blob: 75d14199ee86bdc3bdd753425b421a9c88a89216 [file] [log] [blame]
Emeric Brunc9437992021-02-12 19:42:55 +01001/*
2 * Name server resolution
3 *
4 * Copyright 2014 Baptiste Assmann <bedis9@gmail.com>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
13#include <errno.h>
14#include <fcntl.h>
15#include <stdio.h>
16#include <stdlib.h>
17#include <string.h>
18#include <unistd.h>
19
20#include <sys/types.h>
21
Emeric Brun0c4a8a32021-06-11 10:48:45 +020022#include <import/ebistree.h>
23
Emeric Brunc9437992021-02-12 19:42:55 +010024#include <haproxy/action.h>
25#include <haproxy/api.h>
26#include <haproxy/cfgparse.h>
27#include <haproxy/channel.h>
28#include <haproxy/check.h>
29#include <haproxy/cli.h>
30#include <haproxy/dns.h>
31#include <haproxy/errors.h>
32#include <haproxy/fd.h>
Emeric Brunc9437992021-02-12 19:42:55 +010033#include <haproxy/http_rules.h>
34#include <haproxy/log.h>
35#include <haproxy/net_helper.h>
36#include <haproxy/protocol.h>
37#include <haproxy/proxy.h>
38#include <haproxy/resolvers.h>
39#include <haproxy/ring.h>
40#include <haproxy/sample.h>
41#include <haproxy/server.h>
42#include <haproxy/stats.h>
43#include <haproxy/stream_interface.h>
44#include <haproxy/task.h>
45#include <haproxy/tcp_rules.h>
46#include <haproxy/ticks.h>
47#include <haproxy/time.h>
Willy Tarreauca14dd52021-05-08 12:59:47 +020048#include <haproxy/tools.h>
Emeric Brunc9437992021-02-12 19:42:55 +010049#include <haproxy/vars.h>
50
51
52struct list sec_resolvers = LIST_HEAD_INIT(sec_resolvers);
53struct list resolv_srvrq_list = LIST_HEAD_INIT(resolv_srvrq_list);
54
55static THREAD_LOCAL uint64_t resolv_query_id_seed = 0; /* random seed */
56struct resolvers *curr_resolvers = NULL;
57
58DECLARE_STATIC_POOL(resolv_answer_item_pool, "resolv_answer_item", sizeof(struct resolv_answer_item));
59DECLARE_STATIC_POOL(resolv_resolution_pool, "resolv_resolution", sizeof(struct resolv_resolution));
60DECLARE_POOL(resolv_requester_pool, "resolv_requester", sizeof(struct resolv_requester));
61
62static unsigned int resolution_uuid = 1;
63unsigned int resolv_failed_resolutions = 0;
64
65enum {
66 DNS_STAT_ID,
67 DNS_STAT_PID,
68 DNS_STAT_SENT,
69 DNS_STAT_SND_ERROR,
70 DNS_STAT_VALID,
71 DNS_STAT_UPDATE,
72 DNS_STAT_CNAME,
73 DNS_STAT_CNAME_ERROR,
74 DNS_STAT_ANY_ERR,
75 DNS_STAT_NX,
76 DNS_STAT_TIMEOUT,
77 DNS_STAT_REFUSED,
78 DNS_STAT_OTHER,
79 DNS_STAT_INVALID,
80 DNS_STAT_TOO_BIG,
81 DNS_STAT_TRUNCATED,
82 DNS_STAT_OUTDATED,
83 DNS_STAT_END,
84};
85
86static struct name_desc dns_stats[] = {
87 [DNS_STAT_ID] = { .name = "id", .desc = "ID" },
88 [DNS_STAT_PID] = { .name = "pid", .desc = "Parent ID" },
89 [DNS_STAT_SENT] = { .name = "sent", .desc = "Sent" },
90 [DNS_STAT_SND_ERROR] = { .name = "send_error", .desc = "Send error" },
91 [DNS_STAT_VALID] = { .name = "valid", .desc = "Valid" },
92 [DNS_STAT_UPDATE] = { .name = "update", .desc = "Update" },
93 [DNS_STAT_CNAME] = { .name = "cname", .desc = "CNAME" },
94 [DNS_STAT_CNAME_ERROR] = { .name = "cname_error", .desc = "CNAME error" },
95 [DNS_STAT_ANY_ERR] = { .name = "any_err", .desc = "Any errors" },
96 [DNS_STAT_NX] = { .name = "nx", .desc = "NX" },
97 [DNS_STAT_TIMEOUT] = { .name = "timeout", .desc = "Timeout" },
98 [DNS_STAT_REFUSED] = { .name = "refused", .desc = "Refused" },
99 [DNS_STAT_OTHER] = { .name = "other", .desc = "Other" },
100 [DNS_STAT_INVALID] = { .name = "invalid", .desc = "Invalid" },
101 [DNS_STAT_TOO_BIG] = { .name = "too_big", .desc = "Too big" },
102 [DNS_STAT_TRUNCATED] = { .name = "truncated", .desc = "Truncated" },
103 [DNS_STAT_OUTDATED] = { .name = "outdated", .desc = "Outdated" },
104};
105
106static struct dns_counters dns_counters;
107
108static void dns_fill_stats(void *d, struct field *stats)
109{
110 struct dns_counters *counters = d;
111 stats[DNS_STAT_ID] = mkf_str(FO_CONFIG, counters->id);
112 stats[DNS_STAT_PID] = mkf_str(FO_CONFIG, counters->pid);
113 stats[DNS_STAT_SENT] = mkf_u64(FN_GAUGE, counters->sent);
114 stats[DNS_STAT_SND_ERROR] = mkf_u64(FN_GAUGE, counters->snd_error);
115 stats[DNS_STAT_VALID] = mkf_u64(FN_GAUGE, counters->valid);
116 stats[DNS_STAT_UPDATE] = mkf_u64(FN_GAUGE, counters->update);
117 stats[DNS_STAT_CNAME] = mkf_u64(FN_GAUGE, counters->cname);
118 stats[DNS_STAT_CNAME_ERROR] = mkf_u64(FN_GAUGE, counters->cname_error);
119 stats[DNS_STAT_ANY_ERR] = mkf_u64(FN_GAUGE, counters->any_err);
120 stats[DNS_STAT_NX] = mkf_u64(FN_GAUGE, counters->nx);
121 stats[DNS_STAT_TIMEOUT] = mkf_u64(FN_GAUGE, counters->timeout);
122 stats[DNS_STAT_REFUSED] = mkf_u64(FN_GAUGE, counters->refused);
123 stats[DNS_STAT_OTHER] = mkf_u64(FN_GAUGE, counters->other);
124 stats[DNS_STAT_INVALID] = mkf_u64(FN_GAUGE, counters->invalid);
125 stats[DNS_STAT_TOO_BIG] = mkf_u64(FN_GAUGE, counters->too_big);
126 stats[DNS_STAT_TRUNCATED] = mkf_u64(FN_GAUGE, counters->truncated);
127 stats[DNS_STAT_OUTDATED] = mkf_u64(FN_GAUGE, counters->outdated);
128}
129
130static struct stats_module dns_stats_module = {
131 .name = "dns",
132 .domain_flags = STATS_DOMAIN_DNS << STATS_DOMAIN,
133 .fill_stats = dns_fill_stats,
134 .stats = dns_stats,
135 .stats_count = DNS_STAT_END,
136 .counters = &dns_counters,
137 .counters_size = sizeof(dns_counters),
138 .clearable = 0,
139};
140
141INITCALL1(STG_REGISTER, stats_register_module, &dns_stats_module);
142
143/* Returns a pointer to the resolvers matching the id <id>. NULL is returned if
144 * no match is found.
145 */
146struct resolvers *find_resolvers_by_id(const char *id)
147{
148 struct resolvers *res;
149
150 list_for_each_entry(res, &sec_resolvers, list) {
151 if (strcmp(res->id, id) == 0)
152 return res;
153 }
154 return NULL;
155}
156
157/* Compare hostnames in a case-insensitive way .
158 * Returns 0 if they are the same, non-zero otherwise
159 */
160static __inline int resolv_hostname_cmp(const char *name1, const char *name2, int len)
161{
162 int i;
163
164 for (i = 0; i < len; i++)
165 if (tolower((unsigned char)name1[i]) != tolower((unsigned char)name2[i]))
166 return -1;
167 return 0;
168}
169
170/* Returns a pointer on the SRV request matching the name <name> for the proxy
171 * <px>. NULL is returned if no match is found.
172 */
173struct resolv_srvrq *find_srvrq_by_name(const char *name, struct proxy *px)
174{
175 struct resolv_srvrq *srvrq;
176
177 list_for_each_entry(srvrq, &resolv_srvrq_list, list) {
178 if (srvrq->proxy == px && strcmp(srvrq->name, name) == 0)
179 return srvrq;
180 }
181 return NULL;
182}
183
184/* Allocates a new SRVRQ for the given server with the name <fqdn>. It returns
185 * NULL if an error occurred. */
186struct resolv_srvrq *new_resolv_srvrq(struct server *srv, char *fqdn)
187{
188 struct proxy *px = srv->proxy;
189 struct resolv_srvrq *srvrq = NULL;
190 int fqdn_len, hostname_dn_len;
191
192 fqdn_len = strlen(fqdn);
Willy Tarreauc1c765f2021-10-14 07:49:49 +0200193 hostname_dn_len = resolv_str_to_dn_label(fqdn, fqdn_len, trash.area,
Emeric Brunc9437992021-02-12 19:42:55 +0100194 trash.size);
195 if (hostname_dn_len == -1) {
196 ha_alert("config : %s '%s', server '%s': failed to parse FQDN '%s'\n",
197 proxy_type_str(px), px->id, srv->id, fqdn);
198 goto err;
199 }
200
201 if ((srvrq = calloc(1, sizeof(*srvrq))) == NULL) {
202 ha_alert("config : %s '%s', server '%s': out of memory\n",
203 proxy_type_str(px), px->id, srv->id);
204 goto err;
205 }
206 srvrq->obj_type = OBJ_TYPE_SRVRQ;
207 srvrq->proxy = px;
208 srvrq->name = strdup(fqdn);
209 srvrq->hostname_dn = strdup(trash.area);
210 srvrq->hostname_dn_len = hostname_dn_len;
211 if (!srvrq->name || !srvrq->hostname_dn) {
212 ha_alert("config : %s '%s', server '%s': out of memory\n",
213 proxy_type_str(px), px->id, srv->id);
214 goto err;
215 }
Emeric Brun0c4a8a32021-06-11 10:48:45 +0200216 LIST_INIT(&srvrq->attached_servers);
217 srvrq->named_servers = EB_ROOT;
Willy Tarreau2b718102021-04-21 07:32:39 +0200218 LIST_APPEND(&resolv_srvrq_list, &srvrq->list);
Emeric Brunc9437992021-02-12 19:42:55 +0100219 return srvrq;
220
221 err:
222 if (srvrq) {
223 free(srvrq->name);
224 free(srvrq->hostname_dn);
225 free(srvrq);
226 }
227 return NULL;
228}
229
230
Baptiste Assmann6a8d11d2021-03-10 12:22:18 +0100231/* finds and return the SRV answer item associated to a requester (whose type is 'server').
232 *
233 * returns NULL in case of error or not found.
234 */
235struct resolv_answer_item *find_srvrq_answer_record(const struct resolv_requester *requester)
236{
237 struct resolv_resolution *res;
238 struct resolv_answer_item *item;
239 struct server *srv;
240
241 if (!requester)
242 return NULL;
243
244 if ((srv = objt_server(requester->owner)) == NULL)
245 return NULL;
246 /* check if the server is managed by a SRV record */
247 if (srv->srvrq == NULL)
248 return NULL;
249
250 res = srv->srvrq->requester->resolution;
251 /* search an ANSWER record whose target points to the server's hostname and whose port is
252 * the same as server's svc_port */
253 list_for_each_entry(item, &res->response.answer_list, list) {
Willy Tarreau20a02372021-10-14 22:52:04 +0200254 if (resolv_hostname_cmp(srv->hostname_dn, item->data.target, srv->hostname_dn_len) == 0 &&
Baptiste Assmann6a8d11d2021-03-10 12:22:18 +0100255 (srv->svc_port == item->port))
256 return item;
257 }
258
259 return NULL;
260}
261
Emeric Brunc9437992021-02-12 19:42:55 +0100262/* 2 bytes random generator to generate DNS query ID */
263static inline uint16_t resolv_rnd16(void)
264{
265 if (!resolv_query_id_seed)
266 resolv_query_id_seed = now_ms;
267 resolv_query_id_seed ^= resolv_query_id_seed << 13;
268 resolv_query_id_seed ^= resolv_query_id_seed >> 7;
269 resolv_query_id_seed ^= resolv_query_id_seed << 17;
270 return resolv_query_id_seed;
271}
272
273
274static inline int resolv_resolution_timeout(struct resolv_resolution *res)
275{
276 return res->resolvers->timeout.resolve;
277}
278
279/* Updates a resolvers' task timeout for next wake up and queue it */
280static void resolv_update_resolvers_timeout(struct resolvers *resolvers)
281{
282 struct resolv_resolution *res;
283 int next;
284
285 next = tick_add(now_ms, resolvers->timeout.resolve);
286 if (!LIST_ISEMPTY(&resolvers->resolutions.curr)) {
287 res = LIST_NEXT(&resolvers->resolutions.curr, struct resolv_resolution *, list);
288 next = MIN(next, tick_add(res->last_query, resolvers->timeout.retry));
289 }
290
291 list_for_each_entry(res, &resolvers->resolutions.wait, list)
292 next = MIN(next, tick_add(res->last_resolution, resolv_resolution_timeout(res)));
293
294 resolvers->t->expire = next;
295 task_queue(resolvers->t);
296}
297
298/* Forges a DNS query. It needs the following information from the caller:
299 * - <query_id> : the DNS query id corresponding to this query
300 * - <query_type> : DNS_RTYPE_* request DNS record type (A, AAAA, ANY...)
301 * - <hostname_dn> : hostname in domain name format
302 * - <hostname_dn_len> : length of <hostname_dn>
303 *
304 * To store the query, the caller must pass a buffer <buf> and its size
305 * <bufsize>. It returns the number of written bytes in success, -1 if <buf> is
306 * too short.
307 */
308static int resolv_build_query(int query_id, int query_type, unsigned int accepted_payload_size,
309 char *hostname_dn, int hostname_dn_len, char *buf, int bufsize)
310{
311 struct dns_header dns_hdr;
312 struct dns_question qinfo;
313 struct dns_additional_record edns;
314 char *p = buf;
315
316 if (sizeof(dns_hdr) + sizeof(qinfo) + sizeof(edns) + hostname_dn_len >= bufsize)
317 return -1;
318
319 memset(buf, 0, bufsize);
320
321 /* Set dns query headers */
322 dns_hdr.id = (unsigned short) htons(query_id);
323 dns_hdr.flags = htons(0x0100); /* qr=0, opcode=0, aa=0, tc=0, rd=1, ra=0, z=0, rcode=0 */
324 dns_hdr.qdcount = htons(1); /* 1 question */
325 dns_hdr.ancount = 0;
326 dns_hdr.nscount = 0;
327 dns_hdr.arcount = htons(1);
328 memcpy(p, &dns_hdr, sizeof(dns_hdr));
329 p += sizeof(dns_hdr);
330
331 /* Set up query hostname */
332 memcpy(p, hostname_dn, hostname_dn_len);
333 p += hostname_dn_len;
334 *p++ = 0;
335
336 /* Set up query info (type and class) */
337 qinfo.qtype = htons(query_type);
338 qinfo.qclass = htons(DNS_RCLASS_IN);
339 memcpy(p, &qinfo, sizeof(qinfo));
340 p += sizeof(qinfo);
341
342 /* Set the DNS extension */
343 edns.name = 0;
344 edns.type = htons(DNS_RTYPE_OPT);
345 edns.udp_payload_size = htons(accepted_payload_size);
346 edns.extension = 0;
347 edns.data_length = 0;
348 memcpy(p, &edns, sizeof(edns));
349 p += sizeof(edns);
350
351 return (p - buf);
352}
353
354/* Sends a DNS query to resolvers associated to a resolution. It returns 0 on
355 * success, -1 otherwise.
356 */
357static int resolv_send_query(struct resolv_resolution *resolution)
358{
359 struct resolvers *resolvers = resolution->resolvers;
360 struct dns_nameserver *ns;
361 int len;
362
363 /* Update resolution */
364 resolution->nb_queries = 0;
365 resolution->nb_responses = 0;
366 resolution->last_query = now_ms;
367
368 len = resolv_build_query(resolution->query_id, resolution->query_type,
369 resolvers->accepted_payload_size,
370 resolution->hostname_dn, resolution->hostname_dn_len,
371 trash.area, trash.size);
372
373 list_for_each_entry(ns, &resolvers->nameservers, list) {
374 if (len < 0) {
375 ns->counters->snd_error++;
376 continue;
377 }
378
379 if (dns_send_nameserver(ns, trash.area, len) < 0)
380 ns->counters->snd_error++;
381 else
382 resolution->nb_queries++;
383 }
384
385 /* Push the resolution at the end of the active list */
Willy Tarreau2b718102021-04-21 07:32:39 +0200386 LIST_DELETE(&resolution->list);
387 LIST_APPEND(&resolvers->resolutions.curr, &resolution->list);
Emeric Brunc9437992021-02-12 19:42:55 +0100388 return 0;
389}
390
391/* Prepares and sends a DNS resolution. It returns 1 if the query was sent, 0 if
392 * skipped and -1 if an error occurred.
393 */
394static int
395resolv_run_resolution(struct resolv_resolution *resolution)
396{
397 struct resolvers *resolvers = resolution->resolvers;
398 int query_id, i;
399
400 /* Avoid sending requests for resolutions that don't yet have an
401 * hostname, ie resolutions linked to servers that do not yet have an
402 * fqdn */
403 if (!resolution->hostname_dn)
404 return 0;
405
406 /* Check if a resolution has already been started for this server return
407 * directly to avoid resolution pill up. */
408 if (resolution->step != RSLV_STEP_NONE)
409 return 0;
410
411 /* Generates a new query id. We try at most 100 times to find a free
412 * query id */
413 for (i = 0; i < 100; ++i) {
414 query_id = resolv_rnd16();
415 if (!eb32_lookup(&resolvers->query_ids, query_id))
416 break;
417 query_id = -1;
418 }
419 if (query_id == -1) {
420 send_log(NULL, LOG_NOTICE,
421 "could not generate a query id for %s, in resolvers %s.\n",
422 resolution->hostname_dn, resolvers->id);
423 return -1;
424 }
425
426 /* Update resolution parameters */
427 resolution->query_id = query_id;
428 resolution->qid.key = query_id;
429 resolution->step = RSLV_STEP_RUNNING;
430 resolution->query_type = resolution->prefered_query_type;
431 resolution->try = resolvers->resolve_retries;
432 eb32_insert(&resolvers->query_ids, &resolution->qid);
433
434 /* Send the DNS query */
435 resolution->try -= 1;
436 resolv_send_query(resolution);
437 return 1;
438}
439
440/* Performs a name resolution for the requester <req> */
441void resolv_trigger_resolution(struct resolv_requester *req)
442{
443 struct resolvers *resolvers;
444 struct resolv_resolution *res;
445 int exp;
446
447 if (!req || !req->resolution)
448 return;
449 res = req->resolution;
450 resolvers = res->resolvers;
451
452 /* The resolution must not be triggered yet. Use the cached response, if
453 * valid */
454 exp = tick_add(res->last_resolution, resolvers->hold.valid);
455 if (resolvers->t && (res->status != RSLV_STATUS_VALID ||
456 !tick_isset(res->last_resolution) || tick_is_expired(exp, now_ms)))
457 task_wakeup(resolvers->t, TASK_WOKEN_OTHER);
458}
459
460
461/* Resets some resolution parameters to initial values and also delete the query
462 * ID from the resolver's tree.
463 */
464static void resolv_reset_resolution(struct resolv_resolution *resolution)
465{
466 /* update resolution status */
467 resolution->step = RSLV_STEP_NONE;
468 resolution->try = 0;
469 resolution->last_resolution = now_ms;
470 resolution->nb_queries = 0;
471 resolution->nb_responses = 0;
472 resolution->query_type = resolution->prefered_query_type;
473
474 /* clean up query id */
475 eb32_delete(&resolution->qid);
476 resolution->query_id = 0;
477 resolution->qid.key = 0;
478}
479
480/* Returns the query id contained in a DNS response */
481static inline unsigned short resolv_response_get_query_id(unsigned char *resp)
482{
483 return resp[0] * 256 + resp[1];
484}
485
486
487/* Analyses, re-builds and copies the name <name> from the DNS response packet
488 * <buffer>. <name> must point to the 'data_len' information or pointer 'c0'
489 * for compressed data. The result is copied into <dest>, ensuring we don't
490 * overflow using <dest_len> Returns the number of bytes the caller can move
491 * forward. If 0 it means an error occurred while parsing the name. <offset> is
492 * the number of bytes the caller could move forward.
493 */
494int resolv_read_name(unsigned char *buffer, unsigned char *bufend,
495 unsigned char *name, char *destination, int dest_len,
496 int *offset, unsigned int depth)
497{
498 int nb_bytes = 0, n = 0;
499 int label_len;
500 unsigned char *reader = name;
501 char *dest = destination;
502
503 while (1) {
504 if (reader >= bufend)
505 goto err;
506
507 /* Name compression is in use */
508 if ((*reader & 0xc0) == 0xc0) {
509 if (reader + 1 >= bufend)
510 goto err;
511
512 /* Must point BEFORE current position */
513 if ((buffer + reader[1]) > reader)
514 goto err;
515
516 if (depth++ > 100)
517 goto err;
518
519 n = resolv_read_name(buffer, bufend, buffer + (*reader & 0x3f)*256 + reader[1],
520 dest, dest_len - nb_bytes, offset, depth);
521 if (n == 0)
522 goto err;
523
524 dest += n;
525 nb_bytes += n;
526 goto out;
527 }
528
529 label_len = *reader;
530 if (label_len == 0)
531 goto out;
532
533 /* Check if:
534 * - we won't read outside the buffer
535 * - there is enough place in the destination
536 */
537 if ((reader + label_len >= bufend) || (nb_bytes + label_len >= dest_len))
538 goto err;
539
540 /* +1 to take label len + label string */
541 label_len++;
542
543 memcpy(dest, reader, label_len);
544
545 dest += label_len;
546 nb_bytes += label_len;
547 reader += label_len;
548 }
549
550 out:
551 /* offset computation:
552 * parse from <name> until finding either NULL or a pointer "c0xx"
553 */
554 reader = name;
555 *offset = 0;
556 while (reader < bufend) {
557 if ((reader[0] & 0xc0) == 0xc0) {
558 *offset += 2;
559 break;
560 }
561 else if (*reader == 0) {
562 *offset += 1;
563 break;
564 }
565 *offset += 1;
566 ++reader;
567 }
568 return nb_bytes;
569
570 err:
571 return 0;
572}
573
Christopher Faulet5f8ccff2021-06-15 16:08:48 +0200574/* Cleanup fqdn/port and address of a server attached to a SRV resolution. This
575 * happens when an SRV item is purged or when the server status is considered as
576 * obsolete.
577 *
578 * Must be called with the DNS lock held.
579 */
Willy Tarreau3223d852021-10-18 16:49:14 +0200580static void resolv_srvrq_cleanup_srv(struct server *srv, int safe)
Christopher Faulet5f8ccff2021-06-15 16:08:48 +0200581{
Willy Tarreau3223d852021-10-18 16:49:14 +0200582 resolv_unlink_resolution(srv->resolv_requester, safe);
Christopher Faulet5f8ccff2021-06-15 16:08:48 +0200583 HA_SPIN_LOCK(SERVER_LOCK, &srv->lock);
584 srvrq_update_srv_status(srv, 1);
585 ha_free(&srv->hostname);
586 ha_free(&srv->hostname_dn);
587 srv->hostname_dn_len = 0;
588 memset(&srv->addr, 0, sizeof(srv->addr));
589 srv->svc_port = 0;
590 srv->flags |= SRV_F_NO_RESOLUTION;
Christopher Fauleta62d9742021-06-15 16:14:37 +0200591
592 ebpt_delete(&srv->host_dn);
593 ha_free(&srv->host_dn.key);
594
Christopher Faulet5f8ccff2021-06-15 16:08:48 +0200595 HA_SPIN_UNLOCK(SERVER_LOCK, &srv->lock);
596 LIST_DELETE(&srv->srv_rec_item);
597 LIST_APPEND(&srv->srvrq->attached_servers, &srv->srv_rec_item);
Christopher Faulet2c0f5272021-06-15 16:17:17 +0200598
599 srv->srvrq_check->expire = TICK_ETERNITY;
Christopher Faulet5f8ccff2021-06-15 16:08:48 +0200600}
601
Christopher Faulet2c0f5272021-06-15 16:17:17 +0200602/* Takes care to cleanup a server resolution when it is outdated. This only
603 * happens for a server relying on a SRV record.
604 */
605static struct task *resolv_srvrq_expire_task(struct task *t, void *context, unsigned int state)
606{
607 struct server *srv = context;
608
609 if (!tick_is_expired(t->expire, now_ms))
610 goto end;
611
Christopher Faulet152b50c2021-06-18 09:05:49 +0200612 HA_SPIN_LOCK(DNS_LOCK, &srv->srvrq->resolvers->lock);
Willy Tarreau3223d852021-10-18 16:49:14 +0200613 resolv_srvrq_cleanup_srv(srv, 0);
Christopher Faulet152b50c2021-06-18 09:05:49 +0200614 HA_SPIN_UNLOCK(DNS_LOCK, &srv->srvrq->resolvers->lock);
Christopher Faulet2c0f5272021-06-15 16:17:17 +0200615
616 end:
617 return t;
618}
619
Emeric Brunc9437992021-02-12 19:42:55 +0100620/* Checks for any obsolete record, also identify any SRV request, and try to
621 * find a corresponding server.
622*/
623static void resolv_check_response(struct resolv_resolution *res)
624{
625 struct resolvers *resolvers = res->resolvers;
Christopher Fauletdb31b442021-03-11 18:19:41 +0100626 struct resolv_requester *req;
Emeric Brunc9437992021-02-12 19:42:55 +0100627 struct resolv_answer_item *item, *itemback;
Emeric Brunf9ca5d82021-06-11 10:08:05 +0200628 struct server *srv, *srvback;
Emeric Brunc9437992021-02-12 19:42:55 +0100629 struct resolv_srvrq *srvrq;
630
631 list_for_each_entry_safe(item, itemback, &res->response.answer_list, list) {
632 struct resolv_answer_item *ar_item = item->ar_item;
633
634 /* clean up obsolete Additional record */
Christopher Faulet55c1c402021-03-11 09:36:05 +0100635 if (ar_item && tick_is_lt(tick_add(ar_item->last_seen, resolvers->hold.obsolete), now_ms)) {
Christopher Faulet3e0600f2021-03-10 18:38:37 +0100636 /* Cleaning up the AR item will trigger an extra DNS resolution, except if the SRV
637 * item is also obsolete.
638 */
Emeric Brunc9437992021-02-12 19:42:55 +0100639 pool_free(resolv_answer_item_pool, ar_item);
640 item->ar_item = NULL;
641 }
642
643 /* Remove obsolete items */
Christopher Faulet55c1c402021-03-11 09:36:05 +0100644 if (tick_is_lt(tick_add(item->last_seen, resolvers->hold.obsolete), now_ms)) {
Emeric Brunf9ca5d82021-06-11 10:08:05 +0200645 if (item->type == DNS_RTYPE_A || item->type == DNS_RTYPE_AAAA) {
Emeric Brunc9437992021-02-12 19:42:55 +0100646 /* Remove any associated server */
Emeric Brunf9ca5d82021-06-11 10:08:05 +0200647 list_for_each_entry_safe(srv, srvback, &item->attached_servers, ip_rec_item) {
648 LIST_DEL_INIT(&srv->ip_rec_item);
649 }
650 }
651 else if (item->type == DNS_RTYPE_SRV) {
Emeric Brun0c4a8a32021-06-11 10:48:45 +0200652 /* Remove any associated server */
Christopher Faulet5f8ccff2021-06-15 16:08:48 +0200653 list_for_each_entry_safe(srv, srvback, &item->attached_servers, srv_rec_item)
Willy Tarreau3223d852021-10-18 16:49:14 +0200654 resolv_srvrq_cleanup_srv(srv, 0);
Emeric Brunc9437992021-02-12 19:42:55 +0100655 }
656
Willy Tarreau2b718102021-04-21 07:32:39 +0200657 LIST_DELETE(&item->list);
Emeric Brunc9437992021-02-12 19:42:55 +0100658 if (item->ar_item) {
659 pool_free(resolv_answer_item_pool, item->ar_item);
660 item->ar_item = NULL;
661 }
662 pool_free(resolv_answer_item_pool, item);
663 continue;
664 }
665
666 if (item->type != DNS_RTYPE_SRV)
667 continue;
668
669 /* Now process SRV records */
Christopher Fauletdb31b442021-03-11 18:19:41 +0100670 list_for_each_entry(req, &res->requesters, list) {
Emeric Brun0c4a8a32021-06-11 10:48:45 +0200671 struct ebpt_node *node;
672 char target[DNS_MAX_NAME_SIZE+1];
673
674 int i;
Emeric Brunc9437992021-02-12 19:42:55 +0100675 if ((srvrq = objt_resolv_srvrq(req->owner)) == NULL)
676 continue;
677
Emeric Brun0c4a8a32021-06-11 10:48:45 +0200678 /* Check if a server already uses that record */
679 srv = NULL;
680 list_for_each_entry(srv, &item->attached_servers, srv_rec_item) {
681 if (srv->srvrq == srvrq) {
682 HA_SPIN_LOCK(SERVER_LOCK, &srv->lock);
683 goto srv_found;
Emeric Brunc9437992021-02-12 19:42:55 +0100684 }
Emeric Brunc9437992021-02-12 19:42:55 +0100685 }
686
Emeric Brun0c4a8a32021-06-11 10:48:45 +0200687
688 /* If not empty we try to match a server
689 * in server state file tree with the same hostname
690 */
691 if (!eb_is_empty(&srvrq->named_servers)) {
692 srv = NULL;
693
694 /* convert the key to lookup in lower case */
Willy Tarreau20a02372021-10-14 22:52:04 +0200695 for (i = 0 ; item->data.target[i] ; i++)
696 target[i] = tolower(item->data.target[i]);
Christopher Fauletc20d6422021-07-22 14:29:26 +0200697 target[i] = 0;
Emeric Brun0c4a8a32021-06-11 10:48:45 +0200698
699 node = ebis_lookup(&srvrq->named_servers, target);
700 if (node) {
701 srv = ebpt_entry(node, struct server, host_dn);
Emeric Brunc9437992021-02-12 19:42:55 +0100702 HA_SPIN_LOCK(SERVER_LOCK, &srv->lock);
Emeric Brun0c4a8a32021-06-11 10:48:45 +0200703
704 /* an entry was found with the same hostname
705 * let check this node if the port matches
706 * and try next node if the hostname
707 * is still the same
708 */
709 while (1) {
710 if (srv->svc_port == item->port) {
711 /* server found, we remove it from tree */
712 ebpt_delete(node);
Christopher Fauleta62d9742021-06-15 16:14:37 +0200713 ha_free(&srv->host_dn.key);
Emeric Brun0c4a8a32021-06-11 10:48:45 +0200714 goto srv_found;
715 }
716
717 HA_SPIN_UNLOCK(SERVER_LOCK, &srv->lock);
718
719 node = ebpt_next(node);
720 if (!node)
721 break;
722
723 srv = ebpt_entry(node, struct server, host_dn);
724 HA_SPIN_LOCK(SERVER_LOCK, &srv->lock);
725
726 if ((item->data_len != srv->hostname_dn_len)
Willy Tarreau20a02372021-10-14 22:52:04 +0200727 || resolv_hostname_cmp(srv->hostname_dn, item->data.target, item->data_len)) {
Emeric Brun0c4a8a32021-06-11 10:48:45 +0200728 HA_SPIN_UNLOCK(SERVER_LOCK, &srv->lock);
729 break;
730 }
731 }
Emeric Brunc9437992021-02-12 19:42:55 +0100732 }
733 }
Emeric Brun0c4a8a32021-06-11 10:48:45 +0200734
735 /* Pick the first server listed in srvrq (those ones don't
736 * have hostname and are free to use)
737 */
738 srv = NULL;
739 list_for_each_entry(srv, &srvrq->attached_servers, srv_rec_item) {
740 LIST_DEL_INIT(&srv->srv_rec_item);
741 HA_SPIN_LOCK(SERVER_LOCK, &srv->lock);
742 goto srv_found;
743 }
744 srv = NULL;
Emeric Brunc9437992021-02-12 19:42:55 +0100745
Emeric Brun0c4a8a32021-06-11 10:48:45 +0200746srv_found:
Emeric Brunc9437992021-02-12 19:42:55 +0100747 /* And update this server, if found (srv is locked here) */
748 if (srv) {
Christopher Faulet3e0600f2021-03-10 18:38:37 +0100749 /* re-enable DNS resolution for this server by default */
750 srv->flags &= ~SRV_F_NO_RESOLUTION;
Christopher Faulet2c0f5272021-06-15 16:17:17 +0200751 srv->srvrq_check->expire = TICK_ETERNITY;
Christopher Faulet3e0600f2021-03-10 18:38:37 +0100752
Emeric Brunc9437992021-02-12 19:42:55 +0100753 /* Check if an Additional Record is associated to this SRV record.
754 * Perform some sanity checks too to ensure the record can be used.
755 * If all fine, we simply pick up the IP address found and associate
Christopher Faulet3e0600f2021-03-10 18:38:37 +0100756 * it to the server. And DNS resolution is disabled for this server.
Emeric Brunc9437992021-02-12 19:42:55 +0100757 */
758 if ((item->ar_item != NULL) &&
759 (item->ar_item->type == DNS_RTYPE_A || item->ar_item->type == DNS_RTYPE_AAAA))
Christopher Faulet3e0600f2021-03-10 18:38:37 +0100760 {
Emeric Brunc9437992021-02-12 19:42:55 +0100761
762 switch (item->ar_item->type) {
763 case DNS_RTYPE_A:
Willy Tarreau20a02372021-10-14 22:52:04 +0200764 srv_update_addr(srv, &item->ar_item->data.in4.sin_addr, AF_INET, "DNS additional record");
Emeric Brunc9437992021-02-12 19:42:55 +0100765 break;
766 case DNS_RTYPE_AAAA:
Willy Tarreau20a02372021-10-14 22:52:04 +0200767 srv_update_addr(srv, &item->ar_item->data.in6.sin6_addr, AF_INET6, "DNS additional record");
Emeric Brunc9437992021-02-12 19:42:55 +0100768 break;
769 }
770
771 srv->flags |= SRV_F_NO_RESOLUTION;
Christopher Faulet3e0600f2021-03-10 18:38:37 +0100772
773 /* Unlink A/AAAA resolution for this server if there is an AR item.
774 * It is usless to perform an extra resolution
775 */
Christopher Faulet0efc0992021-03-11 18:09:53 +0100776 resolv_unlink_resolution(srv->resolv_requester, 0);
Emeric Brunc9437992021-02-12 19:42:55 +0100777 }
778
779 if (!srv->hostname_dn) {
780 const char *msg = NULL;
Willy Tarreau2859c162021-10-14 08:00:38 +0200781 char hostname[DNS_MAX_NAME_SIZE+1];
Emeric Brunc9437992021-02-12 19:42:55 +0100782
Willy Tarreau20a02372021-10-14 22:52:04 +0200783 if (resolv_dn_label_to_str(item->data.target, item->data_len,
Willy Tarreau2859c162021-10-14 08:00:38 +0200784 hostname, sizeof(hostname)) == -1) {
Emeric Brunc9437992021-02-12 19:42:55 +0100785 HA_SPIN_UNLOCK(SERVER_LOCK, &srv->lock);
786 continue;
787 }
Christopher Faulet69beaa92021-02-16 12:07:47 +0100788 msg = srv_update_fqdn(srv, hostname, "SRV record", 1);
Emeric Brunc9437992021-02-12 19:42:55 +0100789 if (msg)
790 send_log(srv->proxy, LOG_NOTICE, "%s", msg);
791 }
792
Emeric Brun0c4a8a32021-06-11 10:48:45 +0200793 if (!LIST_INLIST(&srv->srv_rec_item))
794 LIST_APPEND(&item->attached_servers, &srv->srv_rec_item);
795
Christopher Faulet3e0600f2021-03-10 18:38:37 +0100796 if (!(srv->flags & SRV_F_NO_RESOLUTION)) {
797 /* If there is no AR item responsible of the FQDN resolution,
798 * trigger a dedicated DNS resolution
799 */
800 if (!srv->resolv_requester || !srv->resolv_requester->resolution)
801 resolv_link_resolution(srv, OBJ_TYPE_SERVER, 1);
802 }
803
Christopher Fauletab177ac2021-03-10 15:34:52 +0100804 /* Update the server status */
Christopher Faulet6b117ae2021-03-11 18:06:23 +0100805 srvrq_update_srv_status(srv, (srv->addr.ss_family != AF_INET && srv->addr.ss_family != AF_INET6));
Emeric Brunc9437992021-02-12 19:42:55 +0100806
807 srv->svc_port = item->port;
808 srv->flags &= ~SRV_F_MAPPORTS;
809
810 if (!srv->resolv_opts.ignore_weight) {
811 char weight[9];
812 int ha_weight;
813
814 /* DNS weight range if from 0 to 65535
815 * HAProxy weight is from 0 to 256
816 * The rule below ensures that weight 0 is well respected
817 * while allowing a "mapping" from DNS weight into HAProxy's one.
818 */
819 ha_weight = (item->weight + 255) / 256;
820
821 snprintf(weight, sizeof(weight), "%d", ha_weight);
822 server_parse_weight_change_request(srv, weight);
823 }
824 HA_SPIN_UNLOCK(SERVER_LOCK, &srv->lock);
825 }
826 }
827 }
828}
829
830/* Validates that the buffer DNS response provided in <resp> and finishing
831 * before <bufend> is valid from a DNS protocol point of view.
832 *
833 * The result is stored in <resolution>' response, buf_response,
834 * response_query_records and response_answer_records members.
835 *
836 * This function returns one of the RSLV_RESP_* code to indicate the type of
837 * error found.
838 */
839static int resolv_validate_dns_response(unsigned char *resp, unsigned char *bufend,
840 struct resolv_resolution *resolution, int max_answer_records)
841{
842 unsigned char *reader;
843 char *previous_dname, tmpname[DNS_MAX_NAME_SIZE];
844 int len, flags, offset;
845 int query_record_id;
846 int nb_saved_records;
847 struct resolv_query_item *query;
848 struct resolv_answer_item *answer_record, *tmp_record;
849 struct resolv_response *r_res;
850 int i, found = 0;
851 int cause = RSLV_RESP_ERROR;
852
853 reader = resp;
854 len = 0;
855 previous_dname = NULL;
856 query = NULL;
857 answer_record = NULL;
858
859 /* Initialization of response buffer and structure */
860 r_res = &resolution->response;
861
862 /* query id */
863 if (reader + 2 >= bufend)
864 goto invalid_resp;
865
866 r_res->header.id = reader[0] * 256 + reader[1];
867 reader += 2;
868
869 /* Flags and rcode are stored over 2 bytes
870 * First byte contains:
871 * - response flag (1 bit)
872 * - opcode (4 bits)
873 * - authoritative (1 bit)
874 * - truncated (1 bit)
875 * - recursion desired (1 bit)
876 */
877 if (reader + 2 >= bufend)
878 goto invalid_resp;
879
880 flags = reader[0] * 256 + reader[1];
881
882 if ((flags & DNS_FLAG_REPLYCODE) != DNS_RCODE_NO_ERROR) {
883 if ((flags & DNS_FLAG_REPLYCODE) == DNS_RCODE_NX_DOMAIN) {
884 cause = RSLV_RESP_NX_DOMAIN;
885 goto return_error;
886 }
887 else if ((flags & DNS_FLAG_REPLYCODE) == DNS_RCODE_REFUSED) {
888 cause = RSLV_RESP_REFUSED;
889 goto return_error;
890 }
891 else {
892 cause = RSLV_RESP_ERROR;
893 goto return_error;
894 }
895 }
896
897 /* Move forward 2 bytes for flags */
898 reader += 2;
899
900 /* 2 bytes for question count */
901 if (reader + 2 >= bufend)
902 goto invalid_resp;
903 r_res->header.qdcount = reader[0] * 256 + reader[1];
904 /* (for now) we send one query only, so we expect only one in the
905 * response too */
906 if (r_res->header.qdcount != 1) {
907 cause = RSLV_RESP_QUERY_COUNT_ERROR;
908 goto return_error;
909 }
910
911 if (r_res->header.qdcount > DNS_MAX_QUERY_RECORDS)
912 goto invalid_resp;
913 reader += 2;
914
915 /* 2 bytes for answer count */
916 if (reader + 2 >= bufend)
917 goto invalid_resp;
918 r_res->header.ancount = reader[0] * 256 + reader[1];
919 if (r_res->header.ancount == 0) {
920 cause = RSLV_RESP_ANCOUNT_ZERO;
921 goto return_error;
922 }
923
924 /* Check if too many records are announced */
925 if (r_res->header.ancount > max_answer_records)
926 goto invalid_resp;
927 reader += 2;
928
929 /* 2 bytes authority count */
930 if (reader + 2 >= bufend)
931 goto invalid_resp;
932 r_res->header.nscount = reader[0] * 256 + reader[1];
933 reader += 2;
934
935 /* 2 bytes additional count */
936 if (reader + 2 >= bufend)
937 goto invalid_resp;
938 r_res->header.arcount = reader[0] * 256 + reader[1];
939 reader += 2;
940
941 /* Parsing dns queries */
Willy Tarreau51128f82021-10-19 11:17:33 +0200942 BUG_ON(!LIST_ISEMPTY(&r_res->query_list));
Emeric Brunc9437992021-02-12 19:42:55 +0100943 for (query_record_id = 0; query_record_id < r_res->header.qdcount; query_record_id++) {
944 /* Use next pre-allocated resolv_query_item after ensuring there is
945 * still one available.
946 * It's then added to our packet query list. */
947 if (query_record_id > DNS_MAX_QUERY_RECORDS)
948 goto invalid_resp;
949 query = &resolution->response_query_records[query_record_id];
Willy Tarreau2b718102021-04-21 07:32:39 +0200950 LIST_APPEND(&r_res->query_list, &query->list);
Emeric Brunc9437992021-02-12 19:42:55 +0100951
952 /* Name is a NULL terminated string in our case, since we have
953 * one query per response and the first one can't be compressed
954 * (using the 0x0c format) */
955 offset = 0;
956 len = resolv_read_name(resp, bufend, reader, query->name, DNS_MAX_NAME_SIZE, &offset, 0);
957
958 if (len == 0)
959 goto invalid_resp;
960
961 reader += offset;
962 previous_dname = query->name;
963
964 /* move forward 2 bytes for question type */
965 if (reader + 2 >= bufend)
966 goto invalid_resp;
967 query->type = reader[0] * 256 + reader[1];
968 reader += 2;
969
970 /* move forward 2 bytes for question class */
971 if (reader + 2 >= bufend)
972 goto invalid_resp;
973 query->class = reader[0] * 256 + reader[1];
974 reader += 2;
975 }
976
Willy Tarreau3a8897f2021-10-20 17:29:28 +0200977 /* Let's just make gcc happy. The tests above make it clear that
978 * qdcount==1 hence that we necessarily enter into the loop at least
979 * once, but gcc seems to be having difficulties following it and
980 * warns about the risk of NULL dereference at the next line, even
981 * if a BUG_ON(!query) is used.
982 */
983 ALREADY_CHECKED(query);
984
Emeric Brunc9437992021-02-12 19:42:55 +0100985 /* TRUNCATED flag must be checked after we could read the query type
Willy Tarreau3a8897f2021-10-20 17:29:28 +0200986 * because a TRUNCATED SRV query type response can still be exploited
987 */
Emeric Brunc9437992021-02-12 19:42:55 +0100988 if (query->type != DNS_RTYPE_SRV && flags & DNS_FLAG_TRUNCATED) {
989 cause = RSLV_RESP_TRUNCATED;
990 goto return_error;
991 }
992
993 /* now parsing response records */
994 nb_saved_records = 0;
995 for (i = 0; i < r_res->header.ancount; i++) {
996 if (reader >= bufend)
997 goto invalid_resp;
998
999 answer_record = pool_alloc(resolv_answer_item_pool);
1000 if (answer_record == NULL)
1001 goto invalid_resp;
1002
1003 /* initialization */
1004 answer_record->ar_item = NULL;
Christopher Faulet55c1c402021-03-11 09:36:05 +01001005 answer_record->last_seen = TICK_ETERNITY;
Emeric Brunf9ca5d82021-06-11 10:08:05 +02001006 LIST_INIT(&answer_record->attached_servers);
Willy Tarreaua2373e82021-10-19 11:29:21 +02001007 LIST_INIT(&answer_record->list);
Emeric Brunc9437992021-02-12 19:42:55 +01001008
1009 offset = 0;
1010 len = resolv_read_name(resp, bufend, reader, tmpname, DNS_MAX_NAME_SIZE, &offset, 0);
1011
1012 if (len == 0)
1013 goto invalid_resp;
1014
1015 /* Check if the current record dname is valid. previous_dname
1016 * points either to queried dname or last CNAME target */
1017 if (query->type != DNS_RTYPE_SRV && resolv_hostname_cmp(previous_dname, tmpname, len) != 0) {
1018 if (i == 0) {
1019 /* First record, means a mismatch issue between
1020 * queried dname and dname found in the first
1021 * record */
1022 goto invalid_resp;
1023 }
1024 else {
1025 /* If not the first record, this means we have a
1026 * CNAME resolution error.
1027 */
1028 cause = RSLV_RESP_CNAME_ERROR;
1029 goto return_error;
1030 }
1031
1032 }
1033
1034 memcpy(answer_record->name, tmpname, len);
1035 answer_record->name[len] = 0;
1036
1037 reader += offset;
1038 if (reader >= bufend)
1039 goto invalid_resp;
1040
1041 /* 2 bytes for record type (A, AAAA, CNAME, etc...) */
1042 if (reader + 2 > bufend)
1043 goto invalid_resp;
1044
1045 answer_record->type = reader[0] * 256 + reader[1];
1046 reader += 2;
1047
1048 /* 2 bytes for class (2) */
1049 if (reader + 2 > bufend)
1050 goto invalid_resp;
1051
1052 answer_record->class = reader[0] * 256 + reader[1];
1053 reader += 2;
1054
1055 /* 4 bytes for ttl (4) */
1056 if (reader + 4 > bufend)
1057 goto invalid_resp;
1058
1059 answer_record->ttl = reader[0] * 16777216 + reader[1] * 65536
1060 + reader[2] * 256 + reader[3];
1061 reader += 4;
1062
1063 /* Now reading data len */
1064 if (reader + 2 > bufend)
1065 goto invalid_resp;
1066
1067 answer_record->data_len = reader[0] * 256 + reader[1];
1068
1069 /* Move forward 2 bytes for data len */
1070 reader += 2;
1071
1072 if (reader + answer_record->data_len > bufend)
1073 goto invalid_resp;
1074
1075 /* Analyzing record content */
1076 switch (answer_record->type) {
1077 case DNS_RTYPE_A:
1078 /* ipv4 is stored on 4 bytes */
1079 if (answer_record->data_len != 4)
1080 goto invalid_resp;
1081
Willy Tarreau20a02372021-10-14 22:52:04 +02001082 answer_record->data.in4.sin_family = AF_INET;
1083 memcpy(&answer_record->data.in4.sin_addr, reader, answer_record->data_len);
Emeric Brunc9437992021-02-12 19:42:55 +01001084 break;
1085
1086 case DNS_RTYPE_CNAME:
1087 /* Check if this is the last record and update the caller about the status:
1088 * no IP could be found and last record was a CNAME. Could be triggered
1089 * by a wrong query type
1090 *
1091 * + 1 because answer_record_id starts at 0
1092 * while number of answers is an integer and
1093 * starts at 1.
1094 */
1095 if (i + 1 == r_res->header.ancount) {
1096 cause = RSLV_RESP_CNAME_ERROR;
1097 goto return_error;
1098 }
1099
1100 offset = 0;
1101 len = resolv_read_name(resp, bufend, reader, tmpname, DNS_MAX_NAME_SIZE, &offset, 0);
1102 if (len == 0)
1103 goto invalid_resp;
1104
Willy Tarreau20a02372021-10-14 22:52:04 +02001105 memcpy(answer_record->data.target, tmpname, len);
1106 answer_record->data.target[len] = 0;
1107 previous_dname = answer_record->data.target;
Emeric Brunc9437992021-02-12 19:42:55 +01001108 break;
1109
1110
1111 case DNS_RTYPE_SRV:
1112 /* Answer must contain :
1113 * - 2 bytes for the priority
1114 * - 2 bytes for the weight
1115 * - 2 bytes for the port
1116 * - the target hostname
1117 */
1118 if (answer_record->data_len <= 6)
1119 goto invalid_resp;
1120
1121 answer_record->priority = read_n16(reader);
1122 reader += sizeof(uint16_t);
1123 answer_record->weight = read_n16(reader);
1124 reader += sizeof(uint16_t);
1125 answer_record->port = read_n16(reader);
1126 reader += sizeof(uint16_t);
1127 offset = 0;
1128 len = resolv_read_name(resp, bufend, reader, tmpname, DNS_MAX_NAME_SIZE, &offset, 0);
1129 if (len == 0)
1130 goto invalid_resp;
1131
1132 answer_record->data_len = len;
Willy Tarreau20a02372021-10-14 22:52:04 +02001133 memcpy(answer_record->data.target, tmpname, len);
1134 answer_record->data.target[len] = 0;
Emeric Brunc9437992021-02-12 19:42:55 +01001135 if (answer_record->ar_item != NULL) {
1136 pool_free(resolv_answer_item_pool, answer_record->ar_item);
1137 answer_record->ar_item = NULL;
1138 }
1139 break;
1140
1141 case DNS_RTYPE_AAAA:
1142 /* ipv6 is stored on 16 bytes */
1143 if (answer_record->data_len != 16)
1144 goto invalid_resp;
1145
Willy Tarreau20a02372021-10-14 22:52:04 +02001146 answer_record->data.in6.sin6_family = AF_INET6;
1147 memcpy(&answer_record->data.in6.sin6_addr, reader, answer_record->data_len);
Emeric Brunc9437992021-02-12 19:42:55 +01001148 break;
1149
1150 } /* switch (record type) */
1151
1152 /* Increment the counter for number of records saved into our
1153 * local response */
1154 nb_saved_records++;
1155
1156 /* Move forward answer_record->data_len for analyzing next
1157 * record in the response */
1158 reader += ((answer_record->type == DNS_RTYPE_SRV)
1159 ? offset
1160 : answer_record->data_len);
1161
1162 /* Lookup to see if we already had this entry */
1163 found = 0;
1164 list_for_each_entry(tmp_record, &r_res->answer_list, list) {
1165 if (tmp_record->type != answer_record->type)
1166 continue;
1167
1168 switch(tmp_record->type) {
1169 case DNS_RTYPE_A:
Willy Tarreau20a02372021-10-14 22:52:04 +02001170 if (!memcmp(&answer_record->data.in4.sin_addr,
1171 &tmp_record->data.in4.sin_addr,
1172 sizeof(answer_record->data.in4.sin_addr)))
Emeric Brunc9437992021-02-12 19:42:55 +01001173 found = 1;
1174 break;
1175
1176 case DNS_RTYPE_AAAA:
Willy Tarreau20a02372021-10-14 22:52:04 +02001177 if (!memcmp(&answer_record->data.in6.sin6_addr,
1178 &tmp_record->data.in6.sin6_addr,
1179 sizeof(answer_record->data.in6.sin6_addr)))
Emeric Brunc9437992021-02-12 19:42:55 +01001180 found = 1;
1181 break;
1182
1183 case DNS_RTYPE_SRV:
1184 if (answer_record->data_len == tmp_record->data_len &&
Willy Tarreau20a02372021-10-14 22:52:04 +02001185 !resolv_hostname_cmp(answer_record->data.target, tmp_record->data.target, answer_record->data_len) &&
Emeric Brunc9437992021-02-12 19:42:55 +01001186 answer_record->port == tmp_record->port) {
1187 tmp_record->weight = answer_record->weight;
1188 found = 1;
1189 }
1190 break;
1191
1192 default:
1193 break;
1194 }
1195
1196 if (found == 1)
1197 break;
1198 }
1199
1200 if (found == 1) {
Christopher Faulet55c1c402021-03-11 09:36:05 +01001201 tmp_record->last_seen = now_ms;
Emeric Brunc9437992021-02-12 19:42:55 +01001202 pool_free(resolv_answer_item_pool, answer_record);
1203 answer_record = NULL;
1204 }
1205 else {
Christopher Faulet55c1c402021-03-11 09:36:05 +01001206 answer_record->last_seen = now_ms;
Emeric Brunc9437992021-02-12 19:42:55 +01001207 answer_record->ar_item = NULL;
Willy Tarreau2b718102021-04-21 07:32:39 +02001208 LIST_APPEND(&r_res->answer_list, &answer_record->list);
Emeric Brunc9437992021-02-12 19:42:55 +01001209 answer_record = NULL;
1210 }
1211 } /* for i 0 to ancount */
1212
1213 /* Save the number of records we really own */
1214 r_res->header.ancount = nb_saved_records;
1215
1216 /* now parsing additional records for SRV queries only */
1217 if (query->type != DNS_RTYPE_SRV)
1218 goto skip_parsing_additional_records;
1219
1220 /* if we find Authority records, just skip them */
1221 for (i = 0; i < r_res->header.nscount; i++) {
1222 offset = 0;
1223 len = resolv_read_name(resp, bufend, reader, tmpname, DNS_MAX_NAME_SIZE,
1224 &offset, 0);
1225 if (len == 0)
1226 continue;
1227
1228 if (reader + offset + 10 >= bufend)
1229 goto invalid_resp;
1230
1231 reader += offset;
1232 /* skip 2 bytes for class */
1233 reader += 2;
1234 /* skip 2 bytes for type */
1235 reader += 2;
1236 /* skip 4 bytes for ttl */
1237 reader += 4;
1238 /* read data len */
1239 len = reader[0] * 256 + reader[1];
1240 reader += 2;
1241
1242 if (reader + len >= bufend)
1243 goto invalid_resp;
1244
1245 reader += len;
1246 }
1247
1248 nb_saved_records = 0;
1249 for (i = 0; i < r_res->header.arcount; i++) {
1250 if (reader >= bufend)
1251 goto invalid_resp;
1252
1253 answer_record = pool_alloc(resolv_answer_item_pool);
1254 if (answer_record == NULL)
1255 goto invalid_resp;
Christopher Faulet55c1c402021-03-11 09:36:05 +01001256 answer_record->last_seen = TICK_ETERNITY;
Emeric Brunf9ca5d82021-06-11 10:08:05 +02001257 LIST_INIT(&answer_record->attached_servers);
Emeric Brunc9437992021-02-12 19:42:55 +01001258
1259 offset = 0;
1260 len = resolv_read_name(resp, bufend, reader, tmpname, DNS_MAX_NAME_SIZE, &offset, 0);
1261
1262 if (len == 0) {
1263 pool_free(resolv_answer_item_pool, answer_record);
1264 answer_record = NULL;
1265 continue;
1266 }
1267
1268 memcpy(answer_record->name, tmpname, len);
1269 answer_record->name[len] = 0;
1270
1271 reader += offset;
1272 if (reader >= bufend)
1273 goto invalid_resp;
1274
1275 /* 2 bytes for record type (A, AAAA, CNAME, etc...) */
1276 if (reader + 2 > bufend)
1277 goto invalid_resp;
1278
1279 answer_record->type = reader[0] * 256 + reader[1];
1280 reader += 2;
1281
1282 /* 2 bytes for class (2) */
1283 if (reader + 2 > bufend)
1284 goto invalid_resp;
1285
1286 answer_record->class = reader[0] * 256 + reader[1];
1287 reader += 2;
1288
1289 /* 4 bytes for ttl (4) */
1290 if (reader + 4 > bufend)
1291 goto invalid_resp;
1292
1293 answer_record->ttl = reader[0] * 16777216 + reader[1] * 65536
1294 + reader[2] * 256 + reader[3];
1295 reader += 4;
1296
1297 /* Now reading data len */
1298 if (reader + 2 > bufend)
1299 goto invalid_resp;
1300
1301 answer_record->data_len = reader[0] * 256 + reader[1];
1302
1303 /* Move forward 2 bytes for data len */
1304 reader += 2;
1305
1306 if (reader + answer_record->data_len > bufend)
1307 goto invalid_resp;
1308
1309 /* Analyzing record content */
1310 switch (answer_record->type) {
1311 case DNS_RTYPE_A:
1312 /* ipv4 is stored on 4 bytes */
1313 if (answer_record->data_len != 4)
1314 goto invalid_resp;
1315
Willy Tarreau20a02372021-10-14 22:52:04 +02001316 answer_record->data.in4.sin_family = AF_INET;
1317 memcpy(&answer_record->data.in4.sin_addr, reader, answer_record->data_len);
Emeric Brunc9437992021-02-12 19:42:55 +01001318 break;
1319
1320 case DNS_RTYPE_AAAA:
1321 /* ipv6 is stored on 16 bytes */
1322 if (answer_record->data_len != 16)
1323 goto invalid_resp;
1324
Willy Tarreau20a02372021-10-14 22:52:04 +02001325 answer_record->data.in6.sin6_family = AF_INET6;
1326 memcpy(&answer_record->data.in6.sin6_addr, reader, answer_record->data_len);
Emeric Brunc9437992021-02-12 19:42:55 +01001327 break;
1328
1329 default:
1330 pool_free(resolv_answer_item_pool, answer_record);
1331 answer_record = NULL;
1332 continue;
1333
1334 } /* switch (record type) */
1335
1336 /* Increment the counter for number of records saved into our
1337 * local response */
1338 nb_saved_records++;
1339
1340 /* Move forward answer_record->data_len for analyzing next
1341 * record in the response */
Christopher Faulet77f86062021-03-10 15:19:57 +01001342 reader += answer_record->data_len;
Emeric Brunc9437992021-02-12 19:42:55 +01001343
1344 /* Lookup to see if we already had this entry */
1345 found = 0;
1346 list_for_each_entry(tmp_record, &r_res->answer_list, list) {
Christopher Faulet77f86062021-03-10 15:19:57 +01001347 struct resolv_answer_item *ar_item;
1348
1349 if (tmp_record->type != DNS_RTYPE_SRV || !tmp_record->ar_item)
1350 continue;
1351
1352 ar_item = tmp_record->ar_item;
Christopher Faulete8674c72021-03-12 16:42:45 +01001353 if (ar_item->type != answer_record->type || ar_item->last_seen == now_ms ||
Christopher Faulet77f86062021-03-10 15:19:57 +01001354 len != tmp_record->data_len ||
Willy Tarreau20a02372021-10-14 22:52:04 +02001355 resolv_hostname_cmp(answer_record->name, tmp_record->data.target, tmp_record->data_len))
Emeric Brunc9437992021-02-12 19:42:55 +01001356 continue;
1357
Christopher Faulet77f86062021-03-10 15:19:57 +01001358 switch(ar_item->type) {
Emeric Brunc9437992021-02-12 19:42:55 +01001359 case DNS_RTYPE_A:
Willy Tarreau20a02372021-10-14 22:52:04 +02001360 if (!memcmp(&answer_record->data.in4.sin_addr,
1361 &ar_item->data.in4.sin_addr,
1362 sizeof(answer_record->data.in4.sin_addr)))
Emeric Brunc9437992021-02-12 19:42:55 +01001363 found = 1;
1364 break;
1365
1366 case DNS_RTYPE_AAAA:
Willy Tarreau20a02372021-10-14 22:52:04 +02001367 if (!memcmp(&answer_record->data.in6.sin6_addr,
1368 &ar_item->data.in6.sin6_addr,
1369 sizeof(answer_record->data.in6.sin6_addr)))
Emeric Brunc9437992021-02-12 19:42:55 +01001370 found = 1;
1371 break;
1372
1373 default:
1374 break;
1375 }
1376
1377 if (found == 1)
1378 break;
1379 }
1380
1381 if (found == 1) {
Christopher Faulet55c1c402021-03-11 09:36:05 +01001382 tmp_record->ar_item->last_seen = now_ms;
Emeric Brunc9437992021-02-12 19:42:55 +01001383 pool_free(resolv_answer_item_pool, answer_record);
1384 answer_record = NULL;
1385 }
1386 else {
Christopher Faulet55c1c402021-03-11 09:36:05 +01001387 answer_record->last_seen = now_ms;
Emeric Brunc9437992021-02-12 19:42:55 +01001388 answer_record->ar_item = NULL;
1389
1390 // looking for the SRV record in the response list linked to this additional record
1391 list_for_each_entry(tmp_record, &r_res->answer_list, list) {
1392 if (tmp_record->type == DNS_RTYPE_SRV &&
1393 tmp_record->ar_item == NULL &&
Willy Tarreau20a02372021-10-14 22:52:04 +02001394 !resolv_hostname_cmp(tmp_record->data.target, answer_record->name, tmp_record->data_len)) {
Emeric Brunc9437992021-02-12 19:42:55 +01001395 /* Always use the received additional record to refresh info */
1396 if (tmp_record->ar_item)
1397 pool_free(resolv_answer_item_pool, tmp_record->ar_item);
1398 tmp_record->ar_item = answer_record;
Christopher Faulet9c246a42021-02-23 11:59:19 +01001399 answer_record = NULL;
Emeric Brunc9437992021-02-12 19:42:55 +01001400 break;
1401 }
1402 }
Christopher Faulet9c246a42021-02-23 11:59:19 +01001403 if (answer_record) {
Emeric Brunc9437992021-02-12 19:42:55 +01001404 pool_free(resolv_answer_item_pool, answer_record);
Christopher Faulet9c246a42021-02-23 11:59:19 +01001405 answer_record = NULL;
1406 }
Emeric Brunc9437992021-02-12 19:42:55 +01001407 }
1408 } /* for i 0 to arcount */
1409
1410 skip_parsing_additional_records:
1411
1412 /* Save the number of records we really own */
1413 r_res->header.arcount = nb_saved_records;
Emeric Brunc9437992021-02-12 19:42:55 +01001414 resolv_check_response(resolution);
1415 return RSLV_RESP_VALID;
1416
1417 invalid_resp:
1418 cause = RSLV_RESP_INVALID;
1419
1420 return_error:
1421 pool_free(resolv_answer_item_pool, answer_record);
1422 return cause;
1423}
1424
1425/* Searches dn_name resolution in resp.
1426 * If existing IP not found, return the first IP matching family_priority,
1427 * otherwise, first ip found
1428 * The following tasks are the responsibility of the caller:
1429 * - <r_res> contains an error free DNS response
1430 * For both cases above, resolv_validate_dns_response is required
1431 * returns one of the RSLV_UPD_* code
1432 */
1433int resolv_get_ip_from_response(struct resolv_response *r_res,
1434 struct resolv_options *resolv_opts, void *currentip,
1435 short currentip_sin_family,
1436 void **newip, short *newip_sin_family,
Emeric Brunf9ca5d82021-06-11 10:08:05 +02001437 struct server *owner)
Emeric Brunc9437992021-02-12 19:42:55 +01001438{
Emeric Brunf9ca5d82021-06-11 10:08:05 +02001439 struct resolv_answer_item *record, *found_record = NULL;
Emeric Brunc9437992021-02-12 19:42:55 +01001440 int family_priority;
1441 int currentip_found;
1442 unsigned char *newip4, *newip6;
1443 int currentip_sel;
1444 int j;
1445 int score, max_score;
1446 int allowed_duplicated_ip;
1447
Emeric Brunf9ca5d82021-06-11 10:08:05 +02001448 /* srv is linked to an alive ip record */
1449 if (owner && LIST_INLIST(&owner->ip_rec_item))
1450 return RSLV_UPD_NO;
1451
Emeric Brunc9437992021-02-12 19:42:55 +01001452 family_priority = resolv_opts->family_prio;
1453 allowed_duplicated_ip = resolv_opts->accept_duplicate_ip;
1454 *newip = newip4 = newip6 = NULL;
1455 currentip_found = 0;
1456 *newip_sin_family = AF_UNSPEC;
1457 max_score = -1;
1458
1459 /* Select an IP regarding configuration preference.
1460 * Top priority is the preferred network ip version,
1461 * second priority is the preferred network.
1462 * the last priority is the currently used IP,
1463 *
1464 * For these three priorities, a score is calculated. The
1465 * weight are:
1466 * 8 - preferred ip version.
1467 * 4 - preferred network.
1468 * 2 - if the ip in the record is not affected to any other server in the same backend (duplication)
1469 * 1 - current ip.
1470 * The result with the biggest score is returned.
1471 */
1472
1473 list_for_each_entry(record, &r_res->answer_list, list) {
1474 void *ip;
1475 unsigned char ip_type;
1476
1477 if (record->type == DNS_RTYPE_A) {
Emeric Brunc9437992021-02-12 19:42:55 +01001478 ip_type = AF_INET;
Willy Tarreau20a02372021-10-14 22:52:04 +02001479 ip = &record->data.in4.sin_addr;
Emeric Brunc9437992021-02-12 19:42:55 +01001480 }
1481 else if (record->type == DNS_RTYPE_AAAA) {
1482 ip_type = AF_INET6;
Willy Tarreau20a02372021-10-14 22:52:04 +02001483 ip = &record->data.in6.sin6_addr;
Emeric Brunc9437992021-02-12 19:42:55 +01001484 }
1485 else
1486 continue;
1487 score = 0;
1488
1489 /* Check for preferred ip protocol. */
1490 if (ip_type == family_priority)
1491 score += 8;
1492
1493 /* Check for preferred network. */
1494 for (j = 0; j < resolv_opts->pref_net_nb; j++) {
1495
1496 /* Compare only the same addresses class. */
1497 if (resolv_opts->pref_net[j].family != ip_type)
1498 continue;
1499
1500 if ((ip_type == AF_INET &&
1501 in_net_ipv4(ip,
1502 &resolv_opts->pref_net[j].mask.in4,
1503 &resolv_opts->pref_net[j].addr.in4)) ||
1504 (ip_type == AF_INET6 &&
1505 in_net_ipv6(ip,
1506 &resolv_opts->pref_net[j].mask.in6,
1507 &resolv_opts->pref_net[j].addr.in6))) {
1508 score += 4;
1509 break;
1510 }
1511 }
1512
1513 /* Check if the IP found in the record is already affected to a
1514 * member of a group. If not, the score should be incremented
1515 * by 2. */
Emeric Brunf9ca5d82021-06-11 10:08:05 +02001516 if (owner) {
1517 struct server *srv;
1518 int already_used = 0;
1519
1520 list_for_each_entry(srv, &record->attached_servers, ip_rec_item) {
1521 if (srv == owner)
1522 continue;
1523 if (srv->proxy == owner->proxy) {
1524 already_used = 1;
1525 break;
1526 }
1527 }
1528 if (already_used) {
1529 if (!allowed_duplicated_ip) {
1530 continue;
1531 }
1532 }
1533 else {
1534 score += 2;
Emeric Brunc9437992021-02-12 19:42:55 +01001535 }
1536 } else {
1537 score += 2;
1538 }
1539
1540 /* Check for current ip matching. */
1541 if (ip_type == currentip_sin_family &&
1542 ((currentip_sin_family == AF_INET &&
1543 !memcmp(ip, currentip, 4)) ||
1544 (currentip_sin_family == AF_INET6 &&
1545 !memcmp(ip, currentip, 16)))) {
1546 score++;
1547 currentip_sel = 1;
1548 }
1549 else
1550 currentip_sel = 0;
1551
1552 /* Keep the address if the score is better than the previous
1553 * score. The maximum score is 15, if this value is reached, we
1554 * break the parsing. Implicitly, this score is reached the ip
1555 * selected is the current ip. */
1556 if (score > max_score) {
1557 if (ip_type == AF_INET)
1558 newip4 = ip;
1559 else
1560 newip6 = ip;
Emeric Brunf9ca5d82021-06-11 10:08:05 +02001561 found_record = record;
Emeric Brunc9437992021-02-12 19:42:55 +01001562 currentip_found = currentip_sel;
Emeric Brunf9ca5d82021-06-11 10:08:05 +02001563 if (score == 15) {
1564 /* this was not registered on the current record but it matches
1565 * let's fix it (it may comes from state file */
1566 if (owner)
1567 LIST_APPEND(&found_record->attached_servers, &owner->ip_rec_item);
Emeric Brunc9437992021-02-12 19:42:55 +01001568 return RSLV_UPD_NO;
Emeric Brunf9ca5d82021-06-11 10:08:05 +02001569 }
Emeric Brunc9437992021-02-12 19:42:55 +01001570 max_score = score;
1571 }
1572 } /* list for each record entries */
1573
1574 /* No IP found in the response */
1575 if (!newip4 && !newip6)
1576 return RSLV_UPD_NO_IP_FOUND;
1577
1578 /* Case when the caller looks first for an IPv4 address */
1579 if (family_priority == AF_INET) {
1580 if (newip4) {
1581 *newip = newip4;
1582 *newip_sin_family = AF_INET;
1583 }
1584 else if (newip6) {
1585 *newip = newip6;
1586 *newip_sin_family = AF_INET6;
1587 }
Emeric Brunc9437992021-02-12 19:42:55 +01001588 }
1589 /* Case when the caller looks first for an IPv6 address */
1590 else if (family_priority == AF_INET6) {
1591 if (newip6) {
1592 *newip = newip6;
1593 *newip_sin_family = AF_INET6;
1594 }
1595 else if (newip4) {
1596 *newip = newip4;
1597 *newip_sin_family = AF_INET;
1598 }
Emeric Brunc9437992021-02-12 19:42:55 +01001599 }
1600 /* Case when the caller have no preference (we prefer IPv6) */
1601 else if (family_priority == AF_UNSPEC) {
1602 if (newip6) {
1603 *newip = newip6;
1604 *newip_sin_family = AF_INET6;
1605 }
1606 else if (newip4) {
1607 *newip = newip4;
1608 *newip_sin_family = AF_INET;
1609 }
Emeric Brunc9437992021-02-12 19:42:55 +01001610 }
1611
Emeric Brunf9ca5d82021-06-11 10:08:05 +02001612 /* the ip of this record was chosen for the server */
1613 if (owner && found_record) {
Christopher Faulet2558d5a2021-06-24 15:16:48 +02001614 LIST_DEL_INIT(&owner->ip_rec_item);
Emeric Brunf9ca5d82021-06-11 10:08:05 +02001615 LIST_APPEND(&found_record->attached_servers, &owner->ip_rec_item);
1616 }
1617
Emeric Brunc9437992021-02-12 19:42:55 +01001618 list_for_each_entry(record, &r_res->answer_list, list) {
1619 /* Move the first record to the end of the list, for internal
1620 * round robin */
Willy Tarreau2b718102021-04-21 07:32:39 +02001621 LIST_DELETE(&record->list);
1622 LIST_APPEND(&r_res->answer_list, &record->list);
Emeric Brunc9437992021-02-12 19:42:55 +01001623 break;
1624 }
Christopher Faulet2558d5a2021-06-24 15:16:48 +02001625
1626 return (currentip_found ? RSLV_UPD_NO : RSLV_UPD_SRVIP_NOT_FOUND);
Emeric Brunc9437992021-02-12 19:42:55 +01001627}
1628
Willy Tarreauca0170b2021-10-14 08:05:25 +02001629/* Turns a domain name label into a string: 3www7haproxy3org into www.haproxy.org
Emeric Brunc9437992021-02-12 19:42:55 +01001630 *
Willy Tarreauca0170b2021-10-14 08:05:25 +02001631 * <dn> contains the input label of <dn_len> bytes long and does not need to be
1632 * null-terminated. <str> must be allocated large enough to contain a full host
1633 * name plus the trailing zero, and the allocated size must be passed in
1634 * <str_len>.
Emeric Brunc9437992021-02-12 19:42:55 +01001635 *
Willy Tarreauca0170b2021-10-14 08:05:25 +02001636 * In case of error, -1 is returned, otherwise, the number of bytes copied in
Emeric Brunc9437992021-02-12 19:42:55 +01001637 * <str> (including the terminating null byte).
1638 */
1639int resolv_dn_label_to_str(const char *dn, int dn_len, char *str, int str_len)
1640{
1641 char *ptr;
1642 int i, sz;
1643
Willy Tarreauca0170b2021-10-14 08:05:25 +02001644 if (str_len < dn_len)
Emeric Brunc9437992021-02-12 19:42:55 +01001645 return -1;
1646
1647 ptr = str;
Willy Tarreauca0170b2021-10-14 08:05:25 +02001648 for (i = 0; i < dn_len; ++i) {
Emeric Brunc9437992021-02-12 19:42:55 +01001649 sz = dn[i];
1650 if (i)
1651 *ptr++ = '.';
1652 memcpy(ptr, dn+i+1, sz);
1653 ptr += sz;
1654 i += sz;
1655 }
1656 *ptr++ = '\0';
1657 return (ptr - str);
1658}
1659
1660/* Turns a string into domain name label: www.haproxy.org into 3www7haproxy3org
1661 *
Willy Tarreauc1c765f2021-10-14 07:49:49 +02001662 * <str> contains the input string that is <str_len> bytes long (trailing zero
1663 * not needed). <dn> buffer must be allocated large enough to contain the
1664 * encoded string and a trailing zero, so it must be at least str_len+2, and
1665 * this allocated buffer size must be passed in <dn_len>.
Emeric Brunc9437992021-02-12 19:42:55 +01001666 *
Willy Tarreauc1c765f2021-10-14 07:49:49 +02001667 * In case of error, -1 is returned, otherwise, the number of bytes copied in
Emeric Brunc9437992021-02-12 19:42:55 +01001668 * <dn> (excluding the terminating null byte).
1669 */
1670int resolv_str_to_dn_label(const char *str, int str_len, char *dn, int dn_len)
1671{
1672 int i, offset;
1673
Willy Tarreauc1c765f2021-10-14 07:49:49 +02001674 if (dn_len < str_len + 2)
Emeric Brunc9437992021-02-12 19:42:55 +01001675 return -1;
1676
1677 /* First byte of dn will be used to store the length of the first
1678 * label */
1679 offset = 0;
1680 for (i = 0; i < str_len; ++i) {
1681 if (str[i] == '.') {
1682 /* 2 or more consecutive dots is invalid */
1683 if (i == offset)
1684 return -1;
1685
1686 /* ignore trailing dot */
Willy Tarreauc1c765f2021-10-14 07:49:49 +02001687 if (i + 1 == str_len) {
Emeric Brunc9437992021-02-12 19:42:55 +01001688 i++;
1689 break;
1690 }
1691
1692 dn[offset] = (i - offset);
1693 offset = i+1;
1694 continue;
1695 }
1696 dn[i+1] = str[i];
1697 }
Willy Tarreauc1c765f2021-10-14 07:49:49 +02001698 dn[offset] = i - offset;
Willy Tarreau68c7b362021-10-15 08:09:25 +02001699 dn[i+1] = '\0';
1700 return i+1;
Emeric Brunc9437992021-02-12 19:42:55 +01001701}
1702
1703/* Validates host name:
1704 * - total size
1705 * - each label size individually
1706 * returns:
1707 * 0 in case of error. If <err> is not NULL, an error message is stored there.
1708 * 1 when no error. <err> is left unaffected.
1709 */
1710int resolv_hostname_validation(const char *string, char **err)
1711{
1712 int i;
1713
1714 if (strlen(string) > DNS_MAX_NAME_SIZE) {
1715 if (err)
1716 *err = DNS_TOO_LONG_FQDN;
1717 return 0;
1718 }
1719
1720 while (*string) {
1721 i = 0;
1722 while (*string && *string != '.' && i < DNS_MAX_LABEL_SIZE) {
1723 if (!(*string == '-' || *string == '_' ||
1724 (*string >= 'a' && *string <= 'z') ||
1725 (*string >= 'A' && *string <= 'Z') ||
1726 (*string >= '0' && *string <= '9'))) {
1727 if (err)
1728 *err = DNS_INVALID_CHARACTER;
1729 return 0;
1730 }
1731 i++;
1732 string++;
1733 }
1734
1735 if (!(*string))
1736 break;
1737
1738 if (*string != '.' && i >= DNS_MAX_LABEL_SIZE) {
1739 if (err)
1740 *err = DNS_LABEL_TOO_LONG;
1741 return 0;
1742 }
1743
1744 string++;
1745 }
1746 return 1;
1747}
1748
1749/* Picks up an available resolution from the different resolution list
1750 * associated to a resolvers section, in this order:
1751 * 1. check in resolutions.curr for the same hostname and query_type
1752 * 2. check in resolutions.wait for the same hostname and query_type
1753 * 3. Get a new resolution from resolution pool
1754 *
1755 * Returns an available resolution, NULL if none found.
1756 */
1757static struct resolv_resolution *resolv_pick_resolution(struct resolvers *resolvers,
1758 char **hostname_dn, int hostname_dn_len,
1759 int query_type)
1760{
1761 struct resolv_resolution *res;
1762
1763 if (!*hostname_dn)
1764 goto from_pool;
1765
1766 /* Search for same hostname and query type in resolutions.curr */
1767 list_for_each_entry(res, &resolvers->resolutions.curr, list) {
1768 if (!res->hostname_dn)
1769 continue;
1770 if ((query_type == res->prefered_query_type) &&
1771 hostname_dn_len == res->hostname_dn_len &&
1772 !resolv_hostname_cmp(*hostname_dn, res->hostname_dn, hostname_dn_len))
1773 return res;
1774 }
1775
1776 /* Search for same hostname and query type in resolutions.wait */
1777 list_for_each_entry(res, &resolvers->resolutions.wait, list) {
1778 if (!res->hostname_dn)
1779 continue;
1780 if ((query_type == res->prefered_query_type) &&
1781 hostname_dn_len == res->hostname_dn_len &&
1782 !resolv_hostname_cmp(*hostname_dn, res->hostname_dn, hostname_dn_len))
1783 return res;
1784 }
1785
1786 from_pool:
1787 /* No resolution could be found, so let's allocate a new one */
Willy Tarreau70490eb2021-03-22 21:08:50 +01001788 res = pool_zalloc(resolv_resolution_pool);
Emeric Brunc9437992021-02-12 19:42:55 +01001789 if (res) {
Willy Tarreau51128f82021-10-19 11:17:33 +02001790 int i;
1791
Emeric Brunc9437992021-02-12 19:42:55 +01001792 res->resolvers = resolvers;
1793 res->uuid = resolution_uuid;
1794 res->status = RSLV_STATUS_NONE;
1795 res->step = RSLV_STEP_NONE;
1796 res->last_valid = now_ms;
1797
1798 LIST_INIT(&res->requesters);
Willy Tarreau51128f82021-10-19 11:17:33 +02001799 LIST_INIT(&res->response.query_list);
Emeric Brunc9437992021-02-12 19:42:55 +01001800 LIST_INIT(&res->response.answer_list);
1801
Willy Tarreau51128f82021-10-19 11:17:33 +02001802 for (i = 0; i < DNS_MAX_QUERY_RECORDS; i++)
1803 LIST_INIT(&res->response_query_records[i].list);
1804
Emeric Brunc9437992021-02-12 19:42:55 +01001805 res->prefered_query_type = query_type;
1806 res->query_type = query_type;
1807 res->hostname_dn = *hostname_dn;
1808 res->hostname_dn_len = hostname_dn_len;
1809
1810 ++resolution_uuid;
1811
1812 /* Move the resolution to the resolvers wait queue */
Willy Tarreau2b718102021-04-21 07:32:39 +02001813 LIST_APPEND(&resolvers->resolutions.wait, &res->list);
Emeric Brunc9437992021-02-12 19:42:55 +01001814 }
1815 return res;
1816}
1817
Willy Tarreauaab75932021-10-19 11:16:11 +02001818/* deletes and frees all answer_items from the resolution's answer_list */
1819static void resolv_purge_resolution_answer_records(struct resolv_resolution *resolution)
Christopher Faulet1dec5c72021-03-10 14:40:39 +01001820{
1821 struct resolv_answer_item *item, *itemback;
1822
1823 list_for_each_entry_safe(item, itemback, &resolution->response.answer_list, list) {
Willy Tarreau2b718102021-04-21 07:32:39 +02001824 LIST_DELETE(&item->list);
Christopher Faulet1dec5c72021-03-10 14:40:39 +01001825 pool_free(resolv_answer_item_pool, item->ar_item);
1826 pool_free(resolv_answer_item_pool, item);
1827 }
1828}
1829
Willy Tarreau51128f82021-10-19 11:17:33 +02001830/* deletes all query_items from the resolution's query_list */
1831static void resolv_purge_resolution_query_items(struct resolv_resolution *resolution)
1832{
1833 struct resolv_query_item *item, *itemback;
1834
1835 list_for_each_entry_safe(item, itemback, &resolution->response.query_list, list)
1836 LIST_DEL_INIT(&item->list);
1837}
1838
Emeric Brunc9437992021-02-12 19:42:55 +01001839/* Releases a resolution from its requester(s) and move it back to the pool */
1840static void resolv_free_resolution(struct resolv_resolution *resolution)
1841{
1842 struct resolv_requester *req, *reqback;
Emeric Brunc9437992021-02-12 19:42:55 +01001843
1844 /* clean up configuration */
1845 resolv_reset_resolution(resolution);
1846 resolution->hostname_dn = NULL;
1847 resolution->hostname_dn_len = 0;
1848
1849 list_for_each_entry_safe(req, reqback, &resolution->requesters, list) {
Willy Tarreau2b718102021-04-21 07:32:39 +02001850 LIST_DELETE(&req->list);
Emeric Brunc9437992021-02-12 19:42:55 +01001851 req->resolution = NULL;
1852 }
Christopher Faulet1dec5c72021-03-10 14:40:39 +01001853 resolv_purge_resolution_answer_records(resolution);
Willy Tarreau51128f82021-10-19 11:17:33 +02001854 resolv_purge_resolution_query_items(resolution);
1855
Willy Tarreau2b718102021-04-21 07:32:39 +02001856 LIST_DELETE(&resolution->list);
Emeric Brunc9437992021-02-12 19:42:55 +01001857 pool_free(resolv_resolution_pool, resolution);
1858}
1859
1860/* Links a requester (a server or a resolv_srvrq) with a resolution. It returns 0
1861 * on success, -1 otherwise.
1862 */
1863int resolv_link_resolution(void *requester, int requester_type, int requester_locked)
1864{
1865 struct resolv_resolution *res = NULL;
1866 struct resolv_requester *req;
1867 struct resolvers *resolvers;
1868 struct server *srv = NULL;
1869 struct resolv_srvrq *srvrq = NULL;
1870 struct stream *stream = NULL;
1871 char **hostname_dn;
1872 int hostname_dn_len, query_type;
1873
1874 switch (requester_type) {
1875 case OBJ_TYPE_SERVER:
1876 srv = (struct server *)requester;
1877 hostname_dn = &srv->hostname_dn;
1878 hostname_dn_len = srv->hostname_dn_len;
1879 resolvers = srv->resolvers;
1880 query_type = ((srv->resolv_opts.family_prio == AF_INET)
1881 ? DNS_RTYPE_A
1882 : DNS_RTYPE_AAAA);
1883 break;
1884
1885 case OBJ_TYPE_SRVRQ:
1886 srvrq = (struct resolv_srvrq *)requester;
1887 hostname_dn = &srvrq->hostname_dn;
1888 hostname_dn_len = srvrq->hostname_dn_len;
1889 resolvers = srvrq->resolvers;
1890 query_type = DNS_RTYPE_SRV;
1891 break;
1892
1893 case OBJ_TYPE_STREAM:
1894 stream = (struct stream *)requester;
1895 hostname_dn = &stream->resolv_ctx.hostname_dn;
1896 hostname_dn_len = stream->resolv_ctx.hostname_dn_len;
1897 resolvers = stream->resolv_ctx.parent->arg.resolv.resolvers;
1898 query_type = ((stream->resolv_ctx.parent->arg.resolv.opts->family_prio == AF_INET)
1899 ? DNS_RTYPE_A
1900 : DNS_RTYPE_AAAA);
1901 break;
1902 default:
1903 goto err;
1904 }
1905
1906 /* Get a resolution from the resolvers' wait queue or pool */
1907 if ((res = resolv_pick_resolution(resolvers, hostname_dn, hostname_dn_len, query_type)) == NULL)
1908 goto err;
1909
1910 if (srv) {
1911 if (!requester_locked)
1912 HA_SPIN_LOCK(SERVER_LOCK, &srv->lock);
1913 if (srv->resolv_requester == NULL) {
1914 if ((req = pool_alloc(resolv_requester_pool)) == NULL) {
1915 if (!requester_locked)
1916 HA_SPIN_UNLOCK(SERVER_LOCK, &srv->lock);
1917 goto err;
1918 }
1919 req->owner = &srv->obj_type;
1920 srv->resolv_requester = req;
1921 }
1922 else
1923 req = srv->resolv_requester;
1924 if (!requester_locked)
1925 HA_SPIN_UNLOCK(SERVER_LOCK, &srv->lock);
1926
1927 req->requester_cb = snr_resolution_cb;
1928 req->requester_error_cb = snr_resolution_error_cb;
1929 }
1930 else if (srvrq) {
1931 if (srvrq->requester == NULL) {
1932 if ((req = pool_alloc(resolv_requester_pool)) == NULL)
1933 goto err;
1934 req->owner = &srvrq->obj_type;
1935 srvrq->requester = req;
1936 }
1937 else
1938 req = srvrq->requester;
1939
1940 req->requester_cb = snr_resolution_cb;
Baptiste Assmannb4badf72020-11-19 22:38:33 +01001941 req->requester_error_cb = srvrq_resolution_error_cb;
Emeric Brunc9437992021-02-12 19:42:55 +01001942 }
1943 else if (stream) {
1944 if (stream->resolv_ctx.requester == NULL) {
1945 if ((req = pool_alloc(resolv_requester_pool)) == NULL)
1946 goto err;
1947 req->owner = &stream->obj_type;
1948 stream->resolv_ctx.requester = req;
1949 }
1950 else
1951 req = stream->resolv_ctx.requester;
1952
1953 req->requester_cb = act_resolution_cb;
1954 req->requester_error_cb = act_resolution_error_cb;
1955 }
1956 else
1957 goto err;
1958
1959 req->resolution = res;
1960
Willy Tarreau2b718102021-04-21 07:32:39 +02001961 LIST_APPEND(&res->requesters, &req->list);
Emeric Brunc9437992021-02-12 19:42:55 +01001962 return 0;
1963
1964 err:
1965 if (res && LIST_ISEMPTY(&res->requesters))
1966 resolv_free_resolution(res);
1967 return -1;
1968}
1969
Emeric Brun0c4a8a32021-06-11 10:48:45 +02001970/* This function removes all server/srvrq references on answer items
1971 * if <safe> is set to 1, in case of srvrq, sub server resquesters unlink
1972 * is called using safe == 1 to make it usable into callbacks
1973 */
1974void resolv_detach_from_resolution_answer_items(struct resolv_resolution *res, struct resolv_requester *req, int safe)
1975{
1976 struct resolv_answer_item *item, *itemback;
1977 struct server *srv, *srvback;
1978 struct resolv_srvrq *srvrq;
1979
1980 if ((srv = objt_server(req->owner)) != NULL) {
1981 LIST_DEL_INIT(&srv->ip_rec_item);
1982 }
1983 else if ((srvrq = objt_resolv_srvrq(req->owner)) != NULL) {
1984 list_for_each_entry_safe(item, itemback, &res->response.answer_list, list) {
1985 if (item->type == DNS_RTYPE_SRV) {
1986 list_for_each_entry_safe(srv, srvback, &item->attached_servers, srv_rec_item) {
Christopher Faulet5f8ccff2021-06-15 16:08:48 +02001987 if (srv->srvrq == srvrq)
Willy Tarreau3223d852021-10-18 16:49:14 +02001988 resolv_srvrq_cleanup_srv(srv, safe);
Emeric Brun0c4a8a32021-06-11 10:48:45 +02001989 }
1990 }
1991 }
1992 }
1993}
1994
Emeric Brunc9437992021-02-12 19:42:55 +01001995/* Removes a requester from a DNS resolution. It takes takes care of all the
1996 * consequences. It also cleans up some parameters from the requester.
Christopher Faulet0efc0992021-03-11 18:09:53 +01001997 * if <safe> is set to 1, the corresponding resolution is not released.
Emeric Brunc9437992021-02-12 19:42:55 +01001998 */
Christopher Faulet0efc0992021-03-11 18:09:53 +01001999void resolv_unlink_resolution(struct resolv_requester *requester, int safe)
Emeric Brunc9437992021-02-12 19:42:55 +01002000{
2001 struct resolv_resolution *res;
2002 struct resolv_requester *req;
2003
2004 /* Nothing to do */
2005 if (!requester || !requester->resolution)
2006 return;
2007 res = requester->resolution;
2008
Emeric Brunf9ca5d82021-06-11 10:08:05 +02002009 /* remove ref from the resolution answer item list to the requester */
Emeric Brun0c4a8a32021-06-11 10:48:45 +02002010 resolv_detach_from_resolution_answer_items(res, requester, safe);
Emeric Brunf9ca5d82021-06-11 10:08:05 +02002011
Emeric Brunc9437992021-02-12 19:42:55 +01002012 /* Clean up the requester */
Willy Tarreau2b718102021-04-21 07:32:39 +02002013 LIST_DELETE(&requester->list);
Emeric Brunc9437992021-02-12 19:42:55 +01002014 requester->resolution = NULL;
2015
2016 /* We need to find another requester linked on this resolution */
2017 if (!LIST_ISEMPTY(&res->requesters))
2018 req = LIST_NEXT(&res->requesters, struct resolv_requester *, list);
2019 else {
Christopher Faulet0efc0992021-03-11 18:09:53 +01002020 if (safe) {
2021 /* Don't release it yet. */
2022 resolv_reset_resolution(res);
2023 res->hostname_dn = NULL;
2024 res->hostname_dn_len = 0;
2025 resolv_purge_resolution_answer_records(res);
2026 return;
2027 }
2028
Emeric Brunc9437992021-02-12 19:42:55 +01002029 resolv_free_resolution(res);
2030 return;
2031 }
2032
2033 /* Move hostname_dn related pointers to the next requester */
2034 switch (obj_type(req->owner)) {
2035 case OBJ_TYPE_SERVER:
2036 res->hostname_dn = __objt_server(req->owner)->hostname_dn;
2037 res->hostname_dn_len = __objt_server(req->owner)->hostname_dn_len;
2038 break;
2039 case OBJ_TYPE_SRVRQ:
2040 res->hostname_dn = __objt_resolv_srvrq(req->owner)->hostname_dn;
2041 res->hostname_dn_len = __objt_resolv_srvrq(req->owner)->hostname_dn_len;
2042 break;
2043 case OBJ_TYPE_STREAM:
2044 res->hostname_dn = __objt_stream(req->owner)->resolv_ctx.hostname_dn;
2045 res->hostname_dn_len = __objt_stream(req->owner)->resolv_ctx.hostname_dn_len;
2046 break;
2047 default:
2048 res->hostname_dn = NULL;
2049 res->hostname_dn_len = 0;
2050 break;
2051 }
2052}
2053
2054/* Called when a network IO is generated on a name server socket for an incoming
2055 * packet. It performs the following actions:
2056 * - check if the packet requires processing (not outdated resolution)
2057 * - ensure the DNS packet received is valid and call requester's callback
2058 * - call requester's error callback if invalid response
2059 * - check the dn_name in the packet against the one sent
2060 */
2061static int resolv_process_responses(struct dns_nameserver *ns)
2062{
2063 struct dns_counters *tmpcounters;
2064 struct resolvers *resolvers;
2065 struct resolv_resolution *res;
2066 struct resolv_query_item *query;
2067 unsigned char buf[DNS_MAX_UDP_MESSAGE + 1];
2068 unsigned char *bufend;
2069 int buflen, dns_resp;
2070 int max_answer_records;
2071 unsigned short query_id;
2072 struct eb32_node *eb;
2073 struct resolv_requester *req;
Emeric Brun43839d02021-06-10 15:25:25 +02002074 int keep_answer_items;
Emeric Brunc9437992021-02-12 19:42:55 +01002075
2076 resolvers = ns->parent;
2077 HA_SPIN_LOCK(DNS_LOCK, &resolvers->lock);
2078
2079 /* process all pending input messages */
2080 while (1) {
2081 /* read message received */
2082 memset(buf, '\0', resolvers->accepted_payload_size + 1);
2083 if ((buflen = dns_recv_nameserver(ns, (void *)buf, sizeof(buf))) <= 0) {
2084 break;
2085 }
2086
2087 /* message too big */
2088 if (buflen > resolvers->accepted_payload_size) {
2089 ns->counters->too_big++;
2090 continue;
2091 }
2092
2093 /* initializing variables */
2094 bufend = buf + buflen; /* pointer to mark the end of the buffer */
2095
2096 /* read the query id from the packet (16 bits) */
2097 if (buf + 2 > bufend) {
2098 ns->counters->invalid++;
2099 continue;
2100 }
2101 query_id = resolv_response_get_query_id(buf);
2102
2103 /* search the query_id in the pending resolution tree */
2104 eb = eb32_lookup(&resolvers->query_ids, query_id);
2105 if (eb == NULL) {
2106 /* unknown query id means an outdated response and can be safely ignored */
2107 ns->counters->outdated++;
2108 continue;
2109 }
2110
2111 /* known query id means a resolution in progress */
2112 res = eb32_entry(eb, struct resolv_resolution, qid);
2113 /* number of responses received */
2114 res->nb_responses++;
2115
2116 max_answer_records = (resolvers->accepted_payload_size - DNS_HEADER_SIZE) / DNS_MIN_RECORD_SIZE;
2117 dns_resp = resolv_validate_dns_response(buf, bufend, res, max_answer_records);
2118
2119 switch (dns_resp) {
2120 case RSLV_RESP_VALID:
2121 break;
2122
2123 case RSLV_RESP_INVALID:
2124 case RSLV_RESP_QUERY_COUNT_ERROR:
2125 case RSLV_RESP_WRONG_NAME:
2126 res->status = RSLV_STATUS_INVALID;
2127 ns->counters->invalid++;
2128 break;
2129
2130 case RSLV_RESP_NX_DOMAIN:
2131 res->status = RSLV_STATUS_NX;
2132 ns->counters->nx++;
2133 break;
2134
2135 case RSLV_RESP_REFUSED:
2136 res->status = RSLV_STATUS_REFUSED;
2137 ns->counters->refused++;
2138 break;
2139
2140 case RSLV_RESP_ANCOUNT_ZERO:
2141 res->status = RSLV_STATUS_OTHER;
2142 ns->counters->any_err++;
2143 break;
2144
2145 case RSLV_RESP_CNAME_ERROR:
2146 res->status = RSLV_STATUS_OTHER;
2147 ns->counters->cname_error++;
2148 break;
2149
2150 case RSLV_RESP_TRUNCATED:
2151 res->status = RSLV_STATUS_OTHER;
2152 ns->counters->truncated++;
2153 break;
2154
2155 case RSLV_RESP_NO_EXPECTED_RECORD:
2156 case RSLV_RESP_ERROR:
2157 case RSLV_RESP_INTERNAL:
2158 res->status = RSLV_STATUS_OTHER;
2159 ns->counters->other++;
2160 break;
2161 }
2162
2163 /* Wait all nameservers response to handle errors */
2164 if (dns_resp != RSLV_RESP_VALID && res->nb_responses < res->nb_queries)
2165 continue;
2166
2167 /* Process error codes */
2168 if (dns_resp != RSLV_RESP_VALID) {
2169 if (res->prefered_query_type != res->query_type) {
2170 /* The fallback on the query type was already performed,
2171 * so check the try counter. If it falls to 0, we can
2172 * report an error. Else, wait the next attempt. */
2173 if (!res->try)
2174 goto report_res_error;
2175 }
2176 else {
2177 /* Fallback from A to AAAA or the opposite and re-send
2178 * the resolution immediately. try counter is not
2179 * decremented. */
2180 if (res->prefered_query_type == DNS_RTYPE_A) {
2181 res->query_type = DNS_RTYPE_AAAA;
2182 resolv_send_query(res);
2183 }
2184 else if (res->prefered_query_type == DNS_RTYPE_AAAA) {
2185 res->query_type = DNS_RTYPE_A;
2186 resolv_send_query(res);
2187 }
2188 }
2189 continue;
2190 }
2191
2192 /* Now let's check the query's dname corresponds to the one we
2193 * sent. We can check only the first query of the list. We send
Willy Tarreau51128f82021-10-19 11:17:33 +02002194 * one query at a time so we get one query in the response.
2195 */
2196 if (!LIST_ISEMPTY(&res->response.query_list)) {
2197 query = LIST_NEXT(&res->response.query_list, struct resolv_query_item *, list);
2198 LIST_DEL_INIT(&query->list);
2199 if (resolv_hostname_cmp(query->name, res->hostname_dn, res->hostname_dn_len) != 0) {
2200 dns_resp = RSLV_RESP_WRONG_NAME;
2201 ns->counters->other++;
2202 goto report_res_error;
2203 }
Emeric Brunc9437992021-02-12 19:42:55 +01002204 }
2205
2206 /* So the resolution succeeded */
2207 res->status = RSLV_STATUS_VALID;
2208 res->last_valid = now_ms;
2209 ns->counters->valid++;
2210 goto report_res_success;
2211
2212 report_res_error:
Emeric Brun43839d02021-06-10 15:25:25 +02002213 keep_answer_items = 0;
Emeric Brunc9437992021-02-12 19:42:55 +01002214 list_for_each_entry(req, &res->requesters, list)
Emeric Brun43839d02021-06-10 15:25:25 +02002215 keep_answer_items |= req->requester_error_cb(req, dns_resp);
2216 if (!keep_answer_items)
2217 resolv_purge_resolution_answer_records(res);
Emeric Brunc9437992021-02-12 19:42:55 +01002218 resolv_reset_resolution(res);
Willy Tarreau2b718102021-04-21 07:32:39 +02002219 LIST_DELETE(&res->list);
2220 LIST_APPEND(&resolvers->resolutions.wait, &res->list);
Emeric Brunc9437992021-02-12 19:42:55 +01002221 continue;
2222
2223 report_res_success:
2224 /* Only the 1rst requester s managed by the server, others are
2225 * from the cache */
2226 tmpcounters = ns->counters;
2227 list_for_each_entry(req, &res->requesters, list) {
2228 struct server *s = objt_server(req->owner);
2229
2230 if (s)
2231 HA_SPIN_LOCK(SERVER_LOCK, &s->lock);
2232 req->requester_cb(req, tmpcounters);
2233 if (s)
2234 HA_SPIN_UNLOCK(SERVER_LOCK, &s->lock);
2235 tmpcounters = NULL;
2236 }
2237
2238 resolv_reset_resolution(res);
Willy Tarreau2b718102021-04-21 07:32:39 +02002239 LIST_DELETE(&res->list);
2240 LIST_APPEND(&resolvers->resolutions.wait, &res->list);
Emeric Brunc9437992021-02-12 19:42:55 +01002241 continue;
2242 }
2243 resolv_update_resolvers_timeout(resolvers);
2244 HA_SPIN_UNLOCK(DNS_LOCK, &resolvers->lock);
2245
2246 return buflen;
2247}
2248
2249/* Processes DNS resolution. First, it checks the active list to detect expired
2250 * resolutions and retry them if possible. Else a timeout is reported. Then, it
2251 * checks the wait list to trigger new resolutions.
2252 */
Willy Tarreau144f84a2021-03-02 16:09:26 +01002253static struct task *process_resolvers(struct task *t, void *context, unsigned int state)
Emeric Brunc9437992021-02-12 19:42:55 +01002254{
2255 struct resolvers *resolvers = context;
2256 struct resolv_resolution *res, *resback;
2257 int exp;
2258
2259 HA_SPIN_LOCK(DNS_LOCK, &resolvers->lock);
2260
2261 /* Handle all expired resolutions from the active list */
2262 list_for_each_entry_safe(res, resback, &resolvers->resolutions.curr, list) {
Christopher Faulet0efc0992021-03-11 18:09:53 +01002263 if (LIST_ISEMPTY(&res->requesters)) {
2264 resolv_free_resolution(res);
2265 continue;
2266 }
2267
Emeric Brunc9437992021-02-12 19:42:55 +01002268 /* When we find the first resolution in the future, then we can
2269 * stop here */
2270 exp = tick_add(res->last_query, resolvers->timeout.retry);
2271 if (!tick_is_expired(exp, now_ms))
2272 break;
2273
2274 /* If current resolution has been tried too many times and
2275 * finishes in timeout we update its status and remove it from
2276 * the list */
2277 if (!res->try) {
2278 struct resolv_requester *req;
Emeric Brun43839d02021-06-10 15:25:25 +02002279 int keep_answer_items = 0;
Emeric Brunc9437992021-02-12 19:42:55 +01002280
2281 /* Notify the result to the requesters */
2282 if (!res->nb_responses)
2283 res->status = RSLV_STATUS_TIMEOUT;
2284 list_for_each_entry(req, &res->requesters, list)
Emeric Brun43839d02021-06-10 15:25:25 +02002285 keep_answer_items |= req->requester_error_cb(req, res->status);
2286 if (!keep_answer_items)
2287 resolv_purge_resolution_answer_records(res);
Emeric Brunc9437992021-02-12 19:42:55 +01002288
2289 /* Clean up resolution info and remove it from the
2290 * current list */
2291 resolv_reset_resolution(res);
Willy Tarreau2b718102021-04-21 07:32:39 +02002292 LIST_DELETE(&res->list);
2293 LIST_APPEND(&resolvers->resolutions.wait, &res->list);
Emeric Brunc9437992021-02-12 19:42:55 +01002294 }
2295 else {
2296 /* Otherwise resend the DNS query and requeue the resolution */
2297 if (!res->nb_responses || res->prefered_query_type != res->query_type) {
2298 /* No response received (a real timeout) or fallback already done */
2299 res->query_type = res->prefered_query_type;
2300 res->try--;
2301 }
2302 else {
2303 /* Fallback from A to AAAA or the opposite and re-send
2304 * the resolution immediately. try counter is not
2305 * decremented. */
2306 if (res->prefered_query_type == DNS_RTYPE_A)
2307 res->query_type = DNS_RTYPE_AAAA;
2308 else if (res->prefered_query_type == DNS_RTYPE_AAAA)
2309 res->query_type = DNS_RTYPE_A;
2310 else
2311 res->try--;
2312 }
2313 resolv_send_query(res);
2314 }
2315 }
2316
2317 /* Handle all resolutions in the wait list */
2318 list_for_each_entry_safe(res, resback, &resolvers->resolutions.wait, list) {
Christopher Faulet0efc0992021-03-11 18:09:53 +01002319 if (LIST_ISEMPTY(&res->requesters)) {
2320 resolv_free_resolution(res);
2321 continue;
2322 }
2323
Emeric Brunc9437992021-02-12 19:42:55 +01002324 exp = tick_add(res->last_resolution, resolv_resolution_timeout(res));
2325 if (tick_isset(res->last_resolution) && !tick_is_expired(exp, now_ms))
2326 continue;
2327
2328 if (resolv_run_resolution(res) != 1) {
2329 res->last_resolution = now_ms;
Willy Tarreau2b718102021-04-21 07:32:39 +02002330 LIST_DELETE(&res->list);
2331 LIST_APPEND(&resolvers->resolutions.wait, &res->list);
Emeric Brunc9437992021-02-12 19:42:55 +01002332 }
2333 }
2334
2335 resolv_update_resolvers_timeout(resolvers);
2336 HA_SPIN_UNLOCK(DNS_LOCK, &resolvers->lock);
2337 return t;
2338}
2339
2340/* Release memory allocated by DNS */
2341static void resolvers_deinit(void)
2342{
2343 struct resolvers *resolvers, *resolversback;
2344 struct dns_nameserver *ns, *nsback;
2345 struct resolv_resolution *res, *resback;
2346 struct resolv_requester *req, *reqback;
2347 struct resolv_srvrq *srvrq, *srvrqback;
2348
2349 list_for_each_entry_safe(resolvers, resolversback, &sec_resolvers, list) {
2350 list_for_each_entry_safe(ns, nsback, &resolvers->nameservers, list) {
2351 free(ns->id);
2352 free((char *)ns->conf.file);
2353 if (ns->dgram) {
2354 if (ns->dgram->conn.t.sock.fd != -1) {
2355 fd_delete(ns->dgram->conn.t.sock.fd);
2356 close(ns->dgram->conn.t.sock.fd);
2357 }
2358 if (ns->dgram->ring_req)
2359 ring_free(ns->dgram->ring_req);
2360 free(ns->dgram);
2361 }
Emeric Brun56fc5d92021-02-12 20:05:45 +01002362 if (ns->stream) {
2363 if (ns->stream->ring_req)
2364 ring_free(ns->stream->ring_req);
2365 if (ns->stream->task_req)
2366 task_destroy(ns->stream->task_req);
2367 if (ns->stream->task_rsp)
2368 task_destroy(ns->stream->task_rsp);
2369 free(ns->stream);
2370 }
Willy Tarreau2b718102021-04-21 07:32:39 +02002371 LIST_DELETE(&ns->list);
Emeric Brunc9437992021-02-12 19:42:55 +01002372 EXTRA_COUNTERS_FREE(ns->extra_counters);
2373 free(ns);
2374 }
2375
2376 list_for_each_entry_safe(res, resback, &resolvers->resolutions.curr, list) {
2377 list_for_each_entry_safe(req, reqback, &res->requesters, list) {
Willy Tarreau2b718102021-04-21 07:32:39 +02002378 LIST_DELETE(&req->list);
Emeric Brunc9437992021-02-12 19:42:55 +01002379 pool_free(resolv_requester_pool, req);
2380 }
2381 resolv_free_resolution(res);
2382 }
2383
2384 list_for_each_entry_safe(res, resback, &resolvers->resolutions.wait, list) {
2385 list_for_each_entry_safe(req, reqback, &res->requesters, list) {
Willy Tarreau2b718102021-04-21 07:32:39 +02002386 LIST_DELETE(&req->list);
Emeric Brunc9437992021-02-12 19:42:55 +01002387 pool_free(resolv_requester_pool, req);
2388 }
2389 resolv_free_resolution(res);
2390 }
2391
2392 free(resolvers->id);
2393 free((char *)resolvers->conf.file);
2394 task_destroy(resolvers->t);
Willy Tarreau2b718102021-04-21 07:32:39 +02002395 LIST_DELETE(&resolvers->list);
Emeric Brunc9437992021-02-12 19:42:55 +01002396 free(resolvers);
2397 }
2398
2399 list_for_each_entry_safe(srvrq, srvrqback, &resolv_srvrq_list, list) {
2400 free(srvrq->name);
2401 free(srvrq->hostname_dn);
Willy Tarreau2b718102021-04-21 07:32:39 +02002402 LIST_DELETE(&srvrq->list);
Emeric Brunc9437992021-02-12 19:42:55 +01002403 free(srvrq);
2404 }
2405}
2406
2407/* Finalizes the DNS configuration by allocating required resources and checking
2408 * live parameters.
2409 * Returns 0 on success, ERR_* flags otherwise.
2410 */
2411static int resolvers_finalize_config(void)
2412{
2413 struct resolvers *resolvers;
2414 struct proxy *px;
2415 int err_code = 0;
2416
2417 /* allocate pool of resolution per resolvers */
2418 list_for_each_entry(resolvers, &sec_resolvers, list) {
2419 struct dns_nameserver *ns;
2420 struct task *t;
2421
2422 /* Check if we can create the socket with nameservers info */
2423 list_for_each_entry(ns, &resolvers->nameservers, list) {
2424 int fd;
2425
2426 if (ns->dgram) {
2427 /* Check nameserver info */
2428 if ((fd = socket(ns->dgram->conn.addr.to.ss_family, SOCK_DGRAM, IPPROTO_UDP)) == -1) {
2429 ha_alert("config : resolvers '%s': can't create socket for nameserver '%s'.\n",
2430 resolvers->id, ns->id);
2431 err_code |= (ERR_ALERT|ERR_ABORT);
2432 continue;
2433 }
2434 if (connect(fd, (struct sockaddr*)&ns->dgram->conn.addr.to, get_addr_len(&ns->dgram->conn.addr.to)) == -1) {
2435 ha_alert("config : resolvers '%s': can't connect socket for nameserver '%s'.\n",
2436 resolvers->id, ns->id);
2437 close(fd);
2438 err_code |= (ERR_ALERT|ERR_ABORT);
2439 continue;
2440 }
2441 close(fd);
2442 }
2443 }
2444
2445 /* Create the task associated to the resolvers section */
2446 if ((t = task_new(MAX_THREADS_MASK)) == NULL) {
2447 ha_alert("config : resolvers '%s' : out of memory.\n", resolvers->id);
2448 err_code |= (ERR_ALERT|ERR_ABORT);
2449 goto err;
2450 }
2451
2452 /* Update task's parameters */
2453 t->process = process_resolvers;
2454 t->context = resolvers;
2455 resolvers->t = t;
2456 task_wakeup(t, TASK_WOKEN_INIT);
2457 }
2458
2459 for (px = proxies_list; px; px = px->next) {
2460 struct server *srv;
2461
2462 for (srv = px->srv; srv; srv = srv->next) {
2463 struct resolvers *resolvers;
2464
2465 if (!srv->resolvers_id)
2466 continue;
2467
2468 if ((resolvers = find_resolvers_by_id(srv->resolvers_id)) == NULL) {
2469 ha_alert("config : %s '%s', server '%s': unable to find required resolvers '%s'\n",
2470 proxy_type_str(px), px->id, srv->id, srv->resolvers_id);
2471 err_code |= (ERR_ALERT|ERR_ABORT);
2472 continue;
2473 }
2474 srv->resolvers = resolvers;
Christopher Faulet2c0f5272021-06-15 16:17:17 +02002475 srv->srvrq_check = NULL;
2476 if (srv->srvrq) {
2477 if (!srv->srvrq->resolvers) {
2478 srv->srvrq->resolvers = srv->resolvers;
2479 if (resolv_link_resolution(srv->srvrq, OBJ_TYPE_SRVRQ, 0) == -1) {
2480 ha_alert("config : %s '%s' : unable to set DNS resolution for server '%s'.\n",
2481 proxy_type_str(px), px->id, srv->id);
2482 err_code |= (ERR_ALERT|ERR_ABORT);
2483 continue;
2484 }
2485 }
Emeric Brunc9437992021-02-12 19:42:55 +01002486
Christopher Faulet2c0f5272021-06-15 16:17:17 +02002487 srv->srvrq_check = task_new(MAX_THREADS_MASK);
2488 if (!srv->srvrq_check) {
2489 ha_alert("config: %s '%s' : unable to create SRVRQ task for server '%s'.\n",
Emeric Brunc9437992021-02-12 19:42:55 +01002490 proxy_type_str(px), px->id, srv->id);
2491 err_code |= (ERR_ALERT|ERR_ABORT);
Christopher Faulet2c0f5272021-06-15 16:17:17 +02002492 goto err;
Emeric Brunc9437992021-02-12 19:42:55 +01002493 }
Christopher Faulet2c0f5272021-06-15 16:17:17 +02002494 srv->srvrq_check->process = resolv_srvrq_expire_task;
2495 srv->srvrq_check->context = srv;
2496 srv->srvrq_check->expire = TICK_ETERNITY;
Emeric Brunc9437992021-02-12 19:42:55 +01002497 }
Christopher Faulet2c0f5272021-06-15 16:17:17 +02002498 else if (resolv_link_resolution(srv, OBJ_TYPE_SERVER, 0) == -1) {
Emeric Brunc9437992021-02-12 19:42:55 +01002499 ha_alert("config : %s '%s', unable to set DNS resolution for server '%s'.\n",
2500 proxy_type_str(px), px->id, srv->id);
2501 err_code |= (ERR_ALERT|ERR_ABORT);
2502 continue;
2503 }
2504 }
2505 }
2506
2507 if (err_code & (ERR_ALERT|ERR_ABORT))
2508 goto err;
2509
2510 return err_code;
2511 err:
2512 resolvers_deinit();
2513 return err_code;
2514
2515}
2516
2517static int stats_dump_resolv_to_buffer(struct stream_interface *si,
2518 struct dns_nameserver *ns,
2519 struct field *stats, size_t stats_count,
2520 struct list *stat_modules)
2521{
2522 struct appctx *appctx = __objt_appctx(si->end);
2523 struct channel *rep = si_ic(si);
2524 struct stats_module *mod;
2525 size_t idx = 0;
2526
2527 memset(stats, 0, sizeof(struct field) * stats_count);
2528
2529 list_for_each_entry(mod, stat_modules, list) {
2530 struct counters_node *counters = EXTRA_COUNTERS_GET(ns->extra_counters, mod);
2531
2532 mod->fill_stats(counters, stats + idx);
2533 idx += mod->stats_count;
2534 }
2535
2536 if (!stats_dump_one_line(stats, idx, appctx))
2537 return 0;
2538
2539 if (!stats_putchk(rep, NULL, &trash))
2540 goto full;
2541
2542 return 1;
2543
2544 full:
2545 si_rx_room_rdy(si);
2546 return 0;
2547}
2548
2549/* Uses <appctx.ctx.stats.obj1> as a pointer to the current resolver and <obj2>
2550 * as a pointer to the current nameserver.
2551 */
2552int stats_dump_resolvers(struct stream_interface *si,
2553 struct field *stats, size_t stats_count,
2554 struct list *stat_modules)
2555{
2556 struct appctx *appctx = __objt_appctx(si->end);
2557 struct channel *rep = si_ic(si);
2558 struct resolvers *resolver = appctx->ctx.stats.obj1;
2559 struct dns_nameserver *ns = appctx->ctx.stats.obj2;
2560
2561 if (!resolver)
2562 resolver = LIST_NEXT(&sec_resolvers, struct resolvers *, list);
2563
2564 /* dump resolvers */
2565 list_for_each_entry_from(resolver, &sec_resolvers, list) {
2566 appctx->ctx.stats.obj1 = resolver;
2567
2568 ns = appctx->ctx.stats.obj2 ?
2569 appctx->ctx.stats.obj2 :
2570 LIST_NEXT(&resolver->nameservers, struct dns_nameserver *, list);
2571
2572 list_for_each_entry_from(ns, &resolver->nameservers, list) {
2573 appctx->ctx.stats.obj2 = ns;
2574
2575 if (buffer_almost_full(&rep->buf))
2576 goto full;
2577
2578 if (!stats_dump_resolv_to_buffer(si, ns,
2579 stats, stats_count,
2580 stat_modules)) {
2581 return 0;
2582 }
2583 }
2584
2585 appctx->ctx.stats.obj2 = NULL;
2586 }
2587
2588 return 1;
2589
2590 full:
2591 si_rx_room_blk(si);
2592 return 0;
2593}
2594
2595void resolv_stats_clear_counters(int clrall, struct list *stat_modules)
2596{
2597 struct resolvers *resolvers;
2598 struct dns_nameserver *ns;
2599 struct stats_module *mod;
2600 void *counters;
2601
2602 list_for_each_entry(mod, stat_modules, list) {
2603 if (!mod->clearable && !clrall)
2604 continue;
2605
2606 list_for_each_entry(resolvers, &sec_resolvers, list) {
2607 list_for_each_entry(ns, &resolvers->nameservers, list) {
2608 counters = EXTRA_COUNTERS_GET(ns->extra_counters, mod);
2609 memcpy(counters, mod->counters, mod->counters_size);
2610 }
2611 }
2612 }
2613
2614}
2615
2616int resolv_allocate_counters(struct list *stat_modules)
2617{
2618 struct stats_module *mod;
2619 struct resolvers *resolvers;
2620 struct dns_nameserver *ns;
2621
2622 list_for_each_entry(resolvers, &sec_resolvers, list) {
2623 list_for_each_entry(ns, &resolvers->nameservers, list) {
2624 EXTRA_COUNTERS_REGISTER(&ns->extra_counters, COUNTERS_DNS,
2625 alloc_failed);
2626
2627 list_for_each_entry(mod, stat_modules, list) {
2628 EXTRA_COUNTERS_ADD(mod,
2629 ns->extra_counters,
2630 mod->counters,
2631 mod->counters_size);
2632 }
2633
2634 EXTRA_COUNTERS_ALLOC(ns->extra_counters, alloc_failed);
2635
2636 list_for_each_entry(mod, stat_modules, list) {
2637 memcpy(ns->extra_counters->data + mod->counters_off[ns->extra_counters->type],
2638 mod->counters, mod->counters_size);
2639
2640 /* Store the ns counters pointer */
2641 if (strcmp(mod->name, "dns") == 0) {
2642 ns->counters = (struct dns_counters *)ns->extra_counters->data + mod->counters_off[COUNTERS_DNS];
2643 ns->counters->id = ns->id;
2644 ns->counters->pid = resolvers->id;
2645 }
2646 }
2647 }
2648 }
2649
2650 return 1;
2651
2652alloc_failed:
2653 return 0;
2654}
2655
2656/* if an arg is found, it sets the resolvers section pointer into cli.p0 */
2657static int cli_parse_stat_resolvers(char **args, char *payload, struct appctx *appctx, void *private)
2658{
2659 struct resolvers *presolvers;
2660
2661 if (*args[2]) {
2662 list_for_each_entry(presolvers, &sec_resolvers, list) {
2663 if (strcmp(presolvers->id, args[2]) == 0) {
2664 appctx->ctx.cli.p0 = presolvers;
2665 break;
2666 }
2667 }
2668 if (appctx->ctx.cli.p0 == NULL)
2669 return cli_err(appctx, "Can't find that resolvers section\n");
2670 }
2671 return 0;
2672}
2673
2674/* Dumps counters from all resolvers section and associated name servers. It
2675 * returns 0 if the output buffer is full and it needs to be called again,
2676 * otherwise non-zero. It may limit itself to the resolver pointed to by
2677 * <cli.p0> if it's not null.
2678 */
2679static int cli_io_handler_dump_resolvers_to_buffer(struct appctx *appctx)
2680{
2681 struct stream_interface *si = appctx->owner;
2682 struct resolvers *resolvers;
2683 struct dns_nameserver *ns;
2684
2685 chunk_reset(&trash);
2686
2687 switch (appctx->st2) {
2688 case STAT_ST_INIT:
2689 appctx->st2 = STAT_ST_LIST; /* let's start producing data */
2690 /* fall through */
2691
2692 case STAT_ST_LIST:
2693 if (LIST_ISEMPTY(&sec_resolvers)) {
2694 chunk_appendf(&trash, "No resolvers found\n");
2695 }
2696 else {
2697 list_for_each_entry(resolvers, &sec_resolvers, list) {
2698 if (appctx->ctx.cli.p0 != NULL && appctx->ctx.cli.p0 != resolvers)
2699 continue;
2700
2701 chunk_appendf(&trash, "Resolvers section %s\n", resolvers->id);
2702 list_for_each_entry(ns, &resolvers->nameservers, list) {
2703 chunk_appendf(&trash, " nameserver %s:\n", ns->id);
2704 chunk_appendf(&trash, " sent: %lld\n", ns->counters->sent);
2705 chunk_appendf(&trash, " snd_error: %lld\n", ns->counters->snd_error);
2706 chunk_appendf(&trash, " valid: %lld\n", ns->counters->valid);
2707 chunk_appendf(&trash, " update: %lld\n", ns->counters->update);
2708 chunk_appendf(&trash, " cname: %lld\n", ns->counters->cname);
2709 chunk_appendf(&trash, " cname_error: %lld\n", ns->counters->cname_error);
2710 chunk_appendf(&trash, " any_err: %lld\n", ns->counters->any_err);
2711 chunk_appendf(&trash, " nx: %lld\n", ns->counters->nx);
2712 chunk_appendf(&trash, " timeout: %lld\n", ns->counters->timeout);
2713 chunk_appendf(&trash, " refused: %lld\n", ns->counters->refused);
2714 chunk_appendf(&trash, " other: %lld\n", ns->counters->other);
2715 chunk_appendf(&trash, " invalid: %lld\n", ns->counters->invalid);
2716 chunk_appendf(&trash, " too_big: %lld\n", ns->counters->too_big);
2717 chunk_appendf(&trash, " truncated: %lld\n", ns->counters->truncated);
2718 chunk_appendf(&trash, " outdated: %lld\n", ns->counters->outdated);
2719 }
2720 chunk_appendf(&trash, "\n");
2721 }
2722 }
2723
2724 /* display response */
2725 if (ci_putchk(si_ic(si), &trash) == -1) {
2726 /* let's try again later from this session. We add ourselves into
2727 * this session's users so that it can remove us upon termination.
2728 */
2729 si_rx_room_blk(si);
2730 return 0;
2731 }
2732 /* fall through */
2733
2734 default:
2735 appctx->st2 = STAT_ST_FIN;
2736 return 1;
2737 }
2738}
2739
2740/* register cli keywords */
2741static struct cli_kw_list cli_kws = {{ }, {
Willy Tarreaub205bfd2021-05-07 11:38:37 +02002742 { { "show", "resolvers", NULL }, "show resolvers [id] : dumps counters from all resolvers section and associated name servers",
Emeric Brunc9437992021-02-12 19:42:55 +01002743 cli_parse_stat_resolvers, cli_io_handler_dump_resolvers_to_buffer },
2744 {{},}
2745 }
2746};
2747
2748INITCALL1(STG_REGISTER, cli_register_kw, &cli_kws);
2749
2750/*
2751 * Prepare <rule> for hostname resolution.
2752 * Returns -1 in case of any allocation failure, 0 if not.
2753 * On error, a global failure counter is also incremented.
2754 */
Willy Tarreaua13a6102021-10-14 08:11:48 +02002755static int action_prepare_for_resolution(struct stream *stream, const char *hostname, int hostname_len)
Emeric Brunc9437992021-02-12 19:42:55 +01002756{
2757 char *hostname_dn;
Willy Tarreaua13a6102021-10-14 08:11:48 +02002758 int hostname_dn_len;
Emeric Brunc9437992021-02-12 19:42:55 +01002759 struct buffer *tmp = get_trash_chunk();
2760
2761 if (!hostname)
2762 return 0;
2763
Emeric Brunc9437992021-02-12 19:42:55 +01002764 hostname_dn = tmp->area;
Willy Tarreauc1c765f2021-10-14 07:49:49 +02002765 hostname_dn_len = resolv_str_to_dn_label(hostname, hostname_len,
Emeric Brunc9437992021-02-12 19:42:55 +01002766 hostname_dn, tmp->size);
2767 if (hostname_dn_len == -1)
2768 goto err;
2769
2770
2771 stream->resolv_ctx.hostname_dn = strdup(hostname_dn);
2772 stream->resolv_ctx.hostname_dn_len = hostname_dn_len;
2773 if (!stream->resolv_ctx.hostname_dn)
2774 goto err;
2775
2776 return 0;
2777
2778 err:
Willy Tarreau61cfdf42021-02-20 10:46:51 +01002779 ha_free(&stream->resolv_ctx.hostname_dn);
Emeric Brunc9437992021-02-12 19:42:55 +01002780 resolv_failed_resolutions += 1;
2781 return -1;
2782}
2783
2784
2785/*
2786 * Execute the "do-resolution" action. May be called from {tcp,http}request.
2787 */
2788enum act_return resolv_action_do_resolve(struct act_rule *rule, struct proxy *px,
2789 struct session *sess, struct stream *s, int flags)
2790{
2791 struct resolv_resolution *resolution;
2792 struct sample *smp;
Emeric Brunc9437992021-02-12 19:42:55 +01002793 struct resolv_requester *req;
2794 struct resolvers *resolvers;
2795 struct resolv_resolution *res;
2796 int exp, locked = 0;
2797 enum act_return ret = ACT_RET_CONT;
2798
2799 resolvers = rule->arg.resolv.resolvers;
2800
2801 /* we have a response to our DNS resolution */
2802 use_cache:
2803 if (s->resolv_ctx.requester && s->resolv_ctx.requester->resolution != NULL) {
2804 resolution = s->resolv_ctx.requester->resolution;
2805 if (!locked) {
2806 HA_SPIN_LOCK(DNS_LOCK, &resolvers->lock);
2807 locked = 1;
2808 }
2809
2810 if (resolution->step == RSLV_STEP_RUNNING)
2811 goto yield;
2812 if (resolution->step == RSLV_STEP_NONE) {
2813 /* We update the variable only if we have a valid response. */
2814 if (resolution->status == RSLV_STATUS_VALID) {
2815 struct sample smp;
2816 short ip_sin_family = 0;
2817 void *ip = NULL;
2818
2819 resolv_get_ip_from_response(&resolution->response, rule->arg.resolv.opts, NULL,
2820 0, &ip, &ip_sin_family, NULL);
2821
2822 switch (ip_sin_family) {
2823 case AF_INET:
2824 smp.data.type = SMP_T_IPV4;
2825 memcpy(&smp.data.u.ipv4, ip, 4);
2826 break;
2827 case AF_INET6:
2828 smp.data.type = SMP_T_IPV6;
2829 memcpy(&smp.data.u.ipv6, ip, 16);
2830 break;
2831 default:
2832 ip = NULL;
2833 }
2834
2835 if (ip) {
2836 smp.px = px;
2837 smp.sess = sess;
2838 smp.strm = s;
2839
2840 vars_set_by_name(rule->arg.resolv.varname, strlen(rule->arg.resolv.varname), &smp);
2841 }
2842 }
2843 }
2844
2845 goto release_requester;
2846 }
2847
2848 /* need to configure and start a new DNS resolution */
2849 smp = sample_fetch_as_type(px, sess, s, SMP_OPT_DIR_REQ|SMP_OPT_FINAL, rule->arg.resolv.expr, SMP_T_STR);
2850 if (smp == NULL)
2851 goto end;
2852
Willy Tarreaua13a6102021-10-14 08:11:48 +02002853 if (action_prepare_for_resolution(s, smp->data.u.str.area, smp->data.u.str.data) == -1)
Emeric Brunc9437992021-02-12 19:42:55 +01002854 goto end; /* on error, ignore the action */
2855
2856 s->resolv_ctx.parent = rule;
2857
2858 HA_SPIN_LOCK(DNS_LOCK, &resolvers->lock);
2859 locked = 1;
2860
2861 resolv_link_resolution(s, OBJ_TYPE_STREAM, 0);
2862
2863 /* Check if there is a fresh enough response in the cache of our associated resolution */
2864 req = s->resolv_ctx.requester;
2865 if (!req || !req->resolution)
2866 goto release_requester; /* on error, ignore the action */
2867 res = req->resolution;
2868
2869 exp = tick_add(res->last_resolution, resolvers->hold.valid);
2870 if (resolvers->t && res->status == RSLV_STATUS_VALID && tick_isset(res->last_resolution)
2871 && !tick_is_expired(exp, now_ms)) {
2872 goto use_cache;
2873 }
2874
2875 resolv_trigger_resolution(s->resolv_ctx.requester);
2876
2877 yield:
2878 if (flags & ACT_OPT_FINAL)
2879 goto release_requester;
2880 ret = ACT_RET_YIELD;
2881
2882 end:
2883 if (locked)
2884 HA_SPIN_UNLOCK(DNS_LOCK, &resolvers->lock);
2885 return ret;
2886
2887 release_requester:
Willy Tarreau61cfdf42021-02-20 10:46:51 +01002888 ha_free(&s->resolv_ctx.hostname_dn);
Emeric Brunc9437992021-02-12 19:42:55 +01002889 s->resolv_ctx.hostname_dn_len = 0;
2890 if (s->resolv_ctx.requester) {
Christopher Faulet0efc0992021-03-11 18:09:53 +01002891 resolv_unlink_resolution(s->resolv_ctx.requester, 0);
Emeric Brunc9437992021-02-12 19:42:55 +01002892 pool_free(resolv_requester_pool, s->resolv_ctx.requester);
2893 s->resolv_ctx.requester = NULL;
2894 }
2895 goto end;
2896}
2897
2898static void release_resolv_action(struct act_rule *rule)
2899{
2900 release_sample_expr(rule->arg.resolv.expr);
2901 free(rule->arg.resolv.varname);
2902 free(rule->arg.resolv.resolvers_id);
2903 free(rule->arg.resolv.opts);
2904}
2905
2906
2907/* parse "do-resolve" action
2908 * This action takes the following arguments:
2909 * do-resolve(<varName>,<resolversSectionName>,<resolvePrefer>) <expr>
2910 *
2911 * - <varName> is the variable name where the result of the DNS resolution will be stored
2912 * (mandatory)
2913 * - <resolversSectionName> is the name of the resolvers section to use to perform the resolution
2914 * (mandatory)
2915 * - <resolvePrefer> can be either 'ipv4' or 'ipv6' and is the IP family we would like to resolve first
2916 * (optional), defaults to ipv6
2917 * - <expr> is an HAProxy expression used to fetch the name to be resolved
2918 */
2919enum act_parse_ret resolv_parse_do_resolve(const char **args, int *orig_arg, struct proxy *px, struct act_rule *rule, char **err)
2920{
2921 int cur_arg;
2922 struct sample_expr *expr;
2923 unsigned int where;
2924 const char *beg, *end;
2925
2926 /* orig_arg points to the first argument, but we need to analyse the command itself first */
2927 cur_arg = *orig_arg - 1;
2928
2929 /* locate varName, which is mandatory */
2930 beg = strchr(args[cur_arg], '(');
2931 if (beg == NULL)
2932 goto do_resolve_parse_error;
2933 beg = beg + 1; /* beg should points to the first character after opening parenthesis '(' */
2934 end = strchr(beg, ',');
2935 if (end == NULL)
2936 goto do_resolve_parse_error;
2937 rule->arg.resolv.varname = my_strndup(beg, end - beg);
2938 if (rule->arg.resolv.varname == NULL)
2939 goto do_resolve_parse_error;
2940
2941
2942 /* locate resolversSectionName, which is mandatory.
2943 * Since next parameters are optional, the delimiter may be comma ','
2944 * or closing parenthesis ')'
2945 */
2946 beg = end + 1;
2947 end = strchr(beg, ',');
2948 if (end == NULL)
2949 end = strchr(beg, ')');
2950 if (end == NULL)
2951 goto do_resolve_parse_error;
2952 rule->arg.resolv.resolvers_id = my_strndup(beg, end - beg);
2953 if (rule->arg.resolv.resolvers_id == NULL)
2954 goto do_resolve_parse_error;
2955
2956
2957 rule->arg.resolv.opts = calloc(1, sizeof(*rule->arg.resolv.opts));
2958 if (rule->arg.resolv.opts == NULL)
2959 goto do_resolve_parse_error;
2960
2961 /* Default priority is ipv6 */
2962 rule->arg.resolv.opts->family_prio = AF_INET6;
2963
2964 /* optional arguments accepted for now:
2965 * ipv4 or ipv6
2966 */
2967 while (*end != ')') {
2968 beg = end + 1;
2969 end = strchr(beg, ',');
2970 if (end == NULL)
2971 end = strchr(beg, ')');
2972 if (end == NULL)
2973 goto do_resolve_parse_error;
2974
2975 if (strncmp(beg, "ipv4", end - beg) == 0) {
2976 rule->arg.resolv.opts->family_prio = AF_INET;
2977 }
2978 else if (strncmp(beg, "ipv6", end - beg) == 0) {
2979 rule->arg.resolv.opts->family_prio = AF_INET6;
2980 }
2981 else {
2982 goto do_resolve_parse_error;
2983 }
2984 }
2985
2986 cur_arg = cur_arg + 1;
2987
2988 expr = sample_parse_expr((char **)args, &cur_arg, px->conf.args.file, px->conf.args.line, err, &px->conf.args, NULL);
2989 if (!expr)
2990 goto do_resolve_parse_error;
2991
2992
2993 where = 0;
2994 if (px->cap & PR_CAP_FE)
2995 where |= SMP_VAL_FE_HRQ_HDR;
2996 if (px->cap & PR_CAP_BE)
2997 where |= SMP_VAL_BE_HRQ_HDR;
2998
2999 if (!(expr->fetch->val & where)) {
3000 memprintf(err,
3001 "fetch method '%s' extracts information from '%s', none of which is available here",
3002 args[cur_arg-1], sample_src_names(expr->fetch->use));
3003 free(expr);
3004 return ACT_RET_PRS_ERR;
3005 }
3006 rule->arg.resolv.expr = expr;
3007 rule->action = ACT_CUSTOM;
3008 rule->action_ptr = resolv_action_do_resolve;
3009 *orig_arg = cur_arg;
3010
3011 rule->check_ptr = check_action_do_resolve;
3012 rule->release_ptr = release_resolv_action;
3013
3014 return ACT_RET_PRS_OK;
3015
3016 do_resolve_parse_error:
Willy Tarreau61cfdf42021-02-20 10:46:51 +01003017 ha_free(&rule->arg.resolv.varname);
3018 ha_free(&rule->arg.resolv.resolvers_id);
Emeric Brunc9437992021-02-12 19:42:55 +01003019 memprintf(err, "Can't parse '%s'. Expects 'do-resolve(<varname>,<resolvers>[,<options>]) <expr>'. Available options are 'ipv4' and 'ipv6'",
3020 args[cur_arg]);
3021 return ACT_RET_PRS_ERR;
3022}
3023
3024static struct action_kw_list http_req_kws = { { }, {
Amaury Denoyellee4a617c2021-05-06 15:33:09 +02003025 { "do-resolve", resolv_parse_do_resolve, KWF_MATCH_PREFIX },
Emeric Brunc9437992021-02-12 19:42:55 +01003026 { /* END */ }
3027}};
3028
3029INITCALL1(STG_REGISTER, http_req_keywords_register, &http_req_kws);
3030
3031static struct action_kw_list tcp_req_cont_actions = {ILH, {
Amaury Denoyellee4a617c2021-05-06 15:33:09 +02003032 { "do-resolve", resolv_parse_do_resolve, KWF_MATCH_PREFIX },
Emeric Brunc9437992021-02-12 19:42:55 +01003033 { /* END */ }
3034}};
3035
3036INITCALL1(STG_REGISTER, tcp_req_cont_keywords_register, &tcp_req_cont_actions);
3037
3038/* Check an "http-request do-resolve" action.
3039 *
3040 * The function returns 1 in success case, otherwise, it returns 0 and err is
3041 * filled.
3042 */
3043int check_action_do_resolve(struct act_rule *rule, struct proxy *px, char **err)
3044{
3045 struct resolvers *resolvers = NULL;
3046
3047 if (rule->arg.resolv.resolvers_id == NULL) {
3048 memprintf(err,"Proxy '%s': %s", px->id, "do-resolve action without resolvers");
3049 return 0;
3050 }
3051
3052 resolvers = find_resolvers_by_id(rule->arg.resolv.resolvers_id);
3053 if (resolvers == NULL) {
3054 memprintf(err,"Can't find resolvers section '%s' for do-resolve action", rule->arg.resolv.resolvers_id);
3055 return 0;
3056 }
3057 rule->arg.resolv.resolvers = resolvers;
3058
3059 return 1;
3060}
3061
3062void resolvers_setup_proxy(struct proxy *px)
3063{
3064 px->last_change = now.tv_sec;
3065 px->cap = PR_CAP_FE | PR_CAP_BE;
3066 px->maxconn = 0;
3067 px->conn_retries = 1;
3068 px->timeout.server = TICK_ETERNITY;
3069 px->timeout.client = TICK_ETERNITY;
3070 px->timeout.connect = TICK_ETERNITY;
3071 px->accept = NULL;
3072 px->options2 |= PR_O2_INDEPSTR | PR_O2_SMARTCON;
3073 px->bind_proc = 0; /* will be filled by users */
3074}
3075
3076/*
3077 * Parse a <resolvers> section.
3078 * Returns the error code, 0 if OK, or any combination of :
3079 * - ERR_ABORT: must abort ASAP
3080 * - ERR_FATAL: we can continue parsing but not start the service
3081 * - ERR_WARN: a warning has been emitted
3082 * - ERR_ALERT: an alert has been emitted
3083 * Only the two first ones can stop processing, the two others are just
3084 * indicators.
3085 */
3086int cfg_parse_resolvers(const char *file, int linenum, char **args, int kwm)
3087{
3088 const char *err;
3089 int err_code = 0;
3090 char *errmsg = NULL;
3091 struct proxy *p;
3092
3093 if (strcmp(args[0], "resolvers") == 0) { /* new resolvers section */
3094 if (!*args[1]) {
3095 ha_alert("parsing [%s:%d] : missing name for resolvers section.\n", file, linenum);
3096 err_code |= ERR_ALERT | ERR_ABORT;
3097 goto out;
3098 }
3099
3100 err = invalid_char(args[1]);
3101 if (err) {
3102 ha_alert("parsing [%s:%d] : character '%c' is not permitted in '%s' name '%s'.\n",
3103 file, linenum, *err, args[0], args[1]);
3104 err_code |= ERR_ALERT | ERR_ABORT;
3105 goto out;
3106 }
3107
3108 list_for_each_entry(curr_resolvers, &sec_resolvers, list) {
3109 /* Error if two resolvers owns the same name */
3110 if (strcmp(curr_resolvers->id, args[1]) == 0) {
3111 ha_alert("Parsing [%s:%d]: resolvers '%s' has same name as another resolvers (declared at %s:%d).\n",
3112 file, linenum, args[1], curr_resolvers->conf.file, curr_resolvers->conf.line);
3113 err_code |= ERR_ALERT | ERR_ABORT;
3114 }
3115 }
3116
3117 if ((curr_resolvers = calloc(1, sizeof(*curr_resolvers))) == NULL) {
3118 ha_alert("parsing [%s:%d] : out of memory.\n", file, linenum);
3119 err_code |= ERR_ALERT | ERR_ABORT;
3120 goto out;
3121 }
3122
3123 /* allocate new proxy to tcp servers */
3124 p = calloc(1, sizeof *p);
3125 if (!p) {
3126 ha_alert("parsing [%s:%d] : out of memory.\n", file, linenum);
3127 err_code |= ERR_ALERT | ERR_FATAL;
3128 goto out;
3129 }
3130
3131 init_new_proxy(p);
3132 resolvers_setup_proxy(p);
3133 p->parent = curr_resolvers;
3134 p->id = strdup(args[1]);
3135 p->conf.args.file = p->conf.file = strdup(file);
3136 p->conf.args.line = p->conf.line = linenum;
3137 curr_resolvers->px = p;
3138
3139 /* default values */
Willy Tarreau2b718102021-04-21 07:32:39 +02003140 LIST_APPEND(&sec_resolvers, &curr_resolvers->list);
Emeric Brunc9437992021-02-12 19:42:55 +01003141 curr_resolvers->conf.file = strdup(file);
3142 curr_resolvers->conf.line = linenum;
3143 curr_resolvers->id = strdup(args[1]);
3144 curr_resolvers->query_ids = EB_ROOT;
3145 /* default maximum response size */
3146 curr_resolvers->accepted_payload_size = 512;
3147 /* default hold period for nx, other, refuse and timeout is 30s */
3148 curr_resolvers->hold.nx = 30000;
3149 curr_resolvers->hold.other = 30000;
3150 curr_resolvers->hold.refused = 30000;
3151 curr_resolvers->hold.timeout = 30000;
3152 curr_resolvers->hold.obsolete = 0;
3153 /* default hold period for valid is 10s */
3154 curr_resolvers->hold.valid = 10000;
3155 curr_resolvers->timeout.resolve = 1000;
3156 curr_resolvers->timeout.retry = 1000;
3157 curr_resolvers->resolve_retries = 3;
3158 LIST_INIT(&curr_resolvers->nameservers);
3159 LIST_INIT(&curr_resolvers->resolutions.curr);
3160 LIST_INIT(&curr_resolvers->resolutions.wait);
3161 HA_SPIN_INIT(&curr_resolvers->lock);
3162 }
3163 else if (strcmp(args[0], "nameserver") == 0) { /* nameserver definition */
3164 struct dns_nameserver *newnameserver = NULL;
3165 struct sockaddr_storage *sk;
3166 int port1, port2;
Emeric Brunc8f3e452021-04-07 16:04:54 +02003167 struct protocol *proto;
Emeric Brunc9437992021-02-12 19:42:55 +01003168
3169 if (!*args[2]) {
3170 ha_alert("parsing [%s:%d] : '%s' expects <name> and <addr>[:<port>] as arguments.\n",
3171 file, linenum, args[0]);
3172 err_code |= ERR_ALERT | ERR_FATAL;
3173 goto out;
3174 }
3175
3176 err = invalid_char(args[1]);
3177 if (err) {
3178 ha_alert("parsing [%s:%d] : character '%c' is not permitted in server name '%s'.\n",
3179 file, linenum, *err, args[1]);
3180 err_code |= ERR_ALERT | ERR_FATAL;
3181 goto out;
3182 }
3183
3184 list_for_each_entry(newnameserver, &curr_resolvers->nameservers, list) {
3185 /* Error if two resolvers owns the same name */
3186 if (strcmp(newnameserver->id, args[1]) == 0) {
3187 ha_alert("Parsing [%s:%d]: nameserver '%s' has same name as another nameserver (declared at %s:%d).\n",
3188 file, linenum, args[1], newnameserver->conf.file, newnameserver->conf.line);
3189 err_code |= ERR_ALERT | ERR_FATAL;
3190 }
3191 }
3192
Emeric Brunc8f3e452021-04-07 16:04:54 +02003193 sk = str2sa_range(args[2], NULL, &port1, &port2, NULL, &proto,
3194 &errmsg, NULL, NULL, PA_O_RESOLVE | PA_O_PORT_OK | PA_O_PORT_MAND | PA_O_DGRAM | PA_O_STREAM | PA_O_DEFAULT_DGRAM);
Emeric Brunc9437992021-02-12 19:42:55 +01003195 if (!sk) {
3196 ha_alert("parsing [%s:%d] : '%s %s' : %s\n", file, linenum, args[0], args[1], errmsg);
3197 err_code |= ERR_ALERT | ERR_FATAL;
3198 goto out;
3199 }
3200
3201 if ((newnameserver = calloc(1, sizeof(*newnameserver))) == NULL) {
3202 ha_alert("parsing [%s:%d] : out of memory.\n", file, linenum);
3203 err_code |= ERR_ALERT | ERR_ABORT;
3204 goto out;
3205 }
3206
Emeric Brunc8f3e452021-04-07 16:04:54 +02003207 if (proto && proto->ctrl_type == SOCK_STREAM) {
3208 err_code |= parse_server(file, linenum, args, curr_resolvers->px, NULL,
3209 SRV_PARSE_PARSE_ADDR|SRV_PARSE_INITIAL_RESOLVE);
3210 if (err_code & (ERR_FATAL|ERR_ABORT)) {
3211 err_code |= ERR_ABORT;
3212 goto out;
3213 }
3214
3215 if (dns_stream_init(newnameserver, curr_resolvers->px->srv) < 0) {
3216 ha_alert("parsing [%s:%d] : out of memory.\n", file, linenum);
3217 err_code |= ERR_ALERT|ERR_ABORT;
3218 goto out;
3219 }
3220 }
3221 else if (dns_dgram_init(newnameserver, sk) < 0) {
Emeric Brunc9437992021-02-12 19:42:55 +01003222 ha_alert("parsing [%s:%d] : out of memory.\n", file, linenum);
3223 err_code |= ERR_ALERT | ERR_ABORT;
3224 goto out;
3225 }
3226
3227 if ((newnameserver->conf.file = strdup(file)) == NULL) {
3228 ha_alert("parsing [%s:%d] : out of memory.\n", file, linenum);
3229 err_code |= ERR_ALERT | ERR_ABORT;
3230 goto out;
3231 }
3232
3233 if ((newnameserver->id = strdup(args[1])) == NULL) {
3234 ha_alert("parsing [%s:%d] : out of memory.\n", file, linenum);
3235 err_code |= ERR_ALERT | ERR_ABORT;
3236 goto out;
3237 }
3238
3239 newnameserver->parent = curr_resolvers;
3240 newnameserver->process_responses = resolv_process_responses;
3241 newnameserver->conf.line = linenum;
3242 /* the nameservers are linked backward first */
Willy Tarreau2b718102021-04-21 07:32:39 +02003243 LIST_APPEND(&curr_resolvers->nameservers, &newnameserver->list);
Emeric Brunc9437992021-02-12 19:42:55 +01003244 }
3245 else if (strcmp(args[0], "parse-resolv-conf") == 0) {
3246 struct dns_nameserver *newnameserver = NULL;
3247 const char *whitespace = "\r\n\t ";
3248 char *resolv_line = NULL;
3249 int resolv_linenum = 0;
3250 FILE *f = NULL;
3251 char *address = NULL;
3252 struct sockaddr_storage *sk = NULL;
3253 struct protocol *proto;
3254 int duplicate_name = 0;
3255
3256 if ((resolv_line = malloc(sizeof(*resolv_line) * LINESIZE)) == NULL) {
3257 ha_alert("parsing [%s:%d] : out of memory.\n",
3258 file, linenum);
3259 err_code |= ERR_ALERT | ERR_FATAL;
3260 goto resolv_out;
3261 }
3262
3263 if ((f = fopen("/etc/resolv.conf", "r")) == NULL) {
3264 ha_alert("parsing [%s:%d] : failed to open /etc/resolv.conf.\n",
3265 file, linenum);
3266 err_code |= ERR_ALERT | ERR_FATAL;
3267 goto resolv_out;
3268 }
3269
3270 sk = calloc(1, sizeof(*sk));
3271 if (sk == NULL) {
3272 ha_alert("parsing [/etc/resolv.conf:%d] : out of memory.\n",
3273 resolv_linenum);
3274 err_code |= ERR_ALERT | ERR_FATAL;
3275 goto resolv_out;
3276 }
3277
3278 while (fgets(resolv_line, LINESIZE, f) != NULL) {
3279 resolv_linenum++;
3280 if (strncmp(resolv_line, "nameserver", 10) != 0)
3281 continue;
3282
3283 address = strtok(resolv_line + 10, whitespace);
3284 if (address == resolv_line + 10)
3285 continue;
3286
3287 if (address == NULL) {
3288 ha_warning("parsing [/etc/resolv.conf:%d] : nameserver line is missing address.\n",
3289 resolv_linenum);
3290 err_code |= ERR_WARN;
3291 continue;
3292 }
3293
3294 duplicate_name = 0;
3295 list_for_each_entry(newnameserver, &curr_resolvers->nameservers, list) {
3296 if (strcmp(newnameserver->id, address) == 0) {
3297 ha_warning("Parsing [/etc/resolv.conf:%d] : generated name for /etc/resolv.conf nameserver '%s' conflicts with another nameserver (declared at %s:%d), it appears to be a duplicate and will be excluded.\n",
3298 resolv_linenum, address, newnameserver->conf.file, newnameserver->conf.line);
3299 err_code |= ERR_WARN;
3300 duplicate_name = 1;
3301 }
3302 }
3303
3304 if (duplicate_name)
3305 continue;
3306
3307 memset(sk, 0, sizeof(*sk));
3308 if (!str2ip2(address, sk, 1)) {
3309 ha_warning("parsing [/etc/resolv.conf:%d] : address '%s' could not be recognized, nameserver will be excluded.\n",
3310 resolv_linenum, address);
3311 err_code |= ERR_WARN;
3312 continue;
3313 }
3314
3315 set_host_port(sk, 53);
3316
3317 proto = protocol_by_family(sk->ss_family);
3318 if (!proto || !proto->connect) {
3319 ha_warning("parsing [/etc/resolv.conf:%d] : '%s' : connect() not supported for this address family.\n",
3320 resolv_linenum, address);
3321 err_code |= ERR_WARN;
3322 continue;
3323 }
3324
3325 if ((newnameserver = calloc(1, sizeof(*newnameserver))) == NULL) {
3326 ha_alert("parsing [/etc/resolv.conf:%d] : out of memory.\n", resolv_linenum);
3327 err_code |= ERR_ALERT | ERR_FATAL;
3328 goto resolv_out;
3329 }
3330
3331 if (dns_dgram_init(newnameserver, sk) < 0) {
3332 ha_alert("parsing [/etc/resolv.conf:%d] : out of memory.\n", resolv_linenum);
3333 err_code |= ERR_ALERT | ERR_FATAL;
3334 free(newnameserver);
3335 goto resolv_out;
3336 }
3337
3338 newnameserver->conf.file = strdup("/etc/resolv.conf");
3339 if (newnameserver->conf.file == NULL) {
3340 ha_alert("parsing [/etc/resolv.conf:%d] : out of memory.\n", resolv_linenum);
3341 err_code |= ERR_ALERT | ERR_FATAL;
3342 free(newnameserver);
3343 goto resolv_out;
3344 }
3345
3346 newnameserver->id = strdup(address);
3347 if (newnameserver->id == NULL) {
3348 ha_alert("parsing [/etc/resolv.conf:%d] : out of memory.\n", resolv_linenum);
3349 err_code |= ERR_ALERT | ERR_FATAL;
3350 free((char *)newnameserver->conf.file);
3351 free(newnameserver);
3352 goto resolv_out;
3353 }
3354
3355 newnameserver->parent = curr_resolvers;
3356 newnameserver->process_responses = resolv_process_responses;
3357 newnameserver->conf.line = resolv_linenum;
Willy Tarreau2b718102021-04-21 07:32:39 +02003358 LIST_APPEND(&curr_resolvers->nameservers, &newnameserver->list);
Emeric Brunc9437992021-02-12 19:42:55 +01003359 }
3360
3361resolv_out:
3362 free(sk);
3363 free(resolv_line);
3364 if (f != NULL)
3365 fclose(f);
3366 }
3367 else if (strcmp(args[0], "hold") == 0) { /* hold periods */
3368 const char *res;
3369 unsigned int time;
3370
3371 if (!*args[2]) {
3372 ha_alert("parsing [%s:%d] : '%s' expects an <event> and a <time> as arguments.\n",
3373 file, linenum, args[0]);
3374 ha_alert("<event> can be either 'valid', 'nx', 'refused', 'timeout', or 'other'\n");
3375 err_code |= ERR_ALERT | ERR_FATAL;
3376 goto out;
3377 }
3378 res = parse_time_err(args[2], &time, TIME_UNIT_MS);
3379 if (res == PARSE_TIME_OVER) {
3380 ha_alert("parsing [%s:%d]: timer overflow in argument <%s> to <%s>, maximum value is 2147483647 ms (~24.8 days).\n",
3381 file, linenum, args[1], args[0]);
3382 err_code |= ERR_ALERT | ERR_FATAL;
3383 goto out;
3384 }
3385 else if (res == PARSE_TIME_UNDER) {
3386 ha_alert("parsing [%s:%d]: timer underflow in argument <%s> to <%s>, minimum non-null value is 1 ms.\n",
3387 file, linenum, args[1], args[0]);
3388 err_code |= ERR_ALERT | ERR_FATAL;
3389 goto out;
3390 }
3391 else if (res) {
3392 ha_alert("parsing [%s:%d]: unexpected character '%c' in argument to <%s>.\n",
3393 file, linenum, *res, args[0]);
3394 err_code |= ERR_ALERT | ERR_FATAL;
3395 goto out;
3396 }
3397 if (strcmp(args[1], "nx") == 0)
3398 curr_resolvers->hold.nx = time;
3399 else if (strcmp(args[1], "other") == 0)
3400 curr_resolvers->hold.other = time;
3401 else if (strcmp(args[1], "refused") == 0)
3402 curr_resolvers->hold.refused = time;
3403 else if (strcmp(args[1], "timeout") == 0)
3404 curr_resolvers->hold.timeout = time;
3405 else if (strcmp(args[1], "valid") == 0)
3406 curr_resolvers->hold.valid = time;
3407 else if (strcmp(args[1], "obsolete") == 0)
3408 curr_resolvers->hold.obsolete = time;
3409 else {
3410 ha_alert("parsing [%s:%d] : '%s' unknown <event>: '%s', expects either 'nx', 'timeout', 'valid', 'obsolete' or 'other'.\n",
3411 file, linenum, args[0], args[1]);
3412 err_code |= ERR_ALERT | ERR_FATAL;
3413 goto out;
3414 }
3415
3416 }
3417 else if (strcmp(args[0], "accepted_payload_size") == 0) {
3418 int i = 0;
3419
3420 if (!*args[1]) {
3421 ha_alert("parsing [%s:%d] : '%s' expects <nb> as argument.\n",
3422 file, linenum, args[0]);
3423 err_code |= ERR_ALERT | ERR_FATAL;
3424 goto out;
3425 }
3426
3427 i = atoi(args[1]);
3428 if (i < DNS_HEADER_SIZE || i > DNS_MAX_UDP_MESSAGE) {
3429 ha_alert("parsing [%s:%d] : '%s' must be between %d and %d inclusive (was %s).\n",
3430 file, linenum, args[0], DNS_HEADER_SIZE, DNS_MAX_UDP_MESSAGE, args[1]);
3431 err_code |= ERR_ALERT | ERR_FATAL;
3432 goto out;
3433 }
3434
3435 curr_resolvers->accepted_payload_size = i;
3436 }
3437 else if (strcmp(args[0], "resolution_pool_size") == 0) {
3438 ha_alert("parsing [%s:%d] : '%s' directive is not supported anymore (it never appeared in a stable release).\n",
3439 file, linenum, args[0]);
3440 err_code |= ERR_ALERT | ERR_FATAL;
3441 goto out;
3442 }
3443 else if (strcmp(args[0], "resolve_retries") == 0) {
3444 if (!*args[1]) {
3445 ha_alert("parsing [%s:%d] : '%s' expects <nb> as argument.\n",
3446 file, linenum, args[0]);
3447 err_code |= ERR_ALERT | ERR_FATAL;
3448 goto out;
3449 }
3450 curr_resolvers->resolve_retries = atoi(args[1]);
3451 }
3452 else if (strcmp(args[0], "timeout") == 0) {
3453 if (!*args[1]) {
3454 ha_alert("parsing [%s:%d] : '%s' expects 'retry' or 'resolve' and <time> as arguments.\n",
3455 file, linenum, args[0]);
3456 err_code |= ERR_ALERT | ERR_FATAL;
3457 goto out;
3458 }
3459 else if (strcmp(args[1], "retry") == 0 ||
3460 strcmp(args[1], "resolve") == 0) {
3461 const char *res;
3462 unsigned int tout;
3463
3464 if (!*args[2]) {
3465 ha_alert("parsing [%s:%d] : '%s %s' expects <time> as argument.\n",
3466 file, linenum, args[0], args[1]);
3467 err_code |= ERR_ALERT | ERR_FATAL;
3468 goto out;
3469 }
3470 res = parse_time_err(args[2], &tout, TIME_UNIT_MS);
3471 if (res == PARSE_TIME_OVER) {
3472 ha_alert("parsing [%s:%d]: timer overflow in argument <%s> to <%s %s>, maximum value is 2147483647 ms (~24.8 days).\n",
3473 file, linenum, args[2], args[0], args[1]);
3474 err_code |= ERR_ALERT | ERR_FATAL;
3475 goto out;
3476 }
3477 else if (res == PARSE_TIME_UNDER) {
3478 ha_alert("parsing [%s:%d]: timer underflow in argument <%s> to <%s %s>, minimum non-null value is 1 ms.\n",
3479 file, linenum, args[2], args[0], args[1]);
3480 err_code |= ERR_ALERT | ERR_FATAL;
3481 goto out;
3482 }
3483 else if (res) {
3484 ha_alert("parsing [%s:%d]: unexpected character '%c' in argument to <%s %s>.\n",
3485 file, linenum, *res, args[0], args[1]);
3486 err_code |= ERR_ALERT | ERR_FATAL;
3487 goto out;
3488 }
3489 if (args[1][2] == 't')
3490 curr_resolvers->timeout.retry = tout;
3491 else
3492 curr_resolvers->timeout.resolve = tout;
3493 }
3494 else {
3495 ha_alert("parsing [%s:%d] : '%s' expects 'retry' or 'resolve' and <time> as arguments got '%s'.\n",
3496 file, linenum, args[0], args[1]);
3497 err_code |= ERR_ALERT | ERR_FATAL;
3498 goto out;
3499 }
3500 }
3501 else if (*args[0] != 0) {
3502 ha_alert("parsing [%s:%d] : unknown keyword '%s' in '%s' section\n", file, linenum, args[0], cursection);
3503 err_code |= ERR_ALERT | ERR_FATAL;
3504 goto out;
3505 }
3506
3507 out:
3508 free(errmsg);
3509 return err_code;
3510}
Emeric Brun56fc5d92021-02-12 20:05:45 +01003511int cfg_post_parse_resolvers()
3512{
3513 int err_code = 0;
3514 struct server *srv;
3515
3516 if (curr_resolvers) {
3517
3518 /* prepare forward server descriptors */
3519 if (curr_resolvers->px) {
3520 srv = curr_resolvers->px->srv;
3521 while (srv) {
Emeric Brun56fc5d92021-02-12 20:05:45 +01003522 /* init ssl if needed */
3523 if (srv->use_ssl == 1 && xprt_get(XPRT_SSL) && xprt_get(XPRT_SSL)->prepare_srv) {
3524 if (xprt_get(XPRT_SSL)->prepare_srv(srv)) {
3525 ha_alert("unable to prepare SSL for server '%s' in resolvers section '%s'.\n", srv->id, curr_resolvers->id);
3526 err_code |= ERR_ALERT | ERR_FATAL;
3527 break;
3528 }
3529 }
Emeric Brun56fc5d92021-02-12 20:05:45 +01003530 srv = srv->next;
3531 }
3532 }
3533 }
3534 curr_resolvers = NULL;
3535 return err_code;
3536}
Emeric Brunc9437992021-02-12 19:42:55 +01003537
Emeric Brun56fc5d92021-02-12 20:05:45 +01003538REGISTER_CONFIG_SECTION("resolvers", cfg_parse_resolvers, cfg_post_parse_resolvers);
Emeric Brunc9437992021-02-12 19:42:55 +01003539REGISTER_POST_DEINIT(resolvers_deinit);
3540REGISTER_CONFIG_POSTPARSER("dns runtime resolver", resolvers_finalize_config);