return GET_AUTH_NEG_CACHE;
}
-bool DNSReversedBackend::getAuth(DNSPacket *p, SOAData *soa, const string &inZone, const int best_match_len) {
+bool DNSReversedBackend::getAuth(DNSPacket *p, SOAData *soa, const DNSName &inZone, const int best_match_len) {
// Reverse the lowercased query string
- string zone = toLower(inZone);
+ string zone = toLower(inZone.toStringNoDot());
string querykey = labelReverse(zone);
- int ret = _getAuth( p, soa, inZone, querykey, best_match_len );
+ int ret = _getAuth( p, soa, inZone.toStringNoDot(), querykey, best_match_len );
/* If this is disabled then we would just cache the tree structure not the
* leaves which should give the best performance and a nice small negcache
* size
*/
if( ret == GET_AUTH_NEG_CACHE )
- _add_to_negcache( inZone );
+ _add_to_negcache( inZone.toStringNoDot() );
return ret == GET_AUTH_SUCCESS;
}
return getAuthData( soa, p );
}
-bool DNSReversedBackend::getSOA(const string &inZone, SOAData &soa, DNSPacket *p)
+bool DNSReversedBackend::getSOA(const DNSName &inZone, SOAData &soa, DNSPacket *p)
{
// prepare the query string
- string zone = toLower( inZone );
+ string zone = toLower( inZone.toStringNoDot() );
string querykey = labelReverse( zone );
if( !_getSOA( querykey, soa, p ) )
* */
virtual bool getAuthData( SOAData &soa, DNSPacket *p=0) { return false; }; // Must be overridden
- bool getAuth(DNSPacket *p, SOAData *soa, const string &inZone, const int best_match_len);
+ virtual bool getAuth(DNSPacket *p, SOAData *soa, const DNSName &inZone, const int best_match_len) override;
inline int _getAuth(DNSPacket *p, SOAData *soa, const string &inZone, const string &querykey, const int best_match_len);
/* Only called for stuff like signing or AXFR transfers */
bool _getSOA(const string &rev_zone, SOAData &soa, DNSPacket *p);
- virtual bool getSOA(const string &inZone, SOAData &soa, DNSPacket *p);
+ virtual bool getSOA(const DNSName &inZone, SOAData &soa, DNSPacket *p) override;
};
class BackendFactory