blob: 390cfaecaa9608e6dfc43f43c76c0203e3436e36 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/dns/host_resolver.h"
#include <set>
#include <string>
#include <utility>
#include <vector>
#include "base/bind.h"
#include "base/check.h"
#include "base/no_destructor.h"
#include "base/notreached.h"
#include "base/ranges/algorithm.h"
#include "base/strings/string_number_conversions.h"
#include "base/values.h"
#include "net/base/address_list.h"
#include "net/base/net_errors.h"
#include "net/dns/context_host_resolver.h"
#include "net/dns/dns_client.h"
#include "net/dns/dns_util.h"
#include "net/dns/host_cache.h"
#include "net/dns/host_resolver_manager.h"
#include "net/dns/host_resolver_results.h"
#include "net/dns/mapped_host_resolver.h"
#include "net/dns/resolve_context.h"
#include "third_party/abseil-cpp/absl/types/optional.h"
#if BUILDFLAG(IS_ANDROID)
#include "base/android/build_info.h"
#include "net/android/network_library.h"
#endif // BUILDFLAG(IS_ANDROID)
namespace net {
namespace {
class FailingRequestImpl : public HostResolver::ResolveHostRequest,
public HostResolver::ProbeRequest {
public:
explicit FailingRequestImpl(int error) : error_(error) {}
FailingRequestImpl(const FailingRequestImpl&) = delete;
FailingRequestImpl& operator=(const FailingRequestImpl&) = delete;
~FailingRequestImpl() override = default;
int Start(CompletionOnceCallback callback) override { return error_; }
int Start() override { return error_; }
AddressList* GetAddressResults() const override { return nullptr; }
std::vector<HostResolverEndpointResult>* GetEndpointResults() const override {
return nullptr;
}
const absl::optional<std::vector<std::string>>& GetTextResults()
const override {
static const base::NoDestructor<absl::optional<std::vector<std::string>>>
nullopt_result;
return *nullopt_result;
}
const absl::optional<std::vector<HostPortPair>>& GetHostnameResults()
const override {
static const base::NoDestructor<absl::optional<std::vector<HostPortPair>>>
nullopt_result;
return *nullopt_result;
}
const std::set<std::string>* GetDnsAliasResults() const override {
return nullptr;
}
ResolveErrorInfo GetResolveErrorInfo() const override {
return ResolveErrorInfo(error_);
}
const absl::optional<HostCache::EntryStaleness>& GetStaleInfo()
const override {
static const absl::optional<HostCache::EntryStaleness> nullopt_result;
return nullopt_result;
}
private:
const int error_;
};
bool EndpointResultIsNonProtocol(const HostResolverEndpointResult& result) {
return result.metadata.supported_protocol_alpns.empty();
}
} // namespace
const std::vector<bool>*
HostResolver::ResolveHostRequest::GetExperimentalResultsForTesting() const {
NOTREACHED();
return nullptr;
}
const size_t HostResolver::ManagerOptions::kDefaultRetryAttempts =
static_cast<size_t>(-1);
std::unique_ptr<HostResolver> HostResolver::Factory::CreateResolver(
HostResolverManager* manager,
base::StringPiece host_mapping_rules,
bool enable_caching) {
return HostResolver::CreateResolver(manager, host_mapping_rules,
enable_caching);
}
std::unique_ptr<HostResolver> HostResolver::Factory::CreateStandaloneResolver(
NetLog* net_log,
const ManagerOptions& options,
base::StringPiece host_mapping_rules,
bool enable_caching) {
return HostResolver::CreateStandaloneResolver(
net_log, options, host_mapping_rules, enable_caching);
}
HostResolver::ResolveHostParameters::ResolveHostParameters() = default;
HostResolver::ResolveHostParameters::ResolveHostParameters(
const ResolveHostParameters& other) = default;
HostResolver::~HostResolver() = default;
std::unique_ptr<HostResolver::ProbeRequest>
HostResolver::CreateDohProbeRequest() {
// Should be overridden in any HostResolver implementation where this method
// may be called.
NOTREACHED();
return nullptr;
}
std::unique_ptr<HostResolver::MdnsListener> HostResolver::CreateMdnsListener(
const HostPortPair& host,
DnsQueryType query_type) {
// Should be overridden in any HostResolver implementation where this method
// may be called.
NOTREACHED();
return nullptr;
}
HostCache* HostResolver::GetHostCache() {
return nullptr;
}
base::Value HostResolver::GetDnsConfigAsValue() const {
return base::Value(base::Value::Type::DICTIONARY);
}
void HostResolver::SetRequestContext(URLRequestContext* request_context) {
// Should be overridden in any HostResolver implementation where this method
// may be called.
NOTREACHED();
}
HostResolverManager* HostResolver::GetManagerForTesting() {
// Should be overridden in any HostResolver implementation where this method
// may be called.
NOTREACHED();
return nullptr;
}
const URLRequestContext* HostResolver::GetContextForTesting() const {
// Should be overridden in any HostResolver implementation where this method
// may be called.
NOTREACHED();
return nullptr;
}
NetworkChangeNotifier::NetworkHandle HostResolver::GetTargetNetworkForTesting()
const {
return NetworkChangeNotifier::kInvalidNetworkHandle;
}
// static
std::unique_ptr<HostResolver> HostResolver::CreateResolver(
HostResolverManager* manager,
base::StringPiece host_mapping_rules,
bool enable_caching) {
DCHECK(manager);
auto resolve_context = std::make_unique<ResolveContext>(
nullptr /* url_request_context */, enable_caching);
auto resolver = std::make_unique<ContextHostResolver>(
manager, std::move(resolve_context));
if (host_mapping_rules.empty())
return resolver;
auto remapped_resolver =
std::make_unique<MappedHostResolver>(std::move(resolver));
remapped_resolver->SetRulesFromString(host_mapping_rules);
return remapped_resolver;
}
// static
std::unique_ptr<HostResolver> HostResolver::CreateStandaloneResolver(
NetLog* net_log,
absl::optional<ManagerOptions> options,
base::StringPiece host_mapping_rules,
bool enable_caching) {
std::unique_ptr<ContextHostResolver> resolver =
CreateStandaloneContextResolver(net_log, std::move(options),
enable_caching);
if (host_mapping_rules.empty())
return resolver;
auto remapped_resolver =
std::make_unique<MappedHostResolver>(std::move(resolver));
remapped_resolver->SetRulesFromString(host_mapping_rules);
return remapped_resolver;
}
// static
std::unique_ptr<ContextHostResolver>
HostResolver::CreateStandaloneContextResolver(
NetLog* net_log,
absl::optional<ManagerOptions> options,
bool enable_caching) {
auto resolve_context = std::make_unique<ResolveContext>(
nullptr /* url_request_context */, enable_caching);
return std::make_unique<ContextHostResolver>(
std::make_unique<HostResolverManager>(
std::move(options).value_or(ManagerOptions()),
NetworkChangeNotifier::GetSystemDnsConfigNotifier(), net_log),
std::move(resolve_context));
}
// static
std::unique_ptr<HostResolver>
HostResolver::CreateStandaloneNetworkBoundResolver(
NetLog* net_log,
NetworkChangeNotifier::NetworkHandle target_network,
absl::optional<ManagerOptions> options,
base::StringPiece host_mapping_rules,
bool enable_caching) {
#if BUILDFLAG(IS_ANDROID)
// Note that the logic below uses Android APIs that don't work on a sandboxed
// process: This is not problematic because this function is used only by
// Cronet which doesn't enable sandboxing.
auto resolve_context = std::make_unique<ResolveContext>(
nullptr /*url_request_context */, enable_caching);
auto manager_options = std::move(options).value_or(ManagerOptions());
// Support the use of the built-in resolver when possible.
bool is_builtin_resolver_supported =
manager_options.insecure_dns_client_enabled &&
base::android::BuildInfo::GetInstance()->sdk_int() >=
base::android::SDK_VERSION_P;
if (is_builtin_resolver_supported) {
// Pre-existing DnsConfigOverrides is currently ignored, consider extending
// if a use case arises.
DCHECK(manager_options.dns_config_overrides == DnsConfigOverrides());
std::vector<IPEndPoint> dns_servers;
bool dns_over_tls_active;
std::string dns_over_tls_hostname;
std::vector<std::string> search_suffixes;
if (android::GetDnsServersForNetwork(&dns_servers, &dns_over_tls_active,
&dns_over_tls_hostname,
&search_suffixes, target_network)) {
DnsConfigOverrides dns_config_overrides =
DnsConfigOverrides::CreateOverridingEverythingWithDefaults();
dns_config_overrides.nameservers = dns_servers;
// Android APIs don't specify whether to use DoT or DoH. So, leave the
// decision to `DnsConfig::allow_dns_over_https_upgrade` default value.
dns_config_overrides.dns_over_tls_active = dns_over_tls_active;
dns_config_overrides.dns_over_tls_hostname = dns_over_tls_hostname;
dns_config_overrides.search = search_suffixes;
manager_options.dns_config_overrides = dns_config_overrides;
// Regardless of DoH vs DoT, the important contract to respect is not to
// perform insecure DNS lookups if `dns_over_tls_active` == true.
manager_options.additional_types_via_insecure_dns_enabled =
!dns_over_tls_active;
} else {
// Disable when android::GetDnsServersForNetwork fails.
is_builtin_resolver_supported = false;
}
}
manager_options.insecure_dns_client_enabled = is_builtin_resolver_supported;
return std::make_unique<ContextHostResolver>(
HostResolverManager::CreateNetworkBoundHostResolverManager(
manager_options, target_network, net_log),
std::move(resolve_context));
#else // !BUILDFLAG(IS_ANDROID)
NOTIMPLEMENTED();
return nullptr;
#endif // BUILDFLAG(IS_ANDROID)
}
// static
AddressFamily HostResolver::DnsQueryTypeSetToAddressFamily(
DnsQueryTypeSet dns_query_types) {
DCHECK(HasAddressType(dns_query_types));
// If the set of query types contains A and AAAA, defer the choice of address
// family. Otherwise, pick the corresponding address family.
if (dns_query_types.HasAll({DnsQueryType::A, DnsQueryType::AAAA}))
return ADDRESS_FAMILY_UNSPECIFIED;
if (dns_query_types.Has(DnsQueryType::AAAA))
return ADDRESS_FAMILY_IPV6;
DCHECK(dns_query_types.Has(DnsQueryType::A));
return ADDRESS_FAMILY_IPV4;
}
// static
HostResolverFlags HostResolver::ParametersToHostResolverFlags(
const ResolveHostParameters& parameters) {
HostResolverFlags flags = 0;
if (parameters.include_canonical_name)
flags |= HOST_RESOLVER_CANONNAME;
if (parameters.loopback_only)
flags |= HOST_RESOLVER_LOOPBACK_ONLY;
if (parameters.avoid_multicast_resolution)
flags |= HOST_RESOLVER_AVOID_MULTICAST;
return flags;
}
// static
int HostResolver::SquashErrorCode(int error) {
// TODO(crbug.com/1043281): Consider squashing ERR_INTERNET_DISCONNECTED.
if (error == OK || error == ERR_IO_PENDING ||
error == ERR_INTERNET_DISCONNECTED || error == ERR_NAME_NOT_RESOLVED ||
error == ERR_DNS_NAME_HTTPS_ONLY) {
return error;
} else {
return ERR_NAME_NOT_RESOLVED;
}
}
// static
std::vector<HostResolverEndpointResult>
HostResolver::AddressListToEndpointResults(const AddressList& address_list) {
HostResolverEndpointResult connection_endpoint;
connection_endpoint.ip_endpoints = address_list.endpoints();
std::vector<HostResolverEndpointResult> list;
list.push_back(std::move(connection_endpoint));
return list;
}
// static
AddressList HostResolver::EndpointResultToAddressList(
const std::vector<HostResolverEndpointResult>& endpoints,
const std::set<std::string>& aliases) {
AddressList list;
auto non_protocol_endpoint =
base::ranges::find_if(endpoints, &EndpointResultIsNonProtocol);
if (non_protocol_endpoint == endpoints.end())
return list;
list.endpoints() = non_protocol_endpoint->ip_endpoints;
std::vector<std::string> aliases_vector(aliases.begin(), aliases.end());
list.SetDnsAliases(std::move(aliases_vector));
return list;
}
HostResolver::HostResolver() = default;
// static
std::unique_ptr<HostResolver::ResolveHostRequest>
HostResolver::CreateFailingRequest(int error) {
return std::make_unique<FailingRequestImpl>(error);
}
// static
std::unique_ptr<HostResolver::ProbeRequest>
HostResolver::CreateFailingProbeRequest(int error) {
return std::make_unique<FailingRequestImpl>(error);
}
} // namespace net