N->send(AD.A);
numanswered++;
- if(AD.A->remote.getSocklen()==sizeof(sockaddr_in))
+ if(AD.A->d_remote.getSocklen()==sizeof(sockaddr_in))
numanswered4++;
else
numanswered6++;
continue; // packet was broken, try again
}
- if(P->remote.getSocklen()==sizeof(sockaddr_in))
+ if(P->d_remote.getSocklen()==sizeof(sockaddr_in))
numreceived4++;
else
numreceived6++;
S.ringAccount("queries", P->qdomain+"/"+P->qtype.getName());
S.ringAccount("remotes",P->getRemote());
if(logDNSQueries)
- L << Logger::Notice<<"Remote "<< P->remote.toString() <<" wants '" << P->qdomain<<"|"<<P->qtype.getName() <<
+ L << Logger::Notice<<"Remote "<< P->d_remote.toString() <<" wants '" << P->qdomain<<"|"<<P->qtype.getName() <<
"', do = " <<P->d_dnssecOk <<", bufsize = "<< P->getMaxReplyLen()<<": ";
if((P->d.opcode != Opcode::Notify) && P->couldBeCached() && PC.get(P, &cached)) { // short circuit - does the PacketCache recognize this question?
if(logDNSQueries)
L<<"packetcache HIT"<<endl;
- cached.setRemote(&P->remote); // inlined
+ cached.setRemote(&P->d_remote); // inlined
cached.setSocket(P->getSocket()); // inlined
cached.setMaxReplyLen(P->getMaxReplyLen());
cached.d.rd=P->d.rd; // copy in recursion desired bit
avg_latency=(int)(0.999*avg_latency+0.001*diff); // 'EWMA'
numanswered++;
- if(P->remote.sin4.sin_family==AF_INET)
+ if(P->d_remote.sin4.sin_family==AF_INET)
numanswered4++;
else
numanswered6++;
bool DNSBackend::getRemote(DNSPacket *p, struct sockaddr *sa, Utility::socklen_t *len)
{
- if(p->remote.getSocklen() < *len)
+ if(p->d_remote.getSocklen() < *len)
return false;
- *len=p->remote.getSocklen();
- memcpy(sa,&p->remote,*len);
+ *len=p->d_remote.getSocklen();
+ memcpy(sa,&p->d_remote,*len);
return true;
}
string DNSPacket::getRemote() const
{
- return remote.toString();
+ return d_remote.toString();
}
uint16_t DNSPacket::getRemotePort() const
{
- return remote.sin4.sin_port;
+ return d_remote.sin4.sin_port;
}
DNSPacket::DNSPacket(const DNSPacket &orig)
{
DLOG(L<<"DNSPacket copy constructor called!"<<endl);
d_socket=orig.d_socket;
- remote=orig.remote;
+ d_remote=orig.d_remote;
d_qlen=orig.d_qlen;
d_dt=orig.d_dt;
d_compress=orig.d_compress;
DNSPacket *r=new DNSPacket;
r->setSocket(d_socket);
- r->setRemote(&remote);
+ r->setRemote(&d_remote);
r->setAnswer(true); // this implies the allocation of the header
r->setA(true); // and we are authoritative
r->setRA(0); // no recursion available
//! Use this to set where this packet was received from or should be sent to
void DNSPacket::setRemote(const ComboAddress *s)
{
- remote=*s;
+ d_remote=*s;
}
void DNSPacket::setSocket(Utility::sock_t sock)
//////// DATA !
- ComboAddress remote;
+ ComboAddress d_remote;
uint16_t qclass; //!< class of the question - should always be INternet 2
struct dnsheader d; //!< dnsheader at the start of the databuffer 12
bool DNSProxy::recurseFor(DNSPacket* p)
{
- return d_ng.match((ComboAddress *)&p->remote);
+ return d_ng.match((ComboAddress *)&p->d_remote);
}
/** returns false if p->remote is not allowed to recurse via us */
ConntrackEntry ce;
ce.id = p->d.id;
- ce.remote = p->remote;
+ ce.remote = p->d_remote;
ce.outsock = p->getSocket();
ce.created = time( NULL );
ce.qtype = p->qtype.getCode();
if(buffer.length() > p->getMaxReplyLen()) {
cerr<<"Weird, trying to send a message that needs truncation, "<< buffer.length()<<" > "<<p->getMaxReplyLen()<<endl;
}
- if(sendto(p->getSocket(),buffer.c_str(), buffer.length(), 0, (struct sockaddr *)(&p->remote), p->remote.getSocklen()) < 0)
+ if(sendto(p->getSocket(),buffer.c_str(), buffer.length(), 0, (struct sockaddr *)(&p->d_remote), p->d_remote.getSocklen()) < 0)
L<<Logger::Error<<"Error sending reply with sendto (socket="<<p->getSocket()<<"): "<<strerror(errno)<<endl;
}
}
// ok, we've done our checks
- Communicator.addSlaveCheckRequest(di, p->remote);
+ Communicator.addSlaveCheckRequest(di, p->d_remote);
return 0;
}
shared_ptr<DNSPacket> reply;
shared_ptr<DNSPacket> cached= shared_ptr<DNSPacket>(new DNSPacket);
if(logDNSQueries)
- L << Logger::Notice<<"TCP Remote "<< packet->remote.toString() <<" wants '" << packet->qdomain<<"|"<<packet->qtype.getName() <<
+ L << Logger::Notice<<"TCP Remote "<< packet->d_remote.toString() <<" wants '" << packet->qdomain<<"|"<<packet->qtype.getName() <<
"', do = " <<packet->d_dnssecOk <<", bufsize = "<< packet->getMaxReplyLen()<<": ";
if(!packet->d.rd && packet->couldBeCached() && PC.get(packet.get(), cached.get())) { // short circuit - does the PacketCache recognize this question?
if(logDNSQueries)
L<<"packetcache HIT"<<endl;
- cached->setRemote(&packet->remote);
+ cached->setRemote(&packet->d_remote);
cached->d.id=packet->d.id;
cached->d.rd=packet->d.rd; // copy in recursion desired bit
cached->commitD(); // commit d to the packet inlined
}
- if(!::arg().mustDo("per-zone-axfr-acls") && (::arg()["allow-axfr-ips"].empty() || d_ng.match( (ComboAddress *) &q->remote )))
+ if(!::arg().mustDo("per-zone-axfr-acls") && (::arg()["allow-axfr-ips"].empty() || d_ng.match( (ComboAddress *) &q->d_remote )))
return true;
#if 0
if(::arg().mustDo("per-zone-axfr-acls")) {