adnstest: Support typenum being 0xXX|DDD
[adns] / client / adnstest.c
1 /*
2 * adnstest.c
3 * - simple test program, not part of the library
4 */
5 /*
6 * This file is part of adns, which is
7 * Copyright (C) 1997-2000,2003,2006,2014 Ian Jackson
8 * Copyright (C) 2014 Mark Wooding
9 * Copyright (C) 1999-2000,2003,2006 Tony Finch
10 * Copyright (C) 1991 Massachusetts Institute of Technology
11 * (See the file INSTALL for full details.)
12 *
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License as published by
15 * the Free Software Foundation; either version 3, or (at your option)
16 * any later version.
17 *
18 * This program is distributed in the hope that it will be useful,
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 * GNU General Public License for more details.
22 *
23 * You should have received a copy of the GNU General Public License
24 * along with this program; if not, write to the Free Software Foundation.
25 */
26
27 #include <stdio.h>
28 #include <sys/time.h>
29 #include <unistd.h>
30 #include <assert.h>
31 #include <stdlib.h>
32 #include <string.h>
33 #include <errno.h>
34
35 #define ADNS_FEATURE_MANYAF
36 #include "config.h"
37 #include "adns.h"
38
39 #ifdef ADNS_REGRESS_TEST
40 # include "hredirect.h"
41 #endif
42
43 struct myctx {
44 adns_query qu;
45 int doneyet, found;
46 const char *fdom;
47 };
48
49 static struct myctx *mcs;
50 static adns_state ads;
51 static adns_rrtype *types_a;
52
53 static void quitnow(int rc) NONRETURNING;
54 static void quitnow(int rc) {
55 free(mcs);
56 free(types_a);
57 if (ads) adns_finish(ads);
58
59 exit(rc);
60 }
61
62 #ifndef HAVE_POLL
63 #undef poll
64 int poll(struct pollfd *ufds, int nfds, int timeout) {
65 fputs("poll(2) not supported on this system\n",stderr);
66 quitnow(5);
67 }
68 #define adns_beforepoll(a,b,c,d,e) 0
69 #define adns_afterpoll(a,b,c,d) 0
70 #endif
71
72 static void failure_status(const char *what, adns_status st) NONRETURNING;
73 static void failure_status(const char *what, adns_status st) {
74 fprintf(stderr,"adns failure: %s: %s\n",what,adns_strerror(st));
75 quitnow(2);
76 }
77
78 static void failure_errno(const char *what, int errnoval) NONRETURNING;
79 static void failure_errno(const char *what, int errnoval) {
80 switch (errnoval) {
81 #define CE(e) \
82 case e: fprintf(stderr,"adns failure: %s: errno=" #e "\n",what); break
83 CE(EINVAL);
84 CE(EINTR);
85 CE(ESRCH);
86 CE(EAGAIN);
87 CE(ENOSYS);
88 CE(ERANGE);
89 #undef CE
90 default: fprintf(stderr,"adns failure: %s: errno=%d\n",what,errnoval); break;
91 }
92 quitnow(2);
93 }
94
95 static void usageerr(const char *why) NONRETURNING;
96 static void usageerr(const char *why) {
97 fprintf(stderr,
98 "bad usage: %s\n"
99 "usage: adnstest [-<initflagsnum>[,<owninitflags>]] [/<initstring>]\n"
100 " [ :<typenum>,... ]\n"
101 " [ [<queryflagsnum>[,<ownqueryflags>]/]<domain> ... ]\n"
102 "initflags: p use poll(2) instead of select(2)\n"
103 " s use adns_wait with specified query, instead of 0\n"
104 "queryflags: a print status abbrevs instead of strings\n"
105 "typenum: may be 0x<hex>|<dec>, or 0x<hex> or <dec>\n"
106 "exit status: 0 ok (though some queries may have failed)\n"
107 " 1 used by test harness to indicate test failed\n"
108 " 2 unable to submit or init or some such\n"
109 " 3 unexpected failure\n"
110 " 4 usage error\n"
111 " 5 operation not supported on this system\n",
112 why);
113 quitnow(4);
114 }
115
116 static const adns_rrtype defaulttypes[]= {
117 adns_r_a,
118 adns_r_ns_raw,
119 adns_r_cname,
120 adns_r_soa_raw,
121 adns_r_ptr_raw,
122 adns_r_hinfo,
123 adns_r_mx_raw,
124 adns_r_txt,
125 adns_r_rp_raw,
126
127 adns_r_addr,
128 adns_r_ns,
129 adns_r_ptr,
130 adns_r_mx,
131
132 adns_r_soa,
133 adns_r_rp,
134
135 adns_r_none
136 };
137
138 static void dumptype(adns_status ri, const char *rrtn, const char *fmtn) {
139 fprintf(stdout, "%s(%s)%s%s",
140 (!ri && rrtn) ? rrtn : "?", ri ? "?" : fmtn ? fmtn : "-",
141 ri ? " " : "", ri ? adns_strerror(ri) : "");
142 }
143
144 static void fdom_split(const char *fdom, const char **dom_r, int *qf_r,
145 char *ownflags, int ownflags_l) {
146 int qf;
147 char *ep;
148
149 qf= strtoul(fdom,&ep,0);
150 if (*ep == ',' && strchr(ep,'/')) {
151 ep++;
152 while (*ep != '/') {
153 if (--ownflags_l <= 0) { fputs("too many flags\n",stderr); quitnow(3); }
154 *ownflags++= *ep++;
155 }
156 }
157 if (*ep != '/') { *dom_r= fdom; *qf_r= 0; }
158 else { *dom_r= ep+1; *qf_r= qf; }
159 *ownflags= 0;
160 }
161
162 static int consistsof(const char *string, const char *accept) {
163 return strspn(string,accept) == strlen(string);
164 }
165
166 int main(int argc, char *const *argv) {
167 adns_query qu;
168 struct myctx *mc, *mcw;
169 void *mcr;
170 adns_answer *ans;
171 const char *initstring, *rrtn, *fmtn;
172 const char *const *fdomlist, *domain;
173 char *show, *cp;
174 int len, i, qc, qi, tc, ti, ch, qflags, initflagsnum;
175 adns_status ri;
176 int r;
177 const adns_rrtype *types;
178 struct timeval now;
179 char ownflags[10];
180 char *ep;
181 const char *initflags, *owninitflags;
182
183 if (argv[0] && argv[1] && argv[1][0] == '-') {
184 initflags= argv[1]+1;
185 argv++;
186 } else {
187 initflags= "";
188 }
189 if (argv[0] && argv[1] && argv[1][0] == '/') {
190 initstring= argv[1]+1;
191 argv++;
192 } else {
193 initstring= 0;
194 }
195
196 initflagsnum= strtoul(initflags,&ep,0);
197 if (*ep == ',') {
198 owninitflags= ep+1;
199 if (!consistsof(owninitflags,"ps")) usageerr("unknown owninitflag");
200 } else if (!*ep) {
201 owninitflags= "";
202 } else {
203 usageerr("bad <initflagsnum>[,<owninitflags>]");
204 }
205
206 if (argv[0] && argv[1] && argv[1][0] == ':') {
207 for (cp= argv[1]+1, tc=1; (ch= *cp); cp++)
208 if (ch==',') tc++;
209 types_a= malloc(sizeof(*types_a)*(tc+1));
210 if (!types_a) { perror("malloc types"); quitnow(3); }
211 for (cp= argv[1]+1, ti=0; ti<tc; ) {
212 types_a[ti]= 0;
213 for (;;) {
214 types_a[ti] |= strtoul(cp,&cp,0);
215 ch= *cp;
216 if (!ch) break;
217 cp++;
218 if (ch=='|') continue;
219 if (ch==',') break;
220 usageerr("unexpected char (not comma) in or between types");
221 }
222 ti++;
223 if (!ch) break;
224 }
225 types_a[ti]= adns_r_none;
226 types= types_a;
227 argv++;
228 } else {
229 types_a= 0;
230 types= defaulttypes;
231 }
232
233 if (!(argv[0] && argv[1])) usageerr("no query domains supplied");
234 fdomlist= (const char *const*)argv+1;
235
236 for (qc=0; fdomlist[qc]; qc++);
237 for (tc=0; types[tc] != adns_r_none; tc++);
238 mcs= malloc(tc ? sizeof(*mcs)*qc*tc : 1);
239 if (!mcs) { perror("malloc mcs"); quitnow(3); }
240
241 setvbuf(stdout,0,_IOLBF,0);
242
243 if (initstring) {
244 r= adns_init_strcfg(&ads,
245 (adns_if_debug|adns_if_noautosys|adns_if_checkc_freq)
246 ^initflagsnum,
247 stdout,initstring);
248 } else {
249 r= adns_init(&ads,
250 (adns_if_debug|adns_if_noautosys)^initflagsnum,
251 0);
252 }
253 if (r) failure_errno("init",r);
254
255 for (qi=0; qi<qc; qi++) {
256 fdom_split(fdomlist[qi],&domain,&qflags,ownflags,sizeof(ownflags));
257 if (!consistsof(ownflags,"a")) usageerr("unknown ownqueryflag");
258 for (ti=0; ti<tc; ti++) {
259 mc= &mcs[qi*tc+ti];
260 mc->doneyet= 0;
261 mc->fdom= fdomlist[qi];
262
263 fprintf(stdout,"%s flags %d type %d",
264 domain,qflags,types[ti]&adns_rrt_reprmask);
265 r= adns_submit(ads,domain,types[ti],qflags,mc,&mc->qu);
266 if (r == ENOSYS) {
267 fprintf(stdout," not implemented\n");
268 mc->qu= 0;
269 mc->doneyet= 1;
270 } else if (r) {
271 failure_errno("submit",r);
272 } else {
273 ri= adns_rr_info(types[ti], &rrtn,&fmtn,0, 0,0);
274 putc(' ',stdout);
275 dumptype(ri,rrtn,fmtn);
276 fprintf(stdout," submitted\n");
277 }
278 }
279 }
280
281 for (;;) {
282 for (qi=0; qi<qc; qi++) {
283 for (ti=0; ti<tc; ti++) {
284 mc= &mcs[qi*tc+ti];
285 mc->found= 0;
286 }
287 }
288 for (adns_forallqueries_begin(ads);
289 (qu= adns_forallqueries_next(ads,&mcr));
290 ) {
291 mc= mcr;
292 assert(qu == mc->qu);
293 assert(!mc->doneyet);
294 mc->found= 1;
295 }
296 mcw= 0;
297 for (qi=0; qi<qc; qi++) {
298 for (ti=0; ti<tc; ti++) {
299 mc= &mcs[qi*tc+ti];
300 if (mc->doneyet) continue;
301 assert(mc->found);
302 if (!mcw) mcw= mc;
303 }
304 }
305 if (!mcw) break;
306
307 if (strchr(owninitflags,'s')) {
308 qu= mcw->qu;
309 mc= mcw;
310 } else {
311 qu= 0;
312 mc= 0;
313 }
314
315 if (strchr(owninitflags,'p')) {
316 r= adns_wait_poll(ads,&qu,&ans,&mcr);
317 } else {
318 r= adns_wait(ads,&qu,&ans,&mcr);
319 }
320 if (r) failure_errno("wait/check",r);
321
322 if (mc) assert(mcr==mc);
323 else mc= mcr;
324 assert(qu==mc->qu);
325 assert(!mc->doneyet);
326
327 fdom_split(mc->fdom,&domain,&qflags,ownflags,sizeof(ownflags));
328
329 if (gettimeofday(&now,0)) { perror("gettimeofday"); quitnow(3); }
330
331 ri= adns_rr_info(ans->type, &rrtn,&fmtn,&len, 0,0);
332 fprintf(stdout, "%s flags %d type ",domain,qflags);
333 dumptype(ri,rrtn,fmtn);
334 fprintf(stdout, "%s%s: %s; nrrs=%d; cname=%s; owner=%s; ttl=%ld\n",
335 ownflags[0] ? " ownflags=" : "", ownflags,
336 strchr(ownflags,'a')
337 ? adns_errabbrev(ans->status)
338 : adns_strerror(ans->status),
339 ans->nrrs,
340 ans->cname ? ans->cname : "$",
341 ans->owner ? ans->owner : "$",
342 (long)ans->expires - (long)now.tv_sec);
343 if (ans->nrrs) {
344 assert(!ri);
345 for (i=0; i<ans->nrrs; i++) {
346 ri= adns_rr_info(ans->type, 0,0,0, ans->rrs.bytes + i*len, &show);
347 if (ri) failure_status("info",ri);
348 fprintf(stdout," %s\n",show);
349 free(show);
350 }
351 }
352 free(ans);
353
354 mc->doneyet= 1;
355 }
356
357 quitnow(0);
358 }