=head1 NAME AnyEvent::DNS - fully asynchronous DNS resolution =head1 SYNOPSIS use AnyEvent::DNS; my $cv = AnyEvent->condvar; AnyEvent::DNS::a "www.google.de", $cv; # ... later my @addrs = $cv->recv; =head1 DESCRIPTION This module offers both a number of DNS convenience functions as well as a fully asynchronous and high-performance pure-perl stub resolver. The stub resolver supports DNS over IPv4 and IPv6, UDP and TCP, optional EDNS0 support for up to 4kiB datagrams and automatically falls back to virtual circuit mode for large responses. =head2 CONVENIENCE FUNCTIONS =over 4 =cut package AnyEvent::DNS; no warnings; use strict; use Socket qw(AF_INET SOCK_DGRAM SOCK_STREAM); use AnyEvent (); use AnyEvent::Handle (); use AnyEvent::Util qw(AF_INET6); our $VERSION = '1.0'; our @DNS_FALLBACK = (v208.67.220.220, v208.67.222.222); =item AnyEvent::DNS::a $domain, $cb->(@addrs) Tries to resolve the given domain to IPv4 address(es). =item AnyEvent::DNS::aaaa $domain, $cb->(@addrs) Tries to resolve the given domain to IPv6 address(es). =item AnyEvent::DNS::mx $domain, $cb->(@hostnames) Tries to resolve the given domain into a sorted (lower preference value first) list of domain names. =item AnyEvent::DNS::ns $domain, $cb->(@hostnames) Tries to resolve the given domain name into a list of name servers. =item AnyEvent::DNS::txt $domain, $cb->(@hostnames) Tries to resolve the given domain name into a list of text records. =item AnyEvent::DNS::srv $service, $proto, $domain, $cb->(@srv_rr) Tries to resolve the given service, protocol and domain name into a list of service records. Each srv_rr is an array reference with the following contents: C<[$priority, $weight, $transport, $target]>. They will be sorted with lowest priority, highest weight first (TODO: should use the RFC algorithm to reorder same-priority records for weight). Example: AnyEvent::DNS::srv "sip", "udp", "schmorp.de", sub { ... # @_ = ( [10, 10, 5060, "sip1.schmorp.de" ] ) =item AnyEvent::DNS::ptr $domain, $cb->(@hostnames) Tries to make a PTR lookup on the given domain. See C and C if you want to resolve an IP address to a hostname instead. =item AnyEvent::DNS::any $domain, $cb->(@rrs) Tries to resolve the given domain and passes all resource records found to the callback. =item AnyEvent::DNS::reverse_lookup $ipv4_or_6, $cb->(@hostnames) Tries to reverse-resolve the given IPv4 or IPv6 address (in textual form) into it's hostname(s). Handles V4MAPPED and V4COMPAT IPv6 addresses transparently. =item AnyEvent::DNS::reverse_verify $ipv4_or_6, $cb->(@hostnames) The same as C, but does forward-lookups to verify that the resolved hostnames indeed point to the address, which makes spoofing harder. If you want to resolve an address into a hostname, this is the preferred method: The DNS records could still change, but at least this function verified that the hostname, at one point in the past, pointed at the IP address you originally resolved. Example: AnyEvent::DNS::ptr "2001:500:2f::f", sub { print shift }; # => f.root-servers.net =cut sub MAX_PKT() { 4096 } # max packet size we advertise and accept sub DOMAIN_PORT() { 53 } # if this changes drop me a note sub resolver; sub a($$) { my ($domain, $cb) = @_; resolver->resolve ($domain => "a", sub { $cb->(map $_->[3], @_); }); } sub aaaa($$) { my ($domain, $cb) = @_; resolver->resolve ($domain => "aaaa", sub { $cb->(map $_->[3], @_); }); } sub mx($$) { my ($domain, $cb) = @_; resolver->resolve ($domain => "mx", sub { $cb->(map $_->[4], sort { $a->[3] <=> $b->[3] } @_); }); } sub ns($$) { my ($domain, $cb) = @_; resolver->resolve ($domain => "ns", sub { $cb->(map $_->[3], @_); }); } sub txt($$) { my ($domain, $cb) = @_; resolver->resolve ($domain => "txt", sub { $cb->(map $_->[3], @_); }); } sub srv($$$$) { my ($service, $proto, $domain, $cb) = @_; # todo, ask for any and check glue records resolver->resolve ("_$service._$proto.$domain" => "srv", sub { $cb->(map [@$_[3,4,5,6]], sort { $a->[3] <=> $b->[3] || $b->[4] <=> $a->[4] } @_); }); } sub ptr($$) { my ($domain, $cb) = @_; resolver->resolve ($domain => "ptr", sub { $cb->(map $_->[3], @_); }); } sub any($$) { my ($domain, $cb) = @_; resolver->resolve ($domain => "*", $cb); } # convert textual ip address into reverse lookup form sub _munge_ptr($) { my $ipn = $_[0] or return; my $ptr; my $af = AnyEvent::Socket::address_family ($ipn); if ($af == AF_INET6) { $ipn = substr $ipn, 0, 16; # anticipate future expansion # handle v4mapped and v4compat if ($ipn =~ s/^\x00{10}(?:\xff\xff|\x00\x00)//) { $af = AF_INET; } else { $ptr = join ".", (reverse split //, unpack "H32", $ipn), "ip6.arpa."; } } if ($af == AF_INET) { $ptr = join ".", (reverse unpack "C4", $ipn), "in-addr.arpa."; } $ptr } sub reverse_lookup($$) { my ($ip, $cb) = @_; $ip = _munge_ptr AnyEvent::Socket::parse_address ($ip) or return $cb->(); resolver->resolve ($ip => "ptr", sub { $cb->(map $_->[3], @_); }); } sub reverse_verify($$) { my ($ip, $cb) = @_; my $ipn = AnyEvent::Socket::parse_address ($ip) or return $cb->(); my $af = AnyEvent::Socket::address_family ($ipn); my @res; my $cnt; my $ptr = _munge_ptr $ipn or return $cb->(); $ip = AnyEvent::Socket::format_address ($ipn); # normalise into the same form ptr $ptr, sub { for my $name (@_) { ++$cnt; # () around AF_INET to work around bug in 5.8 resolver->resolve ($name => ($af == (AF_INET) ? "a" : "aaaa"), sub { for (@_) { push @res, $name if $_->[3] eq $ip; } $cb->(@res) unless --$cnt; }); } $cb->() unless $cnt; }; } ################################################################################# =back =head2 LOW-LEVEL DNS EN-/DECODING FUNCTIONS =over 4 =item $AnyEvent::DNS::EDNS0 This variable decides whether dns_pack automatically enables EDNS0 support. By default, this is disabled (C<0>), unless overridden by C<$ENV{PERL_ANYEVENT_EDNS0}>, but when set to C<1>, AnyEvent::DNS will use EDNS0 in all requests. =cut our $EDNS0 = $ENV{PERL_ANYEVENT_EDNS0} * 1; # set to 1 to enable (partial) edns0 our %opcode_id = ( query => 0, iquery => 1, status => 2, notify => 4, update => 5, map +($_ => $_), 3, 6..15 ); our %opcode_str = reverse %opcode_id; our %rcode_id = ( noerror => 0, formerr => 1, servfail => 2, nxdomain => 3, notimp => 4, refused => 5, yxdomain => 6, # Name Exists when it should not [RFC 2136] yxrrset => 7, # RR Set Exists when it should not [RFC 2136] nxrrset => 8, # RR Set that should exist does not [RFC 2136] notauth => 9, # Server Not Authoritative for zone [RFC 2136] notzone => 10, # Name not contained in zone [RFC 2136] # EDNS0 16 BADVERS Bad OPT Version [RFC 2671] # EDNS0 16 BADSIG TSIG Signature Failure [RFC 2845] # EDNS0 17 BADKEY Key not recognized [RFC 2845] # EDNS0 18 BADTIME Signature out of time window [RFC 2845] # EDNS0 19 BADMODE Bad TKEY Mode [RFC 2930] # EDNS0 20 BADNAME Duplicate key name [RFC 2930] # EDNS0 21 BADALG Algorithm not supported [RFC 2930] map +($_ => $_), 11..15 ); our %rcode_str = reverse %rcode_id; our %type_id = ( a => 1, ns => 2, md => 3, mf => 4, cname => 5, soa => 6, mb => 7, mg => 8, mr => 9, null => 10, wks => 11, ptr => 12, hinfo => 13, minfo => 14, mx => 15, txt => 16, aaaa => 28, srv => 33, naptr => 35, # rfc2915 opt => 41, spf => 99, tkey => 249, tsig => 250, ixfr => 251, axfr => 252, mailb => 253, "*" => 255, ); our %type_str = reverse %type_id; our %class_id = ( in => 1, ch => 3, hs => 4, none => 254, "*" => 255, ); our %class_str = reverse %class_id; sub _enc_name($) { pack "(C/a*)*", (split /\./, shift), "" } sub _enc_qd() { (_enc_name $_->[0]) . pack "nn", ($_->[1] > 0 ? $_->[1] : $type_id {$_->[1]}), ($_->[2] > 0 ? $_->[2] : $class_id{$_->[2] || "in"}) } sub _enc_rr() { die "encoding of resource records is not supported"; } =item $pkt = AnyEvent::DNS::dns_pack $dns Packs a perl data structure into a DNS packet. Reading RFC1034 is strongly recommended, then everything will be totally clear. Or maybe not. Resource records are not yet encodable. Examples: # very simple request, using lots of default values: { rd => 1, qd => [ [ "host.domain", "a"] ] } # more complex example, showing how flags etc. are named: { id => 10000, op => "query", rc => "nxdomain", # flags qr => 1, aa => 0, tc => 0, rd => 0, ra => 0, ad => 0, cd => 0, qd => [@rr], # query section an => [@rr], # answer section ns => [@rr], # authority section ar => [@rr], # additional records section } =cut sub dns_pack($) { my ($req) = @_; pack "nn nnnn a* a* a* a* a*", $req->{id}, ! !$req->{qr} * 0x8000 + $opcode_id{$req->{op}} * 0x0800 + ! !$req->{aa} * 0x0400 + ! !$req->{tc} * 0x0200 + ! !$req->{rd} * 0x0100 + ! !$req->{ra} * 0x0080 + ! !$req->{ad} * 0x0020 + ! !$req->{cd} * 0x0010 + $rcode_id{$req->{rc}} * 0x0001, scalar @{ $req->{qd} || [] }, scalar @{ $req->{an} || [] }, scalar @{ $req->{ns} || [] }, $EDNS0 + scalar @{ $req->{ar} || [] }, # EDNS0 option included here (join "", map _enc_qd, @{ $req->{qd} || [] }), (join "", map _enc_rr, @{ $req->{an} || [] }), (join "", map _enc_rr, @{ $req->{ns} || [] }), (join "", map _enc_rr, @{ $req->{ar} || [] }), ($EDNS0 ? pack "C nnNn", 0, 41, MAX_PKT, 0, 0 : "") # EDNS0 option } our $ofs; our $pkt; # bitches sub _dec_name { my @res; my $redir; my $ptr = $ofs; my $cnt; while () { return undef if ++$cnt >= 256; # to avoid DoS attacks my $len = ord substr $pkt, $ptr++, 1; if ($len >= 0xc0) { $ptr++; $ofs = $ptr if $ptr > $ofs; $ptr = (unpack "n", substr $pkt, $ptr - 2, 2) & 0x3fff; } elsif ($len) { push @res, substr $pkt, $ptr, $len; $ptr += $len; } else { $ofs = $ptr if $ptr > $ofs; return join ".", @res; } } } sub _dec_qd { my $qname = _dec_name; my ($qt, $qc) = unpack "nn", substr $pkt, $ofs; $ofs += 4; [$qname, $type_str{$qt} || $qt, $class_str{$qc} || $qc] } our %dec_rr = ( 1 => sub { join ".", unpack "C4", $_ }, # a 2 => sub { local $ofs = $ofs - length; _dec_name }, # ns 5 => sub { local $ofs = $ofs - length; _dec_name }, # cname 6 => sub { local $ofs = $ofs - length; my $mname = _dec_name; my $rname = _dec_name; ($mname, $rname, unpack "NNNNN", substr $pkt, $ofs) }, # soa 11 => sub { ((join ".", unpack "C4", $_), unpack "C a*", substr $_, 4) }, # wks 12 => sub { local $ofs = $ofs - length; _dec_name }, # ptr 13 => sub { unpack "C/a* C/a*", $_ }, # hinfo 15 => sub { local $ofs = $ofs + 2 - length; ((unpack "n", $_), _dec_name) }, # mx 16 => sub { unpack "(C/a*)*", $_ }, # txt 28 => sub { AnyEvent::Socket::format_address ($_) }, # aaaa 33 => sub { local $ofs = $ofs + 6 - length; ((unpack "nnn", $_), _dec_name) }, # srv 35 => sub { # naptr my ($order, $preference, $flags, $service, $regexp, $offset) = unpack "nn C/a* C/a* C/a* .", $_; local $ofs = $ofs + $offset - length; ($order, $preference, $flags, $service, $regexp, _dec_name) }, 99 => sub { unpack "(C/a*)*", $_ }, # spf ); sub _dec_rr { my $name = _dec_name; my ($rt, $rc, $ttl, $rdlen) = unpack "nn N n", substr $pkt, $ofs; $ofs += 10; local $_ = substr $pkt, $ofs, $rdlen; $ofs += $rdlen; [ $name, $type_str{$rt} || $rt, $class_str{$rc} || $rc, ($dec_rr{$rt} || sub { $_ })->(), ] } =item $dns = AnyEvent::DNS::dns_unpack $pkt Unpacks a DNS packet into a perl data structure. Examples: # an unsuccessful reply { 'qd' => [ [ 'ruth.plan9.de.mach.uni-karlsruhe.de', '*', 'in' ] ], 'rc' => 'nxdomain', 'ar' => [], 'ns' => [ [ 'uni-karlsruhe.de', 'soa', 'in', 'netserv.rz.uni-karlsruhe.de', 'hostmaster.rz.uni-karlsruhe.de', 2008052201, 10800, 1800, 2592000, 86400 ] ], 'tc' => '', 'ra' => 1, 'qr' => 1, 'id' => 45915, 'aa' => '', 'an' => [], 'rd' => 1, 'op' => 'query' } # a successful reply { 'qd' => [ [ 'www.google.de', 'a', 'in' ] ], 'rc' => 0, 'ar' => [ [ 'a.l.google.com', 'a', 'in', '209.85.139.9' ], [ 'b.l.google.com', 'a', 'in', '64.233.179.9' ], [ 'c.l.google.com', 'a', 'in', '64.233.161.9' ], ], 'ns' => [ [ 'l.google.com', 'ns', 'in', 'a.l.google.com' ], [ 'l.google.com', 'ns', 'in', 'b.l.google.com' ], ], 'tc' => '', 'ra' => 1, 'qr' => 1, 'id' => 64265, 'aa' => '', 'an' => [ [ 'www.google.de', 'cname', 'in', 'www.google.com' ], [ 'www.google.com', 'cname', 'in', 'www.l.google.com' ], [ 'www.l.google.com', 'a', 'in', '66.249.93.104' ], [ 'www.l.google.com', 'a', 'in', '66.249.93.147' ], ], 'rd' => 1, 'op' => 0 } =cut sub dns_unpack($) { local $pkt = shift; my ($id, $flags, $qd, $an, $ns, $ar) = unpack "nn nnnn A*", $pkt; local $ofs = 6 * 2; { id => $id, qr => ! ! ($flags & 0x8000), aa => ! ! ($flags & 0x0400), tc => ! ! ($flags & 0x0200), rd => ! ! ($flags & 0x0100), ra => ! ! ($flags & 0x0080), ad => ! ! ($flags & 0x0020), cd => ! ! ($flags & 0x0010), op => $opcode_str{($flags & 0x001e) >> 11}, rc => $rcode_str{($flags & 0x000f)}, qd => [map _dec_qd, 1 .. $qd], an => [map _dec_rr, 1 .. $an], ns => [map _dec_rr, 1 .. $ns], ar => [map _dec_rr, 1 .. $ar], } } ############################################################################# =back =head2 THE AnyEvent::DNS RESOLVER CLASS This is the class which does the actual protocol work. =over 4 =cut use Carp (); use Scalar::Util (); use Socket (); our $NOW; =item AnyEvent::DNS::resolver This function creates and returns a resolver that is ready to use and should mimic the default resolver for your system as good as possible. It only ever creates one resolver and returns this one on subsequent calls. Unless you have special needs, prefer this function over creating your own resolver object. =cut our $RESOLVER; sub resolver() { $RESOLVER || do { $RESOLVER = new AnyEvent::DNS; $RESOLVER->os_config; $RESOLVER } } =item $resolver = new AnyEvent::DNS key => value... Creates and returns a new resolver. The following options are supported: =over 4 =item server => [...] A list of server addresses (default: C) in network format (i.e. as returned by C - both IPv4 and IPv6 are supported). =item timeout => [...] A list of timeouts to use (also determines the number of retries). To make three retries with individual time-outs of 2, 5 and 5 seconds, use C<[2, 5, 5]>, which is also the default. =item search => [...] The default search list of suffixes to append to a domain name (default: none). =item ndots => $integer The number of dots (default: C<1>) that a name must have so that the resolver tries to resolve the name without any suffixes first. =item max_outstanding => $integer Most name servers do not handle many parallel requests very well. This option limits the number of outstanding requests to C<$integer> (default: C<10>), that means if you request more than this many requests, then the additional requests will be queued until some other requests have been resolved. =item reuse => $seconds The number of seconds (default: C<300>) that a query id cannot be re-used after a timeout. If there as no time-out then query id's can be reused immediately. =back =cut sub new { my ($class, %arg) = @_; # try to create a ipv4 and an ipv6 socket # only fail when we cnanot create either socket my $fh4, AF_INET , &Socket::SOCK_DGRAM, 0; socket my $fh6, AF_INET6, &Socket::SOCK_DGRAM, 0; $fh4 || $fh6 or Carp::croak "unable to create either an IPv6 or an IPv4 socket"; my $self = bless { server => [], timeout => [2, 5, 5], search => [], ndots => 1, max_outstanding => 10, reuse => 300, # reuse id's after 5 minutes only, if possible %arg, reuse_q => [], }, $class; # search should default to gethostname's domain # but perl lacks a good posix module Scalar::Util::weaken (my $wself = $self); if ($fh4) { AnyEvent::Util::fh_nonblocking $fh4, 1; $self->{fh4} = $fh4; $self->{rw4} = AnyEvent->io (fh => $fh4, poll => "r", cb => sub { if (my $peer = recv $fh4, my $pkt, MAX_PKT, 0) { $wself->_recv ($pkt, $peer); } }); } if ($fh6) { $self->{fh6} = $fh6; AnyEvent::Util::fh_nonblocking $fh6, 1; $self->{rw6} = AnyEvent->io (fh => $fh6, poll => "r", cb => sub { if (my $peer = recv $fh6, my $pkt, MAX_PKT, 0) { $wself->_recv ($pkt, $peer); } }); } $self->_compile; $self } =item $resolver->parse_resolv_conv ($string) Parses the given string as if it were a F file. The following directives are supported (but not necessarily implemented). C<#>-style comments, C, C, C, C, C (C, C, C). Everything else is silently ignored. =cut sub parse_resolv_conf { my ($self, $resolvconf) = @_; $self->{server} = []; $self->{search} = []; my $attempts; for (split /\n/, $resolvconf) { if (/^\s*#/) { # comment } elsif (/^\s*nameserver\s+(\S+)\s*$/i) { my $ip = $1; if (my $ipn = AnyEvent::Socket::parse_address ($ip)) { push @{ $self->{server} }, $ipn; } else { warn "nameserver $ip invalid and ignored\n"; } } elsif (/^\s*domain\s+(\S*)\s+$/i) { $self->{search} = [$1]; } elsif (/^\s*search\s+(.*?)\s*$/i) { $self->{search} = [split /\s+/, $1]; } elsif (/^\s*sortlist\s+(.*?)\s*$/i) { # ignored, NYI } elsif (/^\s*options\s+(.*?)\s*$/i) { for (split /\s+/, $1) { if (/^timeout:(\d+)$/) { $self->{timeout} = [$1]; } elsif (/^attempts:(\d+)$/) { $attempts = $1; } elsif (/^ndots:(\d+)$/) { $self->{ndots} = $1; } else { # debug, rotate, no-check-names, inet6 } } } } $self->{timeout} = [($self->{timeout}[0]) x $attempts] if $attempts; $self->_compile; } =item $resolver->os_config Tries so load and parse F on portable operating systems. Tries various egregious hacks on windows to force the DNS servers and searchlist out of the system. =cut sub os_config { my ($self) = @_; $self->{server} = []; $self->{search} = []; if (AnyEvent::WIN32 || $^O =~ /cygwin/i) { no strict 'refs'; # there are many options to find the current nameservers etc. on windows # all of them don't work consistently: # - the registry thing needs separate code on win32 native vs. cygwin # - the registry layout differs between windows versions # - calling windows api functions doesn't work on cygwin # - ipconfig uses locale-specific messages # we use ipconfig parsing because, despite all it's brokenness, # it seems most stable in practise. # for good measure, we append a fallback nameserver to our list. if (open my $fh, "ipconfig /all |") { # parsing strategy: we go through the output and look for # :-lines with DNS in them. everything in those is regarded as # either a nameserver (if it parses as an ip address), or a suffix # (all else). my $dns; while (<$fh>) { if (s/^\s.*\bdns\b.*://i) { $dns = 1; } elsif (/^\S/ || /^\s[^:]{16,}: /) { $dns = 0; } if ($dns && /^\s*(\S+)\s*$/) { my $s = $1; $s =~ s/%\d+(?!\S)//; # get rid of scope id if (my $ipn = AnyEvent::Socket::parse_address ($s)) { push @{ $self->{server} }, $ipn; } else { push @{ $self->{search} }, $s; } } } # always add one fallback server push @{ $self->{server} }, $DNS_FALLBACK[rand @DNS_FALLBACK]; $self->_compile; } } else { # try resolv.conf everywhere if (open my $fh, "parse_resolv_conf (<$fh>); } } } sub _compile { my $self = shift; my %search; $self->{search} = [grep 0 < length, grep !$search{$_}++, @{ $self->{search} }]; my %server; $self->{server} = [grep 0 < length, grep !$server{$_}++, @{ $self->{server} }]; unless (@{ $self->{server} }) { # use 127.0.0.1 by default, and one opendns nameserver as fallback $self->{server} = [v127.0.0.1, $DNS_FALLBACK[rand @DNS_FALLBACK]]; } my @retry; for my $timeout (@{ $self->{timeout} }) { for my $server (@{ $self->{server} }) { push @retry, [$server, $timeout]; } } $self->{retry} = \@retry; } sub _feed { my ($self, $res) = @_; $res = dns_unpack $res or return; my $id = $self->{id}{$res->{id}}; return unless ref $id; $NOW = time; $id->[1]->($res); } sub _recv { my ($self, $pkt, $peer) = @_; # we ignore errors (often one gets port unreachable, but there is # no good way to take advantage of that. my ($port, $host) = AnyEvent::Socket::unpack_sockaddr ($peer); return unless $port == 53 && grep $_ eq $host, @{ $self->{server} }; $self->_feed ($pkt); } sub _free_id { my ($self, $id, $timeout) = @_; if ($timeout) { # we need to block the id for a while $self->{id}{$id} = 1; push @{ $self->{reuse_q} }, [$NOW + $self->{reuse}, $id]; } else { # we can quickly recycle the id delete $self->{id}{$id}; } --$self->{outstanding}; $self->_scheduler; } # execute a single request, involves sending it with timeouts to multiple servers sub _exec { my ($self, $req) = @_; my $retry; # of retries my $do_retry; $do_retry = sub { my $retry_cfg = $self->{retry}[$retry++] or do { # failure $self->_free_id ($req->[2], $retry > 1); undef $do_retry; return $req->[1]->(); }; my ($server, $timeout) = @$retry_cfg; $self->{id}{$req->[2]} = [AnyEvent->timer (after => $timeout, cb => sub { $NOW = time; # timeout, try next &$do_retry; }), sub { my ($res) = @_; if ($res->{tc}) { # success, but truncated, so use tcp AnyEvent::Socket::tcp_connect (AnyEvent::Socket::format_address ($server), DOMAIN_PORT, sub { my ($fh) = @_ or return &$do_retry; my $handle = new AnyEvent::Handle fh => $fh, on_error => sub { # failure, try next &$do_retry; }; $handle->push_write (pack "n/a", $req->[0]); $handle->push_read (chunk => 2, sub { $handle->unshift_read (chunk => (unpack "n", $_[1]), sub { $self->_feed ($_[1]); }); }); shutdown $fh, 1; }, sub { $timeout }); } else { # success $self->_free_id ($req->[2], $retry > 1); undef $do_retry; return $req->[1]->($res); } }]; my $sa = AnyEvent::Socket::pack_sockaddr (DOMAIN_PORT, $server); my $fh = AF_INET == Socket::sockaddr_family ($sa) ? $self->{fh4} : $self->{fh6} or return &$do_retry; send $fh, $req->[0], 0, $sa; }; &$do_retry; } sub _scheduler { my ($self) = @_; $NOW = time; # first clear id reuse queue delete $self->{id}{ (shift @{ $self->{reuse_q} })->[1] } while @{ $self->{reuse_q} } && $self->{reuse_q}[0][0] <= $NOW; while ($self->{outstanding} < $self->{max_outstanding}) { if (@{ $self->{reuse_q} } >= 30000) { # we ran out of ID's, wait a bit $self->{reuse_to} ||= AnyEvent->timer (after => $self->{reuse_q}[0][0] - $NOW, cb => sub { delete $self->{reuse_to}; $self->_scheduler; }); last; } my $req = shift @{ $self->{queue} } or last; while () { $req->[2] = int rand 65536; last unless exists $self->{id}{$req->[2]}; } ++$self->{outstanding}; $self->{id}{$req->[2]} = 1; substr $req->[0], 0, 2, pack "n", $req->[2]; $self->_exec ($req); } } =item $resolver->request ($req, $cb->($res)) Sends a single request (a hash-ref formated as specified for C) to the configured nameservers including retries. Calls the callback with the decoded response packet if a reply was received, or no arguments on timeout. =cut sub request($$) { my ($self, $req, $cb) = @_; push @{ $self->{queue} }, [dns_pack $req, $cb]; $self->_scheduler; } =item $resolver->resolve ($qname, $qtype, %options, $cb->($rcode, @rr)) Queries the DNS for the given domain name C<$qname> of type C<$qtype>. A C<$qtype> is either a numerical query type (e.g. C<1> for A recods) or a lowercase name (you have to look at the source to see which aliases are supported, but all types from RFC 1034, C, C, C and a few more are known to this module). A qtype of "*" is supported and means "any" record type. The callback will be invoked with a list of matching result records or none on any error or if the name could not be found. CNAME chains (although illegal) are followed up to a length of 8. The callback will be invoked with an result code in string form (noerror, formerr, servfail, nxdomain, notimp, refused and so on), or numerical form if the result code is not supported. The remaining arguments are arraryefs of the form C<[$name, $type, $class, @data>], where C<$name> is the domain name, C<$type> a type string or number, C<$class> a class name and @data is resource-record-dependent data. For C records, this will be the textual IPv4 addresses, for C or C records this will be a domain name, for C records these are all the strings and so on. All types mentioned in RFC 1034, C, C and C are decoded. All resource records not known to this module will just return the raw C field as fourth entry. Note that this resolver is just a stub resolver: it requires a name server supporting recursive queries, will not do any recursive queries itself and is not secure when used against an untrusted name server. The following options are supported: =over 4 =item search => [$suffix...] Use the given search list (which might be empty), by appending each one in turn to the C<$qname>. If this option is missing then the configured C and C define its value. If the C<$qname> ends in a dot, then the searchlist will be ignored. =item accept => [$type...] Lists the acceptable result types: only result types in this set will be accepted and returned. The default includes the C<$qtype> and nothing else. If this list includes C, then CNAME-chains will not be followed (because you asked for the CNAME record). =item class => "class" Specify the query class ("in" for internet, "ch" for chaosnet and "hs" for hesiod are the only ones making sense). The default is "in", of course. =back Examples: # full example, you can paste this into perl: use Data::Dumper; use AnyEvent::DNS; AnyEvent::DNS::resolver->resolve ( "google.com", "*", my $cv = AnyEvent->condvar); warn Dumper [$cv->recv]; # shortened result: # [ # [ 'google.com', 'soa', 'in', 'ns1.google.com', 'dns-admin.google.com', # 2008052701, 7200, 1800, 1209600, 300 ], # [ # 'google.com', 'txt', 'in', # 'v=spf1 include:_netblocks.google.com ~all' # ], # [ 'google.com', 'a', 'in', '64.233.187.99' ], # [ 'google.com', 'mx', 'in', 10, 'smtp2.google.com' ], # [ 'google.com', 'ns', 'in', 'ns2.google.com' ], # ] # resolve a records: $res->resolve ("ruth.plan9.de", "a", sub { warn Dumper [@_] }); # result: # [ # [ 'ruth.schmorp.de', 'a', 'in', '129.13.162.95' ] # ] # resolve any records, but return only a and aaaa records: $res->resolve ("test1.laendle", "*", accept => ["a", "aaaa"], sub { warn Dumper [@_]; } ); # result: # [ # [ 'test1.laendle', 'a', 'in', '10.0.0.255' ], # [ 'test1.laendle', 'aaaa', 'in', '3ffe:1900:4545:0002:0240:0000:0000:f7e1' ] # ] =cut sub resolve($%) { my $cb = pop; my ($self, $qname, $qtype, %opt) = @_; my @search = $qname =~ s/\.$// ? "" : $opt{search} ? @{ $opt{search} } : ($qname =~ y/.//) >= $self->{ndots} ? ("", @{ $self->{search} }) : (@{ $self->{search} }, ""); my $class = $opt{class} || "in"; my %atype = $opt{accept} ? map +($_ => 1), @{ $opt{accept} } : ($qtype => 1); # advance in searchlist my ($do_search, $do_req); $do_search = sub { @search or (undef $do_search), (undef $do_req), return $cb->(); (my $name = lc "$qname." . shift @search) =~ s/\.$//; my $depth = 2; # advance in cname-chain $do_req = sub { $self->request ({ rd => 1, qd => [[$name, $qtype, $class]], }, sub { my ($res) = @_ or return $do_search->(); my $cname; while () { # results found? my @rr = grep $name eq lc $_->[0] && ($atype{"*"} || $atype{$_->[1]}), @{ $res->{an} }; (undef $do_search), (undef $do_req), return $cb->(@rr) if @rr; # see if there is a cname we can follow my @rr = grep $name eq lc $_->[0] && $_->[1] eq "cname", @{ $res->{an} }; if (@rr) { $depth-- or return $do_search->(); # cname chain too long $cname = 1; $name = $rr[0][3]; } elsif ($cname) { # follow the cname return $do_req->(); } else { # no, not found anything return $do_search->(); } } }); }; $do_req->(); }; $do_search->(); } use AnyEvent::Socket (); # circular dependency, so do not import anything and do it at the end 1; =back =head1 AUTHOR Marc Lehmann http://home.schmorp.de/ =cut