15821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Copyright (c) 2012 The Chromium Authors. All rights reserved. 25821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be 35821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// found in the LICENSE file. 45821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 55821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/dns/dns_config_service_win.h" 65821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 75821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <algorithm> 85821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <string> 95821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/bind.h" 115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/callback.h" 125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/compiler_specific.h" 132a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include "base/files/file_path.h" 145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/files/file_path_watcher.h" 155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/logging.h" 165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/memory/scoped_ptr.h" 175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/metrics/histogram.h" 182a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include "base/strings/string_split.h" 19eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch#include "base/strings/string_util.h" 20868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)#include "base/strings/utf_string_conversions.h" 215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/synchronization/lock.h" 225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/threading/non_thread_safe.h" 235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/threading/thread_restrictions.h" 24eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch#include "base/time/time.h" 255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/win/object_watcher.h" 265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/win/registry.h" 275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/win/windows_version.h" 285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/base/net_util.h" 295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/base/network_change_notifier.h" 305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/dns/dns_hosts.h" 315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/dns/dns_protocol.h" 325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/dns/serial_worker.h" 337dbb3d5cf0c15f500944d211057644d6a2f37371Ben Murdoch#include "url/url_canon.h" 345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#pragma comment(lib, "iphlpapi.lib") 365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace net { 385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace internal { 405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace { 425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Interval between retries to parse config. Used only until parsing succeeds. 445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const int kRetryIntervalSeconds = 5; 455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const wchar_t* const kPrimaryDnsSuffixPath = 475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) L"SOFTWARE\\Policies\\Microsoft\\System\\DNSClient"; 485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)enum HostsParseWinResult { 505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) HOSTS_PARSE_WIN_OK = 0, 515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) HOSTS_PARSE_WIN_UNREADABLE_HOSTS_FILE, 525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) HOSTS_PARSE_WIN_COMPUTER_NAME_FAILED, 535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) HOSTS_PARSE_WIN_IPHELPER_FAILED, 545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) HOSTS_PARSE_WIN_BAD_ADDRESS, 555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) HOSTS_PARSE_WIN_MAX // Bounding values for enumeration. 565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Convenience for reading values using RegKey. 595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class RegistryReader : public base::NonThreadSafe { 605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public: 615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) explicit RegistryReader(const wchar_t* key) { 625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Ignoring the result. |key_.Valid()| will catch failures. 635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) key_.Open(HKEY_LOCAL_MACHINE, key, KEY_QUERY_VALUE); 645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool ReadString(const wchar_t* name, 675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsSystemSettings::RegString* out) const { 685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(CalledOnValidThread()); 695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) out->set = false; 705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!key_.Valid()) { 715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Assume that if the |key_| is invalid then the key is missing. 725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return true; 735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LONG result = key_.ReadValue(name, &out->value); 755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (result == ERROR_SUCCESS) { 765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) out->set = true; 775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return true; 785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return (result == ERROR_FILE_NOT_FOUND); 805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool ReadDword(const wchar_t* name, 835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsSystemSettings::RegDword* out) const { 845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(CalledOnValidThread()); 855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) out->set = false; 865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!key_.Valid()) { 875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Assume that if the |key_| is invalid then the key is missing. 885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return true; 895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LONG result = key_.ReadValueDW(name, &out->value); 915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (result == ERROR_SUCCESS) { 925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) out->set = true; 935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return true; 945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return (result == ERROR_FILE_NOT_FOUND); 965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private: 995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::win::RegKey key_; 1005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DISALLOW_COPY_AND_ASSIGN(RegistryReader); 1025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 1035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Wrapper for GetAdaptersAddresses. Returns NULL if failed. 1055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)scoped_ptr_malloc<IP_ADAPTER_ADDRESSES> ReadIpHelper(ULONG flags) { 1065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::ThreadRestrictions::AssertIOAllowed(); 1075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) scoped_ptr_malloc<IP_ADAPTER_ADDRESSES> out; 1095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ULONG len = 15000; // As recommended by MSDN for GetAdaptersAddresses. 1105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) UINT rv = ERROR_BUFFER_OVERFLOW; 1115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Try up to three times. 1125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) for (unsigned tries = 0; (tries < 3) && (rv == ERROR_BUFFER_OVERFLOW); 1135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) tries++) { 1145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) out.reset(reinterpret_cast<PIP_ADAPTER_ADDRESSES>(malloc(len))); 1155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rv = GetAdaptersAddresses(AF_UNSPEC, flags, NULL, out.get(), &len); 1165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (rv != NO_ERROR) 1185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) out.reset(); 1195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return out.Pass(); 1205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 1215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 122c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)// Converts a base::string16 domain name to ASCII, possibly using punycode. 1235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Returns true if the conversion succeeds and output is not empty. In case of 1245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// failure, |domain| might become dirty. 125c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)bool ParseDomainASCII(const base::string16& widestr, std::string* domain) { 1265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(domain); 1275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (widestr.empty()) 1285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return false; 1295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Check if already ASCII. 1315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (IsStringASCII(widestr)) { 1325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) *domain = UTF16ToASCII(widestr); 1335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return true; 1345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Otherwise try to convert it from IDN to punycode. 1375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) const int kInitialBufferSize = 256; 1385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) url_canon::RawCanonOutputT<char16, kInitialBufferSize> punycode; 1395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!url_canon::IDNToASCII(widestr.data(), widestr.length(), &punycode)) 1405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return false; 1415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // |punycode_output| should now be ASCII; convert it to a std::string. 1435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // (We could use UTF16ToASCII() instead, but that requires an extra string 1445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // copy. Since ASCII is a subset of UTF8 the following is equivalent). 1455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool success = UTF16ToUTF8(punycode.data(), punycode.length(), domain); 1465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(success); 1475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(IsStringASCII(*domain)); 1485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return success && !domain->empty(); 1495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 1505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool ReadDevolutionSetting(const RegistryReader& reader, 1525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsSystemSettings::DevolutionSetting* setting) { 1535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return reader.ReadDword(L"UseDomainNameDevolution", &setting->enabled) && 1545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) reader.ReadDword(L"DomainNameDevolutionLevel", &setting->level); 1555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 1565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Reads DnsSystemSettings from IpHelper and registry. 1585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)ConfigParseWinResult ReadSystemSettings(DnsSystemSettings* settings) { 1595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) settings->addresses = ReadIpHelper(GAA_FLAG_SKIP_ANYCAST | 1605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) GAA_FLAG_SKIP_UNICAST | 1615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) GAA_FLAG_SKIP_MULTICAST | 1625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) GAA_FLAG_SKIP_FRIENDLY_NAME); 1635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!settings->addresses.get()) 1645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_IPHELPER; 1655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryReader tcpip_reader(kTcpipPath); 1675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryReader tcpip6_reader(kTcpip6Path); 1685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryReader dnscache_reader(kDnscachePath); 1695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryReader policy_reader(kPolicyPath); 1705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryReader primary_dns_suffix_reader(kPrimaryDnsSuffixPath); 1715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!policy_reader.ReadString(L"SearchList", 1735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) &settings->policy_search_list)) { 1745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_POLICY_SEARCHLIST; 1755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!tcpip_reader.ReadString(L"SearchList", &settings->tcpip_search_list)) 1785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_TCPIP_SEARCHLIST; 1795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!tcpip_reader.ReadString(L"Domain", &settings->tcpip_domain)) 1815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_DOMAIN; 1825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!ReadDevolutionSetting(policy_reader, &settings->policy_devolution)) 1845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_POLICY_DEVOLUTION; 1855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!ReadDevolutionSetting(dnscache_reader, &settings->dnscache_devolution)) 1875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_DNSCACHE_DEVOLUTION; 1885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!ReadDevolutionSetting(tcpip_reader, &settings->tcpip_devolution)) 1905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_TCPIP_DEVOLUTION; 1915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!policy_reader.ReadDword(L"AppendToMultiLabelName", 1935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) &settings->append_to_multi_label_name)) { 1945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_APPEND_MULTILABEL; 1955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!primary_dns_suffix_reader.ReadString(L"PrimaryDnsSuffix", 1985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) &settings->primary_dns_suffix)) { 1995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_READ_PRIMARY_SUFFIX; 2005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 2015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_OK; 2025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 2035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Default address of "localhost" and local computer name can be overridden 2055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// by the HOSTS file, but if it's not there, then we need to fill it in. 2065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)HostsParseWinResult AddLocalhostEntries(DnsHosts* hosts) { 2075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) const unsigned char kIPv4Localhost[] = { 127, 0, 0, 1 }; 2085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) const unsigned char kIPv6Localhost[] = { 0, 0, 0, 0, 0, 0, 0, 0, 2095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 0, 0, 0, 0, 0, 0, 0, 1 }; 2105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) IPAddressNumber loopback_ipv4(kIPv4Localhost, 2115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) kIPv4Localhost + arraysize(kIPv4Localhost)); 2125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) IPAddressNumber loopback_ipv6(kIPv6Localhost, 2135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) kIPv6Localhost + arraysize(kIPv6Localhost)); 2145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // This does not override any pre-existing entries from the HOSTS file. 2165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) hosts->insert(std::make_pair(DnsHostsKey("localhost", ADDRESS_FAMILY_IPV4), 2175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) loopback_ipv4)); 2185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) hosts->insert(std::make_pair(DnsHostsKey("localhost", ADDRESS_FAMILY_IPV6), 2195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) loopback_ipv6)); 2205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) WCHAR buffer[MAX_PATH]; 2225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DWORD size = MAX_PATH; 2235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) std::string localname; 2245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!GetComputerNameExW(ComputerNameDnsHostname, buffer, &size) || 2255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) !ParseDomainASCII(buffer, &localname)) { 2265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return HOSTS_PARSE_WIN_COMPUTER_NAME_FAILED; 2275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 2285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) StringToLowerASCII(&localname); 2295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool have_ipv4 = 2315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) hosts->count(DnsHostsKey(localname, ADDRESS_FAMILY_IPV4)) > 0; 2325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool have_ipv6 = 2335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) hosts->count(DnsHostsKey(localname, ADDRESS_FAMILY_IPV6)) > 0; 2345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (have_ipv4 && have_ipv6) 2365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return HOSTS_PARSE_WIN_OK; 2375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) scoped_ptr_malloc<IP_ADAPTER_ADDRESSES> addresses = 2395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ReadIpHelper(GAA_FLAG_SKIP_ANYCAST | 2405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) GAA_FLAG_SKIP_DNS_SERVER | 2415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) GAA_FLAG_SKIP_MULTICAST | 2425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) GAA_FLAG_SKIP_FRIENDLY_NAME); 2435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!addresses.get()) 2445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return HOSTS_PARSE_WIN_IPHELPER_FAILED; 2455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // The order of adapters is the network binding order, so stick to the 2475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // first good adapter for each family. 2485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) for (const IP_ADAPTER_ADDRESSES* adapter = addresses.get(); 2495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) adapter != NULL && (!have_ipv4 || !have_ipv6); 2505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) adapter = adapter->Next) { 2515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (adapter->OperStatus != IfOperStatusUp) 2525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) continue; 2535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (adapter->IfType == IF_TYPE_SOFTWARE_LOOPBACK) 2545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) continue; 2555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) for (const IP_ADAPTER_UNICAST_ADDRESS* address = 2575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) adapter->FirstUnicastAddress; 2585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) address != NULL; 2595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) address = address->Next) { 2605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) IPEndPoint ipe; 2615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!ipe.FromSockAddr(address->Address.lpSockaddr, 2625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) address->Address.iSockaddrLength)) { 2635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return HOSTS_PARSE_WIN_BAD_ADDRESS; 2645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 2652a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) if (!have_ipv4 && (ipe.GetFamily() == ADDRESS_FAMILY_IPV4)) { 2665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) have_ipv4 = true; 2675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) (*hosts)[DnsHostsKey(localname, ADDRESS_FAMILY_IPV4)] = ipe.address(); 2682a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) } else if (!have_ipv6 && (ipe.GetFamily() == ADDRESS_FAMILY_IPV6)) { 2695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) have_ipv6 = true; 2705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) (*hosts)[DnsHostsKey(localname, ADDRESS_FAMILY_IPV6)] = ipe.address(); 2715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 2725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 2735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 2745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return HOSTS_PARSE_WIN_OK; 2755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 2765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Watches a single registry key for changes. 2785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class RegistryWatcher : public base::win::ObjectWatcher::Delegate, 2795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public base::NonThreadSafe { 2805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public: 2815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) typedef base::Callback<void(bool succeeded)> CallbackType; 2825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryWatcher() {} 2835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool Watch(const wchar_t* key, const CallbackType& callback) { 2855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(CalledOnValidThread()); 2865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(!callback.is_null()); 2875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(callback_.is_null()); 2885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) callback_ = callback; 2895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (key_.Open(HKEY_LOCAL_MACHINE, key, KEY_NOTIFY) != ERROR_SUCCESS) 2905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return false; 2915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (key_.StartWatching() != ERROR_SUCCESS) 2925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return false; 2935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!watcher_.StartWatching(key_.watch_event(), this)) 2945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return false; 2955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return true; 2965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 2975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual void OnObjectSignaled(HANDLE object) OVERRIDE { 2995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(CalledOnValidThread()); 3005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool succeeded = (key_.StartWatching() == ERROR_SUCCESS) && 3015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) watcher_.StartWatching(key_.watch_event(), this); 3025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!succeeded && key_.Valid()) { 3035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) watcher_.StopWatching(); 3045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) key_.StopWatching(); 3055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) key_.Close(); 3065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 3075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!callback_.is_null()) 3085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) callback_.Run(succeeded); 3095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 3105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private: 3125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) CallbackType callback_; 3135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::win::RegKey key_; 3145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::win::ObjectWatcher watcher_; 3155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DISALLOW_COPY_AND_ASSIGN(RegistryWatcher); 3175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 3185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3192a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)// Returns true iff |address| is DNS address from IPv6 stateless discovery, 3202a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)// i.e., matches fec0:0:0:ffff::{1,2,3}. 3212a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)// http://tools.ietf.org/html/draft-ietf-ipngwg-dns-discovery 3222a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)bool IsStatelessDiscoveryAddress(const IPAddressNumber& address) { 3232a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) if (address.size() != kIPv6AddressSize) 3242a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) return false; 3252a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) const uint8 kPrefix[] = { 3262a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) 0xfe, 0xc0, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 3272a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 3282a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) }; 3292a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) return std::equal(kPrefix, kPrefix + arraysize(kPrefix), 3302a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) address.begin()) && (address.back() < 4); 3312a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)} 3322a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) 3335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} // namespace 3345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3352a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)base::FilePath GetHostsPath() { 3365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) TCHAR buffer[MAX_PATH]; 3375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) UINT rc = GetSystemDirectory(buffer, MAX_PATH); 3385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(0 < rc && rc < MAX_PATH); 3392a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) return base::FilePath(buffer).Append( 3402a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) FILE_PATH_LITERAL("drivers\\etc\\hosts")); 3415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 3425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 343c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)bool ParseSearchList(const base::string16& value, 344c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) std::vector<std::string>* output) { 3455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(output); 3465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (value.empty()) 3475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return false; 3485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) output->clear(); 3505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // If the list includes an empty hostname (",," or ", ,"), it is terminated. 3525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Although nslookup and network connection property tab ignore such 3535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // fragments ("a,b,,c" becomes ["a", "b", "c"]), our reference is getaddrinfo 3545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // (which sees ["a", "b"]). WMI queries also return a matching search list. 355c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) std::vector<base::string16> woutput; 3565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::SplitString(value, ',', &woutput); 3575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) for (size_t i = 0; i < woutput.size(); ++i) { 3585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Convert non-ASCII to punycode, although getaddrinfo does not properly 3595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // handle such suffixes. 360c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) const base::string16& t = woutput[i]; 3615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) std::string parsed; 3625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!ParseDomainASCII(t, &parsed)) 3635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) break; 3645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) output->push_back(parsed); 3655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 3665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return !output->empty(); 3675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 3685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)ConfigParseWinResult ConvertSettingsToDnsConfig( 3705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) const DnsSystemSettings& settings, 3715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsConfig* config) { 3725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) *config = DnsConfig(); 3735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Use GetAdapterAddresses to get effective DNS server order and 3755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // connection-specific DNS suffix. Ignore disconnected and loopback adapters. 3765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // The order of adapters is the network binding order, so stick to the 3775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // first good adapter. 3785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) for (const IP_ADAPTER_ADDRESSES* adapter = settings.addresses.get(); 3795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) adapter != NULL && config->nameservers.empty(); 3805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) adapter = adapter->Next) { 3815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (adapter->OperStatus != IfOperStatusUp) 3825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) continue; 3835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (adapter->IfType == IF_TYPE_SOFTWARE_LOOPBACK) 3845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) continue; 3855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) for (const IP_ADAPTER_DNS_SERVER_ADDRESS* address = 3875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) adapter->FirstDnsServerAddress; 3885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) address != NULL; 3895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) address = address->Next) { 3905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) IPEndPoint ipe; 3915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (ipe.FromSockAddr(address->Address.lpSockaddr, 3925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) address->Address.iSockaddrLength)) { 3932a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) if (IsStatelessDiscoveryAddress(ipe.address())) 3942a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) continue; 3955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Override unset port. 3965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!ipe.port()) 3975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ipe = IPEndPoint(ipe.address(), dns_protocol::kDefaultPort); 3985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config->nameservers.push_back(ipe); 3995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 4005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_BAD_ADDRESS; 4015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 4025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 4035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // IP_ADAPTER_ADDRESSES in Vista+ has a search list at |FirstDnsSuffix|, 4055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // but it came up empty in all trials. 4065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // |DnsSuffix| stores the effective connection-specific suffix, which is 4075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // obtained via DHCP (regkey: Tcpip\Parameters\Interfaces\{XXX}\DhcpDomain) 4085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // or specified by the user (regkey: Tcpip\Parameters\Domain). 4095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) std::string dns_suffix; 4105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (ParseDomainASCII(adapter->DnsSuffix, &dns_suffix)) 4115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config->search.push_back(dns_suffix); 4125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 4135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (config->nameservers.empty()) 4155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_NO_NAMESERVERS; // No point continuing. 4165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Windows always tries a multi-label name "as is" before using suffixes. 4185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config->ndots = 1; 4195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!settings.append_to_multi_label_name.set) { 4215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // The default setting is true for XP, false for Vista+. 4225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (base::win::GetVersion() >= base::win::VERSION_VISTA) { 4235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config->append_to_multi_label_name = false; 4245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 4255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config->append_to_multi_label_name = true; 4265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 4275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 4285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config->append_to_multi_label_name = 4295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) (settings.append_to_multi_label_name.value != 0); 4305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 4315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // SearchList takes precedence, so check it first. 4335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (settings.policy_search_list.set) { 4345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) std::vector<std::string> search; 4355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (ParseSearchList(settings.policy_search_list.value, &search)) { 4365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config->search.swap(search); 4375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_OK; 4385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 4395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Even if invalid, the policy disables the user-specified setting below. 4405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else if (settings.tcpip_search_list.set) { 4415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) std::vector<std::string> search; 4425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (ParseSearchList(settings.tcpip_search_list.value, &search)) { 4435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config->search.swap(search); 4445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_OK; 4455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 4465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 4475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // In absence of explicit search list, suffix search is: 4495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // [primary suffix, connection-specific suffix, devolution of primary suffix]. 4505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Primary suffix can be set by policy (primary_dns_suffix) or 4515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // user setting (tcpip_domain). 4525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // 4535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // The policy (primary_dns_suffix) can be edited via Group Policy Editor 4545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // (gpedit.msc) at Local Computer Policy => Computer Configuration 4555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // => Administrative Template => Network => DNS Client => Primary DNS Suffix. 4565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // 4575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // The user setting (tcpip_domain) can be configurred at Computer Name in 4585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // System Settings 4595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) std::string primary_suffix; 4605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if ((settings.primary_dns_suffix.set && 4615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ParseDomainASCII(settings.primary_dns_suffix.value, &primary_suffix)) || 4625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) (settings.tcpip_domain.set && 4635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ParseDomainASCII(settings.tcpip_domain.value, &primary_suffix))) { 4645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Primary suffix goes in front. 4655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config->search.insert(config->search.begin(), primary_suffix); 4665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 4675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_OK; // No primary suffix, hence no devolution. 4685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 4695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Devolution is determined by precedence: policy > dnscache > tcpip. 4715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // |enabled|: UseDomainNameDevolution and |level|: DomainNameDevolutionLevel 4725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // are overridden independently. 4735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsSystemSettings::DevolutionSetting devolution = settings.policy_devolution; 4745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!devolution.enabled.set) 4765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) devolution.enabled = settings.dnscache_devolution.enabled; 4775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!devolution.enabled.set) 4785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) devolution.enabled = settings.tcpip_devolution.enabled; 4795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (devolution.enabled.set && (devolution.enabled.value == 0)) 4805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_OK; // Devolution disabled. 4815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // By default devolution is enabled. 4835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!devolution.level.set) 4855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) devolution.level = settings.dnscache_devolution.level; 4865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!devolution.level.set) 4875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) devolution.level = settings.tcpip_devolution.level; 4885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // After the recent update, Windows will try to determine a safe default 4905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // value by comparing the forest root domain (FRD) to the primary suffix. 4915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // See http://support.microsoft.com/kb/957579 for details. 4925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // For now, if the level is not set, we disable devolution, assuming that 4935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // we will fallback to the system getaddrinfo anyway. This might cause 4945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // performance loss for resolutions which depend on the system default 4955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // devolution setting. 4965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // 4975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // If the level is explicitly set below 2, devolution is disabled. 4985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!devolution.level.set || devolution.level.value < 2) 4995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_OK; // Devolution disabled. 5005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Devolve the primary suffix. This naive logic matches the observed 5025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // behavior (see also ParseSearchList). If a suffix is not valid, it will be 5035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // discarded when the fully-qualified name is converted to DNS format. 5045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) unsigned num_dots = std::count(primary_suffix.begin(), 5065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) primary_suffix.end(), '.'); 5075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) for (size_t offset = 0; num_dots >= devolution.level.value; --num_dots) { 5095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) offset = primary_suffix.find('.', offset + 1); 5105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config->search.push_back(primary_suffix.substr(offset + 1)); 5115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return CONFIG_PARSE_WIN_OK; 5135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 5145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Watches registry and HOSTS file for changes. Must live on a thread which 5165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// allows IO. 5175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class DnsConfigServiceWin::Watcher 5185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) : public NetworkChangeNotifier::IPAddressObserver { 5195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public: 5205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) explicit Watcher(DnsConfigServiceWin* service) : service_(service) {} 5215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ~Watcher() { 5225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) NetworkChangeNotifier::RemoveIPAddressObserver(this); 5235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool Watch() { 5265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryWatcher::CallbackType callback = 5275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::Bind(&DnsConfigServiceWin::OnConfigChanged, 5285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::Unretained(service_)); 5295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool success = true; 5315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // The Tcpip key must be present. 5335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!tcpip_watcher_.Watch(kTcpipPath, callback)) { 5345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LOG(ERROR) << "DNS registry watch failed to start."; 5355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) success = false; 5362a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) UMA_HISTOGRAM_ENUMERATION("AsyncDNS.WatchStatus", 5372a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_FAILED_TO_START_CONFIG, 5382a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_MAX); 5395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Watch for IPv6 nameservers. 5425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) tcpip6_watcher_.Watch(kTcpip6Path, callback); 5435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // DNS suffix search list and devolution can be configured via group 5455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // policy which sets this registry key. If the key is missing, the policy 5465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // does not apply, and the DNS client uses Tcpip and Dnscache settings. 5475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // If a policy is installed, DnsConfigService will need to be restarted. 5485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // BUG=99509 5495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) dnscache_watcher_.Watch(kDnscachePath, callback); 5515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) policy_watcher_.Watch(kPolicyPath, callback); 5525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5532a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) if (!hosts_watcher_.Watch(GetHostsPath(), false, 5545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::Bind(&Watcher::OnHostsChanged, 5555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::Unretained(this)))) { 5562a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) UMA_HISTOGRAM_ENUMERATION("AsyncDNS.WatchStatus", 5572a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_FAILED_TO_START_HOSTS, 5582a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_MAX); 5595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LOG(ERROR) << "DNS hosts watch failed to start."; 5605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) success = false; 5615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 5625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Also need to observe changes to local non-loopback IP for DnsHosts. 5635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) NetworkChangeNotifier::AddIPAddressObserver(this); 5645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return success; 5665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private: 5692a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) void OnHostsChanged(const base::FilePath& path, bool error) { 5705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (error) 5715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) NetworkChangeNotifier::RemoveIPAddressObserver(this); 5725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) service_->OnHostsChanged(!error); 5735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // NetworkChangeNotifier::IPAddressObserver: 5765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual void OnIPAddressChanged() OVERRIDE { 5775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Need to update non-loopback IP of local host. 5785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) service_->OnHostsChanged(true); 5795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsConfigServiceWin* service_; 5825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryWatcher tcpip_watcher_; 5845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryWatcher tcpip6_watcher_; 5855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryWatcher dnscache_watcher_; 5865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RegistryWatcher policy_watcher_; 5872a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) base::FilePathWatcher hosts_watcher_; 5885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DISALLOW_COPY_AND_ASSIGN(Watcher); 5905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 5915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Reads config from registry and IpHelper. All work performed on WorkerPool. 5935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class DnsConfigServiceWin::ConfigReader : public SerialWorker { 5945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public: 5955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) explicit ConfigReader(DnsConfigServiceWin* service) 5965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) : service_(service), 5975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) success_(false) {} 5985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private: 6005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual ~ConfigReader() {} 6015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual void DoWork() OVERRIDE { 6035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Should be called on WorkerPool. 6045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::TimeTicks start_time = base::TimeTicks::Now(); 6055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsSystemSettings settings = {}; 6065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ConfigParseWinResult result = ReadSystemSettings(&settings); 6075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (result == CONFIG_PARSE_WIN_OK) 6085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) result = ConvertSettingsToDnsConfig(settings, &dns_config_); 6095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) success_ = (result == CONFIG_PARSE_WIN_OK); 6105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) UMA_HISTOGRAM_ENUMERATION("AsyncDNS.ConfigParseWin", 6115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) result, CONFIG_PARSE_WIN_MAX); 6125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) UMA_HISTOGRAM_BOOLEAN("AsyncDNS.ConfigParseResult", success_); 6135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) UMA_HISTOGRAM_TIMES("AsyncDNS.ConfigParseDuration", 6145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::TimeTicks::Now() - start_time); 6155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual void OnWorkFinished() OVERRIDE { 6185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(loop()->BelongsToCurrentThread()); 6195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(!IsCancelled()); 6205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (success_) { 6215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) service_->OnConfigRead(dns_config_); 6225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 6235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LOG(WARNING) << "Failed to read DnsConfig."; 6245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Try again in a while in case DnsConfigWatcher missed the signal. 62590dce4d38c5ff5333bea97d859d4e484e27edf0cTorne (Richard Coles) base::MessageLoop::current()->PostDelayedTask( 6265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) FROM_HERE, 6275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::Bind(&ConfigReader::WorkNow, this), 6285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::TimeDelta::FromSeconds(kRetryIntervalSeconds)); 6295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsConfigServiceWin* service_; 6335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Written in DoWork(), read in OnWorkFinished(). No locking required. 6345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsConfig dns_config_; 6355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool success_; 6365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 6375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Reads hosts from HOSTS file and fills in localhost and local computer name if 6395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// necessary. All work performed on WorkerPool. 6405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class DnsConfigServiceWin::HostsReader : public SerialWorker { 6415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public: 6425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) explicit HostsReader(DnsConfigServiceWin* service) 6435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) : path_(GetHostsPath()), 6445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) service_(service), 6455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) success_(false) { 6465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private: 6495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual ~HostsReader() {} 6505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual void DoWork() OVERRIDE { 6525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::TimeTicks start_time = base::TimeTicks::Now(); 6535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) HostsParseWinResult result = HOSTS_PARSE_WIN_UNREADABLE_HOSTS_FILE; 6545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (ParseHostsFile(path_, &hosts_)) 6555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) result = AddLocalhostEntries(&hosts_); 6565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) success_ = (result == HOSTS_PARSE_WIN_OK); 6575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) UMA_HISTOGRAM_ENUMERATION("AsyncDNS.HostsParseWin", 6585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) result, HOSTS_PARSE_WIN_MAX); 6595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) UMA_HISTOGRAM_BOOLEAN("AsyncDNS.HostParseResult", success_); 6605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) UMA_HISTOGRAM_TIMES("AsyncDNS.HostsParseDuration", 6615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::TimeTicks::Now() - start_time); 6625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual void OnWorkFinished() OVERRIDE { 6655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DCHECK(loop()->BelongsToCurrentThread()); 6665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (success_) { 6675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) service_->OnHostsRead(hosts_); 6685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 6695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LOG(WARNING) << "Failed to read DnsHosts."; 6705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6732a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) const base::FilePath path_; 6745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsConfigServiceWin* service_; 6755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Written in DoWork, read in OnWorkFinished, no locking necessary. 6765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DnsHosts hosts_; 6775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool success_; 6785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DISALLOW_COPY_AND_ASSIGN(HostsReader); 6805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 6815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)DnsConfigServiceWin::DnsConfigServiceWin() 6835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) : config_reader_(new ConfigReader(this)), 6845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) hosts_reader_(new HostsReader(this)) {} 6855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)DnsConfigServiceWin::~DnsConfigServiceWin() { 6875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config_reader_->Cancel(); 6885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) hosts_reader_->Cancel(); 6895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 6905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void DnsConfigServiceWin::ReadNow() { 6925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config_reader_->WorkNow(); 6935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) hosts_reader_->WorkNow(); 6945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 6955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool DnsConfigServiceWin::StartWatching() { 6975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // TODO(szym): re-start watcher if that makes sense. http://crbug.com/116139 6985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) watcher_.reset(new Watcher(this)); 6992a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) UMA_HISTOGRAM_ENUMERATION("AsyncDNS.WatchStatus", DNS_CONFIG_WATCH_STARTED, 7002a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_MAX); 7015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return watcher_->Watch(); 7025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 7035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 7045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void DnsConfigServiceWin::OnConfigChanged(bool succeeded) { 7055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) InvalidateConfig(); 7065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (succeeded) { 7075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config_reader_->WorkNow(); 7085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 7095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LOG(ERROR) << "DNS config watch failed."; 7105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) set_watch_failed(true); 7112a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) UMA_HISTOGRAM_ENUMERATION("AsyncDNS.WatchStatus", 7122a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_FAILED_CONFIG, 7132a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_MAX); 7145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 7155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 7165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 7175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void DnsConfigServiceWin::OnHostsChanged(bool succeeded) { 7185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) InvalidateHosts(); 7195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (succeeded) { 7205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) hosts_reader_->WorkNow(); 7215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 7225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LOG(ERROR) << "DNS hosts watch failed."; 7235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) set_watch_failed(true); 7242a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) UMA_HISTOGRAM_ENUMERATION("AsyncDNS.WatchStatus", 7252a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_FAILED_HOSTS, 7262a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) DNS_CONFIG_WATCH_MAX); 7275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 7285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 7295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 7305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} // namespace internal 7315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 7325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// static 7335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)scoped_ptr<DnsConfigService> DnsConfigService::CreateSystemService() { 7345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return scoped_ptr<DnsConfigService>(new internal::DnsConfigServiceWin()); 7355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 7365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 7375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} // namespace net 738