mirror of
https://github.com/AdguardTeam/AdGuardHome.git
synced 2025-03-07 03:05:45 +03:00
Merge in DNS/adguard-home from 6231-filter-local-addrs to master Updates #6231. Squashed commit of the following: commit 9a60d4e33f25c7dd7eaa4366d8397389196156ac Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Thu Sep 28 18:59:51 2023 +0300 dnsforward: imp code commit f0c3452525c227b0ee6e761c4a6b68543900d5b5 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Sep 27 18:12:47 2023 +0300 all: don't match nets commit 572dc0f24e74560adaa4d89ddc921dfd7e1fed02 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Wed Sep 27 13:37:48 2023 +0300 dnsforward: move some code, rm dups commit 3af627ce9c7f6f4d2aa695a7660b8a0027fa241c Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Sep 25 19:21:05 2023 +0300 dnsforward: imp naming commit cad1e4e71662836d1dfc79bc2979599b7a29fea1 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Sep 25 19:17:53 2023 +0300 dnsforward: imp code commit 23d69700789d5652bd25cc089f16afb8b38e51f8 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Mon Sep 25 19:08:48 2023 +0300 dnsforward: add upstream matcher commit 5819c594a2a8d8bf2cd42883133e21ca7ed2681a Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Fri Sep 22 18:31:37 2023 +0300 all: imp code, docs commit d07ea96bb568161e029e22d69329a368d9eeb729 Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Fri Sep 22 18:09:09 2023 +0300 all: imp code commit 38a912a62c63247c4c5bb61b67ccc9bfd255feff Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Fri Sep 22 15:48:25 2023 +0300 all: imp code commit 811212fa16bc231a8da990c075d7231c471c7e3b Author: Eugene Burkov <E.Burkov@AdGuard.COM> Date: Thu Sep 21 19:05:07 2023 +0300 all: imp addrs detection
163 lines
3.5 KiB
Go
163 lines
3.5 KiB
Go
//go:build windows
|
|
|
|
package aghnet
|
|
|
|
import (
|
|
"bufio"
|
|
"fmt"
|
|
"io"
|
|
"net"
|
|
"os/exec"
|
|
"strings"
|
|
"sync"
|
|
|
|
"github.com/AdguardTeam/golibs/errors"
|
|
"github.com/AdguardTeam/golibs/log"
|
|
)
|
|
|
|
// systemResolvers implementation differs for Windows since Go's resolver
|
|
// doesn't work there.
|
|
//
|
|
// See https://github.com/golang/go/issues/33097.
|
|
type systemResolvers struct {
|
|
// addrs is the slice of cached local resolvers' addresses.
|
|
addrs []string
|
|
addrsLock sync.RWMutex
|
|
}
|
|
|
|
func newSystemResolvers(_ HostGenFunc) (sr SystemResolvers) {
|
|
return &systemResolvers{}
|
|
}
|
|
|
|
func (sr *systemResolvers) Get() (rs []string) {
|
|
sr.addrsLock.RLock()
|
|
defer sr.addrsLock.RUnlock()
|
|
|
|
addrs := sr.addrs
|
|
rs = make([]string, len(addrs))
|
|
copy(rs, addrs)
|
|
|
|
return rs
|
|
}
|
|
|
|
// writeExit writes "exit" to w and closes it. It is supposed to be run in
|
|
// a goroutine.
|
|
func writeExit(w io.WriteCloser) {
|
|
defer log.OnPanic("systemResolvers: writeExit")
|
|
|
|
defer func() {
|
|
derr := w.Close()
|
|
if derr != nil {
|
|
log.Error("systemResolvers: writeExit: closing: %s", derr)
|
|
}
|
|
}()
|
|
|
|
_, err := io.WriteString(w, "exit")
|
|
if err != nil {
|
|
log.Error("systemResolvers: writeExit: writing: %s", err)
|
|
}
|
|
}
|
|
|
|
// scanAddrs scans the DNS addresses from nslookup's output. The expected
|
|
// output of nslookup looks like this:
|
|
//
|
|
// Default Server: 192-168-1-1.qualified.domain.ru
|
|
// Address: 192.168.1.1
|
|
func scanAddrs(s *bufio.Scanner) (addrs []string) {
|
|
for s.Scan() {
|
|
line := strings.TrimSpace(s.Text())
|
|
fields := strings.Fields(line)
|
|
if len(fields) != 2 || fields[0] != "Address:" {
|
|
continue
|
|
}
|
|
|
|
// If the address contains port then it is separated with '#'.
|
|
ipPort := strings.Split(fields[1], "#")
|
|
if len(ipPort) == 0 {
|
|
continue
|
|
}
|
|
|
|
addr := ipPort[0]
|
|
if net.ParseIP(addr) == nil {
|
|
log.Debug("systemResolvers: %q is not a valid ip", addr)
|
|
|
|
continue
|
|
}
|
|
|
|
addrs = append(addrs, addr)
|
|
}
|
|
|
|
return addrs
|
|
}
|
|
|
|
// getAddrs gets local resolvers' addresses from OS in a special Windows way.
|
|
//
|
|
// TODO(e.burkov): This whole function needs more detailed research on getting
|
|
// local resolvers addresses on Windows. We execute the external command for
|
|
// now that is not the most accurate way.
|
|
func (sr *systemResolvers) getAddrs() (addrs []string, err error) {
|
|
var cmdPath string
|
|
cmdPath, err = exec.LookPath("nslookup.exe")
|
|
if err != nil {
|
|
return nil, fmt.Errorf("looking up cmd path: %w", err)
|
|
}
|
|
|
|
cmd := exec.Command(cmdPath)
|
|
|
|
var stdin io.WriteCloser
|
|
stdin, err = cmd.StdinPipe()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("getting the command's stdin pipe: %w", err)
|
|
}
|
|
|
|
var stdout io.ReadCloser
|
|
stdout, err = cmd.StdoutPipe()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("getting the command's stdout pipe: %w", err)
|
|
}
|
|
|
|
go writeExit(stdin)
|
|
|
|
err = cmd.Start()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("start command executing: %w", err)
|
|
}
|
|
|
|
s := bufio.NewScanner(stdout)
|
|
addrs = scanAddrs(s)
|
|
|
|
err = cmd.Wait()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("executing the command: %w", err)
|
|
}
|
|
|
|
err = s.Err()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("scanning output: %w", err)
|
|
}
|
|
|
|
// Don't close StdoutPipe since Wait do it for us in ¿most? cases.
|
|
//
|
|
// See [exec.Cmd.StdoutPipe].
|
|
|
|
return addrs, nil
|
|
}
|
|
|
|
func (sr *systemResolvers) refresh() (err error) {
|
|
defer func() { err = errors.Annotate(err, "systemResolvers: %w") }()
|
|
|
|
got, err := sr.getAddrs()
|
|
if err != nil {
|
|
return fmt.Errorf("can't get addresses: %w", err)
|
|
}
|
|
if len(got) == 0 {
|
|
return nil
|
|
}
|
|
|
|
sr.addrsLock.Lock()
|
|
defer sr.addrsLock.Unlock()
|
|
|
|
sr.addrs = got
|
|
|
|
return nil
|
|
}
|