2020-05-08 16:39:37 +01:00
|
|
|
package dnsforward
|
|
|
|
|
|
|
|
import (
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
2020-10-30 10:32:02 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/dnsfilter"
|
2020-11-03 12:39:55 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/querylog"
|
2020-10-30 10:32:02 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/stats"
|
2020-05-08 16:39:37 +01:00
|
|
|
"github.com/AdguardTeam/dnsproxy/proxy"
|
2020-11-03 12:39:55 +00:00
|
|
|
"github.com/miekg/dns"
|
2020-05-08 16:39:37 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// Write Stats data and logs
|
2021-01-27 15:32:13 +00:00
|
|
|
func processQueryLogsAndStats(ctx *dnsContext) (rc resultCode) {
|
2020-05-08 16:39:37 +01:00
|
|
|
elapsed := time.Since(ctx.startTime)
|
|
|
|
s := ctx.srv
|
2021-01-27 15:32:13 +00:00
|
|
|
pctx := ctx.proxyCtx
|
2020-05-08 16:39:37 +01:00
|
|
|
|
|
|
|
shouldLog := true
|
2021-01-27 15:32:13 +00:00
|
|
|
msg := pctx.Req
|
2020-05-08 16:39:37 +01:00
|
|
|
|
|
|
|
// don't log ANY request if refuseAny is enabled
|
|
|
|
if len(msg.Question) >= 1 && msg.Question[0].Qtype == dns.TypeANY && s.conf.RefuseAny {
|
|
|
|
shouldLog = false
|
|
|
|
}
|
|
|
|
|
|
|
|
s.RLock()
|
|
|
|
// Synchronize access to s.queryLog and s.stats so they won't be suddenly uninitialized while in use.
|
|
|
|
// This can happen after proxy server has been stopped, but its workers haven't yet exited.
|
|
|
|
if shouldLog && s.queryLog != nil {
|
|
|
|
p := querylog.AddParams{
|
|
|
|
Question: msg,
|
2021-01-27 15:32:13 +00:00
|
|
|
Answer: pctx.Res,
|
2020-05-08 16:39:37 +01:00
|
|
|
OrigAnswer: ctx.origResp,
|
|
|
|
Result: ctx.result,
|
|
|
|
Elapsed: elapsed,
|
2021-01-27 15:32:13 +00:00
|
|
|
ClientIP: IPFromAddr(pctx.Addr),
|
|
|
|
ClientID: ctx.clientID,
|
2020-05-08 16:39:37 +01:00
|
|
|
}
|
2020-05-29 09:15:22 +01:00
|
|
|
|
2021-01-27 15:32:13 +00:00
|
|
|
switch pctx.Proto {
|
2020-11-03 12:39:55 +00:00
|
|
|
case proxy.ProtoHTTPS:
|
|
|
|
p.ClientProto = querylog.ClientProtoDOH
|
|
|
|
case proxy.ProtoQUIC:
|
|
|
|
p.ClientProto = querylog.ClientProtoDOQ
|
|
|
|
case proxy.ProtoTLS:
|
|
|
|
p.ClientProto = querylog.ClientProtoDOT
|
2021-01-27 15:32:13 +00:00
|
|
|
case proxy.ProtoDNSCrypt:
|
|
|
|
p.ClientProto = querylog.ClientProtoDNSCrypt
|
2020-11-03 12:39:55 +00:00
|
|
|
default:
|
2021-01-27 15:32:13 +00:00
|
|
|
// Consider this a plain DNS-over-UDP or DNS-over-TCP
|
2020-11-03 12:39:55 +00:00
|
|
|
// request.
|
2020-05-29 09:15:22 +01:00
|
|
|
}
|
|
|
|
|
2021-01-27 15:32:13 +00:00
|
|
|
if pctx.Upstream != nil {
|
|
|
|
p.Upstream = pctx.Upstream.Address()
|
2020-05-08 16:39:37 +01:00
|
|
|
}
|
2021-01-27 15:32:13 +00:00
|
|
|
|
2020-05-08 16:39:37 +01:00
|
|
|
s.queryLog.Add(p)
|
|
|
|
}
|
|
|
|
|
2021-01-27 15:32:13 +00:00
|
|
|
s.updateStats(ctx, elapsed, *ctx.result)
|
2020-05-08 16:39:37 +01:00
|
|
|
s.RUnlock()
|
|
|
|
|
2021-01-27 15:32:13 +00:00
|
|
|
return resultCodeSuccess
|
2020-05-08 16:39:37 +01:00
|
|
|
}
|
|
|
|
|
2021-01-27 15:32:13 +00:00
|
|
|
func (s *Server) updateStats(ctx *dnsContext, elapsed time.Duration, res dnsfilter.Result) {
|
2020-05-08 16:39:37 +01:00
|
|
|
if s.stats == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2021-01-27 15:32:13 +00:00
|
|
|
pctx := ctx.proxyCtx
|
2020-05-08 16:39:37 +01:00
|
|
|
e := stats.Entry{}
|
2021-01-27 15:32:13 +00:00
|
|
|
e.Domain = strings.ToLower(pctx.Req.Question[0].Name)
|
2020-05-08 16:39:37 +01:00
|
|
|
e.Domain = e.Domain[:len(e.Domain)-1] // remove last "."
|
2021-01-27 15:32:13 +00:00
|
|
|
|
|
|
|
if clientID := ctx.clientID; clientID != "" {
|
|
|
|
e.Client = clientID
|
|
|
|
} else if ip := IPFromAddr(pctx.Addr); ip != nil {
|
|
|
|
e.Client = ip.String()
|
2020-05-08 16:39:37 +01:00
|
|
|
}
|
2021-01-27 15:32:13 +00:00
|
|
|
|
2020-05-08 16:39:37 +01:00
|
|
|
e.Time = uint32(elapsed / 1000)
|
|
|
|
e.Result = stats.RNotFiltered
|
|
|
|
|
|
|
|
switch res.Reason {
|
|
|
|
case dnsfilter.FilteredSafeBrowsing:
|
|
|
|
e.Result = stats.RSafeBrowsing
|
|
|
|
case dnsfilter.FilteredParental:
|
|
|
|
e.Result = stats.RParental
|
|
|
|
case dnsfilter.FilteredSafeSearch:
|
|
|
|
e.Result = stats.RSafeSearch
|
2020-12-21 14:48:07 +00:00
|
|
|
case dnsfilter.FilteredBlockList:
|
2020-05-08 16:39:37 +01:00
|
|
|
fallthrough
|
|
|
|
case dnsfilter.FilteredInvalid:
|
|
|
|
fallthrough
|
|
|
|
case dnsfilter.FilteredBlockedService:
|
|
|
|
e.Result = stats.RFiltered
|
|
|
|
}
|
|
|
|
|
|
|
|
s.stats.Update(e)
|
|
|
|
}
|