/* dnstap support for Unbound */

/*
* Copyright (c) 2013-2014, Farsight Security, Inc.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* 3. Neither the name of the copyright holder nor the names of its
* contributors may be used to endorse or promote products derived from
* this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
* OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
* OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
* ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/

#include "dnstap/dnstap_config.h"

#ifdef USE_DNSTAP

#include "config.h"
#include <string.h>
#include <sys/time.h>
#ifdef HAVE_SYS_STAT_H
#include <sys/stat.h>
#endif
#include <errno.h>
#include "sldns/sbuffer.h"
#include "util/config_file.h"
#include "util/net_help.h"
#include "util/netevent.h"
#include "util/log.h"

#include <protobuf-c/protobuf-c.h>

#include "dnstap/dnstap.h"
#include "dnstap/dtstream.h"
#include "dnstap/dnstap.pb-c.h"

#define DNSTAP_INITIAL_BUF_SIZE         256

struct dt_msg {
       void            *buf;
       size_t          len_buf;
       Dnstap__Dnstap  d;
       Dnstap__Message m;
};

static int
dt_pack(const Dnstap__Dnstap *d, void **buf, size_t *sz)
{
       ProtobufCBufferSimple sbuf;

       memset(&sbuf, 0, sizeof(sbuf));
       sbuf.base.append = protobuf_c_buffer_simple_append;
       sbuf.len = 0;
       sbuf.alloced = DNSTAP_INITIAL_BUF_SIZE;
       sbuf.data = malloc(sbuf.alloced);
       if (sbuf.data == NULL)
               return 0;
       sbuf.must_free_data = 1;

       *sz = dnstap__dnstap__pack_to_buffer(d, (ProtobufCBuffer *) &sbuf);
       if (sbuf.data == NULL)
               return 0;
       *buf = sbuf.data;

       return 1;
}

/** See if the message is sent due to dnstap sample rate */
static int
dt_sample_rate_limited(struct dt_env* env)
{
       lock_basic_lock(&env->sample_lock);
       /* Sampling is every [n] packets. Where n==1, every packet is sent */
       if(env->sample_rate > 1) {
               int submit = 0;
               /* if sampling is engaged... */
               if (env->sample_rate_count > env->sample_rate) {
                       /* once the count passes the limit */
                       /* submit the message */
                       submit = 1;
                       /* and reset the count */
                       env->sample_rate_count = 0;
               }
               /* increment count regardless */
               env->sample_rate_count++;
               lock_basic_unlock(&env->sample_lock);
               return !submit;
       }
       lock_basic_unlock(&env->sample_lock);
       return 0;
}

static void
dt_send(const struct dt_env *env, void *buf, size_t len_buf)
{
       dt_msg_queue_submit(env->msgqueue, buf, len_buf);
}

static void
dt_msg_init(const struct dt_env *env,
           struct dt_msg *dm,
           Dnstap__Message__Type mtype)
{
       memset(dm, 0, sizeof(*dm));
       dm->d.base.descriptor = &dnstap__dnstap__descriptor;
       dm->m.base.descriptor = &dnstap__message__descriptor;
       dm->d.type = DNSTAP__DNSTAP__TYPE__MESSAGE;
       dm->d.message = &dm->m;
       dm->m.type = mtype;
       if (env->identity != NULL) {
               dm->d.identity.data = (uint8_t *) env->identity;
               dm->d.identity.len = (size_t) env->len_identity;
               dm->d.has_identity = 1;
       }
       if (env->version != NULL) {
               dm->d.version.data = (uint8_t *) env->version;
               dm->d.version.len = (size_t) env->len_version;
               dm->d.has_version = 1;
       }
}

/* check that the socket file can be opened and exists, print error if not */
static void
check_socket_file(const char* socket_path)
{
       struct stat statbuf;
       memset(&statbuf, 0, sizeof(statbuf));
       if(stat(socket_path, &statbuf) < 0) {
               log_warn("could not open dnstap-socket-path: %s, %s",
                       socket_path, strerror(errno));
       }
}

struct dt_env *
dt_create(struct config_file* cfg)
{
       struct dt_env *env;

       if(cfg->dnstap && cfg->dnstap_socket_path && cfg->dnstap_socket_path[0] &&
               (cfg->dnstap_ip==NULL || cfg->dnstap_ip[0]==0)) {
               char* p = cfg->dnstap_socket_path;
               if(cfg->chrootdir && cfg->chrootdir[0] && strncmp(p,
                       cfg->chrootdir, strlen(cfg->chrootdir)) == 0)
                       p += strlen(cfg->chrootdir);
               verbose(VERB_OPS, "attempting to connect to dnstap socket %s",
                       p);
               check_socket_file(p);
       }

       env = (struct dt_env *) calloc(1, sizeof(struct dt_env));
       if (!env)
               return NULL;
       lock_basic_init(&env->sample_lock);

       env->dtio = dt_io_thread_create();
       if(!env->dtio) {
               log_err("malloc failure");
               free(env);
               return NULL;
       }
       if(!dt_io_thread_apply_cfg(env->dtio, cfg)) {
               dt_io_thread_delete(env->dtio);
               free(env);
               return NULL;
       }
       dt_apply_cfg(env, cfg);
       return env;
}

static void
dt_apply_identity(struct dt_env *env, struct config_file *cfg)
{
       char buf[MAXHOSTNAMELEN+1];
       if (!cfg->dnstap_send_identity) {
               free(env->identity);
               env->identity = NULL;
               return;
       }
       free(env->identity);
       if (cfg->dnstap_identity == NULL || cfg->dnstap_identity[0] == 0) {
               if (gethostname(buf, MAXHOSTNAMELEN) == 0) {
                       buf[MAXHOSTNAMELEN] = 0;
                       env->identity = strdup(buf);
               } else {
                       fatal_exit("dt_apply_identity: gethostname() failed");
               }
       } else {
               env->identity = strdup(cfg->dnstap_identity);
       }
       if (env->identity == NULL)
               fatal_exit("dt_apply_identity: strdup() failed");
       env->len_identity = (unsigned int)strlen(env->identity);
       verbose(VERB_OPS, "dnstap identity field set to \"%s\"",
               env->identity);
}

static void
dt_apply_version(struct dt_env *env, struct config_file *cfg)
{
       if (!cfg->dnstap_send_version) {
               free(env->version);
               env->version = NULL;
               return;
       }
       free(env->version);
       if (cfg->dnstap_version == NULL || cfg->dnstap_version[0] == 0)
               env->version = strdup(PACKAGE_STRING);
       else
               env->version = strdup(cfg->dnstap_version);
       if (env->version == NULL)
               fatal_exit("dt_apply_version: strdup() failed");
       env->len_version = (unsigned int)strlen(env->version);
       verbose(VERB_OPS, "dnstap version field set to \"%s\"",
               env->version);
}

void
dt_apply_logcfg(struct dt_env *env, struct config_file *cfg)
{
       if ((env->log_resolver_query_messages = (unsigned int)
            cfg->dnstap_log_resolver_query_messages))
       {
               verbose(VERB_OPS, "dnstap Message/RESOLVER_QUERY enabled");
       }
       if ((env->log_resolver_response_messages = (unsigned int)
            cfg->dnstap_log_resolver_response_messages))
       {
               verbose(VERB_OPS, "dnstap Message/RESOLVER_RESPONSE enabled");
       }
       if ((env->log_client_query_messages = (unsigned int)
            cfg->dnstap_log_client_query_messages))
       {
               verbose(VERB_OPS, "dnstap Message/CLIENT_QUERY enabled");
       }
       if ((env->log_client_response_messages = (unsigned int)
            cfg->dnstap_log_client_response_messages))
       {
               verbose(VERB_OPS, "dnstap Message/CLIENT_RESPONSE enabled");
       }
       if ((env->log_forwarder_query_messages = (unsigned int)
            cfg->dnstap_log_forwarder_query_messages))
       {
               verbose(VERB_OPS, "dnstap Message/FORWARDER_QUERY enabled");
       }
       if ((env->log_forwarder_response_messages = (unsigned int)
            cfg->dnstap_log_forwarder_response_messages))
       {
               verbose(VERB_OPS, "dnstap Message/FORWARDER_RESPONSE enabled");
       }
       lock_basic_lock(&env->sample_lock);
       if((env->sample_rate = (unsigned int)cfg->dnstap_sample_rate))
       {
               verbose(VERB_OPS, "dnstap SAMPLE_RATE enabled and set to \"%d\"", (int)env->sample_rate);
       }
       lock_basic_unlock(&env->sample_lock);
}

void
dt_apply_cfg(struct dt_env *env, struct config_file *cfg)
{
       if (!cfg->dnstap)
               return;

       dt_apply_identity(env, cfg);
       dt_apply_version(env, cfg);
       dt_apply_logcfg(env, cfg);
}

int
dt_init(struct dt_env *env, struct comm_base* base)
{
       env->msgqueue = dt_msg_queue_create(base);
       if(!env->msgqueue) {
               log_err("malloc failure");
               return 0;
       }
       if(!dt_io_thread_register_queue(env->dtio, env->msgqueue)) {
               log_err("malloc failure");
               dt_msg_queue_delete(env->msgqueue);
               env->msgqueue = NULL;
               return 0;
       }
       return 1;
}

void
dt_deinit(struct dt_env* env)
{
       dt_io_thread_unregister_queue(env->dtio, env->msgqueue);
       dt_msg_queue_delete(env->msgqueue);
}

void
dt_delete(struct dt_env *env)
{
       if (!env)
               return;
       dt_io_thread_delete(env->dtio);
       lock_basic_destroy(&env->sample_lock);
       free(env->identity);
       free(env->version);
       free(env);
}

static void
dt_fill_timeval(const struct timeval *tv,
               uint64_t *time_sec, protobuf_c_boolean *has_time_sec,
               uint32_t *time_nsec, protobuf_c_boolean *has_time_nsec)
{
#ifndef S_SPLINT_S
       *time_sec = tv->tv_sec;
       *time_nsec = tv->tv_usec * 1000;
#endif
       *has_time_sec = 1;
       *has_time_nsec = 1;
}

static void
dt_fill_buffer(sldns_buffer *b, ProtobufCBinaryData *p, protobuf_c_boolean *has)
{
       log_assert(b != NULL);
       p->len = sldns_buffer_limit(b);
       p->data = sldns_buffer_begin(b);
       *has = 1;
}

static void
dt_msg_fill_net(struct dt_msg *dm,
               struct sockaddr_storage *qs,
               struct sockaddr_storage *rs,
               enum comm_point_type cptype,
               void *cpssl,
               ProtobufCBinaryData *qaddr, protobuf_c_boolean *has_qaddr,
               uint32_t *qport, protobuf_c_boolean *has_qport,
               ProtobufCBinaryData *raddr, protobuf_c_boolean *has_raddr,
               uint32_t *rport, protobuf_c_boolean *has_rport)
{
       log_assert(qs->ss_family == AF_INET6 || qs->ss_family == AF_INET);
       if (qs->ss_family == AF_INET6) {
               struct sockaddr_in6 *q = (struct sockaddr_in6 *) qs;

               /* socket_family */
               dm->m.socket_family = DNSTAP__SOCKET_FAMILY__INET6;
               dm->m.has_socket_family = 1;

               /* addr: query_address or response_address */
               qaddr->data = q->sin6_addr.s6_addr;
               qaddr->len = 16; /* IPv6 */
               *has_qaddr = 1;

               /* port: query_port or response_port */
               *qport = ntohs(q->sin6_port);
               *has_qport = 1;
       } else if (qs->ss_family == AF_INET) {
               struct sockaddr_in *q = (struct sockaddr_in *) qs;

               /* socket_family */
               dm->m.socket_family = DNSTAP__SOCKET_FAMILY__INET;
               dm->m.has_socket_family = 1;

               /* addr: query_address or response_address */
               qaddr->data = (uint8_t *) &q->sin_addr.s_addr;
               qaddr->len = 4; /* IPv4 */
               *has_qaddr = 1;

               /* port: query_port or response_port */
               *qport = ntohs(q->sin_port);
               *has_qport = 1;
       }

       /*
        * This block is to fill second set of fields in DNSTAP-message defined as request_/response_ names.
        * Additional responsive structure is: struct sockaddr_storage *rs
        */
       if (rs && rs->ss_family == AF_INET6) {
               struct sockaddr_in6 *r = (struct sockaddr_in6 *) rs;

               /* addr: query_address or response_address */
               raddr->data = r->sin6_addr.s6_addr;
               raddr->len = 16; /* IPv6 */
               *has_raddr = 1;

               /* port: query_port or response_port */
               *rport = ntohs(r->sin6_port);
               *has_rport = 1;
       } else if (rs && rs->ss_family == AF_INET) {
               struct sockaddr_in *r = (struct sockaddr_in *) rs;

               /* addr: query_address or response_address */
               raddr->data = (uint8_t *) &r->sin_addr.s_addr;
               raddr->len = 4; /* IPv4 */
               *has_raddr = 1;

               /* port: query_port or response_port */
               *rport = ntohs(r->sin_port);
               *has_rport = 1;
       }

       if (cptype == comm_udp) {
               /* socket_protocol */
               dm->m.socket_protocol = DNSTAP__SOCKET_PROTOCOL__UDP;
               dm->m.has_socket_protocol = 1;
       } else if (cptype == comm_tcp) {
               if (cpssl == NULL) {
                       /* socket_protocol */
                       dm->m.socket_protocol = DNSTAP__SOCKET_PROTOCOL__TCP;
                       dm->m.has_socket_protocol = 1;
               } else {
                       /* socket_protocol */
                       dm->m.socket_protocol = DNSTAP__SOCKET_PROTOCOL__DOT;
                       dm->m.has_socket_protocol = 1;
               }
       } else if (cptype == comm_http) {
               /* socket_protocol */
               dm->m.socket_protocol = DNSTAP__SOCKET_PROTOCOL__DOH;
               dm->m.has_socket_protocol = 1;
       } else {
               /* other socket protocol */
               dm->m.socket_protocol = DNSTAP__SOCKET_PROTOCOL__TCP;
               dm->m.has_socket_protocol = 1;
       }
}

void
dt_msg_send_client_query(struct dt_env *env,
                        struct sockaddr_storage *qsock,
                        struct sockaddr_storage *rsock,
                        enum comm_point_type cptype,
                        void *cpssl,
                        sldns_buffer *qmsg,
                        struct timeval* tstamp)
{
       struct dt_msg dm;
       struct timeval qtime;

       if(dt_sample_rate_limited(env))
               return;

       if(tstamp)
               memcpy(&qtime, tstamp, sizeof(qtime));
       else    gettimeofday(&qtime, NULL);

       /* type */
       dt_msg_init(env, &dm, DNSTAP__MESSAGE__TYPE__CLIENT_QUERY);

       /* query_time */
       dt_fill_timeval(&qtime,
                       &dm.m.query_time_sec, &dm.m.has_query_time_sec,
                       &dm.m.query_time_nsec, &dm.m.has_query_time_nsec);

       /* query_message */
       dt_fill_buffer(qmsg, &dm.m.query_message, &dm.m.has_query_message);

       /* socket_family, socket_protocol, query_address, query_port, response_address, response_port */
       dt_msg_fill_net(&dm, qsock, rsock, cptype, cpssl,
                       &dm.m.query_address, &dm.m.has_query_address,
                       &dm.m.query_port, &dm.m.has_query_port,
                       &dm.m.response_address, &dm.m.has_response_address,
                       &dm.m.response_port, &dm.m.has_response_port);


       if (dt_pack(&dm.d, &dm.buf, &dm.len_buf))
               dt_send(env, dm.buf, dm.len_buf);
}

void
dt_msg_send_client_response(struct dt_env *env,
                           struct sockaddr_storage *qsock,
                           struct sockaddr_storage *rsock,
                           enum comm_point_type cptype,
                           void *cpssl,
                           sldns_buffer *rmsg)
{
       struct dt_msg dm;
       struct timeval rtime;

       if(dt_sample_rate_limited(env))
               return;

       gettimeofday(&rtime, NULL);

       /* type */
       dt_msg_init(env, &dm, DNSTAP__MESSAGE__TYPE__CLIENT_RESPONSE);

       /* response_time */
       dt_fill_timeval(&rtime,
                       &dm.m.response_time_sec, &dm.m.has_response_time_sec,
                       &dm.m.response_time_nsec, &dm.m.has_response_time_nsec);

       /* response_message */
       dt_fill_buffer(rmsg, &dm.m.response_message, &dm.m.has_response_message);

       /* socket_family, socket_protocol, query_address, query_port, response_address, response_port */
       dt_msg_fill_net(&dm, qsock, rsock, cptype, cpssl,
                       &dm.m.query_address, &dm.m.has_query_address,
                       &dm.m.query_port, &dm.m.has_query_port,
                       &dm.m.response_address, &dm.m.has_response_address,
                       &dm.m.response_port, &dm.m.has_response_port);

       if (dt_pack(&dm.d, &dm.buf, &dm.len_buf))
               dt_send(env, dm.buf, dm.len_buf);
}

void
dt_msg_send_outside_query(struct dt_env *env,
                         struct sockaddr_storage *rsock,
                         struct sockaddr_storage *qsock,
                         enum comm_point_type cptype,
                         void *cpssl,
                         uint8_t *zone, size_t zone_len,
                         sldns_buffer *qmsg)
{
       struct dt_msg dm;
       struct timeval qtime;
       uint16_t qflags;

       if(dt_sample_rate_limited(env))
               return;

       gettimeofday(&qtime, NULL);
       qflags = sldns_buffer_read_u16_at(qmsg, 2);

       /* type */
       if (qflags & BIT_RD) {
               if (!env->log_forwarder_query_messages)
                       return;
               dt_msg_init(env, &dm, DNSTAP__MESSAGE__TYPE__FORWARDER_QUERY);
       } else {
               if (!env->log_resolver_query_messages)
                       return;
               dt_msg_init(env, &dm, DNSTAP__MESSAGE__TYPE__RESOLVER_QUERY);
       }

       /* query_zone */
       dm.m.query_zone.data = zone;
       dm.m.query_zone.len = zone_len;
       dm.m.has_query_zone = 1;

       /* query_time_sec, query_time_nsec */
       dt_fill_timeval(&qtime,
                       &dm.m.query_time_sec, &dm.m.has_query_time_sec,
                       &dm.m.query_time_nsec, &dm.m.has_query_time_nsec);

       /* query_message */
       dt_fill_buffer(qmsg, &dm.m.query_message, &dm.m.has_query_message);

       /* socket_family, socket_protocol, response_address, response_port, query_address, query_port */
       dt_msg_fill_net(&dm, rsock, qsock, cptype, cpssl,
                       &dm.m.response_address, &dm.m.has_response_address,
                       &dm.m.response_port, &dm.m.has_response_port,
                       &dm.m.query_address, &dm.m.has_query_address,
                       &dm.m.query_port, &dm.m.has_query_port);

       if (dt_pack(&dm.d, &dm.buf, &dm.len_buf))
               dt_send(env, dm.buf, dm.len_buf);
}

void
dt_msg_send_outside_response(struct dt_env *env,
       struct sockaddr_storage *rsock,
       struct sockaddr_storage *qsock,
       enum comm_point_type cptype,
       void *cpssl,
       uint8_t *zone, size_t zone_len,
       uint8_t *qbuf, size_t qbuf_len,
       const struct timeval *qtime,
       const struct timeval *rtime,
       sldns_buffer *rmsg)
{
       struct dt_msg dm;
       uint16_t qflags;

       if(dt_sample_rate_limited(env))
               return;

       (void)qbuf_len; log_assert(qbuf_len >= sizeof(qflags));
       memcpy(&qflags, qbuf, sizeof(qflags));
       qflags = ntohs(qflags);

       /* type */
       if (qflags & BIT_RD) {
               if (!env->log_forwarder_response_messages)
                       return;
               dt_msg_init(env, &dm, DNSTAP__MESSAGE__TYPE__FORWARDER_RESPONSE);
       } else {
               if (!env->log_resolver_response_messages)
                       return;
               dt_msg_init(env, &dm, DNSTAP__MESSAGE__TYPE__RESOLVER_RESPONSE);
       }

       /* query_zone */
       dm.m.query_zone.data = zone;
       dm.m.query_zone.len = zone_len;
       dm.m.has_query_zone = 1;

       /* query_time_sec, query_time_nsec */
       dt_fill_timeval(qtime,
                       &dm.m.query_time_sec, &dm.m.has_query_time_sec,
                       &dm.m.query_time_nsec, &dm.m.has_query_time_nsec);

       /* response_time_sec, response_time_nsec */
       dt_fill_timeval(rtime,
                       &dm.m.response_time_sec, &dm.m.has_response_time_sec,
                       &dm.m.response_time_nsec, &dm.m.has_response_time_nsec);

       /* response_message */
       dt_fill_buffer(rmsg, &dm.m.response_message, &dm.m.has_response_message);

       /* socket_family, socket_protocol, response_address, response_port, query_address, query_port */
       dt_msg_fill_net(&dm, rsock, qsock, cptype, cpssl,
                       &dm.m.response_address, &dm.m.has_response_address,
                       &dm.m.response_port, &dm.m.has_response_port,
                       &dm.m.query_address, &dm.m.has_query_address,
                       &dm.m.query_port, &dm.m.has_query_port);

       if (dt_pack(&dm.d, &dm.buf, &dm.len_buf))
               dt_send(env, dm.buf, dm.len_buf);
}

#endif /* USE_DNSTAP */