blob: 59ce03aeebb803200e290029bed668c0854cba3b [file] [log] [blame]
Luke Huang36796f32019-03-13 02:54:45 +08001/**
2 * Copyright (c) 2019, The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Mike Yu7eb1e332021-10-21 11:13:30 +080017#define LOG_TAG "resolv"
18
Luke Huang36796f32019-03-13 02:54:45 +080019#include "DnsResolver.h"
20
21#include <android-base/logging.h>
Luke Huang36796f32019-03-13 02:54:45 +080022
Luke Huang36796f32019-03-13 02:54:45 +080023#include "DnsProxyListener.h"
24#include "DnsResolverService.h"
Mike Yu5448c9e2020-12-14 16:45:16 +080025#include "DnsTlsDispatcher.h"
26#include "PrivateDnsConfiguration.h"
Bernie Innocentie71a28a2019-05-29 00:42:35 +090027#include "netd_resolv/resolv.h"
28#include "res_debug.h"
Luke Huang5729afc2020-07-30 23:12:17 +080029#include "util.h"
Luke Huang36796f32019-03-13 02:54:45 +080030
Bernie Innocentic19a4642019-05-16 18:38:47 +090031bool resolv_init(const ResolverNetdCallbacks* callbacks) {
Luke Huang36796f32019-03-13 02:54:45 +080032 android::base::InitLogging(/*argv=*/nullptr);
Bernie Innocentifb8641c2019-03-29 17:02:53 +090033 LOG(INFO) << __func__ << ": Initializing resolver";
Ken Chen70e9ff92022-03-22 00:53:46 +080034 resolv_set_log_severity(android::base::WARNING);
35 doh_init_logger(DOH_LOG_LEVEL_WARN);
Sehee Parkd975bf32019-08-07 13:21:16 +090036 using android::net::gApiLevel;
Luke Huang5729afc2020-07-30 23:12:17 +080037 gApiLevel = getApiLevel();
Sehee Parkd975bf32019-08-07 13:21:16 +090038 using android::net::gResNetdCallbacks;
39 gResNetdCallbacks.check_calling_permission = callbacks->check_calling_permission;
40 gResNetdCallbacks.get_network_context = callbacks->get_network_context;
41 gResNetdCallbacks.log = callbacks->log;
42 if (gApiLevel >= 30) {
43 gResNetdCallbacks.tagSocket = callbacks->tagSocket;
Felipe Mosso Ferfoglia23b540f2019-08-07 15:47:53 -030044 gResNetdCallbacks.evaluate_domain_name = callbacks->evaluate_domain_name;
Sehee Parkd975bf32019-08-07 13:21:16 +090045 }
Luke Huang36796f32019-03-13 02:54:45 +080046 android::net::gDnsResolv = android::net::DnsResolver::getInstance();
47 return android::net::gDnsResolv->start();
48}
49
50namespace android {
51namespace net {
52
53namespace {
54
55bool verifyCallbacks() {
Sehee Parkd975bf32019-08-07 13:21:16 +090056 if (!(gResNetdCallbacks.check_calling_permission && gResNetdCallbacks.get_network_context &&
57 gResNetdCallbacks.log)) {
58 return false;
59 }
60 if (gApiLevel >= 30) {
61 return gResNetdCallbacks.tagSocket != nullptr;
62 }
63 return true;
Luke Huang36796f32019-03-13 02:54:45 +080064}
65
66} // namespace
67
68DnsResolver* gDnsResolv = nullptr;
69ResolverNetdCallbacks gResNetdCallbacks;
Luke Huangc6bbbe72019-03-28 21:38:28 +080070netdutils::Log gDnsResolverLog("dnsResolver");
Sehee Parkd975bf32019-08-07 13:21:16 +090071uint64_t gApiLevel = 0;
Luke Huang36796f32019-03-13 02:54:45 +080072
73DnsResolver* DnsResolver::getInstance() {
74 // Instantiated on first use.
75 static DnsResolver instance;
76 return &instance;
77}
78
Mike Yu5448c9e2020-12-14 16:45:16 +080079DnsResolver::DnsResolver() {
80 // TODO: make them member variables after fixing the circular dependency:
81 // DnsTlsDispatcher.h -> resolv_private.h -> DnsResolver.h -> DnsTlsDispatcher.h
82 auto& dnsTlsDispatcher = DnsTlsDispatcher::getInstance();
83 auto& privateDnsConfiguration = PrivateDnsConfiguration::getInstance();
84 privateDnsConfiguration.setObserver(&dnsTlsDispatcher);
Luke Huang2fe9c732021-07-06 01:48:02 +080085 if (isDoHEnabled()) privateDnsConfiguration.initDoh();
Mike Yu5448c9e2020-12-14 16:45:16 +080086}
87
Luke Huang36796f32019-03-13 02:54:45 +080088bool DnsResolver::start() {
89 if (!verifyCallbacks()) {
Bernie Innocentifb8641c2019-03-29 17:02:53 +090090 LOG(ERROR) << __func__ << ": Callback verification failed";
Luke Huang36796f32019-03-13 02:54:45 +080091 return false;
92 }
93 if (mDnsProxyListener.startListener()) {
Bernie Innocentifb8641c2019-03-29 17:02:53 +090094 PLOG(ERROR) << __func__ << ": Unable to start DnsProxyListener";
Luke Huang36796f32019-03-13 02:54:45 +080095 return false;
96 }
97 binder_status_t ret;
98 if ((ret = DnsResolverService::start()) != STATUS_OK) {
Bernie Innocentifb8641c2019-03-29 17:02:53 +090099 LOG(ERROR) << __func__ << ": Unable to start DnsResolverService: " << ret;
Luke Huang36796f32019-03-13 02:54:45 +0800100 return false;
101 }
102 return true;
103}
104
Ken Chend99022c2019-02-20 21:34:14 +0800105int DnsResolver::setLogSeverity(int32_t logSeverity) {
106 return resolv_set_log_severity(logSeverity);
107}
108
Luke Huang36796f32019-03-13 02:54:45 +0800109} // namespace net
110} // namespace android