forked from hickory-dns/hickory-dns
/
mut_message_client.rs
46 lines (39 loc) · 1.26 KB
/
mut_message_client.rs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
use trust_dns_client::client::*;
use trust_dns_client::proto::xfer::{DnsHandle, DnsRequest};
use trust_dns_client::rr::dnssec::*;
use trust_dns_client::rr::rdata::opt::EdnsOption;
#[derive(Clone)]
pub struct MutMessageHandle<C: ClientHandle + Unpin> {
client: C,
pub dnssec_ok: bool,
pub support_algorithms: Option<SupportedAlgorithms>,
}
impl<C: ClientHandle + Unpin> MutMessageHandle<C> {
pub fn new(client: C) -> Self {
MutMessageHandle {
client,
dnssec_ok: false,
support_algorithms: None,
}
}
}
impl<C: ClientHandle + Unpin> DnsHandle for MutMessageHandle<C> {
type Response = <C as DnsHandle>::Response;
type Error = <C as DnsHandle>::Error;
fn is_verifying_dnssec(&self) -> bool {
true
}
fn send<R: Into<DnsRequest> + Unpin>(&mut self, request: R) -> Self::Response {
let mut request = request.into();
{
// mutable block
let edns = request.edns_mut();
edns.set_dnssec_ok(true);
if let Some(supported_algs) = self.support_algorithms {
edns.options_mut().insert(EdnsOption::DAU(supported_algs));
}
}
println!("sending message");
self.client.send(request)
}
}