2023-01-27 21:37:20 +00:00
|
|
|
// Copyright (c) Tailscale Inc & AUTHORS
|
|
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
2022-11-13 05:54:10 +00:00
|
|
|
|
|
|
|
package dns
|
|
|
|
|
|
|
|
import (
|
2023-12-22 01:40:03 +00:00
|
|
|
"bytes"
|
2022-11-13 05:54:10 +00:00
|
|
|
"context"
|
2023-12-22 01:40:03 +00:00
|
|
|
"errors"
|
2022-11-13 05:54:10 +00:00
|
|
|
|
|
|
|
"github.com/illarion/gonotify"
|
2023-12-22 01:40:03 +00:00
|
|
|
"tailscale.com/health"
|
2022-11-13 05:54:10 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func (m *directManager) runFileWatcher() {
|
|
|
|
in, err := gonotify.NewInotify()
|
|
|
|
if err != nil {
|
|
|
|
// Oh well, we tried. This is all best effort for now, to
|
|
|
|
// surface warnings to users.
|
|
|
|
m.logf("dns: inotify new: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ctx, cancel := context.WithCancel(m.ctx)
|
|
|
|
defer cancel()
|
|
|
|
go m.closeInotifyOnDone(ctx, in)
|
|
|
|
|
|
|
|
const events = gonotify.IN_ATTRIB |
|
|
|
|
gonotify.IN_CLOSE_WRITE |
|
|
|
|
gonotify.IN_CREATE |
|
|
|
|
gonotify.IN_DELETE |
|
|
|
|
gonotify.IN_MODIFY |
|
|
|
|
gonotify.IN_MOVE
|
|
|
|
|
|
|
|
if err := in.AddWatch("/etc/", events); err != nil {
|
|
|
|
m.logf("dns: inotify addwatch: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
for {
|
|
|
|
events, err := in.Read()
|
|
|
|
if ctx.Err() != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
m.logf("dns: inotify read: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
var match bool
|
|
|
|
for _, ev := range events {
|
|
|
|
if ev.Name == resolvConf {
|
|
|
|
match = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !match {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
m.checkForFileTrample()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-04-25 21:25:48 +00:00
|
|
|
var warnTrample = health.NewWarnable()
|
2023-12-22 01:40:03 +00:00
|
|
|
|
|
|
|
// checkForFileTrample checks whether /etc/resolv.conf has been trampled
|
|
|
|
// by another program on the system. (e.g. a DHCP client)
|
|
|
|
func (m *directManager) checkForFileTrample() {
|
|
|
|
m.mu.Lock()
|
|
|
|
want := m.wantResolvConf
|
|
|
|
lastWarn := m.lastWarnContents
|
|
|
|
m.mu.Unlock()
|
|
|
|
|
|
|
|
if want == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
cur, err := m.fs.ReadFile(resolvConf)
|
|
|
|
if err != nil {
|
|
|
|
m.logf("trample: read error: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if bytes.Equal(cur, want) {
|
2024-04-26 17:12:46 +00:00
|
|
|
m.health.SetWarnable(warnTrample, nil)
|
2023-12-22 01:40:03 +00:00
|
|
|
if lastWarn != nil {
|
|
|
|
m.mu.Lock()
|
|
|
|
m.lastWarnContents = nil
|
|
|
|
m.mu.Unlock()
|
|
|
|
m.logf("trample: resolv.conf again matches expected content")
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if bytes.Equal(cur, lastWarn) {
|
|
|
|
// We already logged about this, so not worth doing it again.
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
m.mu.Lock()
|
|
|
|
m.lastWarnContents = cur
|
|
|
|
m.mu.Unlock()
|
|
|
|
|
|
|
|
show := cur
|
|
|
|
if len(show) > 1024 {
|
|
|
|
show = show[:1024]
|
|
|
|
}
|
|
|
|
m.logf("trample: resolv.conf changed from what we expected. did some other program interfere? current contents: %q", show)
|
2024-04-26 17:12:46 +00:00
|
|
|
m.health.SetWarnable(warnTrample, errors.New("Linux DNS config not ideal. /etc/resolv.conf overwritten. See https://tailscale.com/s/dns-fight"))
|
2023-12-22 01:40:03 +00:00
|
|
|
}
|
|
|
|
|
2022-11-13 05:54:10 +00:00
|
|
|
func (m *directManager) closeInotifyOnDone(ctx context.Context, in *gonotify.Inotify) {
|
|
|
|
<-ctx.Done()
|
|
|
|
in.Close()
|
|
|
|
}
|