1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/dns/dns_config_service.h"
7 #include "base/logging.h"
8 #include "base/metrics/histogram.h"
9 #include "base/values.h"
10 #include "net/base/ip_endpoint.h"
11 #include "net/base/ip_pattern.h"
15 NameServerClassifier::NameServerClassifier() {
16 // Google Public DNS addresses from:
17 // https://developers.google.com/speed/public-dns/docs/using
18 AddRule("8.8.8.8", NAME_SERVERS_TYPE_GOOGLE_PUBLIC_DNS
);
19 AddRule("8.8.4.4", NAME_SERVERS_TYPE_GOOGLE_PUBLIC_DNS
);
20 AddRule("2001:4860:4860:0:0:0:0:8888", NAME_SERVERS_TYPE_GOOGLE_PUBLIC_DNS
),
21 AddRule("2001:4860:4860:0:0:0:0:8844", NAME_SERVERS_TYPE_GOOGLE_PUBLIC_DNS
),
23 // Count localhost as private, since we don't know what upstream it uses:
24 AddRule("127.*.*.*", NAME_SERVERS_TYPE_PRIVATE
);
25 AddRule("0:0:0:0:0:0:0:1", NAME_SERVERS_TYPE_PRIVATE
);
27 // RFC 1918 private addresses:
28 AddRule("10.*.*.*", NAME_SERVERS_TYPE_PRIVATE
);
29 AddRule("172.[16-31].*.*", NAME_SERVERS_TYPE_PRIVATE
);
30 AddRule("192.168.*.*", NAME_SERVERS_TYPE_PRIVATE
);
32 // IPv4 link-local addresses:
33 AddRule("169.254.*.*", NAME_SERVERS_TYPE_PRIVATE
);
35 // IPv6 link-local addresses:
36 AddRule("fe80:*:*:*:*:*:*:*", NAME_SERVERS_TYPE_PRIVATE
);
38 // Anything else counts as public:
39 AddRule("*.*.*.*", NAME_SERVERS_TYPE_PUBLIC
);
40 AddRule("*:*:*:*:*:*:*:*", NAME_SERVERS_TYPE_PUBLIC
);
43 NameServerClassifier::~NameServerClassifier() {}
45 NameServerClassifier::NameServersType
NameServerClassifier::GetNameServersType(
46 const std::vector
<IPEndPoint
>& nameservers
) const {
47 NameServersType type
= NAME_SERVERS_TYPE_NONE
;
48 for (std::vector
<IPEndPoint
>::const_iterator it
= nameservers
.begin();
49 it
!= nameservers
.end();
51 type
= MergeNameServersTypes(type
, GetNameServerType(it
->address()));
56 struct NameServerClassifier::NameServerTypeRule
{
57 NameServerTypeRule(const char* pattern_string
, NameServersType type
)
59 bool parsed
= pattern
.ParsePattern(pattern_string
);
67 void NameServerClassifier::AddRule(const char* pattern_string
,
68 NameServersType address_type
) {
69 rules_
.push_back(new NameServerTypeRule(pattern_string
, address_type
));
72 NameServerClassifier::NameServersType
NameServerClassifier::GetNameServerType(
73 const IPAddressNumber
& address
) const {
74 for (ScopedVector
<NameServerTypeRule
>::const_iterator it
= rules_
.begin();
77 if ((*it
)->pattern
.Match(address
))
81 return NAME_SERVERS_TYPE_NONE
;
84 NameServerClassifier::NameServersType
85 NameServerClassifier::MergeNameServersTypes(NameServersType a
,
87 if (a
== NAME_SERVERS_TYPE_NONE
)
89 if (b
== NAME_SERVERS_TYPE_NONE
)
93 return NAME_SERVERS_TYPE_MIXED
;
96 // Default values are taken from glibc resolv.h except timeout which is set to
97 // |kDnsTimeoutSeconds|.
98 DnsConfig::DnsConfig()
99 : unhandled_options(false),
100 append_to_multi_label_name(true),
101 randomize_ports(false),
103 timeout(base::TimeDelta::FromSeconds(kDnsTimeoutSeconds
)),
107 use_local_ipv6(false) {}
109 DnsConfig::~DnsConfig() {}
111 bool DnsConfig::Equals(const DnsConfig
& d
) const {
112 return EqualsIgnoreHosts(d
) && (hosts
== d
.hosts
);
115 bool DnsConfig::EqualsIgnoreHosts(const DnsConfig
& d
) const {
116 return (nameservers
== d
.nameservers
) &&
117 (search
== d
.search
) &&
118 (unhandled_options
== d
.unhandled_options
) &&
119 (append_to_multi_label_name
== d
.append_to_multi_label_name
) &&
120 (ndots
== d
.ndots
) &&
121 (timeout
== d
.timeout
) &&
122 (attempts
== d
.attempts
) &&
123 (rotate
== d
.rotate
) &&
124 (edns0
== d
.edns0
) &&
125 (use_local_ipv6
== d
.use_local_ipv6
);
128 void DnsConfig::CopyIgnoreHosts(const DnsConfig
& d
) {
129 nameservers
= d
.nameservers
;
131 unhandled_options
= d
.unhandled_options
;
132 append_to_multi_label_name
= d
.append_to_multi_label_name
;
135 attempts
= d
.attempts
;
138 use_local_ipv6
= d
.use_local_ipv6
;
141 base::Value
* DnsConfig::ToValue() const {
142 base::DictionaryValue
* dict
= new base::DictionaryValue();
144 base::ListValue
* list
= new base::ListValue();
145 for (size_t i
= 0; i
< nameservers
.size(); ++i
)
146 list
->Append(new base::StringValue(nameservers
[i
].ToString()));
147 dict
->Set("nameservers", list
);
149 list
= new base::ListValue();
150 for (size_t i
= 0; i
< search
.size(); ++i
)
151 list
->Append(new base::StringValue(search
[i
]));
152 dict
->Set("search", list
);
154 dict
->SetBoolean("unhandled_options", unhandled_options
);
155 dict
->SetBoolean("append_to_multi_label_name", append_to_multi_label_name
);
156 dict
->SetInteger("ndots", ndots
);
157 dict
->SetDouble("timeout", timeout
.InSecondsF());
158 dict
->SetInteger("attempts", attempts
);
159 dict
->SetBoolean("rotate", rotate
);
160 dict
->SetBoolean("edns0", edns0
);
161 dict
->SetBoolean("use_local_ipv6", use_local_ipv6
);
162 dict
->SetInteger("num_hosts", hosts
.size());
168 DnsConfigService::DnsConfigService()
169 : watch_failed_(false),
173 last_sent_empty_(true) {}
175 DnsConfigService::~DnsConfigService() {
178 void DnsConfigService::ReadConfig(const CallbackType
& callback
) {
179 DCHECK(CalledOnValidThread());
180 DCHECK(!callback
.is_null());
181 DCHECK(callback_
.is_null());
182 callback_
= callback
;
186 void DnsConfigService::WatchConfig(const CallbackType
& callback
) {
187 DCHECK(CalledOnValidThread());
188 DCHECK(!callback
.is_null());
189 DCHECK(callback_
.is_null());
190 callback_
= callback
;
191 watch_failed_
= !StartWatching();
195 void DnsConfigService::InvalidateConfig() {
196 DCHECK(CalledOnValidThread());
197 base::TimeTicks now
= base::TimeTicks::Now();
198 if (!last_invalidate_config_time_
.is_null()) {
199 UMA_HISTOGRAM_LONG_TIMES("AsyncDNS.ConfigNotifyInterval",
200 now
- last_invalidate_config_time_
);
202 last_invalidate_config_time_
= now
;
205 have_config_
= false;
209 void DnsConfigService::InvalidateHosts() {
210 DCHECK(CalledOnValidThread());
211 base::TimeTicks now
= base::TimeTicks::Now();
212 if (!last_invalidate_hosts_time_
.is_null()) {
213 UMA_HISTOGRAM_LONG_TIMES("AsyncDNS.HostsNotifyInterval",
214 now
- last_invalidate_hosts_time_
);
216 last_invalidate_hosts_time_
= now
;
223 void DnsConfigService::OnConfigRead(const DnsConfig
& config
) {
224 DCHECK(CalledOnValidThread());
225 DCHECK(config
.IsValid());
227 bool changed
= false;
228 if (!config
.EqualsIgnoreHosts(dns_config_
)) {
229 dns_config_
.CopyIgnoreHosts(config
);
233 if (!changed
&& !last_sent_empty_time_
.is_null()) {
234 UMA_HISTOGRAM_LONG_TIMES("AsyncDNS.UnchangedConfigInterval",
235 base::TimeTicks::Now() - last_sent_empty_time_
);
237 UMA_HISTOGRAM_BOOLEAN("AsyncDNS.ConfigChange", changed
);
238 UMA_HISTOGRAM_ENUMERATION(
239 "AsyncDNS.NameServersType",
240 classifier_
.GetNameServersType(dns_config_
.nameservers
),
241 NameServerClassifier::NAME_SERVERS_TYPE_MAX_VALUE
);
244 if (have_hosts_
|| watch_failed_
)
248 void DnsConfigService::OnHostsRead(const DnsHosts
& hosts
) {
249 DCHECK(CalledOnValidThread());
251 bool changed
= false;
252 if (hosts
!= dns_config_
.hosts
) {
253 dns_config_
.hosts
= hosts
;
257 if (!changed
&& !last_sent_empty_time_
.is_null()) {
258 UMA_HISTOGRAM_LONG_TIMES("AsyncDNS.UnchangedHostsInterval",
259 base::TimeTicks::Now() - last_sent_empty_time_
);
261 UMA_HISTOGRAM_BOOLEAN("AsyncDNS.HostsChange", changed
);
264 if (have_config_
|| watch_failed_
)
268 void DnsConfigService::StartTimer() {
269 DCHECK(CalledOnValidThread());
270 if (last_sent_empty_
) {
271 DCHECK(!timer_
.IsRunning());
272 return; // No need to withdraw again.
276 // Give it a short timeout to come up with a valid config. Otherwise withdraw
277 // the config from the receiver. The goal is to avoid perceivable network
278 // outage (when using the wrong config) but at the same time avoid
279 // unnecessary Job aborts in HostResolverImpl. The signals come from multiple
280 // sources so it might receive multiple events during a config change.
282 // DHCP and user-induced changes are on the order of seconds, so 150ms should
283 // not add perceivable delay. On the other hand, config readers should finish
284 // within 150ms with the rare exception of I/O block or extra large HOSTS.
285 const base::TimeDelta kTimeout
= base::TimeDelta::FromMilliseconds(150);
287 timer_
.Start(FROM_HERE
,
290 &DnsConfigService::OnTimeout
);
293 void DnsConfigService::OnTimeout() {
294 DCHECK(CalledOnValidThread());
295 DCHECK(!last_sent_empty_
);
296 // Indicate that even if there is no change in On*Read, we will need to
297 // update the receiver when the config becomes complete.
299 // Empty config is considered invalid.
300 last_sent_empty_
= true;
301 last_sent_empty_time_
= base::TimeTicks::Now();
302 callback_
.Run(DnsConfig());
305 void DnsConfigService::OnCompleteConfig() {
309 need_update_
= false;
310 last_sent_empty_
= false;
312 // If a watch failed, the config may not be accurate, so report empty.
313 callback_
.Run(DnsConfig());
315 callback_
.Run(dns_config_
);