blob: 580083176372896f2173cb16a11076770551e2d9 [file] [log] [blame]
Mike Yub601ff72018-11-01 20:07:00 +08001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Mike Yu3e829062019-08-07 14:01:14 +080017#pragma once
Mike Yub601ff72018-11-01 20:07:00 +080018
19#include <list>
20#include <map>
Mike Yu303b0df2018-12-24 17:05:02 +080021#include <mutex>
Mike Yub601ff72018-11-01 20:07:00 +080022#include <vector>
23
24#include <android-base/thread_annotations.h>
25
26#include "DnsTlsServer.h"
Bernie Innocentiec4219b2019-01-30 11:16:36 +090027
Mike Yub601ff72018-11-01 20:07:00 +080028namespace android {
29namespace net {
30
Bernie Innocenti23c6e2a2019-05-16 15:18:35 +090031// The DNS over TLS mode on a specific netId.
lifr6b83a6f2019-07-26 03:17:43 +080032enum class PrivateDnsMode : uint8_t { OFF, OPPORTUNISTIC, STRICT };
Bernie Innocenti23c6e2a2019-05-16 15:18:35 +090033
34// Validation status of a DNS over TLS server (on a specific netId).
35enum class Validation : uint8_t { in_process, success, fail, unknown_server, unknown_netid };
36
Mike Yub601ff72018-11-01 20:07:00 +080037struct PrivateDnsStatus {
38 PrivateDnsMode mode;
Mike Yu3e829062019-08-07 14:01:14 +080039 std::map<DnsTlsServer, Validation, AddressComparator> serversMap;
Mike Yub601ff72018-11-01 20:07:00 +080040
Mike Yu3e829062019-08-07 14:01:14 +080041 std::list<DnsTlsServer> validatedServers() const {
42 std::list<DnsTlsServer> servers;
43
44 for (const auto& pair : serversMap) {
45 if (pair.second == Validation::success) {
46 servers.push_back(pair.first);
47 }
48 }
49 return servers;
50 }
Bernie Innocenti23c6e2a2019-05-16 15:18:35 +090051};
52
Mike Yub601ff72018-11-01 20:07:00 +080053class PrivateDnsConfiguration {
54 public:
55 int set(int32_t netId, uint32_t mark, const std::vector<std::string>& servers,
Mike Yu3e829062019-08-07 14:01:14 +080056 const std::string& name, const std::string& caCert) EXCLUDES(mPrivateDnsLock);
Mike Yub601ff72018-11-01 20:07:00 +080057
Mike Yu3e829062019-08-07 14:01:14 +080058 PrivateDnsStatus getStatus(unsigned netId) EXCLUDES(mPrivateDnsLock);
Mike Yub601ff72018-11-01 20:07:00 +080059
Mike Yu3e829062019-08-07 14:01:14 +080060 void clear(unsigned netId) EXCLUDES(mPrivateDnsLock);
Mike Yub601ff72018-11-01 20:07:00 +080061
62 private:
63 typedef std::map<DnsTlsServer, Validation, AddressComparator> PrivateDnsTracker;
64
65 void validatePrivateDnsProvider(const DnsTlsServer& server, PrivateDnsTracker& tracker,
66 unsigned netId, uint32_t mark) REQUIRES(mPrivateDnsLock);
67
68 bool recordPrivateDnsValidation(const DnsTlsServer& server, unsigned netId, bool success);
69
70 // Start validation for newly added servers as well as any servers that have
71 // landed in Validation::fail state. Note that servers that have failed
72 // multiple validation attempts but for which there is still a validating
73 // thread running are marked as being Validation::in_process.
74 bool needsValidation(const PrivateDnsTracker& tracker, const DnsTlsServer& server);
75
76 std::mutex mPrivateDnsLock;
77 std::map<unsigned, PrivateDnsMode> mPrivateDnsModes GUARDED_BY(mPrivateDnsLock);
78 // Structure for tracking the validation status of servers on a specific netId.
79 // Using the AddressComparator ensures at most one entry per IP address.
80 std::map<unsigned, PrivateDnsTracker> mPrivateDnsTransports GUARDED_BY(mPrivateDnsLock);
Mike Yub601ff72018-11-01 20:07:00 +080081};
82
83extern PrivateDnsConfiguration gPrivateDnsConfiguration;
84
85} // namespace net
86} // namespace android