daemon: Add a new class RrsetFactory for generating RR sets

Change-Id: I9569ef4f57a07d909be27e36974029856e34798b
diff --git a/src/daemon/rrset-factory.cpp b/src/daemon/rrset-factory.cpp
new file mode 100644
index 0000000..b1bbf90
--- /dev/null
+++ b/src/daemon/rrset-factory.cpp
@@ -0,0 +1,286 @@
+/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
+/**
+ * Copyright (c) 2014-2016, Regents of the University of California.
+ *
+ * This file is part of NDNS (Named Data Networking Domain Name Service).
+ * See AUTHORS.md for complete list of NDNS authors and contributors.
+ *
+ * NDNS is free software: you can redistribute it and/or modify it under the terms
+ * of the GNU General Public License as published by the Free Software Foundation,
+ * either version 3 of the License, or (at your option) any later version.
+ *
+ * NDNS is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
+ * without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
+ * PURPOSE.  See the GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License along with
+ * NDNS, e.g., in COPYING.md file.  If not, see <http://www.gnu.org/licenses/>.
+ */
+
+#include "rrset-factory.hpp"
+#include "mgmt/management-tool.hpp"
+
+#include <boost/algorithm/string/join.hpp>
+
+namespace ndn {
+namespace ndns {
+
+NDNS_LOG_INIT("RrsetFactory")
+
+RrsetFactory::RrsetFactory(const std::string& dbFile,
+                           const Name& zoneName,
+                           KeyChain& keyChain,
+                           const Name& inputDskCertName)
+  : m_keyChain(keyChain)
+  , m_dbFile(dbFile)
+  , m_zone(zoneName)
+  , m_dskCertName(inputDskCertName)
+  , m_checked(false)
+{
+  if (m_dskCertName == DEFAULT_CERT) {
+    m_dskName = m_keyChain.getDefaultKeyNameForIdentity(zoneName);
+    m_dskCertName = m_keyChain.getDefaultCertificateNameForKey(m_dskName);
+  }
+}
+
+void
+RrsetFactory::checkZoneKey()
+{
+  onlyCheckZone();
+  if (m_dskCertName != DEFAULT_CERT &&
+      !matchCertificate(m_dskCertName, m_zone.getName())) {
+    BOOST_THROW_EXCEPTION(Error("Cannot verify certificate"));
+  }
+}
+
+void
+RrsetFactory::onlyCheckZone()
+{
+  if (m_checked) {
+    return ;
+  }
+  m_checked = true;
+
+  DbMgr dbMgr(m_dbFile);
+  const Name& zoneName = m_zone.getName();
+  if (!dbMgr.find(m_zone)) {
+    BOOST_THROW_EXCEPTION(Error(zoneName.toUri() + " is not presented in the NDNS db"));
+  }
+}
+
+
+std::pair<Rrset, Name>
+RrsetFactory::generateBaseRrset(const Name& label,
+                                const name::Component& type,
+                                const uint64_t version,
+                                const time::seconds& ttl)
+{
+  Rrset rrset(&m_zone);
+
+  rrset.setLabel(label);
+  rrset.setType(type);
+  rrset.setTtl(ttl);
+
+  name::Component qType;
+  if (type == label::CERT_RR_TYPE) {
+    qType = label::NDNS_CERT_QUERY;
+  } else {
+    qType = label::NDNS_ITERATIVE_QUERY;
+  }
+
+  Name name;
+  name.append(m_zone.getName())
+      .append(qType)
+      .append(label)
+      .append(type);
+
+  if (version != VERSION_USE_UNIX_TIMESTAMP) {
+    name.append(name::Component::fromVersion(version));
+  } else {
+    name.appendVersion();
+  }
+
+  rrset.setVersion(name.get(-1));
+
+  return std::make_pair(rrset, name);
+}
+
+bool
+RrsetFactory::matchCertificate(const Name& certName, const Name& identity)
+{
+  if (!m_keyChain.doesCertificateExist(certName)) {
+    NDNS_LOG_WARN(certName.toUri() << " is not presented in KeyChain");
+    return false;
+  }
+
+  // Check its public key information
+  shared_ptr<IdentityCertificate> cert = m_keyChain.getCertificate(certName);
+  Name keyName = cert->getPublicKeyName();
+
+  if (!identity.isPrefixOf(keyName) || identity.size() != keyName.size() - 1) {
+    NDNS_LOG_WARN(keyName.toUri() << " is not a key of " << identity.toUri());
+    return false;
+  }
+
+  if (!m_keyChain.doesKeyExistInTpm(keyName, KeyClass::PRIVATE)) {
+    NDNS_LOG_WARN("Private key: " << keyName.toUri() << " is not present in KeyChain");
+    return false;
+  }
+
+  return true;
+}
+
+Rrset
+RrsetFactory::generateNsRrset(const Name& label,
+                              const name::Component& type,
+                              const uint64_t version,
+                              time::seconds ttl,
+                              const ndn::Link::DelegationSet& delegations)
+{
+  if (!m_checked) {
+    BOOST_THROW_EXCEPTION(Error("You have to call checkZoneKey before call generate functions"));
+  }
+
+  if (ttl == DEFAULT_RR_TTL)
+    ttl = m_zone.getTtl();
+
+  std::pair<Rrset, Name> rrsetAndName = generateBaseRrset(label, type, version, ttl);
+  const Name& name = rrsetAndName.second;
+  Rrset& rrset = rrsetAndName.first;
+
+  Link link(name);
+  for (const auto& i : delegations) {
+    link.addDelegation(i.first, i.second);
+  }
+
+  setMetaInfo(link);
+  sign(link);
+  rrset.setData(link.wireEncode());
+
+  return rrset;
+}
+
+Rrset
+RrsetFactory::generateTxtRrset(const Name& label,
+                               const name::Component& type,
+                               const uint64_t version,
+                               time::seconds ttl,
+                               const std::vector<std::string>& strings)
+{
+  if (!m_checked) {
+    BOOST_THROW_EXCEPTION(Error("You have to call checkZoneKey before call generate functions"));
+  }
+
+  if (ttl == DEFAULT_RR_TTL)
+    ttl = m_zone.getTtl();
+
+  Name name;
+  Rrset rrset;
+  std::tie(rrset, name) = generateBaseRrset(label, type, version, ttl);
+
+  std::vector<Block> rrs;
+  for (const auto& item : strings) {
+    rrs.push_back(makeBinaryBlock(ndns::tlv::RrData,
+                                  item.c_str(),
+                                  item.size()));
+  }
+
+  Data data(name);
+  data.setContent(wireEncode(rrs));
+
+  setMetaInfo(data);
+  sign(data);
+  rrset.setData(data.wireEncode());
+
+  return rrset;
+}
+
+Rrset
+RrsetFactory::generateCertRrset(const Name& label,
+                                const name::Component& type,
+                                const uint64_t version,
+                                time::seconds ttl,
+                                const IdentityCertificate& cert)
+{
+  if (!m_checked) {
+    BOOST_THROW_EXCEPTION(Error("You have to call checkZoneKey before call generate functions"));
+  }
+
+  if (ttl == DEFAULT_RR_TTL)
+    ttl = m_zone.getTtl();
+
+  Name name;
+  Rrset rrset;
+  std::tie(rrset, name) = generateBaseRrset(label, type, version, ttl);
+
+  Data data(name);
+  data.setContent(cert.wireEncode());
+
+  setMetaInfo(data);
+  sign(data);
+  rrset.setData(data.wireEncode());
+
+  return rrset;
+}
+
+
+void
+RrsetFactory::sign(Data& data)
+{
+  m_keyChain.sign(data, m_dskCertName);
+}
+
+void
+RrsetFactory::setMetaInfo(Data& data)
+{
+  MetaInfo metaInfo = data.getMetaInfo();
+  metaInfo.addAppMetaInfo(makeNonNegativeIntegerBlock(ndns::tlv::NdnsType,
+                                                      NDNS_RESP));
+  data.setMetaInfo(metaInfo);
+}
+
+template<encoding::Tag TAG>
+inline size_t
+RrsetFactory::wireEncode(EncodingImpl<TAG>& block, const std::vector<Block>& rrs) const
+{
+  // Content :: = CONTENT-TYPE TLV-LENGTH
+  //              Block*
+
+  size_t totalLength = 0;
+  for (auto iter = rrs.rbegin(); iter != rrs.rend(); ++iter) {
+    totalLength += block.prependBlock(*iter);
+  }
+
+  totalLength += block.prependVarNumber(totalLength);
+  totalLength += block.prependVarNumber(::ndn::tlv::Content);
+
+  return totalLength;
+}
+
+const Block
+RrsetFactory::wireEncode(const std::vector<Block>& rrs) const
+{
+  EncodingEstimator estimator;
+  size_t estimatedSize = wireEncode(estimator, rrs);
+  EncodingBuffer buffer(estimatedSize, 0);
+  wireEncode(buffer, rrs);
+  return buffer.block();
+}
+
+std::vector<std::string>
+RrsetFactory::wireDecodeTxt(const Block& wire)
+{
+  std::vector<std::string> txts;
+  wire.parse();
+
+  for (const auto& e: wire.elements()) {
+    txts.push_back(std::string(reinterpret_cast<const char*>(e.value()),
+                               e.value_size()));
+  }
+
+  return txts;
+}
+
+
+} // namespace ndns
+} // namespace ndn