srv processing written (except for sorting); now to be debugged
[adns] / client / adnstest.c
1 /*
2 * adnstest.c
3 * - simple test program, not part of the library
4 */
5 /*
6 * This file is
7 * Copyright (C) 1997-2000 Ian Jackson <ian@davenant.greenend.org.uk>
8 *
9 * It is part of adns, which is
10 * Copyright (C) 1997-2000 Ian Jackson <ian@davenant.greenend.org.uk>
11 * Copyright (C) 1999-2000 Tony Finch <dot@dotat.at>
12 *
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License as published by
15 * the Free Software Foundation; either version 2, or (at your option)
16 * any later version.
17 *
18 * This program is distributed in the hope that it will be useful,
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 * GNU General Public License for more details.
22 *
23 * You should have received a copy of the GNU General Public License
24 * along with this program; if not, write to the Free Software Foundation,
25 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
26 */
27
28 #include <stdio.h>
29 #include <sys/time.h>
30 #include <unistd.h>
31 #include <assert.h>
32 #include <stdlib.h>
33 #include <string.h>
34 #include <errno.h>
35
36 #include "config.h"
37 #include "adns.h"
38
39 #ifdef ADNS_REGRESS_TEST
40 # include "hredirect.h"
41 #endif
42
43 struct myctx {
44 adns_query qu;
45 int doneyet, found;
46 const char *fdom;
47 };
48
49 static struct myctx *mcs;
50 static adns_state ads;
51 static adns_rrtype *types_a;
52
53 static void quitnow(int rc) NONRETURNING;
54 static void quitnow(int rc) {
55 free(mcs);
56 free(types_a);
57 if (ads) adns_finish(ads);
58
59 exit(rc);
60 }
61
62 #ifndef HAVE_POLL
63 #undef poll
64 int poll(struct pollfd *ufds, int nfds, int timeout) {
65 fputs("poll(2) not supported on this system\n",stderr);
66 quitnow(5);
67 }
68 #define adns_beforepoll(a,b,c,d,e) 0
69 #define adns_afterpoll(a,b,c,d) 0
70 #endif
71
72 static void failure_status(const char *what, adns_status st) NONRETURNING;
73 static void failure_status(const char *what, adns_status st) {
74 fprintf(stderr,"adns failure: %s: %s\n",what,adns_strerror(st));
75 quitnow(2);
76 }
77
78 static void failure_errno(const char *what, int errnoval) NONRETURNING;
79 static void failure_errno(const char *what, int errnoval) {
80 switch (errnoval) {
81 #define CE(e) \
82 case e: fprintf(stderr,"adns failure: %s: errno=" #e "\n",what); break
83 CE(EINVAL);
84 CE(EINTR);
85 CE(ESRCH);
86 CE(EAGAIN);
87 CE(ENOSYS);
88 CE(ERANGE);
89 #undef CE
90 default: fprintf(stderr,"adns failure: %s: errno=%d\n",what,errnoval); break;
91 }
92 quitnow(2);
93 }
94
95 static void usageerr(const char *why) NONRETURNING;
96 static void usageerr(const char *why) {
97 fprintf(stderr,
98 "bad usage: %s\n"
99 "usage: adnstest [-<initflagsnum>[,<owninitflags>]] [/<initstring>]\n"
100 " [ :<typenum>,... ]\n"
101 " [ [<queryflagsnum>[,<ownqueryflags>]/]<domain> ... ]\n"
102 "initflags: p use poll(2) instead of select(2)\n"
103 " s use adns_wait with specified query, instead of 0\n"
104 "queryflags: a print status abbrevs instead of strings\n"
105 "exit status: 0 ok (though some queries may have failed)\n"
106 " 1 used by test harness to indicate test failed\n"
107 " 2 unable to submit or init or some such\n"
108 " 3 unexpected failure\n"
109 " 4 usage error\n"
110 " 5 operation not supported on this system\n",
111 why);
112 quitnow(4);
113 }
114
115 static const adns_rrtype defaulttypes[]= {
116 adns_r_a,
117 adns_r_ns_raw,
118 adns_r_cname,
119 adns_r_soa_raw,
120 adns_r_ptr_raw,
121 adns_r_hinfo,
122 adns_r_mx_raw,
123 adns_r_txt,
124 adns_r_rp_raw,
125 adns_r_srv_raw,
126
127 adns_r_addr,
128 adns_r_ns,
129 adns_r_ptr,
130 adns_r_mx,
131 adns_r_srv,
132
133 adns_r_soa,
134 adns_r_rp,
135
136 adns_r_none
137 };
138
139 static void dumptype(adns_status ri, const char *rrtn, const char *fmtn) {
140 fprintf(stdout, "%s(%s)%s%s",
141 ri ? "?" : rrtn, ri ? "?" : fmtn ? fmtn : "-",
142 ri ? " " : "", ri ? adns_strerror(ri) : "");
143 }
144
145 static void fdom_split(const char *fdom, const char **dom_r, int *qf_r,
146 char *ownflags, int ownflags_l) {
147 int qf;
148 char *ep;
149
150 qf= strtoul(fdom,&ep,0);
151 if (*ep == ',' && strchr(ep,'/')) {
152 ep++;
153 while (*ep != '/') {
154 if (--ownflags_l <= 0) { fputs("too many flags\n",stderr); quitnow(3); }
155 *ownflags++= *ep++;
156 }
157 }
158 if (*ep != '/') { *dom_r= fdom; *qf_r= 0; }
159 else { *dom_r= ep+1; *qf_r= qf; }
160 *ownflags= 0;
161 }
162
163 static int consistsof(const char *string, const char *accept) {
164 return strspn(string,accept) == strlen(string);
165 }
166
167 int main(int argc, char *const *argv) {
168 adns_query qu;
169 struct myctx *mc, *mcw;
170 void *mcr;
171 adns_answer *ans;
172 const char *initstring, *rrtn, *fmtn;
173 const char *const *fdomlist, *domain;
174 char *show, *cp;
175 int len, i, qc, qi, tc, ti, ch, qflags, initflagsnum;
176 adns_status ri;
177 int r;
178 const adns_rrtype *types;
179 struct timeval now;
180 char ownflags[10];
181 char *ep;
182 const char *initflags, *owninitflags;
183
184 if (argv[0] && argv[1] && argv[1][0] == '-') {
185 initflags= argv[1]+1;
186 argv++;
187 } else {
188 initflags= "";
189 }
190 if (argv[0] && argv[1] && argv[1][0] == '/') {
191 initstring= argv[1]+1;
192 argv++;
193 } else {
194 initstring= 0;
195 }
196
197 initflagsnum= strtoul(initflags,&ep,0);
198 if (*ep == ',') {
199 owninitflags= ep+1;
200 if (!consistsof(owninitflags,"ps")) usageerr("unknown owninitflag");
201 } else if (!*ep) {
202 owninitflags= "";
203 } else {
204 usageerr("bad <initflagsnum>[,<owninitflags>]");
205 }
206
207 if (argv[0] && argv[1] && argv[1][0] == ':') {
208 for (cp= argv[1]+1, tc=1; (ch= *cp); cp++)
209 if (ch==',') tc++;
210 types_a= malloc(sizeof(*types_a)*(tc+1));
211 if (!types_a) { perror("malloc types"); quitnow(3); }
212 for (cp= argv[1]+1, ti=0; ti<tc; ti++) {
213 types_a[ti]= strtoul(cp,&cp,10);
214 if ((ch= *cp)) {
215 if (ch != ',') usageerr("unexpected char (not comma) in or between types");
216 cp++;
217 }
218 }
219 types_a[ti]= adns_r_none;
220 types= types_a;
221 argv++;
222 } else {
223 types_a= 0;
224 types= defaulttypes;
225 }
226
227 if (!(argv[0] && argv[1])) usageerr("no query domains supplied");
228 fdomlist= (const char *const*)argv+1;
229
230 for (qc=0; fdomlist[qc]; qc++);
231 for (tc=0; types[tc] != adns_r_none; tc++);
232 mcs= malloc(tc ? sizeof(*mcs)*qc*tc : 1);
233 if (!mcs) { perror("malloc mcs"); quitnow(3); }
234
235 setvbuf(stdout,0,_IOLBF,0);
236
237 if (initstring) {
238 r= adns_init_strcfg(&ads,
239 (adns_if_debug|adns_if_noautosys|adns_if_checkc_freq)
240 ^initflagsnum,
241 stdout,initstring);
242 } else {
243 r= adns_init(&ads,
244 (adns_if_debug|adns_if_noautosys)^initflagsnum,
245 0);
246 }
247 if (r) failure_errno("init",r);
248
249 for (qi=0; qi<qc; qi++) {
250 fdom_split(fdomlist[qi],&domain,&qflags,ownflags,sizeof(ownflags));
251 if (!consistsof(ownflags,"a")) usageerr("unknown ownqueryflag");
252 for (ti=0; ti<tc; ti++) {
253 mc= &mcs[qi*tc+ti];
254 mc->doneyet= 0;
255 mc->fdom= fdomlist[qi];
256
257 fprintf(stdout,"%s flags %d type %d",domain,qflags,types[ti]);
258 r= adns_submit(ads,domain,types[ti],qflags,mc,&mc->qu);
259 if (r == ENOSYS) {
260 fprintf(stdout," not implemented\n");
261 mc->qu= 0;
262 mc->doneyet= 1;
263 } else if (r) {
264 failure_errno("submit",r);
265 } else {
266 ri= adns_rr_info(types[ti], &rrtn,&fmtn,0, 0,0);
267 putc(' ',stdout);
268 dumptype(ri,rrtn,fmtn);
269 fprintf(stdout," submitted\n");
270 }
271 }
272 }
273
274 for (;;) {
275 for (qi=0; qi<qc; qi++) {
276 for (ti=0; ti<tc; ti++) {
277 mc= &mcs[qi*tc+ti];
278 mc->found= 0;
279 }
280 }
281 for (adns_forallqueries_begin(ads);
282 (qu= adns_forallqueries_next(ads,&mcr));
283 ) {
284 mc= mcr;
285 assert(qu == mc->qu);
286 assert(!mc->doneyet);
287 mc->found= 1;
288 }
289 mcw= 0;
290 for (qi=0; qi<qc; qi++) {
291 for (ti=0; ti<tc; ti++) {
292 mc= &mcs[qi*tc+ti];
293 if (mc->doneyet) continue;
294 assert(mc->found);
295 if (!mcw) mcw= mc;
296 }
297 }
298 if (!mcw) break;
299
300 if (strchr(owninitflags,'s')) {
301 qu= mcw->qu;
302 mc= mcw;
303 } else {
304 qu= 0;
305 mc= 0;
306 }
307
308 if (strchr(owninitflags,'p')) {
309 r= adns_wait_poll(ads,&qu,&ans,&mcr);
310 } else {
311 r= adns_wait(ads,&qu,&ans,&mcr);
312 }
313 if (r) failure_errno("wait/check",r);
314
315 if (mc) assert(mcr==mc);
316 else mc= mcr;
317 assert(qu==mc->qu);
318 assert(!mc->doneyet);
319
320 fdom_split(mc->fdom,&domain,&qflags,ownflags,sizeof(ownflags));
321
322 if (gettimeofday(&now,0)) { perror("gettimeofday"); quitnow(3); }
323
324 ri= adns_rr_info(ans->type, &rrtn,&fmtn,&len, 0,0);
325 fprintf(stdout, "%s flags %d type ",domain,qflags);
326 dumptype(ri,rrtn,fmtn);
327 fprintf(stdout, "%s%s: %s; nrrs=%d; cname=%s; owner=%s; ttl=%ld\n",
328 ownflags[0] ? " ownflags=" : "", ownflags,
329 strchr(ownflags,'a')
330 ? adns_errabbrev(ans->status)
331 : adns_strerror(ans->status),
332 ans->nrrs,
333 ans->cname ? ans->cname : "$",
334 ans->owner ? ans->owner : "$",
335 (long)ans->expires - (long)now.tv_sec);
336 if (ans->nrrs) {
337 assert(!ri);
338 for (i=0; i<ans->nrrs; i++) {
339 ri= adns_rr_info(ans->type, 0,0,0, ans->rrs.bytes + i*len, &show);
340 if (ri) failure_status("info",ri);
341 fprintf(stdout," %s\n",show);
342 free(show);
343 }
344 }
345 free(ans);
346
347 mc->doneyet= 1;
348 }
349
350 quitnow(0);
351 }