Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/dns/host_resolver_impl.h" | 5 #include "net/dns/host_resolver_impl.h" |
| 6 | 6 |
| 7 #if defined(OS_WIN) | 7 #if defined(OS_WIN) |
| 8 #include <Winsock2.h> | 8 #include <Winsock2.h> |
| 9 #elif defined(OS_POSIX) | 9 #elif defined(OS_POSIX) |
| 10 #include <netdb.h> | 10 #include <netdb.h> |
| (...skipping 232 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 243 } | 243 } |
| 244 | 244 |
| 245 //----------------------------------------------------------------------------- | 245 //----------------------------------------------------------------------------- |
| 246 | 246 |
| 247 AddressList EnsurePortOnAddressList(const AddressList& list, uint16 port) { | 247 AddressList EnsurePortOnAddressList(const AddressList& list, uint16 port) { |
| 248 if (list.empty() || list.front().port() == port) | 248 if (list.empty() || list.front().port() == port) |
| 249 return list; | 249 return list; |
| 250 return AddressList::CopyWithPort(list, port); | 250 return AddressList::CopyWithPort(list, port); |
| 251 } | 251 } |
| 252 | 252 |
| 253 bool IsAllLocalhostOfOneFamily(const AddressList& list) { | |
|
mmenke
2013/04/17 15:42:32
Think this function is worth a short description.
mmenke
2013/04/17 15:42:32
This function name seems to be inaccurate. We che
mmenke
2013/04/17 15:42:32
optional nit: Suggest using "addresses" rather th
szym
2013/04/17 17:09:16
Done.
szym
2013/04/17 17:09:16
Done. Also changed "localhost" to "loopback" which
szym
2013/04/17 17:09:16
Done.
| |
| 254 const uint8 kIPv6Loopback[] = { 0, 0, 0, 0, 0, 0, 0, 0, | |
| 255 0, 0, 0, 0, 0, 0, 0, 1 }; | |
| 256 for (unsigned i = 0; i < list.size(); ++i) { | |
| 257 const IPAddressNumber& address = list[i].address(); | |
| 258 switch (list[i].GetFamily()) { | |
|
mmenke
2013/04/17 15:42:32
nit: address.GetFamily()
szym
2013/04/17 17:09:16
GetFamily is a function of IPEndPoint. IPAddressNu
| |
| 259 case ADDRESS_FAMILY_IPV4: | |
| 260 if (address[0] != 127) return false; | |
|
mmenke
2013/04/17 15:42:32
nit: Line break before "return".
szym
2013/04/17 17:09:16
Done.
| |
| 261 break; | |
| 262 case ADDRESS_FAMILY_IPV6: | |
|
mmenke
2013/04/17 15:42:32
Do we even need to check for IPv6? I'm not partic
szym
2013/04/17 17:09:16
We don't, and this code path will not be exercised
mmenke
2013/04/17 17:35:00
I think we should go ahead and do that. If we nee
| |
| 263 if (!std::equal(address.begin(), address.end(), kIPv6Loopback)) | |
| 264 return false; | |
| 265 break; | |
| 266 default: | |
| 267 NOTREACHED(); | |
| 268 } | |
| 269 } | |
| 270 return true; | |
| 271 } | |
| 272 | |
| 253 // Creates NetLog parameters when the resolve failed. | 273 // Creates NetLog parameters when the resolve failed. |
| 254 base::Value* NetLogProcTaskFailedCallback(uint32 attempt_number, | 274 base::Value* NetLogProcTaskFailedCallback(uint32 attempt_number, |
| 255 int net_error, | 275 int net_error, |
| 256 int os_error, | 276 int os_error, |
| 257 NetLog::LogLevel /* log_level */) { | 277 NetLog::LogLevel /* log_level */) { |
| 258 DictionaryValue* dict = new DictionaryValue(); | 278 DictionaryValue* dict = new DictionaryValue(); |
| 259 if (attempt_number) | 279 if (attempt_number) |
| 260 dict->SetInteger("attempt_number", attempt_number); | 280 dict->SetInteger("attempt_number", attempt_number); |
| 261 | 281 |
| 262 dict->SetInteger("net_error", net_error); | 282 dict->SetInteger("net_error", net_error); |
| (...skipping 1680 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 1943 } | 1963 } |
| 1944 return true; | 1964 return true; |
| 1945 } | 1965 } |
| 1946 | 1966 |
| 1947 bool HostResolverImpl::ServeFromHosts(const Key& key, | 1967 bool HostResolverImpl::ServeFromHosts(const Key& key, |
| 1948 const RequestInfo& info, | 1968 const RequestInfo& info, |
| 1949 AddressList* addresses) { | 1969 AddressList* addresses) { |
| 1950 DCHECK(addresses); | 1970 DCHECK(addresses); |
| 1951 if (!HaveDnsConfig()) | 1971 if (!HaveDnsConfig()) |
| 1952 return false; | 1972 return false; |
| 1953 | |
| 1954 addresses->clear(); | 1973 addresses->clear(); |
| 1955 | 1974 |
| 1956 // HOSTS lookups are case-insensitive. | 1975 // HOSTS lookups are case-insensitive. |
| 1957 std::string hostname = StringToLowerASCII(key.hostname); | 1976 std::string hostname = StringToLowerASCII(key.hostname); |
| 1958 | 1977 |
| 1959 const DnsHosts& hosts = dns_client_->GetConfig()->hosts; | 1978 const DnsHosts& hosts = dns_client_->GetConfig()->hosts; |
| 1960 | 1979 |
| 1961 // If |address_family| is ADDRESS_FAMILY_UNSPECIFIED other implementations | 1980 // If |address_family| is ADDRESS_FAMILY_UNSPECIFIED other implementations |
| 1962 // (glibc and c-ares) return the first matching line. We have more | 1981 // (glibc and c-ares) return the first matching line. We have more |
| 1963 // flexibility, but lose implicit ordering. | 1982 // flexibility, but lose implicit ordering. |
| 1964 // We prefer IPv6 because "happy eyeballs" will fall back to IPv4 if | 1983 // We prefer IPv6 because "happy eyeballs" will fall back to IPv4 if |
| 1965 // necessary. | 1984 // necessary. |
| 1966 if (key.address_family == ADDRESS_FAMILY_IPV6 || | 1985 if (key.address_family == ADDRESS_FAMILY_IPV6 || |
| 1967 key.address_family == ADDRESS_FAMILY_UNSPECIFIED) { | 1986 key.address_family == ADDRESS_FAMILY_UNSPECIFIED) { |
| 1968 DnsHosts::const_iterator it = hosts.find( | 1987 DnsHosts::const_iterator it = hosts.find( |
| 1969 DnsHostsKey(hostname, ADDRESS_FAMILY_IPV6)); | 1988 DnsHostsKey(hostname, ADDRESS_FAMILY_IPV6)); |
| 1970 if (it != hosts.end()) | 1989 if (it != hosts.end()) |
| 1971 addresses->push_back(IPEndPoint(it->second, info.port())); | 1990 addresses->push_back(IPEndPoint(it->second, info.port())); |
| 1972 } | 1991 } |
| 1973 | 1992 |
| 1974 if (key.address_family == ADDRESS_FAMILY_IPV4 || | 1993 if (key.address_family == ADDRESS_FAMILY_IPV4 || |
| 1975 key.address_family == ADDRESS_FAMILY_UNSPECIFIED) { | 1994 key.address_family == ADDRESS_FAMILY_UNSPECIFIED) { |
| 1976 DnsHosts::const_iterator it = hosts.find( | 1995 DnsHosts::const_iterator it = hosts.find( |
| 1977 DnsHostsKey(hostname, ADDRESS_FAMILY_IPV4)); | 1996 DnsHostsKey(hostname, ADDRESS_FAMILY_IPV4)); |
| 1978 if (it != hosts.end()) | 1997 if (it != hosts.end()) |
| 1979 addresses->push_back(IPEndPoint(it->second, info.port())); | 1998 addresses->push_back(IPEndPoint(it->second, info.port())); |
| 1980 } | 1999 } |
| 1981 | 2000 |
| 2001 // If got only loopback addresses and the family was restricted, resolve | |
| 2002 // again, without restrictions. See SystemHostResolverCall for rationale. | |
| 2003 if ((key.host_resolver_flags & | |
| 2004 HOST_RESOLVER_DEFAULT_FAMILY_SET_DUE_TO_NO_IPV6) && | |
| 2005 IsAllLocalhostOfOneFamily(*addresses)) { | |
| 2006 Key new_key(key); | |
| 2007 new_key.address_family = ADDRESS_FAMILY_UNSPECIFIED; | |
| 2008 new_key.host_resolver_flags &= | |
| 2009 ~HOST_RESOLVER_DEFAULT_FAMILY_SET_DUE_TO_NO_IPV6; | |
| 2010 return ServeFromHosts(new_key, info, addresses); | |
| 2011 } | |
| 1982 return !addresses->empty(); | 2012 return !addresses->empty(); |
| 1983 } | 2013 } |
| 1984 | 2014 |
| 1985 void HostResolverImpl::CacheResult(const Key& key, | 2015 void HostResolverImpl::CacheResult(const Key& key, |
| 1986 const HostCache::Entry& entry, | 2016 const HostCache::Entry& entry, |
| 1987 base::TimeDelta ttl) { | 2017 base::TimeDelta ttl) { |
| 1988 if (cache_.get()) | 2018 if (cache_.get()) |
| 1989 cache_->Set(key, entry, base::TimeTicks::Now(), ttl); | 2019 cache_->Set(key, entry, base::TimeTicks::Now(), ttl); |
| 1990 } | 2020 } |
| 1991 | 2021 |
| (...skipping 119 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 2111 #if defined(OS_POSIX) && !defined(OS_MACOSX) | 2141 #if defined(OS_POSIX) && !defined(OS_MACOSX) |
| 2112 new LoopbackProbeJob(probe_weak_ptr_factory_.GetWeakPtr()); | 2142 new LoopbackProbeJob(probe_weak_ptr_factory_.GetWeakPtr()); |
| 2113 #endif | 2143 #endif |
| 2114 AbortAllInProgressJobs(); | 2144 AbortAllInProgressJobs(); |
| 2115 // |this| may be deleted inside AbortAllInProgressJobs(). | 2145 // |this| may be deleted inside AbortAllInProgressJobs(). |
| 2116 } | 2146 } |
| 2117 | 2147 |
| 2118 void HostResolverImpl::OnDNSChanged() { | 2148 void HostResolverImpl::OnDNSChanged() { |
| 2119 DnsConfig dns_config; | 2149 DnsConfig dns_config; |
| 2120 NetworkChangeNotifier::GetDnsConfig(&dns_config); | 2150 NetworkChangeNotifier::GetDnsConfig(&dns_config); |
| 2151 | |
| 2121 if (net_log_) { | 2152 if (net_log_) { |
| 2122 net_log_->AddGlobalEntry( | 2153 net_log_->AddGlobalEntry( |
| 2123 NetLog::TYPE_DNS_CONFIG_CHANGED, | 2154 NetLog::TYPE_DNS_CONFIG_CHANGED, |
| 2124 base::Bind(&NetLogDnsConfigCallback, &dns_config)); | 2155 base::Bind(&NetLogDnsConfigCallback, &dns_config)); |
| 2125 } | 2156 } |
| 2126 | 2157 |
| 2127 // TODO(szym): Remove once http://crbug.com/137914 is resolved. | 2158 // TODO(szym): Remove once http://crbug.com/137914 is resolved. |
| 2128 received_dns_config_ = dns_config.IsValid(); | 2159 received_dns_config_ = dns_config.IsValid(); |
| 2129 | 2160 |
| 2130 num_dns_failures_ = 0; | 2161 num_dns_failures_ = 0; |
| (...skipping 67 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 2198 } | 2229 } |
| 2199 DnsConfig dns_config; | 2230 DnsConfig dns_config; |
| 2200 NetworkChangeNotifier::GetDnsConfig(&dns_config); | 2231 NetworkChangeNotifier::GetDnsConfig(&dns_config); |
| 2201 dns_client_->SetConfig(dns_config); | 2232 dns_client_->SetConfig(dns_config); |
| 2202 num_dns_failures_ = 0; | 2233 num_dns_failures_ = 0; |
| 2203 if (dns_config.IsValid()) | 2234 if (dns_config.IsValid()) |
| 2204 UMA_HISTOGRAM_BOOLEAN("AsyncDNS.DnsClientEnabled", true); | 2235 UMA_HISTOGRAM_BOOLEAN("AsyncDNS.DnsClientEnabled", true); |
| 2205 } | 2236 } |
| 2206 | 2237 |
| 2207 } // namespace net | 2238 } // namespace net |
| OLD | NEW |