2020-07-14 14:12:00 +01:00
|
|
|
// Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
// +build linux freebsd
|
|
|
|
|
|
|
|
package router
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
|
|
|
"bytes"
|
|
|
|
"fmt"
|
|
|
|
"os"
|
|
|
|
"os/exec"
|
|
|
|
)
|
|
|
|
|
|
|
|
// resolvconfIsActive indicates whether the system appears to be using resolvconf.
|
|
|
|
// If this is true, then dnsManualUp should be avoided:
|
|
|
|
// resolvconf has exclusive ownership of /etc/resolv.conf.
|
|
|
|
func resolvconfIsActive() bool {
|
|
|
|
// Sanity-check first: if there is no resolvconf binary, then this is fruitless.
|
|
|
|
//
|
|
|
|
// However, this binary may be a shim like the one systemd-resolved provides.
|
|
|
|
// Such a shim may not behave as expected: in particular, systemd-resolved
|
|
|
|
// does not seem to respect the exclusive mode -x, saying:
|
|
|
|
// -x Send DNS traffic preferably over this interface
|
|
|
|
// whereas e.g. openresolv sends DNS traffix _exclusively_ over that interface,
|
|
|
|
// or not at all (in case of another exclusive-mode request later in time).
|
|
|
|
//
|
|
|
|
// Moreover, resolvconf may be installed but unused, in which case we should
|
|
|
|
// not use it either, lest we clobber existing configuration.
|
|
|
|
//
|
|
|
|
// To handle all the above correctly, we scan the comments in /etc/resolv.conf
|
|
|
|
// to ensure that it was generated by a resolvconf implementation.
|
|
|
|
_, err := exec.LookPath("resolvconf")
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
f, err := os.Open("/etc/resolv.conf")
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
scanner := bufio.NewScanner(f)
|
|
|
|
for scanner.Scan() {
|
|
|
|
line := scanner.Bytes()
|
|
|
|
// Look for the word "resolvconf" until comments end.
|
|
|
|
if len(line) > 0 && line[0] != '#' {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if bytes.Contains(line, []byte("resolvconf")) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2020-07-23 19:34:39 +01:00
|
|
|
// resolvconfImplementation enumerates supported implementations of the resolvconf CLI.
|
|
|
|
type resolvconfImplementation uint8
|
|
|
|
|
|
|
|
const (
|
|
|
|
// resolvconfOpenresolv is the implementation packaged as "openresolv" on Ubuntu.
|
|
|
|
// It supports exclusive mode and interface metrics.
|
|
|
|
resolvconfOpenresolv resolvconfImplementation = iota
|
|
|
|
// resolvconfLegacy is the implementation by Thomas Hood packaged as "resolvconf" on Ubuntu.
|
|
|
|
// It does not support exclusive mode or interface metrics.
|
|
|
|
resolvconfLegacy
|
|
|
|
)
|
|
|
|
|
|
|
|
// getResolvconfImplementation returns the implementation of resolvconf
|
|
|
|
// that appears to be in use.
|
|
|
|
func getResolvconfImplementation() resolvconfImplementation {
|
|
|
|
err := exec.Command("resolvconf", "-v").Run()
|
|
|
|
if err != nil {
|
|
|
|
if exitErr, ok := err.(*exec.ExitError); ok {
|
|
|
|
// Thomas Hood's resolvconf has a minimal flag set
|
|
|
|
// and exits with code 99 when passed an unknown flag.
|
|
|
|
if exitErr.ExitCode() == 99 {
|
|
|
|
return resolvconfLegacy
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return resolvconfOpenresolv
|
|
|
|
}
|
|
|
|
|
|
|
|
// resolvconfConfigName is the name of the config submitted to resolvconf.
|
|
|
|
// It has this form to match the "tun*" rule in interface-order
|
|
|
|
// when running resolvconfLegacy, hopefully placing our config first.
|
|
|
|
const resolvconfConfigName = "tun-tailscale.inet"
|
|
|
|
|
2020-07-14 14:12:00 +01:00
|
|
|
// dnsResolvconfUp invokes the resolvconf binary to associate
|
|
|
|
// the given DNS configuration the Tailscale interface.
|
|
|
|
func dnsResolvconfUp(config DNSConfig, interfaceName string) error {
|
2020-07-23 19:34:39 +01:00
|
|
|
implementation := getResolvconfImplementation()
|
|
|
|
|
2020-07-14 14:12:00 +01:00
|
|
|
stdin := new(bytes.Buffer)
|
|
|
|
dnsWriteConfig(stdin, config.Nameservers, config.Domains) // dns_direct.go
|
|
|
|
|
2020-07-23 19:34:39 +01:00
|
|
|
var cmd *exec.Cmd
|
|
|
|
switch implementation {
|
|
|
|
case resolvconfOpenresolv:
|
|
|
|
// Request maximal priority (metric 0) and exclusive mode.
|
|
|
|
cmd = exec.Command("resolvconf", "-m", "0", "-x", "-a", resolvconfConfigName)
|
|
|
|
case resolvconfLegacy:
|
|
|
|
// This does not quite give us the desired behavior (queries leak),
|
|
|
|
// but there is nothing else we can do without messing with other interfaces' settings.
|
|
|
|
cmd = exec.Command("resolvconf", "-a", resolvconfConfigName)
|
|
|
|
}
|
2020-07-14 14:12:00 +01:00
|
|
|
cmd.Stdin = stdin
|
|
|
|
out, err := cmd.CombinedOutput()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("running %s: %s", cmd, out)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// dnsResolvconfDown undoes the action of dnsResolvconfUp.
|
|
|
|
func dnsResolvconfDown(interfaceName string) error {
|
2020-07-23 19:34:39 +01:00
|
|
|
implementation := getResolvconfImplementation()
|
|
|
|
|
|
|
|
var cmd *exec.Cmd
|
|
|
|
switch implementation {
|
|
|
|
case resolvconfOpenresolv:
|
|
|
|
cmd = exec.Command("resolvconf", "-f", "-d", resolvconfConfigName)
|
|
|
|
case resolvconfLegacy:
|
|
|
|
// resolvconfLegacy lacks the -f flag.
|
|
|
|
// Instead, it succeeds even when the config does not exist.
|
|
|
|
cmd = exec.Command("resolvconf", "-d", resolvconfConfigName)
|
|
|
|
}
|
2020-07-14 14:12:00 +01:00
|
|
|
out, err := cmd.CombinedOutput()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("running %s: %s", cmd, out)
|
|
|
|
}
|
2020-07-23 19:34:39 +01:00
|
|
|
|
2020-07-14 14:12:00 +01:00
|
|
|
return nil
|
|
|
|
}
|