hickory_proto/serialize/txt/
parse_rdata.rs#[cfg(feature = "dnssec")]
use crate::rr::dnssec::rdata::DNSSECRData;
use crate::{
rr::{
rdata::{ANAME, CNAME, HTTPS, NS, PTR},
Name, RData, RecordType,
},
serialize::txt::{
errors::{ParseError, ParseErrorKind, ParseResult},
rdata_parsers::*,
zone_lex::Lexer,
},
};
use super::Token;
pub trait RDataParser: Sized {
fn parse<'i, I: Iterator<Item = &'i str>>(
record_type: RecordType,
tokens: I,
origin: Option<&Name>,
) -> ParseResult<Self>;
fn try_from_str(record_type: RecordType, s: &str) -> ParseResult<Self> {
let mut lexer = Lexer::new(s);
let mut rdata = Vec::new();
while let Some(token) = lexer.next_token()? {
match token {
Token::List(list) => rdata.extend(list),
Token::CharData(s) => rdata.push(s),
Token::EOL | Token::Blank => (),
_ => {
return Err(ParseError::from(format!(
"unexpected token in record data: {token:?}"
)))
}
}
}
Self::parse(record_type, rdata.iter().map(AsRef::as_ref), None)
}
}
#[warn(clippy::wildcard_enum_match_arm)] impl RDataParser for RData {
fn parse<'i, I: Iterator<Item = &'i str>>(
record_type: RecordType,
tokens: I,
origin: Option<&Name>,
) -> ParseResult<Self> {
let rdata = match record_type {
RecordType::A => Self::A(a::parse(tokens)?),
RecordType::AAAA => Self::AAAA(aaaa::parse(tokens)?),
RecordType::ANAME => Self::ANAME(ANAME(name::parse(tokens, origin)?)),
RecordType::ANY => return Err(ParseError::from("parsing ANY doesn't make sense")),
RecordType::AXFR => return Err(ParseError::from("parsing AXFR doesn't make sense")),
RecordType::CAA => caa::parse(tokens).map(Self::CAA)?,
RecordType::CERT => Self::CERT(cert::parse(tokens)?),
RecordType::CNAME => Self::CNAME(CNAME(name::parse(tokens, origin)?)),
RecordType::CSYNC => csync::parse(tokens).map(Self::CSYNC)?,
RecordType::HINFO => Self::HINFO(hinfo::parse(tokens)?),
RecordType::HTTPS => svcb::parse(tokens).map(HTTPS).map(Self::HTTPS)?,
RecordType::IXFR => return Err(ParseError::from("parsing IXFR doesn't make sense")),
RecordType::MX => Self::MX(mx::parse(tokens, origin)?),
RecordType::NAPTR => Self::NAPTR(naptr::parse(tokens, origin)?),
RecordType::NULL => Self::NULL(null::parse(tokens)?),
RecordType::NS => Self::NS(NS(name::parse(tokens, origin)?)),
RecordType::OPENPGPKEY => Self::OPENPGPKEY(openpgpkey::parse(tokens)?),
RecordType::OPT => return Err(ParseError::from("parsing OPT doesn't make sense")),
RecordType::PTR => Self::PTR(PTR(name::parse(tokens, origin)?)),
RecordType::SOA => Self::SOA(soa::parse(tokens, origin)?),
RecordType::SRV => Self::SRV(srv::parse(tokens, origin)?),
RecordType::SSHFP => Self::SSHFP(sshfp::parse(tokens)?),
RecordType::SVCB => svcb::parse(tokens).map(Self::SVCB)?,
RecordType::TLSA => Self::TLSA(tlsa::parse(tokens)?),
RecordType::TXT => Self::TXT(txt::parse(tokens)?),
RecordType::SIG => return Err(ParseError::from("parsing SIG doesn't make sense")),
RecordType::DNSKEY => {
return Err(ParseError::from("DNSKEY should be dynamically generated"))
}
RecordType::CDNSKEY => {
return Err(ParseError::from("CDNSKEY should be dynamically generated"))
}
RecordType::KEY => return Err(ParseError::from("KEY should be dynamically generated")),
#[cfg(feature = "dnssec")]
RecordType::DS => Self::DNSSEC(DNSSECRData::DS(ds::parse(tokens)?)),
#[cfg(not(feature = "dnssec"))]
RecordType::DS => return Err(ParseError::from("DS should be dynamically generated")),
RecordType::CDS => return Err(ParseError::from("CDS should be dynamically generated")),
RecordType::NSEC => {
return Err(ParseError::from("NSEC should be dynamically generated"))
}
RecordType::NSEC3 => {
return Err(ParseError::from("NSEC3 should be dynamically generated"))
}
RecordType::NSEC3PARAM => {
return Err(ParseError::from(
"NSEC3PARAM should be dynamically generated",
))
}
RecordType::RRSIG => {
return Err(ParseError::from("RRSIG should be dynamically generated"))
}
RecordType::TSIG => return Err(ParseError::from("TSIG is only used during AXFR")),
#[allow(deprecated)]
RecordType::ZERO => Self::ZERO,
r @ RecordType::Unknown(..) => {
return Err(ParseError::from(ParseErrorKind::UnsupportedRecordType(r)));
}
};
Ok(rdata)
}
}
#[cfg(test)]
mod tests {
#![allow(clippy::dbg_macro, clippy::print_stdout)]
use super::*;
#[cfg(feature = "dnssec")]
use crate::rr::dnssec::rdata::DS;
use crate::rr::domain::Name;
use crate::rr::rdata::*;
use std::str::FromStr;
#[test]
fn test_a() {
let tokens = ["192.168.0.1"];
let name = Name::from_str("example.com.").unwrap();
let record =
RData::parse(RecordType::A, tokens.iter().map(AsRef::as_ref), Some(&name)).unwrap();
assert_eq!(record, RData::A("192.168.0.1".parse().unwrap()));
}
#[test]
fn test_a_parse() {
let data = "192.168.0.1";
let record = RData::try_from_str(RecordType::A, data).unwrap();
assert_eq!(record, RData::A("192.168.0.1".parse().unwrap()));
}
#[test]
fn test_aaaa() {
let tokens = ["::1"];
let name = Name::from_str("example.com.").unwrap();
let record = RData::parse(
RecordType::AAAA,
tokens.iter().map(AsRef::as_ref),
Some(&name),
)
.unwrap();
assert_eq!(record, RData::AAAA("::1".parse().unwrap()));
}
#[test]
fn test_aaaa_parse() {
let data = "::1";
let record = RData::try_from_str(RecordType::AAAA, data).unwrap();
assert_eq!(record, RData::AAAA("::1".parse().unwrap()));
}
#[test]
fn test_ns_parse() {
let data = "ns.example.com";
let record = RData::try_from_str(RecordType::NS, data).unwrap();
assert_eq!(
record,
RData::NS(NS(Name::from_str("ns.example.com.").unwrap()))
);
}
#[test]
fn test_csync() {
let tokens = ["123", "1", "A", "NS"];
let name = Name::from_str("example.com.").unwrap();
let record = RData::parse(
RecordType::CSYNC,
tokens.iter().map(AsRef::as_ref),
Some(&name),
)
.unwrap();
assert_eq!(
record,
RData::CSYNC(CSYNC::new(
123,
true,
false,
vec![RecordType::A, RecordType::NS]
))
);
}
#[test]
fn test_csync_parse() {
let data = "123 1 A NS";
let record = RData::try_from_str(RecordType::CSYNC, data).unwrap();
assert_eq!(
record,
RData::CSYNC(CSYNC::new(
123,
true,
false,
vec![RecordType::A, RecordType::NS]
))
);
}
#[cfg(feature = "dnssec")]
#[test]
#[allow(deprecated)]
fn test_ds() {
let tokens = [
"60485",
"5",
"1",
"2BB183AF5F22588179A53B0A",
"98631FAD1A292118",
];
let name = Name::from_str("dskey.example.com.").unwrap();
let record = RData::parse(
RecordType::DS,
tokens.iter().map(AsRef::as_ref),
Some(&name),
)
.unwrap();
assert_eq!(
record,
RData::DNSSEC(DNSSECRData::DS(DS::new(
60485,
crate::rr::dnssec::Algorithm::RSASHA1,
crate::rr::dnssec::DigestType::SHA1,
vec![
0x2B, 0xB1, 0x83, 0xAF, 0x5F, 0x22, 0x58, 0x81, 0x79, 0xA5, 0x3B, 0x0A, 0x98,
0x63, 0x1F, 0xAD, 0x1A, 0x29, 0x21, 0x18
]
)))
);
}
#[test]
fn test_any() {
let tokens = ["test"];
let name = Name::from_str("example.com.").unwrap();
let result = RData::parse(
RecordType::ANY,
tokens.iter().map(AsRef::as_ref),
Some(&name),
);
assert!(result.is_err());
}
#[test]
fn test_dynamically_generated() {
let dynamically_generated = vec![
RecordType::DS,
RecordType::CDS,
RecordType::DNSKEY,
RecordType::CDNSKEY,
RecordType::KEY,
RecordType::NSEC,
RecordType::NSEC3,
RecordType::NSEC3PARAM,
RecordType::RRSIG,
];
let tokens = ["test"];
let name = Name::from_str("example.com.").unwrap();
for record_type in dynamically_generated {
let result = RData::parse(record_type, tokens.iter().map(AsRef::as_ref), Some(&name));
assert!(result.is_err());
}
}
}