-func isSOAFirst(in *Msg) bool {
- return len(in.Answer) > 0 &&
- in.Answer[0].Header().Rrtype == TypeSOA
-}
-
-func isSOALast(in *Msg) bool {
- return len(in.Answer) > 0 &&
- in.Answer[len(in.Answer)-1].Header().Rrtype == TypeSOA
-}
-
-const errXFR = "bad xfr rcode: %d"