2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-31 06:25:31 +00:00

Merge branch 'each-fix-warnings' into 'main'

address '--disable-doh' failures

See merge request isc-projects/bind9!5561
This commit is contained in:
Evan Hunt
2021-11-17 22:11:36 +00:00
4 changed files with 41 additions and 24 deletions

View File

@@ -502,6 +502,17 @@ isc_nm_tlsdnsconnect(isc_nm_t *mgr, isc_sockaddr_t *local, isc_sockaddr_t *peer,
bool
isc_nm_is_tlsdns_handle(isc_nmhandle_t *handle);
/*%<
* Returns 'true' iff 'handle' is associated with a socket of type
* 'isc_nm_tlsdnssocket'.
*/
bool
isc_nm_is_http_handle(isc_nmhandle_t *handle);
/*%<
* Returns 'true' iff 'handle' is associated with a socket of type
* 'isc_nm_httpsocket'.
*/
#if HAVE_LIBNGHTTP2
@@ -578,11 +589,12 @@ isc_nm_http_endpoints_detach(isc_nm_http_endpoints_t **restrict epsp);
* isc_nm_http_endpoints_t object.
*/
bool
isc_nm_is_http_handle(isc_nmhandle_t *handle);
bool
isc_nm_http_path_isvalid(const char *path);
/*%<
* Returns 'true' if 'path' matches the format requirements for
* the path component of a URI as defined in RFC 3986 section 3.3.
*/
void
isc_nm_http_makeuri(const bool https, const isc_sockaddr_t *sa,

View File

@@ -2847,14 +2847,6 @@ failed_read_cb(isc_result_t result, isc_nm_http_session_t *session) {
}
}
bool
isc_nm_is_http_handle(isc_nmhandle_t *handle) {
REQUIRE(VALID_NMHANDLE(handle));
REQUIRE(VALID_NMSOCK(handle->sock));
return (handle->sock->type == isc_nm_httpsocket);
}
void
isc__nm_http_set_maxage(isc_nmhandle_t *handle, const uint32_t ttl) {
isc_nm_http_session_t *session;

View File

@@ -3456,14 +3456,26 @@ isc_nm_is_tlsdns_handle(isc_nmhandle_t *handle) {
return (handle->sock->type == isc_nm_tlsdnssocket);
}
bool
isc_nm_is_http_handle(isc_nmhandle_t *handle) {
REQUIRE(VALID_NMHANDLE(handle));
REQUIRE(VALID_NMSOCK(handle->sock));
return (handle->sock->type == isc_nm_httpsocket);
}
void
isc_nm_set_maxage(isc_nmhandle_t *handle, const uint32_t ttl) {
isc_nmsocket_t *sock;
isc_nmsocket_t *sock = NULL;
REQUIRE(VALID_NMHANDLE(handle));
REQUIRE(VALID_NMSOCK(handle->sock));
REQUIRE(!atomic_load(&handle->sock->client));
#if !HAVE_LIBNGHTTP2
UNUSED(ttl);
#endif
sock = handle->sock;
switch (sock->type) {
#if HAVE_LIBNGHTTP2

View File

@@ -12034,32 +12034,33 @@ ns_query_start(ns_client_t *client, isc_nmhandle_t *handle) {
break; /* Let the query logic handle it. */
case dns_rdatatype_ixfr:
case dns_rdatatype_axfr:
#if HAVE_LIBNGHTTP2
if (isc_nm_is_http_handle(handle)) {
/* We cannot use DoH for zone transfers.
* According to RFC8484 a DoH request contains
/*
* We cannot use DoH for zone transfers.
* According to RFC 8484 a DoH request contains
* exactly one DNS message (see Section 6:
* Definition of the "application/dns-message"
* Media Type,
* https://datatracker.ietf.org/doc/html/rfc8484#section-6).
* Media Type).
*
* This makes DoH unsuitable for zone transfers
* as often (and usually!) these need more than
* one DNS message, especially for larger zones.
* As zone transfers over DoH are not (yet)
* standardised, nor discussed in the RFC8484,
* standardised, nor discussed in RFC 8484,
* the best thing we can do is to return "not
* implemented". */
* implemented".
*/
query_error(client, DNS_R_NOTIMP, __LINE__);
return;
}
#endif
if (isc_nm_is_tlsdns_handle(handle) &&
!isc_nm_xfr_allowed(handle)) {
/* Currently this code is here for DoT, which
/*
* Currently this code is here for DoT, which
* has more complex requirements for zone
* transfers compared to
* other stream protocols. See RFC9103 for
* the details. */
* transfers compared to other stream
* protocols. See RFC 9103 for details.
*/
query_error(client, DNS_R_REFUSED, __LINE__);
return;
}