This crate allows you to deconstruct an existing SPF record that might be retrieved with a dns query of type TXT.
An example program can be found in the Examples directory.
```rust use deconspf::spf::Spf; use trustdnsresolver::error::ResolveResult; use trustdnsresolver::Resolver; use trustdns_resolver::{config::*, lookup::TxtLookup};
fn main() { // Construct a new Resolver with default configuration options let resolver = Resolver::new(ResolverConfig::default(), ResolverOpts::default()).unwrap();
// Lookup the IP addresses associated with a name.
// The final dot forces this to be an FQDN, otherwise the search rules as specified
// in `ResolverOpts` will take effect. FQDN's are generally cheaper queries.
//let response = resolver.lookup_ip("example.com.").unwrap();
// This is a list of servers you can test the code against. Feel free to edit
// the query
let query = "gmail.com.";
//let query = "hotmail.com.";
//let query = "_netblocks.google.com."; // ip4
//let query = "_netblocks2.google.com."; // ip6
let txt_response = resolver.txt_lookup(query);
let mut spf_record = display_txt(&query, &txt_response);
println!("\nDecontructing SPF Record");
let _ = spf_record.parse();
println!("{:?}", spf_record);
println!("SPF1: {}\n", spf_record.source());
if spf_record.includes().is_some() {
println!("Include list");
for mechanism in spf_record.includes().unwrap().iter() {
println!("spf: {}", mechanism.string());
}
}
if spf_record.ip4().is_some() {
println!("IP4 Address Ranges");
for mechanism in spf_record.ip4().unwrap().iter() {
println!(
"IP: {} prefix: {}",
mechanism.as_network().network(),
mechanism.as_network().prefix()
);
println!("spf: {}", mechanism.string());
}
}
if spf_record.ip6().is_some() {
println!("IP6 Address Ranges");
for mechanism in spf_record.ip6().unwrap().iter() {
println!(
"IP: {} prefix: {}",
mechanism.as_network().network(),
mechanism.as_network().prefix()
);
println!("spf: {}", mechanism.string());
}
}
println!("\nIs a redirect: {}", spf_record.is_redirect());
if spf_record.is_redirect() {
println!("\nredirect: {}", spf_record.redirect().unwrap().raw());
println!("mechanism: {}", spf_record.redirect().unwrap().string());
}
}
fn displaytxt(query: &str, txtresponse: &ResolveResult
To see a list of available examples.
bash
$ cargo run --example
bash
$ cargo run --example trust-dns-demo
This crate is not intended to provide syntax validation.
If you are looking to validate your SPF record. I would suggest you use one of the following.
I am sure there are many others that could be found.