naiveproxy/net/dns/host_resolver.cc

251 lines
7.5 KiB
C++
Raw Permalink Normal View History

2018-12-10 05:59:24 +03:00
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/dns/host_resolver.h"
#include "base/logging.h"
#include "base/metrics/field_trial.h"
#include "base/strings/string_number_conversions.h"
#include "base/strings/string_split.h"
#include "base/values.h"
#include "net/base/net_errors.h"
#include "net/dns/dns_client.h"
#include "net/dns/dns_config_service.h"
#include "net/dns/host_cache.h"
#include "net/dns/host_resolver_impl.h"
namespace net {
namespace {
// Maximum of 6 concurrent resolver threads (excluding retries).
// Some routers (or resolvers) appear to start to provide host-not-found if
// too many simultaneous resolutions are pending. This number needs to be
// further optimized, but 8 is what FF currently does. We found some routers
// that limit this to 6, so we're temporarily holding it at that level.
const size_t kDefaultMaxProcTasks = 6u;
} // namespace
PrioritizedDispatcher::Limits HostResolver::Options::GetDispatcherLimits()
const {
PrioritizedDispatcher::Limits limits(NUM_PRIORITIES, max_concurrent_resolves);
// If not using default, do not use the field trial.
if (limits.total_jobs != HostResolver::kDefaultParallelism)
return limits;
// Default, without trial is no reserved slots.
limits.total_jobs = kDefaultMaxProcTasks;
// Parallelism is determined by the field trial.
std::string group = base::FieldTrialList::FindFullName(
"HostResolverDispatch");
if (group.empty())
return limits;
// The format of the group name is a list of non-negative integers separated
// by ':'. Each of the elements in the list corresponds to an element in
// |reserved_slots|, except the last one which is the |total_jobs|.
std::vector<base::StringPiece> group_parts = base::SplitStringPiece(
group, ":", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL);
if (group_parts.size() != NUM_PRIORITIES + 1) {
NOTREACHED();
return limits;
}
std::vector<size_t> parsed(group_parts.size());
size_t total_reserved_slots = 0;
for (size_t i = 0; i < group_parts.size(); ++i) {
if (!base::StringToSizeT(group_parts[i], &parsed[i])) {
NOTREACHED();
return limits;
}
}
size_t total_jobs = parsed.back();
parsed.pop_back();
for (size_t i = 0; i < parsed.size(); ++i) {
total_reserved_slots += parsed[i];
}
// There must be some unreserved slots available for the all priorities.
if (total_reserved_slots > total_jobs ||
(total_reserved_slots == total_jobs && parsed[MINIMUM_PRIORITY] == 0)) {
NOTREACHED();
return limits;
}
limits.total_jobs = total_jobs;
limits.reserved_slots = parsed;
return limits;
}
HostResolver::Options::Options()
: max_concurrent_resolves(kDefaultParallelism),
max_retry_attempts(kDefaultRetryAttempts),
enable_caching(true) {
}
HostResolver::RequestInfo::RequestInfo(const HostPortPair& host_port_pair)
: RequestInfo() {
host_port_pair_ = host_port_pair;
}
HostResolver::RequestInfo::RequestInfo(const RequestInfo& request_info) =
default;
HostResolver::RequestInfo::~RequestInfo() = default;
HostResolver::RequestInfo::RequestInfo()
: address_family_(ADDRESS_FAMILY_UNSPECIFIED),
host_resolver_flags_(0),
allow_cached_response_(true),
is_speculative_(false),
is_my_ip_address_(false) {}
HostResolver::~HostResolver() = default;
void HostResolver::SetDnsClientEnabled(bool enabled) {
}
HostCache* HostResolver::GetHostCache() {
return nullptr;
}
std::unique_ptr<base::Value> HostResolver::GetDnsConfigAsValue() const {
return nullptr;
}
void HostResolver::SetNoIPv6OnWifi(bool no_ipv6_on_wifi) {
NOTREACHED();
}
bool HostResolver::GetNoIPv6OnWifi() {
return false;
}
const std::vector<DnsConfig::DnsOverHttpsServerConfig>*
HostResolver::GetDnsOverHttpsServersForTesting() const {
return nullptr;
}
// static
std::unique_ptr<HostResolver> HostResolver::CreateSystemResolver(
const Options& options,
NetLog* net_log) {
return std::unique_ptr<HostResolver>(
CreateSystemResolverImpl(options, net_log).release());
}
// static
std::unique_ptr<HostResolverImpl> HostResolver::CreateSystemResolverImpl(
const Options& options,
NetLog* net_log) {
return std::make_unique<HostResolverImpl>(options, net_log);
}
// static
std::unique_ptr<HostResolver> HostResolver::CreateDefaultResolver(
NetLog* net_log) {
return CreateSystemResolver(Options(), net_log);
}
// static
std::unique_ptr<HostResolverImpl> HostResolver::CreateDefaultResolverImpl(
NetLog* net_log) {
return CreateSystemResolverImpl(Options(), net_log);
}
// static
AddressFamily HostResolver::DnsQueryTypeToAddressFamily(
DnsQueryType dns_query_type) {
switch (dns_query_type) {
case DnsQueryType::UNSPECIFIED:
return ADDRESS_FAMILY_UNSPECIFIED;
case DnsQueryType::A:
return ADDRESS_FAMILY_IPV4;
case DnsQueryType::AAAA:
return ADDRESS_FAMILY_IPV6;
default:
// |dns_query_type| should be an address type (A or AAAA) or UNSPECIFIED.
NOTREACHED();
return ADDRESS_FAMILY_UNSPECIFIED;
}
}
// static
HostResolver::DnsQueryType HostResolver::AddressFamilyToDnsQueryType(
AddressFamily address_family) {
switch (address_family) {
case ADDRESS_FAMILY_UNSPECIFIED:
return DnsQueryType::UNSPECIFIED;
case ADDRESS_FAMILY_IPV4:
return DnsQueryType::A;
case ADDRESS_FAMILY_IPV6:
return DnsQueryType::AAAA;
default:
NOTREACHED();
return DnsQueryType::UNSPECIFIED;
}
}
// static
HostResolver::ResolveHostParameters
HostResolver::RequestInfoToResolveHostParameters(
const HostResolver::RequestInfo& request_info,
RequestPriority priority) {
// Flag that should only be set internally, not used in input.
DCHECK(!(request_info.host_resolver_flags() &
HOST_RESOLVER_DEFAULT_FAMILY_SET_DUE_TO_NO_IPV6));
ResolveHostParameters parameters;
parameters.dns_query_type =
AddressFamilyToDnsQueryType(request_info.address_family());
parameters.initial_priority = priority;
parameters.source = FlagsToSource(request_info.host_resolver_flags());
parameters.allow_cached_response = request_info.allow_cached_response();
parameters.include_canonical_name =
request_info.host_resolver_flags() & HOST_RESOLVER_CANONNAME;
parameters.loopback_only =
request_info.host_resolver_flags() & HOST_RESOLVER_LOOPBACK_ONLY;
parameters.is_speculative = request_info.is_speculative();
return parameters;
}
// static
HostResolverSource HostResolver::FlagsToSource(HostResolverFlags flags) {
// To counter the lack of CNAME support in the async host resolver, SYSTEM is
// forced when CANONNAME flags is present. This restriction can be removed
// once CNAME support is added to the async resolver. See
// https://crbug.com/872665
//
// It is intentional that the presence of either flag forces SYSTEM.
if (flags & (HOST_RESOLVER_SYSTEM_ONLY | HOST_RESOLVER_CANONNAME))
return HostResolverSource::SYSTEM;
return HostResolverSource::ANY;
}
// static
HostResolverFlags HostResolver::ParametersToHostResolverFlags(
const ResolveHostParameters& parameters) {
HostResolverFlags flags = 0;
if (parameters.source == HostResolverSource::SYSTEM)
flags |= HOST_RESOLVER_SYSTEM_ONLY;
if (parameters.include_canonical_name)
flags |= HOST_RESOLVER_CANONNAME;
if (parameters.loopback_only)
flags |= HOST_RESOLVER_LOOPBACK_ONLY;
return flags;
}
HostResolver::HostResolver() = default;
} // namespace net