2021-02-02 12:05:47 +01:00
|
|
|
package resolver
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
"net/http"
|
|
|
|
"time"
|
|
|
|
|
2021-02-03 12:23:15 +01:00
|
|
|
"github.com/ooni/probe-cli/v3/internal/engine/httpheader"
|
2021-09-05 14:49:38 +02:00
|
|
|
"github.com/ooni/probe-cli/v3/internal/netxlite/iox"
|
2021-02-02 12:05:47 +01:00
|
|
|
)
|
|
|
|
|
2021-09-09 20:49:12 +02:00
|
|
|
// HTTPClient is the HTTP client expected by DNSOverHTTPS.
|
|
|
|
type HTTPClient interface {
|
|
|
|
Do(req *http.Request) (*http.Response, error)
|
|
|
|
CloseIdleConnections()
|
|
|
|
}
|
|
|
|
|
2021-02-02 12:05:47 +01:00
|
|
|
// DNSOverHTTPS is a DNS over HTTPS RoundTripper. Requests are submitted over
|
|
|
|
// an HTTP/HTTPS channel provided by URL using the Do function.
|
|
|
|
type DNSOverHTTPS struct {
|
2021-09-09 20:49:12 +02:00
|
|
|
Client HTTPClient
|
2021-02-02 12:05:47 +01:00
|
|
|
URL string
|
|
|
|
HostOverride string
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewDNSOverHTTPS creates a new DNSOverHTTP instance from the
|
|
|
|
// specified http.Client and URL, as a convenience.
|
2021-09-09 20:49:12 +02:00
|
|
|
func NewDNSOverHTTPS(client *http.Client, URL string) *DNSOverHTTPS {
|
2021-02-02 12:05:47 +01:00
|
|
|
return NewDNSOverHTTPSWithHostOverride(client, URL, "")
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewDNSOverHTTPSWithHostOverride is like NewDNSOverHTTPS except that
|
|
|
|
// it's creating a resolver where we use the specified host.
|
2021-09-09 20:49:12 +02:00
|
|
|
func NewDNSOverHTTPSWithHostOverride(
|
|
|
|
client *http.Client, URL, hostOverride string) *DNSOverHTTPS {
|
|
|
|
return &DNSOverHTTPS{Client: client, URL: URL, HostOverride: hostOverride}
|
2021-02-02 12:05:47 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// RoundTrip implements RoundTripper.RoundTrip.
|
2021-09-09 20:49:12 +02:00
|
|
|
func (t *DNSOverHTTPS) RoundTrip(ctx context.Context, query []byte) ([]byte, error) {
|
2021-02-02 12:05:47 +01:00
|
|
|
ctx, cancel := context.WithTimeout(ctx, 45*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
req, err := http.NewRequest("POST", t.URL, bytes.NewReader(query))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
req.Host = t.HostOverride
|
|
|
|
req.Header.Set("user-agent", httpheader.UserAgent())
|
|
|
|
req.Header.Set("content-type", "application/dns-message")
|
|
|
|
var resp *http.Response
|
2021-09-09 20:49:12 +02:00
|
|
|
resp, err = t.Client.Do(req.WithContext(ctx))
|
2021-02-02 12:05:47 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer resp.Body.Close()
|
|
|
|
if resp.StatusCode != 200 {
|
|
|
|
// TODO(bassosimone): we should map the status code to a
|
|
|
|
// proper Error in the DNS context.
|
|
|
|
return nil, errors.New("doh: server returned error")
|
|
|
|
}
|
|
|
|
if resp.Header.Get("content-type") != "application/dns-message" {
|
|
|
|
return nil, errors.New("doh: invalid content-type")
|
|
|
|
}
|
2021-06-15 11:57:40 +02:00
|
|
|
return iox.ReadAllContext(ctx, resp.Body)
|
2021-02-02 12:05:47 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// RequiresPadding returns true for DoH according to RFC8467
|
2021-09-09 20:49:12 +02:00
|
|
|
func (t *DNSOverHTTPS) RequiresPadding() bool {
|
2021-02-02 12:05:47 +01:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// Network returns the transport network (e.g., doh, dot)
|
2021-09-09 20:49:12 +02:00
|
|
|
func (t *DNSOverHTTPS) Network() string {
|
2021-02-02 12:05:47 +01:00
|
|
|
return "doh"
|
|
|
|
}
|
|
|
|
|
|
|
|
// Address returns the upstream server address.
|
2021-09-09 20:49:12 +02:00
|
|
|
func (t *DNSOverHTTPS) Address() string {
|
2021-02-02 12:05:47 +01:00
|
|
|
return t.URL
|
|
|
|
}
|
|
|
|
|
2021-09-09 20:49:12 +02:00
|
|
|
// CloseIdleConnections closes idle connections.
|
|
|
|
func (t *DNSOverHTTPS) CloseIdleConnections() {
|
|
|
|
t.Client.CloseIdleConnections()
|
|
|
|
}
|
|
|
|
|
|
|
|
var _ RoundTripper = &DNSOverHTTPS{}
|