| // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "net/base/dnsrr_resolver.h" |
| |
| #if defined(OS_POSIX) |
| #include <resolv.h> |
| #endif |
| |
| #if defined(OS_WIN) |
| #include <windns.h> |
| #endif |
| |
| #include "base/memory/scoped_ptr.h" |
| #include "base/memory/singleton.h" |
| #include "base/message_loop.h" |
| #include "base/stl_util-inl.h" |
| #include "base/string_piece.h" |
| #include "base/synchronization/lock.h" |
| #include "base/task.h" |
| #include "base/threading/worker_pool.h" |
| #include "net/base/dns_reload_timer.h" |
| #include "net/base/dns_util.h" |
| #include "net/base/net_errors.h" |
| |
| // Life of a query: |
| // |
| // DnsRRResolver RRResolverJob RRResolverWorker ... Handle |
| // | (origin loop) (worker loop) |
| // | |
| // Resolve() |
| // |---->-------------------<creates> |
| // | |
| // |---->----<creates> |
| // | |
| // |---->---------------------------------------------------<creates> |
| // | |
| // |---->--------------------Start |
| // | | |
| // | PostTask |
| // | |
| // | <starts resolving> |
| // |---->-----AddHandle | |
| // | |
| // | |
| // | |
| // Finish |
| // | |
| // PostTask |
| // |
| // | |
| // DoReply |
| // |----<-----------------------| |
| // HandleResult |
| // | |
| // |---->-----HandleResult |
| // | |
| // |------>-----------------------------------Post |
| // |
| // |
| // |
| // A cache hit: |
| // |
| // DnsRRResolver Handle |
| // | |
| // Resolve() |
| // |---->------------------------<creates> |
| // | |
| // | |
| // PostTask |
| // |
| // (MessageLoop cycles) |
| // |
| // Post |
| |
| namespace net { |
| |
| #if defined(OS_WIN) |
| // DnsRRIsParsedByWindows returns true if Windows knows how to parse the given |
| // RR type. RR data is returned in a DNS_RECORD structure which may be raw (if |
| // Windows doesn't parse it) or may be a parse result. It's unclear how this |
| // API is intended to evolve in the future. If Windows adds support for new RR |
| // types in a future version a client which expected raw data will break. |
| // See http://msdn.microsoft.com/en-us/library/ms682082(v=vs.85).aspx |
| static bool DnsRRIsParsedByWindows(uint16 rrtype) { |
| // We only cover the types which are defined in dns_util.h |
| switch (rrtype) { |
| case kDNS_CNAME: |
| case kDNS_TXT: |
| case kDNS_DS: |
| case kDNS_RRSIG: |
| case kDNS_DNSKEY: |
| return true; |
| default: |
| return false; |
| } |
| } |
| #endif |
| |
| static const uint16 kClassIN = 1; |
| // kMaxCacheEntries is the number of RRResponse objects that we'll cache. |
| static const unsigned kMaxCacheEntries = 32; |
| // kNegativeTTLSecs is the number of seconds for which we'll cache a negative |
| // cache entry. |
| static const unsigned kNegativeTTLSecs = 60; |
| |
| RRResponse::RRResponse() |
| : ttl(0), dnssec(false), negative(false) { |
| } |
| |
| RRResponse::~RRResponse() {} |
| |
| class RRResolverHandle { |
| public: |
| RRResolverHandle(CompletionCallback* callback, RRResponse* response) |
| : callback_(callback), |
| response_(response) { |
| } |
| |
| // Cancel ensures that the result callback will never be made. |
| void Cancel() { |
| callback_ = NULL; |
| response_ = NULL; |
| } |
| |
| // Post copies the contents of |response| to the caller's RRResponse and |
| // calls the callback. |
| void Post(int rv, const RRResponse* response) { |
| if (callback_) { |
| if (response_ && response) |
| *response_ = *response; |
| callback_->Run(rv); |
| } |
| delete this; |
| } |
| |
| private: |
| CompletionCallback* callback_; |
| RRResponse* response_; |
| }; |
| |
| |
| // RRResolverWorker runs on a worker thread and takes care of the blocking |
| // process of performing the DNS resolution. |
| class RRResolverWorker { |
| public: |
| RRResolverWorker(const std::string& name, uint16 rrtype, uint16 flags, |
| DnsRRResolver* dnsrr_resolver) |
| : name_(name), |
| rrtype_(rrtype), |
| flags_(flags), |
| origin_loop_(MessageLoop::current()), |
| dnsrr_resolver_(dnsrr_resolver), |
| canceled_(false), |
| result_(ERR_UNEXPECTED) { |
| } |
| |
| bool Start() { |
| DCHECK_EQ(MessageLoop::current(), origin_loop_); |
| |
| return base::WorkerPool::PostTask( |
| FROM_HERE, NewRunnableMethod(this, &RRResolverWorker::Run), |
| true /* task is slow */); |
| } |
| |
| // Cancel is called from the origin loop when the DnsRRResolver is getting |
| // deleted. |
| void Cancel() { |
| DCHECK_EQ(MessageLoop::current(), origin_loop_); |
| base::AutoLock locked(lock_); |
| canceled_ = true; |
| } |
| |
| private: |
| |
| #if defined(OS_POSIX) && !defined(ANDROID) |
| |
| void Run() { |
| // Runs on a worker thread. |
| |
| if (HandleTestCases()) { |
| Finish(); |
| return; |
| } |
| |
| bool r = true; |
| if ((_res.options & RES_INIT) == 0) { |
| if (res_ninit(&_res) != 0) |
| r = false; |
| } |
| |
| if (r) { |
| unsigned long saved_options = _res.options; |
| r = Do(); |
| |
| #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_OPENBSD) |
| if (!r && DnsReloadTimerHasExpired()) { |
| // When there's no network connection, _res may not be initialized by |
| // getaddrinfo. Therefore, we call res_nclose only when there are ns |
| // entries. |
| if (_res.nscount > 0) |
| res_nclose(&_res); |
| if (res_ninit(&_res) == 0) |
| r = Do(); |
| } |
| #endif |
| _res.options = saved_options; |
| } |
| |
| response_.fetch_time = base::Time::Now(); |
| |
| if (r) { |
| result_ = OK; |
| } else { |
| result_ = ERR_NAME_NOT_RESOLVED; |
| response_.negative = true; |
| response_.ttl = kNegativeTTLSecs; |
| } |
| |
| Finish(); |
| } |
| |
| bool Do() { |
| // For DNSSEC, a 4K buffer is suggested |
| static const unsigned kMaxDNSPayload = 4096; |
| |
| #ifndef RES_USE_DNSSEC |
| // Some versions of libresolv don't have support for the DO bit. In this |
| // case, we proceed without it. |
| static const int RES_USE_DNSSEC = 0; |
| #endif |
| |
| #ifndef RES_USE_EDNS0 |
| // Some versions of glibc are so old that they don't support EDNS0 either. |
| // http://code.google.com/p/chromium/issues/detail?id=51676 |
| static const int RES_USE_EDNS0 = 0; |
| #endif |
| |
| // We set the options explicitly. Note that this removes several default |
| // options: RES_DEFNAMES and RES_DNSRCH (see res_init(3)). |
| _res.options = RES_INIT | RES_RECURSE | RES_USE_EDNS0 | RES_USE_DNSSEC; |
| uint8 answer[kMaxDNSPayload]; |
| int len = res_search(name_.c_str(), kClassIN, rrtype_, answer, |
| sizeof(answer)); |
| if (len == -1) |
| return false; |
| |
| return response_.ParseFromResponse(answer, len, rrtype_); |
| } |
| |
| #elif defined(ANDROID) |
| |
| void Run() { |
| if (HandleTestCases()) { |
| Finish(); |
| return; |
| } |
| |
| response_.fetch_time = base::Time::Now(); |
| response_.negative = true; |
| result_ = ERR_NAME_NOT_RESOLVED; |
| Finish(); |
| } |
| |
| #else // OS_WIN |
| |
| void Run() { |
| if (HandleTestCases()) { |
| Finish(); |
| return; |
| } |
| |
| // See http://msdn.microsoft.com/en-us/library/ms682016(v=vs.85).aspx |
| PDNS_RECORD record = NULL; |
| DNS_STATUS status = |
| DnsQuery_A(name_.c_str(), rrtype_, DNS_QUERY_STANDARD, |
| NULL /* pExtra (reserved) */, &record, NULL /* pReserved */); |
| response_.fetch_time = base::Time::Now(); |
| response_.name = name_; |
| response_.dnssec = false; |
| response_.ttl = 0; |
| |
| if (status != 0) { |
| response_.negative = true; |
| result_ = ERR_NAME_NOT_RESOLVED; |
| } else { |
| response_.negative = false; |
| result_ = OK; |
| for (DNS_RECORD* cur = record; cur; cur = cur->pNext) { |
| if (cur->wType == rrtype_) { |
| response_.ttl = record->dwTtl; |
| // Windows will parse some types of resource records. If we want one |
| // of these types then we have to reserialise the record. |
| switch (rrtype_) { |
| case kDNS_TXT: { |
| // http://msdn.microsoft.com/en-us/library/ms682109(v=vs.85).aspx |
| const DNS_TXT_DATA* txt = &cur->Data.TXT; |
| std::string rrdata; |
| |
| for (DWORD i = 0; i < txt->dwStringCount; i++) { |
| // Although the string is typed as a PWSTR, it's actually just |
| // an ASCII byte-string. Also, the string must be < 256 |
| // elements because the length in the DNS packet is a single |
| // byte. |
| const char* s = reinterpret_cast<char*>(txt->pStringArray[i]); |
| size_t len = strlen(s); |
| DCHECK_LT(len, 256u); |
| char len8 = static_cast<char>(len); |
| rrdata.push_back(len8); |
| rrdata += s; |
| } |
| response_.rrdatas.push_back(rrdata); |
| break; |
| } |
| default: |
| if (DnsRRIsParsedByWindows(rrtype_)) { |
| // Windows parses this type, but we don't have code to unparse |
| // it. |
| NOTREACHED() << "you need to add code for the RR type here"; |
| response_.negative = true; |
| result_ = ERR_INVALID_ARGUMENT; |
| } else { |
| // This type is given to us raw. |
| response_.rrdatas.push_back( |
| std::string(reinterpret_cast<char*>(&cur->Data), |
| cur->wDataLength)); |
| } |
| } |
| } |
| } |
| } |
| |
| DnsRecordListFree(record, DnsFreeRecordList); |
| Finish(); |
| } |
| |
| #endif // OS_WIN |
| |
| // HandleTestCases stuffs in magic test values in the event that the query is |
| // from a unittest. |
| bool HandleTestCases() { |
| if (rrtype_ == kDNS_TESTING) { |
| response_.fetch_time = base::Time::Now(); |
| |
| if (name_ == "www.testing.notatld") { |
| response_.ttl = 86400; |
| response_.negative = false; |
| response_.rrdatas.push_back("goats!"); |
| result_ = OK; |
| return true; |
| } else if (name_ == "nx.testing.notatld") { |
| response_.negative = true; |
| result_ = ERR_NAME_NOT_RESOLVED; |
| return true; |
| } |
| } |
| |
| return false; |
| } |
| |
| // DoReply runs on the origin thread. |
| void DoReply() { |
| DCHECK_EQ(MessageLoop::current(), origin_loop_); |
| { |
| // We lock here because the worker thread could still be in Finished, |
| // after the PostTask, but before unlocking |lock_|. If we do not lock in |
| // this case, we will end up deleting a locked Lock, which can lead to |
| // memory leaks or worse errors. |
| base::AutoLock locked(lock_); |
| if (!canceled_) |
| dnsrr_resolver_->HandleResult(name_, rrtype_, result_, response_); |
| } |
| delete this; |
| } |
| |
| void Finish() { |
| // Runs on the worker thread. |
| // We assume that the origin loop outlives the DnsRRResolver. If the |
| // DnsRRResolver is deleted, it will call Cancel on us. If it does so |
| // before the Acquire, we'll delete ourselves and return. If it's trying to |
| // do so concurrently, then it'll block on the lock and we'll call PostTask |
| // while the DnsRRResolver (and therefore the MessageLoop) is still alive. |
| // If it does so after this function, we assume that the MessageLoop will |
| // process pending tasks. In which case we'll notice the |canceled_| flag |
| // in DoReply. |
| |
| bool canceled; |
| { |
| base::AutoLock locked(lock_); |
| canceled = canceled_; |
| if (!canceled) { |
| origin_loop_->PostTask( |
| FROM_HERE, NewRunnableMethod(this, &RRResolverWorker::DoReply)); |
| } |
| } |
| |
| if (canceled) |
| delete this; |
| } |
| |
| const std::string name_; |
| const uint16 rrtype_; |
| const uint16 flags_; |
| MessageLoop* const origin_loop_; |
| DnsRRResolver* const dnsrr_resolver_; |
| |
| base::Lock lock_; |
| bool canceled_; |
| |
| int result_; |
| RRResponse response_; |
| |
| DISALLOW_COPY_AND_ASSIGN(RRResolverWorker); |
| }; |
| |
| |
| // A Buffer is used for walking over a DNS packet. |
| class Buffer { |
| public: |
| Buffer(const uint8* p, unsigned len) |
| : p_(p), |
| packet_(p), |
| len_(len), |
| packet_len_(len) { |
| } |
| |
| bool U8(uint8* v) { |
| if (len_ < 1) |
| return false; |
| *v = *p_; |
| p_++; |
| len_--; |
| return true; |
| } |
| |
| bool U16(uint16* v) { |
| if (len_ < 2) |
| return false; |
| *v = static_cast<uint16>(p_[0]) << 8 | |
| static_cast<uint16>(p_[1]); |
| p_ += 2; |
| len_ -= 2; |
| return true; |
| } |
| |
| bool U32(uint32* v) { |
| if (len_ < 4) |
| return false; |
| *v = static_cast<uint32>(p_[0]) << 24 | |
| static_cast<uint32>(p_[1]) << 16 | |
| static_cast<uint32>(p_[2]) << 8 | |
| static_cast<uint32>(p_[3]); |
| p_ += 4; |
| len_ -= 4; |
| return true; |
| } |
| |
| bool Skip(unsigned n) { |
| if (len_ < n) |
| return false; |
| p_ += n; |
| len_ -= n; |
| return true; |
| } |
| |
| bool Block(base::StringPiece* out, unsigned len) { |
| if (len_ < len) |
| return false; |
| *out = base::StringPiece(reinterpret_cast<const char*>(p_), len); |
| p_ += len; |
| len_ -= len; |
| return true; |
| } |
| |
| // DNSName parses a (possibly compressed) DNS name from the packet. If |name| |
| // is not NULL, then the name is written into it. See RFC 1035 section 4.1.4. |
| bool DNSName(std::string* name) { |
| unsigned jumps = 0; |
| const uint8* p = p_; |
| unsigned len = len_; |
| |
| if (name) |
| name->clear(); |
| |
| for (;;) { |
| if (len < 1) |
| return false; |
| uint8 d = *p; |
| p++; |
| len--; |
| |
| // The two couple of bits of the length give the type of the length. It's |
| // either a direct length or a pointer to the remainder of the name. |
| if ((d & 0xc0) == 0xc0) { |
| // This limit matches the depth limit in djbdns. |
| if (jumps > 100) |
| return false; |
| if (len < 1) |
| return false; |
| uint16 offset = static_cast<uint16>(d) << 8 | |
| static_cast<uint16>(p[0]); |
| offset &= 0x3ff; |
| p++; |
| len--; |
| |
| if (jumps == 0) { |
| p_ = p; |
| len_ = len; |
| } |
| jumps++; |
| |
| if (offset >= packet_len_) |
| return false; |
| p = &packet_[offset]; |
| len = packet_len_ - offset; |
| } else if ((d & 0xc0) == 0) { |
| uint8 label_len = d; |
| if (len < label_len) |
| return false; |
| if (name && label_len) { |
| if (!name->empty()) |
| name->append("."); |
| name->append(reinterpret_cast<const char*>(p), label_len); |
| } |
| p += label_len; |
| len -= label_len; |
| |
| if (jumps == 0) { |
| p_ = p; |
| len_ = len; |
| } |
| |
| if (label_len == 0) |
| break; |
| } else { |
| return false; |
| } |
| } |
| |
| return true; |
| } |
| |
| private: |
| const uint8* p_; |
| const uint8* const packet_; |
| unsigned len_; |
| const unsigned packet_len_; |
| |
| DISALLOW_COPY_AND_ASSIGN(Buffer); |
| }; |
| |
| bool RRResponse::HasExpired(const base::Time current_time) const { |
| const base::TimeDelta delta(base::TimeDelta::FromSeconds(ttl)); |
| const base::Time expiry = fetch_time + delta; |
| return current_time >= expiry; |
| } |
| |
| bool RRResponse::ParseFromResponse(const uint8* p, unsigned len, |
| uint16 rrtype_requested) { |
| #if defined(OS_POSIX) && !defined(ANDROID) |
| name.clear(); |
| ttl = 0; |
| dnssec = false; |
| negative = false; |
| rrdatas.clear(); |
| signatures.clear(); |
| |
| // RFC 1035 section 4.4.1 |
| uint8 flags2; |
| Buffer buf(p, len); |
| if (!buf.Skip(2) || // skip id |
| !buf.Skip(1) || // skip first flags byte |
| !buf.U8(&flags2)) { |
| return false; |
| } |
| |
| // Bit 5 is the Authenticated Data (AD) bit. See |
| // http://tools.ietf.org/html/rfc2535#section-6.1 |
| if (flags2 & 32) { |
| // AD flag is set. We'll trust it if it came from a local nameserver. |
| // Currently the resolv structure is IPv4 only, so we can't test for IPv6 |
| // loopback addresses. |
| if (_res.nscount == 1 && |
| memcmp(&_res.nsaddr_list[0].sin_addr, |
| "\x7f\x00\x00\x01" /* 127.0.0.1 */, 4) == 0) { |
| dnssec = true; |
| } |
| } |
| |
| uint16 query_count, answer_count, authority_count, additional_count; |
| if (!buf.U16(&query_count) || |
| !buf.U16(&answer_count) || |
| !buf.U16(&authority_count) || |
| !buf.U16(&additional_count)) { |
| return false; |
| } |
| |
| if (query_count != 1) |
| return false; |
| |
| uint16 type, klass; |
| if (!buf.DNSName(NULL) || |
| !buf.U16(&type) || |
| !buf.U16(&klass) || |
| type != rrtype_requested || |
| klass != kClassIN) { |
| return false; |
| } |
| |
| if (answer_count < 1) |
| return false; |
| |
| for (uint32 i = 0; i < answer_count; i++) { |
| std::string* name = NULL; |
| if (i == 0) |
| name = &this->name; |
| uint32 ttl; |
| uint16 rrdata_len; |
| if (!buf.DNSName(name) || |
| !buf.U16(&type) || |
| !buf.U16(&klass) || |
| !buf.U32(&ttl) || |
| !buf.U16(&rrdata_len)) { |
| return false; |
| } |
| |
| base::StringPiece rrdata; |
| if (!buf.Block(&rrdata, rrdata_len)) |
| return false; |
| |
| if (klass == kClassIN && type == rrtype_requested) { |
| if (i == 0) |
| this->ttl = ttl; |
| rrdatas.push_back(std::string(rrdata.data(), rrdata.size())); |
| } else if (klass == kClassIN && type == kDNS_RRSIG) { |
| signatures.push_back(std::string(rrdata.data(), rrdata.size())); |
| } |
| } |
| #endif // defined(OS_POSIX) |
| |
| return true; |
| } |
| |
| |
| // An RRResolverJob is a one-to-one counterpart of an RRResolverWorker. It |
| // lives only on the DnsRRResolver's origin message loop. |
| class RRResolverJob { |
| public: |
| explicit RRResolverJob(RRResolverWorker* worker) |
| : worker_(worker) { |
| } |
| |
| ~RRResolverJob() { |
| if (worker_) { |
| worker_->Cancel(); |
| worker_ = NULL; |
| PostAll(ERR_ABORTED, NULL); |
| } |
| } |
| |
| void AddHandle(RRResolverHandle* handle) { |
| handles_.push_back(handle); |
| } |
| |
| void HandleResult(int result, const RRResponse& response) { |
| worker_ = NULL; |
| PostAll(result, &response); |
| } |
| |
| private: |
| void PostAll(int result, const RRResponse* response) { |
| std::vector<RRResolverHandle*> handles; |
| handles_.swap(handles); |
| |
| for (std::vector<RRResolverHandle*>::iterator |
| i = handles.begin(); i != handles.end(); i++) { |
| (*i)->Post(result, response); |
| // Post() causes the RRResolverHandle to delete itself. |
| } |
| } |
| |
| std::vector<RRResolverHandle*> handles_; |
| RRResolverWorker* worker_; |
| }; |
| |
| |
| DnsRRResolver::DnsRRResolver() |
| : requests_(0), |
| cache_hits_(0), |
| inflight_joins_(0), |
| in_destructor_(false) { |
| } |
| |
| DnsRRResolver::~DnsRRResolver() { |
| DCHECK(!in_destructor_); |
| in_destructor_ = true; |
| STLDeleteValues(&inflight_); |
| } |
| |
| intptr_t DnsRRResolver::Resolve(const std::string& name, uint16 rrtype, |
| uint16 flags, CompletionCallback* callback, |
| RRResponse* response, |
| int priority /* ignored */, |
| const BoundNetLog& netlog /* ignored */) { |
| DCHECK(CalledOnValidThread()); |
| DCHECK(!in_destructor_); |
| |
| if (!callback || !response || name.empty()) |
| return kInvalidHandle; |
| |
| // Don't allow queries of type ANY |
| if (rrtype == kDNS_ANY) |
| return kInvalidHandle; |
| |
| requests_++; |
| |
| const std::pair<std::string, uint16> key(make_pair(name, rrtype)); |
| // First check the cache. |
| std::map<std::pair<std::string, uint16>, RRResponse>::iterator i; |
| i = cache_.find(key); |
| if (i != cache_.end()) { |
| if (!i->second.HasExpired(base::Time::Now())) { |
| int error; |
| if (i->second.negative) { |
| error = ERR_NAME_NOT_RESOLVED; |
| } else { |
| error = OK; |
| *response = i->second; |
| } |
| RRResolverHandle* handle = new RRResolverHandle( |
| callback, NULL /* no response pointer because we've already filled */ |
| /* it in */); |
| cache_hits_++; |
| // We need a typed NULL pointer in order to make the templates work out. |
| static const RRResponse* kNoResponse = NULL; |
| MessageLoop::current()->PostTask( |
| FROM_HERE, NewRunnableMethod(handle, &RRResolverHandle::Post, error, |
| kNoResponse)); |
| return reinterpret_cast<intptr_t>(handle); |
| } else { |
| // entry has expired. |
| cache_.erase(i); |
| } |
| } |
| |
| // No cache hit. See if a request is currently in flight. |
| RRResolverJob* job; |
| std::map<std::pair<std::string, uint16>, RRResolverJob*>::const_iterator j; |
| j = inflight_.find(key); |
| if (j != inflight_.end()) { |
| // The request is in flight already. We'll just attach our callback. |
| inflight_joins_++; |
| job = j->second; |
| } else { |
| // Need to make a new request. |
| RRResolverWorker* worker = new RRResolverWorker(name, rrtype, flags, this); |
| job = new RRResolverJob(worker); |
| inflight_.insert(make_pair(key, job)); |
| if (!worker->Start()) { |
| inflight_.erase(key); |
| delete job; |
| delete worker; |
| return kInvalidHandle; |
| } |
| } |
| |
| RRResolverHandle* handle = new RRResolverHandle(callback, response); |
| job->AddHandle(handle); |
| return reinterpret_cast<intptr_t>(handle); |
| } |
| |
| void DnsRRResolver::CancelResolve(intptr_t h) { |
| DCHECK(CalledOnValidThread()); |
| RRResolverHandle* handle = reinterpret_cast<RRResolverHandle*>(h); |
| handle->Cancel(); |
| } |
| |
| void DnsRRResolver::OnIPAddressChanged() { |
| DCHECK(CalledOnValidThread()); |
| DCHECK(!in_destructor_); |
| |
| std::map<std::pair<std::string, uint16>, RRResolverJob*> inflight; |
| inflight.swap(inflight_); |
| cache_.clear(); |
| |
| STLDeleteValues(&inflight); |
| } |
| |
| // HandleResult is called on the origin message loop. |
| void DnsRRResolver::HandleResult(const std::string& name, uint16 rrtype, |
| int result, const RRResponse& response) { |
| DCHECK(CalledOnValidThread()); |
| |
| const std::pair<std::string, uint16> key(std::make_pair(name, rrtype)); |
| |
| DCHECK_GE(kMaxCacheEntries, 1u); |
| DCHECK_LE(cache_.size(), kMaxCacheEntries); |
| if (cache_.size() == kMaxCacheEntries) { |
| // need to remove an element of the cache. |
| const base::Time current_time(base::Time::Now()); |
| std::map<std::pair<std::string, uint16>, RRResponse>::iterator i, cur; |
| for (i = cache_.begin(); i != cache_.end(); ) { |
| cur = i++; |
| if (cur->second.HasExpired(current_time)) |
| cache_.erase(cur); |
| } |
| } |
| if (cache_.size() == kMaxCacheEntries) { |
| // if we didn't clear out any expired entries, we just remove the first |
| // element. Crummy but simple. |
| cache_.erase(cache_.begin()); |
| } |
| |
| cache_.insert(std::make_pair(key, response)); |
| |
| std::map<std::pair<std::string, uint16>, RRResolverJob*>::iterator j; |
| j = inflight_.find(key); |
| if (j == inflight_.end()) { |
| NOTREACHED(); |
| return; |
| } |
| RRResolverJob* job = j->second; |
| inflight_.erase(j); |
| |
| job->HandleResult(result, response); |
| delete job; |
| } |
| |
| } // namespace net |
| |
| DISABLE_RUNNABLE_METHOD_REFCOUNT(net::RRResolverHandle); |
| DISABLE_RUNNABLE_METHOD_REFCOUNT(net::RRResolverWorker); |