https.rs 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121
  1. #![cfg_attr(not(feature="https"), allow(unused))]
  2. use std::io::{Read, Write};
  3. use std::net::TcpStream;
  4. use log::*;
  5. use dns::{Request, Response};
  6. use super::{Transport, Error};
  7. /// The **HTTPS transport**, which sends DNS wire data inside HTTP packets
  8. /// encrypted with TLS, using TCP.
  9. ///
  10. /// # Examples
  11. ///
  12. /// ```no_run
  13. /// use dns_transport::{Transport, HttpsTransport};
  14. /// use dns::{Request, Flags, Query, Labels, QClass, qtype, record::A};
  15. ///
  16. /// let query = Query {
  17. /// qname: Labels::encode("dns.lookup.dog").unwrap(),
  18. /// qclass: QClass::IN,
  19. /// qtype: qtype!(A),
  20. /// };
  21. ///
  22. /// let request = Request {
  23. /// transaction_id: 0xABCD,
  24. /// flags: Flags::query(),
  25. /// query: query,
  26. /// additional: None,
  27. /// };
  28. ///
  29. /// let transport = HttpsTransport::new("https://cloudflare-dns.com/dns-query");
  30. /// transport.send(&request);
  31. /// ```
  32. pub struct HttpsTransport {
  33. url: String,
  34. }
  35. impl HttpsTransport {
  36. /// Creates a new HTTPS transport that connects to the given URL.
  37. pub fn new(url: impl Into<String>) -> Self {
  38. Self { url: url.into() }
  39. }
  40. }
  41. impl Transport for HttpsTransport {
  42. #[cfg(feature="https")]
  43. fn send(&self, request: &Request) -> Result<Response, Error> {
  44. let connector = native_tls::TlsConnector::new()?;
  45. let (domain, path) = self.split_domain().expect("Invalid HTTPS nameserver");
  46. info!("Opening TLS socket to {:?}", domain);
  47. let stream = TcpStream::connect(format!("{}:443", domain))?;
  48. let mut stream = connector.connect(domain, stream)?;
  49. debug!("Connected");
  50. let request_bytes = request.to_bytes().expect("failed to serialise request");
  51. let mut bytes_to_send = format!("\
  52. POST {} HTTP/1.1\r\n\
  53. Host: {}\r\n\
  54. Content-Type: application/dns-message\r\n\
  55. Accept: application/dns-message\r\n\
  56. User-Agent: {}\r\n\
  57. Content-Length: {}\r\n\r\n",
  58. path, domain, USER_AGENT, request_bytes.len()).into_bytes();
  59. bytes_to_send.extend(request_bytes);
  60. info!("Sending {} bytes of data to {:?} over HTTPS", bytes_to_send.len(), self.url);
  61. stream.write_all(&bytes_to_send)?;
  62. debug!("Wrote all bytes");
  63. info!("Waiting to receive...");
  64. let mut buf = [0; 4096];
  65. let read_len = stream.read(&mut buf)?;
  66. info!("Received {} bytes of data", read_len);
  67. let mut headers = [httparse::EMPTY_HEADER; 16];
  68. let mut response = httparse::Response::new(&mut headers);
  69. let index: usize = response.parse(&buf)?.unwrap();
  70. let body = &buf[index .. read_len];
  71. if response.code != Some(200) {
  72. let reason = response.reason.map(str::to_owned);
  73. return Err(Error::WrongHttpStatus(response.code.unwrap(), reason));
  74. }
  75. for header in response.headers {
  76. debug!("Header {:?} -> {:?}", header.name, String::from_utf8_lossy(header.value));
  77. }
  78. debug!("HTTP body has {} bytes", body.len());
  79. let response = Response::from_bytes(&body)?;
  80. Ok(response)
  81. }
  82. #[cfg(not(feature="https"))]
  83. fn send(&self, request: &Request) -> Result<Response, Error> {
  84. unimplemented!("HTTPS feature disabled")
  85. }
  86. }
  87. impl HttpsTransport {
  88. fn split_domain(&self) -> Option<(&str, &str)> {
  89. if let Some(sp) = self.url.strip_prefix("https://") {
  90. if let Some(colon_index) = sp.find('/') {
  91. return Some((&sp[.. colon_index], &sp[colon_index ..]));
  92. }
  93. }
  94. None
  95. }
  96. }
  97. /// The User-Agent header sent with HTTPS requests.
  98. static USER_AGENT: &str = concat!("dog/", env!("CARGO_PKG_VERSION"));