hickory_resolver/system_conf/
unix.rsuse std::fs::File;
use std::io;
use std::io::Read;
use std::net::SocketAddr;
use std::path::Path;
use std::str::FromStr;
use std::time::Duration;
use resolv_conf;
use crate::config::{NameServerConfig, ResolverConfig, ResolverOpts};
use crate::proto::rr::Name;
use crate::proto::xfer::Protocol;
use crate::ResolveError;
const DEFAULT_PORT: u16 = 53;
pub fn read_system_conf() -> Result<(ResolverConfig, ResolverOpts), ResolveError> {
read_resolv_conf("/etc/resolv.conf")
}
fn read_resolv_conf<P: AsRef<Path>>(
path: P,
) -> Result<(ResolverConfig, ResolverOpts), ResolveError> {
let mut data = String::new();
let mut file = File::open(path)?;
file.read_to_string(&mut data)?;
parse_resolv_conf(&data)
}
pub fn parse_resolv_conf<T: AsRef<[u8]>>(
data: T,
) -> Result<(ResolverConfig, ResolverOpts), ResolveError> {
let parsed_conf = resolv_conf::Config::parse(&data).map_err(|e| {
io::Error::new(
io::ErrorKind::Other,
format!("Error parsing resolv.conf: {e}"),
)
})?;
into_resolver_config(parsed_conf)
}
fn into_resolver_config(
parsed_config: resolv_conf::Config,
) -> Result<(ResolverConfig, ResolverOpts), ResolveError> {
let domain = if let Some(domain) = parsed_config.get_system_domain() {
Name::from_str(domain.as_str()).ok()
} else {
None
};
let mut nameservers = Vec::<NameServerConfig>::with_capacity(parsed_config.nameservers.len());
for ip in &parsed_config.nameservers {
nameservers.push(NameServerConfig {
socket_addr: SocketAddr::new(ip.into(), DEFAULT_PORT),
protocol: Protocol::Udp,
tls_dns_name: None,
http_endpoint: None,
trust_negative_responses: false,
#[cfg(feature = "dns-over-rustls")]
tls_config: None,
bind_addr: None,
});
nameservers.push(NameServerConfig {
socket_addr: SocketAddr::new(ip.into(), DEFAULT_PORT),
protocol: Protocol::Tcp,
tls_dns_name: None,
http_endpoint: None,
trust_negative_responses: false,
#[cfg(feature = "dns-over-rustls")]
tls_config: None,
bind_addr: None,
});
}
if nameservers.is_empty() {
Err(io::Error::new(
io::ErrorKind::Other,
"no nameservers found in config",
))?;
}
let mut search = vec![];
for search_domain in parsed_config.get_last_search_or_domain() {
if search_domain == "--" {
continue;
}
search.push(Name::from_str_relaxed(search_domain).map_err(|e| {
io::Error::new(
io::ErrorKind::Other,
format!("Error parsing resolv.conf: {e}"),
)
})?);
}
let config = ResolverConfig::from_parts(domain, search, nameservers);
let options = ResolverOpts {
ndots: parsed_config.ndots as usize,
timeout: Duration::from_secs(u64::from(parsed_config.timeout)),
attempts: parsed_config.attempts as usize,
..ResolverOpts::default()
};
Ok((config, options))
}
#[cfg(test)]
mod tests {
use super::*;
use crate::proto::rr::Name;
use std::env;
use std::net::*;
use std::str::FromStr;
fn empty_config(name_servers: Vec<NameServerConfig>) -> ResolverConfig {
ResolverConfig::from_parts(None, vec![], name_servers)
}
fn nameserver_config(ip: &str) -> [NameServerConfig; 2] {
let addr = SocketAddr::new(IpAddr::from_str(ip).unwrap(), 53);
[
NameServerConfig {
socket_addr: addr,
protocol: Protocol::Udp,
tls_dns_name: None,
http_endpoint: None,
trust_negative_responses: false,
#[cfg(feature = "dns-over-rustls")]
tls_config: None,
bind_addr: None,
},
NameServerConfig {
socket_addr: addr,
protocol: Protocol::Tcp,
tls_dns_name: None,
http_endpoint: None,
trust_negative_responses: false,
#[cfg(feature = "dns-over-rustls")]
tls_config: None,
bind_addr: None,
},
]
}
fn tests_dir() -> String {
let server_path = env::var("TDNS_WORKSPACE_ROOT").unwrap_or_else(|_| "../..".to_owned());
format!("{server_path}/crates/resolver/tests")
}
#[test]
#[allow(clippy::redundant_clone)]
fn test_name_server() {
let parsed = parse_resolv_conf("nameserver 127.0.0.1").expect("failed");
let cfg = empty_config(nameserver_config("127.0.0.1").to_vec());
assert_eq!(cfg.name_servers(), parsed.0.name_servers());
assert_eq!(ResolverOpts::default(), parsed.1);
}
#[test]
fn test_search() {
let parsed = parse_resolv_conf("search localnet.\nnameserver 127.0.0.1").expect("failed");
let mut cfg = empty_config(nameserver_config("127.0.0.1").to_vec());
cfg.add_search(Name::from_str("localnet.").unwrap());
assert_eq!(cfg.search(), parsed.0.search());
assert_eq!(ResolverOpts::default(), parsed.1);
}
#[test]
fn test_skips_invalid_search() {
let parsed =
parse_resolv_conf("\n\nnameserver 127.0.0.53\noptions edns0 trust-ad\nsearch -- lan\n")
.expect("failed");
let mut cfg = empty_config(nameserver_config("127.0.0.53").to_vec());
{
assert_eq!(cfg.name_servers(), parsed.0.name_servers());
assert_eq!(ResolverOpts::default(), parsed.1);
}
{
cfg.add_search(Name::from_str("lan").unwrap());
assert_eq!(cfg.search(), parsed.0.search());
assert_eq!(ResolverOpts::default(), parsed.1);
}
}
#[test]
fn test_underscore_in_search() {
let parsed =
parse_resolv_conf("search Speedport_000\nnameserver 127.0.0.1").expect("failed");
let mut cfg = empty_config(nameserver_config("127.0.0.1").to_vec());
cfg.add_search(Name::from_str_relaxed("Speedport_000.").unwrap());
assert_eq!(cfg.search(), parsed.0.search());
assert_eq!(ResolverOpts::default(), parsed.1);
}
#[test]
fn test_domain() {
let parsed = parse_resolv_conf("domain example.com\nnameserver 127.0.0.1").expect("failed");
let mut cfg = empty_config(nameserver_config("127.0.0.1").to_vec());
cfg.set_domain(Name::from_str("example.com").unwrap());
assert_eq!(cfg, parsed.0);
assert_eq!(ResolverOpts::default(), parsed.1);
}
#[test]
fn test_read_resolv_conf() {
read_resolv_conf(format!("{}/resolv.conf-simple", tests_dir())).expect("simple failed");
read_resolv_conf(format!("{}/resolv.conf-macos", tests_dir())).expect("macos failed");
read_resolv_conf(format!("{}/resolv.conf-linux", tests_dir())).expect("linux failed");
}
}