summaryrefslogtreecommitdiff
path: root/dns.go
blob: ff3a1092bf7e37dd16811fda0e5d6bea97e9c826 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
package main

import (
	"github.com/miekg/dns"
	"fmt"
	"time"
	"log"
	"net"
)

const TSIG_FUDGE_SECONDS = 300
type TSIGAlgorithm string

func (t *TSIGAlgorithm) UnmarshalFlag(value string) error {
	switch (value) {
	case "hmac-md5", "md5":
		*t = dns.HmacMD5
	case "hmac-sha1", "sha1":
		*t = dns.HmacSHA1
	case "hmac-sha256", "sha256":
		*t = dns.HmacSHA256
	case "hmac-sha512", "sha512":
		*t = dns.HmacSHA512
	default:
		return fmt.Errorf("Invalid --tsig-algorithm=%v", value)
	}

	return nil
}

func query(query *dns.Msg) (*dns.Msg, error) {
	clientConfig, err := dns.ClientConfigFromFile("/etc/resolv.conf")
	if err != nil {
		return nil, err
	}

	timeout := time.Duration(clientConfig.Timeout * int(time.Second))

	var client = new(dns.Client)

	client.DialTimeout = timeout
	client.ReadTimeout = timeout
	client.WriteTimeout = timeout

	for _, server := range clientConfig.Servers {
		addr := net.JoinHostPort(server, "53")

		if answer, _, err := client.Exchange(query, addr); err != nil {
			log.Printf("query %v: %v", server, err)
			continue
		} else {
			return answer, nil
		}
	}

	return nil, fmt.Errorf("DNS query failed")
}

// Discover likely master NS for zone
func discoverZoneServer(zone string) (string, error) {
	var q = new(dns.Msg)

	q.SetQuestion(zone, dns.TypeSOA)

	r, err := query(q)
	if err != nil {
		return "", err
	}

	for _, rr := range r.Answer {
		if soa, ok := rr.(*dns.SOA); ok {
			return soa.Ns, nil
		}
	}

	return "", fmt.Errorf("No SOA response")
}