15821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Copyright (c) 2012 The Chromium Authors. All rights reserved.
25821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be
35821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// found in the LICENSE file.
45821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
55821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/dns/dns_config_service_win.h"
65821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
75821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <algorithm>
85821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <string>
95821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/bind.h"
115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/callback.h"
125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/compiler_specific.h"
132a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include "base/files/file_path.h"
145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/files/file_path_watcher.h"
155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/logging.h"
165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/memory/scoped_ptr.h"
175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/metrics/histogram.h"
182a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include "base/strings/string_split.h"
19eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch#include "base/strings/string_util.h"
20868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)#include "base/strings/utf_string_conversions.h"
215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/synchronization/lock.h"
225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/threading/non_thread_safe.h"
235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/threading/thread_restrictions.h"
24eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch#include "base/time/time.h"
255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/win/object_watcher.h"
265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/win/registry.h"
275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/win/windows_version.h"
285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/base/net_util.h"
295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/base/network_change_notifier.h"
305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/dns/dns_hosts.h"
315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/dns/dns_protocol.h"
325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/dns/serial_worker.h"
337dbb3d5cf0c15f500944d211057644d6a2f37371Ben Murdoch#include "url/url_canon.h"
345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#pragma comment(lib, "iphlpapi.lib")
365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace net {
385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace internal {
405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace {
425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Interval between retries to parse config. Used only until parsing succeeds.
445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const int kRetryIntervalSeconds = 5;
455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
46d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)// Registry key paths.
47d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)const wchar_t* const kTcpipPath =
48d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    L"SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters";
49d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)const wchar_t* const kTcpip6Path =
50d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    L"SYSTEM\\CurrentControlSet\\Services\\Tcpip6\\Parameters";
51d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)const wchar_t* const kDnscachePath =
52d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    L"SYSTEM\\CurrentControlSet\\Services\\Dnscache\\Parameters";
53d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)const wchar_t* const kPolicyPath =
54d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    L"SOFTWARE\\Policies\\Microsoft\\Windows NT\\DNSClient";
555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const wchar_t* const kPrimaryDnsSuffixPath =
565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    L"SOFTWARE\\Policies\\Microsoft\\System\\DNSClient";
57d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)const wchar_t* const kNRPTPath =
58d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    L"SOFTWARE\\Policies\\Microsoft\\Windows NT\\DNSClient\\DnsPolicyConfig";
595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)enum HostsParseWinResult {
615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  HOSTS_PARSE_WIN_OK = 0,
625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  HOSTS_PARSE_WIN_UNREADABLE_HOSTS_FILE,
635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  HOSTS_PARSE_WIN_COMPUTER_NAME_FAILED,
645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  HOSTS_PARSE_WIN_IPHELPER_FAILED,
655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  HOSTS_PARSE_WIN_BAD_ADDRESS,
665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  HOSTS_PARSE_WIN_MAX  // Bounding values for enumeration.
675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)};
685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Convenience for reading values using RegKey.
705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class RegistryReader : public base::NonThreadSafe {
715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public:
725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  explicit RegistryReader(const wchar_t* key) {
735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // Ignoring the result. |key_.Valid()| will catch failures.
745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    key_.Open(HKEY_LOCAL_MACHINE, key, KEY_QUERY_VALUE);
755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  bool ReadString(const wchar_t* name,
785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                  DnsSystemSettings::RegString* out) const {
795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DCHECK(CalledOnValidThread());
805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    out->set = false;
815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (!key_.Valid()) {
825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // Assume that if the |key_| is invalid then the key is missing.
835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return true;
845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    LONG result = key_.ReadValue(name, &out->value);
865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (result == ERROR_SUCCESS) {
875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      out->set = true;
885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return true;
895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return (result == ERROR_FILE_NOT_FOUND);
915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  bool ReadDword(const wchar_t* name,
945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                 DnsSystemSettings::RegDword* out) const {
955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DCHECK(CalledOnValidThread());
965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    out->set = false;
975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (!key_.Valid()) {
985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // Assume that if the |key_| is invalid then the key is missing.
995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return true;
1005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
1015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    LONG result = key_.ReadValueDW(name, &out->value);
1025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (result == ERROR_SUCCESS) {
1035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      out->set = true;
1045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return true;
1055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
1065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return (result == ERROR_FILE_NOT_FOUND);
1075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private:
1105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::win::RegKey key_;
1115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DISALLOW_COPY_AND_ASSIGN(RegistryReader);
1135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)};
1145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Wrapper for GetAdaptersAddresses. Returns NULL if failed.
116a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)scoped_ptr<IP_ADAPTER_ADDRESSES, base::FreeDeleter> ReadIpHelper(ULONG flags) {
1175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::ThreadRestrictions::AssertIOAllowed();
1185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
119a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  scoped_ptr<IP_ADAPTER_ADDRESSES, base::FreeDeleter> out;
1205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ULONG len = 15000;  // As recommended by MSDN for GetAdaptersAddresses.
1215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  UINT rv = ERROR_BUFFER_OVERFLOW;
1225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Try up to three times.
1235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  for (unsigned tries = 0; (tries < 3) && (rv == ERROR_BUFFER_OVERFLOW);
1245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)       tries++) {
125a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    out.reset(static_cast<PIP_ADAPTER_ADDRESSES>(malloc(len)));
1261320f92c476a1ad9d19dba2a48c72b75566198e9Primiano Tucci    memset(out.get(), 0, len);
1275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    rv = GetAdaptersAddresses(AF_UNSPEC, flags, NULL, out.get(), &len);
1285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (rv != NO_ERROR)
1305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    out.reset();
1315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return out.Pass();
1325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
1335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
134c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)// Converts a base::string16 domain name to ASCII, possibly using punycode.
1355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Returns true if the conversion succeeds and output is not empty. In case of
1365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// failure, |domain| might become dirty.
137c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)bool ParseDomainASCII(const base::string16& widestr, std::string* domain) {
1385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DCHECK(domain);
1395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (widestr.empty())
1405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return false;
1415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Check if already ASCII.
143010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  if (base::IsStringASCII(widestr)) {
144a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)    *domain = base::UTF16ToASCII(widestr);
1455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return true;
1465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Otherwise try to convert it from IDN to punycode.
1495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  const int kInitialBufferSize = 256;
1505c02ac1a9c1b504631c0a3d2b6e737b5d738bae1Bo Liu  url::RawCanonOutputT<base::char16, kInitialBufferSize> punycode;
1515c02ac1a9c1b504631c0a3d2b6e737b5d738bae1Bo Liu  if (!url::IDNToASCII(widestr.data(), widestr.length(), &punycode))
1525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return false;
1535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // |punycode_output| should now be ASCII; convert it to a std::string.
1555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // (We could use UTF16ToASCII() instead, but that requires an extra string
1565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // copy. Since ASCII is a subset of UTF8 the following is equivalent).
1575d1f7b1de12d16ceb2c938c56701a3e8bfa558f7Torne (Richard Coles)  bool success = base::UTF16ToUTF8(punycode.data(), punycode.length(), domain);
1585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DCHECK(success);
159010d83a9304c5a91596085d917d248abff47903aTorne (Richard Coles)  DCHECK(base::IsStringASCII(*domain));
1605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return success && !domain->empty();
1615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
1625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool ReadDevolutionSetting(const RegistryReader& reader,
1645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           DnsSystemSettings::DevolutionSetting* setting) {
1655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return reader.ReadDword(L"UseDomainNameDevolution", &setting->enabled) &&
1665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)         reader.ReadDword(L"DomainNameDevolutionLevel", &setting->level);
1675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
1685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Reads DnsSystemSettings from IpHelper and registry.
1705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)ConfigParseWinResult ReadSystemSettings(DnsSystemSettings* settings) {
1715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  settings->addresses = ReadIpHelper(GAA_FLAG_SKIP_ANYCAST |
1725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                     GAA_FLAG_SKIP_UNICAST |
1735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                     GAA_FLAG_SKIP_MULTICAST |
1745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                     GAA_FLAG_SKIP_FRIENDLY_NAME);
1755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!settings->addresses.get())
1765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return CONFIG_PARSE_WIN_READ_IPHELPER;
1775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  RegistryReader tcpip_reader(kTcpipPath);
1795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  RegistryReader tcpip6_reader(kTcpip6Path);
1805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  RegistryReader dnscache_reader(kDnscachePath);
1815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  RegistryReader policy_reader(kPolicyPath);
1825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  RegistryReader primary_dns_suffix_reader(kPrimaryDnsSuffixPath);
1835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!policy_reader.ReadString(L"SearchList",
1855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                &settings->policy_search_list)) {
1865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return CONFIG_PARSE_WIN_READ_POLICY_SEARCHLIST;
1875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!tcpip_reader.ReadString(L"SearchList", &settings->tcpip_search_list))
1905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return CONFIG_PARSE_WIN_READ_TCPIP_SEARCHLIST;
1915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!tcpip_reader.ReadString(L"Domain", &settings->tcpip_domain))
1935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return CONFIG_PARSE_WIN_READ_DOMAIN;
1945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!ReadDevolutionSetting(policy_reader, &settings->policy_devolution))
1965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return CONFIG_PARSE_WIN_READ_POLICY_DEVOLUTION;
1975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!ReadDevolutionSetting(dnscache_reader, &settings->dnscache_devolution))
1995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return CONFIG_PARSE_WIN_READ_DNSCACHE_DEVOLUTION;
2005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!ReadDevolutionSetting(tcpip_reader, &settings->tcpip_devolution))
2025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return CONFIG_PARSE_WIN_READ_TCPIP_DEVOLUTION;
2035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!policy_reader.ReadDword(L"AppendToMultiLabelName",
2055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                               &settings->append_to_multi_label_name)) {
2065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return CONFIG_PARSE_WIN_READ_APPEND_MULTILABEL;
2075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
2085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!primary_dns_suffix_reader.ReadString(L"PrimaryDnsSuffix",
2105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                            &settings->primary_dns_suffix)) {
2115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return CONFIG_PARSE_WIN_READ_PRIMARY_SUFFIX;
2125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
213d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)
214d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  base::win::RegistryKeyIterator nrpt_rules(HKEY_LOCAL_MACHINE, kNRPTPath);
215d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  settings->have_name_resolution_policy = (nrpt_rules.SubkeyCount() > 0);
216d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)
2175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return CONFIG_PARSE_WIN_OK;
2185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
2195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Default address of "localhost" and local computer name can be overridden
2215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// by the HOSTS file, but if it's not there, then we need to fill it in.
2225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)HostsParseWinResult AddLocalhostEntries(DnsHosts* hosts) {
2235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  const unsigned char kIPv4Localhost[] = { 127, 0, 0, 1 };
2245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  const unsigned char kIPv6Localhost[] = { 0, 0, 0, 0, 0, 0, 0, 0,
2255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                           0, 0, 0, 0, 0, 0, 0, 1 };
2265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  IPAddressNumber loopback_ipv4(kIPv4Localhost,
2275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                kIPv4Localhost + arraysize(kIPv4Localhost));
2285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  IPAddressNumber loopback_ipv6(kIPv6Localhost,
2295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                kIPv6Localhost + arraysize(kIPv6Localhost));
2305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // This does not override any pre-existing entries from the HOSTS file.
2325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  hosts->insert(std::make_pair(DnsHostsKey("localhost", ADDRESS_FAMILY_IPV4),
2335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                               loopback_ipv4));
2345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  hosts->insert(std::make_pair(DnsHostsKey("localhost", ADDRESS_FAMILY_IPV6),
2355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                               loopback_ipv6));
2365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  WCHAR buffer[MAX_PATH];
2385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DWORD size = MAX_PATH;
2395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  std::string localname;
2405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!GetComputerNameExW(ComputerNameDnsHostname, buffer, &size) ||
2415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      !ParseDomainASCII(buffer, &localname)) {
2425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return HOSTS_PARSE_WIN_COMPUTER_NAME_FAILED;
2435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
2446e8cce623b6e4fe0c9e4af605d675dd9d0338c38Torne (Richard Coles)  base::StringToLowerASCII(&localname);
2455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  bool have_ipv4 =
2475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      hosts->count(DnsHostsKey(localname, ADDRESS_FAMILY_IPV4)) > 0;
2485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  bool have_ipv6 =
2495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      hosts->count(DnsHostsKey(localname, ADDRESS_FAMILY_IPV6)) > 0;
2505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (have_ipv4 && have_ipv6)
2525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return HOSTS_PARSE_WIN_OK;
2535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
254a1401311d1ab56c4ed0a474bd38c108f75cb0cd9Torne (Richard Coles)  scoped_ptr<IP_ADAPTER_ADDRESSES, base::FreeDeleter> addresses =
2555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      ReadIpHelper(GAA_FLAG_SKIP_ANYCAST |
2565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                   GAA_FLAG_SKIP_DNS_SERVER |
2575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                   GAA_FLAG_SKIP_MULTICAST |
2585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                   GAA_FLAG_SKIP_FRIENDLY_NAME);
2595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!addresses.get())
2605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return HOSTS_PARSE_WIN_IPHELPER_FAILED;
2615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // The order of adapters is the network binding order, so stick to the
2635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // first good adapter for each family.
2645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  for (const IP_ADAPTER_ADDRESSES* adapter = addresses.get();
2655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)       adapter != NULL && (!have_ipv4 || !have_ipv6);
2665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)       adapter = adapter->Next) {
2675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (adapter->OperStatus != IfOperStatusUp)
2685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      continue;
2695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (adapter->IfType == IF_TYPE_SOFTWARE_LOOPBACK)
2705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      continue;
2715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    for (const IP_ADAPTER_UNICAST_ADDRESS* address =
2735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)             adapter->FirstUnicastAddress;
2745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)         address != NULL;
2755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)         address = address->Next) {
2765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      IPEndPoint ipe;
2775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      if (!ipe.FromSockAddr(address->Address.lpSockaddr,
2785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                            address->Address.iSockaddrLength)) {
2795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        return HOSTS_PARSE_WIN_BAD_ADDRESS;
2805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      }
2812a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      if (!have_ipv4 && (ipe.GetFamily() == ADDRESS_FAMILY_IPV4)) {
2825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        have_ipv4 = true;
2835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        (*hosts)[DnsHostsKey(localname, ADDRESS_FAMILY_IPV4)] = ipe.address();
2842a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      } else if (!have_ipv6 && (ipe.GetFamily() == ADDRESS_FAMILY_IPV6)) {
2855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        have_ipv6 = true;
2865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        (*hosts)[DnsHostsKey(localname, ADDRESS_FAMILY_IPV6)] = ipe.address();
2875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      }
2885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
2895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
2905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return HOSTS_PARSE_WIN_OK;
2915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
2925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Watches a single registry key for changes.
2945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class RegistryWatcher : public base::win::ObjectWatcher::Delegate,
2955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                        public base::NonThreadSafe {
2965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public:
2975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  typedef base::Callback<void(bool succeeded)> CallbackType;
2985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  RegistryWatcher() {}
2995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  bool Watch(const wchar_t* key, const CallbackType& callback) {
3015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DCHECK(CalledOnValidThread());
3025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DCHECK(!callback.is_null());
3035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DCHECK(callback_.is_null());
3045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    callback_ = callback;
3055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (key_.Open(HKEY_LOCAL_MACHINE, key, KEY_NOTIFY) != ERROR_SUCCESS)
3065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return false;
3075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (key_.StartWatching() != ERROR_SUCCESS)
3085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return false;
3095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (!watcher_.StartWatching(key_.watch_event(), this))
3105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return false;
3115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return true;
3125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
3135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  virtual void OnObjectSignaled(HANDLE object) OVERRIDE {
3155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DCHECK(CalledOnValidThread());
3165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    bool succeeded = (key_.StartWatching() == ERROR_SUCCESS) &&
3175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                      watcher_.StartWatching(key_.watch_event(), this);
3185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (!succeeded && key_.Valid()) {
3195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      watcher_.StopWatching();
3205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      key_.StopWatching();
3215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      key_.Close();
3225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
3235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (!callback_.is_null())
3245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      callback_.Run(succeeded);
3255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
3265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private:
3285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CallbackType callback_;
3295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::win::RegKey key_;
3305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::win::ObjectWatcher watcher_;
3315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DISALLOW_COPY_AND_ASSIGN(RegistryWatcher);
3335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)};
3345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
3352a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)// Returns true iff |address| is DNS address from IPv6 stateless discovery,
3362a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)// i.e., matches fec0:0:0:ffff::{1,2,3}.
3372a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)// http://tools.ietf.org/html/draft-ietf-ipngwg-dns-discovery
3382a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)bool IsStatelessDiscoveryAddress(const IPAddressNumber& address) {
3392a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  if (address.size() != kIPv6AddressSize)
3402a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    return false;
3412a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  const uint8 kPrefix[] = {
3422a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      0xfe, 0xc0, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff,
3432a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
3442a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  };
3452a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  return std::equal(kPrefix, kPrefix + arraysize(kPrefix),
3462a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                    address.begin()) && (address.back() < 4);
3472a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)}
3482a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)
349d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)// Returns the path to the HOSTS file.
3502a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)base::FilePath GetHostsPath() {
3515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  TCHAR buffer[MAX_PATH];
3525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  UINT rc = GetSystemDirectory(buffer, MAX_PATH);
3535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DCHECK(0 < rc && rc < MAX_PATH);
3542a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  return base::FilePath(buffer).Append(
3552a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      FILE_PATH_LITERAL("drivers\\etc\\hosts"));
3565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
3575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
358d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)void ConfigureSuffixSearch(const DnsSystemSettings& settings,
359d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)                           DnsConfig* config) {
360d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // SearchList takes precedence, so check it first.
361d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  if (settings.policy_search_list.set) {
362d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    std::vector<std::string> search;
363d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    if (ParseSearchList(settings.policy_search_list.value, &search)) {
364d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)      config->search.swap(search);
365d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)      return;
366d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    }
367d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    // Even if invalid, the policy disables the user-specified setting below.
368d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  } else if (settings.tcpip_search_list.set) {
369d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    std::vector<std::string> search;
370d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    if (ParseSearchList(settings.tcpip_search_list.value, &search)) {
371d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)      config->search.swap(search);
372d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)      return;
373d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    }
374d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  }
375d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)
376d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // In absence of explicit search list, suffix search is:
377d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // [primary suffix, connection-specific suffix, devolution of primary suffix].
378d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // Primary suffix can be set by policy (primary_dns_suffix) or
379d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // user setting (tcpip_domain).
380d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  //
381d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // The policy (primary_dns_suffix) can be edited via Group Policy Editor
382d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // (gpedit.msc) at Local Computer Policy => Computer Configuration
383d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // => Administrative Template => Network => DNS Client => Primary DNS Suffix.
384d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  //
385d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // The user setting (tcpip_domain) can be configurred at Computer Name in
386d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // System Settings
387d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  std::string primary_suffix;
388d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  if ((settings.primary_dns_suffix.set &&
389d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)       ParseDomainASCII(settings.primary_dns_suffix.value, &primary_suffix)) ||
390d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)      (settings.tcpip_domain.set &&
391d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)       ParseDomainASCII(settings.tcpip_domain.value, &primary_suffix))) {
392d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    // Primary suffix goes in front.
393d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    config->search.insert(config->search.begin(), primary_suffix);
394d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  } else {
395d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    return;  // No primary suffix, hence no devolution.
396d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  }
397d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)
398d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // Devolution is determined by precedence: policy > dnscache > tcpip.
399d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // |enabled|: UseDomainNameDevolution and |level|: DomainNameDevolutionLevel
400d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // are overridden independently.
401d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  DnsSystemSettings::DevolutionSetting devolution = settings.policy_devolution;
402d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)
403d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  if (!devolution.enabled.set)
404d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    devolution.enabled = settings.dnscache_devolution.enabled;
405d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  if (!devolution.enabled.set)
406d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    devolution.enabled = settings.tcpip_devolution.enabled;
407d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  if (devolution.enabled.set && (devolution.enabled.value == 0))
408d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    return;  // Devolution disabled.
409d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)
410d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // By default devolution is enabled.
411d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)
412d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  if (!devolution.level.set)
413d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    devolution.level = settings.dnscache_devolution.level;
414d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  if (!devolution.level.set)
415d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    devolution.level = settings.tcpip_devolution.level;
416d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)
417d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // After the recent update, Windows will try to determine a safe default
418d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // value by comparing the forest root domain (FRD) to the primary suffix.
419d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // See http://support.microsoft.com/kb/957579 for details.
420d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // For now, if the level is not set, we disable devolution, assuming that
421d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // we will fallback to the system getaddrinfo anyway. This might cause
422d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // performance loss for resolutions which depend on the system default
423d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // devolution setting.
424d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  //
425d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // If the level is explicitly set below 2, devolution is disabled.
426d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  if (!devolution.level.set || devolution.level.value < 2)
427d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    return;  // Devolution disabled.
428d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)
429d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // Devolve the primary suffix. This naive logic matches the observed
430d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // behavior (see also ParseSearchList). If a suffix is not valid, it will be
431d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  // discarded when the fully-qualified name is converted to DNS format.
432d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)
433d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  unsigned num_dots = std::count(primary_suffix.begin(),
434d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)                                 primary_suffix.end(), '.');
435d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)
436d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  for (size_t offset = 0; num_dots >= devolution.level.value; --num_dots) {
437d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    offset = primary_suffix.find('.', offset + 1);
438d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    config->search.push_back(primary_suffix.substr(offset + 1));
439d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  }
440d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)}
441d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)
442d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)}  // namespace
443d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)
444c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)bool ParseSearchList(const base::string16& value,
445c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)                     std::vector<std::string>* output) {
4465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DCHECK(output);
4475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (value.empty())
4485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return false;
4495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  output->clear();
4515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // If the list includes an empty hostname (",," or ", ,"), it is terminated.
4535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Although nslookup and network connection property tab ignore such
4545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // fragments ("a,b,,c" becomes ["a", "b", "c"]), our reference is getaddrinfo
4555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // (which sees ["a", "b"]). WMI queries also return a matching search list.
456c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)  std::vector<base::string16> woutput;
4575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::SplitString(value, ',', &woutput);
4585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  for (size_t i = 0; i < woutput.size(); ++i) {
4595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // Convert non-ASCII to punycode, although getaddrinfo does not properly
4605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // handle such suffixes.
461c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)    const base::string16& t = woutput[i];
4625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    std::string parsed;
4635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (!ParseDomainASCII(t, &parsed))
4645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      break;
4655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    output->push_back(parsed);
4665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
4675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return !output->empty();
4685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
4695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)ConfigParseWinResult ConvertSettingsToDnsConfig(
4715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const DnsSystemSettings& settings,
4725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DnsConfig* config) {
4735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  *config = DnsConfig();
4745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Use GetAdapterAddresses to get effective DNS server order and
4765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // connection-specific DNS suffix. Ignore disconnected and loopback adapters.
4775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // The order of adapters is the network binding order, so stick to the
4785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // first good adapter.
4795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  for (const IP_ADAPTER_ADDRESSES* adapter = settings.addresses.get();
4805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)       adapter != NULL && config->nameservers.empty();
4815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)       adapter = adapter->Next) {
4825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (adapter->OperStatus != IfOperStatusUp)
4835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      continue;
4845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (adapter->IfType == IF_TYPE_SOFTWARE_LOOPBACK)
4855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      continue;
4865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
4875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    for (const IP_ADAPTER_DNS_SERVER_ADDRESS* address =
4885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)             adapter->FirstDnsServerAddress;
4895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)         address != NULL;
4905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)         address = address->Next) {
4915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      IPEndPoint ipe;
4925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      if (ipe.FromSockAddr(address->Address.lpSockaddr,
4935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           address->Address.iSockaddrLength)) {
4942a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)        if (IsStatelessDiscoveryAddress(ipe.address()))
4952a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)          continue;
4965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        // Override unset port.
4975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        if (!ipe.port())
4985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          ipe = IPEndPoint(ipe.address(), dns_protocol::kDefaultPort);
4995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        config->nameservers.push_back(ipe);
5005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      } else {
5015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        return CONFIG_PARSE_WIN_BAD_ADDRESS;
5025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      }
5035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
5045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // IP_ADAPTER_ADDRESSES in Vista+ has a search list at |FirstDnsSuffix|,
5065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // but it came up empty in all trials.
5075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // |DnsSuffix| stores the effective connection-specific suffix, which is
5085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // obtained via DHCP (regkey: Tcpip\Parameters\Interfaces\{XXX}\DhcpDomain)
5095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // or specified by the user (regkey: Tcpip\Parameters\Domain).
5105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    std::string dns_suffix;
5115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (ParseDomainASCII(adapter->DnsSuffix, &dns_suffix))
5125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      config->search.push_back(dns_suffix);
5135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
5145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (config->nameservers.empty())
5165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return CONFIG_PARSE_WIN_NO_NAMESERVERS;  // No point continuing.
5175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Windows always tries a multi-label name "as is" before using suffixes.
5195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  config->ndots = 1;
5205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!settings.append_to_multi_label_name.set) {
5225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // The default setting is true for XP, false for Vista+.
5235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (base::win::GetVersion() >= base::win::VERSION_VISTA) {
5245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      config->append_to_multi_label_name = false;
5255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    } else {
5265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      config->append_to_multi_label_name = true;
5275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
5285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else {
5295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    config->append_to_multi_label_name =
5305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        (settings.append_to_multi_label_name.value != 0);
5315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
5325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
533d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  ConfigParseWinResult result = CONFIG_PARSE_WIN_OK;
534d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  if (settings.have_name_resolution_policy) {
535d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    config->unhandled_options = true;
536d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    // TODO(szym): only set this to true if NRPT has DirectAccess rules.
537d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    config->use_local_ipv6 = true;
538d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    result = CONFIG_PARSE_WIN_UNHANDLED_OPTIONS;
5395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
5405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
541d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  ConfigureSuffixSearch(settings, config);
542d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)  return result;
5435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
5445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Watches registry and HOSTS file for changes. Must live on a thread which
5465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// allows IO.
5475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class DnsConfigServiceWin::Watcher
5485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    : public NetworkChangeNotifier::IPAddressObserver {
5495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public:
5505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  explicit Watcher(DnsConfigServiceWin* service) : service_(service) {}
5515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ~Watcher() {
5525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    NetworkChangeNotifier::RemoveIPAddressObserver(this);
5535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
5545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  bool Watch() {
5565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    RegistryWatcher::CallbackType callback =
5575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        base::Bind(&DnsConfigServiceWin::OnConfigChanged,
5585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                   base::Unretained(service_));
5595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    bool success = true;
5615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // The Tcpip key must be present.
5635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (!tcpip_watcher_.Watch(kTcpipPath, callback)) {
5645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      LOG(ERROR) << "DNS registry watch failed to start.";
5655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      success = false;
5662a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      UMA_HISTOGRAM_ENUMERATION("AsyncDNS.WatchStatus",
5672a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                                DNS_CONFIG_WATCH_FAILED_TO_START_CONFIG,
5682a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                                DNS_CONFIG_WATCH_MAX);
5695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
5705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // Watch for IPv6 nameservers.
5725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    tcpip6_watcher_.Watch(kTcpip6Path, callback);
5735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // DNS suffix search list and devolution can be configured via group
5755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // policy which sets this registry key. If the key is missing, the policy
5765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // does not apply, and the DNS client uses Tcpip and Dnscache settings.
5775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // If a policy is installed, DnsConfigService will need to be restarted.
5785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // BUG=99509
5795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    dnscache_watcher_.Watch(kDnscachePath, callback);
5815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    policy_watcher_.Watch(kPolicyPath, callback);
5825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5832a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    if (!hosts_watcher_.Watch(GetHostsPath(), false,
5845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                              base::Bind(&Watcher::OnHostsChanged,
5855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                         base::Unretained(this)))) {
5862a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      UMA_HISTOGRAM_ENUMERATION("AsyncDNS.WatchStatus",
5872a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                                DNS_CONFIG_WATCH_FAILED_TO_START_HOSTS,
5882a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                                DNS_CONFIG_WATCH_MAX);
5895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      LOG(ERROR) << "DNS hosts watch failed to start.";
5905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      success = false;
5915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    } else {
5925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // Also need to observe changes to local non-loopback IP for DnsHosts.
5935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      NetworkChangeNotifier::AddIPAddressObserver(this);
5945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
5955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return success;
5965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
5975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private:
5992a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  void OnHostsChanged(const base::FilePath& path, bool error) {
6005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (error)
6015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      NetworkChangeNotifier::RemoveIPAddressObserver(this);
6025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    service_->OnHostsChanged(!error);
6035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
6045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // NetworkChangeNotifier::IPAddressObserver:
6065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  virtual void OnIPAddressChanged() OVERRIDE {
6075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // Need to update non-loopback IP of local host.
6085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    service_->OnHostsChanged(true);
6095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
6105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DnsConfigServiceWin* service_;
6125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  RegistryWatcher tcpip_watcher_;
6145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  RegistryWatcher tcpip6_watcher_;
6155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  RegistryWatcher dnscache_watcher_;
6165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  RegistryWatcher policy_watcher_;
6172a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  base::FilePathWatcher hosts_watcher_;
6185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DISALLOW_COPY_AND_ASSIGN(Watcher);
6205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)};
6215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Reads config from registry and IpHelper. All work performed on WorkerPool.
6235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class DnsConfigServiceWin::ConfigReader : public SerialWorker {
6245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public:
6255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  explicit ConfigReader(DnsConfigServiceWin* service)
6265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      : service_(service),
6275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        success_(false) {}
6285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private:
6305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  virtual ~ConfigReader() {}
6315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  virtual void DoWork() OVERRIDE {
6335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // Should be called on WorkerPool.
6345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    base::TimeTicks start_time = base::TimeTicks::Now();
6355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DnsSystemSettings settings = {};
6365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    ConfigParseWinResult result = ReadSystemSettings(&settings);
6375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (result == CONFIG_PARSE_WIN_OK)
6385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      result = ConvertSettingsToDnsConfig(settings, &dns_config_);
639d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)    success_ = (result == CONFIG_PARSE_WIN_OK ||
640d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)                result == CONFIG_PARSE_WIN_UNHANDLED_OPTIONS);
6415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    UMA_HISTOGRAM_ENUMERATION("AsyncDNS.ConfigParseWin",
6425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                              result, CONFIG_PARSE_WIN_MAX);
6435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    UMA_HISTOGRAM_BOOLEAN("AsyncDNS.ConfigParseResult", success_);
6445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    UMA_HISTOGRAM_TIMES("AsyncDNS.ConfigParseDuration",
6455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                        base::TimeTicks::Now() - start_time);
6465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
6475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  virtual void OnWorkFinished() OVERRIDE {
6495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DCHECK(loop()->BelongsToCurrentThread());
6505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DCHECK(!IsCancelled());
6515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (success_) {
6525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      service_->OnConfigRead(dns_config_);
6535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    } else {
6545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      LOG(WARNING) << "Failed to read DnsConfig.";
6555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // Try again in a while in case DnsConfigWatcher missed the signal.
65690dce4d38c5ff5333bea97d859d4e484e27edf0cTorne (Richard Coles)      base::MessageLoop::current()->PostDelayedTask(
6575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          FROM_HERE,
6585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          base::Bind(&ConfigReader::WorkNow, this),
6595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          base::TimeDelta::FromSeconds(kRetryIntervalSeconds));
6605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
6615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
6625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DnsConfigServiceWin* service_;
6645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Written in DoWork(), read in OnWorkFinished(). No locking required.
6655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DnsConfig dns_config_;
6665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  bool success_;
6675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)};
6685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Reads hosts from HOSTS file and fills in localhost and local computer name if
6705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// necessary. All work performed on WorkerPool.
6715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class DnsConfigServiceWin::HostsReader : public SerialWorker {
6725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public:
6735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  explicit HostsReader(DnsConfigServiceWin* service)
6745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      : path_(GetHostsPath()),
6755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        service_(service),
6765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        success_(false) {
6775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
6785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private:
6805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  virtual ~HostsReader() {}
6815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  virtual void DoWork() OVERRIDE {
6835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    base::TimeTicks start_time = base::TimeTicks::Now();
6845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    HostsParseWinResult result = HOSTS_PARSE_WIN_UNREADABLE_HOSTS_FILE;
6855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (ParseHostsFile(path_, &hosts_))
6865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      result = AddLocalhostEntries(&hosts_);
6875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    success_ = (result == HOSTS_PARSE_WIN_OK);
6885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    UMA_HISTOGRAM_ENUMERATION("AsyncDNS.HostsParseWin",
6895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                              result, HOSTS_PARSE_WIN_MAX);
6905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    UMA_HISTOGRAM_BOOLEAN("AsyncDNS.HostParseResult", success_);
6915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    UMA_HISTOGRAM_TIMES("AsyncDNS.HostsParseDuration",
6925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                        base::TimeTicks::Now() - start_time);
6935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
6945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
6955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  virtual void OnWorkFinished() OVERRIDE {
6965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    DCHECK(loop()->BelongsToCurrentThread());
6975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (success_) {
6985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      service_->OnHostsRead(hosts_);
6995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    } else {
7005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      LOG(WARNING) << "Failed to read DnsHosts.";
7015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
7025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
7035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7042a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  const base::FilePath path_;
7055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DnsConfigServiceWin* service_;
7065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Written in DoWork, read in OnWorkFinished, no locking necessary.
7075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DnsHosts hosts_;
7085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  bool success_;
7095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DISALLOW_COPY_AND_ASSIGN(HostsReader);
7115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)};
7125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)DnsConfigServiceWin::DnsConfigServiceWin()
7145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    : config_reader_(new ConfigReader(this)),
7155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      hosts_reader_(new HostsReader(this)) {}
7165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)DnsConfigServiceWin::~DnsConfigServiceWin() {
7185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  config_reader_->Cancel();
7195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  hosts_reader_->Cancel();
7205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
7215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void DnsConfigServiceWin::ReadNow() {
7235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  config_reader_->WorkNow();
7245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  hosts_reader_->WorkNow();
7255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
7265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool DnsConfigServiceWin::StartWatching() {
7285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // TODO(szym): re-start watcher if that makes sense. http://crbug.com/116139
7295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  watcher_.reset(new Watcher(this));
7302a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  UMA_HISTOGRAM_ENUMERATION("AsyncDNS.WatchStatus", DNS_CONFIG_WATCH_STARTED,
7312a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                            DNS_CONFIG_WATCH_MAX);
7325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return watcher_->Watch();
7335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
7345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void DnsConfigServiceWin::OnConfigChanged(bool succeeded) {
7365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  InvalidateConfig();
7375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (succeeded) {
7385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    config_reader_->WorkNow();
7395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else {
7405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    LOG(ERROR) << "DNS config watch failed.";
7415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    set_watch_failed(true);
7422a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    UMA_HISTOGRAM_ENUMERATION("AsyncDNS.WatchStatus",
7432a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                              DNS_CONFIG_WATCH_FAILED_CONFIG,
7442a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                              DNS_CONFIG_WATCH_MAX);
7455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
7465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
7475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void DnsConfigServiceWin::OnHostsChanged(bool succeeded) {
7495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  InvalidateHosts();
7505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (succeeded) {
7515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    hosts_reader_->WorkNow();
7525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else {
7535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    LOG(ERROR) << "DNS hosts watch failed.";
7545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    set_watch_failed(true);
7552a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)    UMA_HISTOGRAM_ENUMERATION("AsyncDNS.WatchStatus",
7562a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                              DNS_CONFIG_WATCH_FAILED_HOSTS,
7572a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)                              DNS_CONFIG_WATCH_MAX);
7585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
7595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
7605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}  // namespace internal
7625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// static
7645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)scoped_ptr<DnsConfigService> DnsConfigService::CreateSystemService() {
7655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return scoped_ptr<DnsConfigService>(new internal::DnsConfigServiceWin());
7665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
7675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
7685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}  // namespace net
769