Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: seanmonstar/reqwest
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: master
Choose a base ref
...
head repository: svix/reqwest
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: master
Choose a head ref
Can’t automatically merge. Don’t worry, you can still create the pull request.
  • 3 commits
  • 1 file changed
  • 3 contributors

Commits on Sep 22, 2022

  1. Hack in DNS filtering

    Daniel Lyne committed Sep 22, 2022
    Copy the full SHA
    6e55478 View commit details

Commits on Sep 29, 2022

  1. Merge pull request #1 from svix/daniel/resolution-hack

    Hack in DNS filtering
    svix-james authored Sep 29, 2022
    Copy the full SHA
    154718c View commit details

Commits on Oct 11, 2022

  1. Eliminate need for nightly Rust (#2)

    Replicates IpAddr utilities from the Rust standard library to avoid reliance on
    Rust nightly.
    svix-daniel authored Oct 11, 2022
    Copy the full SHA
    f4e1293 View commit details
Showing with 100 additions and 15 deletions.
  1. +100 −15 src/dns.rs
115 changes: 100 additions & 15 deletions src/dns.rs
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
use std::future::Future;
use std::io;
use std::net::SocketAddr;
use std::net::{IpAddr, Ipv4Addr, Ipv6Addr, SocketAddr};
use std::pin::Pin;
use std::sync::Arc;
use std::task::{self, Poll};
@@ -11,7 +11,6 @@ use once_cell::sync::Lazy;
use tokio::sync::Mutex;
use trust_dns_resolver::{
config::{ResolverConfig, ResolverOpts},
lookup_ip::LookupIpIntoIter,
system_conf, AsyncResolver, TokioConnection, TokioConnectionProvider, TokioHandle,
};

@@ -27,10 +26,6 @@ pub(crate) struct TrustDnsResolver {
state: Arc<Mutex<State>>,
}

pub(crate) struct SocketAddrs {
iter: LookupIpIntoIter,
}

enum State {
Init,
Ready(SharedResolver),
@@ -52,7 +47,7 @@ impl TrustDnsResolver {
}

impl Service<hyper_dns::Name> for TrustDnsResolver {
type Response = SocketAddrs;
type Response = std::vec::IntoIter<SocketAddr>;
type Error = BoxError;
type Future = Pin<Box<dyn Future<Output = Result<Self::Response, Self::Error>> + Send>>;

@@ -79,18 +74,45 @@ impl Service<hyper_dns::Name> for TrustDnsResolver {
drop(lock);

let lookup = resolver.lookup_ip(name.as_str()).await?;
Ok(SocketAddrs {
iter: lookup.into_iter(),
})

let iter = lookup
.into_iter()
.filter_map(|ip| {
if is_allowed(ip) {
Some(SocketAddr::new(ip, 0))
} else {
None
}
})
.collect::<Vec<_>>()
.into_iter();

Ok(iter)
})
}
}

impl Iterator for SocketAddrs {
type Item = SocketAddr;

fn next(&mut self) -> Option<Self::Item> {
self.iter.next().map(|ip_addr| SocketAddr::new(ip_addr, 0))
fn is_allowed(addr: IpAddr) -> bool {
match addr {
IpAddr::V4(addr) => {
!addr.is_private()
&& !addr.is_loopback()
&& !addr.is_link_local()
&& !addr.is_broadcast()
&& !addr.is_documentation()
&& !is_shared(addr)
&& !is_reserved(addr)
&& !is_benchmarking(addr)
&& !starts_with_zero(addr)
}
IpAddr::V6(addr) => {
!addr.is_multicast()
&& !addr.is_loopback()
&& !is_unicast_link_local(addr)
&& !is_unique_local(addr)
&& !addr.is_unspecified()
&& !is_documentation_v6(addr)
}
}
}

@@ -102,3 +124,66 @@ async fn new_resolver() -> Result<SharedResolver, BoxError> {
let resolver = AsyncResolver::new(config, opts, TokioHandle)?;
Ok(Arc::new(resolver))
}

/// Util functions copied from the unstable standard library near identically
fn is_shared(addr: Ipv4Addr) -> bool {
addr.octets()[0] == 100 && (addr.octets()[1] & 0b1100_0000 == 0b0100_0000)
}

fn is_reserved(addr: Ipv4Addr) -> bool {
(addr.octets()[0] == 192 && addr.octets()[1] == 0 && addr.octets()[2] == 0)
|| (addr.octets()[0] & 240 == 240 && !addr.is_broadcast())
}

fn is_benchmarking(addr: Ipv4Addr) -> bool {
addr.octets()[0] == 198 && (addr.octets()[1] & 0xfe) == 18
}

fn starts_with_zero(addr: Ipv4Addr) -> bool {
addr.octets()[0] == 0
}

fn is_unicast_link_local(addr: Ipv6Addr) -> bool {
(addr.segments()[0] & 0xffc0) == 0xfe80
}

fn is_unique_local(addr: Ipv6Addr) -> bool {
(addr.segments()[0] & 0xfe00) == 0xfc00
}

fn is_documentation_v6(addr: Ipv6Addr) -> bool {
(addr.segments()[0] == 0x2001) && (addr.segments()[1] == 0xdb8)
}

#[cfg(test)]
mod tests {
use std::net::IpAddr;

use crate::dns::is_allowed;

#[test]
fn is_allowed_test() {
assert!(!is_allowed(IpAddr::from([10, 254, 0, 0])));
assert!(!is_allowed(IpAddr::from([192, 168, 10, 65])));
assert!(!is_allowed(IpAddr::from([172, 16, 10, 65])));
assert!(!is_allowed(IpAddr::from([0, 1, 2, 3])));
assert!(!is_allowed(IpAddr::from([0, 0, 0, 0])));
assert!(!is_allowed(IpAddr::from([127, 0, 0, 1])));
assert!(!is_allowed(IpAddr::from([169, 254, 45, 1])));
assert!(!is_allowed(IpAddr::from([255, 255, 255, 255])));
assert!(!is_allowed(IpAddr::from([192, 0, 2 ,255])));
assert!(!is_allowed(IpAddr::from([198, 51, 100, 65])));
assert!(!is_allowed(IpAddr::from([203, 0, 113, 6])));
assert!(!is_allowed(IpAddr::from([100, 100, 0, 0])));
assert!(!is_allowed(IpAddr::from([192, 0, 0, 0])));
assert!(!is_allowed(IpAddr::from([192, 0, 0, 255])));
assert!(!is_allowed(IpAddr::from([250, 10, 20, 30])));
assert!(!is_allowed(IpAddr::from([198, 18, 0, 0])));

assert!(is_allowed(IpAddr::from([1, 1, 1, 1])));

assert!(!is_allowed(IpAddr::from([0, 0, 0, 0, 0, 0, 0, 0x1])));

assert!(is_allowed(IpAddr::from([0, 0, 0, 0xffff, 0, 0, 0, 0x1])));
}
}