Drop the use of dns.RR when in fact the only thing we use is the name and type of the RR. Cleans up a bunch of stuff and also stops the weird making of dns.RRs just for a lookup. Should safe some memory as well. Fixes: #66
171 lines
4.2 KiB
Go
171 lines
4.2 KiB
Go
package file
|
|
|
|
import (
|
|
"github.com/miekg/coredns/middleware/file/tree"
|
|
|
|
"github.com/miekg/dns"
|
|
)
|
|
|
|
// Result is the result of a Lookup
|
|
type Result int
|
|
|
|
const (
|
|
Success Result = iota
|
|
NameError
|
|
NoData
|
|
ServerFailure
|
|
)
|
|
|
|
// Lookup looks up qname and qtype in the zone. When do is true DNSSEC records are included.
|
|
// Three sets of records are returned, one for the answer, one for authority and one for the additional section.
|
|
func (z *Zone) Lookup(qname string, qtype uint16, do bool) ([]dns.RR, []dns.RR, []dns.RR, Result) {
|
|
if qtype == dns.TypeSOA {
|
|
return z.lookupSOA(do)
|
|
}
|
|
|
|
elem, res := z.Tree.Search(qname, qtype)
|
|
if elem == nil {
|
|
if res == tree.EmptyNonTerminal {
|
|
return z.emptyNonTerminal(qname, do)
|
|
}
|
|
return z.nameError(qname, qtype, do)
|
|
}
|
|
|
|
rrs := elem.Types(dns.TypeCNAME)
|
|
if len(rrs) > 0 { // should only ever be 1 actually; TODO(miek) check for this?
|
|
return z.lookupCNAME(rrs, qtype, do)
|
|
}
|
|
|
|
rrs = elem.Types(qtype)
|
|
if len(rrs) == 0 {
|
|
return z.noData(elem, do)
|
|
}
|
|
|
|
if do {
|
|
sigs := elem.Types(dns.TypeRRSIG)
|
|
sigs = signatureForSubType(sigs, qtype)
|
|
rrs = append(rrs, sigs...)
|
|
}
|
|
return rrs, nil, nil, Success
|
|
}
|
|
|
|
func (z *Zone) noData(elem *tree.Elem, do bool) ([]dns.RR, []dns.RR, []dns.RR, Result) {
|
|
soa, _, _, _ := z.lookupSOA(do)
|
|
nsec := z.lookupNSEC(elem, do)
|
|
return nil, append(soa, nsec...), nil, Success
|
|
}
|
|
|
|
func (z *Zone) emptyNonTerminal(qname string, do bool) ([]dns.RR, []dns.RR, []dns.RR, Result) {
|
|
soa, _, _, _ := z.lookupSOA(do)
|
|
|
|
elem := z.Tree.Prev(qname)
|
|
nsec := z.lookupNSEC(elem, do)
|
|
return nil, append(soa, nsec...), nil, Success
|
|
}
|
|
|
|
func (z *Zone) nameError(qname string, qtype uint16, do bool) ([]dns.RR, []dns.RR, []dns.RR, Result) {
|
|
// Is there a wildcard?
|
|
ce := z.ClosestEncloser(qname, qtype)
|
|
elem, _ := z.Tree.Search("*."+ce, qtype) // use result here?
|
|
|
|
if elem != nil {
|
|
ret := elem.Types(qtype) // there can only be one of these (or zero)
|
|
switch {
|
|
case ret != nil:
|
|
if do {
|
|
sigs := elem.Types(dns.TypeRRSIG)
|
|
sigs = signatureForSubType(sigs, qtype)
|
|
ret = append(ret, sigs...)
|
|
}
|
|
ret = wildcardReplace(qname, ce, ret)
|
|
return ret, nil, nil, Success
|
|
case ret == nil:
|
|
// nodata, nsec from the wildcard - type does not exist
|
|
// nsec proof that name does not exist
|
|
// TODO(miek)
|
|
}
|
|
}
|
|
|
|
// name error
|
|
ret := []dns.RR{z.SOA}
|
|
if do {
|
|
ret = append(ret, z.SIG...)
|
|
ret = append(ret, z.nameErrorProof(qname, qtype)...)
|
|
}
|
|
return nil, ret, nil, NameError
|
|
}
|
|
|
|
func (z *Zone) lookupSOA(do bool) ([]dns.RR, []dns.RR, []dns.RR, Result) {
|
|
if do {
|
|
ret := append([]dns.RR{z.SOA}, z.SIG...)
|
|
return ret, nil, nil, Success
|
|
}
|
|
return []dns.RR{z.SOA}, nil, nil, Success
|
|
}
|
|
|
|
// lookupNSEC looks up nsec and sigs.
|
|
func (z *Zone) lookupNSEC(elem *tree.Elem, do bool) []dns.RR {
|
|
if !do {
|
|
return nil
|
|
}
|
|
nsec := elem.Types(dns.TypeNSEC)
|
|
if do {
|
|
sigs := elem.Types(dns.TypeRRSIG)
|
|
sigs = signatureForSubType(sigs, dns.TypeNSEC)
|
|
if len(sigs) > 0 {
|
|
nsec = append(nsec, sigs...)
|
|
}
|
|
}
|
|
return nsec
|
|
}
|
|
|
|
func (z *Zone) lookupCNAME(rrs []dns.RR, qtype uint16, do bool) ([]dns.RR, []dns.RR, []dns.RR, Result) {
|
|
elem, _ := z.Tree.Search(rrs[0].(*dns.CNAME).Target, qtype)
|
|
if elem == nil {
|
|
return rrs, nil, nil, Success
|
|
}
|
|
extra := cnameForType(elem.All(), qtype)
|
|
if do {
|
|
sigs := elem.Types(dns.TypeRRSIG)
|
|
sigs = signatureForSubType(sigs, qtype)
|
|
if len(sigs) > 0 {
|
|
extra = append(extra, sigs...)
|
|
}
|
|
}
|
|
return rrs, nil, extra, Success
|
|
}
|
|
|
|
func cnameForType(targets []dns.RR, origQtype uint16) []dns.RR {
|
|
ret := []dns.RR{}
|
|
for _, target := range targets {
|
|
if target.Header().Rrtype == origQtype {
|
|
ret = append(ret, target)
|
|
}
|
|
}
|
|
return ret
|
|
}
|
|
|
|
// signatureForSubType range through the signature and return the correct
|
|
// ones for the subtype.
|
|
func signatureForSubType(rrs []dns.RR, subtype uint16) []dns.RR {
|
|
sigs := []dns.RR{}
|
|
for _, sig := range rrs {
|
|
if s, ok := sig.(*dns.RRSIG); ok {
|
|
if s.TypeCovered == subtype {
|
|
sigs = append(sigs, s)
|
|
}
|
|
}
|
|
}
|
|
return sigs
|
|
}
|
|
|
|
// wildcardReplace replaces the ownername with the original query name.
|
|
func wildcardReplace(qname, ce string, rrs []dns.RR) []dns.RR {
|
|
// need to copy here, otherwise we change in zone stuff
|
|
ret := make([]dns.RR, len(rrs))
|
|
for i, r := range rrs {
|
|
ret[i] = dns.Copy(r)
|
|
ret[i].Header().Name = qname
|
|
}
|
|
return ret
|
|
}
|