Add new files for remote server communication

The dns_remote_t structure is intended to replace the variables in
the structure that deals with remote server communication to primaries,
parental agents, forwarders, etc.
This commit is contained in:
Matthijs Mekking
2022-10-26 14:38:19 +02:00
parent 8c35815513
commit 0300295944
4 changed files with 652 additions and 0 deletions

View File

@@ -109,6 +109,7 @@ libdns_la_HEADERS = \
include/dns/rdatasetiter.h \
include/dns/rdataslab.h \
include/dns/rdatatype.h \
include/dns/remote.h \
include/dns/request.h \
include/dns/resolver.h \
include/dns/result.h \
@@ -211,6 +212,7 @@ libdns_la_SOURCES = \
rdataset.c \
rdatasetiter.c \
rdataslab.c \
remote.c \
request.c \
resolver.c \
result.c \

View File

@@ -0,0 +1,230 @@
/*
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
*
* SPDX-License-Identifier: MPL-2.0
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
*
* See the COPYRIGHT file distributed with this work for additional
* information regarding copyright ownership.
*/
#pragma once
/*! \file dns/remote.h */
#include <stdbool.h>
#include <isc/lang.h>
#include <isc/magic.h>
#include <isc/mem.h>
#include <dns/types.h>
ISC_LANG_BEGINDECLS
#define DNS_REMOTE_MAGIC ISC_MAGIC('R', 'm', 't', 'e')
#define DNS_REMOTE_VALID(remote) ISC_MAGIC_VALID(remote, DNS_REMOTE_MAGIC)
struct dns_remote {
unsigned int magic;
isc_mem_t *mctx;
isc_sockaddr_t *addresses;
isc_dscp_t *dscps;
dns_name_t **keynames;
dns_name_t **tlsnames;
bool *ok;
unsigned int addrcnt;
unsigned int curraddr;
};
isc_sockaddr_t *
dns_remote_addresses(dns_remote_t *remote);
/*%<
* Return the addresses of the remote server.
*
* Requires:
* 'remote' is a valid remote structure.
*/
unsigned int
dns_remote_count(dns_remote_t *remote);
/*%<
* Return the number of addresses of the remote server.
*
* Requires:
* 'remote' is a valid remote structure.
*/
dns_name_t **
dns_remote_keynames(dns_remote_t *remote);
/*%<
* Return the keynames of the remote server.
*
* Requires:
* 'remote' is a valid remote structure.
*/
dns_name_t **
dns_remote_tlsnames(dns_remote_t *remote);
/*%<
* Return the tlsnames of the remote server.
*
* Requires:
* 'remote' is a valid remote structure.
*/
void
dns_remote_init(dns_remote_t *remote, unsigned int count,
const isc_sockaddr_t *addrs, const isc_dscp_t *dscp,
dns_name_t **keynames, dns_name_t **tlsnames, bool mark,
isc_mem_t *mctx);
/*%<
* Initialize a remote server. Set the provided addresses (addrs),
* dscp's (dscp), key names (keynames) and tls names (tlsnames). Use the
* provided memory context (mctx) for allocations. If 'mark' is 'true',
* set up a list of boolean values to mark the server bad or good.
*
* Requires:
* 'remote' is a valid remote structure.
* 'mctx' is not NULL.
* 'addrs' is not NULL, or 'count' equals zero.
* 'keynames' and 'tlsnames' are not NULL, then 'count > 0'.
*/
void
dns_remote_clear(dns_remote_t *remote);
/*%<
* Clear remote server 'remote', free memory.
*
* Requires:
* 'remote' is a valid remote structure.
*/
bool
dns_remote_equal(dns_remote_t *a, dns_remote_t *b);
/*%<
* Compare two remote servers 'a' and 'b'. Check if the address
* count, the addresses, the dscps, the key names and the tls names are
* the same. Return 'true' if so, 'false' otherwise.
*
* Requires:
* 'a' and 'b' are valid remote structures.
*/
void
dns_remote_reset(dns_remote_t *remote, bool clear_ok);
/*%<
* Reset the remote server, set the current address back to the
* first. If 'clear_ok' is 'true', clear any servers marked ok.
*
* Requires:
* 'remote' is a valid remote structure.
*/
void
dns_remote_next(dns_remote_t *remote, bool skip_good);
/*%<
* Skip to the next address. If 'skip_good' is 'true', skip over
* already addresses already considered good, whatever good means in the
* context of this remote server.
*
* Requires:
* 'remote' is a valid remote structure.
*/
isc_sockaddr_t
dns_remote_curraddr(dns_remote_t *remote);
/*%<
* Return the currently used address for this remote server.
*
* Requires:
* 'remote' is a valid remote structure.
* 'remote->addresses' is not NULL.
*/
isc_sockaddr_t
dns_remote_addr(dns_remote_t *remote, unsigned int i);
/*%<
* Return the address at index 'i'. Returns NULL if we i is equal
* or larger than the address count.
*
* Requires:
* 'remote' is a valid remote structure.
* 'remote->addresses' is not NULL.
*/
isc_dscp_t
dns_remote_dscp(dns_remote_t *remote);
/*%<
* Return the current dscp. Returns -1 if we have iterated over all
* addresses already, or if dscps are not used.
*
* Requires:
* 'remote' is a valid remote structure.
*/
dns_name_t *
dns_remote_keyname(dns_remote_t *remote);
/*%<
* Return the current key name. Returns NULL if we have iterated
* over all addresses already, or if keynames are not used.
*
* Requires:
* 'remote' is a valid remote structure.
*/
dns_name_t *
dns_remote_tlsname(dns_remote_t *remote);
/*%<
* Return the current tls name. Returns NULL if we have iterated
* over all addresses already, or if tlsnames are not used.
*
* Requires:
* 'remote' is a valid remote structure.
*/
bool
dns_remote_allgood(dns_remote_t *remote);
/*%<
* Return 'true' if all the addresses are considered good.
*
* Requires:
* 'remote' is a valid remote structure.
*/
void
dns_remote_mark(dns_remote_t *remote, bool good);
/*%<
* Mark the current address 'good' (or not good if 'good' is
* 'false').
*
* Requires:
* 'remote' is a valid remote structure.
* The current address index is lower than the address count.
*/
bool
dns_remote_addrok(dns_remote_t *remote);
/*%<
* Return 'true' if the current address is marked good, 'false'
* otherwise. Also return 'true' if marking servers is not used.
*
* Requires:
* 'remote' is a valid remote structure.
* The current address index is lower than the address count.
*/
bool
dns_remote_done(dns_remote_t *remote);
/*%<
* Return 'true' if we iterated over all addresses, 'false' otherwise.
*
* Requires:
* 'remote' is a valid remote structure.
*/
ISC_LANG_ENDDECLS

View File

@@ -128,6 +128,7 @@ typedef struct dns_rdataset dns_rdataset_t;
typedef ISC_LIST(dns_rdataset_t) dns_rdatasetlist_t;
typedef struct dns_rdatasetiter dns_rdatasetiter_t;
typedef uint16_t dns_rdatatype_t;
typedef struct dns_remote dns_remote_t;
typedef struct dns_request dns_request_t;
typedef struct dns_requestmgr dns_requestmgr_t;
typedef struct dns_resolver dns_resolver_t;

419
lib/dns/remote.c Normal file
View File

@@ -0,0 +1,419 @@
/*
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
*
* SPDX-License-Identifier: MPL-2.0
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
*
* See the COPYRIGHT file distributed with this work for additional
* information regarding copyright ownership.
*/
/*! \file */
#include <stdbool.h>
#include <string.h>
#include <isc/result.h>
#include <isc/sockaddr.h>
#include <isc/types.h>
#include <isc/util.h>
#include <dns/name.h>
#include <dns/remote.h>
#include <dns/types.h>
isc_sockaddr_t *
dns_remote_addresses(dns_remote_t *remote) {
REQUIRE(DNS_REMOTE_VALID(remote));
return (remote->addresses);
}
unsigned int
dns_remote_count(dns_remote_t *remote) {
REQUIRE(DNS_REMOTE_VALID(remote));
return (remote->addrcnt);
}
dns_name_t **
dns_remote_keynames(dns_remote_t *remote) {
REQUIRE(DNS_REMOTE_VALID(remote));
return (remote->keynames);
}
dns_name_t **
dns_remote_tlsnames(dns_remote_t *remote) {
REQUIRE(DNS_REMOTE_VALID(remote));
return (remote->tlsnames);
}
void
dns_remote_init(dns_remote_t *remote, unsigned int count,
const isc_sockaddr_t *addrs, const isc_dscp_t *dscp,
dns_name_t **keynames, dns_name_t **tlsnames, bool mark,
isc_mem_t *mctx) {
unsigned int i;
REQUIRE(DNS_REMOTE_VALID(remote));
REQUIRE(count == 0 || addrs != NULL);
if (keynames != NULL || tlsnames != NULL) {
REQUIRE(count != 0);
}
remote->mctx = mctx;
if (addrs != NULL) {
remote->addresses = isc_mem_get(mctx,
count * sizeof(isc_sockaddr_t));
memmove(remote->addresses, addrs,
count * sizeof(isc_sockaddr_t));
} else {
remote->addresses = NULL;
}
if (dscp != NULL) {
remote->dscps = isc_mem_get(mctx, count * sizeof(isc_dscp_t));
memmove(remote->dscps, dscp, count * sizeof(isc_dscp_t));
} else {
remote->dscps = NULL;
}
if (keynames != NULL) {
remote->keynames = isc_mem_get(mctx, count * sizeof(keynames));
for (i = 0; i < count; i++) {
remote->keynames[i] = NULL;
}
for (i = 0; i < count; i++) {
if (keynames[i] != NULL) {
remote->keynames[i] =
isc_mem_get(mctx, sizeof(dns_name_t));
dns_name_init(remote->keynames[i], NULL);
dns_name_dup(keynames[i], mctx,
remote->keynames[i]);
}
}
} else {
remote->keynames = NULL;
}
if (tlsnames != NULL) {
remote->tlsnames = isc_mem_get(mctx, count * sizeof(tlsnames));
for (i = 0; i < count; i++) {
remote->tlsnames[i] = NULL;
}
for (i = 0; i < count; i++) {
if (tlsnames[i] != NULL) {
remote->tlsnames[i] =
isc_mem_get(mctx, sizeof(dns_name_t));
dns_name_init(remote->tlsnames[i], NULL);
dns_name_dup(tlsnames[i], mctx,
remote->tlsnames[i]);
}
}
} else {
remote->tlsnames = NULL;
}
if (mark) {
remote->ok = isc_mem_get(mctx, count * sizeof(bool));
for (i = 0; i < count; i++) {
remote->ok[i] = false;
}
} else {
remote->ok = NULL;
}
remote->addrcnt = count;
remote->curraddr = 0;
}
static bool
same_addrs(isc_sockaddr_t const *oldlist, isc_sockaddr_t const *newlist,
uint32_t count) {
unsigned int i;
if (oldlist == NULL && newlist == NULL) {
return (true);
}
if (oldlist == NULL || newlist == NULL) {
return (false);
}
for (i = 0; i < count; i++) {
if (!isc_sockaddr_equal(&oldlist[i], &newlist[i])) {
return (false);
}
}
return (true);
}
static bool
same_names(dns_name_t *const *oldlist, dns_name_t *const *newlist,
uint32_t count) {
unsigned int i;
if (oldlist == NULL && newlist == NULL) {
return (true);
}
if (oldlist == NULL || newlist == NULL) {
return (false);
}
for (i = 0; i < count; i++) {
if (oldlist[i] == NULL && newlist[i] == NULL) {
continue;
}
if (oldlist[i] == NULL || newlist[i] == NULL ||
!dns_name_equal(oldlist[i], newlist[i]))
{
return (false);
}
}
return (true);
}
static bool
same_dscp(isc_dscp_t *oldlist, isc_dscp_t *newlist, uint32_t count) {
unsigned int i;
if (oldlist == NULL && newlist == NULL) {
return (true);
}
if (oldlist == NULL || newlist == NULL) {
return (false);
}
for (i = 0; i < count; i++) {
if (oldlist[i] != newlist[i]) {
return (false);
}
}
return (true);
}
void
dns_remote_clear(dns_remote_t *remote) {
unsigned int count;
isc_mem_t *mctx;
REQUIRE(DNS_REMOTE_VALID(remote));
count = remote->addrcnt;
mctx = remote->mctx;
if (mctx == NULL) {
return;
}
if (remote->ok != NULL) {
isc_mem_put(mctx, remote->ok, count * sizeof(bool));
remote->ok = NULL;
}
if (remote->addresses != NULL) {
isc_mem_put(mctx, remote->addresses,
count * sizeof(isc_sockaddr_t));
remote->addresses = NULL;
}
if (remote->dscps != NULL) {
isc_mem_put(mctx, remote->dscps, count * sizeof(isc_dscp_t));
remote->dscps = NULL;
}
if (remote->keynames != NULL) {
unsigned int i;
for (i = 0; i < count; i++) {
if (remote->keynames[i] != NULL) {
dns_name_free(remote->keynames[i], mctx);
isc_mem_put(mctx, remote->keynames[i],
sizeof(dns_name_t));
remote->keynames[i] = NULL;
}
}
isc_mem_put(mctx, remote->keynames,
count * sizeof(dns_name_t *));
remote->keynames = NULL;
}
if (remote->tlsnames != NULL) {
unsigned int i;
for (i = 0; i < count; i++) {
if (remote->tlsnames[i] != NULL) {
dns_name_free(remote->tlsnames[i], mctx);
isc_mem_put(mctx, remote->tlsnames[i],
sizeof(dns_name_t));
remote->tlsnames[i] = NULL;
}
}
isc_mem_put(mctx, remote->tlsnames,
count * sizeof(dns_name_t *));
remote->tlsnames = NULL;
}
remote->curraddr = 0;
remote->addrcnt = 0;
remote->mctx = NULL;
}
bool
dns_remote_equal(dns_remote_t *a, dns_remote_t *b) {
REQUIRE(DNS_REMOTE_VALID(a));
REQUIRE(DNS_REMOTE_VALID(b));
if (a->addrcnt != b->addrcnt) {
return (false);
}
if (!same_addrs(a->addresses, b->addresses, a->addrcnt)) {
return (false);
}
if (!same_dscp(a->dscps, b->dscps, a->addrcnt)) {
return (false);
}
if (!same_names(a->keynames, b->keynames, a->addrcnt)) {
return (false);
}
if (!same_names(a->tlsnames, b->tlsnames, a->addrcnt)) {
return (false);
}
return (true);
}
void
dns_remote_reset(dns_remote_t *remote, bool clear_ok) {
REQUIRE(DNS_REMOTE_VALID(remote));
remote->curraddr = 0;
if (clear_ok && remote->ok != NULL) {
for (unsigned int i = 0; i < remote->addrcnt; i++) {
remote->ok[i] = false;
}
}
}
isc_sockaddr_t
dns_remote_curraddr(dns_remote_t *remote) {
REQUIRE(DNS_REMOTE_VALID(remote));
REQUIRE(remote->addresses != NULL);
REQUIRE(remote->curraddr < remote->addrcnt);
return (remote->addresses[remote->curraddr]);
}
isc_sockaddr_t
dns_remote_addr(dns_remote_t *remote, unsigned int i) {
REQUIRE(DNS_REMOTE_VALID(remote));
REQUIRE(remote->addresses != NULL);
REQUIRE(i < remote->addrcnt);
return (remote->addresses[i]);
}
isc_dscp_t
dns_remote_dscp(dns_remote_t *remote) {
REQUIRE(DNS_REMOTE_VALID(remote));
if (remote->dscps == NULL) {
return -1;
}
if (remote->curraddr >= remote->addrcnt) {
return -1;
}
return (remote->dscps[remote->curraddr]);
}
dns_name_t *
dns_remote_keyname(dns_remote_t *remote) {
REQUIRE(DNS_REMOTE_VALID(remote));
if (remote->keynames == NULL) {
return (NULL);
}
if (remote->curraddr >= remote->addrcnt) {
return (NULL);
}
return (remote->keynames[remote->curraddr]);
}
dns_name_t *
dns_remote_tlsname(dns_remote_t *remote) {
REQUIRE(DNS_REMOTE_VALID(remote));
if (remote->tlsnames == NULL) {
return (NULL);
}
if (remote->curraddr >= remote->addrcnt) {
return (NULL);
}
return (remote->tlsnames[remote->curraddr]);
}
void
dns_remote_next(dns_remote_t *remote, bool skip_good) {
REQUIRE(DNS_REMOTE_VALID(remote));
skip_to_next:
remote->curraddr++;
if (remote->curraddr >= remote->addrcnt) {
return;
}
if (skip_good && remote->ok != NULL && remote->ok[remote->curraddr]) {
goto skip_to_next;
}
}
bool
dns_remote_done(dns_remote_t *remote) {
REQUIRE(DNS_REMOTE_VALID(remote));
return (remote->curraddr >= remote->addrcnt);
}
bool
dns_remote_allgood(dns_remote_t *remote) {
REQUIRE(DNS_REMOTE_VALID(remote));
if (remote->ok == NULL) {
return (true);
}
for (unsigned int i = 0; i < remote->addrcnt; i++) {
if (!remote->ok[i]) {
return (false);
}
}
return (true);
}
bool
dns_remote_addrok(dns_remote_t *remote) {
REQUIRE(DNS_REMOTE_VALID(remote));
REQUIRE(remote->curraddr < remote->addrcnt);
if (remote->ok == NULL) {
return (true);
}
return (remote->ok[remote->curraddr]);
}
void
dns_remote_mark(dns_remote_t *remote, bool good) {
REQUIRE(DNS_REMOTE_VALID(remote));
REQUIRE(remote->curraddr < remote->addrcnt);
remote->ok[remote->curraddr] = good;
}