1672b6d12c
Motivation: Sometimes DNS responses can be very large which mean they will not fit in a UDP packet. When this is happening the DNS server will set the TC flag (truncated flag) to tell the resolver that the response was truncated. When a truncated response was received we should allow to retry via TCP and use the received response (if possible) as a replacement for the truncated one. See https://tools.ietf.org/html/rfc7766. Modifications: - Add support for TCP fallback by allow to specify a socketChannelFactory / socketChannelType on the DnsNameResolverBuilder. If this is set to something different then null we will try to fallback to TCP. - Add decoder / encoder for TCP - Add unit tests Result: Support for TCP fallback as defined by https://tools.ietf.org/html/rfc7766 when using DnsNameResolver.
76 lines
2.6 KiB
Java
76 lines
2.6 KiB
Java
/*
|
|
* Copyright 2019 The Netty Project
|
|
*
|
|
* The Netty Project licenses this file to you under the Apache License,
|
|
* version 2.0 (the "License"); you may not use this file except in compliance
|
|
* with the License. You may obtain a copy of the License at:
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
* License for the specific language governing permissions and limitations
|
|
* under the License.
|
|
*/
|
|
package io.netty.handler.codec.dns;
|
|
|
|
import io.netty.buffer.ByteBuf;
|
|
|
|
import static io.netty.util.internal.ObjectUtil.checkNotNull;
|
|
|
|
final class DnsQueryEncoder {
|
|
|
|
private final DnsRecordEncoder recordEncoder;
|
|
|
|
/**
|
|
* Creates a new encoder with the specified {@code recordEncoder}.
|
|
*/
|
|
DnsQueryEncoder(DnsRecordEncoder recordEncoder) {
|
|
this.recordEncoder = checkNotNull(recordEncoder, "recordEncoder");
|
|
}
|
|
|
|
/**
|
|
* Encodes the given {@link DnsQuery} into a {@link ByteBuf}.
|
|
*/
|
|
void encode(DnsQuery query, ByteBuf out) throws Exception {
|
|
encodeHeader(query, out);
|
|
encodeQuestions(query, out);
|
|
encodeRecords(query, DnsSection.ADDITIONAL, out);
|
|
}
|
|
|
|
/**
|
|
* Encodes the header that is always 12 bytes long.
|
|
*
|
|
* @param query the query header being encoded
|
|
* @param buf the buffer the encoded data should be written to
|
|
*/
|
|
private static void encodeHeader(DnsQuery query, ByteBuf buf) {
|
|
buf.writeShort(query.id());
|
|
int flags = 0;
|
|
flags |= (query.opCode().byteValue() & 0xFF) << 14;
|
|
if (query.isRecursionDesired()) {
|
|
flags |= 1 << 8;
|
|
}
|
|
buf.writeShort(flags);
|
|
buf.writeShort(query.count(DnsSection.QUESTION));
|
|
buf.writeShort(0); // answerCount
|
|
buf.writeShort(0); // authorityResourceCount
|
|
buf.writeShort(query.count(DnsSection.ADDITIONAL));
|
|
}
|
|
|
|
private void encodeQuestions(DnsQuery query, ByteBuf buf) throws Exception {
|
|
final int count = query.count(DnsSection.QUESTION);
|
|
for (int i = 0; i < count; i++) {
|
|
recordEncoder.encodeQuestion((DnsQuestion) query.recordAt(DnsSection.QUESTION, i), buf);
|
|
}
|
|
}
|
|
|
|
private void encodeRecords(DnsQuery query, DnsSection section, ByteBuf buf) throws Exception {
|
|
final int count = query.count(section);
|
|
for (int i = 0; i < count; i++) {
|
|
recordEncoder.encodeRecord(query.recordAt(section, i), buf);
|
|
}
|
|
}
|
|
}
|