mirror of
https://github.com/Start9Labs/start-os.git
synced 2026-03-26 10:21:52 +00:00
* the only way to begin is by beginning * chore: Convert over 3444 migration * fix imports * wip * feat: convert volume * convert: system.rs * wip(convert): Setup * wip properties * wip notifications * wip * wip migration * wip init * wip auth/control * wip action * wip control * wiip 034 * wip 344 * wip some more versions converted * feat: Reserialize the version of the db * wip rest of the versions * wip s9pk/manifest * wip wifi * chore: net/keys * chore: net/dns * wip net/dhcp * wip manager manager-map * gut dependency errors * wip update/mod * detect breakages locally for updates * wip: manager/mod * wip: manager/health * wip: backup/target/mod * fix: Typo addresses * clean control.rs * fix system package id * switch to btreemap for now * config wip * wip manager/mod * install wip Co-authored-by: J H <Blu-J@users.noreply.github.com> * chore: Update the last of the errors * feat: Change the prelude de to borrow * feat: Adding in some more things * chore: add to the prelude * chore: Small fixes * chore: Fixing the small errors * wip: Cleaning up check errors * wip: Fix some of the issues * chore: Fix setup * chore:fix version * chore: prelude, mod, http_reader * wip backup_bulk * chore: Last of the errors * upadte package.json * chore: changes needed for a build * chore: Removing some of the linting errors in the manager * chore: Some linting 101 * fix: Wrong order of who owns what * chore: Remove the unstable * chore: Remove the test in the todo * @dr-bonez did a refactoring on the backup * chore: Make sure that there can only be one override guard at a time * resolve most todos * wip: Add some more tracing to debug an error * wip: Use a mv instead of rename * wip: Revert some of the missing code segments found earlier * chore: Make the build * chore: Something about the lib looks like it iis broken * wip: More instrument and dev working * kill netdummy before creating it * better db analysis tools * fixes from testing * fix: Make add start the service * fix status after install * make wormhole * fix missing icon file * fix data url for icons * fix: Bad deser * bugfixes * fix: Backup * fix: Some of the restor * fix: Restoring works * update frontend patch-db types * hack it in (#2424) * hack it in * optimize * slightly cleaner * handle config pointers * dependency config errs * fix compat * cache docker * fix dependency expectation * fix dependency auto-config --------- Co-authored-by: Aiden McClelland <me@drbonez.dev> Co-authored-by: Matt Hill <mattnine@protonmail.com> Co-authored-by: J H <Blu-J@users.noreply.github.com> Co-authored-by: Matt Hill <MattDHill@users.noreply.github.com>
229 lines
8.0 KiB
Rust
229 lines
8.0 KiB
Rust
use std::borrow::Borrow;
|
|
use std::collections::BTreeMap;
|
|
use std::net::{Ipv4Addr, SocketAddr};
|
|
use std::sync::{Arc, Weak};
|
|
use std::time::Duration;
|
|
|
|
use color_eyre::eyre::eyre;
|
|
use futures::TryFutureExt;
|
|
use helpers::NonDetachingJoinHandle;
|
|
use models::PackageId;
|
|
use tokio::net::{TcpListener, UdpSocket};
|
|
use tokio::process::Command;
|
|
use tokio::sync::RwLock;
|
|
use tracing::instrument;
|
|
use trust_dns_server::authority::MessageResponseBuilder;
|
|
use trust_dns_server::client::op::{Header, ResponseCode};
|
|
use trust_dns_server::client::rr::{Name, Record, RecordType};
|
|
use trust_dns_server::server::{Request, RequestHandler, ResponseHandler, ResponseInfo};
|
|
use trust_dns_server::ServerFuture;
|
|
|
|
use crate::util::Invoke;
|
|
use crate::{Error, ErrorKind, ResultExt};
|
|
|
|
pub struct DnsController {
|
|
services: Weak<RwLock<BTreeMap<Option<PackageId>, BTreeMap<Ipv4Addr, Weak<()>>>>>,
|
|
#[allow(dead_code)]
|
|
dns_server: NonDetachingJoinHandle<Result<(), Error>>,
|
|
}
|
|
|
|
struct Resolver {
|
|
services: Arc<RwLock<BTreeMap<Option<PackageId>, BTreeMap<Ipv4Addr, Weak<()>>>>>,
|
|
}
|
|
impl Resolver {
|
|
async fn resolve(&self, name: &Name) -> Option<Vec<Ipv4Addr>> {
|
|
match name.iter().next_back() {
|
|
Some(b"embassy") => {
|
|
if let Some(pkg) = name.iter().rev().skip(1).next() {
|
|
if let Some(ip) = self.services.read().await.get(&Some(
|
|
std::str::from_utf8(pkg)
|
|
.unwrap_or_default()
|
|
.parse()
|
|
.unwrap_or_default(),
|
|
)) {
|
|
Some(
|
|
ip.iter()
|
|
.filter(|(_, rc)| rc.strong_count() > 0)
|
|
.map(|(ip, _)| *ip)
|
|
.collect(),
|
|
)
|
|
} else {
|
|
None
|
|
}
|
|
} else if let Some(ip) = self.services.read().await.get(&None) {
|
|
Some(
|
|
ip.iter()
|
|
.filter(|(_, rc)| rc.strong_count() > 0)
|
|
.map(|(ip, _)| *ip)
|
|
.collect(),
|
|
)
|
|
} else {
|
|
None
|
|
}
|
|
}
|
|
_ => None,
|
|
}
|
|
}
|
|
}
|
|
|
|
#[async_trait::async_trait]
|
|
impl RequestHandler for Resolver {
|
|
async fn handle_request<R: ResponseHandler>(
|
|
&self,
|
|
request: &Request,
|
|
mut response_handle: R,
|
|
) -> ResponseInfo {
|
|
let query = request.request_info().query;
|
|
if let Some(ip) = self.resolve(query.name().borrow()).await {
|
|
match query.query_type() {
|
|
RecordType::A => {
|
|
response_handle
|
|
.send_response(
|
|
MessageResponseBuilder::from_message_request(&*request).build(
|
|
Header::response_from_request(request.header()),
|
|
&ip.into_iter()
|
|
.map(|ip| {
|
|
Record::from_rdata(
|
|
request.request_info().query.name().to_owned().into(),
|
|
0,
|
|
trust_dns_server::client::rr::RData::A(ip),
|
|
)
|
|
})
|
|
.collect::<Vec<_>>(),
|
|
[],
|
|
[],
|
|
[],
|
|
),
|
|
)
|
|
.await
|
|
}
|
|
a => {
|
|
if a != RecordType::AAAA {
|
|
tracing::warn!(
|
|
"Non A-Record requested for {}: {:?}",
|
|
query.name(),
|
|
query.query_type()
|
|
);
|
|
}
|
|
let mut res = Header::response_from_request(request.header());
|
|
res.set_response_code(ResponseCode::NXDomain);
|
|
response_handle
|
|
.send_response(
|
|
MessageResponseBuilder::from_message_request(&*request).build(
|
|
res.into(),
|
|
[],
|
|
[],
|
|
[],
|
|
[],
|
|
),
|
|
)
|
|
.await
|
|
}
|
|
}
|
|
} else {
|
|
let mut res = Header::response_from_request(request.header());
|
|
res.set_response_code(ResponseCode::NXDomain);
|
|
response_handle
|
|
.send_response(
|
|
MessageResponseBuilder::from_message_request(&*request).build(
|
|
res.into(),
|
|
[],
|
|
[],
|
|
[],
|
|
[],
|
|
),
|
|
)
|
|
.await
|
|
}
|
|
.unwrap_or_else(|e| {
|
|
tracing::error!("{}", e);
|
|
tracing::debug!("{:?}", e);
|
|
let mut res = Header::response_from_request(request.header());
|
|
res.set_response_code(ResponseCode::ServFail);
|
|
res.into()
|
|
})
|
|
}
|
|
}
|
|
|
|
impl DnsController {
|
|
#[instrument(skip_all)]
|
|
pub async fn init(bind: &[SocketAddr]) -> Result<Self, Error> {
|
|
let services = Arc::new(RwLock::new(BTreeMap::new()));
|
|
|
|
let mut server = ServerFuture::new(Resolver {
|
|
services: services.clone(),
|
|
});
|
|
server.register_listener(
|
|
TcpListener::bind(bind)
|
|
.await
|
|
.with_kind(ErrorKind::Network)?,
|
|
Duration::from_secs(30),
|
|
);
|
|
server.register_socket(UdpSocket::bind(bind).await.with_kind(ErrorKind::Network)?);
|
|
|
|
Command::new("resolvectl")
|
|
.arg("dns")
|
|
.arg("br-start9")
|
|
.arg("127.0.0.1")
|
|
.invoke(ErrorKind::Network)
|
|
.await?;
|
|
Command::new("resolvectl")
|
|
.arg("domain")
|
|
.arg("br-start9")
|
|
.arg("embassy")
|
|
.invoke(ErrorKind::Network)
|
|
.await?;
|
|
|
|
let dns_server = tokio::spawn(
|
|
server
|
|
.block_until_done()
|
|
.map_err(|e| Error::new(e, ErrorKind::Network)),
|
|
)
|
|
.into();
|
|
|
|
Ok(Self {
|
|
services: Arc::downgrade(&services),
|
|
dns_server,
|
|
})
|
|
}
|
|
|
|
pub async fn add(&self, pkg_id: Option<PackageId>, ip: Ipv4Addr) -> Result<Arc<()>, Error> {
|
|
if let Some(services) = Weak::upgrade(&self.services) {
|
|
let mut writable = services.write().await;
|
|
let mut ips = writable.remove(&pkg_id).unwrap_or_default();
|
|
let rc = if let Some(rc) = Weak::upgrade(&ips.remove(&ip).unwrap_or_default()) {
|
|
rc
|
|
} else {
|
|
Arc::new(())
|
|
};
|
|
ips.insert(ip, Arc::downgrade(&rc));
|
|
writable.insert(pkg_id, ips);
|
|
Ok(rc)
|
|
} else {
|
|
Err(Error::new(
|
|
eyre!("DNS Server Thread has exited"),
|
|
crate::ErrorKind::Network,
|
|
))
|
|
}
|
|
}
|
|
|
|
pub async fn gc(&self, pkg_id: Option<PackageId>, ip: Ipv4Addr) -> Result<(), Error> {
|
|
if let Some(services) = Weak::upgrade(&self.services) {
|
|
let mut writable = services.write().await;
|
|
let mut ips = writable.remove(&pkg_id).unwrap_or_default();
|
|
if let Some(rc) = Weak::upgrade(&ips.remove(&ip).unwrap_or_default()) {
|
|
ips.insert(ip, Arc::downgrade(&rc));
|
|
}
|
|
if !ips.is_empty() {
|
|
writable.insert(pkg_id, ips);
|
|
}
|
|
Ok(())
|
|
} else {
|
|
Err(Error::new(
|
|
eyre!("DNS Server Thread has exited"),
|
|
crate::ErrorKind::Network,
|
|
))
|
|
}
|
|
}
|
|
}
|