godns/resolver/resolver.go

299 lines
6.4 KiB
Go
Raw Normal View History

2020-01-25 17:43:02 +00:00
package resolver
2013-07-23 11:10:38 +00:00
import (
"bufio"
2020-01-25 17:43:02 +00:00
"errors"
2013-07-23 11:10:38 +00:00
"fmt"
log "github.com/sirupsen/logrus"
2020-01-25 17:43:02 +00:00
"meow.tf/joker/godns/utils"
"net"
"os"
2015-02-04 08:21:08 +00:00
"strconv"
2013-07-23 16:37:38 +00:00
"strings"
2015-02-12 09:19:46 +00:00
"sync"
2013-07-23 11:10:38 +00:00
"time"
2018-07-02 00:47:22 +00:00
"crypto/tls"
2020-01-25 17:43:02 +00:00
"github.com/miekg/dns"
2013-07-23 11:10:38 +00:00
)
2013-07-23 16:37:38 +00:00
type ResolvError struct {
2015-02-12 09:19:46 +00:00
qname, net string
nameservers []*Nameserver
2013-07-23 16:37:38 +00:00
}
func (e ResolvError) Error() string {
nameservers := make([]string, len(e.nameservers))
for i, nameserver := range e.nameservers {
nameservers[i] = nameserver.address
}
return fmt.Sprintf("%s resolv failed on %s (%s)", e.qname, strings.Join(nameservers, "; "), e.net)
2013-07-23 16:37:38 +00:00
}
type RResp struct {
msg *dns.Msg
nameserver *Nameserver
rtt time.Duration
}
2013-07-23 11:10:38 +00:00
type Resolver struct {
servers []*Nameserver
domainServer *suffixTreeNode
config *Settings
2018-07-02 00:47:22 +00:00
2020-01-25 17:43:02 +00:00
clients map[string]*dns.Client
clientLock sync.RWMutex
}
func NewResolver(c Settings) *Resolver {
2015-02-04 08:21:08 +00:00
r := &Resolver{
servers: make([]*Nameserver, 0),
domainServer: newSuffixTreeRoot(),
config: &c,
}
2018-08-05 03:53:11 +00:00
if len(c.ServerListFile) > 0 {
2015-02-04 08:21:08 +00:00
r.ReadServerListFile(c.ServerListFile)
}
2015-02-04 08:21:08 +00:00
if len(c.ResolvFile) > 0 {
clientConfig, err := dns.ClientConfigFromFile(c.ResolvFile)
2018-07-01 03:08:29 +00:00
2015-02-04 08:21:08 +00:00
if err != nil {
2020-01-25 17:43:02 +00:00
log.Error(":%s is not a valid resolv.conf file\n", c.ResolvFile)
log.Error("%s", err)
2015-02-04 08:21:08 +00:00
panic(err)
}
2018-07-01 03:08:29 +00:00
2015-02-04 08:21:08 +00:00
for _, server := range clientConfig.Servers {
r.servers = append(r.servers, &Nameserver{net: "udp", address: net.JoinHostPort(server, clientConfig.Port)})
2015-02-04 08:21:08 +00:00
}
}
2015-02-04 08:21:08 +00:00
return r
}
func (r *Resolver) parseServerListFile(buf *os.File) {
scanner := bufio.NewScanner(buf)
2018-07-01 03:08:29 +00:00
var line string
var idx int
for scanner.Scan() {
2018-07-01 03:08:29 +00:00
line = strings.TrimSpace(scanner.Text())
if !strings.HasPrefix(line, "server") {
continue
}
2018-07-01 03:08:29 +00:00
idx = strings.Index(line, "=")
if idx == -1 {
continue
}
2019-09-26 04:43:17 +00:00
line = strings.TrimSpace(line[idx+1:])
2018-07-01 03:08:29 +00:00
2018-07-01 22:44:11 +00:00
if strings.HasPrefix(line, "https://") {
r.servers = append(r.servers, &Nameserver{net: "https", address: line})
continue
}
tokens := strings.Split(line, "/")
2015-02-04 08:21:08 +00:00
switch len(tokens) {
case 3:
domain := tokens[1]
ip := tokens[2]
2020-01-25 17:43:02 +00:00
if !utils.IsDomain(domain) || !utils.IsIP(ip) {
2015-02-04 08:21:08 +00:00
continue
}
2018-07-01 03:08:29 +00:00
r.domainServer.sinsert(strings.Split(domain, "."), ip)
2015-02-04 08:21:08 +00:00
case 1:
srvPort := strings.Split(line, "#")
2018-07-01 03:08:29 +00:00
if len(srvPort) > 2 {
2015-02-04 08:21:08 +00:00
continue
}
ip := ""
2018-07-01 03:08:29 +00:00
if ip = srvPort[0]; !utils.IsIP(ip) {
2015-02-04 08:21:08 +00:00
continue
}
port := "53"
2018-07-01 03:08:29 +00:00
if len(srvPort) == 2 {
if _, err := strconv.Atoi(srvPort[1]); err != nil {
2015-02-04 08:21:08 +00:00
continue
}
2018-07-01 03:08:29 +00:00
port = srvPort[1]
2015-02-04 08:21:08 +00:00
}
2018-07-01 03:08:29 +00:00
r.servers = append(r.servers, &Nameserver{address: net.JoinHostPort(ip, port)})
}
}
2013-07-23 11:10:38 +00:00
}
func (r *Resolver) ReadServerListFile(files []string) {
for _, file := range files {
buf, err := os.Open(file)
if err != nil {
panic("Can't open " + file)
}
r.parseServerListFile(buf)
2020-01-25 17:43:02 +00:00
buf.Close()
}
}
2015-02-12 09:19:46 +00:00
// Lookup will ask each nameserver in top-to-bottom fashion, starting a new request
// in every second, and return as early as possbile (have an answer).
// It returns an error if no request has succeeded.
2013-07-23 16:37:38 +00:00
func (r *Resolver) Lookup(net string, req *dns.Msg) (message *dns.Msg, err error) {
2020-01-25 17:43:02 +00:00
if net == "udp" && r.config.SetEDNS0 {
req = req.SetEdns0(65535, true)
}
2013-07-23 16:37:38 +00:00
qname := req.Question[0].Name
2013-07-23 11:10:38 +00:00
res := make(chan *RResp, 1)
2015-02-12 09:19:46 +00:00
var wg sync.WaitGroup
L := func(resolver *Resolver, nameserver *Nameserver) {
2015-02-12 09:19:46 +00:00
defer wg.Done()
2018-07-01 03:08:29 +00:00
2018-07-02 00:47:22 +00:00
c, err := resolver.resolverFor(net, nameserver)
2018-07-01 03:08:29 +00:00
2018-07-02 00:47:22 +00:00
if err != nil {
2020-01-25 17:43:02 +00:00
log.Warn("error:%s", err.Error())
2018-07-02 00:47:22 +00:00
return
2018-07-01 03:08:29 +00:00
}
r, rtt, err := c.Exchange(req, nameserver.address)
2018-07-02 00:47:22 +00:00
2013-07-23 16:37:38 +00:00
if err != nil {
2020-01-25 17:43:02 +00:00
log.Warn("%s socket error on %s", qname, nameserver)
log.Warn("error:%s", err.Error())
2015-02-12 09:19:46 +00:00
return
2013-07-23 16:37:38 +00:00
}
// If SERVFAIL happen, should return immediately and try another upstream resolver.
// However, other Error code like NXDOMAIN is an clear response stating
// that it has been verified no such domain existas and ask other resolvers
// would make no sense. See more about #20
2013-07-23 16:37:38 +00:00
if r != nil && r.Rcode != dns.RcodeSuccess {
2020-01-25 17:43:02 +00:00
log.Warn("%s failed to get an valid answer on %s", qname, nameserver)
if r.Rcode == dns.RcodeServerFailure {
return
}
2015-02-12 09:19:46 +00:00
}
re := &RResp{r, nameserver, rtt}
2015-02-12 09:19:46 +00:00
select {
case res <- re:
2015-02-12 09:19:46 +00:00
default:
}
}
2020-01-25 17:43:02 +00:00
ticker := time.NewTicker(time.Duration(r.config.Interval) * time.Millisecond)
2015-02-12 09:19:46 +00:00
defer ticker.Stop()
// Start lookup on each nameserver top-down, in every second
nameservers := r.Nameservers(qname)
for _, nameserver := range nameservers {
2015-02-12 09:19:46 +00:00
wg.Add(1)
2018-07-02 00:47:22 +00:00
go L(r, nameserver)
2015-02-12 09:19:46 +00:00
// but exit early, if we have an answer
select {
case re := <-res:
2020-01-25 17:43:02 +00:00
log.Debug("%s resolv on %s rtt: %v", utils.UnFqdn(qname), re.nameserver, re.rtt)
return re.msg, nil
2015-02-12 09:19:46 +00:00
case <-ticker.C:
2013-07-23 16:37:38 +00:00
continue
}
2015-02-12 09:19:46 +00:00
}
// wait for all the namservers to finish
wg.Wait()
select {
case re := <-res:
log.Debug("%s resolv on %s rtt: %v", utils.UnFqdn(qname), re.nameserver.address, re.rtt)
return re.msg, nil
2015-02-12 09:19:46 +00:00
default:
return nil, ResolvError{qname, net, nameservers}
2013-07-23 11:10:38 +00:00
}
}
func (r *Resolver) resolverFor(network string, n *Nameserver) (*dns.Client, error) {
key := network
// Use HTTPS if network is https, or TLS to force secure connections
if n.net == "https" {
key = n.net
} else if n.net == "tcp-tls" {
key = n.net + ":" + n.address
}
2020-01-25 17:43:02 +00:00
r.clientLock.RLock()
client, exists := r.clients[key]
2020-01-25 17:43:02 +00:00
r.clientLock.RUnlock()
if exists {
return client, nil
}
if n.net != "tcp" && n.net != "tcp-tls" && n.net != "https" && n.net != "udp" {
2020-01-25 17:43:02 +00:00
return nil, errors.New("unknown network type")
}
timeout := r.Timeout()
client = &dns.Client{
Net: n.net,
2020-01-25 17:43:02 +00:00
ReadTimeout: timeout,
WriteTimeout: timeout,
2018-07-02 00:47:22 +00:00
}
if n.net == "tcp-tls" {
host, _, err := net.SplitHostPort(n.address)
2020-01-25 17:43:02 +00:00
if err != nil {
host = n.address
}
client.TLSConfig = &tls.Config{
ServerName: host,
2020-01-25 17:43:02 +00:00
}
}
r.clientLock.Lock()
r.clients[key] = client
2020-01-25 17:43:02 +00:00
r.clientLock.Lock()
return client, nil
2018-07-02 00:47:22 +00:00
}
// Nameservers return the array of nameservers, with port number appended.
// '#' in the name is treated as port separator, as with dnsmasq.
func (r *Resolver) Nameservers(qname string) []*Nameserver {
queryKeys := strings.Split(qname, ".")
queryKeys = queryKeys[:len(queryKeys)-1] // ignore last '.'
if v, found := r.domainServer.search(queryKeys); found {
2020-01-25 17:43:02 +00:00
log.Debug("%s found in domain server list, upstream: %v", qname, v)
2018-07-01 22:44:11 +00:00
//Ensure query the specific upstream nameserver in async Lookup() function.
return []*Nameserver{
{net: "udp", address: net.JoinHostPort(v, "53")},
}
2013-07-23 11:10:38 +00:00
}
2018-07-01 03:08:29 +00:00
return r.servers
2013-07-23 11:10:38 +00:00
}
func (r *Resolver) Timeout() time.Duration {
return time.Duration(r.config.Timeout) * time.Second
}