mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2024-11-22 07:30:19 +00:00
132 lines
5.3 KiB
C++
132 lines
5.3 KiB
C++
/*
|
|
* Copyright (c) 2024, Ali Mohammad Pur <mpfard@serenityos.org>
|
|
*
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
|
*/
|
|
|
|
#include <LibCore/ArgsParser.h>
|
|
#include <LibCore/EventLoop.h>
|
|
#include <LibCore/Socket.h>
|
|
#include <LibDNS/Resolver.h>
|
|
#include <LibMain/Main.h>
|
|
#include <LibTLS/TLSv12.h>
|
|
|
|
ErrorOr<int> serenity_main(Main::Arguments arguments)
|
|
{
|
|
struct Request {
|
|
Vector<DNS::Messages::ResourceType> types;
|
|
ByteString name;
|
|
};
|
|
Vector<Request> requests;
|
|
Request current_request;
|
|
StringView server_address;
|
|
StringView cert_path;
|
|
bool use_tls = false;
|
|
|
|
Core::ArgsParser args_parser;
|
|
args_parser.add_option(cert_path, "Path to the CA certificate file", "ca-certs", 'C', "file");
|
|
args_parser.add_option(server_address, "The address of the DNS server to query", "server", 's', "addr");
|
|
args_parser.add_option(use_tls, "Use TLS to connect to the server", "tls", 0);
|
|
args_parser.add_positional_argument(Core::ArgsParser::Arg {
|
|
.help_string = "The resource types and name of the DNS record to query",
|
|
.name = "rr,rr@name",
|
|
.min_values = 1,
|
|
.max_values = 99999,
|
|
.accept_value = [&](StringView name) -> ErrorOr<bool> {
|
|
auto parts = name.split_view('@');
|
|
if (parts.size() > 2 || parts.is_empty())
|
|
return Error::from_string_literal("Invalid record/name format");
|
|
|
|
if (parts.size() == 1) {
|
|
current_request.types.append(DNS::Messages::ResourceType::ANY);
|
|
current_request.name = parts[0];
|
|
} else {
|
|
auto rr_parts = parts[0].split_view(',');
|
|
for (auto& rr : rr_parts) {
|
|
ByteString rr_name = rr;
|
|
auto type = DNS::Messages::resource_type_from_string(rr_name.to_uppercase());
|
|
if (!type.has_value())
|
|
return Error::from_string_literal("Invalid resource type");
|
|
current_request.types.append(type.value());
|
|
}
|
|
current_request.name = parts[1];
|
|
}
|
|
requests.append(move(current_request));
|
|
current_request = {};
|
|
return true;
|
|
},
|
|
});
|
|
|
|
args_parser.parse(arguments);
|
|
|
|
if (server_address.is_empty()) {
|
|
outln("You must specify a server address to query");
|
|
return 1;
|
|
}
|
|
|
|
if (current_request.name.is_empty() && !current_request.types.is_empty()) {
|
|
outln("You must specify at least one DNS record to query");
|
|
return 1;
|
|
}
|
|
|
|
Core::EventLoop loop;
|
|
|
|
DNS::Resolver resolver {
|
|
[&] -> ErrorOr<DNS::Resolver::SocketResult> {
|
|
Core::SocketAddress addr;
|
|
if (auto v4 = IPv4Address::from_string(server_address); v4.has_value()) {
|
|
addr = { v4.value(), static_cast<u16>(use_tls ? 853 : 53) };
|
|
} else if (auto v6 = IPv6Address::from_string(server_address); v6.has_value()) {
|
|
addr = { v6.value(), static_cast<u16>(use_tls ? 853 : 53) };
|
|
} else {
|
|
return MUST(resolver.lookup(server_address)->await())->cached_addresses().first().visit([&](auto& address) -> DNS::Resolver::SocketResult {
|
|
if (use_tls) {
|
|
auto tls = MUST(TLS::TLSv12::connect({ address, 853 }, server_address));
|
|
return { move(tls), DNS::Resolver::ConnectionMode::TCP };
|
|
}
|
|
return { MUST(Core::BufferedSocket<Core::UDPSocket>::create(MUST(Core::UDPSocket::connect({ address, 53 })))), DNS::Resolver::ConnectionMode::UDP };
|
|
});
|
|
}
|
|
|
|
if (use_tls)
|
|
return DNS::Resolver::SocketResult { MUST(TLS::TLSv12::connect(addr, server_address)), DNS::Resolver::ConnectionMode::TCP };
|
|
return DNS::Resolver::SocketResult { MUST(Core::BufferedSocket<Core::UDPSocket>::create(MUST(Core::UDPSocket::connect(addr)))), DNS::Resolver::ConnectionMode::UDP };
|
|
}
|
|
};
|
|
|
|
DefaultRootCACertificates::set_default_certificate_paths(Array<ByteString, 1> { cert_path.is_empty() ? "/etc/ssl/cert.pem"sv : cert_path });
|
|
|
|
MUST(resolver.when_socket_ready()->await());
|
|
|
|
size_t pending_requests = requests.size();
|
|
for (auto& request : requests) {
|
|
resolver.lookup(request.name, DNS::Messages::Class::IN, request.types)
|
|
->when_resolved([&](auto& result) {
|
|
outln("Resolved {}:", request.name);
|
|
HashTable<DNS::Messages::ResourceType> types;
|
|
auto recs = result->records();
|
|
for (auto& record : recs)
|
|
types.set(record.type);
|
|
|
|
for (auto& type : types) {
|
|
outln(" - {} IN {}:", request.name, DNS::Messages::to_string(type));
|
|
for (auto& record : recs) {
|
|
if (type != record.type)
|
|
continue;
|
|
|
|
outln(" - {}", record.to_string());
|
|
}
|
|
}
|
|
|
|
if (--pending_requests == 0)
|
|
loop.quit(0);
|
|
})
|
|
.when_rejected([&](auto& error) {
|
|
outln("Failed to resolve {} IN {}: {}", request.name, DNS::Messages::to_string(request.types.first()), error);
|
|
if (--pending_requests == 0)
|
|
loop.quit(1);
|
|
});
|
|
}
|
|
|
|
return loop.exec();
|
|
}
|