blob: 9e4e5103aab17ee56e616ff36f76eeb8d20d9fd6 [file] [log] [blame]
Paul Stewarte6927402012-01-23 16:11:30 -08001// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Paul Stewartc2350ee2011-10-19 12:28:40 -07002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "shill/dns_client.h"
6
7#include <arpa/inet.h>
8#include <netdb.h>
9#include <netinet/in.h>
10#include <sys/socket.h>
11
12#include <map>
13#include <set>
14#include <string>
15#include <tr1/memory>
16#include <vector>
17
Eric Shienbrood3e20a232012-02-16 11:35:56 -050018#include <base/bind.h>
19#include <base/bind_helpers.h>
20#include <base/stl_util.h>
Paul Stewartbdb02e62012-02-22 16:24:33 -080021#include <base/string_number_conversions.h>
Paul Stewartc2350ee2011-10-19 12:28:40 -070022
Ben Chanfad4a0b2012-04-18 15:49:59 -070023#include "shill/scope_logger.h"
Darin Petkov89593a92012-02-21 10:59:48 +010024#include "shill/shill_ares.h"
25#include "shill/shill_time.h"
Paul Stewartc2350ee2011-10-19 12:28:40 -070026
Eric Shienbrood3e20a232012-02-16 11:35:56 -050027using base::Bind;
28using base::Unretained;
Paul Stewartc2350ee2011-10-19 12:28:40 -070029using std::map;
30using std::set;
31using std::string;
32using std::vector;
33
34namespace shill {
35
36const int DNSClient::kDefaultTimeoutMS = 2000;
37const char DNSClient::kErrorNoData[] = "The query response contains no answers";
38const char DNSClient::kErrorFormErr[] = "The server says the query is bad";
39const char DNSClient::kErrorServerFail[] = "The server says it had a failure";
40const char DNSClient::kErrorNotFound[] = "The queried-for domain was not found";
41const char DNSClient::kErrorNotImp[] = "The server doesn't implement operation";
42const char DNSClient::kErrorRefused[] = "The server replied, refused the query";
43const char DNSClient::kErrorBadQuery[] = "Locally we could not format a query";
44const char DNSClient::kErrorNetRefused[] = "The network connection was refused";
45const char DNSClient::kErrorTimedOut[] = "The network connection was timed out";
46const char DNSClient::kErrorUnknown[] = "DNS Resolver unknown internal error";
47
48// Private to the implementation of resolver so callers don't include ares.h
49struct DNSClientState {
50 ares_channel channel;
51 map< ares_socket_t, std::tr1::shared_ptr<IOHandler> > read_handlers;
52 map< ares_socket_t, std::tr1::shared_ptr<IOHandler> > write_handlers;
53 struct timeval start_time_;
54};
55
56DNSClient::DNSClient(IPAddress::Family family,
57 const string &interface_name,
58 const vector<string> &dns_servers,
59 int timeout_ms,
60 EventDispatcher *dispatcher,
Eric Shienbrood3e20a232012-02-16 11:35:56 -050061 const ClientCallback &callback)
Paul Stewartc2350ee2011-10-19 12:28:40 -070062 : address_(IPAddress(family)),
63 interface_name_(interface_name),
64 dns_servers_(dns_servers),
65 dispatcher_(dispatcher),
66 callback_(callback),
67 timeout_ms_(timeout_ms),
68 running_(false),
69 resolver_state_(NULL),
Eric Shienbrood3e20a232012-02-16 11:35:56 -050070 weak_ptr_factory_(this),
Paul Stewartc2350ee2011-10-19 12:28:40 -070071 ares_(Ares::GetInstance()),
72 time_(Time::GetInstance()) {}
73
74DNSClient::~DNSClient() {
75 Stop();
76}
77
Paul Stewartbdb02e62012-02-22 16:24:33 -080078bool DNSClient::Start(const string &hostname, Error *error) {
Paul Stewartc2350ee2011-10-19 12:28:40 -070079 if (running_) {
Paul Stewartbdb02e62012-02-22 16:24:33 -080080 Error::PopulateAndLog(error, Error::kInProgress,
81 "Only one DNS request is allowed at a time");
Paul Stewartc2350ee2011-10-19 12:28:40 -070082 return false;
83 }
84
85 if (!resolver_state_.get()) {
86 struct ares_options options;
87 memset(&options, 0, sizeof(options));
88
89 vector<struct in_addr> server_addresses;
90 for (vector<string>::iterator it = dns_servers_.begin();
91 it != dns_servers_.end();
92 ++it) {
93 struct in_addr addr;
94 if (inet_aton(it->c_str(), &addr) != 0) {
95 server_addresses.push_back(addr);
96 }
97 }
98
99 if (server_addresses.empty()) {
Paul Stewartbdb02e62012-02-22 16:24:33 -0800100 Error::PopulateAndLog(error, Error::kInvalidArguments,
101 "No valid DNS server addresses");
Paul Stewartc2350ee2011-10-19 12:28:40 -0700102 return false;
103 }
104
105 options.servers = server_addresses.data();
106 options.nservers = server_addresses.size();
107 options.timeout = timeout_ms_;
108
109 resolver_state_.reset(new DNSClientState);
110 int status = ares_->InitOptions(&resolver_state_->channel,
111 &options,
112 ARES_OPT_SERVERS | ARES_OPT_TIMEOUTMS);
113 if (status != ARES_SUCCESS) {
Paul Stewartbdb02e62012-02-22 16:24:33 -0800114 Error::PopulateAndLog(error, Error::kOperationFailed,
115 "ARES initialization returns error code: " +
116 base::IntToString(status));
Paul Stewartc2350ee2011-10-19 12:28:40 -0700117 resolver_state_.reset();
118 return false;
119 }
120
121 ares_->SetLocalDev(resolver_state_->channel, interface_name_.c_str());
122 }
123
124 running_ = true;
Paul Stewarte6927402012-01-23 16:11:30 -0800125 time_->GetTimeMonotonic(&resolver_state_->start_time_);
Paul Stewartc2350ee2011-10-19 12:28:40 -0700126 ares_->GetHostByName(resolver_state_->channel, hostname.c_str(),
127 address_.family(), ReceiveDNSReplyCB, this);
128
129 if (!RefreshHandles()) {
130 LOG(ERROR) << "Impossibly short timeout.";
Paul Stewartbdb02e62012-02-22 16:24:33 -0800131 error->CopyFrom(error_);
Paul Stewartc2350ee2011-10-19 12:28:40 -0700132 Stop();
133 return false;
134 }
135
136 return true;
137}
138
139void DNSClient::Stop() {
Ben Chanfad4a0b2012-04-18 15:49:59 -0700140 SLOG(DNS, 3) << "In " << __func__;
Paul Stewartc2350ee2011-10-19 12:28:40 -0700141 if (!resolver_state_.get()) {
142 return;
143 }
144
145 running_ = false;
Eric Shienbrood3e20a232012-02-16 11:35:56 -0500146 weak_ptr_factory_.InvalidateWeakPtrs();
Paul Stewartbdb02e62012-02-22 16:24:33 -0800147 error_.Reset();
148 address_.SetAddressToDefault();
Paul Stewartc2350ee2011-10-19 12:28:40 -0700149 ares_->Destroy(resolver_state_->channel);
150 resolver_state_.reset();
151}
152
Paul Stewartbdb02e62012-02-22 16:24:33 -0800153// We delay our call to completion so that we exit all IOHandlers, and
154// can clean up all of our local state before calling the callback, or
155// during the process of the execution of the callee (which is free to
156// call our destructor safely).
157void DNSClient::HandleCompletion() {
Ben Chanfad4a0b2012-04-18 15:49:59 -0700158 SLOG(DNS, 3) << "In " << __func__;
Paul Stewartbdb02e62012-02-22 16:24:33 -0800159 Error error;
160 error.CopyFrom(error_);
161 IPAddress address(address_);
162 if (!error.IsSuccess()) {
163 // If the DNS request did not succeed, do not trust it for future
164 // attempts.
165 Stop();
166 } else {
167 // Prepare our state for the next request without destroying the
168 // current ARES state.
169 error_.Reset();
170 address_.SetAddressToDefault();
171 }
Eric Shienbrood3e20a232012-02-16 11:35:56 -0500172 callback_.Run(error, address);
Paul Stewartbdb02e62012-02-22 16:24:33 -0800173}
174
Paul Stewartc2350ee2011-10-19 12:28:40 -0700175void DNSClient::HandleDNSRead(int fd) {
176 ares_->ProcessFd(resolver_state_->channel, fd, ARES_SOCKET_BAD);
177 RefreshHandles();
178}
179
180void DNSClient::HandleDNSWrite(int fd) {
181 ares_->ProcessFd(resolver_state_->channel, ARES_SOCKET_BAD, fd);
182 RefreshHandles();
183}
184
185void DNSClient::HandleTimeout() {
186 ares_->ProcessFd(resolver_state_->channel, ARES_SOCKET_BAD, ARES_SOCKET_BAD);
Paul Stewartbdb02e62012-02-22 16:24:33 -0800187 RefreshHandles();
Paul Stewartc2350ee2011-10-19 12:28:40 -0700188}
189
190void DNSClient::ReceiveDNSReply(int status, struct hostent *hostent) {
191 if (!running_) {
192 // We can be called during ARES shutdown -- ignore these events.
193 return;
194 }
Ben Chanfad4a0b2012-04-18 15:49:59 -0700195 SLOG(DNS, 3) << "In " << __func__;
Paul Stewartc2350ee2011-10-19 12:28:40 -0700196 running_ = false;
Paul Stewartf582b502012-04-04 21:39:22 -0700197 timeout_closure_.Cancel();
Eric Shienbrood3e20a232012-02-16 11:35:56 -0500198 dispatcher_->PostTask(Bind(&DNSClient::HandleCompletion,
199 weak_ptr_factory_.GetWeakPtr()));
Paul Stewartc2350ee2011-10-19 12:28:40 -0700200
201 if (status == ARES_SUCCESS &&
202 hostent != NULL &&
203 hostent->h_addrtype == address_.family() &&
Eric Shienbroodc74cf9c2012-03-02 15:00:35 -0500204 static_cast<size_t>(hostent->h_length) ==
205 IPAddress::GetAddressLength(address_.family()) &&
Paul Stewartc2350ee2011-10-19 12:28:40 -0700206 hostent->h_addr_list != NULL &&
207 hostent->h_addr_list[0] != NULL) {
208 address_ = IPAddress(address_.family(),
209 ByteString(reinterpret_cast<unsigned char *>(
210 hostent->h_addr_list[0]), hostent->h_length));
Paul Stewartc2350ee2011-10-19 12:28:40 -0700211 } else {
212 switch (status) {
213 case ARES_ENODATA:
Paul Stewartbdb02e62012-02-22 16:24:33 -0800214 error_.Populate(Error::kOperationFailed, kErrorNoData);
Paul Stewartc2350ee2011-10-19 12:28:40 -0700215 break;
216 case ARES_EFORMERR:
Paul Stewartbdb02e62012-02-22 16:24:33 -0800217 error_.Populate(Error::kOperationFailed, kErrorFormErr);
Paul Stewartc2350ee2011-10-19 12:28:40 -0700218 break;
219 case ARES_ESERVFAIL:
Paul Stewartbdb02e62012-02-22 16:24:33 -0800220 error_.Populate(Error::kOperationFailed, kErrorServerFail);
Paul Stewartc2350ee2011-10-19 12:28:40 -0700221 break;
222 case ARES_ENOTFOUND:
Paul Stewartbdb02e62012-02-22 16:24:33 -0800223 error_.Populate(Error::kOperationFailed, kErrorNotFound);
Paul Stewartc2350ee2011-10-19 12:28:40 -0700224 break;
225 case ARES_ENOTIMP:
Paul Stewartbdb02e62012-02-22 16:24:33 -0800226 error_.Populate(Error::kOperationFailed, kErrorNotImp);
Paul Stewartc2350ee2011-10-19 12:28:40 -0700227 break;
228 case ARES_EREFUSED:
Paul Stewartbdb02e62012-02-22 16:24:33 -0800229 error_.Populate(Error::kOperationFailed, kErrorRefused);
Paul Stewartc2350ee2011-10-19 12:28:40 -0700230 break;
231 case ARES_EBADQUERY:
232 case ARES_EBADNAME:
233 case ARES_EBADFAMILY:
234 case ARES_EBADRESP:
Paul Stewartbdb02e62012-02-22 16:24:33 -0800235 error_.Populate(Error::kOperationFailed, kErrorBadQuery);
Paul Stewartc2350ee2011-10-19 12:28:40 -0700236 break;
237 case ARES_ECONNREFUSED:
Paul Stewartbdb02e62012-02-22 16:24:33 -0800238 error_.Populate(Error::kOperationFailed, kErrorNetRefused);
Paul Stewartc2350ee2011-10-19 12:28:40 -0700239 break;
240 case ARES_ETIMEOUT:
Paul Stewartbdb02e62012-02-22 16:24:33 -0800241 error_.Populate(Error::kOperationTimeout, kErrorTimedOut);
Paul Stewartc2350ee2011-10-19 12:28:40 -0700242 break;
243 default:
Paul Stewartbdb02e62012-02-22 16:24:33 -0800244 error_.Populate(Error::kOperationFailed, kErrorUnknown);
Paul Stewartc2350ee2011-10-19 12:28:40 -0700245 if (status == ARES_SUCCESS) {
246 LOG(ERROR) << "ARES returned success but hostent was invalid!";
247 } else {
248 LOG(ERROR) << "ARES returned unhandled error status " << status;
249 }
250 break;
251 }
Paul Stewartc2350ee2011-10-19 12:28:40 -0700252 }
253}
254
255void DNSClient::ReceiveDNSReplyCB(void *arg, int status,
256 int /*timeouts*/,
257 struct hostent *hostent) {
258 DNSClient *res = static_cast<DNSClient *>(arg);
259 res->ReceiveDNSReply(status, hostent);
260}
261
262bool DNSClient::RefreshHandles() {
263 map< ares_socket_t, std::tr1::shared_ptr<IOHandler> > old_read =
264 resolver_state_->read_handlers;
265 map< ares_socket_t, std::tr1::shared_ptr<IOHandler> > old_write =
266 resolver_state_->write_handlers;
267
268 resolver_state_->read_handlers.clear();
269 resolver_state_->write_handlers.clear();
270
271 ares_socket_t sockets[ARES_GETSOCK_MAXNUM];
272 int action_bits = ares_->GetSock(resolver_state_->channel, sockets,
Paul Stewartbdb02e62012-02-22 16:24:33 -0800273 ARES_GETSOCK_MAXNUM);
Paul Stewartc2350ee2011-10-19 12:28:40 -0700274
Paul Stewartf582b502012-04-04 21:39:22 -0700275 base::Callback<void(int)> read_callback(
276 Bind(&DNSClient::HandleDNSRead, weak_ptr_factory_.GetWeakPtr()));
277 base::Callback<void(int)> write_callback(
278 Bind(&DNSClient::HandleDNSWrite, weak_ptr_factory_.GetWeakPtr()));
Paul Stewartc2350ee2011-10-19 12:28:40 -0700279 for (int i = 0; i < ARES_GETSOCK_MAXNUM; i++) {
280 if (ARES_GETSOCK_READABLE(action_bits, i)) {
281 if (ContainsKey(old_read, sockets[i])) {
282 resolver_state_->read_handlers[sockets[i]] = old_read[sockets[i]];
283 } else {
284 resolver_state_->read_handlers[sockets[i]] =
285 std::tr1::shared_ptr<IOHandler> (
286 dispatcher_->CreateReadyHandler(sockets[i],
287 IOHandler::kModeInput,
Paul Stewartf582b502012-04-04 21:39:22 -0700288 read_callback));
Paul Stewartc2350ee2011-10-19 12:28:40 -0700289 }
290 }
291 if (ARES_GETSOCK_WRITABLE(action_bits, i)) {
292 if (ContainsKey(old_write, sockets[i])) {
293 resolver_state_->write_handlers[sockets[i]] = old_write[sockets[i]];
294 } else {
295 resolver_state_->write_handlers[sockets[i]] =
296 std::tr1::shared_ptr<IOHandler> (
297 dispatcher_->CreateReadyHandler(sockets[i],
298 IOHandler::kModeOutput,
Paul Stewartf582b502012-04-04 21:39:22 -0700299 write_callback));
Paul Stewartc2350ee2011-10-19 12:28:40 -0700300 }
301 }
302 }
303
304 if (!running_) {
Paul Stewartbdb02e62012-02-22 16:24:33 -0800305 // We are here just to clean up socket handles, and the ARES state was
306 // cleaned up during the last call to ares_->ProcessFd().
Paul Stewartc2350ee2011-10-19 12:28:40 -0700307 return false;
308 }
309
310 // Schedule timer event for the earlier of our timeout or one requested by
311 // the resolver library.
312 struct timeval now, elapsed_time, timeout_tv;
Paul Stewarte6927402012-01-23 16:11:30 -0800313 time_->GetTimeMonotonic(&now);
Paul Stewartc2350ee2011-10-19 12:28:40 -0700314 timersub(&now, &resolver_state_->start_time_, &elapsed_time);
315 timeout_tv.tv_sec = timeout_ms_ / 1000;
316 timeout_tv.tv_usec = (timeout_ms_ % 1000) * 1000;
Paul Stewartf582b502012-04-04 21:39:22 -0700317 timeout_closure_.Cancel();
Paul Stewartbdb02e62012-02-22 16:24:33 -0800318
Paul Stewartc2350ee2011-10-19 12:28:40 -0700319 if (timercmp(&elapsed_time, &timeout_tv, >=)) {
320 // There are 3 cases of interest:
Paul Stewartbdb02e62012-02-22 16:24:33 -0800321 // - If we got here from Start(), when we return, Stop() will be
322 // called, so our cleanup task will not run, so we will not have the
323 // side-effect of both invoking the callback and returning False
324 // in Start().
325 // - If we got here from the tail of an IO event, we can't call
326 // Stop() since that will blow away the IOHandler we are running
327 // in. We will perform the cleanup in the posted task below.
328 // - If we got here from a timeout handler, we will perform cleanup
329 // in the posted task.
Paul Stewartc2350ee2011-10-19 12:28:40 -0700330 running_ = false;
Paul Stewartbdb02e62012-02-22 16:24:33 -0800331 error_.Populate(Error::kOperationTimeout, kErrorTimedOut);
Eric Shienbrood3e20a232012-02-16 11:35:56 -0500332 dispatcher_->PostTask(Bind(&DNSClient::HandleCompletion,
333 weak_ptr_factory_.GetWeakPtr()));
Paul Stewartc2350ee2011-10-19 12:28:40 -0700334 return false;
335 } else {
336 struct timeval max, ret_tv;
337 timersub(&timeout_tv, &elapsed_time, &max);
338 struct timeval *tv = ares_->Timeout(resolver_state_->channel,
339 &max, &ret_tv);
Paul Stewartf582b502012-04-04 21:39:22 -0700340 timeout_closure_.Reset(
341 Bind(&DNSClient::HandleTimeout, weak_ptr_factory_.GetWeakPtr()));
342 dispatcher_->PostDelayedTask(timeout_closure_.callback(),
343 tv->tv_sec * 1000 + tv->tv_usec / 1000);
Paul Stewartc2350ee2011-10-19 12:28:40 -0700344 }
345
346 return true;
347}
348
349} // namespace shill