-
Notifications
You must be signed in to change notification settings - Fork 2
Expand file tree
/
Copy pathauth.go
More file actions
138 lines (118 loc) · 3.24 KB
/
auth.go
File metadata and controls
138 lines (118 loc) · 3.24 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
package resolver
import (
"context"
"errors"
"fmt"
"github.com/miekg/dns"
"github.com/nsmithuk/resolver/dnssec"
"sync"
"sync/atomic"
)
type authenticator struct {
ctx context.Context
auth *dnssec.Authenticator
errors []error
closeOnce sync.Once
queue chan authenticatorInput
finished atomic.Bool
processing *sync.WaitGroup
}
type authenticatorInput struct {
z zone
msg *dns.Msg
}
func newAuthenticator(ctx context.Context, question dns.Question) *authenticator {
a := dnssec.NewAuth(ctx, question)
auth := &authenticator{
ctx: ctx,
auth: a,
errors: make([]error, 0),
queue: make(chan authenticatorInput, 8),
processing: &sync.WaitGroup{},
}
go auth.start()
return auth
}
func (a *authenticator) close() {
a.closeOnce.Do(func() {
a.finished.Store(true)
a.processing.Wait()
close(a.queue)
a.queue = nil
})
}
func (a *authenticator) addDelegationSignerLink(z zone, qname string) {
if a.finished.Load() {
return
}
a.processing.Add(1)
go func() {
defer a.processing.Done()
go z.dnskeys(a.ctx)
dsMsg := new(dns.Msg)
dsMsg.SetQuestion(dns.Fqdn(qname), dns.TypeDS)
dsMsg.SetEdns0(4096, true)
dsMsg.RecursionDesired = false
response := z.exchange(a.ctx, dsMsg)
if !response.IsEmpty() && !response.HasError() {
a.processing.Add(1)
a.queue <- authenticatorInput{z, response.Msg}
}
}()
}
func (a *authenticator) addResponse(z zone, msg *dns.Msg) error {
if a.finished.Load() {
return nil
}
a.processing.Add(1)
a.queue <- authenticatorInput{z, msg}
return nil
}
func (a *authenticator) start() {
for in := range a.queue {
err := a.auth.AddResponse(&authZoneWrapper{ctx: a.ctx, zone: in.z}, in.msg)
if err != nil {
// `Errors` is only accessible from this thread when processing is !Done().
a.errors = append(a.errors, err)
}
a.processing.Done()
}
}
func (a *authenticator) result() (dnssec.AuthenticationResult, dnssec.DenialOfExistenceState, error) {
a.finished.Store(true)
a.processing.Wait()
a.close()
// `Errors` is only accessible from this thread once we've finished Wait().
if len(a.errors) > 0 {
if len(a.errors) == 1 {
return 0, 0, a.errors[0]
}
err := errors.New("multiple errors found: ")
for _, e := range a.errors {
err = fmt.Errorf("%w: %w", err, e)
}
}
return a.auth.Result()
}
func (a *authenticator) resultTTLAnswer(rtype uint16) (uint32, bool) {
return a.auth.ResultTTLAnswer(rtype)
}
func (a *authenticator) resultTTLAuthority(rtype uint16) (uint32, bool) {
return a.auth.ResultTTLAuthority(rtype)
}
// authZoneWrapper wraps our zone such that is supports the dnssec.Zone interface.
// Note that the dnssec package only needs querying support against this zone's nameservers.
// i.e. We do not need to try these queries recursively. If the nameservers for this zone do not return
// an authoritative answer themselves, we can assume that's an error.
type authZoneWrapper struct {
ctx context.Context
zone zone
}
// Name returns the zone's apex domain name.
func (wrapper *authZoneWrapper) Name() string {
return wrapper.zone.name()
}
// GetDNSKEYRecords Looks up the DNSKEY records for the given QName, in the zone.
func (wrapper *authZoneWrapper) GetDNSKEYRecords() ([]dns.RR, error) {
return wrapper.zone.dnskeys(wrapper.ctx)
}