mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-12-15 03:36:37 +00:00
287 lines
7.4 KiB
Go
287 lines
7.4 KiB
Go
package dns
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"fmt"
|
|
"time"
|
|
)
|
|
|
|
// Envelope is used when doing a zone transfer with a remote server.
|
|
type Envelope struct {
|
|
RR []RR // The set of RRs in the answer section of the xfr reply message.
|
|
Error error // If something went wrong, this contains the error.
|
|
}
|
|
|
|
// A Transfer defines parameters that are used during a zone transfer.
|
|
type Transfer struct {
|
|
*Conn
|
|
DialTimeout time.Duration // net.DialTimeout, defaults to 2 seconds
|
|
ReadTimeout time.Duration // net.Conn.SetReadTimeout value for connections, defaults to 2 seconds
|
|
WriteTimeout time.Duration // net.Conn.SetWriteTimeout value for connections, defaults to 2 seconds
|
|
TsigProvider TsigProvider // An implementation of the TsigProvider interface. If defined it replaces TsigSecret and is used for all TSIG operations.
|
|
TsigSecret map[string]string // Secret(s) for Tsig map[<zonename>]<base64 secret>, zonename must be in canonical form (lowercase, fqdn, see RFC 4034 Section 6.2)
|
|
tsigTimersOnly bool
|
|
TLS *tls.Config // TLS config. If Xfr over TLS will be attempted
|
|
}
|
|
|
|
func (t *Transfer) tsigProvider() TsigProvider {
|
|
if t.TsigProvider != nil {
|
|
return t.TsigProvider
|
|
}
|
|
if t.TsigSecret != nil {
|
|
return tsigSecretProvider(t.TsigSecret)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// TODO: Think we need to away to stop the transfer
|
|
|
|
// In performs an incoming transfer with the server in a.
|
|
// If you would like to set the source IP, or some other attribute
|
|
// of a Dialer for a Transfer, you can do so by specifying the attributes
|
|
// in the Transfer.Conn:
|
|
//
|
|
// d := net.Dialer{LocalAddr: transfer_source}
|
|
// con, err := d.Dial("tcp", master)
|
|
// dnscon := &dns.Conn{Conn:con}
|
|
// transfer = &dns.Transfer{Conn: dnscon}
|
|
// channel, err := transfer.In(message, master)
|
|
func (t *Transfer) In(q *Msg, a string) (env chan *Envelope, err error) {
|
|
switch q.Question[0].Qtype {
|
|
case TypeAXFR, TypeIXFR:
|
|
default:
|
|
return nil, &Error{"unsupported question type"}
|
|
}
|
|
|
|
timeout := dnsTimeout
|
|
if t.DialTimeout != 0 {
|
|
timeout = t.DialTimeout
|
|
}
|
|
|
|
if t.Conn == nil {
|
|
if t.TLS != nil {
|
|
t.Conn, err = DialTimeoutWithTLS("tcp-tls", a, t.TLS, timeout)
|
|
} else {
|
|
t.Conn, err = DialTimeout("tcp", a, timeout)
|
|
}
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
if err := t.WriteMsg(q); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
env = make(chan *Envelope)
|
|
switch q.Question[0].Qtype {
|
|
case TypeAXFR:
|
|
go t.inAxfr(q, env)
|
|
case TypeIXFR:
|
|
go t.inIxfr(q, env)
|
|
}
|
|
|
|
return env, nil
|
|
}
|
|
|
|
func (t *Transfer) inAxfr(q *Msg, c chan *Envelope) {
|
|
first := true
|
|
defer func() {
|
|
// First close the connection, then the channel. This allows functions blocked on
|
|
// the channel to assume that the connection is closed and no further operations are
|
|
// pending when they resume.
|
|
t.Close()
|
|
close(c)
|
|
}()
|
|
timeout := dnsTimeout
|
|
if t.ReadTimeout != 0 {
|
|
timeout = t.ReadTimeout
|
|
}
|
|
for {
|
|
t.Conn.SetReadDeadline(time.Now().Add(timeout))
|
|
in, err := t.ReadMsg()
|
|
if err != nil {
|
|
c <- &Envelope{nil, err}
|
|
return
|
|
}
|
|
if q.Id != in.Id {
|
|
c <- &Envelope{in.Answer, ErrId}
|
|
return
|
|
}
|
|
if first {
|
|
if in.Rcode != RcodeSuccess {
|
|
c <- &Envelope{in.Answer, &Error{err: fmt.Sprintf(errXFR, in.Rcode)}}
|
|
return
|
|
}
|
|
if !isSOAFirst(in) {
|
|
c <- &Envelope{in.Answer, ErrSoa}
|
|
return
|
|
}
|
|
first = !first
|
|
// only one answer that is SOA, receive more
|
|
if len(in.Answer) == 1 {
|
|
t.tsigTimersOnly = true
|
|
c <- &Envelope{in.Answer, nil}
|
|
continue
|
|
}
|
|
}
|
|
|
|
if !first {
|
|
t.tsigTimersOnly = true // Subsequent envelopes use this.
|
|
if isSOALast(in) {
|
|
c <- &Envelope{in.Answer, nil}
|
|
return
|
|
}
|
|
c <- &Envelope{in.Answer, nil}
|
|
}
|
|
}
|
|
}
|
|
|
|
func (t *Transfer) inIxfr(q *Msg, c chan *Envelope) {
|
|
var serial uint32 // The first serial seen is the current server serial
|
|
axfr := true
|
|
n := 0
|
|
qser := q.Ns[0].(*SOA).Serial
|
|
defer func() {
|
|
// First close the connection, then the channel. This allows functions blocked on
|
|
// the channel to assume that the connection is closed and no further operations are
|
|
// pending when they resume.
|
|
t.Close()
|
|
close(c)
|
|
}()
|
|
timeout := dnsTimeout
|
|
if t.ReadTimeout != 0 {
|
|
timeout = t.ReadTimeout
|
|
}
|
|
for {
|
|
t.SetReadDeadline(time.Now().Add(timeout))
|
|
in, err := t.ReadMsg()
|
|
if err != nil {
|
|
c <- &Envelope{nil, err}
|
|
return
|
|
}
|
|
if q.Id != in.Id {
|
|
c <- &Envelope{in.Answer, ErrId}
|
|
return
|
|
}
|
|
if in.Rcode != RcodeSuccess {
|
|
c <- &Envelope{in.Answer, &Error{err: fmt.Sprintf(errXFR, in.Rcode)}}
|
|
return
|
|
}
|
|
if n == 0 {
|
|
// Check if the returned answer is ok
|
|
if !isSOAFirst(in) {
|
|
c <- &Envelope{in.Answer, ErrSoa}
|
|
return
|
|
}
|
|
// This serial is important
|
|
serial = in.Answer[0].(*SOA).Serial
|
|
// Check if there are no changes in zone
|
|
if qser >= serial {
|
|
c <- &Envelope{in.Answer, nil}
|
|
return
|
|
}
|
|
}
|
|
// Now we need to check each message for SOA records, to see what we need to do
|
|
t.tsigTimersOnly = true
|
|
for _, rr := range in.Answer {
|
|
if v, ok := rr.(*SOA); ok {
|
|
if v.Serial == serial {
|
|
n++
|
|
// quit if it's a full axfr or the servers' SOA is repeated the third time
|
|
if axfr && n == 2 || n == 3 {
|
|
c <- &Envelope{in.Answer, nil}
|
|
return
|
|
}
|
|
} else if axfr {
|
|
// it's an ixfr
|
|
axfr = false
|
|
}
|
|
}
|
|
}
|
|
c <- &Envelope{in.Answer, nil}
|
|
}
|
|
}
|
|
|
|
// Out performs an outgoing transfer with the client connecting in w.
|
|
// Basic use pattern:
|
|
//
|
|
// ch := make(chan *dns.Envelope)
|
|
// tr := new(dns.Transfer)
|
|
// var wg sync.WaitGroup
|
|
// wg.Add(1)
|
|
// go func() {
|
|
// tr.Out(w, r, ch)
|
|
// wg.Done()
|
|
// }()
|
|
// ch <- &dns.Envelope{RR: []dns.RR{soa, rr1, rr2, rr3, soa}}
|
|
// close(ch)
|
|
// wg.Wait() // wait until everything is written out
|
|
// w.Close() // close connection
|
|
//
|
|
// The server is responsible for sending the correct sequence of RRs through the channel ch.
|
|
func (t *Transfer) Out(w ResponseWriter, q *Msg, ch chan *Envelope) error {
|
|
for x := range ch {
|
|
r := new(Msg)
|
|
// Compress?
|
|
r.SetReply(q)
|
|
r.Authoritative = true
|
|
// assume it fits TODO(miek): fix
|
|
r.Answer = append(r.Answer, x.RR...)
|
|
if tsig := q.IsTsig(); tsig != nil && w.TsigStatus() == nil {
|
|
r.SetTsig(tsig.Hdr.Name, tsig.Algorithm, tsig.Fudge, time.Now().Unix())
|
|
}
|
|
if err := w.WriteMsg(r); err != nil {
|
|
return err
|
|
}
|
|
w.TsigTimersOnly(true)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// ReadMsg reads a message from the transfer connection t.
|
|
func (t *Transfer) ReadMsg() (*Msg, error) {
|
|
m := new(Msg)
|
|
p := make([]byte, MaxMsgSize)
|
|
n, err := t.Read(p)
|
|
if err != nil && n == 0 {
|
|
return nil, err
|
|
}
|
|
p = p[:n]
|
|
if err := m.Unpack(p); err != nil {
|
|
return nil, err
|
|
}
|
|
if ts, tp := m.IsTsig(), t.tsigProvider(); ts != nil && tp != nil {
|
|
// Need to work on the original message p, as that was used to calculate the tsig.
|
|
err = TsigVerifyWithProvider(p, tp, t.tsigRequestMAC, t.tsigTimersOnly)
|
|
t.tsigRequestMAC = ts.MAC
|
|
}
|
|
return m, err
|
|
}
|
|
|
|
// WriteMsg writes a message through the transfer connection t.
|
|
func (t *Transfer) WriteMsg(m *Msg) (err error) {
|
|
var out []byte
|
|
if ts, tp := m.IsTsig(), t.tsigProvider(); ts != nil && tp != nil {
|
|
out, t.tsigRequestMAC, err = TsigGenerateWithProvider(m, tp, t.tsigRequestMAC, t.tsigTimersOnly)
|
|
} else {
|
|
out, err = m.Pack()
|
|
}
|
|
if err != nil {
|
|
return err
|
|
}
|
|
_, err = t.Write(out)
|
|
return err
|
|
}
|
|
|
|
func isSOAFirst(in *Msg) bool {
|
|
return len(in.Answer) > 0 &&
|
|
in.Answer[0].Header().Rrtype == TypeSOA
|
|
}
|
|
|
|
func isSOALast(in *Msg) bool {
|
|
return len(in.Answer) > 0 &&
|
|
in.Answer[len(in.Answer)-1].Header().Rrtype == TypeSOA
|
|
}
|
|
|
|
const errXFR = "bad xfr rcode: %d"
|