]> granicus.if.org Git - pdns/commitdiff
Use RecordPlace enum instead of separate Place enums
authorAki Tuomi <cmouse@cmouse.fi>
Sun, 18 Oct 2015 17:50:17 +0000 (20:50 +0300)
committerAki Tuomi <cmouse@cmouse.fi>
Mon, 19 Oct 2015 05:37:28 +0000 (08:37 +0300)
28 files changed:
pdns/dbdnsseckeeper.cc
pdns/dns.hh
pdns/dnspacket.cc
pdns/dnsparser.cc
pdns/dnsparser.hh
pdns/dnsproxy.cc
pdns/dnsrecords.cc
pdns/dnsreplay.cc
pdns/dnssecinfra.cc
pdns/dnssecinfra.hh
pdns/dnsseckeeper.hh
pdns/dnssecsigner.cc
pdns/dnswriter.cc
pdns/dnswriter.hh
pdns/lua-auth.cc
pdns/lua-pdns.cc
pdns/lua-recursor.cc
pdns/misc.cc
pdns/pdns_recursor.cc
pdns/recursor_cache.cc
pdns/reczones.cc
pdns/rfc2136handler.cc
pdns/saxfr.cc
pdns/speedtest.cc
pdns/syncres.cc
pdns/tcpreceiver.cc
pdns/test-dnsrecords_cc.cc
pdns/test-packetcache_cc.cc

index 1ea6e6172f213b745f11697e307d5e7501b7aff1..23dd32f8e8a0268fcaf5795a28354627cedf537b 100644 (file)
@@ -422,12 +422,12 @@ bool DNSSECKeeper::secureZone(const DNSName& name, int algorithm, int size)
 
 bool DNSSECKeeper::getPreRRSIGs(UeberBackend& db, const DNSName& signer, const DNSName& qname,
         const DNSName& wildcardname, const QType& qtype,
-        DNSPacketWriter::Place signPlace, vector<DNSResourceRecord>& rrsigs, uint32_t signTTL)
+        DNSResourceRecord::Place signPlace, vector<DNSResourceRecord>& rrsigs, uint32_t signTTL)
 {
   vector<DNSResourceRecord> sigs;
   if(db.getDirectRRSIGs(signer, wildcardname.countLabels() ? wildcardname : qname, qtype, sigs)) {
     BOOST_FOREACH(DNSResourceRecord &rr, sigs) {
-      rr.d_place = (DNSResourceRecord::Place)signPlace;
+      rr.d_place = signPlace;
       rr.ttl = signTTL;
       rrsigs.push_back(rr);
     }
@@ -450,7 +450,7 @@ bool DNSSECKeeper::getPreRRSIGs(UeberBackend& db, const DNSName& signer, const D
                         // cerr<<"Got it"<<endl;
                         if (wildcardname.countLabels())
                                 rr.qname = qname;
-                        rr.d_place = static_cast<DNSResourceRecord::Place>(signPlace);
+                        rr.d_place = signPlace;
                         rr.ttl = signTTL;
                         rrsigs.push_back(rr);
                 }
index aa645f42e6184a8cfd34c52c6303cdd5c0076bbc..05e17d183fcbef29f8a9200bec7dab597abd059b 100644 (file)
@@ -54,7 +54,6 @@ struct SOAData
   uint8_t scopeMask;
 };
 
-
 class RCode
 {
 public:
@@ -78,6 +77,7 @@ public:
   ~DNSResourceRecord(){};
 
   enum Place : uint8_t {QUESTION=0, ANSWER=1, AUTHORITY=2, ADDITIONAL=3}; //!< Type describing the positioning of a DNSResourceRecord within, say, a DNSPacket
+
   void setContent(const string& content);
   string getZoneRepresentation() const;
 
index cf3e6480c5a57398d3d4c843033c1f5a57136ca8..33fea5018c9e0b42cc0f8c4a271b299a35b322f1 100644 (file)
@@ -209,7 +209,7 @@ vector<DNSResourceRecord*> DNSPacket::getAPRecords()
       i!=d_rrs.end();
       ++i)
     {
-      if(i->d_place!=DNSResourceRecord::ADDITIONAL && 
+      if(i->d_place!=DNSResourceRecord::ADDITIONAL &&
          (i->qtype.getCode()==QType::MX ||
           i->qtype.getCode()==QType::NS ||
           i->qtype.getCode()==QType::SRV))
@@ -230,7 +230,7 @@ vector<DNSResourceRecord*> DNSPacket::getAnswerRecords()
       i!=d_rrs.end();
       ++i)
     {
-      if(i->d_place!=DNSResourceRecord::ADDITIONAL) 
+      if(i->d_place!=DNSResourceRecord::ADDITIONAL)
         arrs.push_back(&*i);
     }
   return arrs;
@@ -326,7 +326,7 @@ void DNSPacket::wrapup()
         if(pos->content.empty())  // empty contents confuse the MOADNS setup
           pos->content=".";
         
-        pw.startRecord(pos->qname, pos->qtype.getCode(), pos->ttl, pos->qclass, (DNSPacketWriter::Place)pos->d_place); 
+        pw.startRecord(pos->qname, pos->qtype.getCode(), pos->ttl, pos->qclass, pos->d_place);
         shared_ptr<DNSRecordContent> drc(DNSRecordContent::mastermake(pos->qtype.getCode(), pos->qclass, pos->content));
               drc->toPacket(pw);
         if(pw.size() + 20U > (d_tcp ? 65535 : getMaxReplyLen())) { // 20 = room for EDNS0
index b2b67b4f5509b6e254db1b4850b8a69b5b5f3ed6..af8aedbc5f9a81e14dcd3f1ec243bf56e52762b3 100644 (file)
@@ -180,7 +180,7 @@ DNSRecordContent* DNSRecordContent::mastermake(const DNSRecord &dr, PacketReader
   // For opcode UPDATE and where the DNSRecord is an answer record, we don't care about content, because this is
   // not used within the prerequisite section of RFC2136, so - we can simply use unknownrecordcontent.
   // For section 3.2.3, we do need content so we need to get it properly. But only for the correct Qclasses.
-  if (oc == Opcode::Update && dr.d_place == DNSRecord::Answer && dr.d_class != 1)
+  if (oc == Opcode::Update && dr.d_place == DNSResourceRecord::ANSWER && dr.d_class != 1)
     return new UnknownRecordContent(dr, pr);
 
   uint16_t searchclass = (dr.d_type == QType::OPT) ? 1 : dr.d_class; // class is invalid for OPT
@@ -268,11 +268,11 @@ void MOADNSParser::init(const char *packet, unsigned int len)
       DNSRecord dr;
       
       if(n < d_header.ancount)
-        dr.d_place=DNSRecord::Answer;
+        dr.d_place=DNSResourceRecord::ANSWER;
       else if(n < d_header.ancount + d_header.nscount)
-        dr.d_place=DNSRecord::Nameserver;
+        dr.d_place=DNSResourceRecord::AUTHORITY;
       else 
-        dr.d_place=DNSRecord::Additional;
+        dr.d_place=DNSResourceRecord::ADDITIONAL;
       
       unsigned int recordStartPos=pr.d_pos;
 
index fa666495891943068c40940930d2ecbf45399ffe..63318b901e1ce56908efc9ee9a83b9a96fb5a8fd 100644 (file)
@@ -273,7 +273,7 @@ struct DNSRecord
   uint16_t d_class;
   uint32_t d_ttl;
   uint16_t d_clen;
-  enum Place : uint8_t {Answer=1, Nameserver=2, Additional=3} d_place;
+  DNSResourceRecord::Place d_place;
 
   bool operator<(const DNSRecord& rhs) const
   {
index 4d8858d441a3ad2e2a819f9047d76ec8c76d9127..166d0f58b2a6c3ff1bbe7412a424e850a522901a 100644 (file)
@@ -247,7 +247,7 @@ void DNSProxy::mainloop(void)
          //      cerr<<"Got completion, "<<mdp.d_answers.size()<<" answers, rcode: "<<mdp.d_header.rcode<<endl;
          for(MOADNSParser::answers_t::const_iterator j=mdp.d_answers.begin(); j!=mdp.d_answers.end(); ++j) {        
            //      cerr<<"comp: "<<(int)j->first.d_place-1<<" "<<j->first.d_label<<" " << DNSRecordContent::NumberToType(j->first.d_type)<<" "<<j->first.d_content->getZoneRepresentation()<<endl;
-           if(j->first.d_place == DNSRecord::Answer || (j->first.d_place == DNSRecord::Nameserver && j->first.d_type == QType::SOA)) {
+           if(j->first.d_place == DNSResourceRecord::ANSWER || (j->first.d_place == DNSResourceRecord::AUTHORITY && j->first.d_type == QType::SOA)) {
            
              DNSResourceRecord rr;
 
@@ -255,7 +255,7 @@ void DNSProxy::mainloop(void)
                rr.qname=i->second.aname;
                rr.qtype = j->first.d_type;
                rr.ttl=j->first.d_ttl;
-               rr.d_place= (DNSResourceRecord::Place)j->first.d_place;
+               rr.d_place= j->first.d_place;
                rr.content=j->first.d_content->getZoneRepresentation();
                i->second.complete->addRecord(rr);
              }
index 0f005dfabbebb30b18835f08d9d5b4242eeb502e..7dd3442b41ba07e80ae8baa1917e0ace3cbfb15f 100644 (file)
@@ -74,7 +74,7 @@ DNSResourceRecord::DNSResourceRecord(const DNSRecord &p) {
   qclass = p.d_class;
   disabled=false;
   qname = p.d_name;
-  d_place = (DNSResourceRecord::Place)p.d_place;
+  d_place = p.d_place;
   // if(!qname.empty())
   //   boost::erase_tail(qname, 1); // strip .
 
@@ -85,7 +85,7 @@ DNSResourceRecord::DNSResourceRecord(const DNSRecord &p) {
   signttl = 0;
   domain_id = -1;
   qclass = p.d_class;
-  d_place = static_cast<DNSResourceRecord::Place>(p.d_place);
+  d_place = p.d_place;
   scopeMask = 0;
 }
 
@@ -495,7 +495,7 @@ bool getEDNSOpts(const MOADNSParser& mdp, EDNSOpts* eo)
 {
   if(mdp.d_header.arcount && !mdp.d_answers.empty()) {
     BOOST_FOREACH(const MOADNSParser::answers_t::value_type& val, mdp.d_answers) {
-      if(val.first.d_place == DNSRecord::Additional && val.first.d_type == QType::OPT) {
+      if(val.first.d_place == DNSResourceRecord::ADDITIONAL && val.first.d_type == QType::OPT) {
         eo->d_packetsize=val.first.d_class;
        
         EDNS0Record stuff;
index 154fe8229e8a247d094e1e4c356dd945e4ca9065..6fcafd1ecfdc8494336f717e362e0b012f4f8ba4 100644 (file)
@@ -259,7 +259,7 @@ void WeOrigSlowQueriesDelta(int& weOutstanding, int& origOutstanding, int& weSlo
 void compactAnswerSet(MOADNSParser::answers_t orig, set<DNSRecord>& compacted)
 {
   for(MOADNSParser::answers_t::const_iterator i=orig.begin(); i != orig.end(); ++i)
-    if(i->first.d_place==DNSRecord::Answer)
+    if(i->first.d_place==DNSResourceRecord::ANSWER)
       compacted.insert(i->first);
 }
 
index 566bb604ec5e5c5a3ae5e99e47da7be930bbf874..93aa2f94737c5adf666d5439aee84c681c690cab 100644 (file)
@@ -624,7 +624,7 @@ void addTSIG(DNSPacketWriter& pw, TSIGRecordContent* trc, const DNSName& tsigkey
     trc->d_mac = calculateHMAC(tsigsecret, toSign, algo);
     //  d_trc->d_mac[0]++; // sabotage
   }
-  pw.startRecord(tsigkeyname, QType::TSIG, 0, QClass::ANY, DNSPacketWriter::ADDITIONAL, false);
+  pw.startRecord(tsigkeyname, QType::TSIG, 0, QClass::ANY, DNSResourceRecord::ADDITIONAL, false);
   trc->toPacket(pw);
   pw.commit();
 }
index 5a31e3d22cd2893e9e530d717c8742217731900d..649e07dc0e8480f75df4fdca4520d803b20f6ce3 100644 (file)
@@ -119,7 +119,7 @@ struct DNSSECPrivateKey;
 
 void fillOutRRSIG(DNSSECPrivateKey& dpk, const DNSName& signQName, RRSIGRecordContent& rrc, vector<shared_ptr<DNSRecordContent> >& toSign);
 uint32_t getStartOfWeek();
-void addSignature(DNSSECKeeper& dk, UeberBackend& db, const DNSName& signer, const DNSName signQName, const DNSName& wildcardname, uint16_t signQType, uint32_t signTTL, DNSPacketWriter::Place signPlace,
+void addSignature(DNSSECKeeper& dk, UeberBackend& db, const DNSName& signer, const DNSName signQName, const DNSName& wildcardname, uint16_t signQType, uint32_t signTTL, DNSResourceRecord::Place signPlace,
   vector<shared_ptr<DNSRecordContent> >& toSign, vector<DNSResourceRecord>& outsigned, uint32_t origTTL);
 int getRRSIGsForRRSET(DNSSECKeeper& dk, const DNSName& signer, const DNSName signQName, uint16_t signQType, uint32_t signTTL,
   vector<shared_ptr<DNSRecordContent> >& toSign, vector<RRSIGRecordContent> &rrc);
index b5bb66c883bdfd4203a8771c0a0570b3b057d910..3f03006a4fbe33ca607fd37c241d1daebc973a9e 100644 (file)
@@ -86,7 +86,7 @@ public:
   bool unsetNSEC3PARAM(const DNSName& zname);
   void clearAllCaches();
   void clearCaches(const DNSName& name);
-  bool getPreRRSIGs(UeberBackend& db, const DNSName& signer, const DNSName& qname, const DNSName& wildcardname, const QType& qtype, DNSPacketWriter::Place, vector<DNSResourceRecord>& rrsigs, uint32_t signTTL);
+  bool getPreRRSIGs(UeberBackend& db, const DNSName& signer, const DNSName& qname, const DNSName& wildcardname, const QType& qtype, DNSResourceRecord::Place, vector<DNSResourceRecord>& rrsigs, uint32_t signTTL);
   bool isPresigned(const DNSName& zname);
   bool setPresigned(const DNSName& zname);
   bool unsetPresigned(const DNSName& zname);
index 50398e69244cafda0b5a280bfb277188bc000850..61db72998f5f0d6003333235444e70232bd89c77 100644 (file)
@@ -92,7 +92,7 @@ int getRRSIGsForRRSET(DNSSECKeeper& dk, const DNSName& signer, const DNSName sig
 
 // this is the entrypoint from DNSPacket
 void addSignature(DNSSECKeeper& dk, UeberBackend& db, const DNSName& signer, const DNSName signQName, const DNSName& wildcardname, uint16_t signQType,
-  uint32_t signTTL, DNSPacketWriter::Place signPlace, 
+  uint32_t signTTL, DNSResourceRecord::Place signPlace,
   vector<shared_ptr<DNSRecordContent> >& toSign, vector<DNSResourceRecord>& outsigned, uint32_t origTTL)
 {
   //cerr<<"Asked to sign '"<<signQName<<"'|"<<DNSRecordContent::NumberToType(signQType)<<", "<<toSign.size()<<" records\n";
@@ -117,7 +117,7 @@ void addSignature(DNSSECKeeper& dk, UeberBackend& db, const DNSName& signer, con
     else
       rr.ttl=signTTL;
     rr.auth=false;
-    rr.d_place = static_cast<DNSResourceRecord::Place> (signPlace);
+    rr.d_place = signPlace;
     BOOST_FOREACH(RRSIGRecordContent& rrc, rrcs) {
       rr.content = rrc.getZoneRepresentation();
       outsigned.push_back(rr);
@@ -210,7 +210,7 @@ void addRRSigs(DNSSECKeeper& dk, UeberBackend& db, const set<DNSName>& authSet,
   uint32_t signTTL=0;
   uint32_t origTTL=0;
   
-  DNSPacketWriter::Place signPlace=DNSPacketWriter::ANSWER;
+  DNSResourceRecord::Place signPlace=DNSResourceRecord::ANSWER;
   vector<shared_ptr<DNSRecordContent> > toSign;
 
   vector<DNSResourceRecord> signedRecords;
@@ -230,7 +230,7 @@ void addRRSigs(DNSSECKeeper& dk, UeberBackend& db, const set<DNSName>& authSet,
     else
       signTTL = pos->ttl;
     origTTL = pos->ttl;
-    signPlace = static_cast<DNSPacketWriter::Place>(pos->d_place);
+    signPlace = pos->d_place;
     if(pos->auth || pos->qtype.getCode() == QType::DS) {
       string content = pos->content;
       if(!pos->content.empty() && pos->qtype.getCode()==QType::TXT && pos->content[0]!='"') {
index 2154cf5ccaa38f524c8f659130e6f0a2b67bab04..eda9b87fce80401d53e3803a3b42d0b91d47a86f 100644 (file)
@@ -55,7 +55,7 @@ DNSPacketWriter::DNSPacketWriter(vector<uint8_t>& content, const DNSName& qname,
   d_recordttl = 0;
   d_recordqtype = 0;
   d_recordqclass = QClass::IN;
-  d_recordplace = DNSPacketWriter::ANSWER;
+  d_recordplace = DNSResourceRecord::ANSWER;
 }
 
 dnsheader* DNSPacketWriter::getHeader()
@@ -63,7 +63,7 @@ dnsheader* DNSPacketWriter::getHeader()
   return (dnsheader*)&*d_content.begin();
 }
 
-void DNSPacketWriter::startRecord(const DNSName& name, uint16_t qtype, uint32_t ttl, uint16_t qclass, Place place, bool compress)
+void DNSPacketWriter::startRecord(const DNSName& name, uint16_t qtype, uint32_t ttl, uint16_t qclass, DNSResourceRecord::Place place, bool compress)
 {
   if(!d_record.empty())
     commit();
@@ -105,7 +105,7 @@ void DNSPacketWriter::addOpt(int udpsize, int extRCode, int Z, const vector<pair
 
   ttl=ntohl(ttl); // will be reversed later on
 
-  startRecord(DNSName(), QType::OPT, ttl, udpsize, ADDITIONAL, false);
+  startRecord(DNSName(), QType::OPT, ttl, udpsize, DNSResourceRecord::ADDITIONAL, false);
   for(optvect_t::const_iterator iter = options.begin(); iter != options.end(); ++iter) {
     xfr16BitInt(iter->first);
     xfr16BitInt(iter->second.length());
@@ -343,13 +343,16 @@ void DNSPacketWriter::commit()
 
   dnsheader* dh=reinterpret_cast<dnsheader*>( &*d_content.begin());
   switch(d_recordplace) {
-  case ANSWER:
+  case DNSResourceRecord::QUESTION:
+    dh->qdcount = htons(ntohs(dh->qdcount) + 1);
+    break;
+  case DNSResourceRecord::ANSWER:
     dh->ancount = htons(ntohs(dh->ancount) + 1);
     break;
-  case AUTHORITY:
+  case DNSResourceRecord::AUTHORITY:
     dh->nscount = htons(ntohs(dh->nscount) + 1);
     break;
-  case ADDITIONAL:
+  case DNSResourceRecord::ADDITIONAL:
     dh->arcount = htons(ntohs(dh->arcount) + 1);
     break;
   }
index af50502e21fe7c09cdbe04e7baeca421da344bf8..da40920e69f2aa9960813ccede702e2383a6adb8 100644 (file)
@@ -39,14 +39,13 @@ class DNSPacketWriter : public boost::noncopyable
 
 public:
   typedef vector<pair<DNSName, uint16_t> > lmap_t;
-  enum Place : uint8_t {ANSWER=1, AUTHORITY=2, ADDITIONAL=3}; 
 
   //! Start a DNS Packet in the vector passed, with question qname, qtype and qclass
   DNSPacketWriter(vector<uint8_t>& content, const DNSName& qname, uint16_t  qtype, uint16_t qclass=QClass::IN, uint8_t opcode=0);
 
   /** Start a new DNS record within this packet for namq, qtype, ttl, class and in the requested place. Note that packets can only be written in natural order -
       ANSWER, AUTHORITY, ADDITIONAL */
-  void startRecord(const DNSName& name, uint16_t qtype, uint32_t ttl=3600, uint16_t qclass=QClass::IN, Place place=ANSWER, bool compress=true);
+  void startRecord(const DNSName& name, uint16_t qtype, uint32_t ttl=3600, uint16_t qclass=QClass::IN, DNSResourceRecord::Place place=DNSResourceRecord::ANSWER, bool compress=true);
 
   /** Shorthand way to add an Opt-record, for example for EDNS0 purposes */
   typedef vector<pair<uint16_t,std::string> > optvect_t;
@@ -130,7 +129,7 @@ private:
   uint16_t d_recordqtype, d_recordqclass;
 
   uint16_t d_truncatemarker; // end of header, for truncate
-  Place d_recordplace;
+  DNSResourceRecord::Place d_recordplace;
   bool d_canonic, d_lowerCase;
 };
 
index 8b51ff44225e7016763bd6c3bffda7c315328516..672161780be0e2ecb15964f7a8cfb0c2231fad4a 100644 (file)
@@ -120,7 +120,7 @@ bool AuthLua::axfrfilter(const ComboAddress& remote, const DNSName& zone, const
     if(!getFromTable("place", tmpnum))
       rr.d_place = DNSResourceRecord::ANSWER;
     else
-      rr.d_place = (DNSResourceRecord::Place) tmpnum;
+      rr.d_place = static_cast<DNSResourceRecord::Place>(tmpnum);
 
     /* removes 'value'; keeps 'key' for next iteration */
     lua_pop(d_lua, 1); // table
index 99f77504a923d809ecd50035b4cf3e0318690ff6..3916ed0800fc5e278770d23e8e70379964da4236 100644 (file)
@@ -170,7 +170,7 @@ void popResourceRecordsTable(lua_State *lua, const DNSName &query, vector<DNSRec
   /* get the result */
   DNSRecord rr;
   rr.d_name = query;
-  rr.d_place = DNSRecord::Answer;
+  rr.d_place = DNSResourceRecord::ANSWER;
   rr.d_ttl = 3600;
 
   int tableLen = getLuaTableLength(lua, 2);
@@ -188,7 +188,7 @@ void popResourceRecordsTable(lua_State *lua, const DNSName &query, vector<DNSRec
     if(!getFromTable(lua, "qclass", tmpnum))
       rr.d_class = QClass::IN;
     else {
-      rr.d_class = tmpnum;
+      rr.d_class = static_cast<DNSResourceRecord::Place>(tmpnum);
     }
 
 
@@ -204,11 +204,11 @@ void popResourceRecordsTable(lua_State *lua, const DNSName &query, vector<DNSRec
       rr.d_name = query;
 
     if(!getFromTable(lua, "place", tmpnum))
-      rr.d_place = DNSRecord::Answer;
+      rr.d_place = DNSResourceRecord::ANSWER;
     else {
-      rr.d_place = (DNSRecord::Place) tmpnum;
-      if(rr.d_place > DNSRecord::Additional)
-        rr.d_place = DNSRecord::Additional;
+      rr.d_place = static_cast<DNSResourceRecord::Place>(tmpnum);
+      if(rr.d_place > DNSResourceRecord::ADDITIONAL)
+        rr.d_place = DNSResourceRecord::ADDITIONAL;
     }
 
 
index 3c25a7f707bd4727e7247c8fac9494970d09504e..4f4c24f7beeed77394cf86a0c597b23cdf2b1d70 100644 (file)
@@ -115,7 +115,7 @@ int getFakeAAAARecords(const std::string& qname, const std::string& prefix, vect
 
   BOOST_FOREACH(DNSRecord& rr, ret)
   {
-    if(rr.d_type == QType::A && rr.d_place==DNSRecord::Answer) {
+    if(rr.d_type == QType::A && rr.d_place==DNSResourceRecord::ANSWER) {
       ComboAddress ipv4(std::dynamic_pointer_cast<ARecordContent>(rr.d_content)->getCA());
       uint32_t tmp;
       memcpy((void*)&tmp, &ipv4.sin4.sin_addr.s_addr, 4);
@@ -150,7 +150,7 @@ int getFakePTRRecords(const DNSName& qname, const std::string& prefix, vector<DN
   int rcode = directResolve(newquery, QType(QType::PTR), 1, ret);
   BOOST_FOREACH(DNSRecord& rr, ret)
   {
-    if(rr.d_type == QType::PTR && rr.d_place==DNSRecord::Answer) {
+    if(rr.d_type == QType::PTR && rr.d_place==DNSResourceRecord::ANSWER) {
       rr.d_name = qname;
     }
   }
index 16dcab4bf9e166e06ed46132c434ca874cc438a6..2990104011e3e8f5b0489d94e385f256d94d28a0 100644 (file)
@@ -554,10 +554,10 @@ void shuffle(vector<DNSRecord>& rrs)
 {
   vector<DNSRecord>::iterator first, second;
   for(first=rrs.begin();first!=rrs.end();++first)
-    if(first->d_place==DNSRecord::Answer && first->d_type != QType::CNAME) // CNAME must come first
+    if(first->d_place==DNSResourceRecord::ANSWER && first->d_type != QType::CNAME) // CNAME must come first
       break;
   for(second=first;second!=rrs.end();++second)
-    if(second->d_place!=DNSRecord::Answer)
+    if(second->d_place!=DNSResourceRecord::ANSWER)
       break;
 
   if(second-first>1)
@@ -565,10 +565,10 @@ void shuffle(vector<DNSRecord>& rrs)
 
   // now shuffle the additional records
   for(first=second;first!=rrs.end();++first)
-    if(first->d_place==DNSRecord::Additional && first->d_type != QType::CNAME) // CNAME must come first
+    if(first->d_place==DNSResourceRecord::ADDITIONAL && first->d_type != QType::CNAME) // CNAME must come first
       break;
   for(second=first; second!=rrs.end(); ++second)
-    if(second->d_place!=DNSRecord::Additional)
+    if(second->d_place!=DNSResourceRecord::ADDITIONAL)
       break;
 
   if(second-first>1)
index a0632736adfa9248a0cedb06e24e0e9ad090b262..bb21965e0ae58c05a32512f04b2921f8ed0d00a1 100644 (file)
@@ -622,7 +622,7 @@ void startDoResolve(void *p)
         if(res == RCode::NoError) {
                auto i=ret.cbegin();
                 for(; i!= ret.cend(); ++i)
-                  if(i->d_type == dc->d_mdp.d_qtype && i->d_place == DNSRecord::Answer)
+                  if(i->d_type == dc->d_mdp.d_qtype && i->d_place == DNSResourceRecord::ANSWER)
                           break;
                 if(i == ret.cend())
                   (*t_pdl)->nodata(dc->d_remote,local, dc->d_mdp.d_qname, QType(dc->d_mdp.d_qtype), ret, res, &variableAnswer);
@@ -664,12 +664,12 @@ void startDoResolve(void *p)
       if(ret.size()) {
         orderAndShuffle(ret);
         for(auto i=ret.cbegin(); i!=ret.cend(); ++i) {
-          pw.startRecord(i->d_name, i->d_type, i->d_ttl, i->d_class, (DNSPacketWriter::Place)i->d_place);
+          pw.startRecord(i->d_name, i->d_type, i->d_ttl, i->d_class, i->d_place);
           minTTL = min(minTTL, i->d_ttl);
          i->d_content->toPacket(pw);
           if(pw.size() > maxanswersize) {
             pw.rollback();
-            if(i->d_place==DNSRecord::Answer)  // only truncate if we actually omitted parts of the answer
+            if(i->d_place==DNSResourceRecord::ANSWER)  // only truncate if we actually omitted parts of the answer
             {
               pw.getHeader()->tc=1;
               pw.truncate();
index 0fb1a2c49856292fe87f03c88131de5c679a4c6b..6656f9ac518ef2e37512fd43253d3ab578b09716 100644 (file)
@@ -61,7 +61,7 @@ int MemRecursorCache::get(time_t now, const DNSName &qname, const QType& qt, vec
            dr.d_class = 1;
            dr.d_content = *k; 
            dr.d_ttl = i->d_ttd;
-           dr.d_place = DNSRecord::Answer;
+           dr.d_place = DNSResourceRecord::ANSWER;
            res->push_back(dr);
          }
        }
index 08eec27c94172ea073cbc3c4a779fdc503de496b..c3616650ec4f89458d179e5214b40063cf0108f6 100644 (file)
@@ -107,7 +107,7 @@ static void makeNameToIPZone(SyncRes::domainmap_t* newMap, const DNSName& hostna
 
   DNSRecord dr;
   dr.d_name=hostname;
-  dr.d_place=DNSRecord::Answer;
+  dr.d_place=DNSResourceRecord::ANSWER;
   dr.d_ttl=86400;
   dr.d_type=QType::SOA;
   dr.d_class = 1;
@@ -150,7 +150,7 @@ static void makeIPToNamesZone(SyncRes::domainmap_t* newMap, const vector<string>
   dr.d_name.appendRawLabel("in-addr");
   dr.d_name.appendRawLabel("arpa");
   dr.d_class = 1;
-  dr.d_place=DNSRecord::Answer;
+  dr.d_place=DNSResourceRecord::ANSWER;
   dr.d_ttl=86400;
   dr.d_type=QType::SOA;
   dr.d_content=std::shared_ptr<DNSRecordContent>(DNSRecordContent::mastermake(QType::SOA, 1, "localhost. root 1 604800 86400 2419200 604800"));
@@ -341,7 +341,7 @@ SyncRes::domainmap_t* parseAuthAndForwards()
         while(zpt.get(rr)) {
           try {
            dr=DNSRecord(rr);
-           dr.d_place=DNSRecord::Answer;
+           dr.d_place=DNSResourceRecord::ANSWER;
           }
           catch(std::exception &e) {
             delete newMap;
index 093b8f46bbffb7b8d14096db28ba5dee9d99c119..b442f953671b7467118baae6e7684191dcf4d98f 100644 (file)
@@ -759,7 +759,7 @@ int PacketHandler::processUpdate(DNSPacket *p) {
     const DNSRecord *rr = &i->first;
     // Skip this check for other field types (like the TSIG -  which is in the additional section)
     // For a TSIG, the label is the dnskey, so it does not pass the endOn validation.
-    if (! (rr->d_place == DNSRecord::Answer || rr->d_place == DNSRecord::Nameserver))
+    if (! (rr->d_place == DNSResourceRecord::ANSWER || rr->d_place == DNSResourceRecord::AUTHORITY))
       continue;
 
     if (!rr->d_name.isPartOf(di.zone)) {
@@ -779,7 +779,7 @@ int PacketHandler::processUpdate(DNSPacket *p) {
   // 3.2.1 and 3.2.2 - Prerequisite check
   for(MOADNSParser::answers_t::const_iterator i=mdp.d_answers.begin(); i != mdp.d_answers.end(); ++i) {
     const DNSRecord *rr = &i->first;
-    if (rr->d_place == DNSRecord::Answer) {
+    if (rr->d_place == DNSResourceRecord::ANSWER) {
       int res = checkUpdatePrerequisites(rr, &di);
       if (res>0) {
         L<<Logger::Error<<msgPrefix<<"Failed PreRequisites check, returning "<<res<<endl;
@@ -796,7 +796,7 @@ int PacketHandler::processUpdate(DNSPacket *p) {
   RRsetMap_t preReqRRsets;
   for(MOADNSParser::answers_t::const_iterator i=mdp.d_answers.begin(); i != mdp.d_answers.end(); ++i) {
     const DNSRecord *rr = &i->first;
-    if (rr->d_place == DNSRecord::Answer) {
+    if (rr->d_place == DNSResourceRecord::ANSWER) {
       // Last line of 3.2.3
       if (rr->d_class != QClass::IN && rr->d_class != QClass::NONE && rr->d_class != QClass::ANY)
         return RCode::FormErr;
@@ -844,7 +844,7 @@ int PacketHandler::processUpdate(DNSPacket *p) {
     // 3.4.1 - Prescan section
     for(MOADNSParser::answers_t::const_iterator i=mdp.d_answers.begin(); i != mdp.d_answers.end(); ++i) {
       const DNSRecord *rr = &i->first;
-      if (rr->d_place == DNSRecord::Nameserver) {
+      if (rr->d_place == DNSResourceRecord::AUTHORITY) {
         int res = checkUpdatePrescan(rr);
         if (res>0) {
           L<<Logger::Error<<msgPrefix<<"Failed prescan check, returning "<<res<<endl;
@@ -866,7 +866,7 @@ int PacketHandler::processUpdate(DNSPacket *p) {
     vector<const DNSRecord *> nsRRtoDelete;
     for(MOADNSParser::answers_t::const_iterator i=mdp.d_answers.begin(); i != mdp.d_answers.end(); ++i) {
       const DNSRecord *rr = &i->first;
-      if (rr->d_place == DNSRecord::Nameserver) {
+      if (rr->d_place == DNSResourceRecord::AUTHORITY) {
         if (rr->d_class == QClass::NONE  && rr->d_type == QType::NS && rr->d_name == di.zone)
           nsRRtoDelete.push_back(rr);
         else
index 768e0b513d7b2aef24ab40411ae45b8d0ea71116..5f048f2a07664be1ec95ce5dbe418bfb94cb7b5b 100644 (file)
@@ -137,7 +137,7 @@ try
       tkrc.d_key = output;
       tkrc.d_othersize = 0;
       pwtkey.getHeader()->id = dns_random(0xffff);
-      pwtkey.startRecord(gssctx.getLabel(), QType::TKEY, 3600, QClass::ANY, DNSPacketWriter::ADDITIONAL, false);
+      pwtkey.startRecord(gssctx.getLabel(), QType::TKEY, 3600, QClass::ANY, DNSResourceRecord::ADDITIONAL, false);
       tkrc.toPacket(pwtkey);
       pwtkey.commit();
       BOOST_FOREACH(const string& msg, gssctx.getErrorStrings()) {
index 9b0c31396fbe2ee53b40e37391ebb214b5564fb3..6c9bc9f07fd8a1b03c7701f321f11d9736f7ca77 100644 (file)
@@ -365,7 +365,7 @@ vector<uint8_t> makeRootReferral()
   
   for(char c='a';c<='m';++c) {
     *templ=c;
-    pw.startRecord(DNSName(), QType::NS, 3600, 1, DNSPacketWriter::AUTHORITY);
+    pw.startRecord(DNSName(), QType::NS, 3600, 1, DNSResourceRecord::AUTHORITY);
     DNSRecordContent* drc = DNSRecordContent::mastermake(QType::NS, 1, templ);
     drc->toPacket(pw);
     delete drc;
@@ -373,7 +373,7 @@ vector<uint8_t> makeRootReferral()
 
   for(char c='a';c<='m';++c) {
     *templ=c;
-    pw.startRecord(DNSName(), QType::A, 3600, 1, DNSPacketWriter::ADDITIONAL);
+    pw.startRecord(DNSName(), QType::A, 3600, 1, DNSResourceRecord::ADDITIONAL);
     DNSRecordContent* drc = DNSRecordContent::mastermake(QType::A, 1, ips[c-'a']);
     drc->toPacket(pw);
     delete drc;
@@ -388,23 +388,23 @@ vector<uint8_t> makeTypicalReferral()
   vector<uint8_t> packet;
   DNSPacketWriter pw(packet, DNSName("outpost.ds9a.nl"), QType::A);
 
-  pw.startRecord(DNSName("ds9a.nl"), QType::NS, 3600, 1, DNSPacketWriter::AUTHORITY);
+  pw.startRecord(DNSName("ds9a.nl"), QType::NS, 3600, 1, DNSResourceRecord::AUTHORITY);
   DNSRecordContent* drc = DNSRecordContent::mastermake(QType::NS, 1, "ns1.ds9a.nl");
   drc->toPacket(pw);
   delete drc;
 
-  pw.startRecord(DNSName("ds9a.nl"), QType::NS, 3600, 1, DNSPacketWriter::AUTHORITY);
+  pw.startRecord(DNSName("ds9a.nl"), QType::NS, 3600, 1, DNSResourceRecord::AUTHORITY);
   drc = DNSRecordContent::mastermake(QType::NS, 1, "ns2.ds9a.nl");
   drc->toPacket(pw);
   delete drc;
 
 
-  pw.startRecord(DNSName("ns1.ds9a.nl"), QType::A, 3600, 1, DNSPacketWriter::ADDITIONAL);
+  pw.startRecord(DNSName("ns1.ds9a.nl"), QType::A, 3600, 1, DNSResourceRecord::ADDITIONAL);
   drc = DNSRecordContent::mastermake(QType::A, 1, "1.2.3.4");
   drc->toPacket(pw);
   delete drc;
 
-  pw.startRecord(DNSName("ns2.ds9a.nl"), QType::A, 3600, 1, DNSPacketWriter::ADDITIONAL);
+  pw.startRecord(DNSName("ns2.ds9a.nl"), QType::A, 3600, 1, DNSResourceRecord::ADDITIONAL);
   drc = DNSRecordContent::mastermake(QType::A, 1, "4.3.2.1");
   drc->toPacket(pw);
   delete drc;
@@ -618,7 +618,7 @@ struct ParsePacketTest
       string auth(".");
  
       for(vector<DNSResourceRecord>::const_iterator i=lwr.d_result.begin();i!=lwr.d_result.end();++i) {
-        if(i->d_place==DNSResourceRecord::AUTHORITY && dottedEndsOn(qname,i->qname) && i->qtype.getCode()==QType::SOA && 
+        if(i->d_place==DNSResourceRecord::AUTHORITY && dottedEndsOn(qname,i->qname) && i->qtype.getCode()==QType::SOA &&
            lwr.d_rcode==RCode::NXDomain) {
           // LOG<<prefix<<qname<<": got negative caching indication for RECORD '"<<qname+"'"<<endl;
           ret.push_back(*i);
@@ -640,7 +640,7 @@ struct ParsePacketTest
           newtarget=i->content;
         }
         // for ANY answers we *must* have an authoritative answer
-        else if(i->d_place==DNSResourceRecord::ANSWER && pdns_iequals(i->qname, qname) && 
+        else if(i->d_place==DNSResourceRecord::ANSWER && pdns_iequals(i->qname, qname) &&
                 (
                  i->qtype==qtype || (lwr.d_aabit && (qtype==QType(QType::ANY) || magicAddrMatch(qtype, i->qtype) ) )
                 ) 
index e967d76bdccd77c285ed537dec86c3c017d6849d..571f85cb8883af3787b2552f5b92cdc97e0d4b8b 100644 (file)
@@ -133,7 +133,7 @@ int SyncRes::beginResolve(const DNSName &qname, const QType &qtype, uint16_t qcl
     ret.clear();
     DNSRecord dr;
     dr.d_name=qname;
-    dr.d_place = DNSRecord::Answer;
+    dr.d_place = DNSResourceRecord::ANSWER;
     dr.d_type=qtype.getCode();
     dr.d_class=QClass::IN;
     dr.d_ttl=86400;
@@ -154,7 +154,7 @@ int SyncRes::beginResolve(const DNSName &qname, const QType &qtype, uint16_t qcl
     dr.d_type=qtype.getCode();
     dr.d_class=qclass;
     dr.d_ttl=86400;
-    dr.d_place = DNSRecord::Answer;
+    dr.d_place = DNSResourceRecord::ANSWER;
     if(qname==versionbind  || qname==versionpdns)
       dr.d_content=shared_ptr<DNSRecordContent>(DNSRecordContent::mastermake(QType::TXT, 3, "\""+::arg()["version-string"]+"\""));
     else
@@ -214,7 +214,7 @@ bool SyncRes::doOOBResolve(const DNSName &qname, const QType &qtype, vector<DNSR
     ziter=iter->second.d_records.find(boost::make_tuple(authdomain, QType::SOA));
     if(ziter!=iter->second.d_records.end()) {
       DNSRecord dr=*ziter;
-      dr.d_place=DNSRecord::Nameserver;
+      dr.d_place=DNSResourceRecord::AUTHORITY;
       ret.push_back(dr);
     }
     else
@@ -235,7 +235,7 @@ bool SyncRes::doOOBResolve(const DNSName &qname, const QType &qtype, vector<DNSR
       DNSRecord dr=*ziter;
       if(dr.d_type == qtype.getCode() || qtype.getCode() == QType::ANY) {
         dr.d_name = qname;
-        dr.d_place=DNSRecord::Answer;
+        dr.d_place=DNSResourceRecord::ANSWER;
         ret.push_back(dr);
       }
     }
@@ -253,7 +253,7 @@ bool SyncRes::doOOBResolve(const DNSName &qname, const QType &qtype, vector<DNSR
 
     for(ziter=range.first; ziter!=range.second; ++ziter) {
       DNSRecord dr=*ziter;
-      dr.d_place=DNSRecord::Nameserver;
+      dr.d_place=DNSResourceRecord::AUTHORITY;
       ret.push_back(dr);
     }
   }
@@ -262,7 +262,7 @@ bool SyncRes::doOOBResolve(const DNSName &qname, const QType &qtype, vector<DNSR
     ziter=iter->second.d_records.find(boost::make_tuple(authdomain, QType::SOA));
     if(ziter!=iter->second.d_records.end()) {
       DNSRecord dr=*ziter;
-      dr.d_place=DNSRecord::Nameserver;
+      dr.d_place=DNSResourceRecord::AUTHORITY;
       ret.push_back(dr);
     }
     else {
@@ -396,7 +396,7 @@ int SyncRes::doResolve(const DNSName &qname, const QType &qtype, vector<DNSRecor
           // filter out the good stuff from lwr.result()
 
          for(const auto& rec : lwr.d_records) {
-            if(rec.d_place == DNSRecord::Answer)
+            if(rec.d_place == DNSResourceRecord::ANSWER)
               ret.push_back(rec);
           }
           return res;
@@ -667,7 +667,7 @@ bool SyncRes::doCNAMECacheCheck(const DNSName &qname, const QType &qtype, vector
          dr.d_name=qname;
          dr.d_ttl=j->d_ttl - d_now.tv_sec;
          dr.d_content=signature;
-         dr.d_place=DNSRecord::Answer;
+         dr.d_place=DNSResourceRecord::ANSWER;
          dr.d_class=1;
          ret.push_back(dr);
        }
@@ -767,7 +767,7 @@ bool SyncRes::doCacheCheck(const DNSName &qname, const QType &qtype, vector<DNSR
         DNSRecord dr=*j;
         ttl = (dr.d_ttl-=d_now.tv_sec);
         if(giveNegative) {
-          dr.d_place=DNSRecord::Nameserver;
+          dr.d_place=DNSResourceRecord::AUTHORITY;
           dr.d_ttl=sttl;
         }
         ret.push_back(dr);
@@ -786,7 +786,7 @@ bool SyncRes::doCacheCheck(const DNSName &qname, const QType &qtype, vector<DNSR
       dr.d_name=sqname;
       dr.d_ttl=ttl; 
       dr.d_content=signature;
-      dr.d_place=DNSRecord::Answer;
+      dr.d_place=DNSResourceRecord::ANSWER;
       dr.d_class=1;
       ret.push_back(dr);
     }
@@ -1126,7 +1126,7 @@ int SyncRes::doResolveAt(set<DNSName> nameservers, DNSName auth, bool flawedNSSe
 
 
         if(rec.d_name.isPartOf(auth)) {
-          if(lwr.d_aabit && lwr.d_rcode==RCode::NoError && rec.d_place==DNSRecord::Answer && ::arg().contains("delegation-only",auth.toString() /* ugh */)) {
+          if(lwr.d_aabit && lwr.d_rcode==RCode::NoError && rec.d_place==DNSResourceRecord::ANSWER && ::arg().contains("delegation-only",auth.toString() /* ugh */)) {
             LOG("NO! Is from delegation-only zone"<<endl);
             s_nodelegated++;
             return RCode::NXDomain;
@@ -1140,7 +1140,7 @@ int SyncRes::doResolveAt(set<DNSName> nameservers, DNSName auth, bool flawedNSSe
             rec.d_ttl=min(s_maxcachettl, rec.d_ttl);
 
             DNSRecord dr(rec);
-            dr.d_place=DNSRecord::Answer;
+            dr.d_place=DNSResourceRecord::ANSWER;
 
             dr.d_ttl += d_now.tv_sec;
 
@@ -1174,7 +1174,7 @@ int SyncRes::doResolveAt(set<DNSName> nameservers, DNSName auth, bool flawedNSSe
       DNSName newtarget;
 
       for(auto& rec : lwr.d_records) {
-        if(rec.d_place==DNSRecord::Nameserver && rec.d_type==QType::SOA && 
+        if(rec.d_place==DNSResourceRecord::AUTHORITY && rec.d_type==QType::SOA &&
            lwr.d_rcode==RCode::NXDomain && dottedEndsOn(qname,rec.d_name) && dottedEndsOn(rec.d_name, auth)) {
           LOG(prefix<<qname.toString()<<": got negative caching indication for name '"<<qname.toString()+"' (accept="<<dottedEndsOn(rec.d_name, auth)<<"), newtarget='"<<newtarget.toString()<<"'"<<endl);
 
@@ -1199,16 +1199,16 @@ int SyncRes::doResolveAt(set<DNSName> nameservers, DNSName auth, bool flawedNSSe
 
           negindic=true;
         }
-        else if(rec.d_place==DNSRecord::Answer && rec.d_name == qname && rec.d_type==QType::CNAME && (!(qtype==QType(QType::CNAME)))) {
+        else if(rec.d_place==DNSResourceRecord::ANSWER && rec.d_name == qname && rec.d_type==QType::CNAME && (!(qtype==QType(QType::CNAME)))) {
           ret.push_back(rec);
           newtarget=DNSName(rec.d_content->getZoneRepresentation());
         }
-       else if(d_doDNSSEC && (rec.d_type==QType::RRSIG || rec.d_type==QType::NSEC || rec.d_type==QType::NSEC3) && rec.d_place==DNSRecord::Answer){
+       else if(d_doDNSSEC && (rec.d_type==QType::RRSIG || rec.d_type==QType::NSEC || rec.d_type==QType::NSEC3) && rec.d_place==DNSResourceRecord::ANSWER){
          if(rec.d_type != QType::RRSIG || rec.d_name == qname)
            ret.push_back(rec); // enjoy your DNSSEC
        }
         // for ANY answers we *must* have an authoritative answer, unless we are forwarding recursively
-        else if(rec.d_place==DNSRecord::Answer && rec.d_name == qname &&
+        else if(rec.d_place==DNSResourceRecord::ANSWER && rec.d_name == qname &&
                 (
                  rec.d_type==qtype.getCode() || (lwr.d_aabit && (qtype==QType(QType::ANY) || magicAddrMatch(qtype, QType(rec.d_type)) ) ) || sendRDQuery
                 )
@@ -1220,7 +1220,7 @@ int SyncRes::doResolveAt(set<DNSName> nameservers, DNSName auth, bool flawedNSSe
           done=true;
           ret.push_back(rec);
         }
-        else if(rec.d_place==DNSRecord::Nameserver && qname.isPartOf(rec.d_name) && rec.d_type==QType::NS) {
+        else if(rec.d_place==DNSResourceRecord::AUTHORITY && qname.isPartOf(rec.d_name) && rec.d_type==QType::NS) {
           if(moreSpecificThan(rec.d_name,auth)) {
             newauth=rec.d_name;
             LOG(prefix<<qname.toString()<<": got NS record '"<<rec.d_name.toString()<<"' -> '"<<rec.d_content->getZoneRepresentation()<<"'"<<endl);
@@ -1231,11 +1231,11 @@ int SyncRes::doResolveAt(set<DNSName> nameservers, DNSName auth, bool flawedNSSe
          }
           nsset.insert(DNSName(rec.d_content->getZoneRepresentation()));
         }
-        else if(rec.d_place==DNSRecord::Nameserver && dottedEndsOn(qname,rec.d_name) && rec.d_type==QType::DS) { 
+        else if(rec.d_place==DNSResourceRecord::AUTHORITY && dottedEndsOn(qname,rec.d_name) && rec.d_type==QType::DS) {
          LOG(prefix<<qname.toString()<<": got DS record '"<<rec.d_name.toString()<<"' -> '"<<rec.d_content->getZoneRepresentation()<<"'"<<endl);
          sawDS=true;
        }
-        else if(!done && rec.d_place==DNSRecord::Nameserver && dottedEndsOn(qname,rec.d_name) && rec.d_type==QType::SOA && 
+        else if(!done && rec.d_place==DNSResourceRecord::AUTHORITY && dottedEndsOn(qname,rec.d_name) && rec.d_type==QType::SOA &&
            lwr.d_rcode==RCode::NoError) {
           LOG(prefix<<qname.toString()<<": got negative caching indication for '"<< (qname.toString()+"|"+qtype.getName()+"'") <<endl);
 
index 3d95cf0e6f229ed03b4b0eb45cf2455383257fb5..9496ba0d2db2914dd08a4d4e95b120be77573420 100644 (file)
@@ -998,7 +998,7 @@ int TCPNameserver::doIXFR(shared_ptr<DNSPacket> q, int outsock)
   MOADNSParser mdp(q->getString());
   for(MOADNSParser::answers_t::const_iterator i=mdp.d_answers.begin(); i != mdp.d_answers.end(); ++i) {
     const DNSRecord *rr = &i->first;
-    if (rr->d_type == QType::SOA && rr->d_place == DNSRecord::Nameserver) {
+    if (rr->d_type == QType::SOA && rr->d_place == DNSResourceRecord::AUTHORITY) {
       vector<string>parts;
       stringtok(parts, rr->d_content->getZoneRepresentation());
       if (parts.size() >= 3) {
index 49988ebb737d61d48deb3eab56be5b1e64936693..36f959d5da338cf7fa8f0a4343b82e9599333a05 100644 (file)
@@ -298,7 +298,7 @@ BOOST_AUTO_TEST_CASE(test_opt_record_out) {
   vector<pair<uint16_t,string > > opts;
 
   DNSPacketWriter pw(pak, DNSName("www.powerdns.com"), QType::A);
-  pw.startRecord(DNSName("www.powerdns.com"), QType::A, 16, 1, DNSPacketWriter::ANSWER);
+  pw.startRecord(DNSName("www.powerdns.com"), QType::A, 16, 1, DNSResourceRecord::ANSWER);
   pw.xfrIP(htonl(0x7f000001));
   opts.push_back(pair<uint16_t,string>(3, "powerdns"));
   pw.addOpt(1280, 0, 0, opts);
index 5ff82ef1c2fd11178e7e63fd403dc859c6249503..bbb3ab7fbc2cac4f632fdba427d261f466e81bf9 100644 (file)
@@ -195,7 +195,7 @@ BOOST_AUTO_TEST_CASE(test_PacketCachePacket) {
 
     pak.clear();
     DNSPacketWriter pw2(pak, DNSName("www.powerdns.com"), QType::A);
-    pw2.startRecord(DNSName("www.powerdns.com"), QType::A, 16, 1, DNSPacketWriter::ANSWER);
+    pw2.startRecord(DNSName("www.powerdns.com"), QType::A, 16, 1, DNSResourceRecord::ANSWER);
     pw2.xfrIP(htonl(0x7f000001));
     pw2.commit();