123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685 |
- // Copyright (c) 2012 The Chromium Authors. All rights reserved.
- // Use of this source code is governed by a BSD-style license that can be
- // found in the LICENSE file.
- #include "net/dns/dns_config_service_win.h"
- #include <sysinfoapi.h>
- #include <algorithm>
- #include <memory>
- #include <set>
- #include <string>
- #include "base/bind.h"
- #include "base/callback.h"
- #include "base/compiler_specific.h"
- #include "base/files/file_path.h"
- #include "base/files/file_path_watcher.h"
- #include "base/location.h"
- #include "base/logging.h"
- #include "base/memory/free_deleter.h"
- #include "base/memory/raw_ptr.h"
- #include "base/memory/weak_ptr.h"
- #include "base/metrics/histogram_functions.h"
- #include "base/sequence_checker.h"
- #include "base/strings/string_piece.h"
- #include "base/strings/string_split.h"
- #include "base/strings/string_util.h"
- #include "base/strings/utf_string_conversions.h"
- #include "base/synchronization/lock.h"
- #include "base/task/single_thread_task_runner.h"
- #include "base/threading/scoped_blocking_call.h"
- #include "base/win/registry.h"
- #include "base/win/scoped_handle.h"
- #include "base/win/windows_types.h"
- #include "net/base/ip_address.h"
- #include "net/base/network_change_notifier.h"
- #include "net/dns/dns_hosts.h"
- #include "net/dns/public/dns_protocol.h"
- #include "net/dns/serial_worker.h"
- #include "url/url_canon.h"
- namespace net {
- namespace internal {
- namespace {
- // Registry key paths.
- const wchar_t kTcpipPath[] =
- L"SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters";
- const wchar_t kTcpip6Path[] =
- L"SYSTEM\\CurrentControlSet\\Services\\Tcpip6\\Parameters";
- const wchar_t kDnscachePath[] =
- L"SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters";
- const wchar_t kPolicyPath[] =
- L"SOFTWARE\\Policies\\Microsoft\\Windows NT\\DNSClient";
- // These values are persisted to logs. Entries should not be renumbered and
- // numeric values should never be reused.
- enum class DnsWindowsCompatibility {
- kCompatible = 0,
- kIncompatibleResolutionPolicy = 1,
- kIncompatibleProxy = 1 << 1,
- kIncompatibleVpn = 1 << 2,
- kIncompatibleAdapterSpecificNameserver = 1 << 3,
- KAllIncompatibleFlags = (1 << 4) - 1,
- kMaxValue = KAllIncompatibleFlags
- };
- inline constexpr DnsWindowsCompatibility operator|(DnsWindowsCompatibility a,
- DnsWindowsCompatibility b) {
- return static_cast<DnsWindowsCompatibility>(static_cast<int>(a) |
- static_cast<int>(b));
- }
- inline DnsWindowsCompatibility& operator|=(DnsWindowsCompatibility& a,
- DnsWindowsCompatibility b) {
- return a = a | b;
- }
- // Wrapper for GetAdaptersAddresses to get unicast addresses.
- // Returns nullptr if failed.
- std::unique_ptr<IP_ADAPTER_ADDRESSES, base::FreeDeleter>
- ReadAdapterUnicastAddresses() {
- base::ScopedBlockingCall scoped_blocking_call(FROM_HERE,
- base::BlockingType::MAY_BLOCK);
- std::unique_ptr<IP_ADAPTER_ADDRESSES, base::FreeDeleter> out;
- ULONG len = 15000; // As recommended by MSDN for GetAdaptersAddresses.
- UINT rv = ERROR_BUFFER_OVERFLOW;
- // Try up to three times.
- for (unsigned tries = 0; (tries < 3) && (rv == ERROR_BUFFER_OVERFLOW);
- tries++) {
- out.reset(static_cast<PIP_ADAPTER_ADDRESSES>(malloc(len)));
- memset(out.get(), 0, len);
- rv = GetAdaptersAddresses(AF_UNSPEC,
- GAA_FLAG_SKIP_ANYCAST | GAA_FLAG_SKIP_DNS_SERVER |
- GAA_FLAG_SKIP_MULTICAST |
- GAA_FLAG_SKIP_FRIENDLY_NAME,
- nullptr, out.get(), &len);
- }
- if (rv != NO_ERROR)
- out.reset();
- return out;
- }
- // Default address of "localhost" and local computer name can be overridden
- // by the HOSTS file, but if it's not there, then we need to fill it in.
- bool AddLocalhostEntriesTo(DnsHosts& in_out_hosts) {
- IPAddress loopback_ipv4 = IPAddress::IPv4Localhost();
- IPAddress loopback_ipv6 = IPAddress::IPv6Localhost();
- // This does not override any pre-existing entries from the HOSTS file.
- in_out_hosts.insert(std::make_pair(
- DnsHostsKey("localhost", ADDRESS_FAMILY_IPV4), loopback_ipv4));
- in_out_hosts.insert(std::make_pair(
- DnsHostsKey("localhost", ADDRESS_FAMILY_IPV6), loopback_ipv6));
- wchar_t buffer[MAX_PATH];
- DWORD size = MAX_PATH;
- if (!GetComputerNameExW(ComputerNameDnsHostname, buffer, &size))
- return false;
- std::string localname = ParseDomainASCII(buffer);
- if (localname.empty())
- return false;
- localname = base::ToLowerASCII(localname);
- bool have_ipv4 =
- in_out_hosts.count(DnsHostsKey(localname, ADDRESS_FAMILY_IPV4)) > 0;
- bool have_ipv6 =
- in_out_hosts.count(DnsHostsKey(localname, ADDRESS_FAMILY_IPV6)) > 0;
- if (have_ipv4 && have_ipv6)
- return true;
- std::unique_ptr<IP_ADAPTER_ADDRESSES, base::FreeDeleter> addresses =
- ReadAdapterUnicastAddresses();
- if (!addresses.get())
- return false;
- // The order of adapters is the network binding order, so stick to the
- // first good adapter for each family.
- for (const IP_ADAPTER_ADDRESSES* adapter = addresses.get();
- adapter != nullptr && (!have_ipv4 || !have_ipv6);
- adapter = adapter->Next) {
- if (adapter->OperStatus != IfOperStatusUp)
- continue;
- if (adapter->IfType == IF_TYPE_SOFTWARE_LOOPBACK)
- continue;
- for (const IP_ADAPTER_UNICAST_ADDRESS* address =
- adapter->FirstUnicastAddress;
- address != nullptr; address = address->Next) {
- IPEndPoint ipe;
- if (!ipe.FromSockAddr(address->Address.lpSockaddr,
- address->Address.iSockaddrLength)) {
- return false;
- }
- if (!have_ipv4 && (ipe.GetFamily() == ADDRESS_FAMILY_IPV4)) {
- have_ipv4 = true;
- in_out_hosts[DnsHostsKey(localname, ADDRESS_FAMILY_IPV4)] =
- ipe.address();
- } else if (!have_ipv6 && (ipe.GetFamily() == ADDRESS_FAMILY_IPV6)) {
- have_ipv6 = true;
- in_out_hosts[DnsHostsKey(localname, ADDRESS_FAMILY_IPV6)] =
- ipe.address();
- }
- }
- }
- return true;
- }
- // Watches a single registry key for changes.
- class RegistryWatcher {
- public:
- typedef base::RepeatingCallback<void(bool succeeded)> CallbackType;
- RegistryWatcher() {}
- RegistryWatcher(const RegistryWatcher&) = delete;
- RegistryWatcher& operator=(const RegistryWatcher&) = delete;
- ~RegistryWatcher() { DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_); }
- bool Watch(const wchar_t key[], const CallbackType& callback) {
- DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
- DCHECK(!callback.is_null());
- DCHECK(callback_.is_null());
- callback_ = callback;
- if (key_.Open(HKEY_LOCAL_MACHINE, key, KEY_NOTIFY) != ERROR_SUCCESS)
- return false;
- return key_.StartWatching(base::BindOnce(&RegistryWatcher::OnObjectSignaled,
- base::Unretained(this)));
- }
- void OnObjectSignaled() {
- DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
- DCHECK(!callback_.is_null());
- if (key_.StartWatching(base::BindOnce(&RegistryWatcher::OnObjectSignaled,
- base::Unretained(this)))) {
- callback_.Run(true);
- } else {
- key_.Close();
- callback_.Run(false);
- }
- }
- private:
- CallbackType callback_;
- base::win::RegKey key_;
- SEQUENCE_CHECKER(sequence_checker_);
- };
- // Returns the path to the HOSTS file.
- base::FilePath GetHostsPath() {
- wchar_t buffer[MAX_PATH];
- UINT rc = GetSystemDirectory(buffer, MAX_PATH);
- DCHECK(0 < rc && rc < MAX_PATH);
- return base::FilePath(buffer).Append(
- FILE_PATH_LITERAL("drivers\\etc\\hosts"));
- }
- void ConfigureSuffixSearch(const WinDnsSystemSettings& settings,
- DnsConfig& in_out_config) {
- // SearchList takes precedence, so check it first.
- if (settings.policy_search_list.has_value()) {
- std::vector<std::string> search =
- ParseSearchList(settings.policy_search_list.value());
- if (!search.empty()) {
- in_out_config.search = std::move(search);
- return;
- }
- // Even if invalid, the policy disables the user-specified setting below.
- } else if (settings.tcpip_search_list.has_value()) {
- std::vector<std::string> search =
- ParseSearchList(settings.tcpip_search_list.value());
- if (!search.empty()) {
- in_out_config.search = std::move(search);
- return;
- }
- }
- // In absence of explicit search list, suffix search is:
- // [primary suffix, connection-specific suffix, devolution of primary suffix].
- // Primary suffix can be set by policy (primary_dns_suffix) or
- // user setting (tcpip_domain).
- //
- // The policy (primary_dns_suffix) can be edited via Group Policy Editor
- // (gpedit.msc) at Local Computer Policy => Computer Configuration
- // => Administrative Template => Network => DNS Client => Primary DNS Suffix.
- //
- // The user setting (tcpip_domain) can be configurred at Computer Name in
- // System Settings
- std::string primary_suffix;
- if (settings.primary_dns_suffix.has_value())
- primary_suffix = ParseDomainASCII(settings.primary_dns_suffix.value());
- if (primary_suffix.empty() && settings.tcpip_domain.has_value())
- primary_suffix = ParseDomainASCII(settings.tcpip_domain.value());
- if (primary_suffix.empty())
- return; // No primary suffix, hence no devolution.
- // Primary suffix goes in front.
- in_out_config.search.insert(in_out_config.search.begin(), primary_suffix);
- // Devolution is determined by precedence: policy > dnscache > tcpip.
- // |enabled|: UseDomainNameDevolution and |level|: DomainNameDevolutionLevel
- // are overridden independently.
- WinDnsSystemSettings::DevolutionSetting devolution =
- settings.policy_devolution;
- if (!devolution.enabled.has_value())
- devolution.enabled = settings.dnscache_devolution.enabled;
- if (!devolution.enabled.has_value())
- devolution.enabled = settings.tcpip_devolution.enabled;
- if (devolution.enabled.has_value() && (devolution.enabled.value() == 0))
- return; // Devolution disabled.
- // By default devolution is enabled.
- if (!devolution.level.has_value())
- devolution.level = settings.dnscache_devolution.level;
- if (!devolution.level.has_value())
- devolution.level = settings.tcpip_devolution.level;
- // After the recent update, Windows will try to determine a safe default
- // value by comparing the forest root domain (FRD) to the primary suffix.
- // See http://support.microsoft.com/kb/957579 for details.
- // For now, if the level is not set, we disable devolution, assuming that
- // we will fallback to the system getaddrinfo anyway. This might cause
- // performance loss for resolutions which depend on the system default
- // devolution setting.
- //
- // If the level is explicitly set below 2, devolution is disabled.
- if (!devolution.level.has_value() || devolution.level.value() < 2)
- return; // Devolution disabled.
- // Devolve the primary suffix. This naive logic matches the observed
- // behavior (see also ParseSearchList). If a suffix is not valid, it will be
- // discarded when the fully-qualified name is converted to DNS format.
- unsigned num_dots = std::count(primary_suffix.begin(),
- primary_suffix.end(), '.');
- for (size_t offset = 0; num_dots >= devolution.level.value(); --num_dots) {
- offset = primary_suffix.find('.', offset + 1);
- in_out_config.search.push_back(primary_suffix.substr(offset + 1));
- }
- }
- absl::optional<std::vector<IPEndPoint>> GetNameServers(
- const IP_ADAPTER_ADDRESSES* adapter) {
- std::vector<IPEndPoint> nameservers;
- for (const IP_ADAPTER_DNS_SERVER_ADDRESS* address =
- adapter->FirstDnsServerAddress;
- address != nullptr; address = address->Next) {
- IPEndPoint ipe;
- if (ipe.FromSockAddr(address->Address.lpSockaddr,
- address->Address.iSockaddrLength)) {
- if (WinDnsSystemSettings::IsStatelessDiscoveryAddress(ipe.address()))
- continue;
- // Override unset port.
- if (!ipe.port())
- ipe = IPEndPoint(ipe.address(), dns_protocol::kDefaultPort);
- nameservers.push_back(ipe);
- } else {
- return absl::nullopt;
- }
- }
- return nameservers;
- }
- bool CheckAndRecordCompatibility(bool have_name_resolution_policy,
- bool have_proxy,
- bool uses_vpn,
- bool has_adapter_specific_nameservers) {
- DnsWindowsCompatibility compatibility = DnsWindowsCompatibility::kCompatible;
- if (have_name_resolution_policy)
- compatibility |= DnsWindowsCompatibility::kIncompatibleResolutionPolicy;
- if (have_proxy)
- compatibility |= DnsWindowsCompatibility::kIncompatibleProxy;
- if (uses_vpn)
- compatibility |= DnsWindowsCompatibility::kIncompatibleVpn;
- if (has_adapter_specific_nameservers) {
- compatibility |=
- DnsWindowsCompatibility::kIncompatibleAdapterSpecificNameserver;
- }
- base::UmaHistogramEnumeration("Net.DNS.DnsConfig.Windows.Compatibility",
- compatibility);
- return compatibility == DnsWindowsCompatibility::kCompatible;
- }
- } // namespace
- std::string ParseDomainASCII(base::WStringPiece widestr) {
- if (widestr.empty())
- return "";
- // Check if already ASCII.
- if (base::IsStringASCII(base::AsStringPiece16(widestr))) {
- return std::string(widestr.begin(), widestr.end());
- }
- // Otherwise try to convert it from IDN to punycode.
- const int kInitialBufferSize = 256;
- url::RawCanonOutputT<char16_t, kInitialBufferSize> punycode;
- if (!url::IDNToASCII(base::as_u16cstr(widestr), widestr.length(), &punycode))
- return "";
- // |punycode_output| should now be ASCII; convert it to a std::string.
- // (We could use UTF16ToASCII() instead, but that requires an extra string
- // copy. Since ASCII is a subset of UTF8 the following is equivalent).
- std::string converted;
- bool success =
- base::UTF16ToUTF8(punycode.data(), punycode.length(), &converted);
- DCHECK(success);
- DCHECK(base::IsStringASCII(converted));
- return converted;
- }
- std::vector<std::string> ParseSearchList(base::WStringPiece value) {
- if (value.empty())
- return {};
- std::vector<std::string> output;
- // If the list includes an empty hostname (",," or ", ,"), it is terminated.
- // Although nslookup and network connection property tab ignore such
- // fragments ("a,b,,c" becomes ["a", "b", "c"]), our reference is getaddrinfo
- // (which sees ["a", "b"]). WMI queries also return a matching search list.
- for (base::WStringPiece t : base::SplitStringPiece(
- value, L",", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL)) {
- // Convert non-ASCII to punycode, although getaddrinfo does not properly
- // handle such suffixes.
- std::string parsed = ParseDomainASCII(t);
- if (parsed.empty())
- break;
- output.push_back(std::move(parsed));
- }
- return output;
- }
- absl::optional<DnsConfig> ConvertSettingsToDnsConfig(
- const WinDnsSystemSettings& settings) {
- bool uses_vpn = false;
- bool has_adapter_specific_nameservers = false;
- DnsConfig dns_config;
- std::set<IPEndPoint> previous_nameservers_set;
- // Use GetAdapterAddresses to get effective DNS server order and
- // connection-specific DNS suffix. Ignore disconnected and loopback adapters.
- // The order of adapters is the network binding order, so stick to the
- // first good adapter.
- for (const IP_ADAPTER_ADDRESSES* adapter = settings.addresses.get();
- adapter != nullptr; adapter = adapter->Next) {
- // Check each adapter for a VPN interface. Even if a single such interface
- // is present, treat this as an unhandled configuration.
- if (adapter->IfType == IF_TYPE_PPP) {
- uses_vpn = true;
- }
- absl::optional<std::vector<IPEndPoint>> nameservers =
- GetNameServers(adapter);
- if (!nameservers)
- return absl::nullopt;
- if (!nameservers->empty() && (adapter->OperStatus == IfOperStatusUp)) {
- // Check if the |adapter| has adapter specific nameservers.
- std::set<IPEndPoint> nameservers_set(nameservers->begin(),
- nameservers->end());
- if (!previous_nameservers_set.empty() &&
- (previous_nameservers_set != nameservers_set)) {
- has_adapter_specific_nameservers = true;
- }
- previous_nameservers_set = std::move(nameservers_set);
- }
- // Skip disconnected and loopback adapters. If a good configuration was
- // previously found, skip processing another adapter.
- if (adapter->OperStatus != IfOperStatusUp ||
- adapter->IfType == IF_TYPE_SOFTWARE_LOOPBACK ||
- !dns_config.nameservers.empty())
- continue;
- dns_config.nameservers = std::move(*nameservers);
- // IP_ADAPTER_ADDRESSES in Vista+ has a search list at |FirstDnsSuffix|,
- // but it came up empty in all trials.
- // |DnsSuffix| stores the effective connection-specific suffix, which is
- // obtained via DHCP (regkey: Tcpip\Parameters\Interfaces\{XXX}\DhcpDomain)
- // or specified by the user (regkey: Tcpip\Parameters\Domain).
- std::string dns_suffix = ParseDomainASCII(adapter->DnsSuffix);
- if (!dns_suffix.empty())
- dns_config.search.push_back(std::move(dns_suffix));
- }
- if (dns_config.nameservers.empty())
- return absl::nullopt; // No point continuing.
- // Windows always tries a multi-label name "as is" before using suffixes.
- dns_config.ndots = 1;
- if (!settings.append_to_multi_label_name.has_value()) {
- dns_config.append_to_multi_label_name = false;
- } else {
- dns_config.append_to_multi_label_name =
- (settings.append_to_multi_label_name.value() != 0);
- }
- if (settings.have_name_resolution_policy) {
- // TODO(szym): only set this to true if NRPT has DirectAccess rules.
- dns_config.use_local_ipv6 = true;
- }
- if (!CheckAndRecordCompatibility(settings.have_name_resolution_policy,
- settings.have_proxy, uses_vpn,
- has_adapter_specific_nameservers)) {
- dns_config.unhandled_options = true;
- }
- ConfigureSuffixSearch(settings, dns_config);
- return dns_config;
- }
- // Watches registry and HOSTS file for changes. Must live on a sequence which
- // allows IO.
- class DnsConfigServiceWin::Watcher
- : public NetworkChangeNotifier::IPAddressObserver,
- public DnsConfigService::Watcher {
- public:
- explicit Watcher(DnsConfigServiceWin& service)
- : DnsConfigService::Watcher(service) {}
- Watcher(const Watcher&) = delete;
- Watcher& operator=(const Watcher&) = delete;
- ~Watcher() override { NetworkChangeNotifier::RemoveIPAddressObserver(this); }
- bool Watch() override {
- CheckOnCorrectSequence();
- RegistryWatcher::CallbackType callback =
- base::BindRepeating(&Watcher::OnConfigChanged, base::Unretained(this));
- bool success = true;
- // The Tcpip key must be present.
- if (!tcpip_watcher_.Watch(kTcpipPath, callback)) {
- LOG(ERROR) << "DNS registry watch failed to start.";
- success = false;
- }
- // Watch for IPv6 nameservers.
- tcpip6_watcher_.Watch(kTcpip6Path, callback);
- // DNS suffix search list and devolution can be configured via group
- // policy which sets this registry key. If the key is missing, the policy
- // does not apply, and the DNS client uses Tcpip and Dnscache settings.
- // If a policy is installed, DnsConfigService will need to be restarted.
- // BUG=99509
- dnscache_watcher_.Watch(kDnscachePath, callback);
- policy_watcher_.Watch(kPolicyPath, callback);
- if (!hosts_watcher_.Watch(
- GetHostsPath(), base::FilePathWatcher::Type::kNonRecursive,
- base::BindRepeating(&Watcher::OnHostsFilePathWatcherChange,
- base::Unretained(this)))) {
- LOG(ERROR) << "DNS hosts watch failed to start.";
- success = false;
- } else {
- // Also need to observe changes to local non-loopback IP for DnsHosts.
- NetworkChangeNotifier::AddIPAddressObserver(this);
- }
- return success;
- }
- private:
- void OnHostsFilePathWatcherChange(const base::FilePath& path, bool error) {
- if (error)
- NetworkChangeNotifier::RemoveIPAddressObserver(this);
- OnHostsChanged(!error);
- }
- // NetworkChangeNotifier::IPAddressObserver:
- void OnIPAddressChanged() override {
- // Need to update non-loopback IP of local host.
- OnHostsChanged(true);
- }
- RegistryWatcher tcpip_watcher_;
- RegistryWatcher tcpip6_watcher_;
- RegistryWatcher dnscache_watcher_;
- RegistryWatcher policy_watcher_;
- base::FilePathWatcher hosts_watcher_;
- };
- // Reads config from registry and IpHelper. All work performed in ThreadPool.
- class DnsConfigServiceWin::ConfigReader : public SerialWorker {
- public:
- explicit ConfigReader(DnsConfigServiceWin& service)
- : SerialWorker(/*max_number_of_retries=*/3), service_(&service) {}
- ~ConfigReader() override {}
- // SerialWorker::
- std::unique_ptr<SerialWorker::WorkItem> CreateWorkItem() override {
- return std::make_unique<WorkItem>();
- }
- bool OnWorkFinished(std::unique_ptr<SerialWorker::WorkItem>
- serial_worker_work_item) override {
- DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
- DCHECK(serial_worker_work_item);
- DCHECK(!IsCancelled());
- WorkItem* work_item = static_cast<WorkItem*>(serial_worker_work_item.get());
- if (work_item->dns_config_.has_value()) {
- service_->OnConfigRead(std::move(work_item->dns_config_).value());
- return true;
- } else {
- LOG(WARNING) << "Failed to read DnsConfig.";
- return false;
- }
- }
- private:
- class WorkItem : public SerialWorker::WorkItem {
- public:
- ~WorkItem() override = default;
- void DoWork() override {
- absl::optional<WinDnsSystemSettings> settings =
- ReadWinSystemDnsSettings();
- if (settings.has_value())
- dns_config_ = ConvertSettingsToDnsConfig(settings.value());
- }
- private:
- friend DnsConfigServiceWin::ConfigReader;
- absl::optional<DnsConfig> dns_config_;
- };
- raw_ptr<DnsConfigServiceWin> service_;
- // Written in DoWork(), read in OnWorkFinished(). No locking required.
- };
- // Extension of DnsConfigService::HostsReader that fills in localhost and local
- // computer name if necessary.
- class DnsConfigServiceWin::HostsReader : public DnsConfigService::HostsReader {
- public:
- explicit HostsReader(DnsConfigServiceWin& service)
- : DnsConfigService::HostsReader(GetHostsPath().value(), service) {}
- ~HostsReader() override = default;
- HostsReader(const HostsReader&) = delete;
- HostsReader& operator=(const HostsReader&) = delete;
- // SerialWorker:
- std::unique_ptr<SerialWorker::WorkItem> CreateWorkItem() override {
- return std::make_unique<WorkItem>(GetHostsPath());
- }
- private:
- class WorkItem : public DnsConfigService::HostsReader::WorkItem {
- public:
- explicit WorkItem(base::FilePath hosts_file_path)
- : DnsConfigService::HostsReader::WorkItem(
- std::make_unique<DnsHostsFileParser>(
- std::move(hosts_file_path))) {}
- ~WorkItem() override = default;
- bool AddAdditionalHostsTo(DnsHosts& in_out_dns_hosts) override {
- base::ScopedBlockingCall scoped_blocking_call(
- FROM_HERE, base::BlockingType::MAY_BLOCK);
- return AddLocalhostEntriesTo(in_out_dns_hosts);
- }
- };
- };
- DnsConfigServiceWin::DnsConfigServiceWin()
- : DnsConfigService(GetHostsPath().value(),
- absl::nullopt /* config_change_delay */) {
- // Allow constructing on one sequence and living on another.
- DETACH_FROM_SEQUENCE(sequence_checker_);
- }
- DnsConfigServiceWin::~DnsConfigServiceWin() {
- if (config_reader_)
- config_reader_->Cancel();
- if (hosts_reader_)
- hosts_reader_->Cancel();
- }
- void DnsConfigServiceWin::ReadConfigNow() {
- if (!config_reader_)
- config_reader_ = std::make_unique<ConfigReader>(*this);
- config_reader_->WorkNow();
- }
- void DnsConfigServiceWin::ReadHostsNow() {
- if (!hosts_reader_)
- hosts_reader_ = std::make_unique<HostsReader>(*this);
- hosts_reader_->WorkNow();
- }
- bool DnsConfigServiceWin::StartWatching() {
- DCHECK(!watcher_);
- // TODO(szym): re-start watcher if that makes sense. http://crbug.com/116139
- watcher_ = std::make_unique<Watcher>(*this);
- return watcher_->Watch();
- }
- } // namespace internal
- // static
- std::unique_ptr<DnsConfigService> DnsConfigService::CreateSystemService() {
- return std::make_unique<internal::DnsConfigServiceWin>();
- }
- } // namespace net
|