blob: 06ce2143f56b676cadad440fadb332d853a2b431 [file] [log] [blame]
Luke Huang36796f32019-03-13 02:54:45 +08001/**
2 * Copyright (c) 2019, The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Mike Yu7eb1e332021-10-21 11:13:30 +080017#define LOG_TAG "resolv"
18
Luke Huang36796f32019-03-13 02:54:45 +080019#include "DnsResolver.h"
20
21#include <android-base/logging.h>
Luke Huang36796f32019-03-13 02:54:45 +080022
Luke Huang36796f32019-03-13 02:54:45 +080023#include "DnsProxyListener.h"
24#include "DnsResolverService.h"
Mike Yu5448c9e2020-12-14 16:45:16 +080025#include "DnsTlsDispatcher.h"
26#include "PrivateDnsConfiguration.h"
Bernie Innocentie71a28a2019-05-29 00:42:35 +090027#include "netd_resolv/resolv.h"
28#include "res_debug.h"
Luke Huang5729afc2020-07-30 23:12:17 +080029#include "util.h"
Luke Huang36796f32019-03-13 02:54:45 +080030
Bernie Innocentic19a4642019-05-16 18:38:47 +090031bool resolv_init(const ResolverNetdCallbacks* callbacks) {
Luke Huang36796f32019-03-13 02:54:45 +080032 android::base::InitLogging(/*argv=*/nullptr);
Bernie Innocentifb8641c2019-03-29 17:02:53 +090033 LOG(INFO) << __func__ << ": Initializing resolver";
Luke Huang7b2978e2020-10-21 18:24:29 +080034 // TODO(b/170539625): restore log level to WARNING after clarifying flaky tests.
Luke Huang53d3eb22021-07-19 15:08:56 +080035 const bool isDebug = isUserDebugBuild();
36 resolv_set_log_severity(isDebug ? android::base::DEBUG : android::base::WARNING);
Matthew Maurer6b178422021-09-16 17:08:51 -070037 doh_init_logger(isDebug ? DOH_LOG_LEVEL_DEBUG : DOH_LOG_LEVEL_WARN);
Sehee Parkd975bf32019-08-07 13:21:16 +090038 using android::net::gApiLevel;
Luke Huang5729afc2020-07-30 23:12:17 +080039 gApiLevel = getApiLevel();
Sehee Parkd975bf32019-08-07 13:21:16 +090040 using android::net::gResNetdCallbacks;
41 gResNetdCallbacks.check_calling_permission = callbacks->check_calling_permission;
42 gResNetdCallbacks.get_network_context = callbacks->get_network_context;
43 gResNetdCallbacks.log = callbacks->log;
44 if (gApiLevel >= 30) {
45 gResNetdCallbacks.tagSocket = callbacks->tagSocket;
Felipe Mosso Ferfoglia23b540f2019-08-07 15:47:53 -030046 gResNetdCallbacks.evaluate_domain_name = callbacks->evaluate_domain_name;
Sehee Parkd975bf32019-08-07 13:21:16 +090047 }
Luke Huang36796f32019-03-13 02:54:45 +080048 android::net::gDnsResolv = android::net::DnsResolver::getInstance();
49 return android::net::gDnsResolv->start();
50}
51
52namespace android {
53namespace net {
54
55namespace {
56
57bool verifyCallbacks() {
Sehee Parkd975bf32019-08-07 13:21:16 +090058 if (!(gResNetdCallbacks.check_calling_permission && gResNetdCallbacks.get_network_context &&
59 gResNetdCallbacks.log)) {
60 return false;
61 }
62 if (gApiLevel >= 30) {
63 return gResNetdCallbacks.tagSocket != nullptr;
64 }
65 return true;
Luke Huang36796f32019-03-13 02:54:45 +080066}
67
68} // namespace
69
70DnsResolver* gDnsResolv = nullptr;
71ResolverNetdCallbacks gResNetdCallbacks;
Luke Huangc6bbbe72019-03-28 21:38:28 +080072netdutils::Log gDnsResolverLog("dnsResolver");
Sehee Parkd975bf32019-08-07 13:21:16 +090073uint64_t gApiLevel = 0;
Luke Huang36796f32019-03-13 02:54:45 +080074
75DnsResolver* DnsResolver::getInstance() {
76 // Instantiated on first use.
77 static DnsResolver instance;
78 return &instance;
79}
80
Mike Yu5448c9e2020-12-14 16:45:16 +080081DnsResolver::DnsResolver() {
82 // TODO: make them member variables after fixing the circular dependency:
83 // DnsTlsDispatcher.h -> resolv_private.h -> DnsResolver.h -> DnsTlsDispatcher.h
84 auto& dnsTlsDispatcher = DnsTlsDispatcher::getInstance();
85 auto& privateDnsConfiguration = PrivateDnsConfiguration::getInstance();
86 privateDnsConfiguration.setObserver(&dnsTlsDispatcher);
Luke Huang2fe9c732021-07-06 01:48:02 +080087 if (isDoHEnabled()) privateDnsConfiguration.initDoh();
Mike Yu5448c9e2020-12-14 16:45:16 +080088}
89
Luke Huang36796f32019-03-13 02:54:45 +080090bool DnsResolver::start() {
91 if (!verifyCallbacks()) {
Bernie Innocentifb8641c2019-03-29 17:02:53 +090092 LOG(ERROR) << __func__ << ": Callback verification failed";
Luke Huang36796f32019-03-13 02:54:45 +080093 return false;
94 }
95 if (mDnsProxyListener.startListener()) {
Bernie Innocentifb8641c2019-03-29 17:02:53 +090096 PLOG(ERROR) << __func__ << ": Unable to start DnsProxyListener";
Luke Huang36796f32019-03-13 02:54:45 +080097 return false;
98 }
99 binder_status_t ret;
100 if ((ret = DnsResolverService::start()) != STATUS_OK) {
Bernie Innocentifb8641c2019-03-29 17:02:53 +0900101 LOG(ERROR) << __func__ << ": Unable to start DnsResolverService: " << ret;
Luke Huang36796f32019-03-13 02:54:45 +0800102 return false;
103 }
104 return true;
105}
106
Ken Chend99022c2019-02-20 21:34:14 +0800107int DnsResolver::setLogSeverity(int32_t logSeverity) {
108 return resolv_set_log_severity(logSeverity);
109}
110
Luke Huang36796f32019-03-13 02:54:45 +0800111} // namespace net
112} // namespace android