mirror of
https://github.com/google/nomulus.git
synced 2025-05-09 08:18:21 +02:00
286 lines
12 KiB
Java
286 lines
12 KiB
Java
// Copyright 2017 The Nomulus Authors. All Rights Reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package google.registry.rdap;
|
|
|
|
import static google.registry.model.EppResourceUtils.loadByForeignKey;
|
|
import static google.registry.request.Action.Method.GET;
|
|
import static google.registry.request.Action.Method.HEAD;
|
|
|
|
import com.google.common.collect.ImmutableSortedSet;
|
|
import com.google.common.collect.Iterables;
|
|
import com.google.common.net.InetAddresses;
|
|
import com.google.common.primitives.Booleans;
|
|
import com.googlecode.objectify.cmd.Query;
|
|
import google.registry.model.domain.DomainBase;
|
|
import google.registry.model.host.HostResource;
|
|
import google.registry.rdap.RdapJsonFormatter.OutputDataType;
|
|
import google.registry.rdap.RdapMetrics.EndpointType;
|
|
import google.registry.rdap.RdapMetrics.SearchType;
|
|
import google.registry.rdap.RdapSearchResults.IncompletenessWarningType;
|
|
import google.registry.rdap.RdapSearchResults.NameserverSearchResponse;
|
|
import google.registry.request.Action;
|
|
import google.registry.request.HttpException.BadRequestException;
|
|
import google.registry.request.HttpException.NotFoundException;
|
|
import google.registry.request.HttpException.UnprocessableEntityException;
|
|
import google.registry.request.Parameter;
|
|
import google.registry.request.auth.Auth;
|
|
import java.net.InetAddress;
|
|
import java.util.ArrayList;
|
|
import java.util.List;
|
|
import java.util.Optional;
|
|
import javax.inject.Inject;
|
|
|
|
/**
|
|
* RDAP (new WHOIS) action for nameserver search requests.
|
|
*
|
|
* <p>All commands and responses conform to the RDAP spec as defined in RFCs 7480 through 7485.
|
|
*
|
|
* @see <a href="http://tools.ietf.org/html/rfc7482">RFC 7482: Registration Data Access Protocol
|
|
* (RDAP) Query Format</a>
|
|
* @see <a href="http://tools.ietf.org/html/rfc7483">RFC 7483: JSON Responses for the Registration
|
|
* Data Access Protocol (RDAP)</a>
|
|
*/
|
|
@Action(
|
|
service = Action.Service.PUBAPI,
|
|
path = "/rdap/nameservers",
|
|
method = {GET, HEAD},
|
|
auth = Auth.AUTH_PUBLIC_ANONYMOUS)
|
|
public class RdapNameserverSearchAction extends RdapSearchActionBase {
|
|
|
|
public static final String PATH = "/rdap/nameservers";
|
|
|
|
@Inject @Parameter("name") Optional<String> nameParam;
|
|
@Inject @Parameter("ip") Optional<String> ipParam;
|
|
@Inject public RdapNameserverSearchAction() {
|
|
super("nameserver search", EndpointType.NAMESERVERS);
|
|
}
|
|
|
|
private enum CursorType {
|
|
NAME,
|
|
ADDRESS
|
|
}
|
|
|
|
/**
|
|
* Parses the parameters and calls the appropriate search function.
|
|
*
|
|
* <p>The RDAP spec allows nameserver search by either name or IP address.
|
|
*/
|
|
@Override
|
|
public NameserverSearchResponse getSearchResponse(boolean isHeadRequest) {
|
|
// RDAP syntax example: /rdap/nameservers?name=ns*.example.com.
|
|
if (Booleans.countTrue(nameParam.isPresent(), ipParam.isPresent()) != 1) {
|
|
throw new BadRequestException("You must specify either name=XXXX or ip=YYYY");
|
|
}
|
|
NameserverSearchResponse results;
|
|
if (nameParam.isPresent()) {
|
|
// RDAP Technical Implementation Guilde 2.2.3 - we MAY support nameserver search queries based
|
|
// on a "nameserver search pattern" as defined in RFC7482
|
|
//
|
|
// syntax: /rdap/nameservers?name=exam*.com
|
|
metricInformationBuilder.setSearchType(SearchType.BY_NAMESERVER_NAME);
|
|
results =
|
|
searchByName(
|
|
recordWildcardType(
|
|
RdapSearchPattern.createFromLdhOrUnicodeDomainName(nameParam.get())));
|
|
} else {
|
|
// RDAP Technical Implementation Guide 2.2.3 - we MUST support nameserver search queries based
|
|
// on IP address as defined in RFC7482 3.2.2. Doesn't require pattern matching
|
|
//
|
|
// syntax: /rdap/nameservers?ip=1.2.3.4
|
|
metricInformationBuilder.setSearchType(SearchType.BY_NAMESERVER_ADDRESS);
|
|
InetAddress inetAddress;
|
|
try {
|
|
inetAddress = InetAddresses.forString(ipParam.get());
|
|
} catch (IllegalArgumentException e) {
|
|
throw new BadRequestException("Invalid value of ip parameter");
|
|
}
|
|
results = searchByIp(inetAddress);
|
|
}
|
|
if (results.nameserverSearchResults().isEmpty()) {
|
|
throw new NotFoundException("No nameservers found");
|
|
}
|
|
return results;
|
|
}
|
|
|
|
/**
|
|
* Searches for nameservers by name, returning a JSON array of nameserver info maps.
|
|
*
|
|
* <p>When deleted nameservers are included in the search, the search is treated as if it has a
|
|
* wildcard, because multiple results can be returned.
|
|
*/
|
|
private NameserverSearchResponse searchByName(final RdapSearchPattern partialStringQuery) {
|
|
// Handle queries without a wildcard -- just load by foreign key. We can't do this if deleted
|
|
// nameservers are desired, because there may be multiple nameservers with the same name.
|
|
if (!partialStringQuery.getHasWildcard() && !shouldIncludeDeleted()) {
|
|
return searchByNameUsingForeignKey(partialStringQuery);
|
|
}
|
|
// Handle queries with a wildcard (or including deleted entries). If there is a suffix, it
|
|
// should be a domain that we manage, so we can look up the domain and search through the
|
|
// subordinate hosts. This is more efficient, and lets us permit wildcard searches with no
|
|
// initial string. Deleted nameservers cannot be searched using a suffix, because the logic
|
|
// of the deletion status of the superordinate domain versus the deletion status of the
|
|
// subordinate host gets too messy.
|
|
if (partialStringQuery.getSuffix() != null) {
|
|
if (shouldIncludeDeleted()) {
|
|
throw new UnprocessableEntityException(
|
|
"A suffix after a wildcard is not allowed when searching for deleted nameservers");
|
|
}
|
|
return searchByNameUsingSuperordinateDomain(partialStringQuery);
|
|
}
|
|
// Handle queries with a wildcard (or deleted entries included), but no suffix.
|
|
return searchByNameUsingPrefix(partialStringQuery);
|
|
}
|
|
|
|
/**
|
|
* Searches for nameservers by name with no wildcard or deleted names.
|
|
*
|
|
* <p>In this case, we can load by foreign key.
|
|
*/
|
|
private NameserverSearchResponse searchByNameUsingForeignKey(
|
|
RdapSearchPattern partialStringQuery) {
|
|
NameserverSearchResponse.Builder builder =
|
|
NameserverSearchResponse.builder()
|
|
.setIncompletenessWarningType(IncompletenessWarningType.COMPLETE);
|
|
|
|
Optional<HostResource> hostResource =
|
|
loadByForeignKey(
|
|
HostResource.class, partialStringQuery.getInitialString(), getRequestTime());
|
|
|
|
metricInformationBuilder.setNumHostsRetrieved(hostResource.isPresent() ? 1 : 0);
|
|
|
|
if (shouldBeVisible(hostResource)) {
|
|
builder
|
|
.nameserverSearchResultsBuilder()
|
|
.add(rdapJsonFormatter.createRdapNameserver(hostResource.get(), OutputDataType.FULL));
|
|
}
|
|
return builder.build();
|
|
}
|
|
|
|
/** Searches for nameservers by name using the superordinate domain as a suffix. */
|
|
private NameserverSearchResponse searchByNameUsingSuperordinateDomain(
|
|
RdapSearchPattern partialStringQuery) {
|
|
Optional<DomainBase> domainBase =
|
|
loadByForeignKey(DomainBase.class, partialStringQuery.getSuffix(), getRequestTime());
|
|
if (!domainBase.isPresent()) {
|
|
// Don't allow wildcards with suffixes which are not domains we manage. That would risk a
|
|
// table scan in many easily foreseeable cases. The user might ask for ns*.zombo.com,
|
|
// forcing us to query for all hosts beginning with ns, then filter for those ending in
|
|
// .zombo.com. It might well be that 80% of all hostnames begin with ns, leading to
|
|
// inefficiency.
|
|
throw new UnprocessableEntityException(
|
|
"A suffix after a wildcard in a nameserver lookup must be an in-bailiwick domain");
|
|
}
|
|
List<HostResource> hostList = new ArrayList<>();
|
|
for (String fqhn : ImmutableSortedSet.copyOf(domainBase.get().getSubordinateHosts())) {
|
|
if (cursorString.isPresent() && (fqhn.compareTo(cursorString.get()) <= 0)) {
|
|
continue;
|
|
}
|
|
// We can't just check that the host name starts with the initial query string, because
|
|
// then the query ns.exam*.example.com would match against nameserver ns.example.com.
|
|
if (partialStringQuery.matches(fqhn)) {
|
|
Optional<HostResource> hostResource =
|
|
loadByForeignKey(HostResource.class, fqhn, getRequestTime());
|
|
if (shouldBeVisible(hostResource)) {
|
|
hostList.add(hostResource.get());
|
|
if (hostList.size() > rdapResultSetMaxSize) {
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return makeSearchResults(
|
|
hostList,
|
|
IncompletenessWarningType.COMPLETE,
|
|
domainBase.get().getSubordinateHosts().size(),
|
|
CursorType.NAME);
|
|
}
|
|
|
|
/**
|
|
* Searches for nameservers by name with a prefix and wildcard.
|
|
*
|
|
* <p>There are no pending deletes for hosts, so we can call {@link
|
|
* RdapSearchActionBase#queryItems}.
|
|
*/
|
|
private NameserverSearchResponse searchByNameUsingPrefix(RdapSearchPattern partialStringQuery) {
|
|
// Add 1 so we can detect truncation.
|
|
int querySizeLimit = getStandardQuerySizeLimit();
|
|
Query<HostResource> query =
|
|
queryItems(
|
|
HostResource.class,
|
|
"fullyQualifiedHostName",
|
|
partialStringQuery,
|
|
cursorString,
|
|
getDeletedItemHandling(),
|
|
querySizeLimit);
|
|
return makeSearchResults(
|
|
getMatchingResources(query, shouldIncludeDeleted(), querySizeLimit), CursorType.NAME);
|
|
}
|
|
|
|
/** Searches for nameservers by IP address, returning a JSON array of nameserver info maps. */
|
|
private NameserverSearchResponse searchByIp(InetAddress inetAddress) {
|
|
// Add 1 so we can detect truncation.
|
|
int querySizeLimit = getStandardQuerySizeLimit();
|
|
Query<HostResource> query =
|
|
queryItems(
|
|
HostResource.class,
|
|
"inetAddresses",
|
|
inetAddress.getHostAddress(),
|
|
Optional.empty(),
|
|
cursorString,
|
|
getDeletedItemHandling(),
|
|
querySizeLimit);
|
|
return makeSearchResults(
|
|
getMatchingResources(query, shouldIncludeDeleted(), querySizeLimit), CursorType.ADDRESS);
|
|
}
|
|
|
|
/** Output JSON for a lists of hosts contained in an {@link RdapResultSet}. */
|
|
private NameserverSearchResponse makeSearchResults(
|
|
RdapResultSet<HostResource> resultSet, CursorType cursorType) {
|
|
return makeSearchResults(
|
|
resultSet.resources(),
|
|
resultSet.incompletenessWarningType(),
|
|
resultSet.numResourcesRetrieved(),
|
|
cursorType);
|
|
}
|
|
|
|
/** Output JSON for a list of hosts. */
|
|
private NameserverSearchResponse makeSearchResults(
|
|
List<HostResource> hosts,
|
|
IncompletenessWarningType incompletenessWarningType,
|
|
int numHostsRetrieved,
|
|
CursorType cursorType) {
|
|
metricInformationBuilder.setNumHostsRetrieved(numHostsRetrieved);
|
|
OutputDataType outputDataType =
|
|
(hosts.size() > 1) ? OutputDataType.SUMMARY : OutputDataType.FULL;
|
|
NameserverSearchResponse.Builder builder =
|
|
NameserverSearchResponse.builder().setIncompletenessWarningType(incompletenessWarningType);
|
|
Optional<String> newCursor = Optional.empty();
|
|
for (HostResource host : Iterables.limit(hosts, rdapResultSetMaxSize)) {
|
|
newCursor =
|
|
Optional.of(
|
|
(cursorType == CursorType.NAME)
|
|
? host.getFullyQualifiedHostName()
|
|
: host.getRepoId());
|
|
builder
|
|
.nameserverSearchResultsBuilder()
|
|
.add(rdapJsonFormatter.createRdapNameserver(host, outputDataType));
|
|
}
|
|
if (rdapResultSetMaxSize < hosts.size()) {
|
|
builder.setNextPageUri(createNavigationUri(newCursor.get()));
|
|
builder.setIncompletenessWarningType(IncompletenessWarningType.TRUNCATED);
|
|
}
|
|
return builder.build();
|
|
}
|
|
}
|