2018-10-01 04:01:06 +02:00
|
|
|
// Matrix Construct
|
|
|
|
//
|
|
|
|
// Copyright (C) Matrix Construct Developers, Authors & Contributors
|
|
|
|
// Copyright (C) 2016-2018 Jason Volk <jason@zemos.net>
|
|
|
|
//
|
|
|
|
// Permission to use, copy, modify, and/or distribute this software for any
|
|
|
|
// purpose with or without fee is hereby granted, provided that the above
|
|
|
|
// copyright notice and this permission notice is present in all copies. The
|
|
|
|
// full license for this software is available in the LICENSE file.
|
|
|
|
|
2019-06-27 08:05:18 +02:00
|
|
|
#include "net_dns.h"
|
2018-10-01 04:01:06 +02:00
|
|
|
|
2018-10-01 22:27:46 +02:00
|
|
|
ircd::mapi::header
|
2018-10-01 04:01:06 +02:00
|
|
|
IRCD_MODULE
|
|
|
|
{
|
2018-10-01 22:27:46 +02:00
|
|
|
"Domain Name System Client, Cache & Components",
|
|
|
|
[] // init
|
|
|
|
{
|
2019-03-22 02:24:36 +01:00
|
|
|
ircd::net::dns::resolver_init(ircd::net::dns::handle_resolved);
|
2018-10-01 22:27:46 +02:00
|
|
|
},
|
|
|
|
[] // fini
|
|
|
|
{
|
|
|
|
ircd::net::dns::resolver_fini();
|
|
|
|
}
|
2018-10-01 04:01:06 +02:00
|
|
|
};
|
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
void
|
|
|
|
IRCD_MODULE_EXPORT
|
|
|
|
ircd::net::dns::resolve(const hostport &hp,
|
|
|
|
const opts &opts_,
|
|
|
|
callback_ipport callback)
|
|
|
|
{
|
|
|
|
if(unlikely(!port(hp) && !hp.service))
|
|
|
|
throw error
|
|
|
|
{
|
|
|
|
"Port or service is required for this query"
|
|
|
|
};
|
|
|
|
|
|
|
|
dns::opts opts(opts_);
|
2019-03-23 10:32:20 +01:00
|
|
|
opts.qtype = opts_.qtype?: 33; // default to SRV
|
2019-03-24 21:20:40 +01:00
|
|
|
|
|
|
|
if(opts.qtype == 33)
|
2018-10-01 21:46:35 +02:00
|
|
|
{
|
2019-03-24 21:20:40 +01:00
|
|
|
opts.nxdomain_exceptions = false;
|
|
|
|
net::dns::callback_one handler
|
|
|
|
{
|
|
|
|
std::bind(&handle_resolve_SRV_ipport, ph::_1, ph::_2, opts, std::move(callback))
|
|
|
|
};
|
2019-03-22 02:24:36 +01:00
|
|
|
|
2019-03-24 21:20:40 +01:00
|
|
|
resolve(hp, opts, std::move(handler));
|
|
|
|
}
|
|
|
|
else if(opts.qtype == 1 || opts.qtype == 28)
|
|
|
|
{
|
|
|
|
net::dns::callback_one handler
|
|
|
|
{
|
|
|
|
std::bind(&handle_resolve_A_ipport, ph::_1, ph::_2, opts, port(hp), std::move(callback))
|
|
|
|
};
|
|
|
|
|
|
|
|
resolve(hp, opts, std::move(handler));
|
|
|
|
}
|
|
|
|
else throw error
|
|
|
|
{
|
|
|
|
"Query type:%u not valid for ipport result callback.", opts.qtype
|
|
|
|
};
|
2018-10-01 21:46:35 +02:00
|
|
|
}
|
|
|
|
|
2018-10-03 23:18:27 +02:00
|
|
|
void
|
2019-03-22 02:24:36 +01:00
|
|
|
IRCD_MODULE_EXPORT
|
|
|
|
ircd::net::dns::resolve(const hostport &hp,
|
|
|
|
const opts &opts,
|
|
|
|
callback_one callback)
|
2018-10-03 23:18:27 +02:00
|
|
|
{
|
2019-03-22 02:24:36 +01:00
|
|
|
if(unlikely(!opts.qtype))
|
|
|
|
throw error
|
|
|
|
{
|
|
|
|
"A query type is required; not specified; cannot be deduced here."
|
|
|
|
};
|
2018-10-03 23:18:27 +02:00
|
|
|
|
2019-03-23 08:59:25 +01:00
|
|
|
dns::callback handler
|
2018-10-03 23:18:27 +02:00
|
|
|
{
|
2019-03-23 08:59:25 +01:00
|
|
|
std::bind(&handle_resolve_one, ph::_1, ph::_2, std::move(callback))
|
|
|
|
};
|
|
|
|
|
|
|
|
resolve(hp, opts, std::move(handler));
|
2019-03-22 02:24:36 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
IRCD_MODULE_EXPORT
|
|
|
|
ircd::net::dns::resolve(const hostport &hp,
|
|
|
|
const opts &opts,
|
|
|
|
callback cb)
|
|
|
|
{
|
|
|
|
assert(ctx::current);
|
|
|
|
if(unlikely(!opts.qtype))
|
|
|
|
throw error
|
|
|
|
{
|
|
|
|
"A query type is required; not specified; cannot be deduced here."
|
|
|
|
};
|
|
|
|
|
|
|
|
if(opts.cache_check)
|
|
|
|
if(cache::get(hp, opts, cb))
|
|
|
|
return;
|
2018-10-03 23:18:27 +02:00
|
|
|
|
2019-03-25 22:06:10 +01:00
|
|
|
if(cb)
|
|
|
|
cache::waiting.emplace_back(hp, opts, std::move(cb));
|
|
|
|
|
2019-03-23 08:59:25 +01:00
|
|
|
resolver_call(hp, opts);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ircd::net::dns::handle_resolve_one(const hostport &hp,
|
|
|
|
const json::array &rrs,
|
|
|
|
callback_one callback)
|
|
|
|
{
|
|
|
|
const json::object &rr
|
2019-03-22 02:24:36 +01:00
|
|
|
{
|
2019-03-24 22:50:26 +01:00
|
|
|
random_choice(rrs)
|
2019-03-23 08:59:25 +01:00
|
|
|
};
|
2019-03-22 02:24:36 +01:00
|
|
|
|
2019-03-23 08:59:25 +01:00
|
|
|
callback(hp, rr);
|
2018-10-03 23:18:27 +02:00
|
|
|
}
|
|
|
|
|
2018-10-01 21:46:35 +02:00
|
|
|
void
|
2019-03-23 08:59:25 +01:00
|
|
|
ircd::net::dns::handle_resolve_SRV_ipport(const hostport &hp,
|
|
|
|
const json::object &rr,
|
|
|
|
opts opts,
|
|
|
|
callback_ipport callback)
|
2018-10-01 21:46:35 +02:00
|
|
|
{
|
2019-03-23 08:59:25 +01:00
|
|
|
const json::string &error
|
2018-10-03 07:38:08 +02:00
|
|
|
{
|
2019-03-23 08:59:25 +01:00
|
|
|
rr.get("error")
|
2018-10-03 07:38:08 +02:00
|
|
|
};
|
|
|
|
|
2019-03-23 08:59:25 +01:00
|
|
|
const hostport &target
|
|
|
|
{
|
|
|
|
rr.has("tgt")?
|
|
|
|
rstrip(unquote(rr.at("tgt")), '.'):
|
|
|
|
host(hp),
|
2018-10-03 07:38:08 +02:00
|
|
|
|
2019-03-23 08:59:25 +01:00
|
|
|
rr.has("port")?
|
|
|
|
rr.get<uint16_t>("port"):
|
|
|
|
!error?
|
|
|
|
port(hp):
|
|
|
|
uint16_t(0)
|
|
|
|
};
|
|
|
|
|
|
|
|
if(error)
|
2019-03-22 02:24:36 +01:00
|
|
|
{
|
2019-03-23 08:59:25 +01:00
|
|
|
static const ipport empty;
|
|
|
|
const auto eptr(make_exception_ptr<rfc1035::error>("%s", error));
|
|
|
|
return callback(eptr, target, empty);
|
|
|
|
}
|
|
|
|
|
|
|
|
opts.qtype = 1;
|
|
|
|
opts.nxdomain_exceptions = true;
|
|
|
|
net::dns::callback_one handler
|
|
|
|
{
|
|
|
|
std::bind(&handle_resolve_A_ipport, ph::_1, ph::_2, opts, port(target), std::move(callback))
|
2019-03-22 02:24:36 +01:00
|
|
|
};
|
|
|
|
|
2019-03-23 08:59:25 +01:00
|
|
|
resolve(target, opts, std::move(handler));
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ircd::net::dns::handle_resolve_A_ipport(const hostport &hp,
|
|
|
|
const json::object &rr,
|
|
|
|
const opts opts,
|
|
|
|
const uint16_t port,
|
|
|
|
const callback_ipport callback)
|
|
|
|
{
|
|
|
|
const json::string &error
|
2019-03-22 02:24:36 +01:00
|
|
|
{
|
2019-03-23 08:59:25 +01:00
|
|
|
rr.get("error")
|
2019-03-22 02:24:36 +01:00
|
|
|
};
|
2018-10-03 07:38:08 +02:00
|
|
|
|
2019-03-23 08:59:25 +01:00
|
|
|
const json::string &ip
|
2018-10-01 21:46:35 +02:00
|
|
|
{
|
2019-03-24 21:20:40 +01:00
|
|
|
opts.qtype == 28?
|
|
|
|
rr.get("ip", ":::0"_sv):
|
|
|
|
rr.get("ip", "0.0.0.0"_sv)
|
2018-10-03 23:18:27 +02:00
|
|
|
};
|
2018-10-01 21:46:35 +02:00
|
|
|
|
2019-03-23 08:59:25 +01:00
|
|
|
const ipport &ipport
|
2019-03-22 02:24:36 +01:00
|
|
|
{
|
2019-03-23 08:59:25 +01:00
|
|
|
ip, port
|
|
|
|
};
|
|
|
|
|
|
|
|
const hostport &target
|
2019-03-22 02:24:36 +01:00
|
|
|
{
|
2019-03-23 08:59:25 +01:00
|
|
|
host(hp), port
|
|
|
|
};
|
|
|
|
|
|
|
|
const auto eptr
|
2019-03-22 02:24:36 +01:00
|
|
|
{
|
2019-03-23 08:59:25 +01:00
|
|
|
!empty(error)?
|
|
|
|
make_exception_ptr<rfc1035::error>("%s", error):
|
|
|
|
!ipport?
|
|
|
|
make_exception_ptr<net::error>("Host has no A record."):
|
|
|
|
std::exception_ptr{}
|
2019-03-22 02:24:36 +01:00
|
|
|
};
|
2019-03-23 08:59:25 +01:00
|
|
|
|
|
|
|
callback(eptr, target, ipport);
|
2018-10-03 23:18:27 +02:00
|
|
|
}
|
2018-10-01 21:46:35 +02:00
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
/// Called back from the dns::resolver with a vector of answers to the
|
|
|
|
/// question (we get the whole tag here).
|
|
|
|
///
|
|
|
|
/// This is being invoked on the dns::resolver's receiver context stack
|
|
|
|
/// under lock preventing any other activity with the resolver.
|
|
|
|
///
|
|
|
|
/// We process these results and insert them into our cache. The cache
|
|
|
|
/// insertion involves sending a message to the DNS room. Matrix hooks
|
|
|
|
/// on that room will catch this message for the user(s) which initiated
|
|
|
|
/// this query; we don't callback or deal with said users here.
|
|
|
|
///
|
2018-10-03 23:18:27 +02:00
|
|
|
void
|
2019-03-22 02:24:36 +01:00
|
|
|
ircd::net::dns::handle_resolved(std::exception_ptr eptr,
|
|
|
|
const tag &tag,
|
|
|
|
const answers &an)
|
|
|
|
try
|
2018-10-03 23:18:27 +02:00
|
|
|
{
|
2019-03-22 02:24:36 +01:00
|
|
|
static const size_t recsz(1024);
|
|
|
|
thread_local char recbuf[recsz * MAX_COUNT];
|
|
|
|
thread_local std::array<const rfc1035::record *, MAX_COUNT> record;
|
|
|
|
|
|
|
|
size_t i(0);
|
|
|
|
mutable_buffer buf{recbuf};
|
|
|
|
for(; i < an.size(); ++i) switch(an.at(i).qtype)
|
2018-11-14 08:19:57 +01:00
|
|
|
{
|
2019-03-22 02:24:36 +01:00
|
|
|
case 1:
|
|
|
|
record.at(i) = new_record<rfc1035::record::A>(buf, an.at(i));
|
|
|
|
continue;
|
|
|
|
|
|
|
|
case 5:
|
|
|
|
record.at(i) = new_record<rfc1035::record::CNAME>(buf, an.at(i));
|
|
|
|
continue;
|
|
|
|
|
|
|
|
case 28:
|
|
|
|
record.at(i) = new_record<rfc1035::record::AAAA>(buf, an.at(i));
|
|
|
|
continue;
|
|
|
|
|
|
|
|
case 33:
|
|
|
|
record.at(i) = new_record<rfc1035::record::SRV>(buf, an.at(i));
|
|
|
|
continue;
|
2018-10-01 04:01:06 +02:00
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
default:
|
|
|
|
record.at(i) = new_record<rfc1035::record>(buf, an.at(i));
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Sort the records by type so we can create smaller vectors to send to the
|
|
|
|
// cache. nulls from running out of space should be pushed to the back.
|
|
|
|
std::sort(begin(record), begin(record) + an.size(), []
|
|
|
|
(const auto *const &a, const auto *const &b)
|
|
|
|
{
|
|
|
|
if(!a)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if(!b)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
return a->type < b->type;
|
|
|
|
});
|
|
|
|
|
|
|
|
//TODO: don't send cache ephemeral rcodes
|
|
|
|
// Bail on error here; send the cache the message
|
2018-10-03 23:18:27 +02:00
|
|
|
if(eptr)
|
2019-03-22 02:24:36 +01:00
|
|
|
{
|
|
|
|
cache::put(tag.hp, tag.opts, tag.rcode, what(eptr));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Branch on no records with no error
|
|
|
|
if(!i)
|
|
|
|
{
|
|
|
|
static const records empty;
|
|
|
|
cache::put(tag.hp, tag.opts, empty);
|
|
|
|
return;
|
|
|
|
}
|
2018-10-03 23:18:27 +02:00
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
// Iterate the record vector which was sorted by type;
|
|
|
|
// send the cache an individual view of each type since
|
|
|
|
// the cache is organized by record type.
|
|
|
|
size_t s(0), e(0);
|
|
|
|
auto last(record.at(e)->type);
|
|
|
|
for(++e; e <= i; ++e)
|
2018-10-03 23:18:27 +02:00
|
|
|
{
|
2019-03-22 02:24:36 +01:00
|
|
|
if(e < i && record.at(e)->type == last)
|
2018-10-03 23:18:27 +02:00
|
|
|
continue;
|
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
const vector_view<const rfc1035::record *> records
|
|
|
|
{
|
|
|
|
record.data() + s, record.data() + e
|
|
|
|
};
|
|
|
|
|
2019-03-26 03:21:22 +01:00
|
|
|
assert(!empty(records));
|
2019-03-22 02:24:36 +01:00
|
|
|
cache::put(tag.hp, tag.opts, records);
|
2019-03-26 03:21:22 +01:00
|
|
|
s = e;
|
2019-03-22 02:24:36 +01:00
|
|
|
if(e < i)
|
|
|
|
last = record.at(e)->type;
|
2018-10-03 23:18:27 +02:00
|
|
|
}
|
2019-03-22 21:30:55 +01:00
|
|
|
|
|
|
|
// We have to send something to the cache with the same type
|
|
|
|
// as the query, otherwise our user will never get a response
|
|
|
|
// to what they're waiting for.
|
|
|
|
bool has_tag_qtype{false};
|
|
|
|
for(size_t i(0); i < an.size() && !has_tag_qtype; ++i)
|
|
|
|
has_tag_qtype = an.at(i).qtype == tag.opts.qtype;
|
|
|
|
|
|
|
|
if(!has_tag_qtype)
|
|
|
|
{
|
|
|
|
static const records empty;
|
|
|
|
cache::put(tag.hp, tag.opts, empty);
|
|
|
|
}
|
2019-03-22 02:24:36 +01:00
|
|
|
}
|
|
|
|
catch(const std::exception &e)
|
|
|
|
{
|
|
|
|
log::error
|
|
|
|
{
|
|
|
|
log, "handle resolved: tag[%u] :%s",
|
|
|
|
tag.id,
|
|
|
|
e.what()
|
|
|
|
};
|
2018-10-03 23:18:27 +02:00
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
throw;
|
2018-10-01 21:46:35 +02:00
|
|
|
}
|
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
template<class type>
|
|
|
|
ircd::rfc1035::record *
|
|
|
|
ircd::net::dns::new_record(mutable_buffer &buf,
|
|
|
|
const rfc1035::answer &answer)
|
|
|
|
{
|
|
|
|
if(unlikely(sizeof(type) > size(buf)))
|
|
|
|
return nullptr;
|
|
|
|
|
|
|
|
const auto pos(data(buf));
|
|
|
|
consume(buf, sizeof(type));
|
|
|
|
return new (data(buf)) type(answer);
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// cache
|
|
|
|
//
|
|
|
|
|
2019-03-23 08:59:25 +01:00
|
|
|
decltype(ircd::net::dns::cache::error_ttl)
|
|
|
|
ircd::net::dns::cache::error_ttl
|
|
|
|
{
|
|
|
|
{ "name", "ircd.net.dns.cache.error_ttl" },
|
|
|
|
{ "default", 1200L },
|
|
|
|
};
|
|
|
|
|
|
|
|
decltype(ircd::net::dns::cache::nxdomain_ttl)
|
|
|
|
ircd::net::dns::cache::nxdomain_ttl
|
|
|
|
{
|
|
|
|
{ "name", "ircd.net.dns.cache.nxdomain_ttl" },
|
2019-03-24 21:21:00 +01:00
|
|
|
{ "default", 86400L },
|
2019-03-23 08:59:25 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
decltype(ircd::net::dns::cache::min_ttl)
|
|
|
|
ircd::net::dns::cache::min_ttl
|
|
|
|
{
|
|
|
|
{ "name", "ircd.net.dns.cache.min_ttl" },
|
2019-03-24 21:21:00 +01:00
|
|
|
{ "default", 28800L },
|
2019-03-23 08:59:25 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
decltype(ircd::net::dns::cache::room_id)
|
|
|
|
ircd::net::dns::cache::room_id
|
|
|
|
{
|
|
|
|
"dns", my_host()
|
|
|
|
};
|
|
|
|
|
|
|
|
decltype(ircd::net::dns::cache::hook)
|
|
|
|
ircd::net::dns::cache::hook
|
|
|
|
{
|
|
|
|
handle,
|
|
|
|
{
|
|
|
|
{ "_site", "vm.notify" },
|
|
|
|
{ "room_id", string_view{room_id} },
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
decltype(ircd::net::dns::cache::waiting)
|
|
|
|
ircd::net::dns::cache::waiting;
|
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
bool
|
|
|
|
IRCD_MODULE_EXPORT
|
|
|
|
ircd::net::dns::cache::put(const hostport &hp,
|
|
|
|
const opts &opts,
|
|
|
|
const uint &code,
|
|
|
|
const string_view &msg)
|
2018-10-01 21:46:35 +02:00
|
|
|
{
|
2019-03-22 02:24:36 +01:00
|
|
|
char type_buf[64];
|
|
|
|
const string_view type
|
2018-10-03 07:38:08 +02:00
|
|
|
{
|
2019-03-22 02:24:36 +01:00
|
|
|
make_type(type_buf, opts.qtype)
|
2018-10-03 07:38:08 +02:00
|
|
|
};
|
|
|
|
|
2019-05-27 01:53:08 +02:00
|
|
|
char state_key_buf[rfc1035::NAME_BUFSIZE * 2];
|
2019-03-22 02:24:36 +01:00
|
|
|
const string_view &state_key
|
|
|
|
{
|
|
|
|
opts.qtype == 33?
|
|
|
|
make_SRV_key(state_key_buf, host(hp), opts):
|
|
|
|
host(hp)
|
|
|
|
};
|
|
|
|
|
2019-05-03 06:39:53 +02:00
|
|
|
return put(type, state_key, code, msg);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
IRCD_MODULE_EXPORT
|
|
|
|
ircd::net::dns::cache::put(const hostport &hp,
|
|
|
|
const opts &opts,
|
|
|
|
const records &rrs)
|
|
|
|
{
|
|
|
|
const auto &type_code
|
|
|
|
{
|
|
|
|
!rrs.empty()? rrs.at(0)->type : opts.qtype
|
|
|
|
};
|
|
|
|
|
|
|
|
char type_buf[48];
|
|
|
|
const string_view type
|
|
|
|
{
|
|
|
|
make_type(type_buf, type_code)
|
|
|
|
};
|
|
|
|
|
2019-05-27 01:53:08 +02:00
|
|
|
char state_key_buf[rfc1035::NAME_BUFSIZE * 2];
|
2019-05-03 06:39:53 +02:00
|
|
|
const string_view &state_key
|
|
|
|
{
|
|
|
|
opts.qtype == 33?
|
|
|
|
make_SRV_key(state_key_buf, host(hp), opts):
|
|
|
|
host(hp)
|
|
|
|
};
|
|
|
|
|
|
|
|
return put(type, state_key, rrs);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ircd::net::dns::cache::put(const string_view &type,
|
|
|
|
const string_view &state_key,
|
|
|
|
const uint &code,
|
|
|
|
const string_view &msg)
|
|
|
|
try
|
|
|
|
{
|
2019-05-09 11:57:10 +02:00
|
|
|
char content_buf[1024];
|
2019-03-22 02:24:36 +01:00
|
|
|
json::stack out{content_buf};
|
|
|
|
json::stack::object content{out};
|
|
|
|
json::stack::array array
|
|
|
|
{
|
|
|
|
content, ""
|
|
|
|
};
|
2018-10-03 07:38:08 +02:00
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
json::stack::object rr0
|
|
|
|
{
|
|
|
|
array
|
|
|
|
};
|
|
|
|
|
|
|
|
json::stack::member
|
|
|
|
{
|
|
|
|
rr0, "errcode", lex_cast(code)
|
|
|
|
};
|
|
|
|
|
|
|
|
json::stack::member
|
|
|
|
{
|
|
|
|
rr0, "error", msg
|
|
|
|
};
|
2018-10-03 07:38:08 +02:00
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
json::stack::member
|
2018-10-01 21:46:35 +02:00
|
|
|
{
|
2019-03-22 02:24:36 +01:00
|
|
|
rr0, "ttl", json::value
|
|
|
|
{
|
|
|
|
code == 3?
|
|
|
|
long(seconds(nxdomain_ttl).count()):
|
|
|
|
long(seconds(error_ttl).count())
|
|
|
|
}
|
2018-10-03 23:18:27 +02:00
|
|
|
};
|
2018-10-01 21:46:35 +02:00
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
rr0.~object();
|
|
|
|
array.~array();
|
|
|
|
content.~object();
|
|
|
|
send(room_id, m::me, type, state_key, json::object(out.completed()));
|
|
|
|
return true;
|
2018-10-03 23:18:27 +02:00
|
|
|
}
|
2019-07-09 10:38:53 +02:00
|
|
|
catch(const http::error &e)
|
|
|
|
{
|
|
|
|
log::error
|
|
|
|
{
|
|
|
|
log, "cache put (%s, %s) code:%u (%s) :%s %s",
|
|
|
|
type,
|
|
|
|
state_key,
|
|
|
|
code,
|
|
|
|
msg,
|
|
|
|
e.what(),
|
|
|
|
e.content,
|
|
|
|
};
|
|
|
|
|
|
|
|
const json::value error_value
|
|
|
|
{
|
|
|
|
json::object{e.content}
|
|
|
|
};
|
|
|
|
|
|
|
|
const json::value error_records{&error_value, 1};
|
|
|
|
const json::strung error{error_records};
|
|
|
|
call_waiters(type, state_key, error);
|
|
|
|
return false;
|
|
|
|
}
|
2019-05-03 06:39:53 +02:00
|
|
|
catch(const std::exception &e)
|
2018-10-03 23:18:27 +02:00
|
|
|
{
|
2019-05-03 06:39:53 +02:00
|
|
|
log::error
|
2018-11-14 08:19:57 +01:00
|
|
|
{
|
2019-05-03 06:39:53 +02:00
|
|
|
log, "cache put (%s, %s) code:%u (%s) :%s",
|
|
|
|
type,
|
|
|
|
state_key,
|
|
|
|
code,
|
|
|
|
msg,
|
|
|
|
e.what()
|
2018-11-14 08:19:57 +01:00
|
|
|
};
|
2018-10-01 21:46:35 +02:00
|
|
|
|
2019-05-03 06:39:53 +02:00
|
|
|
const json::members error_object
|
2019-03-22 02:24:36 +01:00
|
|
|
{
|
2019-05-03 06:39:53 +02:00
|
|
|
{ "error", e.what() },
|
2019-03-22 02:24:36 +01:00
|
|
|
};
|
2019-03-13 00:48:38 +01:00
|
|
|
|
2019-05-03 06:39:53 +02:00
|
|
|
const json::value error_value{error_object};
|
|
|
|
const json::value error_records{&error_value, 1};
|
|
|
|
const json::strung error{error_records};
|
|
|
|
call_waiters(type, state_key, error);
|
|
|
|
return false;
|
|
|
|
}
|
2019-03-13 00:48:38 +01:00
|
|
|
|
2019-05-03 06:39:53 +02:00
|
|
|
bool
|
|
|
|
ircd::net::dns::cache::put(const string_view &type,
|
|
|
|
const string_view &state_key,
|
|
|
|
const records &rrs)
|
|
|
|
try
|
|
|
|
{
|
2019-03-22 02:24:36 +01:00
|
|
|
const unique_buffer<mutable_buffer> buf
|
2018-10-03 23:18:27 +02:00
|
|
|
{
|
2019-03-22 02:24:36 +01:00
|
|
|
8_KiB
|
|
|
|
};
|
2018-10-03 23:18:27 +02:00
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
json::stack out{buf};
|
|
|
|
json::stack::object content{out};
|
|
|
|
json::stack::array array
|
|
|
|
{
|
|
|
|
content, ""
|
|
|
|
};
|
2019-03-13 00:48:38 +01:00
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
if(rrs.empty())
|
|
|
|
{
|
|
|
|
// Add one object to the array with nothing except a ttl indicating no
|
|
|
|
// records (and no error) so we can cache that for the ttl. We use the
|
|
|
|
// nxdomain ttl for this value.
|
|
|
|
json::stack::object rr0{array};
|
|
|
|
json::stack::member
|
|
|
|
{
|
|
|
|
rr0, "ttl", json::value
|
|
|
|
{
|
|
|
|
long(seconds(nxdomain_ttl).count())
|
|
|
|
}
|
|
|
|
};
|
|
|
|
}
|
|
|
|
else for(const auto &record : rrs)
|
|
|
|
{
|
|
|
|
switch(record->type)
|
|
|
|
{
|
|
|
|
case 1: // A
|
|
|
|
{
|
|
|
|
json::stack::object object{array};
|
|
|
|
dynamic_cast<const rfc1035::record::A *>(record)->append(object);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
case 5: // CNAME
|
|
|
|
{
|
|
|
|
json::stack::object object{array};
|
|
|
|
dynamic_cast<const rfc1035::record::CNAME *>(record)->append(object);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
case 28: // AAAA
|
|
|
|
{
|
|
|
|
json::stack::object object{array};
|
|
|
|
dynamic_cast<const rfc1035::record::AAAA *>(record)->append(object);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
case 33: // SRV
|
|
|
|
{
|
|
|
|
json::stack::object object{array};
|
|
|
|
dynamic_cast<const rfc1035::record::SRV *>(record)->append(object);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
2018-10-03 23:18:27 +02:00
|
|
|
}
|
|
|
|
|
2019-03-26 03:07:37 +01:00
|
|
|
// When the array has a zero value count we didn't know how to cache
|
|
|
|
// any of these records; don't send anything to the cache room.
|
|
|
|
if(!array.vc)
|
|
|
|
return false;
|
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
array.~array();
|
|
|
|
content.~object();
|
|
|
|
send(room_id, m::me, type, state_key, json::object{out.completed()});
|
|
|
|
return true;
|
2018-10-01 21:46:35 +02:00
|
|
|
}
|
2019-07-09 10:38:53 +02:00
|
|
|
catch(const http::error &e)
|
|
|
|
{
|
|
|
|
log::error
|
|
|
|
{
|
|
|
|
log, "cache put (%s, %s) rrs:%zu :%s %s",
|
|
|
|
type,
|
|
|
|
state_key,
|
|
|
|
rrs.size(),
|
|
|
|
e.what(),
|
|
|
|
e.content,
|
|
|
|
};
|
|
|
|
|
|
|
|
const json::value error_value
|
|
|
|
{
|
|
|
|
json::object{e.content}
|
|
|
|
};
|
|
|
|
|
|
|
|
const json::value error_records{&error_value, 1};
|
|
|
|
const json::strung error{error_records};
|
|
|
|
call_waiters(type, state_key, error);
|
|
|
|
return false;
|
|
|
|
}
|
2019-05-03 06:39:53 +02:00
|
|
|
catch(const std::exception &e)
|
|
|
|
{
|
|
|
|
log::error
|
|
|
|
{
|
|
|
|
log, "cache put (%s, %s) rrs:%zu :%s",
|
|
|
|
type,
|
|
|
|
state_key,
|
|
|
|
rrs.size(),
|
|
|
|
e.what(),
|
|
|
|
};
|
|
|
|
|
|
|
|
const json::members error_object
|
|
|
|
{
|
|
|
|
{ "error", e.what() },
|
|
|
|
};
|
|
|
|
|
|
|
|
const json::value error_value{error_object};
|
|
|
|
const json::value error_records{&error_value, 1};
|
|
|
|
const json::strung error{error_records};
|
|
|
|
call_waiters(type, state_key, error);
|
|
|
|
return false;
|
|
|
|
}
|
2018-10-01 21:46:35 +02:00
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
bool
|
|
|
|
IRCD_MODULE_EXPORT
|
|
|
|
ircd::net::dns::cache::get(const hostport &hp,
|
2018-10-03 07:38:08 +02:00
|
|
|
const opts &opts,
|
2019-03-22 02:24:36 +01:00
|
|
|
const callback &closure)
|
2018-10-01 21:46:35 +02:00
|
|
|
{
|
2019-03-22 02:24:36 +01:00
|
|
|
char type_buf[48];
|
|
|
|
const string_view type
|
|
|
|
{
|
|
|
|
make_type(type_buf, opts.qtype)
|
|
|
|
};
|
|
|
|
|
2019-05-27 01:53:08 +02:00
|
|
|
char state_key_buf[rfc1035::NAME_BUFSIZE * 2];
|
2019-03-22 02:24:36 +01:00
|
|
|
const string_view &state_key
|
|
|
|
{
|
|
|
|
opts.qtype == 33?
|
|
|
|
make_SRV_key(state_key_buf, host(hp), opts):
|
|
|
|
host(hp)
|
|
|
|
};
|
|
|
|
|
|
|
|
const m::room::state state
|
|
|
|
{
|
|
|
|
room_id
|
|
|
|
};
|
|
|
|
|
|
|
|
const m::event::idx &event_idx
|
|
|
|
{
|
|
|
|
state.get(std::nothrow, type, state_key)
|
|
|
|
};
|
|
|
|
|
|
|
|
if(!event_idx)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
time_t origin_server_ts;
|
|
|
|
if(!m::get<time_t>(event_idx, "origin_server_ts", origin_server_ts))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
bool ret{false};
|
|
|
|
const time_t ts{origin_server_ts / 1000L};
|
|
|
|
m::get(std::nothrow, event_idx, "content", [&hp, &closure, &ret, &ts]
|
|
|
|
(const json::object &content)
|
|
|
|
{
|
|
|
|
const json::array &rrs
|
2018-10-03 07:38:08 +02:00
|
|
|
{
|
2019-03-22 02:24:36 +01:00
|
|
|
content.get("")
|
2018-10-03 07:38:08 +02:00
|
|
|
};
|
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
// If all records are expired then skip; otherwise since this closure
|
|
|
|
// expects a single array we reveal both expired and valid records.
|
|
|
|
ret = !std::all_of(begin(rrs), end(rrs), [&ts]
|
|
|
|
(const json::object &rr)
|
|
|
|
{
|
|
|
|
return expired(rr, ts);
|
|
|
|
});
|
|
|
|
|
2019-03-25 22:06:10 +01:00
|
|
|
if(ret && closure)
|
2019-03-22 02:24:36 +01:00
|
|
|
closure(hp, rrs);
|
|
|
|
});
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
IRCD_MODULE_EXPORT
|
|
|
|
ircd::net::dns::cache::for_each(const hostport &hp,
|
|
|
|
const opts &opts,
|
|
|
|
const closure &closure)
|
|
|
|
{
|
|
|
|
char type_buf[48];
|
|
|
|
const string_view type
|
|
|
|
{
|
|
|
|
make_type(type_buf, opts.qtype)
|
|
|
|
};
|
|
|
|
|
2019-05-27 01:53:08 +02:00
|
|
|
char state_key_buf[rfc1035::NAME_BUFSIZE * 2];
|
2019-03-22 02:24:36 +01:00
|
|
|
const string_view &state_key
|
|
|
|
{
|
|
|
|
opts.qtype == 33?
|
|
|
|
make_SRV_key(state_key_buf, host(hp), opts):
|
|
|
|
host(hp)
|
|
|
|
};
|
|
|
|
|
|
|
|
const m::room::state state
|
|
|
|
{
|
|
|
|
room_id
|
|
|
|
};
|
|
|
|
|
|
|
|
const m::event::idx &event_idx
|
|
|
|
{
|
|
|
|
state.get(std::nothrow, type, state_key)
|
|
|
|
};
|
|
|
|
|
|
|
|
if(!event_idx)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
time_t origin_server_ts;
|
|
|
|
if(!m::get<time_t>(event_idx, "origin_server_ts", origin_server_ts))
|
|
|
|
return false;
|
2018-10-01 21:46:35 +02:00
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
bool ret{true};
|
|
|
|
const time_t ts{origin_server_ts / 1000L};
|
|
|
|
m::get(std::nothrow, event_idx, "content", [&state_key, &closure, &ret, &ts]
|
|
|
|
(const json::object &content)
|
|
|
|
{
|
|
|
|
for(const json::object &rr : json::array(content.get("")))
|
|
|
|
{
|
|
|
|
if(expired(rr, ts))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if(!(ret = closure(state_key, rr)))
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
IRCD_MODULE_EXPORT
|
|
|
|
ircd::net::dns::cache::for_each(const string_view &type,
|
|
|
|
const closure &closure)
|
|
|
|
{
|
|
|
|
char type_buf[48];
|
|
|
|
const string_view full_type
|
|
|
|
{
|
|
|
|
make_type(type_buf, type)
|
|
|
|
};
|
|
|
|
|
|
|
|
const m::room::state state
|
|
|
|
{
|
|
|
|
room_id
|
|
|
|
};
|
|
|
|
|
|
|
|
return state.for_each(full_type, [&closure]
|
|
|
|
(const string_view &, const string_view &state_key, const m::event::idx &event_idx)
|
|
|
|
{
|
|
|
|
time_t origin_server_ts;
|
|
|
|
if(!m::get<time_t>(event_idx, "origin_server_ts", origin_server_ts))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
bool ret{true};
|
|
|
|
const time_t ts{origin_server_ts / 1000L};
|
|
|
|
m::get(std::nothrow, event_idx, "content", [&state_key, &closure, &ret, &ts]
|
|
|
|
(const json::object &content)
|
|
|
|
{
|
|
|
|
for(const json::object &rr : json::array(content.get("")))
|
|
|
|
{
|
|
|
|
if(expired(rr, ts))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if(!(ret = closure(state_key, rr)))
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2019-03-23 08:59:25 +01:00
|
|
|
void
|
|
|
|
ircd::net::dns::cache::handle(const m::event &event,
|
|
|
|
m::vm::eval &eval)
|
|
|
|
try
|
|
|
|
{
|
2019-05-03 06:39:53 +02:00
|
|
|
const string_view &type
|
2019-03-23 08:59:25 +01:00
|
|
|
{
|
|
|
|
json::get<"type"_>(event)
|
|
|
|
};
|
|
|
|
|
2019-05-03 06:39:53 +02:00
|
|
|
if(!startswith(type, "ircd.dns.rrs."))
|
2019-03-23 08:59:25 +01:00
|
|
|
return;
|
|
|
|
|
|
|
|
const string_view &state_key
|
|
|
|
{
|
|
|
|
json::get<"state_key"_>(event)
|
|
|
|
};
|
|
|
|
|
|
|
|
const json::array &rrs
|
|
|
|
{
|
|
|
|
json::get<"content"_>(event).get("")
|
|
|
|
};
|
|
|
|
|
2019-05-03 06:39:53 +02:00
|
|
|
call_waiters(type, state_key, rrs);
|
|
|
|
}
|
|
|
|
catch(const std::exception &e)
|
|
|
|
{
|
|
|
|
log::critical
|
|
|
|
{
|
|
|
|
log, "handle_cached() :%s", e.what()
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ircd::net::dns::cache::call_waiters(const string_view &type,
|
|
|
|
const string_view &state_key,
|
|
|
|
const json::array &rrs)
|
|
|
|
{
|
2019-03-23 08:59:25 +01:00
|
|
|
auto it(begin(waiting));
|
2019-05-09 12:00:29 +02:00
|
|
|
while(it != end(waiting))
|
2019-03-23 08:59:25 +01:00
|
|
|
{
|
|
|
|
auto &waiter(*it);
|
|
|
|
if(call_waiter(type, state_key, rrs, waiter))
|
|
|
|
it = waiting.erase(it);
|
|
|
|
else
|
|
|
|
++it;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ircd::net::dns::cache::call_waiter(const string_view &type,
|
|
|
|
const string_view &state_key,
|
|
|
|
const json::array &rrs,
|
|
|
|
waiter &waiter)
|
2019-05-09 12:00:29 +02:00
|
|
|
try
|
2019-03-23 08:59:25 +01:00
|
|
|
{
|
|
|
|
if(state_key != waiter.key)
|
|
|
|
return false;
|
|
|
|
|
2019-05-03 06:39:53 +02:00
|
|
|
if(lstrip(type, "ircd.dns.rrs.") != rfc1035::rqtype.at(waiter.opts.qtype))
|
2019-03-23 08:59:25 +01:00
|
|
|
return false;
|
|
|
|
|
|
|
|
const hostport &target
|
|
|
|
{
|
|
|
|
waiter.opts.qtype == 33?
|
|
|
|
unmake_SRV_key(waiter.key):
|
|
|
|
waiter.key,
|
|
|
|
|
|
|
|
waiter.port
|
|
|
|
};
|
|
|
|
|
|
|
|
assert(waiter.callback);
|
|
|
|
waiter.callback(target, rrs);
|
|
|
|
return true;
|
|
|
|
}
|
2019-05-09 12:00:29 +02:00
|
|
|
catch(const std::exception &e)
|
|
|
|
{
|
|
|
|
log::critical
|
|
|
|
{
|
|
|
|
log, "callback:%p %s,%s :%s",
|
|
|
|
(const void *)&waiter,
|
|
|
|
type,
|
|
|
|
state_key,
|
|
|
|
e.what(),
|
|
|
|
};
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
2019-03-23 08:59:25 +01:00
|
|
|
|
2019-03-22 02:24:36 +01:00
|
|
|
//
|
|
|
|
// cache room creation
|
|
|
|
//
|
|
|
|
|
|
|
|
namespace ircd::net::dns::cache
|
|
|
|
{
|
|
|
|
static void create_room();
|
|
|
|
|
|
|
|
extern bool room_exists;
|
|
|
|
extern const m::hookfn<m::vm::eval &> create_room_hook;
|
|
|
|
extern const ircd::run::changed create_room_hook_alt;
|
|
|
|
}
|
|
|
|
|
|
|
|
decltype(ircd::net::dns::cache::room_exists)
|
|
|
|
ircd::net::dns::cache::room_exists
|
|
|
|
{
|
|
|
|
m::exists(room_id)
|
|
|
|
};
|
|
|
|
|
|
|
|
decltype(ircd::net::dns::cache::create_room_hook)
|
|
|
|
ircd::net::dns::cache::create_room_hook
|
|
|
|
{
|
|
|
|
{
|
|
|
|
{ "_site", "vm.effect" },
|
|
|
|
{ "room_id", "!ircd" },
|
|
|
|
{ "type", "m.room.create" },
|
|
|
|
},
|
|
|
|
[](const m::event &, m::vm::eval &)
|
|
|
|
{
|
|
|
|
create_room();
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
/// This is for existing installations that won't catch an
|
|
|
|
/// !ircd room create and must create this room.
|
|
|
|
decltype(ircd::net::dns::cache::create_room_hook_alt)
|
|
|
|
ircd::net::dns::cache::create_room_hook_alt{[]
|
|
|
|
(const auto &level)
|
|
|
|
{
|
|
|
|
if(level != run::level::RUN || room_exists)
|
|
|
|
return;
|
|
|
|
|
|
|
|
context{[]
|
|
|
|
{
|
|
|
|
if(m::exists(m::my_room)) // if false, the other hook will succeed.
|
|
|
|
create_room();
|
|
|
|
}};
|
|
|
|
}};
|
|
|
|
|
|
|
|
void
|
|
|
|
ircd::net::dns::cache::create_room()
|
|
|
|
try
|
|
|
|
{
|
|
|
|
const m::room room
|
|
|
|
{
|
|
|
|
m::create(room_id, m::me, "internal")
|
|
|
|
};
|
|
|
|
|
|
|
|
log::debug
|
|
|
|
{
|
|
|
|
m::log, "Created '%s' for the DNS cache module.",
|
|
|
|
string_view{room.room_id}
|
|
|
|
};
|
|
|
|
}
|
|
|
|
catch(const std::exception &e)
|
|
|
|
{
|
|
|
|
log::critical
|
|
|
|
{
|
|
|
|
m::log, "Creating the '%s' room failed :%s",
|
|
|
|
string_view{room_id},
|
|
|
|
e.what()
|
|
|
|
};
|
2018-10-01 04:01:06 +02:00
|
|
|
}
|