5501b2201a
Reference issue for this pull request: https://github.com/ooni/probe/issues/2159 This diff refactors the `dnsping` experiment to use the [step-by-step measurement style](https://github.com/ooni/probe-cli/blob/master/docs/design/dd-003-step-by-step.md). Co-authored-by: decfox <decfox@github.com> Co-authored-by: Simone Basso <bassosimone@gmail.com>
171 lines
5.2 KiB
Go
171 lines
5.2 KiB
Go
package measurexlite
|
|
|
|
//
|
|
// DNS Lookup with tracing
|
|
//
|
|
|
|
import (
|
|
"context"
|
|
"log"
|
|
"net"
|
|
"time"
|
|
|
|
"github.com/miekg/dns"
|
|
"github.com/ooni/probe-cli/v3/internal/engine/geolocate"
|
|
"github.com/ooni/probe-cli/v3/internal/model"
|
|
"github.com/ooni/probe-cli/v3/internal/netxlite"
|
|
"github.com/ooni/probe-cli/v3/internal/tracex"
|
|
)
|
|
|
|
// newParallelResolverTrace is equivalent to netxlite.NewParallelResolver
|
|
// except that it returns a model.Resolver that uses this trace.
|
|
func (tx *Trace) newParallelResolverTrace(newResolver func() model.Resolver) model.Resolver {
|
|
return &resolverTrace{
|
|
r: tx.newParallelResolver(newResolver),
|
|
tx: tx,
|
|
}
|
|
}
|
|
|
|
// resolverTrace is a trace-aware resolver
|
|
type resolverTrace struct {
|
|
r model.Resolver
|
|
tx *Trace
|
|
}
|
|
|
|
var _ model.Resolver = &resolverTrace{}
|
|
|
|
// Address implements model.Resolver.Address
|
|
func (r *resolverTrace) Address() string {
|
|
return r.r.Address()
|
|
}
|
|
|
|
// Network implements model.Resolver.Network
|
|
func (r *resolverTrace) Network() string {
|
|
return r.r.Network()
|
|
}
|
|
|
|
// CloseIdleConnections implements model.Resolver.CloseIdleConnections
|
|
func (r *resolverTrace) CloseIdleConnections() {
|
|
r.r.CloseIdleConnections()
|
|
}
|
|
|
|
// LookupHost implements model.Resolver.LookupHost
|
|
func (r *resolverTrace) LookupHost(ctx context.Context, hostname string) ([]string, error) {
|
|
return r.r.LookupHost(netxlite.ContextWithTrace(ctx, r.tx), hostname)
|
|
}
|
|
|
|
// LookupHTTPS implements model.Resolver.LookupHTTPS
|
|
func (r *resolverTrace) LookupHTTPS(ctx context.Context, domain string) (*model.HTTPSSvc, error) {
|
|
return r.r.LookupHTTPS(netxlite.ContextWithTrace(ctx, r.tx), domain)
|
|
}
|
|
|
|
// LookupNS implements model.Resolver.LookupNS
|
|
func (r *resolverTrace) LookupNS(ctx context.Context, domain string) ([]*net.NS, error) {
|
|
return r.r.LookupNS(netxlite.ContextWithTrace(ctx, r.tx), domain)
|
|
}
|
|
|
|
// NewParallelUDPResolver returns a trace-ware parallel UDP resolver
|
|
func (tx *Trace) NewParallelUDPResolver(logger model.Logger, dialer model.Dialer, address string) model.Resolver {
|
|
return tx.newParallelResolverTrace(func() model.Resolver {
|
|
return netxlite.NewParallelUDPResolver(logger, dialer, address)
|
|
})
|
|
}
|
|
|
|
// NewParallelDNSOverHTTPSResolver returns a trace-aware parallel DoH resolver
|
|
func (tx *Trace) NewParallelDNSOverHTTPSResolver(logger model.Logger, URL string) model.Resolver {
|
|
return tx.newParallelResolverTrace(func() model.Resolver {
|
|
return netxlite.NewParallelDNSOverHTTPSResolver(logger, URL)
|
|
})
|
|
}
|
|
|
|
// OnDNSRoundTripForLookupHost implements model.Trace.OnDNSRoundTripForLookupHost
|
|
func (tx *Trace) OnDNSRoundTripForLookupHost(started time.Time, reso model.Resolver, query model.DNSQuery,
|
|
response model.DNSResponse, addrs []string, err error, finished time.Time) {
|
|
ch := tx.DNSLookup[query.Type()]
|
|
if ch == nil {
|
|
// Prevent blocking forever. See https://dave.cheney.net/2014/03/19/channel-axioms.
|
|
log.Printf("BUG: Requested query type %s has no valid channel to buffer results", dns.TypeToString[query.Type()])
|
|
return
|
|
}
|
|
select {
|
|
case ch <- NewArchivalDNSLookupResultFromRoundTrip(
|
|
tx.Index,
|
|
started.Sub(tx.ZeroTime),
|
|
reso,
|
|
query,
|
|
response,
|
|
addrs,
|
|
err,
|
|
finished.Sub(tx.ZeroTime),
|
|
):
|
|
default:
|
|
}
|
|
}
|
|
|
|
// NewArchivalDNSLookupResultFromRoundTrip generates a model.ArchivalDNSLookupResultFromRoundTrip
|
|
// from the available information right after the DNS RoundTrip
|
|
func NewArchivalDNSLookupResultFromRoundTrip(index int64, started time.Duration, reso model.Resolver, query model.DNSQuery,
|
|
response model.DNSResponse, addrs []string, err error, finished time.Duration) *model.ArchivalDNSLookupResult {
|
|
return &model.ArchivalDNSLookupResult{
|
|
Answers: archivalAnswersFromAddrs(addrs),
|
|
Engine: reso.Network(),
|
|
Failure: tracex.NewFailure(err),
|
|
Hostname: query.Domain(),
|
|
QueryType: dns.TypeToString[query.Type()],
|
|
ResolverHostname: nil,
|
|
ResolverAddress: reso.Address(),
|
|
T: finished.Seconds(),
|
|
}
|
|
}
|
|
|
|
// archivalAnswersFromAddrs generates model.ArchivalDNSAnswer from an array of addresses
|
|
func archivalAnswersFromAddrs(addrs []string) (out []model.ArchivalDNSAnswer) {
|
|
for _, addr := range addrs {
|
|
ipv6, err := netxlite.IsIPv6(addr)
|
|
if err != nil {
|
|
log.Printf("BUG: NewArchivalDNSLookupResult: invalid IP address: %s", addr)
|
|
continue
|
|
}
|
|
asn, org, _ := geolocate.LookupASN(addr)
|
|
switch ipv6 {
|
|
case false:
|
|
out = append(out, model.ArchivalDNSAnswer{
|
|
ASN: int64(asn),
|
|
ASOrgName: org,
|
|
AnswerType: "A",
|
|
Hostname: "",
|
|
IPv4: addr,
|
|
TTL: nil,
|
|
})
|
|
case true:
|
|
out = append(out, model.ArchivalDNSAnswer{
|
|
ASN: int64(asn),
|
|
ASOrgName: org,
|
|
AnswerType: "AAAA",
|
|
Hostname: "",
|
|
IPv6: addr,
|
|
TTL: nil,
|
|
})
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
// DNSLookupsFromRoundTrip drains the network events buffered inside the corresponding query channel
|
|
func (tx *Trace) DNSLookupsFromRoundTrip(query uint16) (out []*model.ArchivalDNSLookupResult) {
|
|
ch := tx.DNSLookup[query]
|
|
if ch == nil {
|
|
// Prevent blocking forever. See https://dave.cheney.net/2014/03/19/channel-axioms.
|
|
log.Printf("BUG: Requested query type %s has no valid channel to buffer results", dns.TypeToString[query])
|
|
return
|
|
}
|
|
for {
|
|
select {
|
|
case ev := <-ch:
|
|
out = append(out, ev)
|
|
default:
|
|
return
|
|
}
|
|
}
|
|
}
|