mirror of
https://github.com/DNSCrypt/dnscrypt-proxy.git
synced 2025-04-05 06:07:36 +03:00
675 lines
23 KiB
Go
675 lines
23 KiB
Go
package main
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"flag"
|
|
"fmt"
|
|
"math/rand"
|
|
"net/http"
|
|
"net/url"
|
|
"os"
|
|
"path"
|
|
"path/filepath"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/BurntSushi/toml"
|
|
"github.com/jedisct1/dlog"
|
|
stamps "github.com/jedisct1/go-dnsstamps"
|
|
netproxy "golang.org/x/net/proxy"
|
|
)
|
|
|
|
const (
|
|
MaxTimeout = 3600
|
|
DefaultNetprobeAddress = "9.9.9.9:53"
|
|
)
|
|
|
|
type Config struct {
|
|
LogLevel int `toml:"log_level"`
|
|
LogFile *string `toml:"log_file"`
|
|
UseSyslog bool `toml:"use_syslog"`
|
|
ServerNames []string `toml:"server_names"`
|
|
DisabledServerNames []string `toml:"disabled_server_names"`
|
|
ListenAddresses []string `toml:"listen_addresses"`
|
|
Daemonize bool
|
|
UserName string `toml:"user_name"`
|
|
ForceTCP bool `toml:"force_tcp"`
|
|
Timeout int `toml:"timeout"`
|
|
KeepAlive int `toml:"keepalive"`
|
|
Proxy string `toml:"proxy"`
|
|
CertRefreshDelay int `toml:"cert_refresh_delay"`
|
|
CertIgnoreTimestamp bool `toml:"cert_ignore_timestamp"`
|
|
EphemeralKeys bool `toml:"dnscrypt_ephemeral_keys"`
|
|
LBStrategy string `toml:"lb_strategy"`
|
|
LBEstimator bool `toml:"lb_estimator"`
|
|
BlockIPv6 bool `toml:"block_ipv6"`
|
|
Cache bool
|
|
CacheSize int `toml:"cache_size"`
|
|
CacheNegTTL uint32 `toml:"cache_neg_ttl"`
|
|
CacheNegMinTTL uint32 `toml:"cache_neg_min_ttl"`
|
|
CacheNegMaxTTL uint32 `toml:"cache_neg_max_ttl"`
|
|
CacheMinTTL uint32 `toml:"cache_min_ttl"`
|
|
CacheMaxTTL uint32 `toml:"cache_max_ttl"`
|
|
QueryLog QueryLogConfig `toml:"query_log"`
|
|
NxLog NxLogConfig `toml:"nx_log"`
|
|
BlockName BlockNameConfig `toml:"blacklist"`
|
|
WhitelistName WhitelistNameConfig `toml:"whitelist"`
|
|
BlockIP BlockIPConfig `toml:"ip_blacklist"`
|
|
ForwardFile string `toml:"forwarding_rules"`
|
|
CloakFile string `toml:"cloaking_rules"`
|
|
ServersConfig map[string]StaticConfig `toml:"static"`
|
|
SourcesConfig map[string]SourceConfig `toml:"sources"`
|
|
SourceRequireDNSSEC bool `toml:"require_dnssec"`
|
|
SourceRequireNoLog bool `toml:"require_nolog"`
|
|
SourceRequireNoFilter bool `toml:"require_nofilter"`
|
|
SourceDNSCrypt bool `toml:"dnscrypt_servers"`
|
|
SourceDoH bool `toml:"doh_servers"`
|
|
SourceIPv4 bool `toml:"ipv4_servers"`
|
|
SourceIPv6 bool `toml:"ipv6_servers"`
|
|
MaxClients uint32 `toml:"max_clients"`
|
|
FallbackResolver string `toml:"fallback_resolver"`
|
|
IgnoreSystemDNS bool `toml:"ignore_system_dns"`
|
|
AllWeeklyRanges map[string]WeeklyRangesStr `toml:"schedules"`
|
|
LogMaxSize int `toml:"log_files_max_size"`
|
|
LogMaxAge int `toml:"log_files_max_age"`
|
|
LogMaxBackups int `toml:"log_files_max_backups"`
|
|
TLSDisableSessionTickets bool `toml:"tls_disable_session_tickets"`
|
|
TLSCipherSuite []uint16 `toml:"tls_cipher_suite"`
|
|
NetprobeAddress string `toml:"netprobe_address"`
|
|
NetprobeTimeout int `toml:"netprobe_timeout"`
|
|
OfflineMode bool `toml:"offline_mode"`
|
|
HTTPProxyURL string `toml:"http_proxy"`
|
|
RefusedCodeInResponses bool `toml:"refused_code_in_responses"`
|
|
BlockedQueryResponse string `toml:"blocked_query_response"`
|
|
QueryMeta []string `toml:"query_meta"`
|
|
AnonymizedDNS AnonymizedDNSConfig `toml:"anonymized_dns"`
|
|
}
|
|
|
|
func newConfig() Config {
|
|
return Config{
|
|
LogLevel: int(dlog.LogLevel()),
|
|
ListenAddresses: []string{"127.0.0.1:53"},
|
|
Timeout: 2500,
|
|
KeepAlive: 5,
|
|
CertRefreshDelay: 240,
|
|
CertIgnoreTimestamp: false,
|
|
EphemeralKeys: false,
|
|
Cache: true,
|
|
CacheSize: 512,
|
|
CacheNegTTL: 0,
|
|
CacheNegMinTTL: 60,
|
|
CacheNegMaxTTL: 600,
|
|
CacheMinTTL: 60,
|
|
CacheMaxTTL: 8600,
|
|
SourceRequireNoLog: true,
|
|
SourceRequireNoFilter: true,
|
|
SourceIPv4: true,
|
|
SourceIPv6: false,
|
|
SourceDNSCrypt: true,
|
|
SourceDoH: true,
|
|
MaxClients: 250,
|
|
FallbackResolver: DefaultFallbackResolver,
|
|
IgnoreSystemDNS: false,
|
|
LogMaxSize: 10,
|
|
LogMaxAge: 7,
|
|
LogMaxBackups: 1,
|
|
TLSDisableSessionTickets: false,
|
|
TLSCipherSuite: nil,
|
|
NetprobeTimeout: 60,
|
|
OfflineMode: false,
|
|
RefusedCodeInResponses: false,
|
|
LBEstimator: true,
|
|
BlockedQueryResponse: "hinfo",
|
|
}
|
|
}
|
|
|
|
type StaticConfig struct {
|
|
Stamp string
|
|
}
|
|
|
|
type SourceConfig struct {
|
|
URL string
|
|
URLs []string
|
|
MinisignKeyStr string `toml:"minisign_key"`
|
|
CacheFile string `toml:"cache_file"`
|
|
FormatStr string `toml:"format"`
|
|
RefreshDelay int `toml:"refresh_delay"`
|
|
Prefix string
|
|
}
|
|
|
|
type QueryLogConfig struct {
|
|
File string
|
|
Format string
|
|
IgnoredQtypes []string `toml:"ignored_qtypes"`
|
|
}
|
|
|
|
type NxLogConfig struct {
|
|
File string
|
|
Format string
|
|
}
|
|
|
|
type BlockNameConfig struct {
|
|
File string `toml:"blacklist_file"`
|
|
LogFile string `toml:"log_file"`
|
|
Format string `toml:"log_format"`
|
|
}
|
|
|
|
type WhitelistNameConfig struct {
|
|
File string `toml:"whitelist_file"`
|
|
LogFile string `toml:"log_file"`
|
|
Format string `toml:"log_format"`
|
|
}
|
|
|
|
type BlockIPConfig struct {
|
|
File string `toml:"blacklist_file"`
|
|
LogFile string `toml:"log_file"`
|
|
Format string `toml:"log_format"`
|
|
}
|
|
|
|
type AnonymizedDNSRouteConfig struct {
|
|
ServerName string `toml:"server_name"`
|
|
RelayName string `toml:"via"`
|
|
}
|
|
|
|
type AnonymizedDNSConfig struct {
|
|
Routes []AnonymizedDNSRouteConfig `toml:"routes"`
|
|
}
|
|
|
|
type ServerSummary struct {
|
|
Name string `json:"name"`
|
|
Proto string `json:"proto"`
|
|
IPv6 bool `json:"ipv6"`
|
|
Addrs []string `json:"addrs,omitempty"`
|
|
Ports []int `json:"ports"`
|
|
DNSSEC bool `json:"dnssec"`
|
|
NoLog bool `json:"nolog"`
|
|
NoFilter bool `json:"nofilter"`
|
|
Description string `json:"description,omitempty"`
|
|
}
|
|
|
|
func findConfigFile(configFile *string) (string, error) {
|
|
if _, err := os.Stat(*configFile); os.IsNotExist(err) {
|
|
cdLocal()
|
|
if _, err := os.Stat(*configFile); err != nil {
|
|
return "", err
|
|
}
|
|
}
|
|
pwd, err := os.Getwd()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
if filepath.IsAbs(*configFile) {
|
|
return *configFile, nil
|
|
}
|
|
return path.Join(pwd, *configFile), nil
|
|
}
|
|
|
|
func ConfigLoad(proxy *Proxy, svcFlag *string) error {
|
|
version := flag.Bool("version", false, "print current proxy version")
|
|
resolve := flag.String("resolve", "", "resolve a name using system libraries")
|
|
list := flag.Bool("list", false, "print the list of available resolvers for the enabled filters")
|
|
listAll := flag.Bool("list-all", false, "print the complete list of available resolvers, ignoring filters")
|
|
jsonOutput := flag.Bool("json", false, "output list as JSON")
|
|
check := flag.Bool("check", false, "check the configuration file and exit")
|
|
configFile := flag.String("config", DefaultConfigFileName, "Path to the configuration file")
|
|
child := flag.Bool("child", false, "Invokes program as a child process")
|
|
netprobeTimeoutOverride := flag.Int("netprobe-timeout", 60, "Override the netprobe timeout")
|
|
showCerts := flag.Bool("show-certs", false, "print DoH certificate chain hashes")
|
|
|
|
flag.Parse()
|
|
|
|
if *svcFlag == "stop" || *svcFlag == "uninstall" {
|
|
return nil
|
|
}
|
|
if *version {
|
|
fmt.Println(AppVersion)
|
|
os.Exit(0)
|
|
}
|
|
if resolve != nil && len(*resolve) > 0 {
|
|
Resolve(*resolve)
|
|
os.Exit(0)
|
|
}
|
|
|
|
foundConfigFile, err := findConfigFile(configFile)
|
|
if err != nil {
|
|
dlog.Fatalf("Unable to load the configuration file [%s] -- Maybe use the -config command-line switch?", *configFile)
|
|
}
|
|
config := newConfig()
|
|
md, err := toml.DecodeFile(foundConfigFile, &config)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
undecoded := md.Undecoded()
|
|
if len(undecoded) > 0 {
|
|
return fmt.Errorf("Unsupported key in configuration file: [%s]", undecoded[0])
|
|
}
|
|
cdFileDir(foundConfigFile)
|
|
if config.LogLevel >= 0 && config.LogLevel < int(dlog.SeverityLast) {
|
|
dlog.SetLogLevel(dlog.Severity(config.LogLevel))
|
|
}
|
|
if dlog.LogLevel() <= dlog.SeverityDebug && os.Getenv("DEBUG") == "" {
|
|
dlog.SetLogLevel(dlog.SeverityInfo)
|
|
}
|
|
if config.UseSyslog {
|
|
dlog.UseSyslog(true)
|
|
} else if config.LogFile != nil {
|
|
dlog.UseLogFile(*config.LogFile)
|
|
if !*child {
|
|
FileDescriptors = append(FileDescriptors, dlog.GetFileDescriptor())
|
|
} else {
|
|
FileDescriptorNum++
|
|
dlog.SetFileDescriptor(os.NewFile(uintptr(3), "logFile"))
|
|
}
|
|
}
|
|
proxy.logMaxSize = config.LogMaxSize
|
|
proxy.logMaxAge = config.LogMaxAge
|
|
proxy.logMaxBackups = config.LogMaxBackups
|
|
|
|
proxy.userName = config.UserName
|
|
|
|
proxy.child = *child
|
|
proxy.xTransport = NewXTransport()
|
|
proxy.xTransport.tlsDisableSessionTickets = config.TLSDisableSessionTickets
|
|
proxy.xTransport.tlsCipherSuite = config.TLSCipherSuite
|
|
proxy.xTransport.fallbackResolver = config.FallbackResolver
|
|
proxy.xTransport.mainProto = proxy.mainProto
|
|
if len(config.FallbackResolver) > 0 {
|
|
proxy.xTransport.ignoreSystemDNS = config.IgnoreSystemDNS
|
|
}
|
|
proxy.xTransport.useIPv4 = config.SourceIPv4
|
|
proxy.xTransport.useIPv6 = config.SourceIPv6
|
|
proxy.xTransport.keepAlive = time.Duration(config.KeepAlive) * time.Second
|
|
if len(config.HTTPProxyURL) > 0 {
|
|
httpProxyURL, err := url.Parse(config.HTTPProxyURL)
|
|
if err != nil {
|
|
dlog.Fatalf("Unable to parse the HTTP proxy URL [%v]", config.HTTPProxyURL)
|
|
}
|
|
proxy.xTransport.httpProxyFunction = http.ProxyURL(httpProxyURL)
|
|
}
|
|
|
|
if len(config.Proxy) > 0 {
|
|
proxyDialerURL, err := url.Parse(config.Proxy)
|
|
if err != nil {
|
|
dlog.Fatalf("Unable to parse the proxy URL [%v]", config.Proxy)
|
|
}
|
|
proxyDialer, err := netproxy.FromURL(proxyDialerURL, netproxy.Direct)
|
|
if err != nil {
|
|
dlog.Fatalf("Unable to use the proxy: [%v]", err)
|
|
}
|
|
proxy.xTransport.proxyDialer = &proxyDialer
|
|
proxy.mainProto = "tcp"
|
|
}
|
|
|
|
proxy.xTransport.rebuildTransport()
|
|
|
|
if md.IsDefined("refused_code_in_responses") {
|
|
dlog.Notice("config option `refused_code_in_responses` is deprecated, use `blocked_query_response`")
|
|
if config.RefusedCodeInResponses {
|
|
config.BlockedQueryResponse = "refused"
|
|
} else {
|
|
config.BlockedQueryResponse = "hinfo"
|
|
}
|
|
}
|
|
proxy.blockedQueryResponse = config.BlockedQueryResponse
|
|
proxy.timeout = time.Duration(config.Timeout) * time.Millisecond
|
|
proxy.maxClients = config.MaxClients
|
|
proxy.mainProto = "udp"
|
|
if config.ForceTCP {
|
|
proxy.mainProto = "tcp"
|
|
}
|
|
proxy.certRefreshDelay = time.Duration(config.CertRefreshDelay) * time.Minute
|
|
proxy.certRefreshDelayAfterFailure = time.Duration(10 * time.Second)
|
|
proxy.certIgnoreTimestamp = config.CertIgnoreTimestamp
|
|
proxy.ephemeralKeys = config.EphemeralKeys
|
|
if len(config.ListenAddresses) == 0 {
|
|
dlog.Debug("No local IP/port configured")
|
|
}
|
|
|
|
lbStrategy := DefaultLBStrategy
|
|
switch strings.ToLower(config.LBStrategy) {
|
|
case "":
|
|
// default
|
|
case "p2":
|
|
lbStrategy = LBStrategyP2
|
|
case "ph":
|
|
lbStrategy = LBStrategyPH
|
|
case "fastest":
|
|
case "first":
|
|
lbStrategy = LBStrategyFirst
|
|
case "random":
|
|
lbStrategy = LBStrategyRandom
|
|
default:
|
|
dlog.Warnf("Unknown load balancing strategy: [%s]", config.LBStrategy)
|
|
}
|
|
proxy.serversInfo.lbStrategy = lbStrategy
|
|
proxy.serversInfo.lbEstimator = config.LBEstimator
|
|
|
|
proxy.listenAddresses = config.ListenAddresses
|
|
proxy.daemonize = config.Daemonize
|
|
proxy.pluginBlockIPv6 = config.BlockIPv6
|
|
proxy.cache = config.Cache
|
|
proxy.cacheSize = config.CacheSize
|
|
|
|
if config.CacheNegTTL > 0 {
|
|
proxy.cacheNegMinTTL = config.CacheNegTTL
|
|
proxy.cacheNegMaxTTL = config.CacheNegTTL
|
|
} else {
|
|
proxy.cacheNegMinTTL = config.CacheNegMinTTL
|
|
proxy.cacheNegMaxTTL = config.CacheNegMaxTTL
|
|
}
|
|
|
|
proxy.cacheMinTTL = config.CacheMinTTL
|
|
proxy.cacheMaxTTL = config.CacheMaxTTL
|
|
|
|
proxy.queryMeta = config.QueryMeta
|
|
|
|
if len(config.QueryLog.Format) == 0 {
|
|
config.QueryLog.Format = "tsv"
|
|
} else {
|
|
config.QueryLog.Format = strings.ToLower(config.QueryLog.Format)
|
|
}
|
|
if config.QueryLog.Format != "tsv" && config.QueryLog.Format != "ltsv" {
|
|
return errors.New("Unsupported query log format")
|
|
}
|
|
proxy.queryLogFile = config.QueryLog.File
|
|
proxy.queryLogFormat = config.QueryLog.Format
|
|
proxy.queryLogIgnoredQtypes = config.QueryLog.IgnoredQtypes
|
|
|
|
if len(config.NxLog.Format) == 0 {
|
|
config.NxLog.Format = "tsv"
|
|
} else {
|
|
config.NxLog.Format = strings.ToLower(config.NxLog.Format)
|
|
}
|
|
if config.NxLog.Format != "tsv" && config.NxLog.Format != "ltsv" {
|
|
return errors.New("Unsupported NX log format")
|
|
}
|
|
proxy.nxLogFile = config.NxLog.File
|
|
proxy.nxLogFormat = config.NxLog.Format
|
|
|
|
if len(config.BlockName.Format) == 0 {
|
|
config.BlockName.Format = "tsv"
|
|
} else {
|
|
config.BlockName.Format = strings.ToLower(config.BlockName.Format)
|
|
}
|
|
if config.BlockName.Format != "tsv" && config.BlockName.Format != "ltsv" {
|
|
return errors.New("Unsupported block log format")
|
|
}
|
|
proxy.blockNameFile = config.BlockName.File
|
|
proxy.blockNameFormat = config.BlockName.Format
|
|
proxy.blockNameLogFile = config.BlockName.LogFile
|
|
|
|
if len(config.WhitelistName.Format) == 0 {
|
|
config.WhitelistName.Format = "tsv"
|
|
} else {
|
|
config.WhitelistName.Format = strings.ToLower(config.WhitelistName.Format)
|
|
}
|
|
if config.WhitelistName.Format != "tsv" && config.WhitelistName.Format != "ltsv" {
|
|
return errors.New("Unsupported whitelist log format")
|
|
}
|
|
proxy.whitelistNameFile = config.WhitelistName.File
|
|
proxy.whitelistNameFormat = config.WhitelistName.Format
|
|
proxy.whitelistNameLogFile = config.WhitelistName.LogFile
|
|
|
|
if len(config.BlockIP.Format) == 0 {
|
|
config.BlockIP.Format = "tsv"
|
|
} else {
|
|
config.BlockIP.Format = strings.ToLower(config.BlockIP.Format)
|
|
}
|
|
if config.BlockIP.Format != "tsv" && config.BlockIP.Format != "ltsv" {
|
|
return errors.New("Unsupported IP block log format")
|
|
}
|
|
proxy.blockIPFile = config.BlockIP.File
|
|
proxy.blockIPFormat = config.BlockIP.Format
|
|
proxy.blockIPLogFile = config.BlockIP.LogFile
|
|
|
|
proxy.forwardFile = config.ForwardFile
|
|
proxy.cloakFile = config.CloakFile
|
|
|
|
allWeeklyRanges, err := ParseAllWeeklyRanges(config.AllWeeklyRanges)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
proxy.allWeeklyRanges = allWeeklyRanges
|
|
|
|
if configRoutes := config.AnonymizedDNS.Routes; configRoutes != nil {
|
|
routes := make(map[string]string)
|
|
for _, configRoute := range configRoutes {
|
|
routes[configRoute.ServerName] = configRoute.RelayName
|
|
dlog.Debugf("Routing server [%s] via [%s]", configRoute.ServerName, configRoute.RelayName)
|
|
}
|
|
proxy.routes = &routes
|
|
}
|
|
|
|
if *listAll {
|
|
config.ServerNames = nil
|
|
config.DisabledServerNames = nil
|
|
config.SourceRequireDNSSEC = false
|
|
config.SourceRequireNoFilter = false
|
|
config.SourceRequireNoLog = false
|
|
config.SourceIPv4 = true
|
|
config.SourceIPv6 = true
|
|
config.SourceDNSCrypt = true
|
|
config.SourceDoH = true
|
|
}
|
|
|
|
netprobeTimeout := config.NetprobeTimeout
|
|
flag.Visit(func(flag *flag.Flag) {
|
|
if flag.Name == "netprobe-timeout" && netprobeTimeoutOverride != nil {
|
|
netprobeTimeout = *netprobeTimeoutOverride
|
|
}
|
|
})
|
|
netprobeAddress := DefaultNetprobeAddress
|
|
if len(config.NetprobeAddress) > 0 {
|
|
netprobeAddress = config.NetprobeAddress
|
|
} else if len(config.FallbackResolver) > 0 {
|
|
netprobeAddress = config.FallbackResolver
|
|
}
|
|
proxy.showCerts = *showCerts || len(os.Getenv("SHOW_CERTS")) > 0
|
|
if len(os.Getenv("SHOW_CERTS")) > 0 {
|
|
proxy.showCerts = true
|
|
}
|
|
|
|
if proxy.showCerts {
|
|
proxy.listenAddresses = nil
|
|
}
|
|
dlog.Noticef("dnscrypt-proxy %s", AppVersion)
|
|
NetProbe(netprobeAddress, netprobeTimeout)
|
|
|
|
if !config.OfflineMode {
|
|
if err := config.loadSources(proxy); err != nil {
|
|
return err
|
|
}
|
|
if len(proxy.registeredServers) == 0 {
|
|
return errors.New("No servers configured")
|
|
}
|
|
}
|
|
if *list || *listAll {
|
|
config.printRegisteredServers(proxy, *jsonOutput)
|
|
os.Exit(0)
|
|
}
|
|
if proxy.routes != nil && len(*proxy.routes) > 0 {
|
|
for _, server := range proxy.registeredServers {
|
|
if via, ok := (*proxy.routes)[server.name]; ok {
|
|
dlog.Noticef("Anonymized DNS: routing [%v] via [%v]", server.name, via)
|
|
}
|
|
}
|
|
}
|
|
if *check {
|
|
dlog.Notice("Configuration successfully checked")
|
|
os.Exit(0)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (config *Config) printRegisteredServers(proxy *Proxy, jsonOutput bool) {
|
|
var summary []ServerSummary
|
|
for _, registeredServer := range proxy.registeredServers {
|
|
addrStr, port := registeredServer.stamp.ServerAddrStr, stamps.DefaultPort
|
|
port = ExtractPort(addrStr, port)
|
|
addrs := make([]string, 0)
|
|
if registeredServer.stamp.Proto == stamps.StampProtoTypeDoH && len(registeredServer.stamp.ProviderName) > 0 {
|
|
providerName := registeredServer.stamp.ProviderName
|
|
var host string
|
|
host, port = ExtractHostAndPort(providerName, port)
|
|
addrs = append(addrs, host)
|
|
}
|
|
if len(addrStr) > 0 {
|
|
addrs = append(addrs, ExtractHost(addrStr))
|
|
}
|
|
serverSummary := ServerSummary{
|
|
Name: registeredServer.name,
|
|
Proto: registeredServer.stamp.Proto.String(),
|
|
IPv6: strings.HasPrefix(addrStr, "["),
|
|
Ports: []int{port},
|
|
Addrs: addrs,
|
|
DNSSEC: registeredServer.stamp.Props&stamps.ServerInformalPropertyDNSSEC != 0,
|
|
NoLog: registeredServer.stamp.Props&stamps.ServerInformalPropertyNoLog != 0,
|
|
NoFilter: registeredServer.stamp.Props&stamps.ServerInformalPropertyNoFilter != 0,
|
|
Description: registeredServer.description,
|
|
}
|
|
if jsonOutput {
|
|
summary = append(summary, serverSummary)
|
|
} else {
|
|
fmt.Println(serverSummary.Name)
|
|
}
|
|
}
|
|
if jsonOutput {
|
|
jsonStr, err := json.MarshalIndent(summary, "", " ")
|
|
if err != nil {
|
|
dlog.Fatal(err)
|
|
}
|
|
fmt.Print(string(jsonStr))
|
|
}
|
|
}
|
|
|
|
func (config *Config) loadSources(proxy *Proxy) error {
|
|
var requiredProps stamps.ServerInformalProperties
|
|
if config.SourceRequireDNSSEC {
|
|
requiredProps |= stamps.ServerInformalPropertyDNSSEC
|
|
}
|
|
if config.SourceRequireNoLog {
|
|
requiredProps |= stamps.ServerInformalPropertyNoLog
|
|
}
|
|
if config.SourceRequireNoFilter {
|
|
requiredProps |= stamps.ServerInformalPropertyNoFilter
|
|
}
|
|
for cfgSourceName, cfgSource := range config.SourcesConfig {
|
|
if err := config.loadSource(proxy, requiredProps, cfgSourceName, &cfgSource); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if len(config.ServerNames) == 0 {
|
|
for serverName := range config.ServersConfig {
|
|
config.ServerNames = append(config.ServerNames, serverName)
|
|
}
|
|
}
|
|
for _, serverName := range config.ServerNames {
|
|
staticConfig, ok := config.ServersConfig[serverName]
|
|
if !ok {
|
|
continue
|
|
}
|
|
if len(staticConfig.Stamp) == 0 {
|
|
dlog.Fatalf("Missing stamp for the static [%s] definition", serverName)
|
|
}
|
|
stamp, err := stamps.NewServerStampFromString(staticConfig.Stamp)
|
|
if err != nil {
|
|
dlog.Fatalf("Stamp error for the static [%s] definition: [%v]", serverName, err)
|
|
}
|
|
proxy.registeredServers = append(proxy.registeredServers, RegisteredServer{name: serverName, stamp: stamp})
|
|
}
|
|
rand.Shuffle(len(proxy.registeredServers), func(i, j int) {
|
|
proxy.registeredServers[i], proxy.registeredServers[j] = proxy.registeredServers[j], proxy.registeredServers[i]
|
|
})
|
|
|
|
return nil
|
|
}
|
|
|
|
func (config *Config) loadSource(proxy *Proxy, requiredProps stamps.ServerInformalProperties, cfgSourceName string, cfgSource *SourceConfig) error {
|
|
if len(cfgSource.URLs) == 0 {
|
|
if len(cfgSource.URL) == 0 {
|
|
dlog.Debugf("Missing URLs for source [%s]", cfgSourceName)
|
|
} else {
|
|
cfgSource.URLs = []string{cfgSource.URL}
|
|
}
|
|
}
|
|
if cfgSource.MinisignKeyStr == "" {
|
|
return fmt.Errorf("Missing Minisign key for source [%s]", cfgSourceName)
|
|
}
|
|
if cfgSource.CacheFile == "" {
|
|
return fmt.Errorf("Missing cache file for source [%s]", cfgSourceName)
|
|
}
|
|
if cfgSource.FormatStr == "" {
|
|
cfgSource.FormatStr = "v2"
|
|
}
|
|
if cfgSource.RefreshDelay <= 0 {
|
|
cfgSource.RefreshDelay = 72
|
|
}
|
|
source, sourceUrlsToPrefetch, err := NewSource(proxy.xTransport, cfgSource.URLs, cfgSource.MinisignKeyStr, cfgSource.CacheFile, cfgSource.FormatStr, time.Duration(cfgSource.RefreshDelay)*time.Hour)
|
|
proxy.urlsToPrefetch = append(proxy.urlsToPrefetch, sourceUrlsToPrefetch...)
|
|
if err != nil {
|
|
dlog.Criticalf("Unable to retrieve source [%s]: [%s]", cfgSourceName, err)
|
|
return err
|
|
}
|
|
registeredServers, err := source.Parse(cfgSource.Prefix)
|
|
if err != nil {
|
|
if len(registeredServers) == 0 {
|
|
dlog.Criticalf("Unable to use source [%s]: [%s]", cfgSourceName, err)
|
|
return err
|
|
}
|
|
dlog.Warnf("Error in source [%s]: [%s] -- Continuing with reduced server count [%d]", cfgSourceName, err, len(registeredServers))
|
|
}
|
|
for _, registeredServer := range registeredServers {
|
|
if len(config.ServerNames) > 0 {
|
|
if !includesName(config.ServerNames, registeredServer.name) {
|
|
continue
|
|
}
|
|
} else if registeredServer.stamp.Props&requiredProps != requiredProps {
|
|
continue
|
|
}
|
|
if includesName(config.DisabledServerNames, registeredServer.name) {
|
|
continue
|
|
}
|
|
if config.SourceIPv4 || config.SourceIPv6 {
|
|
isIPv4, isIPv6 := true, false
|
|
if registeredServer.stamp.Proto == stamps.StampProtoTypeDoH {
|
|
isIPv4, isIPv6 = true, true
|
|
}
|
|
if strings.HasPrefix(registeredServer.stamp.ServerAddrStr, "[") {
|
|
isIPv4, isIPv6 = false, true
|
|
}
|
|
if !(config.SourceIPv4 == isIPv4 || config.SourceIPv6 == isIPv6) {
|
|
continue
|
|
}
|
|
}
|
|
if !((config.SourceDNSCrypt && registeredServer.stamp.Proto == stamps.StampProtoTypeDNSCrypt) ||
|
|
(config.SourceDoH && registeredServer.stamp.Proto == stamps.StampProtoTypeDoH)) {
|
|
continue
|
|
}
|
|
dlog.Debugf("Adding [%s] to the set of wanted resolvers", registeredServer.name)
|
|
proxy.registeredServers = append(proxy.registeredServers, registeredServer)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func includesName(names []string, name string) bool {
|
|
for _, found := range names {
|
|
if strings.EqualFold(found, name) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
func cdFileDir(fileName string) {
|
|
os.Chdir(filepath.Dir(fileName))
|
|
}
|
|
|
|
func cdLocal() {
|
|
exeFileName, err := os.Executable()
|
|
if err != nil {
|
|
dlog.Warnf("Unable to determine the executable directory: [%s] -- You will need to specify absolute paths in the configuration file", err)
|
|
return
|
|
}
|
|
os.Chdir(filepath.Dir(exeFileName))
|
|
}
|