2022-05-13 17:36:58 +02:00
|
|
|
package netxlite
|
|
|
|
|
|
|
|
//
|
2022-05-15 19:25:27 +02:00
|
|
|
// Parallel DNS resolver implementation
|
2022-05-13 17:36:58 +02:00
|
|
|
//
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2022-05-16 10:46:53 +02:00
|
|
|
"net"
|
2022-05-13 17:36:58 +02:00
|
|
|
|
|
|
|
"github.com/miekg/dns"
|
|
|
|
"github.com/ooni/probe-cli/v3/internal/atomicx"
|
|
|
|
"github.com/ooni/probe-cli/v3/internal/model"
|
|
|
|
)
|
|
|
|
|
|
|
|
// ParallelResolver uses a transport and performs a LookupHost
|
|
|
|
// operation in a parallel fashion, hence its name.
|
|
|
|
//
|
|
|
|
// You should probably use NewUnwrappedParallelResolver to
|
|
|
|
// create a new instance of this type.
|
|
|
|
type ParallelResolver struct {
|
|
|
|
// Encoder is the MANDATORY encoder to use.
|
|
|
|
Encoder model.DNSEncoder
|
|
|
|
|
|
|
|
// Decoder is the MANDATORY decoder to use.
|
|
|
|
Decoder model.DNSDecoder
|
|
|
|
|
|
|
|
// NumTimeouts is MANDATORY and counts the number of timeouts.
|
|
|
|
NumTimeouts *atomicx.Int64
|
|
|
|
|
|
|
|
// Txp is the MANDATORY underlying DNS transport.
|
|
|
|
Txp model.DNSTransport
|
|
|
|
}
|
|
|
|
|
|
|
|
// UnwrappedParallelResolver creates a new ParallelResolver instance. This instance is
|
|
|
|
// not wrapped and you should wrap if before using it.
|
|
|
|
func NewUnwrappedParallelResolver(t model.DNSTransport) *ParallelResolver {
|
|
|
|
return &ParallelResolver{
|
|
|
|
Encoder: &DNSEncoderMiekg{},
|
|
|
|
Decoder: &DNSDecoderMiekg{},
|
|
|
|
NumTimeouts: &atomicx.Int64{},
|
|
|
|
Txp: t,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Transport returns the transport being used.
|
|
|
|
func (r *ParallelResolver) Transport() model.DNSTransport {
|
|
|
|
return r.Txp
|
|
|
|
}
|
|
|
|
|
|
|
|
// Network returns the "network" of the underlying transport.
|
|
|
|
func (r *ParallelResolver) Network() string {
|
|
|
|
return r.Txp.Network()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Address returns the "address" of the underlying transport.
|
|
|
|
func (r *ParallelResolver) Address() string {
|
|
|
|
return r.Txp.Address()
|
|
|
|
}
|
|
|
|
|
|
|
|
// CloseIdleConnections closes idle connections, if any.
|
|
|
|
func (r *ParallelResolver) CloseIdleConnections() {
|
|
|
|
r.Txp.CloseIdleConnections()
|
|
|
|
}
|
|
|
|
|
|
|
|
// LookupHost performs an A lookup in parallel with an AAAA lookup.
|
|
|
|
func (r *ParallelResolver) LookupHost(ctx context.Context, hostname string) ([]string, error) {
|
|
|
|
ach := make(chan *parallelResolverResult)
|
|
|
|
go r.lookupHost(ctx, hostname, dns.TypeA, ach)
|
|
|
|
aaaach := make(chan *parallelResolverResult)
|
|
|
|
go r.lookupHost(ctx, hostname, dns.TypeAAAA, aaaach)
|
|
|
|
ares := <-ach
|
|
|
|
aaaares := <-aaaach
|
|
|
|
if ares.err != nil && aaaares.err != nil {
|
|
|
|
// Note: we choose to return the A error because we assume that
|
|
|
|
// it's the more meaningful one: the AAAA error may just be telling
|
|
|
|
// us that there is no AAAA record for the website.
|
|
|
|
return nil, ares.err
|
|
|
|
}
|
|
|
|
var addrs []string
|
|
|
|
addrs = append(addrs, ares.addrs...)
|
|
|
|
addrs = append(addrs, aaaares.addrs...)
|
|
|
|
return addrs, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// LookupHTTPS implements Resolver.LookupHTTPS.
|
|
|
|
func (r *ParallelResolver) LookupHTTPS(
|
|
|
|
ctx context.Context, hostname string) (*model.HTTPSSvc, error) {
|
2022-05-14 19:38:46 +02:00
|
|
|
querydata, queryID, err := r.Encoder.Encode(
|
2022-05-13 17:36:58 +02:00
|
|
|
hostname, dns.TypeHTTPS, r.Txp.RequiresPadding())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
replydata, err := r.Txp.RoundTrip(ctx, querydata)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2022-05-14 19:38:46 +02:00
|
|
|
return r.Decoder.DecodeHTTPS(replydata, queryID)
|
2022-05-13 17:36:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// parallelResolverResult is the internal representation of a
|
|
|
|
// lookup using either the A or the AAAA query type.
|
|
|
|
type parallelResolverResult struct {
|
|
|
|
addrs []string
|
|
|
|
err error
|
|
|
|
}
|
|
|
|
|
|
|
|
// lookupHost issues a lookup host query for the specified qtype (e.g., dns.A).
|
|
|
|
func (r *ParallelResolver) lookupHost(ctx context.Context, hostname string,
|
|
|
|
qtype uint16, out chan<- *parallelResolverResult) {
|
2022-05-14 19:38:46 +02:00
|
|
|
querydata, queryID, err := r.Encoder.Encode(hostname, qtype, r.Txp.RequiresPadding())
|
2022-05-13 17:36:58 +02:00
|
|
|
if err != nil {
|
|
|
|
out <- ¶llelResolverResult{
|
|
|
|
addrs: []string{},
|
|
|
|
err: err,
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
replydata, err := r.Txp.RoundTrip(ctx, querydata)
|
|
|
|
if err != nil {
|
|
|
|
out <- ¶llelResolverResult{
|
|
|
|
addrs: []string{},
|
|
|
|
err: err,
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
2022-05-14 19:38:46 +02:00
|
|
|
addrs, err := r.Decoder.DecodeLookupHost(qtype, replydata, queryID)
|
2022-05-13 17:36:58 +02:00
|
|
|
out <- ¶llelResolverResult{
|
|
|
|
addrs: addrs,
|
|
|
|
err: err,
|
|
|
|
}
|
|
|
|
}
|
2022-05-16 10:46:53 +02:00
|
|
|
|
|
|
|
// LookupNS implements Resolver.LookupNS.
|
|
|
|
func (r *ParallelResolver) LookupNS(
|
|
|
|
ctx context.Context, hostname string) ([]*net.NS, error) {
|
|
|
|
querydata, queryID, err := r.Encoder.Encode(
|
|
|
|
hostname, dns.TypeNS, r.Txp.RequiresPadding())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
replydata, err := r.Txp.RoundTrip(ctx, querydata)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return r.Decoder.DecodeNS(replydata, queryID)
|
|
|
|
}
|