|
1 | 1 | //! Asynchronous DNS resolver |
2 | 2 |
|
3 | | -use std::io; |
4 | | -use std::net::{IpAddr, ToSocketAddrs}; |
| 3 | +use std::io::{self, ErrorKind}; |
| 4 | +use std::net::{IpAddr, SocketAddr, ToSocketAddrs}; |
5 | 5 |
|
6 | | -use futures::future; |
| 6 | +use futures::{future, Future}; |
7 | 7 |
|
8 | 8 | use futures_cpupool::CpuPool; |
9 | 9 |
|
10 | 10 | use relay::{boxed_future, BoxIoFuture}; |
| 11 | +use relay::Context; |
11 | 12 |
|
12 | 13 | lazy_static! { |
13 | 14 | static ref GLOBAL_DNS_CPU_POOL: CpuPool = CpuPool::new_num_cpus(); |
14 | 15 | } |
15 | 16 |
|
16 | | -pub fn resolve(addr: &str) -> BoxIoFuture<Vec<IpAddr>> { |
| 17 | +pub fn resolve(addr: &str, port: u16, check_forbidden: bool) -> BoxIoFuture<Vec<SocketAddr>> { |
17 | 18 | // FIXME: Sometimes addr is actually an IpAddr! |
18 | 19 | if let Ok(addr) = addr.parse::<IpAddr>() { |
19 | | - return boxed_future(future::finished(vec![addr])); |
20 | | - } |
| 20 | + if !check_forbidden { |
| 21 | + return boxed_future(future::finished(vec![SocketAddr::new(addr, port)])); |
| 22 | + } |
21 | 23 |
|
22 | | - trace!("Going to resolve \"{}\"", addr); |
23 | | - let owned_addr = format!("{}:0", addr); |
| 24 | + let result = Context::with(move |ctx| { |
| 25 | + let forbidden_ip = &ctx.forbidden_ip(); |
24 | 26 |
|
25 | | - let fut = GLOBAL_DNS_CPU_POOL.spawn_fn(move || { |
26 | | - owned_addr.to_socket_addrs().and_then(|addr_iter| { |
27 | | - let v = addr_iter.map(|addr| addr.ip()).collect::<Vec<IpAddr>>(); |
28 | | - if v.is_empty() { |
29 | | - let err = io::Error::new(io::ErrorKind::Other, format!("Failed to resolve \"{}\"", owned_addr)); |
| 27 | + if forbidden_ip.contains(&addr) { |
| 28 | + let err = io::Error::new(ErrorKind::Other, format!("{} is forbidden, all IPs are filtered", addr)); |
30 | 29 | Err(err) |
31 | 30 | } else { |
32 | | - trace!("Resolved \"{}\" => {:?}", owned_addr, v); |
33 | | - Ok(v) |
| 31 | + Ok(vec![SocketAddr::new(addr, port)]) |
34 | 32 | } |
35 | | - }) |
| 33 | + }); |
| 34 | + |
| 35 | + return boxed_future(future::done(result)); |
| 36 | + } |
| 37 | + |
| 38 | + trace!("Going to resolve \"{}:{}\"", addr, port); |
| 39 | + let owned_addr = addr.to_owned(); |
| 40 | + let fut = GLOBAL_DNS_CPU_POOL.spawn_fn(move || { |
| 41 | + (owned_addr.as_str(), port).to_socket_addrs() |
| 42 | + .map(|a| (owned_addr, a)) |
| 43 | + }) |
| 44 | + .and_then(move |(owned_addr, addr_iter)| { |
| 45 | + let v = if !check_forbidden { |
| 46 | + addr_iter.collect::<Vec<SocketAddr>>() |
| 47 | + } else { |
| 48 | + Context::with(move |ctx| { |
| 49 | + let forbidden_ip = ctx.forbidden_ip(); |
| 50 | + addr_iter.filter(|addr| { |
| 51 | + let filtered = forbidden_ip.contains(&addr.ip()); |
| 52 | + if filtered { |
| 53 | + error!("{} is forbidden", addr.ip()); |
| 54 | + } |
| 55 | + !filtered |
| 56 | + }) |
| 57 | + .collect::<Vec<SocketAddr>>() |
| 58 | + }) |
| 59 | + }; |
| 60 | + |
| 61 | + if v.is_empty() { |
| 62 | + let err = io::Error::new(io::ErrorKind::Other, format!("failed to resolve \"{}:{}\"", owned_addr, port)); |
| 63 | + Err(err) |
| 64 | + } else { |
| 65 | + trace!("Resolved \"{}\" => {:?}", owned_addr, v); |
| 66 | + Ok(v) |
| 67 | + } |
36 | 68 | }); |
37 | 69 |
|
38 | 70 | boxed_future(fut) |
|
0 commit comments