blob: 82366e84b12fbd7ad71c1fe12aab80b850fb71e7 [file] [log] [blame]
Luke Huang36796f32019-03-13 02:54:45 +08001/**
2 * Copyright (c) 2019, The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "DnsResolver.h"
18
19#include <android-base/logging.h>
Luke Huang36796f32019-03-13 02:54:45 +080020
Luke Huang36796f32019-03-13 02:54:45 +080021#include "DnsProxyListener.h"
22#include "DnsResolverService.h"
Mike Yu5448c9e2020-12-14 16:45:16 +080023#include "DnsTlsDispatcher.h"
24#include "PrivateDnsConfiguration.h"
Bernie Innocentie71a28a2019-05-29 00:42:35 +090025#include "netd_resolv/resolv.h"
26#include "res_debug.h"
Luke Huang5729afc2020-07-30 23:12:17 +080027#include "util.h"
Luke Huang36796f32019-03-13 02:54:45 +080028
Bernie Innocentic19a4642019-05-16 18:38:47 +090029bool resolv_init(const ResolverNetdCallbacks* callbacks) {
Luke Huang36796f32019-03-13 02:54:45 +080030 android::base::InitLogging(/*argv=*/nullptr);
31 android::base::SetDefaultTag("libnetd_resolv");
Bernie Innocentifb8641c2019-03-29 17:02:53 +090032 LOG(INFO) << __func__ << ": Initializing resolver";
Luke Huang7b2978e2020-10-21 18:24:29 +080033 // TODO(b/170539625): restore log level to WARNING after clarifying flaky tests.
34 resolv_set_log_severity(isUserDebugBuild() ? android::base::DEBUG : android::base::WARNING);
Sehee Parkd975bf32019-08-07 13:21:16 +090035 using android::net::gApiLevel;
Luke Huang5729afc2020-07-30 23:12:17 +080036 gApiLevel = getApiLevel();
Sehee Parkd975bf32019-08-07 13:21:16 +090037 using android::net::gResNetdCallbacks;
38 gResNetdCallbacks.check_calling_permission = callbacks->check_calling_permission;
39 gResNetdCallbacks.get_network_context = callbacks->get_network_context;
40 gResNetdCallbacks.log = callbacks->log;
41 if (gApiLevel >= 30) {
42 gResNetdCallbacks.tagSocket = callbacks->tagSocket;
Felipe Mosso Ferfoglia23b540f2019-08-07 15:47:53 -030043 gResNetdCallbacks.evaluate_domain_name = callbacks->evaluate_domain_name;
Sehee Parkd975bf32019-08-07 13:21:16 +090044 }
Luke Huang36796f32019-03-13 02:54:45 +080045 android::net::gDnsResolv = android::net::DnsResolver::getInstance();
46 return android::net::gDnsResolv->start();
47}
48
49namespace android {
50namespace net {
51
52namespace {
53
54bool verifyCallbacks() {
Sehee Parkd975bf32019-08-07 13:21:16 +090055 if (!(gResNetdCallbacks.check_calling_permission && gResNetdCallbacks.get_network_context &&
56 gResNetdCallbacks.log)) {
57 return false;
58 }
59 if (gApiLevel >= 30) {
60 return gResNetdCallbacks.tagSocket != nullptr;
61 }
62 return true;
Luke Huang36796f32019-03-13 02:54:45 +080063}
64
65} // namespace
66
67DnsResolver* gDnsResolv = nullptr;
68ResolverNetdCallbacks gResNetdCallbacks;
Luke Huangc6bbbe72019-03-28 21:38:28 +080069netdutils::Log gDnsResolverLog("dnsResolver");
Sehee Parkd975bf32019-08-07 13:21:16 +090070uint64_t gApiLevel = 0;
Luke Huang36796f32019-03-13 02:54:45 +080071
72DnsResolver* DnsResolver::getInstance() {
73 // Instantiated on first use.
74 static DnsResolver instance;
75 return &instance;
76}
77
Mike Yu5448c9e2020-12-14 16:45:16 +080078DnsResolver::DnsResolver() {
79 // TODO: make them member variables after fixing the circular dependency:
80 // DnsTlsDispatcher.h -> resolv_private.h -> DnsResolver.h -> DnsTlsDispatcher.h
81 auto& dnsTlsDispatcher = DnsTlsDispatcher::getInstance();
82 auto& privateDnsConfiguration = PrivateDnsConfiguration::getInstance();
83 privateDnsConfiguration.setObserver(&dnsTlsDispatcher);
Luke Huang2fe9c732021-07-06 01:48:02 +080084 if (isDoHEnabled()) privateDnsConfiguration.initDoh();
Mike Yu5448c9e2020-12-14 16:45:16 +080085}
86
Luke Huang36796f32019-03-13 02:54:45 +080087bool DnsResolver::start() {
88 if (!verifyCallbacks()) {
Bernie Innocentifb8641c2019-03-29 17:02:53 +090089 LOG(ERROR) << __func__ << ": Callback verification failed";
Luke Huang36796f32019-03-13 02:54:45 +080090 return false;
91 }
92 if (mDnsProxyListener.startListener()) {
Bernie Innocentifb8641c2019-03-29 17:02:53 +090093 PLOG(ERROR) << __func__ << ": Unable to start DnsProxyListener";
Luke Huang36796f32019-03-13 02:54:45 +080094 return false;
95 }
96 binder_status_t ret;
97 if ((ret = DnsResolverService::start()) != STATUS_OK) {
Bernie Innocentifb8641c2019-03-29 17:02:53 +090098 LOG(ERROR) << __func__ << ": Unable to start DnsResolverService: " << ret;
Luke Huang36796f32019-03-13 02:54:45 +080099 return false;
100 }
101 return true;
102}
103
Ken Chend99022c2019-02-20 21:34:14 +0800104int DnsResolver::setLogSeverity(int32_t logSeverity) {
105 return resolv_set_log_severity(logSeverity);
106}
107
Luke Huang36796f32019-03-13 02:54:45 +0800108} // namespace net
109} // namespace android