blob: a94f5e5d76182514376e3fe94f47762c3d8cbf9f [file] [log] [blame]
Luke Huang36796f32019-03-13 02:54:45 +08001/**
2 * Copyright (c) 2019, The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "DnsResolver.h"
18
19#include <android-base/logging.h>
Luke Huang36796f32019-03-13 02:54:45 +080020
Luke Huang36796f32019-03-13 02:54:45 +080021#include "DnsProxyListener.h"
22#include "DnsResolverService.h"
Mike Yu5448c9e2020-12-14 16:45:16 +080023#include "DnsTlsDispatcher.h"
24#include "PrivateDnsConfiguration.h"
Bernie Innocentie71a28a2019-05-29 00:42:35 +090025#include "netd_resolv/resolv.h"
26#include "res_debug.h"
Luke Huang5729afc2020-07-30 23:12:17 +080027#include "util.h"
Luke Huang36796f32019-03-13 02:54:45 +080028
Bernie Innocentic19a4642019-05-16 18:38:47 +090029bool resolv_init(const ResolverNetdCallbacks* callbacks) {
Luke Huang36796f32019-03-13 02:54:45 +080030 android::base::InitLogging(/*argv=*/nullptr);
31 android::base::SetDefaultTag("libnetd_resolv");
Bernie Innocentifb8641c2019-03-29 17:02:53 +090032 LOG(INFO) << __func__ << ": Initializing resolver";
Luke Huang7b2978e2020-10-21 18:24:29 +080033 // TODO(b/170539625): restore log level to WARNING after clarifying flaky tests.
Luke Huang53d3eb22021-07-19 15:08:56 +080034 const bool isDebug = isUserDebugBuild();
35 resolv_set_log_severity(isDebug ? android::base::DEBUG : android::base::WARNING);
Matthew Maurer6b178422021-09-16 17:08:51 -070036 doh_init_logger(isDebug ? DOH_LOG_LEVEL_DEBUG : DOH_LOG_LEVEL_WARN);
Sehee Parkd975bf32019-08-07 13:21:16 +090037 using android::net::gApiLevel;
Luke Huang5729afc2020-07-30 23:12:17 +080038 gApiLevel = getApiLevel();
Sehee Parkd975bf32019-08-07 13:21:16 +090039 using android::net::gResNetdCallbacks;
40 gResNetdCallbacks.check_calling_permission = callbacks->check_calling_permission;
41 gResNetdCallbacks.get_network_context = callbacks->get_network_context;
42 gResNetdCallbacks.log = callbacks->log;
43 if (gApiLevel >= 30) {
44 gResNetdCallbacks.tagSocket = callbacks->tagSocket;
Felipe Mosso Ferfoglia23b540f2019-08-07 15:47:53 -030045 gResNetdCallbacks.evaluate_domain_name = callbacks->evaluate_domain_name;
Sehee Parkd975bf32019-08-07 13:21:16 +090046 }
Luke Huang36796f32019-03-13 02:54:45 +080047 android::net::gDnsResolv = android::net::DnsResolver::getInstance();
48 return android::net::gDnsResolv->start();
49}
50
51namespace android {
52namespace net {
53
54namespace {
55
56bool verifyCallbacks() {
Sehee Parkd975bf32019-08-07 13:21:16 +090057 if (!(gResNetdCallbacks.check_calling_permission && gResNetdCallbacks.get_network_context &&
58 gResNetdCallbacks.log)) {
59 return false;
60 }
61 if (gApiLevel >= 30) {
62 return gResNetdCallbacks.tagSocket != nullptr;
63 }
64 return true;
Luke Huang36796f32019-03-13 02:54:45 +080065}
66
67} // namespace
68
69DnsResolver* gDnsResolv = nullptr;
70ResolverNetdCallbacks gResNetdCallbacks;
Luke Huangc6bbbe72019-03-28 21:38:28 +080071netdutils::Log gDnsResolverLog("dnsResolver");
Sehee Parkd975bf32019-08-07 13:21:16 +090072uint64_t gApiLevel = 0;
Luke Huang36796f32019-03-13 02:54:45 +080073
74DnsResolver* DnsResolver::getInstance() {
75 // Instantiated on first use.
76 static DnsResolver instance;
77 return &instance;
78}
79
Mike Yu5448c9e2020-12-14 16:45:16 +080080DnsResolver::DnsResolver() {
81 // TODO: make them member variables after fixing the circular dependency:
82 // DnsTlsDispatcher.h -> resolv_private.h -> DnsResolver.h -> DnsTlsDispatcher.h
83 auto& dnsTlsDispatcher = DnsTlsDispatcher::getInstance();
84 auto& privateDnsConfiguration = PrivateDnsConfiguration::getInstance();
85 privateDnsConfiguration.setObserver(&dnsTlsDispatcher);
Luke Huang2fe9c732021-07-06 01:48:02 +080086 if (isDoHEnabled()) privateDnsConfiguration.initDoh();
Mike Yu5448c9e2020-12-14 16:45:16 +080087}
88
Luke Huang36796f32019-03-13 02:54:45 +080089bool DnsResolver::start() {
90 if (!verifyCallbacks()) {
Bernie Innocentifb8641c2019-03-29 17:02:53 +090091 LOG(ERROR) << __func__ << ": Callback verification failed";
Luke Huang36796f32019-03-13 02:54:45 +080092 return false;
93 }
94 if (mDnsProxyListener.startListener()) {
Bernie Innocentifb8641c2019-03-29 17:02:53 +090095 PLOG(ERROR) << __func__ << ": Unable to start DnsProxyListener";
Luke Huang36796f32019-03-13 02:54:45 +080096 return false;
97 }
98 binder_status_t ret;
99 if ((ret = DnsResolverService::start()) != STATUS_OK) {
Bernie Innocentifb8641c2019-03-29 17:02:53 +0900100 LOG(ERROR) << __func__ << ": Unable to start DnsResolverService: " << ret;
Luke Huang36796f32019-03-13 02:54:45 +0800101 return false;
102 }
103 return true;
104}
105
Ken Chend99022c2019-02-20 21:34:14 +0800106int DnsResolver::setLogSeverity(int32_t logSeverity) {
107 return resolv_set_log_severity(logSeverity);
108}
109
Luke Huang36796f32019-03-13 02:54:45 +0800110} // namespace net
111} // namespace android