| // Copyright 2012 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "net/dns/host_resolver_manager.h" |
| |
| #include <iterator> |
| #include <limits> |
| #include <string> |
| #include <tuple> |
| #include <utility> |
| #include <vector> |
| |
| #include "base/auto_reset.h" |
| #include "base/containers/contains.h" |
| #include "base/functional/bind.h" |
| #include "base/functional/callback_helpers.h" |
| #include "base/location.h" |
| #include "base/memory/raw_ptr.h" |
| #include "base/memory/ref_counted.h" |
| #include "base/numerics/safe_conversions.h" |
| #include "base/rand_util.h" |
| #include "base/ranges/algorithm.h" |
| #include "base/run_loop.h" |
| #include "base/strings/string_number_conversions.h" |
| #include "base/strings/string_util.h" |
| #include "base/strings/stringprintf.h" |
| #include "base/synchronization/condition_variable.h" |
| #include "base/synchronization/lock.h" |
| #include "base/task/sequenced_task_runner.h" |
| #include "base/task/single_thread_task_runner.h" |
| #include "base/task/thread_pool/thread_pool_instance.h" |
| #include "base/test/bind.h" |
| #include "base/test/metrics/histogram_tester.h" |
| #include "base/test/mock_callback.h" |
| #include "base/test/scoped_feature_list.h" |
| #include "base/test/simple_test_clock.h" |
| #include "base/test/test_mock_time_task_runner.h" |
| #include "base/test/test_timeouts.h" |
| #include "base/threading/thread_restrictions.h" |
| #include "base/time/time.h" |
| #include "base/timer/mock_timer.h" |
| #include "base/values.h" |
| #include "build/build_config.h" |
| #include "net/base/address_family.h" |
| #include "net/base/address_list.h" |
| #include "net/base/connection_endpoint_metadata_test_util.h" |
| #include "net/base/features.h" |
| #include "net/base/host_port_pair.h" |
| #include "net/base/ip_address.h" |
| #include "net/base/ip_endpoint.h" |
| #include "net/base/mock_network_change_notifier.h" |
| #include "net/base/net_errors.h" |
| #include "net/base/network_anonymization_key.h" |
| #include "net/base/schemeful_site.h" |
| #include "net/dns/dns_client.h" |
| #include "net/dns/dns_config.h" |
| #include "net/dns/dns_test_util.h" |
| #include "net/dns/dns_util.h" |
| #include "net/dns/host_resolver.h" |
| #include "net/dns/host_resolver_results_test_util.h" |
| #include "net/dns/host_resolver_system_task.h" |
| #include "net/dns/mock_host_resolver.h" |
| #include "net/dns/mock_mdns_client.h" |
| #include "net/dns/mock_mdns_socket_factory.h" |
| #include "net/dns/public/dns_config_overrides.h" |
| #include "net/dns/public/dns_over_https_config.h" |
| #include "net/dns/public/dns_protocol.h" |
| #include "net/dns/public/dns_query_type.h" |
| #include "net/dns/public/doh_provider_entry.h" |
| #include "net/dns/public/mdns_listener_update_type.h" |
| #include "net/dns/public/resolve_error_info.h" |
| #include "net/dns/public/secure_dns_mode.h" |
| #include "net/dns/public/secure_dns_policy.h" |
| #include "net/dns/resolve_context.h" |
| #include "net/dns/test_dns_config_service.h" |
| #include "net/log/net_log_event_type.h" |
| #include "net/log/net_log_source_type.h" |
| #include "net/log/net_log_with_source.h" |
| #include "net/log/test_net_log.h" |
| #include "net/log/test_net_log_util.h" |
| #include "net/proxy_resolution/configured_proxy_resolution_service.h" |
| #include "net/socket/next_proto.h" |
| #include "net/socket/socket_test_util.h" |
| #include "net/test/gtest_util.h" |
| #include "net/test/test_with_task_environment.h" |
| #include "net/url_request/url_request_context.h" |
| #include "net/url_request/url_request_context_builder.h" |
| #include "net/url_request/url_request_test_util.h" |
| #include "testing/gmock/include/gmock/gmock.h" |
| #include "testing/gtest/include/gtest/gtest.h" |
| #include "url/gurl.h" |
| #include "url/scheme_host_port.h" |
| #include "url/url_constants.h" |
| |
| #if BUILDFLAG(ENABLE_MDNS) |
| #include "net/dns/mdns_client_impl.h" |
| #endif // BUILDFLAG(ENABLE_MDNS) |
| |
| using net::test::IsError; |
| using net::test::IsOk; |
| using ::testing::_; |
| using ::testing::AllOf; |
| using ::testing::Between; |
| using ::testing::ByMove; |
| using ::testing::Eq; |
| using ::testing::IsEmpty; |
| using ::testing::Optional; |
| using ::testing::Pair; |
| using ::testing::Property; |
| using ::testing::Return; |
| using ::testing::UnorderedElementsAre; |
| |
| namespace net { |
| |
| namespace { |
| |
| const size_t kMaxJobs = 10u; |
| const size_t kMaxRetryAttempts = 4u; |
| |
| HostResolverSystemTask::Params DefaultParams( |
| scoped_refptr<HostResolverProc> resolver_proc) { |
| return HostResolverSystemTask::Params(std::move(resolver_proc), |
| kMaxRetryAttempts); |
| } |
| |
| // A HostResolverProc that pushes each host mapped into a list and allows |
| // waiting for a specific number of requests. Unlike RuleBasedHostResolverProc |
| // it never calls SystemHostResolverCall. By default resolves all hostnames to |
| // "127.0.0.1". After AddRule(), it resolves only names explicitly specified. |
| class MockHostResolverProc : public HostResolverProc { |
| public: |
| struct ResolveKey { |
| ResolveKey(const std::string& hostname, |
| AddressFamily address_family, |
| HostResolverFlags flags) |
| : hostname(hostname), address_family(address_family), flags(flags) {} |
| bool operator<(const ResolveKey& other) const { |
| return std::tie(address_family, hostname, flags) < |
| std::tie(other.address_family, other.hostname, other.flags); |
| } |
| std::string hostname; |
| AddressFamily address_family; |
| HostResolverFlags flags; |
| }; |
| |
| typedef std::vector<ResolveKey> CaptureList; |
| |
| MockHostResolverProc() |
| : HostResolverProc(nullptr), |
| requests_waiting_(&lock_), |
| slots_available_(&lock_) {} |
| |
| MockHostResolverProc(const MockHostResolverProc&) = delete; |
| MockHostResolverProc& operator=(const MockHostResolverProc&) = delete; |
| |
| // Waits until |count| calls to |Resolve| are blocked. Returns false when |
| // timed out. |
| bool WaitFor(unsigned count) { |
| base::AutoLock lock(lock_); |
| base::Time start_time = base::Time::Now(); |
| while (num_requests_waiting_ < count) { |
| requests_waiting_.TimedWait(TestTimeouts::action_timeout()); |
| if (base::Time::Now() > start_time + TestTimeouts::action_timeout()) |
| return false; |
| } |
| return true; |
| } |
| |
| // Signals |count| waiting calls to |Resolve|. First come first served. |
| void SignalMultiple(unsigned count) { |
| base::AutoLock lock(lock_); |
| num_slots_available_ += count; |
| slots_available_.Broadcast(); |
| } |
| |
| // Signals all waiting calls to |Resolve|. Beware of races. |
| void SignalAll() { |
| base::AutoLock lock(lock_); |
| num_slots_available_ = num_requests_waiting_; |
| slots_available_.Broadcast(); |
| } |
| |
| void AddRule(const std::string& hostname, |
| AddressFamily family, |
| const AddressList& result, |
| HostResolverFlags flags = 0) { |
| base::AutoLock lock(lock_); |
| rules_[ResolveKey(hostname, family, flags)] = result; |
| } |
| |
| void AddRule(const std::string& hostname, |
| AddressFamily family, |
| const std::string& ip_list, |
| HostResolverFlags flags = 0, |
| const std::string& canonical_name = "") { |
| AddressList result; |
| std::vector<std::string> dns_aliases; |
| if (canonical_name != "") |
| dns_aliases = {canonical_name}; |
| int rv = ParseAddressList(ip_list, &result.endpoints()); |
| result.SetDnsAliases(dns_aliases); |
| DCHECK_EQ(OK, rv); |
| AddRule(hostname, family, result, flags); |
| } |
| |
| void AddRuleForAllFamilies(const std::string& hostname, |
| const std::string& ip_list, |
| HostResolverFlags flags = 0, |
| const std::string& canonical_name = "") { |
| AddressList result; |
| std::vector<std::string> dns_aliases; |
| if (canonical_name != "") |
| dns_aliases = {canonical_name}; |
| int rv = ParseAddressList(ip_list, &result.endpoints()); |
| result.SetDnsAliases(dns_aliases); |
| DCHECK_EQ(OK, rv); |
| AddRule(hostname, ADDRESS_FAMILY_UNSPECIFIED, result, flags); |
| AddRule(hostname, ADDRESS_FAMILY_IPV4, result, flags); |
| AddRule(hostname, ADDRESS_FAMILY_IPV6, result, flags); |
| } |
| |
| int Resolve(const std::string& hostname, |
| AddressFamily address_family, |
| HostResolverFlags host_resolver_flags, |
| AddressList* addrlist, |
| int* os_error) override { |
| base::AutoLock lock(lock_); |
| capture_list_.emplace_back(hostname, address_family, host_resolver_flags); |
| ++num_requests_waiting_; |
| requests_waiting_.Broadcast(); |
| { |
| base::ScopedAllowBaseSyncPrimitivesForTesting |
| scoped_allow_base_sync_primitives; |
| while (!num_slots_available_) |
| slots_available_.Wait(); |
| } |
| DCHECK_GT(num_requests_waiting_, 0u); |
| --num_slots_available_; |
| --num_requests_waiting_; |
| if (rules_.empty()) { |
| int rv = ParseAddressList("127.0.0.1", &addrlist->endpoints()); |
| DCHECK_EQ(OK, rv); |
| return OK; |
| } |
| ResolveKey key(hostname, address_family, host_resolver_flags); |
| if (rules_.count(key) == 0) |
| return ERR_NAME_NOT_RESOLVED; |
| *addrlist = rules_[key]; |
| return OK; |
| } |
| |
| CaptureList GetCaptureList() const { |
| CaptureList copy; |
| { |
| base::AutoLock lock(lock_); |
| copy = capture_list_; |
| } |
| return copy; |
| } |
| |
| void ClearCaptureList() { |
| base::AutoLock lock(lock_); |
| capture_list_.clear(); |
| } |
| |
| bool HasBlockedRequests() const { |
| base::AutoLock lock(lock_); |
| return num_requests_waiting_ > num_slots_available_; |
| } |
| |
| protected: |
| ~MockHostResolverProc() override = default; |
| |
| private: |
| mutable base::Lock lock_; |
| std::map<ResolveKey, AddressList> rules_; |
| CaptureList capture_list_; |
| unsigned num_requests_waiting_ = 0; |
| unsigned num_slots_available_ = 0; |
| base::ConditionVariable requests_waiting_; |
| base::ConditionVariable slots_available_; |
| }; |
| |
| class ResolveHostResponseHelper { |
| public: |
| using Callback = |
| base::OnceCallback<void(CompletionOnceCallback completion_callback, |
| int error)>; |
| |
| ResolveHostResponseHelper() = default; |
| explicit ResolveHostResponseHelper( |
| std::unique_ptr<HostResolver::ResolveHostRequest> request) |
| : request_(std::move(request)) { |
| top_level_result_error_ = request_->Start(base::BindOnce( |
| &ResolveHostResponseHelper::OnComplete, base::Unretained(this))); |
| } |
| ResolveHostResponseHelper( |
| std::unique_ptr<HostResolver::ResolveHostRequest> request, |
| Callback custom_callback) |
| : request_(std::move(request)) { |
| top_level_result_error_ = request_->Start( |
| base::BindOnce(std::move(custom_callback), |
| base::BindOnce(&ResolveHostResponseHelper::OnComplete, |
| base::Unretained(this)))); |
| } |
| |
| ResolveHostResponseHelper(const ResolveHostResponseHelper&) = delete; |
| ResolveHostResponseHelper& operator=(const ResolveHostResponseHelper&) = |
| delete; |
| |
| bool complete() const { return top_level_result_error_ != ERR_IO_PENDING; } |
| |
| int top_level_result_error() { |
| WaitForCompletion(); |
| return top_level_result_error_; |
| } |
| |
| int result_error() { |
| WaitForCompletion(); |
| return request_->GetResolveErrorInfo().error; |
| } |
| |
| HostResolver::ResolveHostRequest* request() { return request_.get(); } |
| |
| void CancelRequest() { |
| DCHECK(request_); |
| DCHECK(!complete()); |
| |
| request_ = nullptr; |
| } |
| |
| void OnComplete(int error) { |
| DCHECK(!complete()); |
| top_level_result_error_ = error; |
| |
| run_loop_.Quit(); |
| } |
| |
| private: |
| void WaitForCompletion() { |
| DCHECK(request_); |
| if (complete()) { |
| return; |
| } |
| run_loop_.Run(); |
| DCHECK(complete()); |
| } |
| |
| std::unique_ptr<HostResolver::ResolveHostRequest> request_; |
| int top_level_result_error_ = ERR_IO_PENDING; |
| base::RunLoop run_loop_; |
| }; |
| |
| // Using LookupAttemptHostResolverProc simulate very long lookups, and control |
| // which attempt resolves the host. |
| class LookupAttemptHostResolverProc : public HostResolverProc { |
| public: |
| LookupAttemptHostResolverProc(HostResolverProc* previous, |
| int attempt_number_to_resolve, |
| int total_attempts) |
| : HostResolverProc(previous), |
| attempt_number_to_resolve_(attempt_number_to_resolve), |
| total_attempts_(total_attempts), |
| all_done_(&lock_), |
| blocked_attempt_signal_(&lock_) {} |
| |
| // Test harness will wait for all attempts to finish before checking the |
| // results. |
| void WaitForAllAttemptsToFinish() { |
| base::AutoLock auto_lock(lock_); |
| while (total_attempts_resolved_ != total_attempts_) { |
| all_done_.Wait(); |
| } |
| } |
| |
| void WaitForNAttemptsToBeBlocked(int n) { |
| base::AutoLock auto_lock(lock_); |
| while (num_attempts_waiting_ < n) { |
| blocked_attempt_signal_.Wait(); |
| } |
| } |
| |
| // All attempts will wait for an attempt to resolve the host. |
| void WaitForAnAttemptToComplete() { |
| { |
| base::AutoLock auto_lock(lock_); |
| base::ScopedAllowBaseSyncPrimitivesForTesting |
| scoped_allow_base_sync_primitives; |
| while (resolved_attempt_number_ == 0) |
| all_done_.Wait(); |
| } |
| all_done_.Broadcast(); // Tell all waiting attempts to proceed. |
| } |
| |
| // Returns the number of attempts that have finished the Resolve() method. |
| int GetTotalAttemptsResolved() { |
| base::AutoLock auto_lock(lock_); |
| return total_attempts_resolved_; |
| } |
| |
| // Sets the resolved attempt number and unblocks waiting |
| // attempts. |
| void SetResolvedAttemptNumber(int n) { |
| base::AutoLock auto_lock(lock_); |
| EXPECT_EQ(0, resolved_attempt_number_); |
| resolved_attempt_number_ = n; |
| all_done_.Broadcast(); |
| } |
| |
| // HostResolverProc methods. |
| int Resolve(const std::string& host, |
| AddressFamily address_family, |
| HostResolverFlags host_resolver_flags, |
| AddressList* addrlist, |
| int* os_error) override { |
| bool wait_for_right_attempt_to_complete = true; |
| { |
| base::AutoLock auto_lock(lock_); |
| ++current_attempt_number_; |
| ++num_attempts_waiting_; |
| if (current_attempt_number_ == attempt_number_to_resolve_) { |
| resolved_attempt_number_ = current_attempt_number_; |
| wait_for_right_attempt_to_complete = false; |
| } |
| } |
| |
| blocked_attempt_signal_.Broadcast(); |
| |
| if (wait_for_right_attempt_to_complete) |
| // Wait for the attempt_number_to_resolve_ attempt to resolve. |
| WaitForAnAttemptToComplete(); |
| |
| int result = ResolveUsingPrevious(host, address_family, host_resolver_flags, |
| addrlist, os_error); |
| |
| { |
| base::AutoLock auto_lock(lock_); |
| ++total_attempts_resolved_; |
| --num_attempts_waiting_; |
| } |
| |
| all_done_.Broadcast(); // Tell all attempts to proceed. |
| |
| // Since any negative number is considered a network error, with -1 having |
| // special meaning (ERR_IO_PENDING). We could return the attempt that has |
| // resolved the host as a negative number. For example, if attempt number 3 |
| // resolves the host, then this method returns -4. |
| if (result == OK) |
| return -1 - resolved_attempt_number_; |
| else |
| return result; |
| } |
| |
| protected: |
| ~LookupAttemptHostResolverProc() override = default; |
| |
| private: |
| int attempt_number_to_resolve_; |
| int current_attempt_number_ = 0; // Incremented whenever Resolve is called. |
| int total_attempts_; |
| int total_attempts_resolved_ = 0; |
| int resolved_attempt_number_ = 0; |
| int num_attempts_waiting_ = 0; |
| |
| // All attempts wait for right attempt to be resolve. |
| base::Lock lock_; |
| base::ConditionVariable all_done_; |
| base::ConditionVariable blocked_attempt_signal_; |
| }; |
| |
| // TestHostResolverManager's sole purpose is to mock the IPv6 reachability test. |
| // By default, this pretends that IPv6 is globally reachable. |
| // This class is necessary so unit tests run the same on dual-stack machines as |
| // well as IPv4 only machines. |
| class TestHostResolverManager : public HostResolverManager { |
| public: |
| TestHostResolverManager(const HostResolver::ManagerOptions& options, |
| SystemDnsConfigChangeNotifier* notifier, |
| NetLog* net_log, |
| bool ipv6_reachable = true, |
| bool ipv4_reachable = true, |
| bool is_async = false) |
| : HostResolverManager(options, notifier, net_log), |
| ipv6_reachable_(ipv6_reachable), |
| ipv4_reachable_(ipv4_reachable), |
| is_async_(is_async) {} |
| |
| ~TestHostResolverManager() override = default; |
| |
| private: |
| const bool ipv6_reachable_; |
| const bool ipv4_reachable_; |
| const bool is_async_; |
| |
| int StartGloballyReachableCheck(const IPAddress& dest, |
| const NetLogWithSource& net_log, |
| CompletionOnceCallback callback) override { |
| int rv = OK; |
| if (dest.IsIPv6()) { |
| rv = ipv6_reachable_ ? OK : ERR_FAILED; |
| } else { |
| rv = ipv4_reachable_ ? OK : ERR_FAILED; |
| } |
| if (is_async_) { |
| base::SingleThreadTaskRunner::GetCurrentDefault()->PostTask( |
| FROM_HERE, base::BindOnce(std::move(callback), rv)); |
| return ERR_IO_PENDING; |
| } |
| return rv; |
| } |
| }; |
| |
| bool HasAddress(const IPAddress& search_address, |
| const std::vector<IPEndPoint>& addresses) { |
| for (const auto& address : addresses) { |
| if (search_address == address.address()) |
| return true; |
| } |
| return false; |
| } |
| |
| void TestBothLoopbackIPs(const std::string& host) { |
| std::vector<IPEndPoint> addresses; |
| EXPECT_TRUE(ResolveLocalHostname(host, &addresses)); |
| EXPECT_EQ(2u, addresses.size()); |
| EXPECT_TRUE(HasAddress(IPAddress::IPv4Localhost(), addresses)); |
| EXPECT_TRUE(HasAddress(IPAddress::IPv6Localhost(), addresses)); |
| } |
| |
| // Returns the DoH provider entry in `DohProviderEntry::GetList()` that matches |
| // `provider`. Crashes if there is no matching entry. |
| const DohProviderEntry& GetDohProviderEntryForTesting( |
| base::StringPiece provider) { |
| auto provider_list = DohProviderEntry::GetList(); |
| auto it = |
| base::ranges::find(provider_list, provider, &DohProviderEntry::provider); |
| CHECK(it != provider_list.end()); |
| return **it; |
| } |
| |
| } // namespace |
| |
| class HostResolverManagerTest : public TestWithTaskEnvironment { |
| public: |
| static const int kDefaultPort = 80; |
| |
| explicit HostResolverManagerTest( |
| base::test::TaskEnvironment::TimeSource time_source = |
| base::test::TaskEnvironment::TimeSource::SYSTEM_TIME) |
| : TestWithTaskEnvironment(time_source), |
| proc_(base::MakeRefCounted<MockHostResolverProc>()) {} |
| |
| void CreateResolver(bool check_ipv6_on_wifi = true) { |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| true /* ipv6_reachable */, |
| check_ipv6_on_wifi); |
| } |
| |
| void DestroyResolver() { |
| if (!resolver_) |
| return; |
| |
| resolver_->DeregisterResolveContext(resolve_context_.get()); |
| resolver_ = nullptr; |
| } |
| |
| // This HostResolverManager will only allow 1 outstanding resolve at a time |
| // and perform no retries. |
| void CreateSerialResolver(bool check_ipv6_on_wifi = true, |
| bool ipv6_reachable = true, |
| bool is_async = false) { |
| HostResolverSystemTask::Params params = DefaultParams(proc_); |
| params.max_retry_attempts = 0u; |
| CreateResolverWithLimitsAndParams(1u, params, ipv6_reachable, |
| check_ipv6_on_wifi, is_async); |
| } |
| |
| void StaleAllowedFromIpTest(bool is_async); |
| void LocalOnlyFromIpTest(bool is_async); |
| void ChangePriorityTest(bool is_async); |
| void AbortOnlyExistingRequestsOnIPAddressChangeTest(bool is_async); |
| void FlushCacheOnIPAddressChangeTest(bool is_async); |
| void AbortOnIPAddressChangedTest(bool is_async); |
| void NumericIPv6AddressTest(bool is_async); |
| void NumericIPv6AddressWithSchemeTest(bool is_async); |
| void LocalhostIPV4IPV6LookupTest(bool is_async); |
| void IPv4AddressLiteralInIPv6OnlyNetworkTest(bool is_async); |
| void IPv4AddressLiteralInIPv6OnlyNetworkPort443Test(bool is_async); |
| void IPv4AddressLiteralInIPv6OnlyNetworkNoDns64Test(bool is_async); |
| void IPv4AddressLiteralInIPv6OnlyNetworkBadAddressTest(bool is_async); |
| |
| protected: |
| // testing::Test implementation: |
| void SetUp() override { |
| request_context_ = CreateTestURLRequestContextBuilder()->Build(); |
| resolve_context_ = std::make_unique<ResolveContext>( |
| request_context_.get(), true /* enable_caching */); |
| CreateResolver(); |
| } |
| |
| void TearDown() override { |
| if (resolver_) { |
| EXPECT_EQ(0u, resolver_->num_running_dispatcher_jobs_for_tests()); |
| } |
| DestroyResolver(); |
| EXPECT_FALSE(proc_->HasBlockedRequests()); |
| } |
| |
| void CreateResolverWithLimitsAndParams( |
| size_t max_concurrent_resolves, |
| const HostResolverSystemTask::Params& params, |
| bool ipv6_reachable, |
| bool check_ipv6_on_wifi, |
| bool is_async = false) { |
| HostResolver::ManagerOptions options = DefaultOptions(); |
| options.max_concurrent_resolves = max_concurrent_resolves; |
| options.check_ipv6_on_wifi = check_ipv6_on_wifi; |
| |
| CreateResolverWithOptionsAndParams(std::move(options), params, |
| ipv6_reachable, is_async); |
| } |
| |
| virtual HostResolver::ManagerOptions DefaultOptions() { |
| HostResolver::ManagerOptions options; |
| options.max_concurrent_resolves = kMaxJobs; |
| options.max_system_retry_attempts = kMaxRetryAttempts; |
| return options; |
| } |
| |
| virtual void CreateResolverWithOptionsAndParams( |
| HostResolver::ManagerOptions options, |
| const HostResolverSystemTask::Params& params, |
| bool ipv6_reachable, |
| bool is_async = false, |
| bool ipv4_reachable = true) { |
| // Use HostResolverManagerDnsTest if enabling DNS client. |
| DCHECK(!options.insecure_dns_client_enabled); |
| |
| DestroyResolver(); |
| |
| resolver_ = std::make_unique<TestHostResolverManager>( |
| options, nullptr /* notifier */, nullptr /* net_log */, ipv6_reachable, |
| ipv4_reachable, is_async); |
| resolver_->set_host_resolver_system_params_for_test(params); |
| resolver_->RegisterResolveContext(resolve_context_.get()); |
| } |
| |
| // Friendship is not inherited, so use proxies to access those. |
| size_t num_running_dispatcher_jobs() const { |
| DCHECK(resolver_.get()); |
| return resolver_->num_running_dispatcher_jobs_for_tests(); |
| } |
| |
| void set_allow_fallback_to_systemtask(bool allow_fallback_to_systemtask) { |
| DCHECK(resolver_.get()); |
| resolver_->allow_fallback_to_systemtask_ = allow_fallback_to_systemtask; |
| } |
| |
| static unsigned maximum_insecure_dns_task_failures() { |
| return DnsClient::kMaxInsecureFallbackFailures; |
| } |
| |
| int StartIPv6ReachabilityCheck(const NetLogWithSource& net_log, |
| CompletionOnceCallback callback) { |
| return resolver_->StartIPv6ReachabilityCheck(net_log, std::move(callback)); |
| } |
| |
| bool GetLastIpv6ProbeResult() { return resolver_->last_ipv6_probe_result_; } |
| |
| void PopulateCache(const HostCache::Key& key, IPEndPoint endpoint) { |
| resolver_->CacheResult(resolve_context_->host_cache(), key, |
| HostCache::Entry(OK, {endpoint}, /*aliases=*/{}, |
| HostCache::Entry::SOURCE_UNKNOWN), |
| base::Seconds(1)); |
| } |
| |
| const std::pair<const HostCache::Key, HostCache::Entry>* GetCacheHit( |
| const HostCache::Key& key) { |
| DCHECK(resolve_context_->host_cache()); |
| return resolve_context_->host_cache()->LookupStale( |
| key, base::TimeTicks(), nullptr, false /* ignore_secure */); |
| } |
| |
| void MakeCacheStale() { |
| DCHECK(resolve_context_->host_cache()); |
| resolve_context_->host_cache()->Invalidate(); |
| } |
| |
| IPEndPoint CreateExpected(const std::string& ip_literal, uint16_t port) { |
| IPAddress ip; |
| bool result = ip.AssignFromIPLiteral(ip_literal); |
| DCHECK(result); |
| return IPEndPoint(ip, port); |
| } |
| |
| scoped_refptr<MockHostResolverProc> proc_; |
| std::unique_ptr<HostResolverManager> resolver_; |
| std::unique_ptr<URLRequestContext> request_context_; |
| std::unique_ptr<ResolveContext> resolve_context_; |
| }; |
| |
| TEST_F(HostResolverManagerTest, AsynchronousLookup) { |
| proc_->AddRuleForAllFamilies("just.testing", "192.168.1.42"); |
| proc_->SignalMultiple(1u); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.top_level_result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80))); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80)))))); |
| EXPECT_FALSE(response.request()->GetStaleInfo()); |
| |
| EXPECT_EQ("just.testing", proc_->GetCaptureList()[0].hostname); |
| |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result = |
| GetCacheHit(HostCache::Key("just.testing", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, |
| NetworkAnonymizationKey())); |
| EXPECT_TRUE(cache_result); |
| } |
| |
| // TODO(crbug.com/1206799): Confirm scheme behavior once it affects behavior. |
| TEST_F(HostResolverManagerTest, AsynchronousLookupWithScheme) { |
| proc_->AddRuleForAllFamilies("host.test", "192.168.1.42"); |
| proc_->SignalMultiple(1u); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpScheme, "host.test", 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.top_level_result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80))); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80)))))); |
| EXPECT_FALSE(response.request()->GetStaleInfo()); |
| |
| EXPECT_EQ("host.test", proc_->GetCaptureList()[0].hostname); |
| |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result = |
| GetCacheHit( |
| HostCache::Key(url::SchemeHostPort(url::kHttpScheme, "host.test", 80), |
| DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey())); |
| EXPECT_TRUE(cache_result); |
| } |
| |
| TEST_F(HostResolverManagerTest, JobsClearedOnCompletion) { |
| proc_->AddRuleForAllFamilies("just.testing", "192.168.1.42"); |
| proc_->SignalMultiple(1u); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_EQ(1u, resolver_->num_jobs_for_testing()); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_EQ(0u, resolver_->num_jobs_for_testing()); |
| } |
| |
| TEST_F(HostResolverManagerTest, JobsClearedOnCompletion_MultipleRequests) { |
| proc_->AddRuleForAllFamilies("just.testing", "192.168.1.42"); |
| proc_->SignalMultiple(1u); |
| |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper response2(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_EQ(1u, resolver_->num_jobs_for_testing()); |
| |
| EXPECT_THAT(response1.result_error(), IsOk()); |
| EXPECT_THAT(response2.result_error(), IsOk()); |
| EXPECT_EQ(0u, resolver_->num_jobs_for_testing()); |
| } |
| |
| TEST_F(HostResolverManagerTest, JobsClearedOnCompletion_Failure) { |
| proc_->AddRuleForAllFamilies(std::string(), |
| "0.0.0.1"); // Default to failures. |
| proc_->SignalMultiple(1u); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_EQ(1u, resolver_->num_jobs_for_testing()); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_EQ(0u, resolver_->num_jobs_for_testing()); |
| } |
| |
| TEST_F(HostResolverManagerTest, JobsClearedOnCompletion_Abort) { |
| proc_->AddRuleForAllFamilies("just.testing", "192.168.1.42"); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_EQ(1u, resolver_->num_jobs_for_testing()); |
| |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| proc_->SignalMultiple(1u); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_NETWORK_CHANGED)); |
| EXPECT_EQ(0u, resolver_->num_jobs_for_testing()); |
| } |
| |
| TEST_F(HostResolverManagerTest, DnsQueryType) { |
| proc_->AddRule("host", ADDRESS_FAMILY_IPV4, "192.168.1.20"); |
| proc_->AddRule("host", ADDRESS_FAMILY_IPV6, "::5"); |
| |
| HostResolver::ResolveHostParameters parameters; |
| |
| parameters.dns_query_type = DnsQueryType::A; |
| ResolveHostResponseHelper v4_response(resolver_->CreateRequest( |
| HostPortPair("host", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| |
| parameters.dns_query_type = DnsQueryType::AAAA; |
| ResolveHostResponseHelper v6_response(resolver_->CreateRequest( |
| HostPortPair("host", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| |
| proc_->SignalMultiple(2u); |
| |
| EXPECT_THAT(v4_response.result_error(), IsOk()); |
| EXPECT_THAT(v4_response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.20", 80))); |
| EXPECT_THAT(v4_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.20", 80)))))); |
| |
| EXPECT_THAT(v6_response.result_error(), IsOk()); |
| EXPECT_THAT(v6_response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("::5", 80))); |
| EXPECT_THAT(v6_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("::5", 80)))))); |
| } |
| |
| TEST_F(HostResolverManagerTest, DnsQueryWithoutAliases) { |
| proc_->AddRule("host", ADDRESS_FAMILY_IPV4, "192.168.1.20"); |
| |
| HostResolver::ResolveHostParameters parameters; |
| |
| parameters.dns_query_type = DnsQueryType::A; |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| |
| proc_->SignalMultiple(1u); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.20", 80))); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.20", 80)))))); |
| EXPECT_THAT(response.request()->GetDnsAliasResults(), |
| testing::Pointee(testing::IsEmpty())); |
| } |
| |
| void HostResolverManagerTest::LocalhostIPV4IPV6LookupTest(bool is_async) { |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| true /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */, is_async); |
| HostResolver::ResolveHostParameters parameters; |
| |
| parameters.dns_query_type = DnsQueryType::A; |
| ResolveHostResponseHelper v4_v4_response(resolver_->CreateRequest( |
| HostPortPair("localhost", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(v4_v4_response.result_error(), IsOk()); |
| EXPECT_THAT(v4_v4_response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80))); |
| EXPECT_THAT(v4_v4_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80)))))); |
| |
| parameters.dns_query_type = DnsQueryType::AAAA; |
| ResolveHostResponseHelper v4_v6_response(resolver_->CreateRequest( |
| HostPortPair("localhost", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(v4_v6_response.result_error(), IsOk()); |
| EXPECT_THAT(v4_v6_response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("::1", 80))); |
| EXPECT_THAT(v4_v6_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("::1", 80)))))); |
| |
| ResolveHostResponseHelper v4_unsp_response(resolver_->CreateRequest( |
| HostPortPair("localhost", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(v4_unsp_response.result_error(), IsOk()); |
| EXPECT_THAT(v4_unsp_response.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| v4_unsp_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| } |
| |
| TEST_F(HostResolverManagerTest, LocalhostIPV4IPV6LookupAsync) { |
| LocalhostIPV4IPV6LookupTest(true); |
| } |
| |
| TEST_F(HostResolverManagerTest, LocalhostIPV4IPV6LookupSync) { |
| LocalhostIPV4IPV6LookupTest(false); |
| } |
| |
| TEST_F(HostResolverManagerTest, ResolveIPLiteralWithHostResolverSystemOnly) { |
| const char kIpLiteral[] = "178.78.32.1"; |
| // Add a mapping to tell if the resolver proc was called (if it was called, |
| // then the result will be the remapped value. Otherwise it will be the IP |
| // literal). |
| proc_->AddRuleForAllFamilies(kIpLiteral, "183.45.32.1"); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.source = HostResolverSource::SYSTEM; |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair(kIpLiteral, 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| // IP literal resolution is expected to take precedence over source, so the |
| // result is expected to be the input IP, not the result IP from the proc rule |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected(kIpLiteral, 80))); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected(kIpLiteral, 80)))))); |
| EXPECT_FALSE(response.request()->GetStaleInfo()); |
| } |
| |
| TEST_F(HostResolverManagerTest, EmptyListMeansNameNotResolved) { |
| proc_->AddRuleForAllFamilies("just.testing", ""); |
| proc_->SignalMultiple(1u); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetStaleInfo()); |
| |
| EXPECT_EQ("just.testing", proc_->GetCaptureList()[0].hostname); |
| } |
| |
| TEST_F(HostResolverManagerTest, FailedAsynchronousLookup) { |
| proc_->AddRuleForAllFamilies(std::string(), |
| "0.0.0.1"); // Default to failures. |
| proc_->SignalMultiple(1u); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_THAT(response.top_level_result_error(), |
| IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetStaleInfo()); |
| |
| EXPECT_EQ("just.testing", proc_->GetCaptureList()[0].hostname); |
| |
| // Also test that the error is not cached. |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result = |
| GetCacheHit(HostCache::Key("just.testing", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, |
| NetworkAnonymizationKey())); |
| EXPECT_FALSE(cache_result); |
| } |
| |
| TEST_F(HostResolverManagerTest, AbortedAsynchronousLookup) { |
| ResolveHostResponseHelper response0(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ASSERT_FALSE(response0.complete()); |
| ASSERT_TRUE(proc_->WaitFor(1u)); |
| |
| // Resolver is destroyed while job is running on WorkerPool. |
| DestroyResolver(); |
| |
| proc_->SignalAll(); |
| |
| // To ensure there was no spurious callback, complete with a new resolver. |
| CreateResolver(); |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| proc_->SignalMultiple(2u); |
| |
| EXPECT_THAT(response1.result_error(), IsOk()); |
| |
| // This request was canceled. |
| EXPECT_FALSE(response0.complete()); |
| } |
| |
| TEST_F(HostResolverManagerTest, NumericIPv4Address) { |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("127.1.2.3", 5555), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("127.1.2.3", 5555))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::UnorderedElementsAre(CreateExpected("127.1.2.3", 5555)))))); |
| } |
| |
| TEST_F(HostResolverManagerTest, NumericIPv4AddressWithScheme) { |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, "127.1.2.3", 5555), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("127.1.2.3", 5555))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::UnorderedElementsAre(CreateExpected("127.1.2.3", 5555)))))); |
| } |
| |
| void HostResolverManagerTest::NumericIPv6AddressTest(bool is_async) { |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| true /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */, is_async); |
| // Resolve a plain IPv6 address. Don't worry about [brackets], because |
| // the caller should have removed them. |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("2001:db8::1", 5555), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("2001:db8::1", 5555))); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("2001:db8::1", 5555)))))); |
| } |
| |
| TEST_F(HostResolverManagerTest, NumericIPv6AddressAsync) { |
| NumericIPv6AddressTest(true); |
| } |
| |
| TEST_F(HostResolverManagerTest, NumericIPv6AddressSync) { |
| NumericIPv6AddressTest(false); |
| } |
| |
| void HostResolverManagerTest::NumericIPv6AddressWithSchemeTest(bool is_async) { |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| true /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */, is_async); |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kFtpScheme, "[2001:db8::1]", 5555), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("2001:db8::1", 5555))); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("2001:db8::1", 5555)))))); |
| } |
| |
| TEST_F(HostResolverManagerTest, NumericIPv6AddressWithSchemeAsync) { |
| NumericIPv6AddressWithSchemeTest(true); |
| } |
| |
| TEST_F(HostResolverManagerTest, NumericIPv6AddressWithSchemeSync) { |
| NumericIPv6AddressWithSchemeTest(false); |
| } |
| |
| // Regression test for https://crbug.com/1432508. |
| // |
| // Tests that if a new request is made while the loop within |
| // FinishIPv6ReachabilityCheck is still running, and the new request needs to |
| // wait on a new IPv6 probe to complete, the new request does not try to modify |
| // the same vector that FinishIPv6ReachabilityCheck is iterating over. |
| TEST_F(HostResolverManagerTest, AddRequestDuringFinishIPv6ReachabilityCheck) { |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| true /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */, true); |
| |
| // Reset `last_ipv6_probe_time_` if `reset_ipv6_probe_time` true so a new |
| // request kicks off a new reachability probe. |
| auto custom_callback_template = base::BindLambdaForTesting( |
| [&](bool reset_ipv6_probe_time, const HostPortPair& next_host, |
| std::unique_ptr<ResolveHostResponseHelper>* next_response, |
| CompletionOnceCallback completion_callback, int error) { |
| if (reset_ipv6_probe_time) { |
| resolver_->ResetIPv6ProbeTimeForTesting(); |
| } |
| *next_response = std::make_unique<ResolveHostResponseHelper>( |
| resolver_->CreateRequest(next_host, NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), |
| resolve_context_->host_cache())); |
| std::move(completion_callback).Run(error); |
| }); |
| |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> next_responses(3); |
| |
| ResolveHostResponseHelper response0( |
| resolver_->CreateRequest(HostPortPair("2001:db8::1", 5555), |
| NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()), |
| base::BindOnce(custom_callback_template, true, HostPortPair("zzz", 80), |
| &next_responses[0])); |
| |
| // New requests made by response1 and response2 will wait for a new |
| // reachability probe to complete. |
| ResolveHostResponseHelper response1( |
| resolver_->CreateRequest(HostPortPair("2001:db8::1", 5555), |
| NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()), |
| base::BindOnce(custom_callback_template, false, HostPortPair("aaa", 80), |
| &next_responses[1])); |
| |
| ResolveHostResponseHelper response2( |
| resolver_->CreateRequest(HostPortPair("2001:db8::1", 5555), |
| NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()), |
| base::BindOnce(custom_callback_template, false, HostPortPair("eee", 80), |
| &next_responses[2])); |
| |
| // Unblock all calls to proc. |
| proc_->SignalMultiple(6u); |
| |
| // All requests should return OK. |
| EXPECT_THAT(response0.result_error(), IsOk()); |
| EXPECT_THAT(response1.result_error(), IsOk()); |
| EXPECT_THAT(response2.result_error(), IsOk()); |
| EXPECT_THAT(next_responses[0]->result_error(), IsOk()); |
| EXPECT_THAT(next_responses[1]->result_error(), IsOk()); |
| EXPECT_THAT(next_responses[2]->result_error(), IsOk()); |
| } |
| |
| TEST_F(HostResolverManagerTest, EmptyHost) { |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair(std::string(), 5555), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| } |
| |
| TEST_F(HostResolverManagerTest, EmptyDotsHost) { |
| for (int i = 0; i < 16; ++i) { |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair(std::string(i, '.'), 5555), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| } |
| } |
| |
| TEST_F(HostResolverManagerTest, LongHost) { |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair(std::string(4097, 'a'), 5555), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| } |
| |
| TEST_F(HostResolverManagerTest, DeDupeRequests) { |
| // Start 5 requests, duplicating hosts "a" and "b". Since the resolver_proc is |
| // blocked, these should all pile up until we signal it. |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("a", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("b", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("b", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("a", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("b", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| |
| for (auto& response : responses) { |
| ASSERT_FALSE(response->complete()); |
| } |
| |
| proc_->SignalMultiple(2u); // One for "a:80", one for "b:80". |
| |
| for (auto& response : responses) { |
| EXPECT_THAT(response->result_error(), IsOk()); |
| } |
| } |
| |
| // TODO(crbug.com/1206799): Delete/adapt once requests with different ports are |
| // not deduped. |
| TEST_F(HostResolverManagerTest, DeDupeRequestsWithDifferentPorts) { |
| // Start 5 requests, duplicating hosts "a" and "b". Since the resolver_proc is |
| // blocked, these should all pile up until we signal it. |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("a", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("b", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("b", 81), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("a", 82), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("b", 83), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| |
| for (auto& response : responses) { |
| ASSERT_FALSE(response->complete()); |
| } |
| |
| proc_->SignalMultiple(2u); // One for "a", one for "b". |
| |
| for (auto& response : responses) { |
| EXPECT_THAT(response->result_error(), IsOk()); |
| } |
| } |
| |
| TEST_F(HostResolverManagerTest, CancelMultipleRequests) { |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("a", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("b", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("b", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("a", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("b", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| |
| for (auto& response : responses) { |
| ASSERT_FALSE(response->complete()); |
| } |
| |
| // Cancel everything except request for requests[3] ("a", 80). |
| responses[0]->CancelRequest(); |
| responses[1]->CancelRequest(); |
| responses[2]->CancelRequest(); |
| responses[4]->CancelRequest(); |
| |
| proc_->SignalMultiple(2u); // One for "a", one for "b". |
| |
| EXPECT_THAT(responses[3]->result_error(), IsOk()); |
| |
| EXPECT_FALSE(responses[0]->complete()); |
| EXPECT_FALSE(responses[1]->complete()); |
| EXPECT_FALSE(responses[2]->complete()); |
| EXPECT_FALSE(responses[4]->complete()); |
| } |
| |
| TEST_F(HostResolverManagerTest, CanceledRequestsReleaseJobSlots) { |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| |
| // Fill up the dispatcher and queue. |
| for (unsigned i = 0; i < kMaxJobs + 1; ++i) { |
| std::string hostname = "a_"; |
| hostname[1] = 'a' + i; |
| |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair(hostname, 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| ASSERT_FALSE(responses.back()->complete()); |
| |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair(hostname, 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| ASSERT_FALSE(responses.back()->complete()); |
| } |
| |
| ASSERT_TRUE(proc_->WaitFor(kMaxJobs)); |
| |
| // Cancel all but last two. |
| for (unsigned i = 0; i < responses.size() - 2; ++i) { |
| responses[i]->CancelRequest(); |
| } |
| |
| ASSERT_TRUE(proc_->WaitFor(kMaxJobs + 1)); |
| |
| proc_->SignalAll(); |
| |
| size_t num_requests = responses.size(); |
| EXPECT_THAT(responses[num_requests - 1]->result_error(), IsOk()); |
| EXPECT_THAT(responses[num_requests - 2]->result_error(), IsOk()); |
| for (unsigned i = 0; i < num_requests - 2; ++i) { |
| EXPECT_FALSE(responses[i]->complete()); |
| } |
| } |
| |
| TEST_F(HostResolverManagerTest, CancelWithinCallback) { |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| auto custom_callback = base::BindLambdaForTesting( |
| [&](CompletionOnceCallback completion_callback, int error) { |
| for (auto& response : responses) { |
| // Cancelling request is required to complete first, so that it can |
| // attempt to cancel the others. This test assumes all jobs are |
| // completed in order. |
| DCHECK(!response->complete()); |
| |
| response->CancelRequest(); |
| } |
| std::move(completion_callback).Run(error); |
| }); |
| |
| ResolveHostResponseHelper cancelling_response( |
| resolver_->CreateRequest(HostPortPair("a", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), |
| resolve_context_->host_cache()), |
| std::move(custom_callback)); |
| |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("a", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("a", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| |
| proc_->SignalMultiple(2u); // One for "a". One for "finalrequest". |
| |
| EXPECT_THAT(cancelling_response.result_error(), IsOk()); |
| |
| ResolveHostResponseHelper final_response(resolver_->CreateRequest( |
| HostPortPair("finalrequest", 70), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(final_response.result_error(), IsOk()); |
| |
| for (auto& response : responses) { |
| EXPECT_FALSE(response->complete()); |
| } |
| } |
| |
| TEST_F(HostResolverManagerTest, DeleteWithinCallback) { |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| auto custom_callback = base::BindLambdaForTesting( |
| [&](CompletionOnceCallback completion_callback, int error) { |
| for (auto& response : responses) { |
| // Deleting request is required to be first, so the other requests |
| // will still be running to be deleted. This test assumes that the |
| // Jobs will be Aborted in order and the requests in order within the |
| // jobs. |
| DCHECK(!response->complete()); |
| } |
| |
| DestroyResolver(); |
| std::move(completion_callback).Run(error); |
| }); |
| |
| ResolveHostResponseHelper deleting_response( |
| resolver_->CreateRequest(HostPortPair("a", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), |
| resolve_context_->host_cache()), |
| std::move(custom_callback)); |
| |
| // Start additional requests to be cancelled as part of the first's deletion. |
| // Assumes all requests for a job are handled in order so that the deleting |
| // request will run first and cancel the rest. |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("a", 81), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("a", 82), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| |
| proc_->SignalMultiple(3u); |
| |
| EXPECT_THAT(deleting_response.result_error(), IsOk()); |
| |
| base::RunLoop().RunUntilIdle(); |
| for (auto& response : responses) { |
| EXPECT_FALSE(response->complete()); |
| } |
| } |
| |
| TEST_F(HostResolverManagerTest, DeleteWithinAbortedCallback) { |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| ResolveHostResponseHelper::Callback custom_callback = |
| base::BindLambdaForTesting( |
| [&](CompletionOnceCallback completion_callback, int error) { |
| for (auto& response : responses) { |
| // Deleting request is required to be first, so the other requests |
| // will still be running to be deleted. This test assumes that the |
| // Jobs will be Aborted in order and the requests in order within |
| // the jobs. |
| DCHECK(!response->complete()); |
| } |
| DestroyResolver(); |
| std::move(completion_callback).Run(error); |
| }); |
| |
| ResolveHostResponseHelper deleting_response( |
| resolver_->CreateRequest(HostPortPair("a", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), |
| resolve_context_->host_cache()), |
| std::move(custom_callback)); |
| |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("a", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("b", 82), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("b", 82), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| |
| // Wait for all calls to queue up, trigger abort via IP address change, then |
| // signal all the queued requests to let them all try to finish. |
| EXPECT_TRUE(proc_->WaitFor(2u)); |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| proc_->SignalAll(); |
| |
| EXPECT_THAT(deleting_response.result_error(), IsError(ERR_NETWORK_CHANGED)); |
| base::RunLoop().RunUntilIdle(); |
| for (auto& response : responses) { |
| EXPECT_FALSE(response->complete()); |
| } |
| } |
| |
| TEST_F(HostResolverManagerTest, StartWithinCallback) { |
| std::unique_ptr<ResolveHostResponseHelper> new_response; |
| auto custom_callback = base::BindLambdaForTesting( |
| [&](CompletionOnceCallback completion_callback, int error) { |
| new_response = std::make_unique<ResolveHostResponseHelper>( |
| resolver_->CreateRequest( |
| HostPortPair("new", 70), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| std::move(completion_callback).Run(error); |
| }); |
| |
| ResolveHostResponseHelper starting_response( |
| resolver_->CreateRequest(HostPortPair("a", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), |
| resolve_context_->host_cache()), |
| std::move(custom_callback)); |
| |
| proc_->SignalMultiple(2u); // One for "a". One for "new". |
| |
| EXPECT_THAT(starting_response.result_error(), IsOk()); |
| EXPECT_THAT(new_response->result_error(), IsOk()); |
| } |
| |
| TEST_F(HostResolverManagerTest, StartWithinEvictionCallback) { |
| CreateSerialResolver(); |
| resolver_->SetMaxQueuedJobsForTesting(2); |
| |
| std::unique_ptr<ResolveHostResponseHelper> new_response; |
| auto custom_callback = base::BindLambdaForTesting( |
| [&](CompletionOnceCallback completion_callback, int error) { |
| new_response = std::make_unique<ResolveHostResponseHelper>( |
| resolver_->CreateRequest( |
| HostPortPair("new", 70), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| std::move(completion_callback).Run(error); |
| }); |
| |
| ResolveHostResponseHelper initial_response(resolver_->CreateRequest( |
| HostPortPair("initial", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper evictee1_response( |
| resolver_->CreateRequest(HostPortPair("evictee1", 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()), |
| std::move(custom_callback)); |
| ResolveHostResponseHelper evictee2_response(resolver_->CreateRequest( |
| HostPortPair("evictee2", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| // Now one running request ("initial") and two queued requests ("evictee1" and |
| // "evictee2"). Any further requests will cause evictions. |
| ResolveHostResponseHelper evictor_response(resolver_->CreateRequest( |
| HostPortPair("evictor", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(evictee1_response.result_error(), |
| IsError(ERR_HOST_RESOLVER_QUEUE_TOO_LARGE)); |
| |
| // "new" should evict "evictee2" |
| EXPECT_THAT(evictee2_response.result_error(), |
| IsError(ERR_HOST_RESOLVER_QUEUE_TOO_LARGE)); |
| |
| proc_->SignalMultiple(3u); |
| |
| EXPECT_THAT(initial_response.result_error(), IsOk()); |
| EXPECT_THAT(evictor_response.result_error(), IsOk()); |
| EXPECT_THAT(new_response->result_error(), IsOk()); |
| } |
| |
| // Test where we start a new request within an eviction callback that itself |
| // evicts the first evictor. |
| TEST_F(HostResolverManagerTest, StartWithinEvictionCallback_DoubleEviction) { |
| CreateSerialResolver(); |
| resolver_->SetMaxQueuedJobsForTesting(1); |
| |
| std::unique_ptr<ResolveHostResponseHelper> new_response; |
| auto custom_callback = base::BindLambdaForTesting( |
| [&](CompletionOnceCallback completion_callback, int error) { |
| new_response = std::make_unique<ResolveHostResponseHelper>( |
| resolver_->CreateRequest( |
| HostPortPair("new", 70), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| std::move(completion_callback).Run(error); |
| }); |
| |
| ResolveHostResponseHelper initial_response(resolver_->CreateRequest( |
| HostPortPair("initial", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper evictee_response( |
| resolver_->CreateRequest(HostPortPair("evictee", 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()), |
| std::move(custom_callback)); |
| |
| // Now one running request ("initial") and one queued requests ("evictee"). |
| // Any further requests will cause evictions. |
| ResolveHostResponseHelper evictor_response(resolver_->CreateRequest( |
| HostPortPair("evictor", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(evictee_response.result_error(), |
| IsError(ERR_HOST_RESOLVER_QUEUE_TOO_LARGE)); |
| |
| // "new" should evict "evictor" |
| EXPECT_THAT(evictor_response.result_error(), |
| IsError(ERR_HOST_RESOLVER_QUEUE_TOO_LARGE)); |
| |
| proc_->SignalMultiple(2u); |
| |
| EXPECT_THAT(initial_response.result_error(), IsOk()); |
| EXPECT_THAT(new_response->result_error(), IsOk()); |
| } |
| |
| TEST_F(HostResolverManagerTest, StartWithinEvictionCallback_SameRequest) { |
| CreateSerialResolver(); |
| resolver_->SetMaxQueuedJobsForTesting(2); |
| |
| std::unique_ptr<ResolveHostResponseHelper> new_response; |
| auto custom_callback = base::BindLambdaForTesting( |
| [&](CompletionOnceCallback completion_callback, int error) { |
| new_response = std::make_unique<ResolveHostResponseHelper>( |
| resolver_->CreateRequest( |
| HostPortPair("evictor", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| std::move(completion_callback).Run(error); |
| }); |
| |
| ResolveHostResponseHelper initial_response(resolver_->CreateRequest( |
| HostPortPair("initial", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper evictee_response( |
| resolver_->CreateRequest(HostPortPair("evictee", 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()), |
| std::move(custom_callback)); |
| ResolveHostResponseHelper additional_response(resolver_->CreateRequest( |
| HostPortPair("additional", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| // Now one running request ("initial") and two queued requests ("evictee" and |
| // "additional"). Any further requests will cause evictions. |
| ResolveHostResponseHelper evictor_response(resolver_->CreateRequest( |
| HostPortPair("evictor", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(evictee_response.result_error(), |
| IsError(ERR_HOST_RESOLVER_QUEUE_TOO_LARGE)); |
| |
| // Second "evictor" should be joined with the first and not evict "additional" |
| |
| // Only 3 proc requests because both "evictor" requests are combined. |
| proc_->SignalMultiple(3u); |
| |
| EXPECT_THAT(initial_response.result_error(), IsOk()); |
| EXPECT_THAT(additional_response.result_error(), IsOk()); |
| EXPECT_THAT(evictor_response.result_error(), IsOk()); |
| EXPECT_THAT(new_response->result_error(), IsOk()); |
| } |
| |
| TEST_F(HostResolverManagerTest, BypassCache) { |
| proc_->SignalMultiple(2u); |
| |
| ResolveHostResponseHelper initial_response(resolver_->CreateRequest( |
| HostPortPair("a", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(initial_response.result_error(), IsOk()); |
| EXPECT_EQ(1u, proc_->GetCaptureList().size()); |
| |
| ResolveHostResponseHelper cached_response(resolver_->CreateRequest( |
| HostPortPair("a", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(cached_response.result_error(), IsOk()); |
| // Expect no increase to calls to |proc_| because result was cached. |
| EXPECT_EQ(1u, proc_->GetCaptureList().size()); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.cache_usage = |
| HostResolver::ResolveHostParameters::CacheUsage::DISALLOWED; |
| ResolveHostResponseHelper cache_bypassed_response(resolver_->CreateRequest( |
| HostPortPair("a", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(cache_bypassed_response.result_error(), IsOk()); |
| // Expect call to |proc_| because cache was bypassed. |
| EXPECT_EQ(2u, proc_->GetCaptureList().size()); |
| } |
| |
| void HostResolverManagerTest::FlushCacheOnIPAddressChangeTest(bool is_async) { |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| true /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */, is_async); |
| proc_->SignalMultiple(2u); // One before the flush, one after. |
| |
| ResolveHostResponseHelper initial_response(resolver_->CreateRequest( |
| HostPortPair("host1", 70), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(initial_response.result_error(), IsOk()); |
| EXPECT_EQ(1u, proc_->GetCaptureList().size()); |
| |
| ResolveHostResponseHelper cached_response(resolver_->CreateRequest( |
| HostPortPair("host1", 75), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(cached_response.result_error(), IsOk()); |
| EXPECT_EQ(1u, proc_->GetCaptureList().size()); // No expected increase. |
| |
| // Flush cache by triggering an IP address change. |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| base::RunLoop().RunUntilIdle(); // Notification happens async. |
| |
| // Resolve "host1" again -- this time it won't be served from cache, so it |
| // will complete asynchronously. |
| ResolveHostResponseHelper flushed_response(resolver_->CreateRequest( |
| HostPortPair("host1", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(flushed_response.result_error(), IsOk()); |
| EXPECT_EQ(2u, proc_->GetCaptureList().size()); // Expected increase. |
| } |
| |
| // Test that IP address changes flush the cache but initial DNS config reads |
| // do not. |
| TEST_F(HostResolverManagerTest, FlushCacheOnIPAddressChangeAsync) { |
| FlushCacheOnIPAddressChangeTest(true); |
| } |
| TEST_F(HostResolverManagerTest, FlushCacheOnIPAddressChangeSync) { |
| FlushCacheOnIPAddressChangeTest(false); |
| } |
| |
| void HostResolverManagerTest::AbortOnIPAddressChangedTest(bool is_async) { |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| true /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */, is_async); |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host1", 70), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| |
| ASSERT_FALSE(response.complete()); |
| if (is_async) { |
| base::RunLoop().RunUntilIdle(); |
| } |
| ASSERT_TRUE(proc_->WaitFor(1u)); |
| |
| // Triggering an IP address change. |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| base::RunLoop().RunUntilIdle(); // Notification happens async. |
| proc_->SignalAll(); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_NETWORK_CHANGED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_EQ(0u, resolve_context_->host_cache()->size()); |
| } |
| |
| // Test that IP address changes send ERR_NETWORK_CHANGED to pending requests. |
| TEST_F(HostResolverManagerTest, AbortOnIPAddressChangedAsync) { |
| AbortOnIPAddressChangedTest(true); |
| } |
| TEST_F(HostResolverManagerTest, AbortOnIPAddressChangedSync) { |
| AbortOnIPAddressChangedTest(false); |
| } |
| |
| // Obey pool constraints after IP address has changed. |
| TEST_F(HostResolverManagerTest, ObeyPoolConstraintsAfterIPAddressChange) { |
| // Runs at most one job at a time. |
| CreateSerialResolver(); |
| |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("a", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("b", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("c", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| |
| for (auto& response : responses) { |
| ASSERT_FALSE(response->complete()); |
| } |
| ASSERT_TRUE(proc_->WaitFor(1u)); |
| |
| // Triggering an IP address change. |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| base::RunLoop().RunUntilIdle(); // Notification happens async. |
| proc_->SignalMultiple(3u); // Let the false-start go so that we can catch it. |
| |
| // Requests should complete one at a time, with the first failing. |
| EXPECT_THAT(responses[0]->result_error(), IsError(ERR_NETWORK_CHANGED)); |
| EXPECT_EQ(1u, num_running_dispatcher_jobs()); |
| EXPECT_FALSE(responses[1]->complete()); |
| EXPECT_FALSE(responses[2]->complete()); |
| |
| EXPECT_THAT(responses[1]->result_error(), IsOk()); |
| EXPECT_EQ(1u, num_running_dispatcher_jobs()); |
| EXPECT_FALSE(responses[2]->complete()); |
| |
| EXPECT_THAT(responses[2]->result_error(), IsOk()); |
| } |
| |
| void HostResolverManagerTest::AbortOnlyExistingRequestsOnIPAddressChangeTest( |
| bool is_async) { |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| true /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */, is_async); |
| auto custom_callback_template = base::BindLambdaForTesting( |
| [&](const HostPortPair& next_host, |
| std::unique_ptr<ResolveHostResponseHelper>* next_response, |
| CompletionOnceCallback completion_callback, int error) { |
| *next_response = std::make_unique<ResolveHostResponseHelper>( |
| resolver_->CreateRequest(next_host, NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), |
| resolve_context_->host_cache())); |
| std::move(completion_callback).Run(error); |
| }); |
| |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> next_responses(3); |
| |
| ResolveHostResponseHelper response0( |
| resolver_->CreateRequest(HostPortPair("bbb", 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()), |
| base::BindOnce(custom_callback_template, HostPortPair("zzz", 80), |
| &next_responses[0])); |
| |
| ResolveHostResponseHelper response1( |
| resolver_->CreateRequest(HostPortPair("eee", 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()), |
| base::BindOnce(custom_callback_template, HostPortPair("aaa", 80), |
| &next_responses[1])); |
| |
| ResolveHostResponseHelper response2( |
| resolver_->CreateRequest(HostPortPair("ccc", 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()), |
| base::BindOnce(custom_callback_template, HostPortPair("eee", 80), |
| &next_responses[2])); |
| |
| if (is_async) { |
| base::RunLoop().RunUntilIdle(); |
| } |
| // Wait until all are blocked; |
| ASSERT_TRUE(proc_->WaitFor(3u)); |
| |
| // Trigger an IP address change. |
| NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); |
| // This should abort all running jobs. |
| base::RunLoop().RunUntilIdle(); |
| |
| EXPECT_THAT(response0.result_error(), IsError(ERR_NETWORK_CHANGED)); |
| EXPECT_THAT(response1.result_error(), IsError(ERR_NETWORK_CHANGED)); |
| EXPECT_THAT(response2.result_error(), IsError(ERR_NETWORK_CHANGED)); |
| |
| EXPECT_FALSE(next_responses[0]->complete()); |
| EXPECT_FALSE(next_responses[1]->complete()); |
| EXPECT_FALSE(next_responses[2]->complete()); |
| |
| // Unblock all calls to proc. |
| proc_->SignalMultiple(6u); |
| |
| // Run until the re-started requests finish. |
| EXPECT_THAT(next_responses[0]->result_error(), IsOk()); |
| EXPECT_THAT(next_responses[1]->result_error(), IsOk()); |
| EXPECT_THAT(next_responses[2]->result_error(), IsOk()); |
| |
| // Verify that results of aborted Jobs were not cached. |
| EXPECT_EQ(6u, proc_->GetCaptureList().size()); |
| EXPECT_EQ(3u, resolve_context_->host_cache()->size()); |
| } |
| // Tests that a new Request made from the callback of a previously aborted one |
| // will not be aborted. |
| TEST_F(HostResolverManagerTest, |
| AbortOnlyExistingRequestsOnIPAddressChangeAsync) { |
| AbortOnlyExistingRequestsOnIPAddressChangeTest(true); |
| } |
| TEST_F(HostResolverManagerTest, |
| AbortOnlyExistingRequestsOnIPAddressChangeSync) { |
| AbortOnlyExistingRequestsOnIPAddressChangeTest(false); |
| } |
| |
| // Tests that when the maximum threads is set to 1, requests are dequeued |
| // in order of priority. |
| TEST_F(HostResolverManagerTest, HigherPriorityRequestsStartedFirst) { |
| CreateSerialResolver(); |
| |
| HostResolver::ResolveHostParameters low_priority; |
| low_priority.initial_priority = LOW; |
| HostResolver::ResolveHostParameters medium_priority; |
| medium_priority.initial_priority = MEDIUM; |
| HostResolver::ResolveHostParameters highest_priority; |
| highest_priority.initial_priority = HIGHEST; |
| |
| // Note that at this point the MockHostResolverProc is blocked, so any |
| // requests we make will not complete. |
| |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req0", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), low_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req1", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), medium_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req2", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), medium_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req3", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), low_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req4", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), highest_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req5", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), low_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req6", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), low_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req5", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), highest_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| |
| for (const auto& response : responses) { |
| ASSERT_FALSE(response->complete()); |
| } |
| |
| // Unblock the resolver thread so the requests can run. |
| proc_->SignalMultiple(responses.size()); // More than needed. |
| |
| // Wait for all the requests to complete successfully. |
| for (auto& response : responses) { |
| EXPECT_THAT(response->result_error(), IsOk()); |
| } |
| |
| // Since we have restricted to a single concurrent thread in the jobpool, |
| // the requests should complete in order of priority (with the exception |
| // of the first request, which gets started right away, since there is |
| // nothing outstanding). |
| MockHostResolverProc::CaptureList capture_list = proc_->GetCaptureList(); |
| ASSERT_EQ(7u, capture_list.size()); |
| |
| EXPECT_EQ("req0", capture_list[0].hostname); |
| EXPECT_EQ("req4", capture_list[1].hostname); |
| EXPECT_EQ("req5", capture_list[2].hostname); |
| EXPECT_EQ("req1", capture_list[3].hostname); |
| EXPECT_EQ("req2", capture_list[4].hostname); |
| EXPECT_EQ("req3", capture_list[5].hostname); |
| EXPECT_EQ("req6", capture_list[6].hostname); |
| } |
| |
| void HostResolverManagerTest::ChangePriorityTest(bool is_async) { |
| CreateSerialResolver(true /* check_ipv6_on_wifi */, true /* ipv6_reachable */, |
| is_async); |
| |
| HostResolver::ResolveHostParameters lowest_priority; |
| lowest_priority.initial_priority = LOWEST; |
| HostResolver::ResolveHostParameters low_priority; |
| low_priority.initial_priority = LOW; |
| HostResolver::ResolveHostParameters medium_priority; |
| medium_priority.initial_priority = MEDIUM; |
| |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req0", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), medium_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req1", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), low_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req2", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), lowest_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| |
| // req0 starts immediately; without ChangePriority, req1 and then req2 should |
| // run. |
| for (const auto& response : responses) { |
| ASSERT_FALSE(response->complete()); |
| } |
| |
| // Changing req2 to HIGHEST should make it run before req1. |
| // (It can't run before req0, since req0 started immediately.) |
| responses[2]->request()->ChangeRequestPriority(HIGHEST); |
| |
| // Let all 3 requests finish. |
| proc_->SignalMultiple(3u); |
| |
| for (auto& response : responses) { |
| EXPECT_THAT(response->result_error(), IsOk()); |
| } |
| |
| MockHostResolverProc::CaptureList capture_list = proc_->GetCaptureList(); |
| ASSERT_EQ(3u, capture_list.size()); |
| |
| EXPECT_EQ("req0", capture_list[0].hostname); |
| EXPECT_EQ("req2", capture_list[1].hostname); |
| EXPECT_EQ("req1", capture_list[2].hostname); |
| } |
| |
| // Test that changing a job's priority affects the dequeueing order. |
| TEST_F(HostResolverManagerTest, ChangePriorityAsync) { |
| ChangePriorityTest(true); |
| } |
| |
| TEST_F(HostResolverManagerTest, ChangePrioritySync) { |
| ChangePriorityTest(false); |
| } |
| |
| // Try cancelling a job which has not started yet. |
| TEST_F(HostResolverManagerTest, CancelPendingRequest) { |
| CreateSerialResolver(); |
| |
| HostResolver::ResolveHostParameters lowest_priority; |
| lowest_priority.initial_priority = LOWEST; |
| HostResolver::ResolveHostParameters low_priority; |
| low_priority.initial_priority = LOW; |
| HostResolver::ResolveHostParameters medium_priority; |
| medium_priority.initial_priority = MEDIUM; |
| HostResolver::ResolveHostParameters highest_priority; |
| highest_priority.initial_priority = HIGHEST; |
| |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req0", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), lowest_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req1", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), highest_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req2", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), medium_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req3", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), low_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req4", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), highest_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req5", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), lowest_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req6", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), medium_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| |
| // Cancel some requests |
| responses[1]->CancelRequest(); |
| responses[4]->CancelRequest(); |
| responses[5]->CancelRequest(); |
| |
| // Unblock the resolver thread so the requests can run. |
| proc_->SignalMultiple(responses.size()); // More than needed. |
| |
| // Let everything try to finish. |
| base::RunLoop().RunUntilIdle(); |
| |
| // Wait for all the requests to complete succesfully. |
| EXPECT_THAT(responses[0]->result_error(), IsOk()); |
| EXPECT_THAT(responses[2]->result_error(), IsOk()); |
| EXPECT_THAT(responses[3]->result_error(), IsOk()); |
| EXPECT_THAT(responses[6]->result_error(), IsOk()); |
| |
| // Cancelled requests shouldn't complete. |
| EXPECT_FALSE(responses[1]->complete()); |
| EXPECT_FALSE(responses[4]->complete()); |
| EXPECT_FALSE(responses[5]->complete()); |
| |
| // Verify that they called out to the resolver proc (which runs on the |
| // resolver thread) in the expected order. |
| MockHostResolverProc::CaptureList capture_list = proc_->GetCaptureList(); |
| ASSERT_EQ(4u, capture_list.size()); |
| |
| EXPECT_EQ("req0", capture_list[0].hostname); |
| EXPECT_EQ("req2", capture_list[1].hostname); |
| EXPECT_EQ("req6", capture_list[2].hostname); |
| EXPECT_EQ("req3", capture_list[3].hostname); |
| } |
| |
| // Test that when too many requests are enqueued, old ones start to be aborted. |
| TEST_F(HostResolverManagerTest, QueueOverflow) { |
| CreateSerialResolver(); |
| |
| // Allow only 3 queued jobs. |
| const size_t kMaxPendingJobs = 3u; |
| resolver_->SetMaxQueuedJobsForTesting(kMaxPendingJobs); |
| |
| HostResolver::ResolveHostParameters lowest_priority; |
| lowest_priority.initial_priority = LOWEST; |
| HostResolver::ResolveHostParameters low_priority; |
| low_priority.initial_priority = LOW; |
| HostResolver::ResolveHostParameters medium_priority; |
| medium_priority.initial_priority = MEDIUM; |
| HostResolver::ResolveHostParameters highest_priority; |
| highest_priority.initial_priority = HIGHEST; |
| |
| // Note that at this point the MockHostResolverProc is blocked, so any |
| // requests we make will not complete. |
| |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req0", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), lowest_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req1", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), highest_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req2", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), medium_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req3", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), medium_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| |
| // At this point, there are 3 enqueued jobs (and one "running" job). |
| // Insertion of subsequent requests will cause evictions. |
| |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req4", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), low_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| EXPECT_THAT(responses[4]->result_error(), |
| IsError(ERR_HOST_RESOLVER_QUEUE_TOO_LARGE)); // Evicts self. |
| EXPECT_FALSE(responses[4]->request()->GetAddressResults()); |
| EXPECT_FALSE(responses[4]->request()->GetEndpointResults()); |
| |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req5", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), medium_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| EXPECT_THAT(responses[2]->result_error(), |
| IsError(ERR_HOST_RESOLVER_QUEUE_TOO_LARGE)); |
| EXPECT_FALSE(responses[2]->request()->GetAddressResults()); |
| EXPECT_FALSE(responses[2]->request()->GetEndpointResults()); |
| |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req6", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), highest_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| EXPECT_THAT(responses[3]->result_error(), |
| IsError(ERR_HOST_RESOLVER_QUEUE_TOO_LARGE)); |
| EXPECT_FALSE(responses[3]->request()->GetAddressResults()); |
| EXPECT_FALSE(responses[3]->request()->GetEndpointResults()); |
| |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("req7", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), medium_priority, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| EXPECT_THAT(responses[5]->result_error(), |
| IsError(ERR_HOST_RESOLVER_QUEUE_TOO_LARGE)); |
| EXPECT_FALSE(responses[5]->request()->GetAddressResults()); |
| EXPECT_FALSE(responses[5]->request()->GetEndpointResults()); |
| |
| // Unblock the resolver thread so the requests can run. |
| proc_->SignalMultiple(4u); |
| |
| // The rest should succeed. |
| EXPECT_THAT(responses[0]->result_error(), IsOk()); |
| EXPECT_TRUE(responses[0]->request()->GetAddressResults()); |
| EXPECT_TRUE(responses[0]->request()->GetEndpointResults()); |
| EXPECT_THAT(responses[1]->result_error(), IsOk()); |
| EXPECT_TRUE(responses[1]->request()->GetAddressResults()); |
| EXPECT_TRUE(responses[1]->request()->GetEndpointResults()); |
| EXPECT_THAT(responses[6]->result_error(), IsOk()); |
| EXPECT_TRUE(responses[6]->request()->GetAddressResults()); |
| EXPECT_TRUE(responses[6]->request()->GetEndpointResults()); |
| EXPECT_THAT(responses[7]->result_error(), IsOk()); |
| EXPECT_TRUE(responses[7]->request()->GetAddressResults()); |
| EXPECT_TRUE(responses[7]->request()->GetEndpointResults()); |
| |
| // Verify that they called out the the resolver proc (which runs on the |
| // resolver thread) in the expected order. |
| MockHostResolverProc::CaptureList capture_list = proc_->GetCaptureList(); |
| ASSERT_EQ(4u, capture_list.size()); |
| |
| EXPECT_EQ("req0", capture_list[0].hostname); |
| EXPECT_EQ("req1", capture_list[1].hostname); |
| EXPECT_EQ("req6", capture_list[2].hostname); |
| EXPECT_EQ("req7", capture_list[3].hostname); |
| |
| // Verify that the evicted (incomplete) requests were not cached. |
| EXPECT_EQ(4u, resolve_context_->host_cache()->size()); |
| |
| for (size_t i = 0; i < responses.size(); ++i) { |
| EXPECT_TRUE(responses[i]->complete()) << i; |
| } |
| } |
| |
| // Tests that jobs can self-evict by setting the max queue to 0. |
| TEST_F(HostResolverManagerTest, QueueOverflow_SelfEvict) { |
| CreateSerialResolver(); |
| resolver_->SetMaxQueuedJobsForTesting(0); |
| |
| // Note that at this point the MockHostResolverProc is blocked, so any |
| // requests we make will not complete. |
| |
| ResolveHostResponseHelper run_response(resolver_->CreateRequest( |
| HostPortPair("run", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| |
| ResolveHostResponseHelper evict_response(resolver_->CreateRequest( |
| HostPortPair("req1", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(evict_response.result_error(), |
| IsError(ERR_HOST_RESOLVER_QUEUE_TOO_LARGE)); |
| EXPECT_FALSE(evict_response.request()->GetAddressResults()); |
| EXPECT_FALSE(evict_response.request()->GetEndpointResults()); |
| |
| proc_->SignalMultiple(1u); |
| |
| EXPECT_THAT(run_response.result_error(), IsOk()); |
| EXPECT_TRUE(run_response.request()->GetAddressResults()); |
| EXPECT_TRUE(run_response.request()->GetEndpointResults()); |
| } |
| |
| // Make sure that the dns query type parameter is respected when raw IPs are |
| // passed in. |
| TEST_F(HostResolverManagerTest, AddressFamilyWithRawIPs) { |
| HostResolver::ResolveHostParameters v4_parameters; |
| v4_parameters.dns_query_type = DnsQueryType::A; |
| |
| HostResolver::ResolveHostParameters v6_parameters; |
| v6_parameters.dns_query_type = DnsQueryType::AAAA; |
| |
| ResolveHostResponseHelper v4_v4_request(resolver_->CreateRequest( |
| HostPortPair("127.0.0.1", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), v4_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(v4_v4_request.result_error(), IsOk()); |
| EXPECT_THAT(v4_v4_request.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80))); |
| EXPECT_THAT( |
| v4_v4_request.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80)))))); |
| |
| ResolveHostResponseHelper v4_v6_request(resolver_->CreateRequest( |
| HostPortPair("127.0.0.1", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), v6_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(v4_v6_request.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| |
| ResolveHostResponseHelper v4_unsp_request(resolver_->CreateRequest( |
| HostPortPair("127.0.0.1", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(v4_unsp_request.result_error(), IsOk()); |
| EXPECT_THAT(v4_unsp_request.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80))); |
| EXPECT_THAT( |
| v4_unsp_request.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80)))))); |
| |
| ResolveHostResponseHelper v6_v4_request(resolver_->CreateRequest( |
| HostPortPair("::1", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| v4_parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(v6_v4_request.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| |
| ResolveHostResponseHelper v6_v6_request(resolver_->CreateRequest( |
| HostPortPair("::1", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| v6_parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(v6_v6_request.result_error(), IsOk()); |
| EXPECT_THAT(v6_v6_request.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| v6_v6_request.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("::1", 80)))))); |
| |
| ResolveHostResponseHelper v6_unsp_request(resolver_->CreateRequest( |
| HostPortPair("::1", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(v6_unsp_request.result_error(), IsOk()); |
| EXPECT_THAT(v6_unsp_request.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| v6_unsp_request.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("::1", 80)))))); |
| } |
| |
| TEST_F(HostResolverManagerTest, LocalOnly_FromCache) { |
| proc_->AddRuleForAllFamilies("just.testing", "192.168.1.42"); |
| proc_->SignalMultiple(1u); // Need only one. |
| |
| HostResolver::ResolveHostParameters source_none_parameters; |
| source_none_parameters.source = HostResolverSource::LOCAL_ONLY; |
| |
| // First NONE query expected to complete synchronously with a cache miss. |
| ResolveHostResponseHelper cache_miss_request(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), source_none_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_TRUE(cache_miss_request.complete()); |
| EXPECT_THAT(cache_miss_request.result_error(), IsError(ERR_DNS_CACHE_MISS)); |
| EXPECT_FALSE(cache_miss_request.request()->GetAddressResults()); |
| EXPECT_FALSE(cache_miss_request.request()->GetEndpointResults()); |
| EXPECT_FALSE(cache_miss_request.request()->GetStaleInfo()); |
| |
| // Normal query to populate the cache. |
| ResolveHostResponseHelper normal_request(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(normal_request.result_error(), IsOk()); |
| EXPECT_FALSE(normal_request.request()->GetStaleInfo()); |
| |
| // Second NONE query expected to complete synchronously with cache hit. |
| ResolveHostResponseHelper cache_hit_request(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), source_none_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_TRUE(cache_hit_request.complete()); |
| EXPECT_THAT(cache_hit_request.result_error(), IsOk()); |
| EXPECT_THAT(cache_hit_request.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80))); |
| EXPECT_THAT( |
| cache_hit_request.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80)))))); |
| EXPECT_FALSE(cache_hit_request.request()->GetStaleInfo().value().is_stale()); |
| } |
| |
| TEST_F(HostResolverManagerTest, LocalOnly_StaleEntry) { |
| proc_->AddRuleForAllFamilies("just.testing", "192.168.1.42"); |
| proc_->SignalMultiple(1u); // Need only one. |
| |
| HostResolver::ResolveHostParameters source_none_parameters; |
| source_none_parameters.source = HostResolverSource::LOCAL_ONLY; |
| |
| // First NONE query expected to complete synchronously with a cache miss. |
| ResolveHostResponseHelper cache_miss_request(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), source_none_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_TRUE(cache_miss_request.complete()); |
| EXPECT_THAT(cache_miss_request.result_error(), IsError(ERR_DNS_CACHE_MISS)); |
| EXPECT_FALSE(cache_miss_request.request()->GetAddressResults()); |
| EXPECT_FALSE(cache_miss_request.request()->GetEndpointResults()); |
| EXPECT_FALSE(cache_miss_request.request()->GetStaleInfo()); |
| |
| // Normal query to populate the cache. |
| ResolveHostResponseHelper normal_request(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(normal_request.result_error(), IsOk()); |
| EXPECT_FALSE(normal_request.request()->GetStaleInfo()); |
| |
| MakeCacheStale(); |
| |
| // Second NONE query still expected to complete synchronously with cache miss. |
| ResolveHostResponseHelper stale_request(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), source_none_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_TRUE(stale_request.complete()); |
| EXPECT_THAT(stale_request.result_error(), IsError(ERR_DNS_CACHE_MISS)); |
| EXPECT_FALSE(stale_request.request()->GetAddressResults()); |
| EXPECT_FALSE(stale_request.request()->GetEndpointResults()); |
| EXPECT_FALSE(stale_request.request()->GetStaleInfo()); |
| } |
| |
| void HostResolverManagerTest::LocalOnlyFromIpTest(bool is_async) { |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| true /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */, is_async); |
| HostResolver::ResolveHostParameters source_none_parameters; |
| source_none_parameters.source = HostResolverSource::LOCAL_ONLY; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("1.2.3.4", 56), NetworkAnonymizationKey(), |
| NetLogWithSource(), source_none_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| // If IPv6 reachability is asynchronous, the first request will return |
| // NAME_NOT_RESOLVED. Do a second request to confirm that it returns OK once |
| // reachability check completes. |
| if (is_async) { |
| // Expected to resolve synchronously. |
| EXPECT_TRUE(response.complete()); |
| EXPECT_EQ(response.result_error(), ERR_NAME_NOT_RESOLVED); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetStaleInfo()); |
| base::RunLoop().RunUntilIdle(); |
| |
| ResolveHostResponseHelper response2(resolver_->CreateRequest( |
| HostPortPair("1.2.3.4", 56), NetworkAnonymizationKey(), |
| NetLogWithSource(), source_none_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_TRUE(response2.complete()); |
| EXPECT_THAT(response2.result_error(), IsOk()); |
| EXPECT_THAT(response2.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("1.2.3.4", 56))); |
| EXPECT_THAT(response2.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("1.2.3.4", 56)))))); |
| EXPECT_FALSE(response2.request()->GetStaleInfo()); |
| } else { |
| // Expected to resolve synchronously. |
| EXPECT_TRUE(response.complete()); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("1.2.3.4", 56))); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("1.2.3.4", 56)))))); |
| EXPECT_FALSE(response.request()->GetStaleInfo()); |
| } |
| } |
| |
| TEST_F(HostResolverManagerTest, LocalOnly_FromIpAsync) { |
| LocalOnlyFromIpTest(true); |
| } |
| |
| TEST_F(HostResolverManagerTest, LocalOnly_FromIpSync) { |
| LocalOnlyFromIpTest(false); |
| } |
| |
| TEST_F(HostResolverManagerTest, LocalOnly_InvalidName) { |
| proc_->AddRuleForAllFamilies("foo,bar.com", "192.168.1.42"); |
| |
| HostResolver::ResolveHostParameters source_none_parameters; |
| source_none_parameters.source = HostResolverSource::LOCAL_ONLY; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("foo,bar.com", 57), NetworkAnonymizationKey(), |
| NetLogWithSource(), source_none_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| // Expected to fail synchronously. |
| EXPECT_TRUE(response.complete()); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetStaleInfo()); |
| } |
| |
| TEST_F(HostResolverManagerTest, LocalOnly_InvalidLocalhost) { |
| HostResolver::ResolveHostParameters source_none_parameters; |
| source_none_parameters.source = HostResolverSource::LOCAL_ONLY; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("foo,bar.localhost", 58), NetworkAnonymizationKey(), |
| NetLogWithSource(), source_none_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| // Expected to fail synchronously. |
| EXPECT_TRUE(response.complete()); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetStaleInfo()); |
| } |
| |
| TEST_F(HostResolverManagerTest, StaleAllowed) { |
| proc_->AddRuleForAllFamilies("just.testing", "192.168.1.42"); |
| proc_->SignalMultiple(1u); // Need only one. |
| |
| HostResolver::ResolveHostParameters stale_allowed_parameters; |
| stale_allowed_parameters.source = HostResolverSource::LOCAL_ONLY; |
| stale_allowed_parameters.cache_usage = |
| HostResolver::ResolveHostParameters::CacheUsage::STALE_ALLOWED; |
| |
| // First query expected to complete synchronously as a cache miss. |
| ResolveHostResponseHelper cache_miss_request(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), stale_allowed_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_TRUE(cache_miss_request.complete()); |
| EXPECT_THAT(cache_miss_request.result_error(), IsError(ERR_DNS_CACHE_MISS)); |
| EXPECT_FALSE(cache_miss_request.request()->GetAddressResults()); |
| EXPECT_FALSE(cache_miss_request.request()->GetEndpointResults()); |
| EXPECT_FALSE(cache_miss_request.request()->GetStaleInfo()); |
| |
| // Normal query to populate cache |
| ResolveHostResponseHelper normal_request(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(normal_request.result_error(), IsOk()); |
| EXPECT_FALSE(normal_request.request()->GetStaleInfo()); |
| |
| MakeCacheStale(); |
| |
| // Second NONE query expected to get a stale cache hit. |
| ResolveHostResponseHelper stale_request(resolver_->CreateRequest( |
| HostPortPair("just.testing", 84), NetworkAnonymizationKey(), |
| NetLogWithSource(), stale_allowed_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_TRUE(stale_request.complete()); |
| EXPECT_THAT(stale_request.result_error(), IsOk()); |
| EXPECT_THAT(stale_request.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.42", 84))); |
| EXPECT_THAT( |
| stale_request.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.42", 84)))))); |
| EXPECT_TRUE(stale_request.request()->GetStaleInfo().value().is_stale()); |
| } |
| |
| TEST_F(HostResolverManagerTest, StaleAllowed_NonLocal) { |
| proc_->AddRuleForAllFamilies("just.testing", "192.168.2.42"); |
| proc_->SignalMultiple(1u); // Need only one. |
| |
| HostResolver::ResolveHostParameters stale_allowed_parameters; |
| stale_allowed_parameters.cache_usage = |
| HostResolver::ResolveHostParameters::CacheUsage::STALE_ALLOWED; |
| |
| // Normal non-local resolves should still work normally with the STALE_ALLOWED |
| // parameter, and there should be no stale info. |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("just.testing", 85), NetworkAnonymizationKey(), |
| NetLogWithSource(), stale_allowed_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.2.42", 85))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.2.42", 85)))))); |
| EXPECT_FALSE(response.request()->GetStaleInfo()); |
| } |
| |
| void HostResolverManagerTest::StaleAllowedFromIpTest(bool is_async) { |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| true /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */, is_async); |
| HostResolver::ResolveHostParameters stale_allowed_parameters; |
| stale_allowed_parameters.cache_usage = |
| HostResolver::ResolveHostParameters::CacheUsage::STALE_ALLOWED; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("1.2.3.4", 57), NetworkAnonymizationKey(), |
| NetLogWithSource(), stale_allowed_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| if (!is_async) { |
| // Expected to resolve synchronously without stale info. |
| EXPECT_TRUE(response.complete()); |
| } |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("1.2.3.4", 57))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("1.2.3.4", 57)))))); |
| EXPECT_FALSE(response.request()->GetStaleInfo()); |
| } |
| |
| TEST_F(HostResolverManagerTest, StaleAllowed_FromIpAsync) { |
| StaleAllowedFromIpTest(true); |
| } |
| |
| TEST_F(HostResolverManagerTest, StaleAllowed_FromIpSync) { |
| StaleAllowedFromIpTest(false); |
| } |
| |
| // TODO(mgersh): add a test case for errors with positive TTL after |
| // https://crbug.com/115051 is fixed. |
| |
| // Test the retry attempts simulating host resolver proc that takes too long. |
| TEST_F(HostResolverManagerTest, MultipleAttempts) { |
| // Total number of attempts would be 3 and we want the 3rd attempt to resolve |
| // the host. First and second attempt will be forced to wait until they get |
| // word that a resolution has completed. The 3rd resolution attempt will try |
| // to get done ASAP, and won't wait. |
| int kAttemptNumberToResolve = 3; |
| int kTotalAttempts = 3; |
| |
| // Add a little bit of extra fudge to the delay to allow reasonable |
| // flexibility for time > vs >= etc. We don't need to fail the test if we |
| // retry at t=6001 instead of t=6000. |
| base::TimeDelta kSleepFudgeFactor = base::Milliseconds(1); |
| |
| auto resolver_proc = base::MakeRefCounted<LookupAttemptHostResolverProc>( |
| nullptr, kAttemptNumberToResolve, kTotalAttempts); |
| |
| HostResolverSystemTask::Params params = DefaultParams(resolver_proc); |
| base::TimeDelta unresponsive_delay = params.unresponsive_delay; |
| int retry_factor = params.retry_factor; |
| |
| CreateResolverWithLimitsAndParams(kMaxJobs, params, true /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */); |
| |
| // Override the current thread task runner, so we can simulate the passage of |
| // time and avoid any actual sleeps. |
| auto test_task_runner = base::MakeRefCounted<base::TestMockTimeTaskRunner>(); |
| base::SingleThreadTaskRunner::CurrentHandleOverrideForTesting |
| task_runner_current_default_handle_override(test_task_runner); |
| |
| // Resolve "host1". |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host1", 70), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_FALSE(response.complete()); |
| |
| resolver_proc->WaitForNAttemptsToBeBlocked(1); |
| EXPECT_FALSE(response.complete()); |
| |
| test_task_runner->FastForwardBy(unresponsive_delay + kSleepFudgeFactor); |
| resolver_proc->WaitForNAttemptsToBeBlocked(2); |
| EXPECT_FALSE(response.complete()); |
| |
| test_task_runner->FastForwardBy(unresponsive_delay * retry_factor + |
| kSleepFudgeFactor); |
| |
| resolver_proc->WaitForAllAttemptsToFinish(); |
| test_task_runner->RunUntilIdle(); |
| |
| // Resolve returns -4 to indicate that 3rd attempt has resolved the host. |
| // Since we're using a TestMockTimeTaskRunner, the RunLoop stuff in |
| // result_error() will fail if it actually has to wait, but unless there's an |
| // error, the result should be immediately ready by this point. |
| EXPECT_EQ(-4, response.result_error()); |
| |
| // We should be done with retries, but make sure none erroneously happen. |
| test_task_runner->FastForwardUntilNoTasksRemain(); |
| |
| EXPECT_EQ(resolver_proc->GetTotalAttemptsResolved(), kTotalAttempts); |
| } |
| |
| // Regression test for https://crbug.com/976948. |
| // |
| // Tests that when the maximum number of retries is set to |
| // |HostResolver::ManagerOptions::kDefaultRetryAttempts| the |
| // number of retries used is 4 rather than something higher. |
| TEST_F(HostResolverManagerTest, DefaultMaxRetryAttempts) { |
| auto test_task_runner = base::MakeRefCounted<base::TestMockTimeTaskRunner>(); |
| base::SingleThreadTaskRunner::CurrentHandleOverrideForTesting |
| task_runner_current_default_handle_override(test_task_runner); |
| |
| // Instantiate a ResolverProc that will block all incoming requests. |
| auto resolver_proc = base::MakeRefCounted<LookupAttemptHostResolverProc>( |
| nullptr, std::numeric_limits<size_t>::max(), |
| std::numeric_limits<size_t>::max()); |
| |
| // This corresponds to kDefaultMaxRetryAttempts in |
| // HostResolverSystemTask::Params::HostResolverSystemTask::Params(). The |
| // correspondence is verified below, since that symbol is not exported. |
| const size_t expected_max_retries = 4; |
| |
| // Use the special value |ManagerOptions::kDefaultRetryAttempts|, which is |
| // expected to translate into |expected_num_retries|. |
| ASSERT_NE(HostResolverSystemTask::Params::kDefaultRetryAttempts, |
| expected_max_retries); |
| HostResolverSystemTask::Params params( |
| resolver_proc, HostResolverSystemTask::Params::kDefaultRetryAttempts); |
| ASSERT_EQ(params.max_retry_attempts, expected_max_retries); |
| |
| CreateResolverWithLimitsAndParams(kMaxJobs, params, |
| false /* ipv6_reachable */, |
| false /* check_ipv6_on_wifi */); |
| // Resolve "host1". The resolver proc will hang all requests so this |
| // resolution should remain stalled until calling SetResolvedAttemptNumber(). |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host1", 70), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_FALSE(response.complete()); |
| |
| // Simulate running the main thread (network task runner) for a long |
| // time. Because none of the attempts posted to worker pool can complete, this |
| // should cause all of the retry attempts to get posted, according to the |
| // exponential backoff schedule. |
| test_task_runner->FastForwardBy(base::Minutes(20)); |
| |
| // Unblock the resolver proc, then wait for all the worker pool and main |
| // thread tasks to complete. Note that the call to SetResolvedAttemptNumber(1) |
| // will cause all the blocked resolver procs tasks fail with -2. |
| resolver_proc->SetResolvedAttemptNumber(1); |
| const int kExpectedError = -2; |
| base::ThreadPoolInstance::Get()->FlushForTesting(); |
| test_task_runner->RunUntilIdle(); |
| |
| ASSERT_TRUE(response.complete()); |
| EXPECT_EQ(kExpectedError, response.result_error()); |
| |
| // Ensure that the original attempt was executed on the worker pool, as well |
| // as the maximum number of allowed retries, and no more. |
| EXPECT_EQ(static_cast<int>(expected_max_retries + 1), |
| resolver_proc->GetTotalAttemptsResolved()); |
| } |
| |
| // If a host resolves to a list that includes 127.0.53.53, this is treated as |
| // an error. 127.0.53.53 is a localhost address, however it has been given a |
| // special significance by ICANN to help surface name collision resulting from |
| // the new gTLDs. |
| TEST_F(HostResolverManagerTest, NameCollisionIcann) { |
| proc_->AddRuleForAllFamilies("single", "127.0.53.53"); |
| proc_->AddRuleForAllFamilies("multiple", "127.0.0.1,127.0.53.53"); |
| proc_->AddRuleForAllFamilies("ipv6", "::127.0.53.53"); |
| proc_->AddRuleForAllFamilies("not_reserved1", "53.53.0.127"); |
| proc_->AddRuleForAllFamilies("not_reserved2", "127.0.53.54"); |
| proc_->AddRuleForAllFamilies("not_reserved3", "10.0.53.53"); |
| proc_->SignalMultiple(6u); |
| |
| ResolveHostResponseHelper single_response(resolver_->CreateRequest( |
| HostPortPair("single", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(single_response.result_error(), |
| IsError(ERR_ICANN_NAME_COLLISION)); |
| EXPECT_FALSE(single_response.request()->GetAddressResults()); |
| EXPECT_FALSE(single_response.request()->GetEndpointResults()); |
| |
| // ERR_ICANN_NAME_COLLISION is cached like any other error, using a fixed TTL |
| // for failed entries from proc-based resolver. That said, the fixed TTL is 0, |
| // so it should never be cached. |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result = |
| GetCacheHit(HostCache::Key( |
| "single", DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey())); |
| EXPECT_FALSE(cache_result); |
| |
| ResolveHostResponseHelper multiple_response(resolver_->CreateRequest( |
| HostPortPair("multiple", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(multiple_response.result_error(), |
| IsError(ERR_ICANN_NAME_COLLISION)); |
| |
| // Resolving an IP literal of 127.0.53.53 however is allowed. |
| ResolveHostResponseHelper literal_response(resolver_->CreateRequest( |
| HostPortPair("127.0.53.53", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(literal_response.result_error(), IsOk()); |
| |
| // Moreover the address should not be recognized when embedded in an IPv6 |
| // address. |
| ResolveHostResponseHelper ipv6_response(resolver_->CreateRequest( |
| HostPortPair("127.0.53.53", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(ipv6_response.result_error(), IsOk()); |
| |
| // Try some other IPs which are similar, but NOT an exact match on |
| // 127.0.53.53. |
| ResolveHostResponseHelper similar_response1(resolver_->CreateRequest( |
| HostPortPair("not_reserved1", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(similar_response1.result_error(), IsOk()); |
| |
| ResolveHostResponseHelper similar_response2(resolver_->CreateRequest( |
| HostPortPair("not_reserved2", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(similar_response2.result_error(), IsOk()); |
| |
| ResolveHostResponseHelper similar_response3(resolver_->CreateRequest( |
| HostPortPair("not_reserved3", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(similar_response3.result_error(), IsOk()); |
| } |
| |
| TEST_F(HostResolverManagerTest, StartIPv6ReachabilityCheck) { |
| // The real HostResolverManager is needed since TestHostResolverManager will |
| // bypass the IPv6 reachability tests. |
| DestroyResolver(); |
| resolver_ = std::make_unique<HostResolverManager>( |
| DefaultOptions(), nullptr /* system_dns_config_notifier */, |
| nullptr /* net_log */); |
| // Verify that two consecutive calls return the same value. |
| RecordingNetLogObserver net_log_observer; |
| NetLogWithSource net_log = |
| NetLogWithSource::Make(net::NetLog::Get(), NetLogSourceType::NONE); |
| |
| int attempt1 = |
| StartIPv6ReachabilityCheck(net_log, base::DoNothingAs<void(int)>()); |
| EXPECT_EQ(attempt1, OK); |
| int result1 = GetLastIpv6ProbeResult(); |
| int attempt2 = |
| StartIPv6ReachabilityCheck(net_log, base::DoNothingAs<void(int)>()); |
| EXPECT_EQ(attempt2, OK); |
| int result2 = GetLastIpv6ProbeResult(); |
| EXPECT_EQ(result1, result2); |
| // Filter reachability check events and verify that there are two of them. |
| auto probe_event_list = net_log_observer.GetEntriesWithType( |
| NetLogEventType::HOST_RESOLVER_MANAGER_IPV6_REACHABILITY_CHECK); |
| ASSERT_EQ(2U, probe_event_list.size()); |
| |
| // Verify that the first request was not cached and the second one was. |
| EXPECT_FALSE(GetBooleanValueFromParams(probe_event_list[0], "cached")); |
| EXPECT_TRUE(GetBooleanValueFromParams(probe_event_list[1], "cached")); |
| } |
| |
| TEST_F(HostResolverManagerTest, IncludeCanonicalName) { |
| proc_->AddRuleForAllFamilies("just.testing", "192.168.1.42", |
| HOST_RESOLVER_CANONNAME, "canon.name"); |
| proc_->SignalMultiple(2u); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.include_canonical_name = true; |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper response_no_flag(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80)))))); |
| EXPECT_THAT(response.request()->GetDnsAliasResults(), |
| testing::Pointee(testing::UnorderedElementsAre("canon.name"))); |
| |
| EXPECT_THAT(response_no_flag.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| } |
| |
| TEST_F(HostResolverManagerTest, FixupCanonicalName) { |
| proc_->AddRuleForAllFamilies("just.testing", "192.168.1.42", /*flags=*/0, |
| "CANON.name"); |
| proc_->SignalMultiple(1u); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80)))))); |
| EXPECT_THAT(response.request()->GetDnsAliasResults(), |
| testing::Pointee(testing::UnorderedElementsAre("canon.name"))); |
| } |
| |
| TEST_F(HostResolverManagerTest, IncludeCanonicalNameButNotReceived) { |
| proc_->AddRuleForAllFamilies("just.testing", "192.168.1.42", |
| HOST_RESOLVER_CANONNAME); |
| proc_->SignalMultiple(2u); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.include_canonical_name = true; |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper response_no_flag(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80)))))); |
| EXPECT_THAT(response.request()->GetDnsAliasResults(), |
| testing::Pointee(testing::IsEmpty())); |
| |
| EXPECT_THAT(response_no_flag.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| } |
| |
| // If `ResolveHostParameters::include_canonical_name` is set, canonical name |
| // should be returned exactly as received from the system resolver, without any |
| // attempt to do URL hostname canonicalization on it. |
| TEST_F(HostResolverManagerTest, IncludeCanonicalNameSkipsUrlCanonicalization) { |
| proc_->AddRuleForAllFamilies("just.testing", "192.168.1.42", |
| HOST_RESOLVER_CANONNAME, "CANON.name"); |
| proc_->SignalMultiple(2u); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.include_canonical_name = true; |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper response_no_flag(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80)))))); |
| EXPECT_THAT(response.request()->GetDnsAliasResults(), |
| testing::Pointee(testing::UnorderedElementsAre("CANON.name"))); |
| |
| EXPECT_THAT(response_no_flag.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| } |
| |
| TEST_F(HostResolverManagerTest, LoopbackOnly) { |
| proc_->AddRuleForAllFamilies("otherlocal", "127.0.0.1", |
| HOST_RESOLVER_LOOPBACK_ONLY); |
| proc_->SignalMultiple(2u); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.loopback_only = true; |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("otherlocal", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper response_no_flag(resolver_->CreateRequest( |
| HostPortPair("otherlocal", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80)))))); |
| |
| EXPECT_THAT(response_no_flag.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| } |
| |
| TEST_F(HostResolverManagerTest, IsSpeculative) { |
| proc_->AddRuleForAllFamilies("just.testing", "192.168.1.42"); |
| proc_->SignalMultiple(1u); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.is_speculative = true; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| |
| ASSERT_EQ(1u, proc_->GetCaptureList().size()); |
| EXPECT_EQ("just.testing", proc_->GetCaptureList()[0].hostname); |
| |
| // Reresolve without the |is_speculative| flag should immediately return from |
| // cache. |
| ResolveHostResponseHelper response2(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response2.result_error(), IsOk()); |
| EXPECT_THAT(response2.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80))); |
| EXPECT_THAT( |
| response2.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80)))))); |
| |
| EXPECT_EQ("just.testing", proc_->GetCaptureList()[0].hostname); |
| EXPECT_EQ(1u, proc_->GetCaptureList().size()); // No increase. |
| } |
| |
| TEST_F(HostResolverManagerTest, AvoidMulticastResolutionParameter) { |
| proc_->AddRuleForAllFamilies("avoid.multicast.test", "123.123.123.123", |
| HOST_RESOLVER_AVOID_MULTICAST); |
| proc_->SignalMultiple(2u); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.avoid_multicast_resolution = true; |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("avoid.multicast.test", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper response_no_flag(resolver_->CreateRequest( |
| HostPortPair("avoid.multicast.test", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("123.123.123.123", 80))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("123.123.123.123", 80)))))); |
| |
| EXPECT_THAT(response_no_flag.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| } |
| |
| #if BUILDFLAG(ENABLE_MDNS) |
| const uint8_t kMdnsResponseA[] = { |
| // Header |
| 0x00, 0x00, // ID is zeroed out |
| 0x81, 0x80, // Standard query response, RA, no error |
| 0x00, 0x00, // No questions (for simplicity) |
| 0x00, 0x01, // 1 RR (answers) |
| 0x00, 0x00, // 0 authority RRs |
| 0x00, 0x00, // 0 additional RRs |
| |
| // "myhello.local." |
| 0x07, 'm', 'y', 'h', 'e', 'l', 'l', 'o', 0x05, 'l', 'o', 'c', 'a', 'l', |
| 0x00, |
| |
| 0x00, 0x01, // TYPE is A. |
| 0x00, 0x01, // CLASS is IN. |
| 0x00, 0x00, 0x00, 0x10, // TTL is 16 (seconds) |
| 0x00, 0x04, // RDLENGTH is 4 bytes. |
| 0x01, 0x02, 0x03, 0x04, // 1.2.3.4 |
| }; |
| |
| const uint8_t kMdnsResponseA2[] = { |
| // Header |
| 0x00, 0x00, // ID is zeroed out |
| 0x81, 0x80, // Standard query response, RA, no error |
| 0x00, 0x00, // No questions (for simplicity) |
| 0x00, 0x01, // 1 RR (answers) |
| 0x00, 0x00, // 0 authority RRs |
| 0x00, 0x00, // 0 additional RRs |
| |
| // "myhello.local." |
| 0x07, 'm', 'y', 'h', 'e', 'l', 'l', 'o', 0x05, 'l', 'o', 'c', 'a', 'l', |
| 0x00, |
| |
| 0x00, 0x01, // TYPE is A. |
| 0x00, 0x01, // CLASS is IN. |
| 0x00, 0x00, 0x00, 0x10, // TTL is 16 (seconds) |
| 0x00, 0x04, // RDLENGTH is 4 bytes. |
| 0x05, 0x06, 0x07, 0x08, // 5.6.7.8 |
| }; |
| |
| const uint8_t kMdnsResponseA2Goodbye[] = { |
| // Header |
| 0x00, 0x00, // ID is zeroed out |
| 0x81, 0x80, // Standard query response, RA, no error |
| 0x00, 0x00, // No questions (for simplicity) |
| 0x00, 0x01, // 1 RR (answers) |
| 0x00, 0x00, // 0 authority RRs |
| 0x00, 0x00, // 0 additional RRs |
| |
| // "myhello.local." |
| 0x07, 'm', 'y', 'h', 'e', 'l', 'l', 'o', 0x05, 'l', 'o', 'c', 'a', 'l', |
| 0x00, |
| |
| 0x00, 0x01, // TYPE is A. |
| 0x00, 0x01, // CLASS is IN. |
| 0x00, 0x00, 0x00, 0x00, // TTL is 0 (signaling "goodbye" removal of result) |
| 0x00, 0x04, // RDLENGTH is 4 bytes. |
| 0x05, 0x06, 0x07, 0x08, // 5.6.7.8 |
| }; |
| |
| const uint8_t kMdnsResponseAAAA[] = { |
| // Header |
| 0x00, 0x00, // ID is zeroed out |
| 0x81, 0x80, // Standard query response, RA, no error |
| 0x00, 0x00, // No questions (for simplicity) |
| 0x00, 0x01, // 1 RR (answers) |
| 0x00, 0x00, // 0 authority RRs |
| 0x00, 0x00, // 0 additional RRs |
| |
| // "myhello.local." |
| 0x07, 'm', 'y', 'h', 'e', 'l', 'l', 'o', 0x05, 'l', 'o', 'c', 'a', 'l', |
| 0x00, |
| |
| 0x00, 0x1C, // TYPE is AAAA. |
| 0x00, 0x01, // CLASS is IN. |
| 0x00, 0x00, 0x00, 0x10, // TTL is 16 (seconds) |
| 0x00, 0x10, // RDLENGTH is 16 bytes. |
| |
| // 000a:0000:0000:0000:0001:0002:0003:0004 |
| 0x00, 0x0A, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x02, |
| 0x00, 0x03, 0x00, 0x04}; |
| |
| // An MDNS response indicating that the responder owns the hostname, but the |
| // specific requested type (AAAA) does not exist because the responder only has |
| // A addresses. |
| const uint8_t kMdnsResponseNsec[] = { |
| // Header |
| 0x00, 0x00, // ID is zeroed out |
| 0x81, 0x80, // Standard query response, RA, no error |
| 0x00, 0x00, // No questions (for simplicity) |
| 0x00, 0x01, // 1 RR (answers) |
| 0x00, 0x00, // 0 authority RRs |
| 0x00, 0x00, // 0 additional RRs |
| |
| // "myhello.local." |
| 0x07, 'm', 'y', 'h', 'e', 'l', 'l', 'o', 0x05, 'l', 'o', 'c', 'a', 'l', |
| 0x00, |
| |
| 0x00, 0x2f, // TYPE is NSEC. |
| 0x00, 0x01, // CLASS is IN. |
| 0x00, 0x00, 0x00, 0x10, // TTL is 16 (seconds) |
| 0x00, 0x06, // RDLENGTH is 6 bytes. |
| 0xc0, 0x0c, // Next Domain Name (always pointer back to name in MDNS) |
| 0x00, // Bitmap block number (always 0 in MDNS) |
| 0x02, // Bitmap length is 2 |
| 0x00, 0x08 // A type only |
| }; |
| |
| const uint8_t kMdnsResponseTxt[] = { |
| // Header |
| 0x00, 0x00, // ID is zeroed out |
| 0x81, 0x80, // Standard query response, RA, no error |
| 0x00, 0x00, // No questions (for simplicity) |
| 0x00, 0x01, // 1 RR (answers) |
| 0x00, 0x00, // 0 authority RRs |
| 0x00, 0x00, // 0 additional RRs |
| |
| // "myhello.local." |
| 0x07, 'm', 'y', 'h', 'e', 'l', 'l', 'o', 0x05, 'l', 'o', 'c', 'a', 'l', |
| 0x00, |
| |
| 0x00, 0x10, // TYPE is TXT. |
| 0x00, 0x01, // CLASS is IN. |
| 0x00, 0x00, 0x00, 0x11, // TTL is 17 (seconds) |
| 0x00, 0x08, // RDLENGTH is 8 bytes. |
| |
| // "foo" |
| 0x03, 0x66, 0x6f, 0x6f, |
| // "bar" |
| 0x03, 0x62, 0x61, 0x72}; |
| |
| const uint8_t kMdnsResponsePtr[] = { |
| // Header |
| 0x00, 0x00, // ID is zeroed out |
| 0x81, 0x80, // Standard query response, RA, no error |
| 0x00, 0x00, // No questions (for simplicity) |
| 0x00, 0x01, // 1 RR (answers) |
| 0x00, 0x00, // 0 authority RRs |
| 0x00, 0x00, // 0 additional RRs |
| |
| // "myhello.local." |
| 0x07, 'm', 'y', 'h', 'e', 'l', 'l', 'o', 0x05, 'l', 'o', 'c', 'a', 'l', |
| 0x00, |
| |
| 0x00, 0x0c, // TYPE is PTR. |
| 0x00, 0x01, // CLASS is IN. |
| 0x00, 0x00, 0x00, 0x12, // TTL is 18 (seconds) |
| 0x00, 0x09, // RDLENGTH is 9 bytes. |
| |
| // "foo.com." |
| 0x03, 'f', 'o', 'o', 0x03, 'c', 'o', 'm', 0x00}; |
| |
| const uint8_t kMdnsResponsePtrRoot[] = { |
| // Header |
| 0x00, 0x00, // ID is zeroed out |
| 0x81, 0x80, // Standard query response, RA, no error |
| 0x00, 0x00, // No questions (for simplicity) |
| 0x00, 0x01, // 1 RR (answers) |
| 0x00, 0x00, // 0 authority RRs |
| 0x00, 0x00, // 0 additional RRs |
| |
| // "myhello.local." |
| 0x07, 'm', 'y', 'h', 'e', 'l', 'l', 'o', 0x05, 'l', 'o', 'c', 'a', 'l', |
| 0x00, |
| |
| 0x00, 0x0c, // TYPE is PTR. |
| 0x00, 0x01, // CLASS is IN. |
| 0x00, 0x00, 0x00, 0x13, // TTL is 19 (seconds) |
| 0x00, 0x01, // RDLENGTH is 1 byte. |
| |
| // "." (the root domain) |
| 0x00}; |
| |
| const uint8_t kMdnsResponseSrv[] = { |
| // Header |
| 0x00, 0x00, // ID is zeroed out |
| 0x81, 0x80, // Standard query response, RA, no error |
| 0x00, 0x00, // No questions (for simplicity) |
| 0x00, 0x01, // 1 RR (answers) |
| 0x00, 0x00, // 0 authority RRs |
| 0x00, 0x00, // 0 additional RRs |
| |
| // "myhello.local." |
| 0x07, 'm', 'y', 'h', 'e', 'l', 'l', 'o', 0x05, 'l', 'o', 'c', 'a', 'l', |
| 0x00, |
| |
| 0x00, 0x21, // TYPE is SRV. |
| 0x00, 0x01, // CLASS is IN. |
| 0x00, 0x00, 0x00, 0x13, // TTL is 19 (seconds) |
| 0x00, 0x0f, // RDLENGTH is 15 bytes. |
| |
| 0x00, 0x05, // Priority 5 |
| 0x00, 0x01, // Weight 1 |
| 0x20, 0x49, // Port 8265 |
| |
| // "foo.com." |
| 0x03, 'f', 'o', 'o', 0x03, 'c', 'o', 'm', 0x00}; |
| |
| const uint8_t kMdnsResponseSrvUnrestricted[] = { |
| // Header |
| 0x00, 0x00, // ID is zeroed out |
| 0x81, 0x80, // Standard query response, RA, no error |
| 0x00, 0x00, // No questions (for simplicity) |
| 0x00, 0x01, // 1 RR (answers) |
| 0x00, 0x00, // 0 authority RRs |
| 0x00, 0x00, // 0 additional RRs |
| |
| // "foo bar(A1B2)._ipps._tcp.local" |
| 0x0d, 'f', 'o', 'o', ' ', 'b', 'a', 'r', '(', 'A', '1', 'B', '2', ')', 0x05, |
| '_', 'i', 'p', 'p', 's', 0x04, '_', 't', 'c', 'p', 0x05, 'l', 'o', 'c', 'a', |
| 'l', 0x00, |
| |
| 0x00, 0x21, // TYPE is SRV. |
| 0x00, 0x01, // CLASS is IN. |
| 0x00, 0x00, 0x00, 0x13, // TTL is 19 (seconds) |
| 0x00, 0x0f, // RDLENGTH is 15 bytes. |
| |
| 0x00, 0x05, // Priority 5 |
| 0x00, 0x01, // Weight 1 |
| 0x20, 0x49, // Port 8265 |
| |
| // "foo.com." |
| 0x03, 'f', 'o', 'o', 0x03, 'c', 'o', 'm', 0x00}; |
| |
| const uint8_t kMdnsResponseSrvUnrestrictedResult[] = { |
| // Header |
| 0x00, 0x00, // ID is zeroed out |
| 0x81, 0x80, // Standard query response, RA, no error |
| 0x00, 0x00, // No questions (for simplicity) |
| 0x00, 0x01, // 1 RR (answers) |
| 0x00, 0x00, // 0 authority RRs |
| 0x00, 0x00, // 0 additional RRs |
| |
| // "myhello.local." |
| 0x07, 'm', 'y', 'h', 'e', 'l', 'l', 'o', 0x05, 'l', 'o', 'c', 'a', 'l', |
| 0x00, |
| |
| 0x00, 0x21, // TYPE is SRV. |
| 0x00, 0x01, // CLASS is IN. |
| 0x00, 0x00, 0x00, 0x13, // TTL is 19 (seconds) |
| 0x00, 0x15, // RDLENGTH is 21 bytes. |
| |
| 0x00, 0x05, // Priority 5 |
| 0x00, 0x01, // Weight 1 |
| 0x20, 0x49, // Port 8265 |
| |
| // "foo bar.local" |
| 0x07, 'f', 'o', 'o', ' ', 'b', 'a', 'r', 0x05, 'l', 'o', 'c', 'a', 'l', |
| 0x00}; |
| |
| TEST_F(HostResolverManagerTest, Mdns) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| // 2 socket creations for every transaction. |
| EXPECT_CALL(*socket_factory_ptr, OnSendTo(_)).Times(4); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.source = HostResolverSource::MULTICAST_DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("myhello.local", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| socket_factory_ptr->SimulateReceive(kMdnsResponseA, sizeof(kMdnsResponseA)); |
| socket_factory_ptr->SimulateReceive(kMdnsResponseAAAA, |
| sizeof(kMdnsResponseAAAA)); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT( |
| response.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre( |
| CreateExpected("1.2.3.4", 80), |
| CreateExpected("000a:0000:0000:0000:0001:0002:0003:0004", 80))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("000a:0000:0000:0000:0001:0002:0003:0004", 80), |
| CreateExpected("1.2.3.4", 80)))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerTest, Mdns_AaaaOnly) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| // 2 socket creations for every transaction. |
| EXPECT_CALL(*socket_factory_ptr, OnSendTo(_)).Times(2); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::AAAA; |
| parameters.source = HostResolverSource::MULTICAST_DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("myhello.local", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| socket_factory_ptr->SimulateReceive(kMdnsResponseAAAA, |
| sizeof(kMdnsResponseAAAA)); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected( |
| "000a:0000:0000:0000:0001:0002:0003:0004", 80))); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre( |
| ExpectEndpointResult(testing::ElementsAre(CreateExpected( |
| "000a:0000:0000:0000:0001:0002:0003:0004", 80)))))); |
| } |
| |
| TEST_F(HostResolverManagerTest, Mdns_Txt) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| // 2 socket creations for every transaction. |
| EXPECT_CALL(*socket_factory_ptr, OnSendTo(_)).Times(2); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::TXT; |
| parameters.source = HostResolverSource::MULTICAST_DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("myhello.local", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| socket_factory_ptr->SimulateReceive(kMdnsResponseTxt, |
| sizeof(kMdnsResponseTxt)); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_THAT(response.request()->GetTextResults(), |
| testing::Optional(testing::ElementsAre("foo", "bar"))); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerTest, Mdns_Ptr) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| // 2 socket creations for every transaction. |
| EXPECT_CALL(*socket_factory_ptr, OnSendTo(_)).Times(2); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::PTR; |
| parameters.source = HostResolverSource::MULTICAST_DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("myhello.local", 83), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| socket_factory_ptr->SimulateReceive(kMdnsResponsePtr, |
| sizeof(kMdnsResponsePtr)); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| EXPECT_THAT( |
| response.request()->GetHostnameResults(), |
| testing::Optional(testing::ElementsAre(HostPortPair("foo.com", 83)))); |
| } |
| |
| TEST_F(HostResolverManagerTest, Mdns_Srv) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| // 2 socket creations for every transaction. |
| EXPECT_CALL(*socket_factory_ptr, OnSendTo(_)).Times(2); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::SRV; |
| parameters.source = HostResolverSource::MULTICAST_DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("myhello.local", 83), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| socket_factory_ptr->SimulateReceive(kMdnsResponseSrv, |
| sizeof(kMdnsResponseSrv)); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| EXPECT_THAT( |
| response.request()->GetHostnameResults(), |
| testing::Optional(testing::ElementsAre(HostPortPair("foo.com", 8265)))); |
| } |
| |
| // Test that we are able to create multicast DNS requests that contain |
| // characters not permitted in the DNS spec such as spaces and parenthesis. |
| TEST_F(HostResolverManagerTest, Mdns_Srv_Unrestricted) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::SRV; |
| parameters.source = HostResolverSource::MULTICAST_DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("foo bar(A1B2)._ipps._tcp.local", 83), |
| NetworkAnonymizationKey(), NetLogWithSource(), parameters, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| socket_factory_ptr->SimulateReceive(kMdnsResponseSrvUnrestricted, |
| sizeof(kMdnsResponseSrvUnrestricted)); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| EXPECT_THAT( |
| response.request()->GetHostnameResults(), |
| testing::Optional(testing::ElementsAre(HostPortPair("foo.com", 8265)))); |
| } |
| |
| // Test that we are able to create multicast DNS requests that contain |
| // characters not permitted in the DNS spec such as spaces and parenthesis. |
| TEST_F(HostResolverManagerTest, Mdns_Srv_Result_Unrestricted) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::SRV; |
| parameters.source = HostResolverSource::MULTICAST_DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("myhello.local", 83), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| socket_factory_ptr->SimulateReceive( |
| kMdnsResponseSrvUnrestrictedResult, |
| sizeof(kMdnsResponseSrvUnrestrictedResult)); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| EXPECT_THAT(response.request()->GetHostnameResults(), |
| testing::Optional( |
| testing::ElementsAre(HostPortPair("foo bar.local", 8265)))); |
| } |
| |
| // Test multicast DNS handling of NSEC responses (used for explicit negative |
| // response). |
| TEST_F(HostResolverManagerTest, Mdns_Nsec) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| // 2 socket creations for every transaction. |
| EXPECT_CALL(*socket_factory_ptr, OnSendTo(_)).Times(2); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::AAAA; |
| parameters.source = HostResolverSource::MULTICAST_DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("myhello.local", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| socket_factory_ptr->SimulateReceive(kMdnsResponseNsec, |
| sizeof(kMdnsResponseNsec)); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| } |
| |
| TEST_F(HostResolverManagerTest, Mdns_NoResponse) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| // 2 socket creations for every transaction. |
| EXPECT_CALL(*socket_factory_ptr, OnSendTo(_)).Times(4); |
| |
| // Add a little bit of extra fudge to the delay to allow reasonable |
| // flexibility for time > vs >= etc. We don't need to fail the test if we |
| // timeout at t=6001 instead of t=6000. |
| base::TimeDelta kSleepFudgeFactor = base::Milliseconds(1); |
| |
| // Override the current thread task runner, so we can simulate the passage of |
| // time to trigger the timeout. |
| auto test_task_runner = base::MakeRefCounted<base::TestMockTimeTaskRunner>(); |
| base::SingleThreadTaskRunner::CurrentHandleOverrideForTesting |
| task_runner_current_default_handle_override(test_task_runner); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.source = HostResolverSource::MULTICAST_DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("myhello.local", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| ASSERT_TRUE(test_task_runner->HasPendingTask()); |
| test_task_runner->FastForwardBy(MDnsTransaction::kTransactionTimeout + |
| kSleepFudgeFactor); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| test_task_runner->FastForwardUntilNoTasksRemain(); |
| } |
| |
| TEST_F(HostResolverManagerTest, Mdns_WrongType) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| // 2 socket creations for every transaction. |
| EXPECT_CALL(*socket_factory_ptr, OnSendTo(_)).Times(2); |
| |
| // Add a little bit of extra fudge to the delay to allow reasonable |
| // flexibility for time > vs >= etc. We don't need to fail the test if we |
| // timeout at t=6001 instead of t=6000. |
| base::TimeDelta kSleepFudgeFactor = base::Milliseconds(1); |
| |
| // Override the current thread task runner, so we can simulate the passage of |
| // time to trigger the timeout. |
| auto test_task_runner = base::MakeRefCounted<base::TestMockTimeTaskRunner>(); |
| base::SingleThreadTaskRunner::CurrentHandleOverrideForTesting |
| task_runner_current_default_handle_override(test_task_runner); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::A; |
| parameters.source = HostResolverSource::MULTICAST_DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("myhello.local", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| // Not the requested type. Should be ignored. |
| socket_factory_ptr->SimulateReceive(kMdnsResponseTxt, |
| sizeof(kMdnsResponseTxt)); |
| |
| ASSERT_TRUE(test_task_runner->HasPendingTask()); |
| test_task_runner->FastForwardBy(MDnsTransaction::kTransactionTimeout + |
| kSleepFudgeFactor); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| test_task_runner->FastForwardUntilNoTasksRemain(); |
| } |
| |
| // Test for a request for both A and AAAA results where results only exist for |
| // one type. |
| TEST_F(HostResolverManagerTest, Mdns_PartialResults) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| // 2 socket creations for every transaction. |
| EXPECT_CALL(*socket_factory_ptr, OnSendTo(_)).Times(4); |
| |
| // Add a little bit of extra fudge to the delay to allow reasonable |
| // flexibility for time > vs >= etc. We don't need to fail the test if we |
| // timeout at t=6001 instead of t=6000. |
| base::TimeDelta kSleepFudgeFactor = base::Milliseconds(1); |
| |
| // Override the current thread task runner, so we can simulate the passage of |
| // time to trigger the timeout. |
| auto test_task_runner = base::MakeRefCounted<base::TestMockTimeTaskRunner>(); |
| base::SingleThreadTaskRunner::CurrentHandleOverrideForTesting |
| task_runner_current_default_handle_override(test_task_runner); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.source = HostResolverSource::MULTICAST_DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("myhello.local", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| ASSERT_TRUE(test_task_runner->HasPendingTask()); |
| |
| socket_factory_ptr->SimulateReceive(kMdnsResponseA, sizeof(kMdnsResponseA)); |
| test_task_runner->FastForwardBy(MDnsTransaction::kTransactionTimeout + |
| kSleepFudgeFactor); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("1.2.3.4", 80))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::UnorderedElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("1.2.3.4", 80)))))); |
| |
| test_task_runner->FastForwardUntilNoTasksRemain(); |
| } |
| |
| TEST_F(HostResolverManagerTest, Mdns_Cancel) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| // 2 socket creations for every transaction. |
| EXPECT_CALL(*socket_factory_ptr, OnSendTo(_)).Times(4); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.source = HostResolverSource::MULTICAST_DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("myhello.local", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| response.CancelRequest(); |
| |
| socket_factory_ptr->SimulateReceive(kMdnsResponseA, sizeof(kMdnsResponseA)); |
| socket_factory_ptr->SimulateReceive(kMdnsResponseAAAA, |
| sizeof(kMdnsResponseAAAA)); |
| |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| } |
| |
| // Test for a two-transaction query where the first fails to start. The second |
| // should be cancelled. |
| TEST_F(HostResolverManagerTest, Mdns_PartialFailure) { |
| // Setup a mock MDnsClient where the first transaction will always return |
| // |false| immediately on Start(). Second transaction may or may not be |
| // created, but if it is, Start() not expected to be called because the |
| // overall request should immediately fail. |
| auto transaction1 = std::make_unique<MockMDnsTransaction>(); |
| EXPECT_CALL(*transaction1, Start()).WillOnce(Return(false)); |
| auto transaction2 = std::make_unique<MockMDnsTransaction>(); |
| EXPECT_CALL(*transaction2, Start()).Times(0); |
| |
| auto client = std::make_unique<MockMDnsClient>(); |
| EXPECT_CALL(*client, CreateTransaction(_, _, _, _)) |
| .Times(Between(1, 2)) // Second transaction optionally created. |
| .WillOnce(Return(ByMove(std::move(transaction1)))) |
| .WillOnce(Return(ByMove(std::move(transaction2)))); |
| EXPECT_CALL(*client, IsListening()).WillRepeatedly(Return(true)); |
| resolver_->SetMdnsClientForTesting(std::move(client)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.source = HostResolverSource::MULTICAST_DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("myhello.local", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_FAILED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| } |
| |
| TEST_F(HostResolverManagerTest, Mdns_ListenFailure) { |
| // Inject an MdnsClient mock that will always fail to start listening. |
| auto client = std::make_unique<MockMDnsClient>(); |
| EXPECT_CALL(*client, StartListening(_)).WillOnce(Return(ERR_FAILED)); |
| EXPECT_CALL(*client, IsListening()).WillRepeatedly(Return(false)); |
| resolver_->SetMdnsClientForTesting(std::move(client)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.source = HostResolverSource::MULTICAST_DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("myhello.local", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_FAILED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| } |
| |
| // Implementation of HostResolver::MdnsListenerDelegate that records all |
| // received results in maps. |
| class TestMdnsListenerDelegate : public HostResolver::MdnsListener::Delegate { |
| public: |
| using UpdateKey = std::pair<MdnsListenerUpdateType, DnsQueryType>; |
| |
| void OnAddressResult(MdnsListenerUpdateType update_type, |
| DnsQueryType result_type, |
| IPEndPoint address) override { |
| address_results_.insert({{update_type, result_type}, address}); |
| } |
| |
| void OnTextResult(MdnsListenerUpdateType update_type, |
| DnsQueryType result_type, |
| std::vector<std::string> text_records) override { |
| for (auto& text_record : text_records) { |
| text_results_.insert( |
| {{update_type, result_type}, std::move(text_record)}); |
| } |
| } |
| |
| void OnHostnameResult(MdnsListenerUpdateType update_type, |
| DnsQueryType result_type, |
| HostPortPair host) override { |
| hostname_results_.insert({{update_type, result_type}, std::move(host)}); |
| } |
| |
| void OnUnhandledResult(MdnsListenerUpdateType update_type, |
| DnsQueryType result_type) override { |
| unhandled_results_.insert({update_type, result_type}); |
| } |
| |
| const std::multimap<UpdateKey, IPEndPoint>& address_results() { |
| return address_results_; |
| } |
| |
| const std::multimap<UpdateKey, std::string>& text_results() { |
| return text_results_; |
| } |
| |
| const std::multimap<UpdateKey, HostPortPair>& hostname_results() { |
| return hostname_results_; |
| } |
| |
| const std::multiset<UpdateKey>& unhandled_results() { |
| return unhandled_results_; |
| } |
| |
| template <typename T> |
| static std::pair<UpdateKey, T> CreateExpectedResult( |
| MdnsListenerUpdateType update_type, |
| DnsQueryType query_type, |
| T result) { |
| return std::make_pair(std::make_pair(update_type, query_type), result); |
| } |
| |
| private: |
| std::multimap<UpdateKey, IPEndPoint> address_results_; |
| std::multimap<UpdateKey, std::string> text_results_; |
| std::multimap<UpdateKey, HostPortPair> hostname_results_; |
| std::multiset<UpdateKey> unhandled_results_; |
| }; |
| |
| TEST_F(HostResolverManagerTest, MdnsListener) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| base::SimpleTestClock clock; |
| clock.SetNow(base::Time::Now()); |
| auto cache_cleanup_timer = std::make_unique<base::MockOneShotTimer>(); |
| auto* cache_cleanup_timer_ptr = cache_cleanup_timer.get(); |
| auto mdns_client = |
| std::make_unique<MDnsClientImpl>(&clock, std::move(cache_cleanup_timer)); |
| ASSERT_THAT(mdns_client->StartListening(socket_factory.get()), IsOk()); |
| resolver_->SetMdnsClientForTesting(std::move(mdns_client)); |
| |
| TestMdnsListenerDelegate delegate; |
| std::unique_ptr<HostResolver::MdnsListener> listener = |
| resolver_->CreateMdnsListener(HostPortPair("myhello.local", 80), |
| DnsQueryType::A); |
| |
| ASSERT_THAT(listener->Start(&delegate), IsOk()); |
| ASSERT_THAT(delegate.address_results(), testing::IsEmpty()); |
| |
| socket_factory->SimulateReceive(kMdnsResponseA, sizeof(kMdnsResponseA)); |
| socket_factory->SimulateReceive(kMdnsResponseA2, sizeof(kMdnsResponseA2)); |
| socket_factory->SimulateReceive(kMdnsResponseA2Goodbye, |
| sizeof(kMdnsResponseA2Goodbye)); |
| |
| // Per RFC6762 section 10.1, removals take effect 1 second after receiving the |
| // goodbye message. |
| clock.Advance(base::Seconds(1)); |
| cache_cleanup_timer_ptr->Fire(); |
| |
| // Expect 1 record adding "1.2.3.4", another changing to "5.6.7.8", and a |
| // final removing "5.6.7.8". |
| EXPECT_THAT(delegate.address_results(), |
| testing::ElementsAre( |
| TestMdnsListenerDelegate::CreateExpectedResult( |
| MdnsListenerUpdateType::kAdded, DnsQueryType::A, |
| CreateExpected("1.2.3.4", 80)), |
| TestMdnsListenerDelegate::CreateExpectedResult( |
| MdnsListenerUpdateType::kChanged, DnsQueryType::A, |
| CreateExpected("5.6.7.8", 80)), |
| TestMdnsListenerDelegate::CreateExpectedResult( |
| MdnsListenerUpdateType::kRemoved, DnsQueryType::A, |
| CreateExpected("5.6.7.8", 80)))); |
| |
| EXPECT_THAT(delegate.text_results(), testing::IsEmpty()); |
| EXPECT_THAT(delegate.hostname_results(), testing::IsEmpty()); |
| EXPECT_THAT(delegate.unhandled_results(), testing::IsEmpty()); |
| } |
| |
| TEST_F(HostResolverManagerTest, MdnsListener_StartListenFailure) { |
| // Inject an MdnsClient mock that will always fail to start listening. |
| auto client = std::make_unique<MockMDnsClient>(); |
| EXPECT_CALL(*client, StartListening(_)).WillOnce(Return(ERR_TIMED_OUT)); |
| EXPECT_CALL(*client, IsListening()).WillRepeatedly(Return(false)); |
| resolver_->SetMdnsClientForTesting(std::move(client)); |
| |
| TestMdnsListenerDelegate delegate; |
| std::unique_ptr<HostResolver::MdnsListener> listener = |
| resolver_->CreateMdnsListener(HostPortPair("myhello.local", 80), |
| DnsQueryType::A); |
| |
| EXPECT_THAT(listener->Start(&delegate), IsError(ERR_TIMED_OUT)); |
| EXPECT_THAT(delegate.address_results(), testing::IsEmpty()); |
| } |
| |
| // Test that removal notifications are sent on natural expiration of MDNS |
| // records. |
| TEST_F(HostResolverManagerTest, MdnsListener_Expiration) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| base::SimpleTestClock clock; |
| clock.SetNow(base::Time::Now()); |
| auto cache_cleanup_timer = std::make_unique<base::MockOneShotTimer>(); |
| auto* cache_cleanup_timer_ptr = cache_cleanup_timer.get(); |
| auto mdns_client = |
| std::make_unique<MDnsClientImpl>(&clock, std::move(cache_cleanup_timer)); |
| ASSERT_THAT(mdns_client->StartListening(socket_factory.get()), IsOk()); |
| resolver_->SetMdnsClientForTesting(std::move(mdns_client)); |
| |
| TestMdnsListenerDelegate delegate; |
| std::unique_ptr<HostResolver::MdnsListener> listener = |
| resolver_->CreateMdnsListener(HostPortPair("myhello.local", 100), |
| DnsQueryType::A); |
| |
| ASSERT_THAT(listener->Start(&delegate), IsOk()); |
| ASSERT_THAT(delegate.address_results(), testing::IsEmpty()); |
| |
| socket_factory->SimulateReceive(kMdnsResponseA, sizeof(kMdnsResponseA)); |
| |
| EXPECT_THAT( |
| delegate.address_results(), |
| testing::ElementsAre(TestMdnsListenerDelegate::CreateExpectedResult( |
| MdnsListenerUpdateType::kAdded, DnsQueryType::A, |
| CreateExpected("1.2.3.4", 100)))); |
| |
| clock.Advance(base::Seconds(16)); |
| cache_cleanup_timer_ptr->Fire(); |
| |
| EXPECT_THAT(delegate.address_results(), |
| testing::ElementsAre( |
| TestMdnsListenerDelegate::CreateExpectedResult( |
| MdnsListenerUpdateType::kAdded, DnsQueryType::A, |
| CreateExpected("1.2.3.4", 100)), |
| TestMdnsListenerDelegate::CreateExpectedResult( |
| MdnsListenerUpdateType::kRemoved, DnsQueryType::A, |
| CreateExpected("1.2.3.4", 100)))); |
| |
| EXPECT_THAT(delegate.text_results(), testing::IsEmpty()); |
| EXPECT_THAT(delegate.hostname_results(), testing::IsEmpty()); |
| EXPECT_THAT(delegate.unhandled_results(), testing::IsEmpty()); |
| } |
| |
| TEST_F(HostResolverManagerTest, MdnsListener_Txt) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| |
| TestMdnsListenerDelegate delegate; |
| std::unique_ptr<HostResolver::MdnsListener> listener = |
| resolver_->CreateMdnsListener(HostPortPair("myhello.local", 12), |
| DnsQueryType::TXT); |
| |
| ASSERT_THAT(listener->Start(&delegate), IsOk()); |
| ASSERT_THAT(delegate.text_results(), testing::IsEmpty()); |
| |
| socket_factory_ptr->SimulateReceive(kMdnsResponseTxt, |
| sizeof(kMdnsResponseTxt)); |
| |
| EXPECT_THAT( |
| delegate.text_results(), |
| testing::ElementsAre( |
| TestMdnsListenerDelegate::CreateExpectedResult( |
| MdnsListenerUpdateType::kAdded, DnsQueryType::TXT, "foo"), |
| TestMdnsListenerDelegate::CreateExpectedResult( |
| MdnsListenerUpdateType::kAdded, DnsQueryType::TXT, "bar"))); |
| |
| EXPECT_THAT(delegate.address_results(), testing::IsEmpty()); |
| EXPECT_THAT(delegate.hostname_results(), testing::IsEmpty()); |
| EXPECT_THAT(delegate.unhandled_results(), testing::IsEmpty()); |
| } |
| |
| TEST_F(HostResolverManagerTest, MdnsListener_Ptr) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| |
| TestMdnsListenerDelegate delegate; |
| std::unique_ptr<HostResolver::MdnsListener> listener = |
| resolver_->CreateMdnsListener(HostPortPair("myhello.local", 13), |
| DnsQueryType::PTR); |
| |
| ASSERT_THAT(listener->Start(&delegate), IsOk()); |
| ASSERT_THAT(delegate.text_results(), testing::IsEmpty()); |
| |
| socket_factory_ptr->SimulateReceive(kMdnsResponsePtr, |
| sizeof(kMdnsResponsePtr)); |
| |
| EXPECT_THAT( |
| delegate.hostname_results(), |
| testing::ElementsAre(TestMdnsListenerDelegate::CreateExpectedResult( |
| MdnsListenerUpdateType::kAdded, DnsQueryType::PTR, |
| HostPortPair("foo.com", 13)))); |
| |
| EXPECT_THAT(delegate.address_results(), testing::IsEmpty()); |
| EXPECT_THAT(delegate.text_results(), testing::IsEmpty()); |
| EXPECT_THAT(delegate.unhandled_results(), testing::IsEmpty()); |
| } |
| |
| TEST_F(HostResolverManagerTest, MdnsListener_Srv) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| |
| TestMdnsListenerDelegate delegate; |
| std::unique_ptr<HostResolver::MdnsListener> listener = |
| resolver_->CreateMdnsListener(HostPortPair("myhello.local", 14), |
| DnsQueryType::SRV); |
| |
| ASSERT_THAT(listener->Start(&delegate), IsOk()); |
| ASSERT_THAT(delegate.text_results(), testing::IsEmpty()); |
| |
| socket_factory_ptr->SimulateReceive(kMdnsResponseSrv, |
| sizeof(kMdnsResponseSrv)); |
| |
| EXPECT_THAT( |
| delegate.hostname_results(), |
| testing::ElementsAre(TestMdnsListenerDelegate::CreateExpectedResult( |
| MdnsListenerUpdateType::kAdded, DnsQueryType::SRV, |
| HostPortPair("foo.com", 8265)))); |
| |
| EXPECT_THAT(delegate.address_results(), testing::IsEmpty()); |
| EXPECT_THAT(delegate.text_results(), testing::IsEmpty()); |
| EXPECT_THAT(delegate.unhandled_results(), testing::IsEmpty()); |
| } |
| |
| // Ensure query types we are not listening for do not affect MdnsListener. |
| TEST_F(HostResolverManagerTest, MdnsListener_NonListeningTypes) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| |
| TestMdnsListenerDelegate delegate; |
| std::unique_ptr<HostResolver::MdnsListener> listener = |
| resolver_->CreateMdnsListener(HostPortPair("myhello.local", 41), |
| DnsQueryType::A); |
| |
| ASSERT_THAT(listener->Start(&delegate), IsOk()); |
| |
| socket_factory_ptr->SimulateReceive(kMdnsResponseAAAA, |
| sizeof(kMdnsResponseAAAA)); |
| |
| EXPECT_THAT(delegate.address_results(), testing::IsEmpty()); |
| EXPECT_THAT(delegate.text_results(), testing::IsEmpty()); |
| EXPECT_THAT(delegate.hostname_results(), testing::IsEmpty()); |
| EXPECT_THAT(delegate.unhandled_results(), testing::IsEmpty()); |
| } |
| |
| TEST_F(HostResolverManagerTest, MdnsListener_RootDomain) { |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| |
| TestMdnsListenerDelegate delegate; |
| std::unique_ptr<HostResolver::MdnsListener> listener = |
| resolver_->CreateMdnsListener(HostPortPair("myhello.local", 5), |
| DnsQueryType::PTR); |
| |
| ASSERT_THAT(listener->Start(&delegate), IsOk()); |
| |
| socket_factory_ptr->SimulateReceive(kMdnsResponsePtrRoot, |
| sizeof(kMdnsResponsePtrRoot)); |
| |
| EXPECT_THAT(delegate.unhandled_results(), |
| testing::ElementsAre(std::make_pair( |
| MdnsListenerUpdateType::kAdded, DnsQueryType::PTR))); |
| |
| EXPECT_THAT(delegate.address_results(), testing::IsEmpty()); |
| EXPECT_THAT(delegate.text_results(), testing::IsEmpty()); |
| EXPECT_THAT(delegate.hostname_results(), testing::IsEmpty()); |
| } |
| #endif // BUILDFLAG(ENABLE_MDNS) |
| |
| DnsConfig CreateValidDnsConfig() { |
| IPAddress dns_ip(192, 168, 1, 0); |
| DnsConfig config; |
| config.nameservers.emplace_back(dns_ip, dns_protocol::kDefaultPort); |
| config.doh_config = |
| *DnsOverHttpsConfig::FromString("https://dns.example.com/"); |
| config.secure_dns_mode = SecureDnsMode::kOff; |
| EXPECT_TRUE(config.IsValid()); |
| return config; |
| } |
| |
| DnsConfig CreateUpgradableDnsConfig() { |
| DnsConfig config; |
| config.secure_dns_mode = SecureDnsMode::kAutomatic; |
| config.allow_dns_over_https_upgrade = true; |
| |
| auto ProviderHasAddr = [](base::StringPiece provider, const IPAddress& addr) { |
| return base::Contains(GetDohProviderEntryForTesting(provider).ip_addresses, |
| addr); |
| }; |
| |
| // Cloudflare upgradeable IPs |
| IPAddress dns_ip0(1, 0, 0, 1); |
| IPAddress dns_ip1; |
| EXPECT_TRUE(dns_ip1.AssignFromIPLiteral("2606:4700:4700::1111")); |
| EXPECT_TRUE(ProviderHasAddr("Cloudflare", dns_ip0)); |
| EXPECT_TRUE(ProviderHasAddr("Cloudflare", dns_ip1)); |
| // CleanBrowsingFamily upgradeable IP |
| IPAddress dns_ip2; |
| EXPECT_TRUE(dns_ip2.AssignFromIPLiteral("2a0d:2a00:2::")); |
| EXPECT_TRUE(ProviderHasAddr("CleanBrowsingFamily", dns_ip2)); |
| // CleanBrowsingSecure upgradeable IP |
| IPAddress dns_ip3(185, 228, 169, 9); |
| EXPECT_TRUE(ProviderHasAddr("CleanBrowsingSecure", dns_ip3)); |
| // Non-upgradeable IP |
| IPAddress dns_ip4(1, 2, 3, 4); |
| |
| config.nameservers = { |
| IPEndPoint(dns_ip0, dns_protocol::kDefaultPort), |
| IPEndPoint(dns_ip1, dns_protocol::kDefaultPort), |
| IPEndPoint(dns_ip2, 54), |
| IPEndPoint(dns_ip3, dns_protocol::kDefaultPort), |
| IPEndPoint(dns_ip4, dns_protocol::kDefaultPort), |
| }; |
| EXPECT_TRUE(config.IsValid()); |
| return config; |
| } |
| |
| // Check that entries are written to the cache with the right NIK. |
| TEST_F(HostResolverManagerTest, NetworkAnonymizationKeyWriteToHostCache) { |
| const SchemefulSite kSite1(GURL("https://origin1.test/")); |
| const SchemefulSite kSite2(GURL("https://origin2.test/")); |
| auto kNetworkAnonymizationKey1 = |
| net::NetworkAnonymizationKey::CreateSameSite(kSite1); |
| auto kNetworkAnonymizationKey2 = |
| net::NetworkAnonymizationKey::CreateSameSite(kSite2); |
| |
| const char kFirstDnsResult[] = "192.168.1.42"; |
| const char kSecondDnsResult[] = "192.168.1.43"; |
| |
| for (bool split_cache_by_network_anonymization_key : {false, true}) { |
| base::test::ScopedFeatureList feature_list; |
| if (split_cache_by_network_anonymization_key) { |
| feature_list.InitAndEnableFeature( |
| features::kSplitHostCacheByNetworkIsolationKey); |
| } else { |
| feature_list.InitAndDisableFeature( |
| features::kSplitHostCacheByNetworkIsolationKey); |
| } |
| proc_->AddRuleForAllFamilies("just.testing", kFirstDnsResult); |
| proc_->SignalMultiple(1u); |
| |
| // Resolve a host using kNetworkAnonymizationKey1. |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), kNetworkAnonymizationKey1, |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response1.result_error(), IsOk()); |
| EXPECT_THAT(response1.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected(kFirstDnsResult, 80))); |
| EXPECT_THAT( |
| response1.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected(kFirstDnsResult, 80)))))); |
| EXPECT_FALSE(response1.request()->GetStaleInfo()); |
| EXPECT_EQ(1u, proc_->GetCaptureList().size()); |
| |
| // If the host cache is being split by NetworkAnonymizationKeys, there |
| // should be an entry in the HostCache with kNetworkAnonymizationKey1. |
| // Otherwise, there should be an entry with the empty NAK. |
| if (split_cache_by_network_anonymization_key) { |
| EXPECT_TRUE(GetCacheHit( |
| HostCache::Key("just.testing", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| kNetworkAnonymizationKey1))); |
| |
| EXPECT_FALSE(GetCacheHit( |
| HostCache::Key("just.testing", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| NetworkAnonymizationKey()))); |
| } else { |
| EXPECT_FALSE(GetCacheHit( |
| HostCache::Key("just.testing", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| kNetworkAnonymizationKey1))); |
| |
| EXPECT_TRUE(GetCacheHit( |
| HostCache::Key("just.testing", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| NetworkAnonymizationKey()))); |
| } |
| |
| // There should be no entry using kNetworkAnonymizationKey2 in either case. |
| EXPECT_FALSE(GetCacheHit(HostCache::Key( |
| "just.testing", DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, kNetworkAnonymizationKey2))); |
| |
| // A request using kNetworkAnonymizationKey2 should only be served out of |
| // the cache of the cache if |split_cache_by_network_anonymization_key| is |
| // false. If it's not served over the network, it is provided a different |
| // result. |
| if (split_cache_by_network_anonymization_key) { |
| proc_->AddRuleForAllFamilies("just.testing", kSecondDnsResult); |
| proc_->SignalMultiple(1u); |
| } |
| ResolveHostResponseHelper response2(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), kNetworkAnonymizationKey2, |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response2.result_error(), IsOk()); |
| if (split_cache_by_network_anonymization_key) { |
| EXPECT_THAT(response2.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected(kSecondDnsResult, 80))); |
| EXPECT_THAT( |
| response2.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected(kSecondDnsResult, 80)))))); |
| EXPECT_FALSE(response2.request()->GetStaleInfo()); |
| EXPECT_EQ(2u, proc_->GetCaptureList().size()); |
| EXPECT_TRUE(GetCacheHit( |
| HostCache::Key("just.testing", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| kNetworkAnonymizationKey2))); |
| } else { |
| EXPECT_THAT(response2.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected(kFirstDnsResult, 80))); |
| EXPECT_THAT( |
| response2.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected(kFirstDnsResult, 80)))))); |
| EXPECT_TRUE(response2.request()->GetStaleInfo()); |
| EXPECT_EQ(1u, proc_->GetCaptureList().size()); |
| EXPECT_FALSE(GetCacheHit( |
| HostCache::Key("just.testing", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| kNetworkAnonymizationKey2))); |
| } |
| |
| resolve_context_->host_cache()->clear(); |
| proc_->ClearCaptureList(); |
| } |
| } |
| |
| // Check that entries are read to the cache with the right NIK. |
| TEST_F(HostResolverManagerTest, NetworkAnonymizationKeyReadFromHostCache) { |
| const SchemefulSite kSite1(GURL("https://origin1.test/")); |
| const SchemefulSite kSite2(GURL("https://origin2.test/")); |
| auto kNetworkAnonymizationKey1 = |
| net::NetworkAnonymizationKey::CreateSameSite(kSite1); |
| auto kNetworkAnonymizationKey2 = |
| net::NetworkAnonymizationKey::CreateSameSite(kSite2); |
| |
| struct CacheEntry { |
| NetworkAnonymizationKey network_anonymization_key; |
| const char* cached_ip_address; |
| }; |
| |
| const CacheEntry kCacheEntries[] = { |
| {NetworkAnonymizationKey(), "192.168.1.42"}, |
| {kNetworkAnonymizationKey1, "192.168.1.43"}, |
| {kNetworkAnonymizationKey2, "192.168.1.44"}, |
| }; |
| |
| // Add entries to cache for the empty NIK, NIK1, and NIK2. Only the |
| // HostResolverManager obeys network state partitioning, so this is fine to do |
| // regardless of the feature value. |
| for (const auto& cache_entry : kCacheEntries) { |
| HostCache::Key key("just.testing", DnsQueryType::UNSPECIFIED, 0, |
| HostResolverSource::ANY, |
| cache_entry.network_anonymization_key); |
| IPAddress address; |
| ASSERT_TRUE(address.AssignFromIPLiteral(cache_entry.cached_ip_address)); |
| HostCache::Entry entry = HostCache::Entry( |
| OK, {{address, 80}}, /*aliases=*/{}, HostCache::Entry::SOURCE_UNKNOWN); |
| resolve_context_->host_cache()->Set(key, entry, base::TimeTicks::Now(), |
| base::Days(1)); |
| } |
| |
| for (bool split_cache_by_network_anonymization_key : {false, true}) { |
| base::test::ScopedFeatureList feature_list; |
| if (split_cache_by_network_anonymization_key) { |
| feature_list.InitAndEnableFeature( |
| features::kSplitHostCacheByNetworkIsolationKey); |
| } else { |
| feature_list.InitAndDisableFeature( |
| features::kSplitHostCacheByNetworkIsolationKey); |
| } |
| |
| // A request that uses kNetworkAnonymizationKey1 will return cache entry 1 |
| // if the NetworkAnonymizationKeys are being used, and cache entry 0 |
| // otherwise. |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), kNetworkAnonymizationKey1, |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response1.result_error(), IsOk()); |
| EXPECT_THAT( |
| response1.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected( |
| kCacheEntries[split_cache_by_network_anonymization_key ? 1 : 0] |
| .cached_ip_address, |
| 80))); |
| EXPECT_THAT( |
| response1.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::ElementsAre(CreateExpected( |
| kCacheEntries[split_cache_by_network_anonymization_key ? 1 : 0] |
| .cached_ip_address, |
| 80)))))); |
| EXPECT_TRUE(response1.request()->GetStaleInfo()); |
| |
| // A request that uses kNetworkAnonymizationKey2 will return cache entry 2 |
| // if the NetworkAnonymizationKeys are being used, and cache entry 0 |
| // otherwise. |
| ResolveHostResponseHelper response2(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), kNetworkAnonymizationKey2, |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response2.result_error(), IsOk()); |
| EXPECT_THAT( |
| response2.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected( |
| kCacheEntries[split_cache_by_network_anonymization_key ? 2 : 0] |
| .cached_ip_address, |
| 80))); |
| EXPECT_THAT( |
| response2.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::ElementsAre(CreateExpected( |
| kCacheEntries[split_cache_by_network_anonymization_key ? 2 : 0] |
| .cached_ip_address, |
| 80)))))); |
| EXPECT_TRUE(response2.request()->GetStaleInfo()); |
| } |
| } |
| |
| // Test that two requests made with different NetworkAnonymizationKeys are not |
| // merged if network state partitioning is enabled. |
| TEST_F(HostResolverManagerTest, NetworkAnonymizationKeyTwoRequestsAtOnce) { |
| const SchemefulSite kSite1(GURL("https://origin1.test/")); |
| const SchemefulSite kSite2(GURL("https://origin2.test/")); |
| auto kNetworkAnonymizationKey1 = |
| net::NetworkAnonymizationKey::CreateSameSite(kSite1); |
| auto kNetworkAnonymizationKey2 = |
| net::NetworkAnonymizationKey::CreateSameSite(kSite2); |
| |
| const char kDnsResult[] = "192.168.1.42"; |
| |
| for (bool split_cache_by_network_anonymization_key : {false, true}) { |
| base::test::ScopedFeatureList feature_list; |
| if (split_cache_by_network_anonymization_key) { |
| feature_list.InitAndEnableFeature( |
| features::kSplitHostCacheByNetworkIsolationKey); |
| } else { |
| feature_list.InitAndDisableFeature( |
| features::kSplitHostCacheByNetworkIsolationKey); |
| } |
| proc_->AddRuleForAllFamilies("just.testing", kDnsResult); |
| |
| // Start resolving a host using kNetworkAnonymizationKey1. |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), kNetworkAnonymizationKey1, |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_FALSE(response1.complete()); |
| |
| // Start resolving the same host using kNetworkAnonymizationKey2. |
| ResolveHostResponseHelper response2(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), kNetworkAnonymizationKey2, |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_FALSE(response2.complete()); |
| |
| // Wait for and complete the expected number of over-the-wire DNS |
| // resolutions. |
| if (split_cache_by_network_anonymization_key) { |
| proc_->WaitFor(2); |
| EXPECT_EQ(2u, proc_->GetCaptureList().size()); |
| proc_->SignalMultiple(2u); |
| } else { |
| proc_->WaitFor(1); |
| EXPECT_EQ(1u, proc_->GetCaptureList().size()); |
| proc_->SignalMultiple(1u); |
| } |
| |
| // Both requests should have completed successfully, with neither served out |
| // of the cache. |
| |
| EXPECT_THAT(response1.result_error(), IsOk()); |
| EXPECT_THAT(response1.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected(kDnsResult, 80))); |
| EXPECT_THAT(response1.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected(kDnsResult, 80)))))); |
| EXPECT_FALSE(response1.request()->GetStaleInfo()); |
| |
| EXPECT_THAT(response2.result_error(), IsOk()); |
| EXPECT_THAT(response2.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected(kDnsResult, 80))); |
| EXPECT_THAT(response2.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected(kDnsResult, 80)))))); |
| EXPECT_FALSE(response2.request()->GetStaleInfo()); |
| |
| resolve_context_->host_cache()->clear(); |
| proc_->ClearCaptureList(); |
| } |
| } |
| |
| // Test that two otherwise-identical requests with different ResolveContexts are |
| // not merged. |
| TEST_F(HostResolverManagerTest, ContextsNotMerged) { |
| const char kDnsResult[] = "192.168.1.42"; |
| |
| proc_->AddRuleForAllFamilies("just.testing", kDnsResult); |
| |
| // Start resolving a host using |resolve_context_|. |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_FALSE(response1.complete()); |
| |
| // Start resolving the same host using another ResolveContext and cache. |
| ResolveContext resolve_context2(resolve_context_->url_request_context(), |
| true /* enable_caching */); |
| resolver_->RegisterResolveContext(&resolve_context2); |
| ResolveHostResponseHelper response2(resolver_->CreateRequest( |
| HostPortPair("just.testing", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, &resolve_context2, |
| resolve_context2.host_cache())); |
| EXPECT_FALSE(response2.complete()); |
| EXPECT_EQ(2u, resolver_->num_jobs_for_testing()); |
| |
| // Wait for and complete the 2 over-the-wire DNS resolutions. |
| proc_->WaitFor(2); |
| EXPECT_EQ(2u, proc_->GetCaptureList().size()); |
| proc_->SignalMultiple(2u); |
| |
| // Both requests should have completed successfully, with neither served out |
| // of the cache. |
| |
| EXPECT_THAT(response1.result_error(), IsOk()); |
| EXPECT_THAT(response1.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected(kDnsResult, 80))); |
| EXPECT_THAT(response1.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected(kDnsResult, 80)))))); |
| EXPECT_FALSE(response1.request()->GetStaleInfo()); |
| |
| EXPECT_THAT(response2.result_error(), IsOk()); |
| EXPECT_THAT(response2.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected(kDnsResult, 80))); |
| EXPECT_THAT(response2.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected(kDnsResult, 80)))))); |
| EXPECT_FALSE(response2.request()->GetStaleInfo()); |
| |
| EXPECT_EQ(1u, resolve_context_->host_cache()->size()); |
| EXPECT_EQ(1u, resolve_context2.host_cache()->size()); |
| |
| resolver_->DeregisterResolveContext(&resolve_context2); |
| } |
| |
| // Specialized fixture for tests of DnsTask. |
| class HostResolverManagerDnsTest : public HostResolverManagerTest { |
| public: |
| explicit HostResolverManagerDnsTest( |
| base::test::TaskEnvironment::TimeSource time_source = |
| base::test::TaskEnvironment::TimeSource::MOCK_TIME) |
| : HostResolverManagerTest(time_source), |
| notifier_task_runner_( |
| base::MakeRefCounted<base::TestMockTimeTaskRunner>()) { |
| auto config_service = std::make_unique<TestDnsConfigService>(); |
| config_service_ = config_service.get(); |
| notifier_ = std::make_unique<SystemDnsConfigChangeNotifier>( |
| notifier_task_runner_, std::move(config_service)); |
| } |
| |
| void Ipv6UnreachableTest(bool is_async); |
| void Ipv6UnreachableInvalidConfigTest(bool is_async); |
| |
| protected: |
| void TearDown() override { |
| HostResolverManagerTest::TearDown(); |
| InvalidateDnsConfig(); |
| |
| // Ensure |notifier_| is fully cleaned up before test shutdown. |
| notifier_.reset(); |
| notifier_task_runner_->RunUntilIdle(); |
| } |
| |
| // HostResolverManagerTest implementation: |
| HostResolver::ManagerOptions DefaultOptions() override { |
| HostResolver::ManagerOptions options = |
| HostResolverManagerTest::DefaultOptions(); |
| options.insecure_dns_client_enabled = true; |
| options.additional_types_via_insecure_dns_enabled = true; |
| return options; |
| } |
| |
| void CreateResolverWithOptionsAndParams( |
| HostResolver::ManagerOptions options, |
| const HostResolverSystemTask::Params& params, |
| bool ipv6_reachable, |
| bool is_async = false, |
| bool ipv4_reachable = true) override { |
| DestroyResolver(); |
| |
| resolver_ = std::make_unique<TestHostResolverManager>( |
| options, notifier_.get(), nullptr /* net_log */, ipv6_reachable, |
| ipv4_reachable, is_async); |
| auto dns_client = |
| std::make_unique<MockDnsClient>(DnsConfig(), CreateDefaultDnsRules()); |
| dns_client_ = dns_client.get(); |
| resolver_->SetDnsClientForTesting(std::move(dns_client)); |
| resolver_->SetInsecureDnsClientEnabled( |
| options.insecure_dns_client_enabled, |
| options.additional_types_via_insecure_dns_enabled); |
| resolver_->set_host_resolver_system_params_for_test(params); |
| resolver_->RegisterResolveContext(resolve_context_.get()); |
| } |
| |
| // Call after CreateResolver() to update the resolver with a new MockDnsClient |
| // using |config| and |rules|. |
| void UseMockDnsClient(const DnsConfig& config, MockDnsClientRuleList rules) { |
| // HostResolver expects DnsConfig to get set after setting DnsClient, so |
| // create first with an empty config and then update the config. |
| auto dns_client = |
| std::make_unique<MockDnsClient>(DnsConfig(), std::move(rules)); |
| dns_client_ = dns_client.get(); |
| resolver_->SetDnsClientForTesting(std::move(dns_client)); |
| resolver_->SetInsecureDnsClientEnabled( |
| /*enabled=*/true, |
| /*additional_dns_types_enabled=*/true); |
| if (!config.Equals(DnsConfig())) |
| ChangeDnsConfig(config); |
| } |
| |
| static MockDnsClientRuleList CreateDefaultDnsRules() { |
| MockDnsClientRuleList rules; |
| |
| AddDnsRule(&rules, "nodomain", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kNoDomain, false /* delay */); |
| AddDnsRule(&rules, "nodomain", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kNoDomain, false /* delay */); |
| AddDnsRule(&rules, "nx", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kFail, false /* delay */); |
| AddDnsRule(&rules, "nx", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kFail, false /* delay */); |
| AddDnsRule(&rules, "ok", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kOk, false /* delay */); |
| AddDnsRule(&rules, "ok", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kOk, false /* delay */); |
| AddDnsRule(&rules, "4ok", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kOk, false /* delay */); |
| AddDnsRule(&rules, "4ok", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kEmpty, false /* delay */); |
| AddDnsRule(&rules, "6ok", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kEmpty, false /* delay */); |
| AddDnsRule(&rules, "6ok", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kOk, false /* delay */); |
| AddDnsRule(&rules, "4nx", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kOk, false /* delay */); |
| AddDnsRule(&rules, "4nx", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kFail, false /* delay */); |
| AddDnsRule(&rules, "empty", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kEmpty, false /* delay */); |
| AddDnsRule(&rules, "empty", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kEmpty, false /* delay */); |
| |
| AddDnsRule(&rules, "slow_nx", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kFail, true /* delay */); |
| AddDnsRule(&rules, "slow_nx", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kFail, true /* delay */); |
| |
| AddDnsRule(&rules, "4slow_ok", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kOk, true /* delay */); |
| AddDnsRule(&rules, "4slow_ok", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kOk, false /* delay */); |
| AddDnsRule(&rules, "6slow_ok", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kOk, false /* delay */); |
| AddDnsRule(&rules, "6slow_ok", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kOk, true /* delay */); |
| AddDnsRule(&rules, "4slow_4ok", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kOk, true /* delay */); |
| AddDnsRule(&rules, "4slow_4ok", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kEmpty, false /* delay */); |
| AddDnsRule(&rules, "4slow_4timeout", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kTimeout, true /* delay */); |
| AddDnsRule(&rules, "4slow_4timeout", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kOk, false /* delay */); |
| AddDnsRule(&rules, "4slow_6timeout", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kOk, true /* delay */); |
| AddDnsRule(&rules, "4slow_6timeout", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kTimeout, false /* delay */); |
| |
| AddDnsRule(&rules, "4collision", dns_protocol::kTypeA, |
| IPAddress(127, 0, 53, 53), false /* delay */); |
| AddDnsRule(&rules, "4collision", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kEmpty, false /* delay */); |
| AddDnsRule(&rules, "6collision", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kEmpty, false /* delay */); |
| // This isn't the expected IP for collisions (but looks close to it). |
| AddDnsRule(&rules, "6collision", dns_protocol::kTypeAAAA, |
| IPAddress(0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 127, 0, 53, 53), |
| false /* delay */); |
| |
| AddSecureDnsRule(&rules, "automatic_nodomain", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kNoDomain, |
| false /* delay */); |
| AddSecureDnsRule(&rules, "automatic_nodomain", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kNoDomain, |
| false /* delay */); |
| AddDnsRule(&rules, "automatic_nodomain", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kNoDomain, false /* delay */); |
| AddDnsRule(&rules, "automatic_nodomain", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kNoDomain, false /* delay */); |
| AddSecureDnsRule(&rules, "automatic", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kOk, false /* delay */); |
| AddSecureDnsRule(&rules, "automatic", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kOk, false /* delay */); |
| AddDnsRule(&rules, "automatic", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kOk, false /* delay */); |
| AddDnsRule(&rules, "automatic", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kOk, false /* delay */); |
| AddDnsRule(&rules, "insecure_automatic", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kOk, false /* delay */); |
| AddDnsRule(&rules, "insecure_automatic", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kOk, false /* delay */); |
| |
| AddSecureDnsRule(&rules, "secure", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kOk, false /* delay */); |
| AddSecureDnsRule(&rules, "secure", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kOk, false /* delay */); |
| |
| return rules; |
| } |
| |
| // Adds a rule to |rules|. |
| static void AddDnsRule(MockDnsClientRuleList* rules, |
| const std::string& prefix, |
| uint16_t qtype, |
| MockDnsClientRule::ResultType result_type, |
| bool delay) { |
| rules->emplace_back(prefix, qtype, false /* secure */, |
| MockDnsClientRule::Result(result_type), delay); |
| } |
| |
| static void AddDnsRule(MockDnsClientRuleList* rules, |
| const std::string& prefix, |
| uint16_t qtype, |
| const IPAddress& result_ip, |
| bool delay) { |
| rules->emplace_back(prefix, qtype, false /* secure */, |
| MockDnsClientRule::Result( |
| BuildTestDnsAddressResponse(prefix, result_ip)), |
| delay); |
| } |
| |
| static void AddDnsRule(MockDnsClientRuleList* rules, |
| const std::string& prefix, |
| uint16_t qtype, |
| IPAddress result_ip, |
| std::string cannonname, |
| bool delay) { |
| rules->emplace_back( |
| prefix, qtype, false /* secure */, |
| MockDnsClientRule::Result(BuildTestDnsAddressResponseWithCname( |
| prefix, result_ip, std::move(cannonname))), |
| delay); |
| } |
| |
| static void AddDnsRule(MockDnsClientRuleList* rules, |
| |
| const std::string& prefix, |
| uint16_t qtype, |
| DnsResponse dns_test_response, |
| bool delay) { |
| rules->emplace_back(prefix, qtype, false /* secure */, |
| MockDnsClientRule::Result(std::move(dns_test_response)), |
| delay); |
| } |
| |
| static void AddSecureDnsRule(MockDnsClientRuleList* rules, |
| const std::string& prefix, |
| uint16_t qtype, |
| MockDnsClientRule::ResultType result_type, |
| bool delay) { |
| rules->emplace_back(prefix, qtype, true /* secure */, |
| MockDnsClientRule::Result(result_type), delay); |
| } |
| |
| void ChangeDnsConfig(const DnsConfig& config) { |
| DCHECK(config.IsValid()); |
| notifier_task_runner_->PostTask( |
| FROM_HERE, |
| base::BindOnce(&TestDnsConfigService::OnHostsRead, |
| base::Unretained(config_service_), config.hosts)); |
| notifier_task_runner_->PostTask( |
| FROM_HERE, base::BindOnce(&TestDnsConfigService::OnConfigRead, |
| base::Unretained(config_service_), config)); |
| |
| notifier_task_runner_->RunUntilIdle(); |
| base::RunLoop().RunUntilIdle(); |
| } |
| |
| void InvalidateDnsConfig() { |
| notifier_task_runner_->PostTask( |
| FROM_HERE, |
| base::BindOnce(&TestDnsConfigService::OnHostsRead, |
| base::Unretained(config_service_), DnsHosts())); |
| notifier_task_runner_->PostTask( |
| FROM_HERE, base::BindOnce(&TestDnsConfigService::InvalidateConfig, |
| base::Unretained(config_service_))); |
| |
| notifier_task_runner_->FastForwardBy( |
| DnsConfigService::kInvalidationTimeout); |
| base::RunLoop().RunUntilIdle(); |
| } |
| |
| void SetInitialDnsConfig(const DnsConfig& config) { |
| InvalidateDnsConfig(); |
| ChangeDnsConfig(config); |
| } |
| |
| void TriggerInsecureFailureCondition() { |
| proc_->AddRuleForAllFamilies(std::string(), |
| std::string()); // Default to failures. |
| |
| // Disable Secure DNS for these requests. |
| HostResolver::ResolveHostParameters parameters; |
| parameters.secure_dns_policy = SecureDnsPolicy::kDisable; |
| |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| for (unsigned i = 0; i < maximum_insecure_dns_task_failures(); ++i) { |
| // Use custom names to require separate Jobs. |
| std::string hostname = base::StringPrintf("nx_%u", i); |
| // Ensure fallback to HostResolverSystemTask succeeds. |
| proc_->AddRuleForAllFamilies(hostname, "192.168.1.101"); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair(hostname, 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| } |
| |
| proc_->SignalMultiple(responses.size()); |
| |
| for (const auto& response : responses) |
| EXPECT_THAT(response->result_error(), IsOk()); |
| |
| ASSERT_FALSE(proc_->HasBlockedRequests()); |
| } |
| |
| scoped_refptr<base::TestMockTimeTaskRunner> notifier_task_runner_; |
| raw_ptr<TestDnsConfigService> config_service_; |
| std::unique_ptr<SystemDnsConfigChangeNotifier> notifier_; |
| |
| // Owned by |resolver_|. |
| raw_ptr<MockDnsClient> dns_client_ = nullptr; |
| }; |
| |
| TEST_F(HostResolverManagerDnsTest, FlushCacheOnDnsConfigChange) { |
| proc_->SignalMultiple(2u); // One before the flush, one after. |
| |
| // Resolve to populate the cache. |
| ResolveHostResponseHelper initial_response(resolver_->CreateRequest( |
| HostPortPair("host1", 70), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(initial_response.result_error(), IsOk()); |
| EXPECT_EQ(1u, proc_->GetCaptureList().size()); |
| |
| // Result expected to come from the cache. |
| ResolveHostResponseHelper cached_response(resolver_->CreateRequest( |
| HostPortPair("host1", 75), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(cached_response.result_error(), IsOk()); |
| EXPECT_EQ(1u, proc_->GetCaptureList().size()); // No expected increase. |
| |
| // Flush cache by triggering a DNS config change. |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| // Expect flushed from cache and therefore served from |proc_|. |
| ResolveHostResponseHelper flushed_response(resolver_->CreateRequest( |
| HostPortPair("host1", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(flushed_response.result_error(), IsOk()); |
| EXPECT_EQ(2u, proc_->GetCaptureList().size()); // Expected increase. |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DisableAndEnableInsecureDnsClient) { |
| // Disable fallback to allow testing how requests are initially handled. |
| set_allow_fallback_to_systemtask(false); |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| proc_->AddRuleForAllFamilies("nx_succeed", "192.168.2.47"); |
| proc_->SignalMultiple(1u); |
| |
| resolver_->SetInsecureDnsClientEnabled( |
| /*enabled=*/false, |
| /*additional_dns_types_enabled*/ false); |
| ResolveHostResponseHelper response_system(resolver_->CreateRequest( |
| HostPortPair("nx_succeed", 1212), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response_system.result_error(), IsOk()); |
| EXPECT_THAT(response_system.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.2.47", 1212))); |
| EXPECT_THAT( |
| response_system.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.2.47", 1212)))))); |
| |
| resolver_->SetInsecureDnsClientEnabled(/*enabled*/ true, |
| /*additional_dns_types_enabled=*/true); |
| ResolveHostResponseHelper response_dns_client(resolver_->CreateRequest( |
| HostPortPair("ok_fail", 1212), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response_dns_client.result_error(), IsOk()); |
| EXPECT_THAT(response_dns_client.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("::1", 1212), |
| CreateExpected("127.0.0.1", 1212))); |
| EXPECT_THAT( |
| response_dns_client.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::UnorderedElementsAre(CreateExpected("::1", 1212), |
| CreateExpected("127.0.0.1", 1212)))))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| UseHostResolverSystemTaskWhenPrivateDnsActive) { |
| // Disable fallback to allow testing how requests are initially handled. |
| set_allow_fallback_to_systemtask(false); |
| proc_->AddRuleForAllFamilies("nx_succeed", "192.168.2.47"); |
| proc_->SignalMultiple(1u); |
| |
| DnsConfig config = CreateValidDnsConfig(); |
| config.dns_over_tls_active = true; |
| ChangeDnsConfig(config); |
| ResolveHostResponseHelper response_system(resolver_->CreateRequest( |
| HostPortPair("nx_succeed", 1212), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response_system.result_error(), IsOk()); |
| EXPECT_THAT(response_system.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.2.47", 1212))); |
| EXPECT_THAT( |
| response_system.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.2.47", 1212)))))); |
| } |
| |
| // RFC 6761 localhost names should always resolve to loopback. |
| TEST_F(HostResolverManagerDnsTest, LocalhostLookup) { |
| // Add a rule resolving localhost names to a non-loopback IP and test |
| // that they still resolves to loopback. |
| proc_->AddRuleForAllFamilies("foo.localhost", "192.168.1.42"); |
| proc_->AddRuleForAllFamilies("localhost", "192.168.1.42"); |
| proc_->AddRuleForAllFamilies("localhost.", "192.168.1.42"); |
| |
| ResolveHostResponseHelper response0(resolver_->CreateRequest( |
| HostPortPair("foo.localhost", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response0.result_error(), IsOk()); |
| EXPECT_THAT(response0.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response0.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("localhost", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response1.result_error(), IsOk()); |
| EXPECT_THAT(response1.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response1.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| |
| ResolveHostResponseHelper response2(resolver_->CreateRequest( |
| HostPortPair("localhost.", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response2.result_error(), IsOk()); |
| EXPECT_THAT(response2.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response2.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| } |
| |
| // RFC 6761 localhost names should always resolve to loopback, even if a HOSTS |
| // file is active. |
| TEST_F(HostResolverManagerDnsTest, LocalhostLookupWithHosts) { |
| DnsHosts hosts; |
| hosts[DnsHostsKey("localhost", ADDRESS_FAMILY_IPV4)] = |
| IPAddress({192, 168, 1, 1}); |
| hosts[DnsHostsKey("foo.localhost", ADDRESS_FAMILY_IPV4)] = |
| IPAddress({192, 168, 1, 2}); |
| |
| DnsConfig config = CreateValidDnsConfig(); |
| config.hosts = hosts; |
| ChangeDnsConfig(config); |
| |
| ResolveHostResponseHelper response0(resolver_->CreateRequest( |
| HostPortPair("localhost", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response0.result_error(), IsOk()); |
| EXPECT_THAT(response0.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response0.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("foo.localhost", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response1.result_error(), IsOk()); |
| EXPECT_THAT(response1.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response1.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| } |
| |
| // Test successful and fallback resolutions in HostResolverManager::DnsTask. |
| TEST_F(HostResolverManagerDnsTest, DnsTask) { |
| proc_->AddRuleForAllFamilies("nx_succeed", "192.168.1.102"); |
| // All other hostnames will fail in proc_. |
| |
| // Initially there is no config, so client should not be invoked. |
| ResolveHostResponseHelper initial_response(resolver_->CreateRequest( |
| HostPortPair("ok_fail", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_FALSE(initial_response.complete()); |
| |
| proc_->SignalMultiple(1u); |
| |
| EXPECT_THAT(initial_response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| ResolveHostResponseHelper response0(resolver_->CreateRequest( |
| HostPortPair("ok_fail", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("nx_fail", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper response2(resolver_->CreateRequest( |
| HostPortPair("nx_succeed", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| proc_->SignalMultiple(4u); |
| |
| // Resolved by MockDnsClient. |
| EXPECT_THAT(response0.result_error(), IsOk()); |
| EXPECT_THAT(response0.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response0.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| |
| // Fallback to HostResolverSystemTask. |
| EXPECT_THAT(response1.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_THAT(response2.result_error(), IsOk()); |
| EXPECT_THAT(response2.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.102", 80))); |
| EXPECT_THAT(response2.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.102", 80)))))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DnsTaskWithScheme) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kWsScheme, "ok_fail", 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| // Resolved by MockDnsClient. |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| } |
| |
| // Test successful and failing resolutions in HostResolverManager::DnsTask when |
| // fallback to HostResolverSystemTask is disabled. |
| TEST_F(HostResolverManagerDnsTest, NoFallbackToHostResolverSystemTask) { |
| set_allow_fallback_to_systemtask(false); |
| |
| proc_->AddRuleForAllFamilies("nx_succeed", "192.168.1.102"); |
| // All other hostnames will fail in proc_. |
| |
| // Set empty DnsConfig. |
| InvalidateDnsConfig(); |
| // Initially there is no config, so client should not be invoked. |
| ResolveHostResponseHelper initial_response0(resolver_->CreateRequest( |
| HostPortPair("ok_fail", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper initial_response1(resolver_->CreateRequest( |
| HostPortPair("nx_succeed", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| proc_->SignalMultiple(2u); |
| |
| EXPECT_THAT(initial_response0.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_THAT(initial_response1.result_error(), IsOk()); |
| EXPECT_THAT(initial_response1.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.102", 80))); |
| EXPECT_THAT(initial_response1.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.102", 80)))))); |
| |
| // Switch to a valid config. |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| // First request is resolved by MockDnsClient, others should fail due to |
| // disabled fallback to HostResolverSystemTask. |
| ResolveHostResponseHelper response0(resolver_->CreateRequest( |
| HostPortPair("ok_fail", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("nx_succeed", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| proc_->SignalMultiple(6u); |
| |
| // Resolved by MockDnsClient. |
| EXPECT_THAT(response0.result_error(), IsOk()); |
| EXPECT_THAT(response0.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response0.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| // Fallback to HostResolverSystemTask is disabled. |
| EXPECT_THAT(response1.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| } |
| |
| // Test behavior of OnDnsTaskFailure when Job is aborted. |
| TEST_F(HostResolverManagerDnsTest, OnDnsTaskFailureAbortedJob) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("nx_abort", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| // Abort all jobs here. |
| CreateResolver(); |
| proc_->SignalMultiple(1u); |
| // Run to completion. |
| base::RunLoop().RunUntilIdle(); // Notification happens async. |
| // It shouldn't crash during OnDnsTaskFailure callbacks. |
| EXPECT_FALSE(response.complete()); |
| |
| // Repeat test with Fallback to HostResolverSystemTask disabled |
| set_allow_fallback_to_systemtask(false); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| ResolveHostResponseHelper no_fallback_response(resolver_->CreateRequest( |
| HostPortPair("nx_abort", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| // Abort all jobs here. |
| CreateResolver(); |
| proc_->SignalMultiple(2u); |
| // Run to completion. |
| base::RunLoop().RunUntilIdle(); // Notification happens async. |
| // It shouldn't crash during OnDnsTaskFailure callbacks. |
| EXPECT_FALSE(no_fallback_response.complete()); |
| } |
| |
| // Fallback to proc allowed with ANY source. |
| TEST_F(HostResolverManagerDnsTest, FallbackBySource_Any) { |
| // Ensure fallback is otherwise allowed by resolver settings. |
| set_allow_fallback_to_systemtask(true); |
| |
| proc_->AddRuleForAllFamilies("nx_succeed", "192.168.1.102"); |
| // All other hostnames will fail in proc_. |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| ResolveHostResponseHelper response0(resolver_->CreateRequest( |
| HostPortPair("nx_fail", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("nx_succeed", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| proc_->SignalMultiple(2u); |
| |
| EXPECT_THAT(response0.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_THAT(response1.result_error(), IsOk()); |
| EXPECT_THAT(response1.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.102", 80))); |
| EXPECT_THAT(response1.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.102", 80)))))); |
| } |
| |
| // Fallback to proc not allowed with DNS source. |
| TEST_F(HostResolverManagerDnsTest, FallbackBySource_Dns) { |
| // Ensure fallback is otherwise allowed by resolver settings. |
| set_allow_fallback_to_systemtask(true); |
| |
| proc_->AddRuleForAllFamilies("nx_succeed", "192.168.1.102"); |
| // All other hostnames will fail in proc_. |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.source = HostResolverSource::DNS; |
| ResolveHostResponseHelper response0(resolver_->CreateRequest( |
| HostPortPair("nx_fail", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("nx_succeed", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| // Nothing should reach |proc_| on success, but let failures through to fail |
| // instead of hanging. |
| proc_->SignalMultiple(2u); |
| |
| EXPECT_THAT(response0.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_THAT(response1.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| } |
| |
| // Fallback to proc on DnsClient change allowed with ANY source. |
| TEST_F(HostResolverManagerDnsTest, FallbackOnAbortBySource_Any) { |
| // Ensure fallback is otherwise allowed by resolver settings. |
| set_allow_fallback_to_systemtask(true); |
| |
| proc_->AddRuleForAllFamilies("nx_succeed", "192.168.1.102"); |
| // All other hostnames will fail in proc_. |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| ResolveHostResponseHelper response0(resolver_->CreateRequest( |
| HostPortPair("ok_fail", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("nx_succeed", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| proc_->SignalMultiple(2u); |
| |
| // Simulate the case when the preference or policy has disabled the insecure |
| // DNS client causing AbortInsecureDnsTasks. |
| resolver_->SetInsecureDnsClientEnabled( |
| /*enabled=*/false, |
| /*additional_dns_types_enabled=*/false); |
| |
| // All requests should fallback to system resolver. |
| EXPECT_THAT(response0.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_THAT(response1.result_error(), IsOk()); |
| EXPECT_THAT(response1.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.102", 80))); |
| EXPECT_THAT(response1.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.102", 80)))))); |
| } |
| |
| // Fallback to system on DnsClient change not allowed with DNS source. |
| TEST_F(HostResolverManagerDnsTest, FallbackOnAbortBySource_Dns) { |
| // Ensure fallback is otherwise allowed by resolver settings. |
| set_allow_fallback_to_systemtask(true); |
| |
| proc_->AddRuleForAllFamilies("nx_succeed", "192.168.1.102"); |
| // All other hostnames will fail in proc_. |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.source = HostResolverSource::DNS; |
| ResolveHostResponseHelper response0(resolver_->CreateRequest( |
| HostPortPair("ok_fail", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("nx_succeed", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| // Nothing should reach |proc_| on success, but let failures through to fail |
| // instead of hanging. |
| proc_->SignalMultiple(2u); |
| |
| // Simulate the case when the preference or policy has disabled the insecure |
| // DNS client causing AbortInsecureDnsTasks. |
| resolver_->SetInsecureDnsClientEnabled( |
| /*enabled=*/false, |
| /*additional_dns_types_enabled=*/false); |
| |
| // No fallback expected. All requests should fail. |
| EXPECT_THAT(response0.result_error(), IsError(ERR_NETWORK_CHANGED)); |
| EXPECT_THAT(response1.result_error(), IsError(ERR_NETWORK_CHANGED)); |
| } |
| |
| // Insecure DnsClient change shouldn't affect secure DnsTasks. |
| TEST_F(HostResolverManagerDnsTest, |
| DisableInsecureDnsClient_SecureDnsTasksUnaffected) { |
| // Ensure fallback is otherwise allowed by resolver settings. |
| set_allow_fallback_to_systemtask(true); |
| |
| proc_->AddRuleForAllFamilies("automatic", "192.168.1.102"); |
| // All other hostnames will fail in proc_. |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response_secure(resolver_->CreateRequest( |
| HostPortPair("automatic", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), |
| /* optional_parameters=*/absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_FALSE(response_secure.complete()); |
| |
| // Simulate the case when the preference or policy has disabled the insecure |
| // DNS client causing AbortInsecureDnsTasks. |
| resolver_->SetInsecureDnsClientEnabled( |
| /*enabled=*/false, |
| /*additional_dns_types_enabled*/ false); |
| |
| EXPECT_THAT(response_secure.result_error(), IsOk()); |
| EXPECT_THAT(response_secure.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response_secure.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DnsTaskUnspec) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| proc_->AddRuleForAllFamilies("4nx", "192.168.1.101"); |
| // All other hostnames will fail in proc_. |
| |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("4ok", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("6ok", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("4nx", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| |
| proc_->SignalMultiple(4u); |
| |
| for (auto& response : responses) { |
| EXPECT_THAT(response->result_error(), IsOk()); |
| } |
| |
| EXPECT_THAT(responses[0]->request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| responses[0]->request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| EXPECT_THAT(responses[1]->request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80))); |
| EXPECT_THAT(responses[1]->request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80)))))); |
| EXPECT_THAT(responses[2]->request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("::1", 80))); |
| EXPECT_THAT(responses[2]->request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("::1", 80)))))); |
| EXPECT_THAT(responses[3]->request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.101", 80))); |
| EXPECT_THAT(responses[3]->request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.101", 80)))))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, NameCollisionIcann) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| // When the resolver returns an A record with 127.0.53.53 it should be |
| // mapped to a special error. |
| ResolveHostResponseHelper response_ipv4(resolver_->CreateRequest( |
| HostPortPair("4collision", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response_ipv4.result_error(), IsError(ERR_ICANN_NAME_COLLISION)); |
| EXPECT_FALSE(response_ipv4.request()->GetAddressResults()); |
| EXPECT_FALSE(response_ipv4.request()->GetEndpointResults()); |
| |
| // When the resolver returns an AAAA record with ::127.0.53.53 it should |
| // work just like any other IP. (Despite having the same suffix, it is not |
| // considered special) |
| ResolveHostResponseHelper response_ipv6(resolver_->CreateRequest( |
| HostPortPair("6collision", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response_ipv6.result_error(), IsOk()); |
| EXPECT_THAT(response_ipv6.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("::127.0.53.53", 80))); |
| EXPECT_THAT(response_ipv6.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("::127.0.53.53", 80)))))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, ServeFromHosts) { |
| // Initially, use empty HOSTS file. |
| DnsConfig config = CreateValidDnsConfig(); |
| ChangeDnsConfig(config); |
| |
| proc_->AddRuleForAllFamilies(std::string(), |
| std::string()); // Default to failures. |
| proc_->SignalMultiple(1u); // For the first request which misses. |
| |
| ResolveHostResponseHelper initial_response(resolver_->CreateRequest( |
| HostPortPair("nx_ipv4", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(initial_response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| |
| IPAddress local_ipv4 = IPAddress::IPv4Localhost(); |
| IPAddress local_ipv6 = IPAddress::IPv6Localhost(); |
| |
| DnsHosts hosts; |
| hosts[DnsHostsKey("nx_ipv4", ADDRESS_FAMILY_IPV4)] = local_ipv4; |
| hosts[DnsHostsKey("nx_ipv6", ADDRESS_FAMILY_IPV6)] = local_ipv6; |
| hosts[DnsHostsKey("nx_both", ADDRESS_FAMILY_IPV4)] = local_ipv4; |
| hosts[DnsHostsKey("nx_both", ADDRESS_FAMILY_IPV6)] = local_ipv6; |
| |
| // Update HOSTS file. |
| config.hosts = hosts; |
| ChangeDnsConfig(config); |
| |
| ResolveHostResponseHelper response_ipv4(resolver_->CreateRequest( |
| HostPortPair("nx_ipv4", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response_ipv4.result_error(), IsOk()); |
| EXPECT_THAT(response_ipv4.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80))); |
| EXPECT_THAT(response_ipv4.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80)))))); |
| EXPECT_THAT(response_ipv4.request()->GetDnsAliasResults(), |
| testing::Pointee(testing::IsEmpty())); |
| |
| ResolveHostResponseHelper response_ipv6(resolver_->CreateRequest( |
| HostPortPair("nx_ipv6", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response_ipv6.result_error(), IsOk()); |
| EXPECT_THAT(response_ipv6.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("::1", 80))); |
| EXPECT_THAT(response_ipv6.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("::1", 80)))))); |
| EXPECT_THAT(response_ipv6.request()->GetDnsAliasResults(), |
| testing::Pointee(testing::IsEmpty())); |
| |
| ResolveHostResponseHelper response_both(resolver_->CreateRequest( |
| HostPortPair("nx_both", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response_both.result_error(), IsOk()); |
| EXPECT_THAT(response_both.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response_both.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| EXPECT_THAT(response_both.request()->GetDnsAliasResults(), |
| testing::Pointee(testing::IsEmpty())); |
| |
| // Requests with specified DNS query type. |
| HostResolver::ResolveHostParameters parameters; |
| |
| parameters.dns_query_type = DnsQueryType::A; |
| ResolveHostResponseHelper response_specified_ipv4(resolver_->CreateRequest( |
| HostPortPair("nx_ipv4", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response_specified_ipv4.result_error(), IsOk()); |
| EXPECT_THAT( |
| response_specified_ipv4.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80))); |
| EXPECT_THAT(response_specified_ipv4.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80)))))); |
| EXPECT_THAT(response_specified_ipv4.request()->GetDnsAliasResults(), |
| testing::Pointee(testing::IsEmpty())); |
| |
| parameters.dns_query_type = DnsQueryType::AAAA; |
| ResolveHostResponseHelper response_specified_ipv6(resolver_->CreateRequest( |
| HostPortPair("nx_ipv6", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response_specified_ipv6.result_error(), IsOk()); |
| EXPECT_THAT( |
| response_specified_ipv6.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("::1", 80))); |
| EXPECT_THAT(response_specified_ipv6.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("::1", 80)))))); |
| EXPECT_THAT(response_specified_ipv6.request()->GetDnsAliasResults(), |
| testing::Pointee(testing::IsEmpty())); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| SkipHostsWithUpcomingHostResolverSystemTask) { |
| // Disable the DnsClient. |
| resolver_->SetInsecureDnsClientEnabled( |
| /*enabled=*/false, |
| /*additional_dns_types_enabled=*/false); |
| |
| proc_->AddRuleForAllFamilies(std::string(), |
| std::string()); // Default to failures. |
| proc_->SignalMultiple(1u); // For the first request which misses. |
| |
| DnsConfig config = CreateValidDnsConfig(); |
| DnsHosts hosts; |
| hosts[DnsHostsKey("hosts", ADDRESS_FAMILY_IPV4)] = IPAddress::IPv4Localhost(); |
| |
| // Update HOSTS file. |
| config.hosts = hosts; |
| ChangeDnsConfig(config); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("hosts", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| } |
| |
| // Test that hosts ending in ".local" or ".local." are resolved using the system |
| // resolver. |
| TEST_F(HostResolverManagerDnsTest, BypassDnsTask) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| proc_->AddRuleForAllFamilies(std::string(), |
| std::string()); // Default to failures. |
| |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("ok.local", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("ok.local.", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("oklocal", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("oklocal.", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| |
| proc_->SignalMultiple(5u); |
| |
| for (size_t i = 0; i < 2; ++i) |
| EXPECT_THAT(responses[i]->result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| |
| for (size_t i = 2; i < responses.size(); ++i) |
| EXPECT_THAT(responses[i]->result_error(), IsOk()); |
| } |
| |
| #if BUILDFLAG(ENABLE_MDNS) |
| // Test that non-address queries for hosts ending in ".local" are resolved using |
| // the MDNS resolver. |
| TEST_F(HostResolverManagerDnsTest, BypassDnsToMdnsWithNonAddress) { |
| // Ensure DNS task and system requests will fail. |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "myhello.local", dns_protocol::kTypeTXT, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kFail), |
| false /* delay */); |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| proc_->AddRuleForAllFamilies(std::string(), std::string()); |
| |
| auto socket_factory = std::make_unique<MockMDnsSocketFactory>(); |
| MockMDnsSocketFactory* socket_factory_ptr = socket_factory.get(); |
| resolver_->SetMdnsSocketFactoryForTesting(std::move(socket_factory)); |
| // 2 socket creations for every transaction. |
| EXPECT_CALL(*socket_factory_ptr, OnSendTo(_)).Times(2); |
| |
| HostResolver::ResolveHostParameters dns_parameters; |
| dns_parameters.dns_query_type = DnsQueryType::TXT; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("myhello.local", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), dns_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| socket_factory_ptr->SimulateReceive(kMdnsResponseTxt, |
| sizeof(kMdnsResponseTxt)); |
| proc_->SignalMultiple(1u); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetTextResults(), |
| testing::Optional(testing::ElementsAre("foo", "bar"))); |
| } |
| #endif // BUILDFLAG(ENABLE_MDNS) |
| |
| // Test that DNS task is always used when explicitly requested as the source, |
| // even with a case that would normally bypass it eg hosts ending in ".local". |
| TEST_F(HostResolverManagerDnsTest, DnsNotBypassedWhenDnsSource) { |
| // Ensure DNS task requests will succeed and system requests will fail. |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| proc_->AddRuleForAllFamilies(std::string(), std::string()); |
| |
| HostResolver::ResolveHostParameters dns_parameters; |
| dns_parameters.source = HostResolverSource::DNS; |
| |
| ResolveHostResponseHelper dns_response(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| dns_parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| ResolveHostResponseHelper dns_local_response(resolver_->CreateRequest( |
| HostPortPair("ok.local", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), dns_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper normal_local_response(resolver_->CreateRequest( |
| HostPortPair("ok.local", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| proc_->SignalMultiple(3u); |
| |
| EXPECT_THAT(dns_response.result_error(), IsOk()); |
| EXPECT_THAT(dns_local_response.result_error(), IsOk()); |
| EXPECT_THAT(normal_local_response.result_error(), |
| IsError(ERR_NAME_NOT_RESOLVED)); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SystemOnlyBypassesDnsTask) { |
| // Ensure DNS task requests will succeed and system requests will fail. |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| proc_->AddRuleForAllFamilies(std::string(), std::string()); |
| |
| ResolveHostResponseHelper dns_response(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.source = HostResolverSource::SYSTEM; |
| ResolveHostResponseHelper system_response(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| |
| proc_->SignalMultiple(2u); |
| |
| EXPECT_THAT(dns_response.result_error(), IsOk()); |
| EXPECT_THAT(system_response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| DisableInsecureDnsClientOnPersistentFailure) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| // Check that DnsTask works. |
| ResolveHostResponseHelper initial_response(resolver_->CreateRequest( |
| HostPortPair("ok_1", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(initial_response.result_error(), IsOk()); |
| |
| TriggerInsecureFailureCondition(); |
| |
| // Insecure DnsTasks should be disabled by now unless explicitly requested via |
| // |source|. |
| ResolveHostResponseHelper fail_response(resolver_->CreateRequest( |
| HostPortPair("ok_2", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| HostResolver::ResolveHostParameters parameters; |
| parameters.source = HostResolverSource::DNS; |
| ResolveHostResponseHelper dns_response(resolver_->CreateRequest( |
| HostPortPair("ok_2", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| proc_->SignalMultiple(2u); |
| EXPECT_THAT(fail_response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_THAT(dns_response.result_error(), IsOk()); |
| |
| // Check that it is re-enabled after DNS change. |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| ResolveHostResponseHelper reenabled_response(resolver_->CreateRequest( |
| HostPortPair("ok_3", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(reenabled_response.result_error(), IsOk()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SecureDnsWorksAfterInsecureFailure) { |
| DnsConfig config = CreateValidDnsConfig(); |
| config.secure_dns_mode = SecureDnsMode::kSecure; |
| ChangeDnsConfig(config); |
| |
| TriggerInsecureFailureCondition(); |
| |
| // Secure DnsTasks should not be affected. |
| ResolveHostResponseHelper secure_response(resolver_->CreateRequest( |
| HostPortPair("secure", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| /* optional_parameters=*/absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(secure_response.result_error(), IsOk()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DontDisableDnsClientOnSporadicFailure) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| // |proc_| defaults to successes. |
| |
| // 20 failures interleaved with 20 successes. |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| for (unsigned i = 0; i < 40; ++i) { |
| // Use custom names to require separate Jobs. |
| std::string hostname = (i % 2) == 0 ? base::StringPrintf("nx_%u", i) |
| : base::StringPrintf("ok_%u", i); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair(hostname, 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| } |
| |
| proc_->SignalMultiple(40u); |
| |
| for (const auto& response : responses) |
| EXPECT_THAT(response->result_error(), IsOk()); |
| |
| // Make |proc_| default to failures. |
| proc_->AddRuleForAllFamilies(std::string(), std::string()); |
| |
| // DnsTask should still be enabled. |
| ResolveHostResponseHelper final_response(resolver_->CreateRequest( |
| HostPortPair("ok_last", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(final_response.result_error(), IsOk()); |
| } |
| |
| void HostResolverManagerDnsTest::Ipv6UnreachableTest(bool is_async) { |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| false /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */, is_async); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("ok", 500), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| |
| // Only expect IPv4 results. |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 500))); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("127.0.0.1", 500)))))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, Ipv6UnreachableAsync) { |
| Ipv6UnreachableTest(true); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, Ipv6UnreachableSync) { |
| Ipv6UnreachableTest(false); |
| } |
| |
| void HostResolverManagerDnsTest::Ipv6UnreachableInvalidConfigTest( |
| bool is_async) { |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| false /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */, is_async); |
| |
| proc_->AddRule("example.com", ADDRESS_FAMILY_UNSPECIFIED, "1.2.3.4,::5"); |
| proc_->SignalMultiple(1u); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("example.com", 500), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("1.2.3.4", 500), |
| CreateExpected("::5", 500))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::5", 500), CreateExpected("1.2.3.4", 500)))))); |
| } |
| // Without a valid DnsConfig, assume IPv6 is needed and ignore prober. |
| TEST_F(HostResolverManagerDnsTest, Ipv6Unreachable_InvalidConfigAsync) { |
| Ipv6UnreachableInvalidConfigTest(true); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, Ipv6Unreachable_InvalidConfigSync) { |
| Ipv6UnreachableInvalidConfigTest(false); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, Ipv6Unreachable_UseLocalIpv6) { |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| false /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */); |
| |
| DnsConfig config = CreateValidDnsConfig(); |
| config.use_local_ipv6 = true; |
| ChangeDnsConfig(config); |
| |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("ok", 500), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response1.result_error(), IsOk()); |
| EXPECT_THAT(response1.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 500), |
| CreateExpected("::1", 500))); |
| EXPECT_THAT( |
| response1.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 500), CreateExpected("127.0.0.1", 500)))))); |
| |
| // Set |use_local_ipv6| to false. Expect only IPv4 results. |
| config.use_local_ipv6 = false; |
| ChangeDnsConfig(config); |
| |
| ResolveHostResponseHelper response2(resolver_->CreateRequest( |
| HostPortPair("ok", 500), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response2.result_error(), IsOk()); |
| EXPECT_THAT(response2.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 500))); |
| EXPECT_THAT(response2.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("127.0.0.1", 500)))))); |
| } |
| |
| // Confirm that resolving "localhost" is unrestricted even if there are no |
| // global IPv6 address. See SystemHostResolverCall for rationale. |
| // Test both the DnsClient and system host resolver paths. |
| TEST_F(HostResolverManagerDnsTest, Ipv6Unreachable_Localhost) { |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| false /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */); |
| |
| // Make request fail if we actually get to the system resolver. |
| proc_->AddRuleForAllFamilies(std::string(), std::string()); |
| |
| // Try without DnsClient. |
| resolver_->SetInsecureDnsClientEnabled( |
| /*enabled=*/false, |
| /*additional_dns_types_enabled=*/false); |
| ResolveHostResponseHelper system_response(resolver_->CreateRequest( |
| HostPortPair("localhost", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(system_response.result_error(), IsOk()); |
| EXPECT_THAT(system_response.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| system_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| |
| // With DnsClient |
| UseMockDnsClient(CreateValidDnsConfig(), CreateDefaultDnsRules()); |
| ResolveHostResponseHelper builtin_response(resolver_->CreateRequest( |
| HostPortPair("localhost", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(builtin_response.result_error(), IsOk()); |
| EXPECT_THAT(builtin_response.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| builtin_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| |
| // DnsClient configured without ipv6 (but ipv6 should still work for |
| // localhost). |
| DnsConfig config = CreateValidDnsConfig(); |
| config.use_local_ipv6 = false; |
| ChangeDnsConfig(config); |
| ResolveHostResponseHelper ipv6_disabled_response(resolver_->CreateRequest( |
| HostPortPair("localhost", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(ipv6_disabled_response.result_error(), IsOk()); |
| EXPECT_THAT( |
| ipv6_disabled_response.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| ipv6_disabled_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| } |
| |
| // Test that IPv6 being unreachable only causes the AAAA query to be disabled, |
| // rather than querying only for A. See https://crbug.com/1272055. |
| TEST_F(HostResolverManagerDnsTest, Ipv6UnreachableOnlyDisablesAAAAQuery) { |
| const std::string kName = "https.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsAliasRecord(kName, "alias.test")}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/false, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kUnexpected), |
| /*delay=*/false); |
| |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| /*ipv6_reachable=*/false, |
| /*check_ipv6_on_wifi=*/true); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), |
| /*optional_parameters=*/absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 443))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 443)))))); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::ElementsAre(true))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SeparateJobsBySecureDnsMode) { |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "a", dns_protocol::kTypeA, true /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| false /* delay */); |
| rules.emplace_back( |
| "a", dns_protocol::kTypeAAAA, true /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| false /* delay */); |
| rules.emplace_back( |
| "a", dns_protocol::kTypeA, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| true /* delay */); |
| rules.emplace_back( |
| "a", dns_protocol::kTypeAAAA, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| true /* delay */); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| // Create three requests. One with a DISABLE policy parameter, one with no |
| // resolution parameters at all, and one with an ALLOW policy parameter |
| // (which is a no-op). |
| HostResolver::ResolveHostParameters parameters_disable_secure; |
| parameters_disable_secure.secure_dns_policy = SecureDnsPolicy::kDisable; |
| ResolveHostResponseHelper insecure_response(resolver_->CreateRequest( |
| HostPortPair("a", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters_disable_secure, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_EQ(1u, resolver_->num_jobs_for_testing()); |
| |
| ResolveHostResponseHelper automatic_response0(resolver_->CreateRequest( |
| HostPortPair("a", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_EQ(2u, resolver_->num_jobs_for_testing()); |
| |
| HostResolver::ResolveHostParameters parameters_allow_secure; |
| parameters_allow_secure.secure_dns_policy = SecureDnsPolicy::kAllow; |
| ResolveHostResponseHelper automatic_response1(resolver_->CreateRequest( |
| HostPortPair("a", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters_allow_secure, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| // The AUTOMATIC mode requests should be joined into the same job. |
| EXPECT_EQ(2u, resolver_->num_jobs_for_testing()); |
| |
| // Automatic mode requests have completed. Insecure request is still blocked. |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_FALSE(insecure_response.complete()); |
| EXPECT_TRUE(automatic_response0.complete()); |
| EXPECT_TRUE(automatic_response1.complete()); |
| EXPECT_THAT(automatic_response0.result_error(), IsOk()); |
| EXPECT_THAT(automatic_response1.result_error(), IsOk()); |
| |
| // Complete insecure transaction. |
| dns_client_->CompleteDelayedTransactions(); |
| EXPECT_TRUE(insecure_response.complete()); |
| EXPECT_THAT(insecure_response.result_error(), IsOk()); |
| } |
| |
| // Cancel a request with a single DNS transaction active. |
| TEST_F(HostResolverManagerDnsTest, CancelWithOneTransactionActive) { |
| // Disable ipv6 to ensure we'll only try a single transaction for the host. |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| false /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */); |
| DnsConfig config = CreateValidDnsConfig(); |
| config.use_local_ipv6 = false; |
| ChangeDnsConfig(config); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| ASSERT_FALSE(response.complete()); |
| ASSERT_EQ(1u, num_running_dispatcher_jobs()); |
| |
| response.CancelRequest(); |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Dispatcher state checked in TearDown. |
| } |
| |
| // Cancel a request with a single DNS transaction active and another pending. |
| TEST_F(HostResolverManagerDnsTest, CancelWithOneTransactionActiveOnePending) { |
| CreateSerialResolver(); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_EQ(1u, num_running_dispatcher_jobs()); |
| |
| response.CancelRequest(); |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Dispatcher state checked in TearDown. |
| } |
| |
| // Cancel a request with two DNS transactions active. |
| TEST_F(HostResolverManagerDnsTest, CancelWithTwoTransactionsActive) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_EQ(2u, num_running_dispatcher_jobs()); |
| |
| response.CancelRequest(); |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Dispatcher state checked in TearDown. |
| } |
| |
| // Delete a resolver with some active requests and some queued requests. |
| TEST_F(HostResolverManagerDnsTest, DeleteWithActiveTransactions) { |
| // At most 10 Jobs active at once. |
| CreateResolverWithLimitsAndParams(10u, DefaultParams(proc_), |
| true /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */); |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| // Add 12 DNS lookups (creating well more than 10 transaction). |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| for (int i = 0; i < 12; ++i) { |
| std::string hostname = base::StringPrintf("ok%i", i); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair(hostname, 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| } |
| EXPECT_EQ(10u, num_running_dispatcher_jobs()); |
| |
| DestroyResolver(); |
| |
| base::RunLoop().RunUntilIdle(); |
| for (auto& response : responses) { |
| EXPECT_FALSE(response->complete()); |
| } |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DeleteWithSecureTransactions) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("secure", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| |
| DestroyResolver(); |
| |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DeleteWithCompletedRequests) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| |
| DestroyResolver(); |
| |
| // Completed requests should be unaffected by manager destruction. |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| } |
| |
| // Cancel a request with only the IPv6 transaction active. |
| TEST_F(HostResolverManagerDnsTest, CancelWithIPv6TransactionActive) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("6slow_ok", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_EQ(2u, num_running_dispatcher_jobs()); |
| |
| // The IPv4 request should complete, the IPv6 request is still pending. |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_EQ(1u, num_running_dispatcher_jobs()); |
| |
| response.CancelRequest(); |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Dispatcher state checked in TearDown. |
| } |
| |
| // Cancel a request with only the IPv4 transaction pending. |
| TEST_F(HostResolverManagerDnsTest, CancelWithIPv4TransactionPending) { |
| set_allow_fallback_to_systemtask(false); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("4slow_ok", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_EQ(2u, num_running_dispatcher_jobs()); |
| |
| // The IPv6 request should complete, the IPv4 request is still pending. |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_EQ(1u, num_running_dispatcher_jobs()); |
| |
| response.CancelRequest(); |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, CancelWithAutomaticModeTransactionPending) { |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "secure_6slow_6nx_insecure_6slow_ok", dns_protocol::kTypeA, |
| true /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| false /* delay */); |
| rules.emplace_back( |
| "secure_6slow_6nx_insecure_6slow_ok", dns_protocol::kTypeAAAA, |
| true /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kFail), |
| true /* delay */); |
| rules.emplace_back( |
| "secure_6slow_6nx_insecure_6slow_ok", dns_protocol::kTypeA, |
| false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| false /* delay */); |
| rules.emplace_back( |
| "secure_6slow_6nx_insecure_6slow_ok", dns_protocol::kTypeAAAA, |
| false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| true /* delay */); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response0(resolver_->CreateRequest( |
| HostPortPair("secure_6slow_6nx_insecure_6slow_ok", 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_EQ(0u, num_running_dispatcher_jobs()); |
| |
| // The secure IPv4 request should complete, the secure IPv6 request is still |
| // pending. |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_EQ(0u, num_running_dispatcher_jobs()); |
| |
| response0.CancelRequest(); |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_FALSE(response0.complete()); |
| EXPECT_EQ(0u, num_running_dispatcher_jobs()); |
| |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("secure_6slow_6nx_insecure_6slow_ok", 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_EQ(0u, num_running_dispatcher_jobs()); |
| |
| // The secure IPv4 request should complete, the secure IPv6 request is still |
| // pending. |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_EQ(0u, num_running_dispatcher_jobs()); |
| |
| // Let the secure IPv6 request complete and start the insecure requests. |
| dns_client_->CompleteDelayedTransactions(); |
| EXPECT_EQ(2u, num_running_dispatcher_jobs()); |
| |
| // The insecure IPv4 request should complete, the insecure IPv6 request is |
| // still pending. |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_EQ(1u, num_running_dispatcher_jobs()); |
| |
| response1.CancelRequest(); |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_FALSE(response1.complete()); |
| |
| // Dispatcher state checked in TearDown. |
| } |
| |
| // Test cases where AAAA completes first. |
| TEST_F(HostResolverManagerDnsTest, AAAACompletesFirst) { |
| set_allow_fallback_to_systemtask(false); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("4slow_ok", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("4slow_4ok", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("4slow_4timeout", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("4slow_6timeout", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_FALSE(responses[0]->complete()); |
| EXPECT_FALSE(responses[1]->complete()); |
| EXPECT_FALSE(responses[2]->complete()); |
| // The IPv6 of request 3 should have failed and resulted in cancelling the |
| // IPv4 request. |
| EXPECT_THAT(responses[3]->result_error(), IsError(ERR_DNS_TIMED_OUT)); |
| EXPECT_EQ(3u, num_running_dispatcher_jobs()); |
| |
| dns_client_->CompleteDelayedTransactions(); |
| EXPECT_THAT(responses[0]->result_error(), IsOk()); |
| EXPECT_THAT(responses[0]->request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| responses[0]->request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| |
| EXPECT_THAT(responses[1]->result_error(), IsOk()); |
| EXPECT_THAT(responses[1]->request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80))); |
| EXPECT_THAT(responses[1]->request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80)))))); |
| |
| EXPECT_THAT(responses[2]->result_error(), IsError(ERR_DNS_TIMED_OUT)); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, AAAACompletesFirst_AutomaticMode) { |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "secure_slow_nx_insecure_4slow_ok", dns_protocol::kTypeA, |
| true /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kFail), |
| true /* delay */); |
| rules.emplace_back( |
| "secure_slow_nx_insecure_4slow_ok", dns_protocol::kTypeAAAA, |
| true /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kFail), |
| true /* delay */); |
| rules.emplace_back( |
| "secure_slow_nx_insecure_4slow_ok", dns_protocol::kTypeA, |
| false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| true /* delay */); |
| rules.emplace_back( |
| "secure_slow_nx_insecure_4slow_ok", dns_protocol::kTypeAAAA, |
| false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kEmpty), |
| false /* delay */); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("secure_slow_nx_insecure_4slow_ok", 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| // Complete the secure transactions. |
| dns_client_->CompleteDelayedTransactions(); |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| // Complete the insecure transactions. |
| dns_client_->CompleteDelayedTransactions(); |
| ASSERT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80))); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("127.0.0.1", 80)))))); |
| HostCache::Key insecure_key = |
| HostCache::Key("secure_slow_nx_insecure_4slow_ok", |
| DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result = |
| GetCacheHit(insecure_key); |
| EXPECT_TRUE(!!cache_result); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SecureDnsMode_Automatic) { |
| proc_->AddRuleForAllFamilies("nx_succeed", "192.168.1.100"); |
| set_allow_fallback_to_systemtask(true); |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result; |
| |
| // A successful DoH request should result in a secure cache entry. |
| ResolveHostResponseHelper response_secure(resolver_->CreateRequest( |
| HostPortPair("automatic", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ASSERT_THAT(response_secure.result_error(), IsOk()); |
| EXPECT_FALSE( |
| response_secure.request()->GetResolveErrorInfo().is_secure_network_error); |
| EXPECT_THAT(response_secure.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response_secure.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| HostCache::Key secure_key = HostCache::Key( |
| "automatic", DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| secure_key.secure = true; |
| cache_result = GetCacheHit(secure_key); |
| EXPECT_TRUE(!!cache_result); |
| |
| // A successful plaintext DNS request should result in an insecure cache |
| // entry. |
| ResolveHostResponseHelper response_insecure(resolver_->CreateRequest( |
| HostPortPair("insecure_automatic", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ASSERT_THAT(response_insecure.result_error(), IsOk()); |
| EXPECT_FALSE(response_insecure.request() |
| ->GetResolveErrorInfo() |
| .is_secure_network_error); |
| EXPECT_THAT(response_insecure.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response_insecure.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| HostCache::Key insecure_key = |
| HostCache::Key("insecure_automatic", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| NetworkAnonymizationKey()); |
| cache_result = GetCacheHit(insecure_key); |
| EXPECT_TRUE(!!cache_result); |
| |
| // Fallback to HostResolverSystemTask allowed in AUTOMATIC mode. |
| ResolveHostResponseHelper response_system(resolver_->CreateRequest( |
| HostPortPair("nx_succeed", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| proc_->SignalMultiple(1u); |
| EXPECT_THAT(response_system.result_error(), IsOk()); |
| EXPECT_THAT(response_system.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.100", 80))); |
| EXPECT_THAT(response_system.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.100", 80)))))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SecureDnsMode_Automatic_SecureCache) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| // Populate cache with a secure entry. |
| HostCache::Key cached_secure_key = |
| HostCache::Key("automatic_cached", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| NetworkAnonymizationKey()); |
| cached_secure_key.secure = true; |
| IPEndPoint kExpectedSecureIP = CreateExpected("192.168.1.102", 80); |
| PopulateCache(cached_secure_key, kExpectedSecureIP); |
| |
| // The secure cache should be checked prior to any DoH request being sent. |
| ResolveHostResponseHelper response_secure_cached(resolver_->CreateRequest( |
| HostPortPair("automatic_cached", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response_secure_cached.result_error(), IsOk()); |
| EXPECT_FALSE(response_secure_cached.request() |
| ->GetResolveErrorInfo() |
| .is_secure_network_error); |
| EXPECT_THAT( |
| response_secure_cached.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(kExpectedSecureIP)); |
| EXPECT_THAT(response_secure_cached.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(kExpectedSecureIP))))); |
| EXPECT_FALSE( |
| response_secure_cached.request()->GetStaleInfo().value().is_stale()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SecureDnsMode_Automatic_InsecureCache) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| // Populate cache with an insecure entry. |
| HostCache::Key cached_insecure_key = |
| HostCache::Key("insecure_automatic_cached", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| NetworkAnonymizationKey()); |
| IPEndPoint kExpectedInsecureIP = CreateExpected("192.168.1.103", 80); |
| PopulateCache(cached_insecure_key, kExpectedInsecureIP); |
| |
| // The insecure cache should be checked after DoH requests fail. |
| ResolveHostResponseHelper response_insecure_cached(resolver_->CreateRequest( |
| HostPortPair("insecure_automatic_cached", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response_insecure_cached.result_error(), IsOk()); |
| EXPECT_FALSE(response_insecure_cached.request() |
| ->GetResolveErrorInfo() |
| .is_secure_network_error); |
| EXPECT_THAT( |
| response_insecure_cached.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(kExpectedInsecureIP)); |
| EXPECT_THAT(response_insecure_cached.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(kExpectedInsecureIP))))); |
| EXPECT_FALSE( |
| response_insecure_cached.request()->GetStaleInfo().value().is_stale()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SecureDnsMode_Automatic_Downgrade) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| // There is no DoH server available. |
| DnsConfigOverrides overrides; |
| overrides.dns_over_https_config.emplace(); |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result; |
| |
| // Populate cache with both secure and insecure entries. |
| HostCache::Key cached_secure_key = |
| HostCache::Key("automatic_cached", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| NetworkAnonymizationKey()); |
| cached_secure_key.secure = true; |
| IPEndPoint kExpectedSecureIP = CreateExpected("192.168.1.102", 80); |
| PopulateCache(cached_secure_key, kExpectedSecureIP); |
| HostCache::Key cached_insecure_key = |
| HostCache::Key("insecure_automatic_cached", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| NetworkAnonymizationKey()); |
| IPEndPoint kExpectedInsecureIP = CreateExpected("192.168.1.103", 80); |
| PopulateCache(cached_insecure_key, kExpectedInsecureIP); |
| |
| // The secure cache should still be checked first. |
| ResolveHostResponseHelper response_cached(resolver_->CreateRequest( |
| HostPortPair("automatic_cached", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response_cached.result_error(), IsOk()); |
| EXPECT_THAT(response_cached.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(kExpectedSecureIP)); |
| EXPECT_THAT(response_cached.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(kExpectedSecureIP))))); |
| |
| // The insecure cache should be checked before any insecure requests are sent. |
| ResolveHostResponseHelper insecure_response_cached(resolver_->CreateRequest( |
| HostPortPair("insecure_automatic_cached", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(insecure_response_cached.result_error(), IsOk()); |
| EXPECT_THAT( |
| insecure_response_cached.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(kExpectedInsecureIP)); |
| EXPECT_THAT(insecure_response_cached.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(kExpectedInsecureIP))))); |
| |
| // The DnsConfig doesn't contain DoH servers so AUTOMATIC mode will be |
| // downgraded to OFF. A successful plaintext DNS request should result in an |
| // insecure cache entry. |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("automatic", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ASSERT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| HostCache::Key key = HostCache::Key( |
| "automatic", DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| cache_result = GetCacheHit(key); |
| EXPECT_TRUE(!!cache_result); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SecureDnsMode_Automatic_Unavailable) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| dns_client_->SetForceDohServerAvailable(false); |
| |
| // DoH requests should be skipped when there are no available DoH servers |
| // in automatic mode. The cached result should be in the insecure cache. |
| ResolveHostResponseHelper response_automatic(resolver_->CreateRequest( |
| HostPortPair("automatic", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ASSERT_THAT(response_automatic.result_error(), IsOk()); |
| EXPECT_FALSE(response_automatic.request() |
| ->GetResolveErrorInfo() |
| .is_secure_network_error); |
| EXPECT_THAT(response_automatic.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response_automatic.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| HostCache::Key secure_key = HostCache::Key( |
| "automatic", DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| secure_key.secure = true; |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result = |
| GetCacheHit(secure_key); |
| EXPECT_FALSE(!!cache_result); |
| |
| HostCache::Key insecure_key = HostCache::Key( |
| "automatic", DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| cache_result = GetCacheHit(insecure_key); |
| EXPECT_TRUE(!!cache_result); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SecureDnsMode_Automatic_Unavailable_Fail) { |
| set_allow_fallback_to_systemtask(false); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| dns_client_->SetForceDohServerAvailable(false); |
| |
| // Insecure requests that fail should not be cached. |
| ResolveHostResponseHelper response_secure(resolver_->CreateRequest( |
| HostPortPair("secure", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| ASSERT_THAT(response_secure.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE( |
| response_secure.request()->GetResolveErrorInfo().is_secure_network_error); |
| |
| HostCache::Key secure_key = HostCache::Key( |
| "secure", DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| secure_key.secure = true; |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result = |
| GetCacheHit(secure_key); |
| EXPECT_FALSE(!!cache_result); |
| |
| HostCache::Key insecure_key = HostCache::Key( |
| "secure", DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| cache_result = GetCacheHit(insecure_key); |
| EXPECT_FALSE(!!cache_result); |
| } |
| |
| // Test that DoH server availability is respected per-context. |
| TEST_F(HostResolverManagerDnsTest, |
| SecureDnsMode_Automatic_UnavailableByContext) { |
| // Create and register two separate contexts. |
| auto request_context1 = CreateTestURLRequestContextBuilder()->Build(); |
| auto request_context2 = CreateTestURLRequestContextBuilder()->Build(); |
| ResolveContext resolve_context1(request_context1.get(), |
| false /* enable_caching */); |
| ResolveContext resolve_context2(request_context2.get(), |
| false /* enable_caching */); |
| resolver_->RegisterResolveContext(&resolve_context1); |
| resolver_->RegisterResolveContext(&resolve_context2); |
| |
| // Configure the resolver and underlying mock to attempt a secure query iff |
| // the context has marked a DoH server available and otherwise attempt a |
| // non-secure query. |
| set_allow_fallback_to_systemtask(false); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| dns_client_->SetForceDohServerAvailable(false); |
| |
| // Mark a DoH server successful only for |resolve_context2|. Note that this |
| // must come after the resolver's configuration is set because this relies on |
| // the specific configuration containing a DoH server. |
| resolve_context2.RecordServerSuccess(0u /* server_index */, |
| true /* is_doh_server */, |
| dns_client_->GetCurrentSession()); |
| |
| // No available DoH servers for |resolve_context1|, so expect a non-secure |
| // request. Non-secure requests for "secure" will fail with |
| // ERR_NAME_NOT_RESOLVED. |
| ResolveHostResponseHelper response_secure(resolver_->CreateRequest( |
| HostPortPair("secure", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, &resolve_context1, resolve_context_->host_cache())); |
| ASSERT_THAT(response_secure.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| |
| // One available DoH server for |resolve_context2|, so expect a secure |
| // request. Secure requests for "secure" will succeed. |
| ResolveHostResponseHelper response_secure2(resolver_->CreateRequest( |
| HostPortPair("secure", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, &resolve_context2, nullptr /* host_cache */)); |
| ASSERT_THAT(response_secure2.result_error(), IsOk()); |
| |
| resolver_->DeregisterResolveContext(&resolve_context1); |
| resolver_->DeregisterResolveContext(&resolve_context2); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SecureDnsMode_Automatic_Stale) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| // Populate cache with insecure entry. |
| HostCache::Key cached_stale_key = HostCache::Key( |
| "automatic_stale", DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| IPEndPoint kExpectedStaleIP = CreateExpected("192.168.1.102", 80); |
| PopulateCache(cached_stale_key, kExpectedStaleIP); |
| MakeCacheStale(); |
| |
| HostResolver::ResolveHostParameters stale_allowed_parameters; |
| stale_allowed_parameters.cache_usage = |
| HostResolver::ResolveHostParameters::CacheUsage::STALE_ALLOWED; |
| |
| // The insecure cache should be checked before secure requests are made since |
| // stale results are allowed. |
| ResolveHostResponseHelper response_stale(resolver_->CreateRequest( |
| HostPortPair("automatic_stale", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), stale_allowed_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response_stale.result_error(), IsOk()); |
| EXPECT_FALSE( |
| response_stale.request()->GetResolveErrorInfo().is_secure_network_error); |
| EXPECT_THAT(response_stale.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(kExpectedStaleIP)); |
| EXPECT_THAT(response_stale.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(kExpectedStaleIP))))); |
| EXPECT_TRUE(response_stale.request()->GetStaleInfo()->is_stale()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| SecureDnsMode_Automatic_InsecureAsyncDisabled) { |
| proc_->AddRuleForAllFamilies("insecure_automatic", "192.168.1.100"); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| resolver_->SetInsecureDnsClientEnabled( |
| /*enabled=*/false, |
| /*additional_dns_types_enabled=*/false); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result; |
| |
| // The secure part of the dns client should be enabled. |
| ResolveHostResponseHelper response_secure(resolver_->CreateRequest( |
| HostPortPair("automatic", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ASSERT_THAT(response_secure.result_error(), IsOk()); |
| EXPECT_THAT(response_secure.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response_secure.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| HostCache::Key secure_key = HostCache::Key( |
| "automatic", DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| secure_key.secure = true; |
| cache_result = GetCacheHit(secure_key); |
| EXPECT_TRUE(!!cache_result); |
| |
| // The insecure part of the dns client is disabled so insecure requests |
| // should be skipped. |
| ResolveHostResponseHelper response_insecure(resolver_->CreateRequest( |
| HostPortPair("insecure_automatic", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| proc_->SignalMultiple(1u); |
| ASSERT_THAT(response_insecure.result_error(), IsOk()); |
| EXPECT_THAT(response_insecure.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.100", 80))); |
| EXPECT_THAT(response_insecure.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.100", 80)))))); |
| HostCache::Key insecure_key = |
| HostCache::Key("insecure_automatic", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| NetworkAnonymizationKey()); |
| cache_result = GetCacheHit(insecure_key); |
| EXPECT_TRUE(!!cache_result); |
| |
| HostCache::Key cached_insecure_key = |
| HostCache::Key("insecure_automatic_cached", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| NetworkAnonymizationKey()); |
| IPEndPoint kExpectedInsecureIP = CreateExpected("192.168.1.101", 80); |
| PopulateCache(cached_insecure_key, kExpectedInsecureIP); |
| |
| // The insecure cache should still be checked even if the insecure part of |
| // the dns client is disabled. |
| ResolveHostResponseHelper response_insecure_cached(resolver_->CreateRequest( |
| HostPortPair("insecure_automatic_cached", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response_insecure_cached.result_error(), IsOk()); |
| EXPECT_THAT( |
| response_insecure_cached.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(kExpectedInsecureIP)); |
| EXPECT_THAT(response_insecure_cached.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(kExpectedInsecureIP))))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SecureDnsMode_Automatic_DotActive) { |
| proc_->AddRuleForAllFamilies("insecure_automatic", "192.168.1.100"); |
| DnsConfig config = CreateValidDnsConfig(); |
| config.dns_over_tls_active = true; |
| ChangeDnsConfig(config); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result; |
| |
| // The secure part of the dns client should be enabled. |
| ResolveHostResponseHelper response_secure(resolver_->CreateRequest( |
| HostPortPair("automatic", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ASSERT_THAT(response_secure.result_error(), IsOk()); |
| EXPECT_THAT(response_secure.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response_secure.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| HostCache::Key secure_key = HostCache::Key( |
| "automatic", DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| secure_key.secure = true; |
| cache_result = GetCacheHit(secure_key); |
| EXPECT_TRUE(!!cache_result); |
| |
| // Insecure async requests should be skipped since the system resolver |
| // requests will be secure. |
| ResolveHostResponseHelper response_insecure(resolver_->CreateRequest( |
| HostPortPair("insecure_automatic", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| proc_->SignalMultiple(1u); |
| ASSERT_THAT(response_insecure.result_error(), IsOk()); |
| EXPECT_FALSE(response_insecure.request() |
| ->GetResolveErrorInfo() |
| .is_secure_network_error); |
| EXPECT_THAT(response_insecure.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.100", 80))); |
| EXPECT_THAT(response_insecure.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.100", 80)))))); |
| HostCache::Key insecure_key = |
| HostCache::Key("insecure_automatic", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| NetworkAnonymizationKey()); |
| cache_result = GetCacheHit(insecure_key); |
| EXPECT_TRUE(!!cache_result); |
| |
| HostCache::Key cached_insecure_key = |
| HostCache::Key("insecure_automatic_cached", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| NetworkAnonymizationKey()); |
| IPEndPoint kExpectedInsecureIP = CreateExpected("192.168.1.101", 80); |
| PopulateCache(cached_insecure_key, kExpectedInsecureIP); |
| |
| // The insecure cache should still be checked. |
| ResolveHostResponseHelper response_insecure_cached(resolver_->CreateRequest( |
| HostPortPair("insecure_automatic_cached", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response_insecure_cached.result_error(), IsOk()); |
| EXPECT_FALSE(response_insecure_cached.request() |
| ->GetResolveErrorInfo() |
| .is_secure_network_error); |
| EXPECT_THAT( |
| response_insecure_cached.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(kExpectedInsecureIP)); |
| EXPECT_THAT(response_insecure_cached.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(kExpectedInsecureIP))))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SecureDnsMode_Secure) { |
| proc_->AddRuleForAllFamilies("nx_succeed", "192.168.1.100"); |
| set_allow_fallback_to_systemtask(true); |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result; |
| |
| ResolveHostResponseHelper response_secure(resolver_->CreateRequest( |
| HostPortPair("secure", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| ASSERT_THAT(response_secure.result_error(), IsOk()); |
| EXPECT_FALSE( |
| response_secure.request()->GetResolveErrorInfo().is_secure_network_error); |
| HostCache::Key secure_key = HostCache::Key( |
| "secure", DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| secure_key.secure = true; |
| cache_result = GetCacheHit(secure_key); |
| EXPECT_TRUE(!!cache_result); |
| |
| ResolveHostResponseHelper response_insecure(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| ASSERT_THAT(response_insecure.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_TRUE(response_insecure.request() |
| ->GetResolveErrorInfo() |
| .is_secure_network_error); |
| HostCache::Key insecure_key = HostCache::Key( |
| "ok", DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| cache_result = GetCacheHit(insecure_key); |
| EXPECT_FALSE(!!cache_result); |
| |
| // Fallback to HostResolverSystemTask not allowed in SECURE mode. |
| ResolveHostResponseHelper response_system(resolver_->CreateRequest( |
| HostPortPair("nx_succeed", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| proc_->SignalMultiple(1u); |
| EXPECT_THAT(response_system.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_TRUE( |
| response_system.request()->GetResolveErrorInfo().is_secure_network_error); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SecureDnsMode_Secure_InsecureAsyncDisabled) { |
| proc_->AddRuleForAllFamilies("nx_succeed", "192.168.1.100"); |
| set_allow_fallback_to_systemtask(true); |
| resolver_->SetInsecureDnsClientEnabled( |
| /*enabled=*/false, |
| /*additional_dns_types_enabled=*/false); |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result; |
| |
| // The secure part of the dns client should be enabled. |
| ResolveHostResponseHelper response_secure(resolver_->CreateRequest( |
| HostPortPair("secure", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| ASSERT_THAT(response_secure.result_error(), IsOk()); |
| HostCache::Key secure_key = HostCache::Key( |
| "secure", DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| secure_key.secure = true; |
| cache_result = GetCacheHit(secure_key); |
| EXPECT_TRUE(!!cache_result); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SecureDnsMode_Secure_Local_CacheMiss) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| HostResolver::ResolveHostParameters source_none_parameters; |
| source_none_parameters.source = HostResolverSource::LOCAL_ONLY; |
| |
| // Populate cache with an insecure entry. |
| HostCache::Key cached_insecure_key = HostCache::Key( |
| "automatic", DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| IPEndPoint kExpectedInsecureIP = CreateExpected("192.168.1.102", 80); |
| PopulateCache(cached_insecure_key, kExpectedInsecureIP); |
| |
| // NONE query expected to complete synchronously with a cache miss since |
| // the insecure cache should not be checked. |
| ResolveHostResponseHelper cache_miss_request(resolver_->CreateRequest( |
| HostPortPair("automatic", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), source_none_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_TRUE(cache_miss_request.complete()); |
| EXPECT_THAT(cache_miss_request.result_error(), IsError(ERR_DNS_CACHE_MISS)); |
| EXPECT_FALSE(cache_miss_request.request() |
| ->GetResolveErrorInfo() |
| .is_secure_network_error); |
| EXPECT_FALSE(cache_miss_request.request()->GetAddressResults()); |
| EXPECT_FALSE(cache_miss_request.request()->GetEndpointResults()); |
| EXPECT_FALSE(cache_miss_request.request()->GetStaleInfo()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SecureDnsMode_Secure_Local_CacheHit) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| HostResolver::ResolveHostParameters source_none_parameters; |
| source_none_parameters.source = HostResolverSource::LOCAL_ONLY; |
| |
| // Populate cache with a secure entry. |
| HostCache::Key cached_secure_key = HostCache::Key( |
| "secure", DnsQueryType::UNSPECIFIED, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| cached_secure_key.secure = true; |
| IPEndPoint kExpectedSecureIP = CreateExpected("192.168.1.103", 80); |
| PopulateCache(cached_secure_key, kExpectedSecureIP); |
| |
| // NONE query expected to complete synchronously with a cache hit from the |
| // secure cache. |
| ResolveHostResponseHelper response_cached(resolver_->CreateRequest( |
| HostPortPair("secure", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_TRUE(response_cached.complete()); |
| EXPECT_THAT(response_cached.result_error(), IsOk()); |
| EXPECT_FALSE( |
| response_cached.request()->GetResolveErrorInfo().is_secure_network_error); |
| EXPECT_THAT(response_cached.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(kExpectedSecureIP)); |
| EXPECT_THAT(response_cached.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(kExpectedSecureIP))))); |
| } |
| |
| // On an IPv6 network, if we get A results and the AAAA response is SERVFAIL, we |
| // fail the whole DnsTask rather than proceeding with just the A results. In |
| // SECURE mode, fallback to the system resolver is disabled. See |
| // https://crbug.com/1292324. |
| TEST_F(HostResolverManagerDnsTest, |
| SecureDnsModeIsSecureAndAAAAServfailCausesFailDespiteAResults) { |
| constexpr char kName[] = "name.test"; |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result( |
| MockDnsClientRule::ResultType::kOk, |
| BuildTestDnsAddressResponse(kName, IPAddress(192, 168, 1, 103))), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kFail), |
| /*delay=*/false); |
| |
| DnsConfig config = CreateValidDnsConfig(); |
| config.use_local_ipv6 = true; |
| |
| CreateResolver(); |
| UseMockDnsClient(config, std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), |
| /*optional_parameters=*/absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Expect result not cached. |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 0u); |
| } |
| |
| // Test for a resolve with a transaction that takes longer than usual to |
| // complete. With the typical behavior of using fast timeouts, this is expected |
| // to timeout and fallback to the system resolver. |
| TEST_F(HostResolverManagerDnsTest, SlowResolve) { |
| // Add a successful fallback result. |
| proc_->AddRuleForAllFamilies("slow_succeed", "192.168.1.211"); |
| |
| MockDnsClientRuleList rules = CreateDefaultDnsRules(); |
| AddDnsRule(&rules, "slow_fail", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kSlow, false /* delay */); |
| AddDnsRule(&rules, "slow_fail", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kSlow, false /* delay */); |
| AddDnsRule(&rules, "slow_succeed", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kSlow, false /* delay */); |
| AddDnsRule(&rules, "slow_succeed", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kSlow, false /* delay */); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| ResolveHostResponseHelper response0(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("slow_fail", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper response2(resolver_->CreateRequest( |
| HostPortPair("slow_succeed", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| proc_->SignalMultiple(3u); |
| |
| EXPECT_THAT(response0.result_error(), IsOk()); |
| EXPECT_THAT(response0.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response0.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| EXPECT_THAT(response1.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_THAT(response2.result_error(), IsOk()); |
| EXPECT_THAT(response2.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.211", 80))); |
| EXPECT_THAT(response2.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.211", 80)))))); |
| } |
| |
| // Test for a resolve with a secure transaction that takes longer than usual to |
| // complete. In automatic mode, because fallback to insecure is available, the |
| // secure transaction is expected to quickly timeout and fallback to insecure. |
| TEST_F(HostResolverManagerDnsTest, SlowSecureResolve_AutomaticMode) { |
| set_allow_fallback_to_systemtask(false); |
| |
| MockDnsClientRuleList rules = CreateDefaultDnsRules(); |
| AddSecureDnsRule(&rules, "slow_fail", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kSlow, false /* delay */); |
| AddSecureDnsRule(&rules, "slow_fail", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kSlow, false /* delay */); |
| AddSecureDnsRule(&rules, "slow_succeed", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kSlow, false /* delay */); |
| AddSecureDnsRule(&rules, "slow_succeed", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kSlow, false /* delay */); |
| AddDnsRule(&rules, "slow_succeed", dns_protocol::kTypeA, |
| IPAddress(111, 222, 112, 223), false /* delay */); |
| AddDnsRule(&rules, "slow_succeed", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kEmpty, false /* delay */); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response0(resolver_->CreateRequest( |
| HostPortPair("secure", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("slow_fail", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ResolveHostResponseHelper response2(resolver_->CreateRequest( |
| HostPortPair("slow_succeed", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response0.result_error(), IsOk()); |
| EXPECT_THAT(response0.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response0.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| EXPECT_THAT(response1.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_THAT(response2.result_error(), IsOk()); |
| EXPECT_THAT(response2.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("111.222.112.223", 80))); |
| EXPECT_THAT( |
| response2.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("111.222.112.223", 80)))))); |
| } |
| |
| // Test for a resolve with a secure transaction that takes longer than usual to |
| // complete. In secure mode, because no fallback is available, this is expected |
| // to wait longer before timeout and complete successfully. |
| TEST_F(HostResolverManagerDnsTest, SlowSecureResolve_SecureMode) { |
| MockDnsClientRuleList rules = CreateDefaultDnsRules(); |
| AddSecureDnsRule(&rules, "slow", dns_protocol::kTypeA, |
| MockDnsClientRule::ResultType::kSlow, false /* delay */); |
| AddSecureDnsRule(&rules, "slow", dns_protocol::kTypeAAAA, |
| MockDnsClientRule::ResultType::kSlow, false /* delay */); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response0(resolver_->CreateRequest( |
| HostPortPair("secure", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("slow", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response0.result_error(), IsOk()); |
| EXPECT_THAT(response1.result_error(), IsOk()); |
| } |
| |
| // Test the case where only a single transaction slot is available. |
| TEST_F(HostResolverManagerDnsTest, SerialResolver) { |
| CreateSerialResolver(); |
| set_allow_fallback_to_systemtask(false); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_FALSE(response.complete()); |
| EXPECT_EQ(1u, num_running_dispatcher_jobs()); |
| |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_TRUE(response.complete()); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| } |
| |
| // Test the case where subsequent transactions are handled on transaction |
| // completion when only part of a multi-transaction request could be initially |
| // started. |
| TEST_F(HostResolverManagerDnsTest, AAAAStartsAfterOtherJobFinishes) { |
| CreateResolverWithLimitsAndParams(3u, DefaultParams(proc_), |
| true /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */); |
| set_allow_fallback_to_systemtask(false); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| ResolveHostResponseHelper response0(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_EQ(2u, num_running_dispatcher_jobs()); |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("4slow_ok", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_EQ(3u, num_running_dispatcher_jobs()); |
| |
| // Request 0's transactions should complete, starting Request 1's second |
| // transaction, which should also complete. |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_EQ(1u, num_running_dispatcher_jobs()); |
| EXPECT_TRUE(response0.complete()); |
| EXPECT_FALSE(response1.complete()); |
| |
| dns_client_->CompleteDelayedTransactions(); |
| EXPECT_THAT(response1.result_error(), IsOk()); |
| EXPECT_THAT(response1.request()->GetAddressResults()->endpoints(), |
| testing::UnorderedElementsAre(CreateExpected("127.0.0.1", 80), |
| CreateExpected("::1", 80))); |
| EXPECT_THAT( |
| response1.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::UnorderedElementsAre( |
| CreateExpected("::1", 80), CreateExpected("127.0.0.1", 80)))))); |
| } |
| |
| // Tests the case that a Job with a single transaction receives an empty address |
| // list, triggering fallback to HostResolverSystemTask. |
| TEST_F(HostResolverManagerDnsTest, IPv4EmptyFallback) { |
| // Disable ipv6 to ensure we'll only try a single transaction for the host. |
| CreateResolverWithLimitsAndParams(kMaxJobs, DefaultParams(proc_), |
| false /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */); |
| DnsConfig config = CreateValidDnsConfig(); |
| config.use_local_ipv6 = false; |
| ChangeDnsConfig(config); |
| |
| proc_->AddRuleForAllFamilies("empty_fallback", "192.168.0.1", |
| HOST_RESOLVER_DEFAULT_FAMILY_SET_DUE_TO_NO_IPV6); |
| proc_->SignalMultiple(1u); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("empty_fallback", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.0.1", 80))); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.0.1", 80)))))); |
| } |
| |
| // Tests the case that a Job with two transactions receives two empty address |
| // lists, triggering fallback to HostResolverSystemTask. |
| TEST_F(HostResolverManagerDnsTest, UnspecEmptyFallback) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| proc_->AddRuleForAllFamilies("empty_fallback", "192.168.0.1"); |
| proc_->SignalMultiple(1u); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("empty_fallback", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.0.1", 80))); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.0.1", 80)))))); |
| } |
| |
| // Tests getting a new invalid DnsConfig while there are active DnsTasks. |
| TEST_F(HostResolverManagerDnsTest, InvalidDnsConfigWithPendingRequests) { |
| // At most 3 jobs active at once. This number is important, since we want |
| // to make sure that aborting the first HostResolverManager::Job does not |
| // trigger another DnsTransaction on the second Job when it releases its |
| // second prioritized dispatcher slot. |
| CreateResolverWithLimitsAndParams(3u, DefaultParams(proc_), |
| true /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */); |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| proc_->AddRuleForAllFamilies("slow_nx1", "192.168.0.1"); |
| proc_->AddRuleForAllFamilies("slow_nx2", "192.168.0.2"); |
| proc_->AddRuleForAllFamilies("ok", "192.168.0.3"); |
| |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| // First active job gets two slots. |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("slow_nx1", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| // Next job gets one slot, and waits on another. |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("slow_nx2", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| |
| EXPECT_EQ(3u, num_running_dispatcher_jobs()); |
| for (auto& response : responses) { |
| EXPECT_FALSE(response->complete()); |
| } |
| |
| // Clear DNS config. Fully in-progress, partially in-progress, and queued |
| // requests should all be aborted. |
| InvalidateDnsConfig(); |
| for (auto& response : responses) { |
| EXPECT_THAT(response->result_error(), IsError(ERR_NETWORK_CHANGED)); |
| } |
| } |
| |
| // Test that initial DNS config read signals do not abort pending requests |
| // when using DnsClient. |
| TEST_F(HostResolverManagerDnsTest, DontAbortOnInitialDNSConfigRead) { |
| // DnsClient is enabled, but there's no DnsConfig, so the request should start |
| // using HostResolverSystemTask. |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host1", 70), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_FALSE(response.complete()); |
| |
| EXPECT_TRUE(proc_->WaitFor(1u)); |
| // Send the initial config read signal, with a valid config. |
| SetInitialDnsConfig(CreateValidDnsConfig()); |
| proc_->SignalAll(); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| } |
| |
| // Tests the case that the insecure part of the DnsClient is automatically |
| // disabled due to failures while there are active DnsTasks. |
| TEST_F(HostResolverManagerDnsTest, |
| AutomaticallyDisableInsecureDnsClientWithPendingRequests) { |
| // Trying different limits is important for this test: Different limits |
| // result in different behavior when aborting in-progress DnsTasks. Having |
| // a DnsTask that has one job active and one in the queue when another job |
| // occupying two slots has its DnsTask aborted is the case most likely to run |
| // into problems. Try limits between [1, 2 * # of non failure requests]. |
| for (size_t limit = 1u; limit < 10u; ++limit) { |
| CreateResolverWithLimitsAndParams(limit, DefaultParams(proc_), |
| true /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */); |
| |
| // Set the resolver in automatic-secure mode. |
| net::DnsConfig config = CreateValidDnsConfig(); |
| config.secure_dns_mode = SecureDnsMode::kAutomatic; |
| ChangeDnsConfig(config); |
| |
| // Start with request parameters that disable Secure DNS. |
| HostResolver::ResolveHostParameters parameters; |
| parameters.secure_dns_policy = SecureDnsPolicy::kDisable; |
| |
| // Queue up enough failures to disable insecure DnsTasks. These will all |
| // fall back to HostResolverSystemTasks, and succeed there. |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> failure_responses; |
| for (unsigned i = 0u; i < maximum_insecure_dns_task_failures(); ++i) { |
| std::string host = base::StringPrintf("nx%u", i); |
| proc_->AddRuleForAllFamilies(host, "192.168.0.1"); |
| failure_responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair(host, 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| EXPECT_FALSE(failure_responses[i]->complete()); |
| } |
| |
| // These requests should all bypass insecure DnsTasks, due to the above |
| // failures, so should end up using HostResolverSystemTasks. |
| proc_->AddRuleForAllFamilies("slow_ok1", "192.168.0.2"); |
| ResolveHostResponseHelper response0(resolver_->CreateRequest( |
| HostPortPair("slow_ok1", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_FALSE(response0.complete()); |
| proc_->AddRuleForAllFamilies("slow_ok2", "192.168.0.3"); |
| ResolveHostResponseHelper response1(resolver_->CreateRequest( |
| HostPortPair("slow_ok2", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_FALSE(response1.complete()); |
| proc_->AddRuleForAllFamilies("slow_ok3", "192.168.0.4"); |
| ResolveHostResponseHelper response2(resolver_->CreateRequest( |
| HostPortPair("slow_ok3", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_FALSE(response2.complete()); |
| |
| // Requests specifying DNS source cannot fallback to HostResolverSystemTask, |
| // so they should be unaffected. |
| parameters.source = HostResolverSource::DNS; |
| ResolveHostResponseHelper response_dns(resolver_->CreateRequest( |
| HostPortPair("6slow_ok", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_FALSE(response_dns.complete()); |
| |
| // Requests specifying SYSTEM source should be unaffected by disabling |
| // DnsClient. |
| proc_->AddRuleForAllFamilies("nx_ok", "192.168.0.5"); |
| parameters.source = HostResolverSource::SYSTEM; |
| ResolveHostResponseHelper response_system(resolver_->CreateRequest( |
| HostPortPair("nx_ok", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_FALSE(response_system.complete()); |
| |
| // Secure DnsTasks should not be affected. |
| ResolveHostResponseHelper response_secure(resolver_->CreateRequest( |
| HostPortPair("automatic", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), /* optional_parameters=*/absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_FALSE(response_secure.complete()); |
| |
| proc_->SignalMultiple(maximum_insecure_dns_task_failures() + 4); |
| |
| for (size_t i = 0u; i < maximum_insecure_dns_task_failures(); ++i) { |
| EXPECT_THAT(failure_responses[i]->result_error(), IsOk()); |
| EXPECT_THAT( |
| failure_responses[i]->request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.0.1", 80))); |
| EXPECT_THAT( |
| failure_responses[i]->request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.0.1", 80)))))); |
| } |
| |
| EXPECT_THAT(response0.result_error(), IsOk()); |
| EXPECT_THAT(response0.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.0.2", 80))); |
| EXPECT_THAT(response0.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.0.2", 80)))))); |
| EXPECT_THAT(response1.result_error(), IsOk()); |
| EXPECT_THAT(response1.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.0.3", 80))); |
| EXPECT_THAT(response1.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.0.3", 80)))))); |
| EXPECT_THAT(response2.result_error(), IsOk()); |
| EXPECT_THAT(response2.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.0.4", 80))); |
| EXPECT_THAT(response2.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.0.4", 80)))))); |
| |
| dns_client_->CompleteDelayedTransactions(); |
| EXPECT_THAT(response_dns.result_error(), IsOk()); |
| |
| EXPECT_THAT(response_system.result_error(), IsOk()); |
| EXPECT_THAT(response_system.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.0.5", 80))); |
| EXPECT_THAT(response_system.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.0.5", 80)))))); |
| |
| EXPECT_THAT(response_secure.result_error(), IsOk()); |
| } |
| } |
| |
| // Tests a call to SetDnsClient while there are active DnsTasks. |
| TEST_F(HostResolverManagerDnsTest, |
| ManuallyDisableDnsClientWithPendingRequests) { |
| // At most 3 jobs active at once. This number is important, since we want to |
| // make sure that aborting the first HostResolverManager::Job does not trigger |
| // another DnsTransaction on the second Job when it releases its second |
| // prioritized dispatcher slot. |
| CreateResolverWithLimitsAndParams(3u, DefaultParams(proc_), |
| true /* ipv6_reachable */, |
| true /* check_ipv6_on_wifi */); |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| proc_->AddRuleForAllFamilies("slow_ok1", "192.168.0.1"); |
| proc_->AddRuleForAllFamilies("slow_ok2", "192.168.0.2"); |
| proc_->AddRuleForAllFamilies("ok", "192.168.0.3"); |
| |
| std::vector<std::unique_ptr<ResolveHostResponseHelper>> responses; |
| // First active job gets two slots. |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("slow_ok1", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| EXPECT_FALSE(responses[0]->complete()); |
| // Next job gets one slot, and waits on another. |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("slow_ok2", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| EXPECT_FALSE(responses[1]->complete()); |
| // Next one is queued. |
| responses.emplace_back( |
| std::make_unique<ResolveHostResponseHelper>(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache()))); |
| EXPECT_FALSE(responses[2]->complete()); |
| |
| EXPECT_EQ(3u, num_running_dispatcher_jobs()); |
| |
| // Clear DnsClient. The two in-progress jobs should fall back to a |
| // HostResolverSystemTask, and the next one should be started with a |
| // HostResolverSystemTask. |
| resolver_->SetInsecureDnsClientEnabled( |
| /*enabled=*/false, |
| /*additional_dns_types_enabled=*/false); |
| |
| // All three in-progress requests should now be running a |
| // HostResolverSystemTask. |
| EXPECT_EQ(3u, num_running_dispatcher_jobs()); |
| proc_->SignalMultiple(3u); |
| |
| for (auto& response : responses) { |
| EXPECT_THAT(response->result_error(), IsOk()); |
| } |
| EXPECT_THAT(responses[0]->request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.0.1", 80))); |
| EXPECT_THAT(responses[0]->request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.0.1", 80)))))); |
| EXPECT_THAT(responses[1]->request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.0.2", 80))); |
| EXPECT_THAT(responses[1]->request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.0.2", 80)))))); |
| EXPECT_THAT(responses[2]->request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.0.3", 80))); |
| EXPECT_THAT(responses[2]->request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.0.3", 80)))))); |
| } |
| |
| // When explicitly requesting source=DNS, no fallback allowed, so doing so with |
| // DnsClient disabled should result in an error. |
| TEST_F(HostResolverManagerDnsTest, DnsCallsWithDisabledDnsClient) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| resolver_->SetInsecureDnsClientEnabled( |
| /*enabled=*/false, |
| /*additional_dns_types_enabled=*/false); |
| |
| HostResolver::ResolveHostParameters params; |
| params.source = HostResolverSource::DNS; |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| params, resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_CACHE_MISS)); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| DnsCallsWithDisabledDnsClient_DisabledAtConstruction) { |
| HostResolver::ManagerOptions options = DefaultOptions(); |
| options.insecure_dns_client_enabled = false; |
| CreateResolverWithOptionsAndParams(std::move(options), DefaultParams(proc_), |
| true /* ipv6_reachable */); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| HostResolver::ResolveHostParameters params; |
| params.source = HostResolverSource::DNS; |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| params, resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_CACHE_MISS)); |
| } |
| |
| // Same as DnsClient disabled, requests with source=DNS and no usable DnsConfig |
| // should result in an error. |
| TEST_F(HostResolverManagerDnsTest, DnsCallsWithNoDnsConfig) { |
| InvalidateDnsConfig(); |
| |
| HostResolver::ResolveHostParameters params; |
| params.source = HostResolverSource::DNS; |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| params, resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_CACHE_MISS)); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, NoCheckIpv6OnWifi) { |
| // CreateSerialResolver will destroy the current resolver_ which will attempt |
| // to remove itself from the NetworkChangeNotifier. If this happens after a |
| // new NetworkChangeNotifier is active, then it will not remove itself from |
| // the old NetworkChangeNotifier which is a potential use-after-free. |
| DestroyResolver(); |
| test::ScopedMockNetworkChangeNotifier notifier; |
| // Serial resolver to guarantee order of resolutions. |
| CreateSerialResolver(false /* check_ipv6_on_wifi */); |
| |
| notifier.mock_network_change_notifier()->SetConnectionType( |
| NetworkChangeNotifier::CONNECTION_WIFI); |
| // Needed so IPv6 availability check isn't skipped. |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| proc_->AddRule("h1", ADDRESS_FAMILY_UNSPECIFIED, "::3"); |
| proc_->AddRule("h1", ADDRESS_FAMILY_IPV4, "1.0.0.1"); |
| proc_->AddRule("h1", ADDRESS_FAMILY_IPV4, "1.0.0.1", |
| HOST_RESOLVER_DEFAULT_FAMILY_SET_DUE_TO_NO_IPV6); |
| proc_->AddRule("h1", ADDRESS_FAMILY_IPV6, "::2"); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("h1", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::A; |
| ResolveHostResponseHelper v4_response(resolver_->CreateRequest( |
| HostPortPair("h1", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| parameters.dns_query_type = DnsQueryType::AAAA; |
| ResolveHostResponseHelper v6_response(resolver_->CreateRequest( |
| HostPortPair("h1", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| |
| proc_->SignalMultiple(3u); |
| |
| // Should revert to only IPV4 request. |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("1.0.0.1", 80))); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("1.0.0.1", 80)))))); |
| |
| EXPECT_THAT(v4_response.result_error(), IsOk()); |
| EXPECT_THAT(v4_response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("1.0.0.1", 80))); |
| EXPECT_THAT(v4_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("1.0.0.1", 80)))))); |
| EXPECT_THAT(v6_response.result_error(), IsOk()); |
| EXPECT_THAT(v6_response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("::2", 80))); |
| EXPECT_THAT(v6_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("::2", 80)))))); |
| |
| // Now repeat the test on non-wifi to check that IPv6 is used as normal |
| // after the network changes. |
| notifier.mock_network_change_notifier()->SetConnectionType( |
| NetworkChangeNotifier::CONNECTION_4G); |
| base::RunLoop().RunUntilIdle(); // Wait for NetworkChangeNotifier. |
| |
| ResolveHostResponseHelper no_wifi_response(resolver_->CreateRequest( |
| HostPortPair("h1", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| parameters.dns_query_type = DnsQueryType::A; |
| ResolveHostResponseHelper no_wifi_v4_response(resolver_->CreateRequest( |
| HostPortPair("h1", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| parameters.dns_query_type = DnsQueryType::AAAA; |
| ResolveHostResponseHelper no_wifi_v6_response(resolver_->CreateRequest( |
| HostPortPair("h1", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| |
| proc_->SignalMultiple(3u); |
| |
| // IPV6 should be available. |
| EXPECT_THAT(no_wifi_response.result_error(), IsOk()); |
| EXPECT_THAT(no_wifi_response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("::3", 80))); |
| EXPECT_THAT(no_wifi_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("::3", 80)))))); |
| |
| EXPECT_THAT(no_wifi_v4_response.result_error(), IsOk()); |
| EXPECT_THAT(no_wifi_v4_response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("1.0.0.1", 80))); |
| EXPECT_THAT(no_wifi_v4_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("1.0.0.1", 80)))))); |
| EXPECT_THAT(no_wifi_v6_response.result_error(), IsOk()); |
| EXPECT_THAT(no_wifi_v6_response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("::2", 80))); |
| EXPECT_THAT(no_wifi_v6_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("::2", 80)))))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, NotFoundTTL) { |
| CreateResolver(); |
| set_allow_fallback_to_systemtask(false); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| // NODATA |
| ResolveHostResponseHelper no_data_response(resolver_->CreateRequest( |
| HostPortPair("empty", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(no_data_response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(no_data_response.request()->GetAddressResults()); |
| EXPECT_FALSE(no_data_response.request()->GetEndpointResults()); |
| HostCache::Key key("empty", DnsQueryType::UNSPECIFIED, 0, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| HostCache::EntryStaleness staleness; |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result = |
| resolve_context_->host_cache()->Lookup(key, base::TimeTicks::Now(), |
| false /* ignore_secure */); |
| EXPECT_TRUE(!!cache_result); |
| EXPECT_TRUE(cache_result->second.has_ttl()); |
| EXPECT_THAT(cache_result->second.ttl(), base::Seconds(86400)); |
| |
| // NXDOMAIN |
| ResolveHostResponseHelper no_domain_response(resolver_->CreateRequest( |
| HostPortPair("nodomain", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(no_domain_response.result_error(), |
| IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(no_domain_response.request()->GetAddressResults()); |
| EXPECT_FALSE(no_domain_response.request()->GetEndpointResults()); |
| HostCache::Key nxkey("nodomain", DnsQueryType::UNSPECIFIED, 0, |
| HostResolverSource::ANY, NetworkAnonymizationKey()); |
| cache_result = resolve_context_->host_cache()->Lookup( |
| nxkey, base::TimeTicks::Now(), false /* ignore_secure */); |
| EXPECT_TRUE(!!cache_result); |
| EXPECT_TRUE(cache_result->second.has_ttl()); |
| EXPECT_THAT(cache_result->second.ttl(), base::Seconds(86400)); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, CachedError) { |
| proc_->AddRuleForAllFamilies(std::string(), |
| "0.0.0.1"); // Default to failures. |
| proc_->SignalMultiple(1u); |
| |
| CreateResolver(); |
| set_allow_fallback_to_systemtask(true); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| HostResolver::ResolveHostParameters cache_only_parameters; |
| cache_only_parameters.source = HostResolverSource::LOCAL_ONLY; |
| |
| // Expect cache initially empty. |
| ResolveHostResponseHelper cache_miss_response0(resolver_->CreateRequest( |
| HostPortPair("nodomain", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), cache_only_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(cache_miss_response0.result_error(), IsError(ERR_DNS_CACHE_MISS)); |
| EXPECT_FALSE(cache_miss_response0.request()->GetStaleInfo()); |
| |
| // The cache should not be populate with an error because fallback to |
| // HostResolverSystemTask was available. |
| ResolveHostResponseHelper no_domain_response_with_fallback( |
| resolver_->CreateRequest(HostPortPair("nodomain", 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(no_domain_response_with_fallback.result_error(), |
| IsError(ERR_NAME_NOT_RESOLVED)); |
| |
| // Expect cache still empty. |
| ResolveHostResponseHelper cache_miss_response1(resolver_->CreateRequest( |
| HostPortPair("nodomain", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), cache_only_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(cache_miss_response1.result_error(), IsError(ERR_DNS_CACHE_MISS)); |
| EXPECT_FALSE(cache_miss_response1.request()->GetStaleInfo()); |
| |
| // Disable fallback to systemtask |
| set_allow_fallback_to_systemtask(false); |
| |
| // Populate cache with an error. |
| ResolveHostResponseHelper no_domain_response(resolver_->CreateRequest( |
| HostPortPair("nodomain", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(no_domain_response.result_error(), |
| IsError(ERR_NAME_NOT_RESOLVED)); |
| |
| // Expect the error result can be resolved from the cache. |
| ResolveHostResponseHelper cache_hit_response(resolver_->CreateRequest( |
| HostPortPair("nodomain", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), cache_only_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(cache_hit_response.result_error(), |
| IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(cache_hit_response.request()->GetStaleInfo().value().is_stale()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, CachedError_AutomaticMode) { |
| CreateResolver(); |
| set_allow_fallback_to_systemtask(false); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| // Switch to automatic mode. |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| HostCache::Key insecure_key = |
| HostCache::Key("automatic_nodomain", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| NetworkAnonymizationKey()); |
| HostCache::Key secure_key = |
| HostCache::Key("automatic_nodomain", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| NetworkAnonymizationKey()); |
| secure_key.secure = true; |
| |
| // Expect cache initially empty. |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result; |
| cache_result = GetCacheHit(secure_key); |
| EXPECT_FALSE(!!cache_result); |
| cache_result = GetCacheHit(insecure_key); |
| EXPECT_FALSE(!!cache_result); |
| |
| // Populate both secure and insecure caches with an error. |
| ResolveHostResponseHelper no_domain_response(resolver_->CreateRequest( |
| HostPortPair("automatic_nodomain", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(no_domain_response.result_error(), |
| IsError(ERR_NAME_NOT_RESOLVED)); |
| |
| // Expect both secure and insecure caches to have the error result. |
| cache_result = GetCacheHit(secure_key); |
| EXPECT_TRUE(!!cache_result); |
| cache_result = GetCacheHit(insecure_key); |
| EXPECT_TRUE(!!cache_result); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, CachedError_SecureMode) { |
| CreateResolver(); |
| set_allow_fallback_to_systemtask(false); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| // Switch to secure mode. |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| HostCache::Key insecure_key = |
| HostCache::Key("automatic_nodomain", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| NetworkAnonymizationKey()); |
| HostCache::Key secure_key = |
| HostCache::Key("automatic_nodomain", DnsQueryType::UNSPECIFIED, |
| 0 /* host_resolver_flags */, HostResolverSource::ANY, |
| NetworkAnonymizationKey()); |
| secure_key.secure = true; |
| |
| // Expect cache initially empty. |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result; |
| cache_result = GetCacheHit(secure_key); |
| EXPECT_FALSE(!!cache_result); |
| cache_result = GetCacheHit(insecure_key); |
| EXPECT_FALSE(!!cache_result); |
| |
| // Populate secure cache with an error. |
| ResolveHostResponseHelper no_domain_response(resolver_->CreateRequest( |
| HostPortPair("automatic_nodomain", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(no_domain_response.result_error(), |
| IsError(ERR_NAME_NOT_RESOLVED)); |
| |
| // Expect only the secure cache to have the error result. |
| cache_result = GetCacheHit(secure_key); |
| EXPECT_TRUE(!!cache_result); |
| cache_result = GetCacheHit(insecure_key); |
| EXPECT_FALSE(!!cache_result); |
| } |
| |
| // Test that if one of A and AAAA completes successfully and the other fails, |
| // the failure is not cached. |
| TEST_F(HostResolverManagerDnsTest, TtlNotSharedBetweenQtypes) { |
| CreateResolver(); |
| set_allow_fallback_to_systemtask(false); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("4slow_4timeout", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt /* optional_parameters */, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| // Ensure success completes before the timeout result. |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| dns_client_->CompleteDelayedTransactions(); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_TIMED_OUT)); |
| |
| // Expect failure not cached. |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 0u); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, CanonicalName) { |
| MockDnsClientRuleList rules; |
| AddDnsRule(&rules, "alias", dns_protocol::kTypeA, IPAddress::IPv4Localhost(), |
| "canonical", false /* delay */); |
| AddDnsRule(&rules, "alias", dns_protocol::kTypeAAAA, |
| IPAddress::IPv6Localhost(), "canonical", false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| set_allow_fallback_to_systemtask(false); |
| |
| HostResolver::ResolveHostParameters params; |
| params.source = HostResolverSource::DNS; |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("alias", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| params, resolve_context_.get(), resolve_context_->host_cache())); |
| ASSERT_THAT(response.result_error(), IsOk()); |
| |
| EXPECT_THAT( |
| response.request()->GetDnsAliasResults(), |
| testing::Pointee(testing::UnorderedElementsAre("canonical", "alias"))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, CanonicalName_PreferV6) { |
| MockDnsClientRuleList rules; |
| AddDnsRule(&rules, "alias", dns_protocol::kTypeA, IPAddress::IPv4Localhost(), |
| "wrong", false /* delay */); |
| AddDnsRule(&rules, "alias", dns_protocol::kTypeAAAA, |
| IPAddress::IPv6Localhost(), "correct", true /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| set_allow_fallback_to_systemtask(false); |
| |
| HostResolver::ResolveHostParameters params; |
| params.source = HostResolverSource::DNS; |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("alias", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| params, resolve_context_.get(), resolve_context_->host_cache())); |
| ASSERT_FALSE(response.complete()); |
| base::RunLoop().RunUntilIdle(); |
| dns_client_->CompleteDelayedTransactions(); |
| ASSERT_THAT(response.result_error(), IsOk()); |
| |
| // GetDnsAliasResults() includes all aliases from all families. |
| EXPECT_THAT(response.request()->GetDnsAliasResults(), |
| testing::Pointee( |
| testing::UnorderedElementsAre("correct", "alias", "wrong"))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, CanonicalName_V4Only) { |
| MockDnsClientRuleList rules; |
| AddDnsRule(&rules, "alias", dns_protocol::kTypeA, IPAddress::IPv4Localhost(), |
| "correct", false /* delay */); |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| set_allow_fallback_to_systemtask(false); |
| |
| HostResolver::ResolveHostParameters params; |
| params.dns_query_type = DnsQueryType::A; |
| params.source = HostResolverSource::DNS; |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("alias", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| params, resolve_context_.get(), resolve_context_->host_cache())); |
| ASSERT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT( |
| response.request()->GetDnsAliasResults(), |
| testing::Pointee(testing::UnorderedElementsAre("correct", "alias"))); |
| } |
| |
| // Test that responses containing CNAME records but no address results are fine |
| // and treated as normal NODATA responses. |
| TEST_F(HostResolverManagerDnsTest, CanonicalNameWithoutResults) { |
| MockDnsClientRuleList rules; |
| |
| DnsResponse a_response = |
| BuildTestDnsResponse("a.test", dns_protocol::kTypeA, |
| {BuildTestCnameRecord("c.test", "d.test"), |
| BuildTestCnameRecord("b.test", "c.test"), |
| BuildTestCnameRecord("a.test", "b.test")}); |
| AddDnsRule(&rules, "a.test", dns_protocol::kTypeA, std::move(a_response), |
| /*delay=*/false); |
| |
| DnsResponse aaaa_response = |
| BuildTestDnsResponse("a.test", dns_protocol::kTypeAAAA, |
| {BuildTestCnameRecord("c.test", "d.test"), |
| BuildTestCnameRecord("b.test", "c.test"), |
| BuildTestCnameRecord("a.test", "b.test")}); |
| AddDnsRule(&rules, "a.test", dns_protocol::kTypeAAAA, |
| std::move(aaaa_response), /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| set_allow_fallback_to_systemtask(false); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("a.test", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| /*optional_parameters=*/absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| ASSERT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetDnsAliasResults()); |
| |
| // Underlying error should be the typical no-results error |
| // (ERR_NAME_NOT_RESOLVED), not anything more exotic like |
| // ERR_DNS_MALFORMED_RESPONSE. |
| EXPECT_EQ(response.request()->GetResolveErrorInfo().error, |
| ERR_NAME_NOT_RESOLVED); |
| } |
| |
| // Test that if the response for one address family contains CNAME records but |
| // no address results, it doesn't interfere with the other address family |
| // receiving address results (as would happen if such a response were |
| // incorrectly treated as a malformed response error). |
| TEST_F(HostResolverManagerDnsTest, CanonicalNameWithResultsForOnlyOneFamily) { |
| MockDnsClientRuleList rules; |
| |
| DnsResponse a_response = |
| BuildTestDnsResponse("a.test", dns_protocol::kTypeA, |
| {BuildTestCnameRecord("c.test", "d.test"), |
| BuildTestCnameRecord("b.test", "c.test"), |
| BuildTestCnameRecord("a.test", "b.test")}); |
| AddDnsRule(&rules, "a.test", dns_protocol::kTypeA, std::move(a_response), |
| /*delay=*/false); |
| |
| DnsResponse aaaa_response = BuildTestDnsResponse( |
| "a.test", dns_protocol::kTypeAAAA, |
| {BuildTestAddressRecord("d.test", IPAddress::IPv6Localhost()), |
| BuildTestCnameRecord("c.test", "d.test"), |
| BuildTestCnameRecord("b.test", "c.test"), |
| BuildTestCnameRecord("a.test", "b.test")}); |
| AddDnsRule(&rules, "a.test", dns_protocol::kTypeAAAA, |
| std::move(aaaa_response), /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("a.test", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| /*optional_parameters=*/absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| ASSERT_THAT(response.result_error(), IsOk()); |
| |
| ASSERT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(IPEndPoint(IPAddress::IPv6Localhost(), 80))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(IPEndPoint(IPAddress::IPv6Localhost(), 80)))))); |
| } |
| |
| // Test that without specifying source, a request that would otherwise be |
| // handled by DNS is sent to the system resolver if cannonname is requested. |
| TEST_F(HostResolverManagerDnsTest, CanonicalNameForcesProc) { |
| // Disable fallback to ensure system resolver is used directly, not via |
| // fallback. |
| set_allow_fallback_to_systemtask(false); |
| |
| proc_->AddRuleForAllFamilies("nx_succeed", "192.168.1.102", |
| HOST_RESOLVER_CANONNAME, "canonical"); |
| proc_->SignalMultiple(1u); |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| HostResolver::ResolveHostParameters params; |
| params.include_canonical_name = true; |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("nx_succeed", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), params, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ASSERT_THAT(response.result_error(), IsOk()); |
| |
| EXPECT_THAT(response.request()->GetDnsAliasResults(), |
| testing::Pointee(testing::UnorderedElementsAre("canonical"))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DnsAliases) { |
| MockDnsClientRuleList rules; |
| |
| DnsResponse expected_A_response = BuildTestDnsResponse( |
| "first.test", dns_protocol::kTypeA, |
| {BuildTestAddressRecord("fourth.test", IPAddress::IPv4Localhost()), |
| BuildTestCnameRecord("third.test", "fourth.test"), |
| BuildTestCnameRecord("second.test", "third.test"), |
| BuildTestCnameRecord("first.test", "second.test")}); |
| |
| AddDnsRule(&rules, "first.test", dns_protocol::kTypeA, |
| std::move(expected_A_response), false /* delay */); |
| |
| DnsResponse expected_AAAA_response = BuildTestDnsResponse( |
| "first.test", dns_protocol::kTypeAAAA, |
| {BuildTestAddressRecord("fourth.test", IPAddress::IPv6Localhost()), |
| BuildTestCnameRecord("third.test", "fourth.test"), |
| BuildTestCnameRecord("second.test", "third.test"), |
| BuildTestCnameRecord("first.test", "second.test")}); |
| |
| AddDnsRule(&rules, "first.test", dns_protocol::kTypeAAAA, |
| std::move(expected_AAAA_response), false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| set_allow_fallback_to_systemtask(false); |
| HostResolver::ResolveHostParameters params; |
| params.source = HostResolverSource::DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("first.test", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), params, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| ASSERT_THAT(response.result_error(), IsOk()); |
| ASSERT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetAddressResults()->dns_aliases(), |
| testing::UnorderedElementsAre("fourth.test", "third.test", |
| "second.test", "first.test")); |
| |
| EXPECT_THAT(response.request()->GetDnsAliasResults(), |
| testing::Pointee(testing::UnorderedElementsAre( |
| "fourth.test", "third.test", "second.test", "first.test"))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DnsAliasesAreFixedUp) { |
| MockDnsClientRuleList rules; |
| |
| // Need to manually encode non-URL-canonical names because DNSDomainFromDot() |
| // requires URL-canonical names. |
| constexpr char kNonCanonicalName[] = "\005HOST2\004test\000"; |
| |
| DnsResponse expected_A_response = BuildTestDnsResponse( |
| "host.test", dns_protocol::kTypeA, |
| {BuildTestAddressRecord("localhost", IPAddress::IPv4Localhost()), |
| BuildTestCnameRecord("host2.test", "localhost"), |
| BuildTestDnsRecord( |
| "host.test", dns_protocol::kTypeCNAME, |
| std::string(kNonCanonicalName, sizeof(kNonCanonicalName) - 1))}); |
| |
| AddDnsRule(&rules, "host.test", dns_protocol::kTypeA, |
| std::move(expected_A_response), false /* delay */); |
| |
| DnsResponse expected_AAAA_response = BuildTestDnsResponse( |
| "host.test", dns_protocol::kTypeAAAA, |
| {BuildTestAddressRecord("localhost", IPAddress::IPv6Localhost()), |
| BuildTestCnameRecord("host2.test", "localhost"), |
| BuildTestDnsRecord( |
| "host.test", dns_protocol::kTypeCNAME, |
| std::string(kNonCanonicalName, sizeof(kNonCanonicalName) - 1))}); |
| |
| AddDnsRule(&rules, "host.test", dns_protocol::kTypeAAAA, |
| std::move(expected_AAAA_response), false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| set_allow_fallback_to_systemtask(false); |
| HostResolver::ResolveHostParameters params; |
| params.source = HostResolverSource::DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host.test", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), params, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| ASSERT_THAT(response.result_error(), IsOk()); |
| ASSERT_TRUE(response.request()->GetAddressResults()); |
| // AddressList results may or may not be fixed, depending on whether or not |
| // they were built from endpoint results. |
| EXPECT_THAT( |
| response.request()->GetAddressResults()->dns_aliases(), |
| testing::AnyOf(testing::UnorderedElementsAre("host2.test", "host.test"), |
| testing::UnorderedElementsAre("localhost", "HOST2.test", |
| "host.test"))); |
| EXPECT_THAT(response.request()->GetDnsAliasResults(), |
| testing::Pointee( |
| testing::UnorderedElementsAre("host2.test", "host.test"))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, NoAdditionalDnsAliases) { |
| MockDnsClientRuleList rules; |
| |
| AddDnsRule(&rules, "first.test", dns_protocol::kTypeA, |
| IPAddress::IPv4Localhost(), false /* delay */); |
| |
| AddDnsRule(&rules, "first.test", dns_protocol::kTypeAAAA, |
| IPAddress::IPv6Localhost(), false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| set_allow_fallback_to_systemtask(false); |
| HostResolver::ResolveHostParameters params; |
| params.source = HostResolverSource::DNS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("first.test", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), params, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| ASSERT_THAT(response.result_error(), IsOk()); |
| ASSERT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetAddressResults()->dns_aliases(), |
| testing::ElementsAre("first.test")); |
| EXPECT_THAT(response.request()->GetDnsAliasResults(), |
| testing::Pointee(testing::UnorderedElementsAre("first.test"))); |
| } |
| |
| TEST_F(HostResolverManagerTest, ResolveLocalHostname) { |
| std::vector<IPEndPoint> addresses; |
| |
| TestBothLoopbackIPs("localhost"); |
| TestBothLoopbackIPs("localhoST"); |
| TestBothLoopbackIPs("localhost."); |
| TestBothLoopbackIPs("localhoST."); |
| TestBothLoopbackIPs("foo.localhost"); |
| TestBothLoopbackIPs("foo.localhOSt"); |
| TestBothLoopbackIPs("foo.localhost."); |
| TestBothLoopbackIPs("foo.localhOSt."); |
| |
| // Legacy localhost names. |
| EXPECT_FALSE(ResolveLocalHostname("localhost.localdomain", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("localhost.localdomAIn", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("localhost.localdomain.", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("localhost.localdomAIn.", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("localhost6", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("localhoST6", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("localhost6.", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("localhost6.localdomain6", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("localhost6.localdomain6.", &addresses)); |
| |
| EXPECT_FALSE(ResolveLocalHostname("127.0.0.1", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("::1", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("0:0:0:0:0:0:0:1", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("localhostx", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("localhost.x", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("foo.localdomain", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("foo.localdomain.x", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("localhost6x", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("localhost.localdomain6", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("localhost6.localdomain", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("127.0.0.1.1", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname(".127.0.0.255", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("::2", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("::1:1", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("0:0:0:0:1:0:0:1", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("::1:1", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("0:0:0:0:0:0:0:0:1", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("foo.localhost.com", &addresses)); |
| EXPECT_FALSE(ResolveLocalHostname("foo.localhoste", &addresses)); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, AddDnsOverHttpsServerAfterConfig) { |
| DestroyResolver(); |
| test::ScopedMockNetworkChangeNotifier notifier; |
| CreateSerialResolver(); // To guarantee order of resolutions. |
| notifier.mock_network_change_notifier()->SetConnectionType( |
| NetworkChangeNotifier::CONNECTION_WIFI); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| std::string server("https://dnsserver.example.net/dns-query{?dns}"); |
| DnsConfigOverrides overrides; |
| overrides.dns_over_https_config = *DnsOverHttpsConfig::FromString(server); |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| const auto* config = dns_client_->GetEffectiveConfig(); |
| ASSERT_TRUE(config); |
| EXPECT_EQ(overrides.dns_over_https_config, config->doh_config); |
| EXPECT_EQ(SecureDnsMode::kAutomatic, config->secure_dns_mode); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, AddDnsOverHttpsServerBeforeConfig) { |
| DestroyResolver(); |
| test::ScopedMockNetworkChangeNotifier notifier; |
| CreateSerialResolver(); // To guarantee order of resolutions. |
| std::string server("https://dnsserver.example.net/dns-query{?dns}"); |
| DnsConfigOverrides overrides; |
| overrides.dns_over_https_config = *DnsOverHttpsConfig::FromString(server); |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| notifier.mock_network_change_notifier()->SetConnectionType( |
| NetworkChangeNotifier::CONNECTION_WIFI); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| const auto* config = dns_client_->GetEffectiveConfig(); |
| ASSERT_TRUE(config); |
| EXPECT_EQ(overrides.dns_over_https_config, config->doh_config); |
| EXPECT_EQ(SecureDnsMode::kAutomatic, config->secure_dns_mode); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, AddDnsOverHttpsServerBeforeClient) { |
| DestroyResolver(); |
| test::ScopedMockNetworkChangeNotifier notifier; |
| CreateSerialResolver(); // To guarantee order of resolutions. |
| std::string server("https://dnsserver.example.net/dns-query{?dns}"); |
| DnsConfigOverrides overrides; |
| overrides.dns_over_https_config = *DnsOverHttpsConfig::FromString(server); |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| notifier.mock_network_change_notifier()->SetConnectionType( |
| NetworkChangeNotifier::CONNECTION_WIFI); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| const auto* config = dns_client_->GetEffectiveConfig(); |
| ASSERT_TRUE(config); |
| EXPECT_EQ(overrides.dns_over_https_config, config->doh_config); |
| EXPECT_EQ(SecureDnsMode::kAutomatic, config->secure_dns_mode); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, AddDnsOverHttpsServerAndThenRemove) { |
| DestroyResolver(); |
| test::ScopedMockNetworkChangeNotifier notifier; |
| CreateSerialResolver(); // To guarantee order of resolutions. |
| std::string server("https://dns.example.com/"); |
| DnsConfigOverrides overrides; |
| overrides.dns_over_https_config = *DnsOverHttpsConfig::FromString(server); |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| notifier.mock_network_change_notifier()->SetConnectionType( |
| NetworkChangeNotifier::CONNECTION_WIFI); |
| DnsConfig network_dns_config = CreateValidDnsConfig(); |
| network_dns_config.doh_config = {}; |
| ChangeDnsConfig(network_dns_config); |
| |
| const auto* config = dns_client_->GetEffectiveConfig(); |
| ASSERT_TRUE(config); |
| EXPECT_EQ(overrides.dns_over_https_config, config->doh_config); |
| EXPECT_EQ(SecureDnsMode::kAutomatic, config->secure_dns_mode); |
| |
| resolver_->SetDnsConfigOverrides(DnsConfigOverrides()); |
| config = dns_client_->GetEffectiveConfig(); |
| ASSERT_TRUE(config); |
| EXPECT_EQ(0u, config->doh_config.servers().size()); |
| EXPECT_EQ(SecureDnsMode::kOff, config->secure_dns_mode); |
| } |
| |
| // Basic test socket factory that allows creation of UDP sockets, but those |
| // sockets are mocks with no data and are not expected to be usable. |
| class AlwaysFailSocketFactory : public MockClientSocketFactory { |
| public: |
| std::unique_ptr<DatagramClientSocket> CreateDatagramClientSocket( |
| DatagramSocket::BindType bind_type, |
| NetLog* net_log, |
| const NetLogSource& source) override { |
| return std::make_unique<MockUDPClientSocket>(); |
| } |
| }; |
| |
| class TestDnsObserver : public NetworkChangeNotifier::DNSObserver { |
| public: |
| void OnDNSChanged() override { ++dns_changed_calls_; } |
| |
| int dns_changed_calls() const { return dns_changed_calls_; } |
| |
| private: |
| int dns_changed_calls_ = 0; |
| }; |
| |
| // Built-in client and config overrides not available on iOS. |
| #if !BUILDFLAG(IS_IOS) |
| TEST_F(HostResolverManagerDnsTest, SetDnsConfigOverrides) { |
| test::ScopedMockNetworkChangeNotifier mock_network_change_notifier; |
| TestDnsObserver config_observer; |
| NetworkChangeNotifier::AddDNSObserver(&config_observer); |
| |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| DnsConfig original_config = CreateValidDnsConfig(); |
| original_config.hosts = { |
| {DnsHostsKey("host", ADDRESS_FAMILY_IPV4), IPAddress(192, 168, 1, 1)}}; |
| ChangeDnsConfig(original_config); |
| |
| // Confirm pre-override state. |
| ASSERT_EQ(original_config, *client_ptr->GetEffectiveConfig()); |
| |
| DnsConfigOverrides overrides; |
| const std::vector<IPEndPoint> nameservers = { |
| CreateExpected("192.168.0.1", 92)}; |
| overrides.nameservers = nameservers; |
| overrides.dns_over_tls_active = true; |
| const std::string dns_over_tls_hostname = "dns.example.com"; |
| overrides.dns_over_tls_hostname = dns_over_tls_hostname; |
| const std::vector<std::string> search = {"str"}; |
| overrides.search = search; |
| overrides.append_to_multi_label_name = false; |
| const int ndots = 5; |
| overrides.ndots = ndots; |
| const base::TimeDelta fallback_period = base::Seconds(10); |
| overrides.fallback_period = fallback_period; |
| const int attempts = 20; |
| overrides.attempts = attempts; |
| const int doh_attempts = 19; |
| overrides.doh_attempts = doh_attempts; |
| overrides.rotate = true; |
| overrides.use_local_ipv6 = true; |
| auto doh_config = *DnsOverHttpsConfig::FromString("https://dns.example.com/"); |
| overrides.dns_over_https_config = doh_config; |
| const SecureDnsMode secure_dns_mode = SecureDnsMode::kSecure; |
| overrides.secure_dns_mode = secure_dns_mode; |
| overrides.allow_dns_over_https_upgrade = true; |
| overrides.clear_hosts = true; |
| |
| // This test is expected to test overriding all fields. |
| EXPECT_TRUE(overrides.OverridesEverything()); |
| |
| EXPECT_EQ(0, config_observer.dns_changed_calls()); |
| |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| const DnsConfig* overridden_config = client_ptr->GetEffectiveConfig(); |
| ASSERT_TRUE(overridden_config); |
| EXPECT_EQ(nameservers, overridden_config->nameservers); |
| EXPECT_TRUE(overridden_config->dns_over_tls_active); |
| EXPECT_EQ(dns_over_tls_hostname, overridden_config->dns_over_tls_hostname); |
| EXPECT_EQ(search, overridden_config->search); |
| EXPECT_FALSE(overridden_config->append_to_multi_label_name); |
| EXPECT_EQ(ndots, overridden_config->ndots); |
| EXPECT_EQ(fallback_period, overridden_config->fallback_period); |
| EXPECT_EQ(attempts, overridden_config->attempts); |
| EXPECT_EQ(doh_attempts, overridden_config->doh_attempts); |
| EXPECT_TRUE(overridden_config->rotate); |
| EXPECT_TRUE(overridden_config->use_local_ipv6); |
| EXPECT_EQ(doh_config, overridden_config->doh_config); |
| EXPECT_EQ(secure_dns_mode, overridden_config->secure_dns_mode); |
| EXPECT_TRUE(overridden_config->allow_dns_over_https_upgrade); |
| EXPECT_THAT(overridden_config->hosts, testing::IsEmpty()); |
| |
| base::RunLoop().RunUntilIdle(); // Notifications are async. |
| EXPECT_EQ(1, config_observer.dns_changed_calls()); |
| |
| NetworkChangeNotifier::RemoveDNSObserver(&config_observer); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| SetDnsConfigOverrides_OverrideEverythingCreation) { |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| DnsConfig original_config = CreateValidDnsConfig(); |
| ChangeDnsConfig(original_config); |
| |
| // Confirm pre-override state. |
| ASSERT_EQ(original_config, *client_ptr->GetEffectiveConfig()); |
| ASSERT_FALSE(original_config.Equals(DnsConfig())); |
| |
| DnsConfigOverrides overrides = |
| DnsConfigOverrides::CreateOverridingEverythingWithDefaults(); |
| EXPECT_TRUE(overrides.OverridesEverything()); |
| |
| // Ensure config is valid by setting a nameserver. |
| std::vector<IPEndPoint> nameservers = {CreateExpected("1.2.3.4", 50)}; |
| overrides.nameservers = nameservers; |
| EXPECT_TRUE(overrides.OverridesEverything()); |
| |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| DnsConfig expected; |
| expected.nameservers = nameservers; |
| EXPECT_THAT(client_ptr->GetEffectiveConfig(), testing::Pointee(expected)); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SetDnsConfigOverrides_PartialOverride) { |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| DnsConfig original_config = CreateValidDnsConfig(); |
| ChangeDnsConfig(original_config); |
| |
| // Confirm pre-override state. |
| ASSERT_EQ(original_config, *client_ptr->GetEffectiveConfig()); |
| |
| DnsConfigOverrides overrides; |
| const std::vector<IPEndPoint> nameservers = { |
| CreateExpected("192.168.0.2", 192)}; |
| overrides.nameservers = nameservers; |
| overrides.rotate = true; |
| EXPECT_FALSE(overrides.OverridesEverything()); |
| |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| const DnsConfig* overridden_config = client_ptr->GetEffectiveConfig(); |
| ASSERT_TRUE(overridden_config); |
| EXPECT_EQ(nameservers, overridden_config->nameservers); |
| EXPECT_EQ(original_config.search, overridden_config->search); |
| EXPECT_EQ(original_config.hosts, overridden_config->hosts); |
| EXPECT_TRUE(overridden_config->append_to_multi_label_name); |
| EXPECT_EQ(original_config.ndots, overridden_config->ndots); |
| EXPECT_EQ(original_config.fallback_period, |
| overridden_config->fallback_period); |
| EXPECT_EQ(original_config.attempts, overridden_config->attempts); |
| EXPECT_TRUE(overridden_config->rotate); |
| EXPECT_FALSE(overridden_config->use_local_ipv6); |
| EXPECT_EQ(original_config.doh_config, overridden_config->doh_config); |
| EXPECT_EQ(original_config.secure_dns_mode, |
| overridden_config->secure_dns_mode); |
| } |
| |
| // Test that overridden configs are reapplied over a changed underlying system |
| // config. |
| TEST_F(HostResolverManagerDnsTest, SetDnsConfigOverrides_NewConfig) { |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| DnsConfig original_config = CreateValidDnsConfig(); |
| ChangeDnsConfig(original_config); |
| |
| // Confirm pre-override state. |
| ASSERT_EQ(original_config, *client_ptr->GetEffectiveConfig()); |
| |
| DnsConfigOverrides overrides; |
| const std::vector<IPEndPoint> nameservers = { |
| CreateExpected("192.168.0.2", 192)}; |
| overrides.nameservers = nameservers; |
| |
| resolver_->SetDnsConfigOverrides(overrides); |
| ASSERT_TRUE(client_ptr->GetEffectiveConfig()); |
| ASSERT_EQ(nameservers, client_ptr->GetEffectiveConfig()->nameservers); |
| |
| DnsConfig new_config = original_config; |
| new_config.attempts = 103; |
| ASSERT_NE(nameservers, new_config.nameservers); |
| ChangeDnsConfig(new_config); |
| |
| const DnsConfig* overridden_config = client_ptr->GetEffectiveConfig(); |
| ASSERT_TRUE(overridden_config); |
| EXPECT_EQ(nameservers, overridden_config->nameservers); |
| EXPECT_EQ(new_config.attempts, overridden_config->attempts); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SetDnsConfigOverrides_ClearOverrides) { |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| DnsConfig original_config = CreateValidDnsConfig(); |
| ChangeDnsConfig(original_config); |
| |
| DnsConfigOverrides overrides; |
| overrides.attempts = 245; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ASSERT_THAT(client_ptr->GetEffectiveConfig(), |
| testing::Not(testing::Pointee(original_config))); |
| |
| resolver_->SetDnsConfigOverrides(DnsConfigOverrides()); |
| EXPECT_THAT(client_ptr->GetEffectiveConfig(), |
| testing::Pointee(original_config)); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SetDnsConfigOverrides_NoChange) { |
| test::ScopedMockNetworkChangeNotifier mock_network_change_notifier; |
| TestDnsObserver config_observer; |
| NetworkChangeNotifier::AddDNSObserver(&config_observer); |
| |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| DnsConfig original_config = CreateValidDnsConfig(); |
| ChangeDnsConfig(original_config); |
| |
| // Confirm pre-override state. |
| ASSERT_EQ(original_config, *client_ptr->GetEffectiveConfig()); |
| |
| DnsConfigOverrides overrides; |
| overrides.nameservers = original_config.nameservers; |
| |
| EXPECT_EQ(0, config_observer.dns_changed_calls()); |
| |
| resolver_->SetDnsConfigOverrides(overrides); |
| EXPECT_THAT(client_ptr->GetEffectiveConfig(), |
| testing::Pointee(original_config)); |
| |
| base::RunLoop().RunUntilIdle(); // Notifications are async. |
| EXPECT_EQ(0, |
| config_observer.dns_changed_calls()); // No expected notification |
| |
| NetworkChangeNotifier::RemoveDNSObserver(&config_observer); |
| } |
| |
| // No effect or notifications expected using partial overrides without a base |
| // system config. |
| TEST_F(HostResolverManagerDnsTest, NoBaseConfig_PartialOverrides) { |
| test::ScopedMockNetworkChangeNotifier mock_network_change_notifier; |
| TestDnsObserver config_observer; |
| NetworkChangeNotifier::AddDNSObserver(&config_observer); |
| |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| client_ptr->SetSystemConfig(absl::nullopt); |
| |
| DnsConfigOverrides overrides; |
| overrides.nameservers.emplace({CreateExpected("192.168.0.3", 193)}); |
| resolver_->SetDnsConfigOverrides(overrides); |
| base::RunLoop().RunUntilIdle(); // Potential notifications are async. |
| |
| EXPECT_FALSE(client_ptr->GetEffectiveConfig()); |
| EXPECT_EQ(0, config_observer.dns_changed_calls()); |
| |
| NetworkChangeNotifier::RemoveDNSObserver(&config_observer); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, NoBaseConfig_OverridesEverything) { |
| test::ScopedMockNetworkChangeNotifier mock_network_change_notifier; |
| TestDnsObserver config_observer; |
| NetworkChangeNotifier::AddDNSObserver(&config_observer); |
| |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| client_ptr->SetSystemConfig(absl::nullopt); |
| |
| DnsConfigOverrides overrides = |
| DnsConfigOverrides::CreateOverridingEverythingWithDefaults(); |
| const std::vector<IPEndPoint> nameservers = { |
| CreateExpected("192.168.0.4", 194)}; |
| overrides.nameservers = nameservers; |
| resolver_->SetDnsConfigOverrides(overrides); |
| base::RunLoop().RunUntilIdle(); // Notifications are async. |
| |
| DnsConfig expected; |
| expected.nameservers = nameservers; |
| |
| EXPECT_THAT(client_ptr->GetEffectiveConfig(), testing::Pointee(expected)); |
| EXPECT_EQ(1, config_observer.dns_changed_calls()); |
| |
| NetworkChangeNotifier::RemoveDNSObserver(&config_observer); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DohMapping) { |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| // Create a DnsConfig containing IP addresses associated with Cloudflare, |
| // SafeBrowsing family filter, SafeBrowsing security filter, and other IPs |
| // not associated with hardcoded DoH services. |
| DnsConfig original_config = CreateUpgradableDnsConfig(); |
| ChangeDnsConfig(original_config); |
| |
| const DnsConfig* fetched_config = client_ptr->GetEffectiveConfig(); |
| EXPECT_EQ(original_config.nameservers, fetched_config->nameservers); |
| auto expected_doh_config = *DnsOverHttpsConfig::FromTemplatesForTesting( |
| {"https://chrome.cloudflare-dns.com/dns-query", |
| "https://doh.cleanbrowsing.org/doh/family-filter{?dns}", |
| "https://doh.cleanbrowsing.org/doh/security-filter{?dns}"}); |
| EXPECT_EQ(expected_doh_config, fetched_config->doh_config); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DohMappingDisabled) { |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| // Create a DnsConfig containing IP addresses associated with Cloudflare, |
| // SafeBrowsing family filter, SafeBrowsing security filter, and other IPs |
| // not associated with hardcoded DoH services. |
| DnsConfig original_config = CreateUpgradableDnsConfig(); |
| original_config.allow_dns_over_https_upgrade = false; |
| ChangeDnsConfig(original_config); |
| |
| const DnsConfig* fetched_config = client_ptr->GetEffectiveConfig(); |
| EXPECT_EQ(original_config.nameservers, fetched_config->nameservers); |
| EXPECT_THAT(fetched_config->doh_config.servers(), IsEmpty()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DohMappingModeIneligibleForUpgrade) { |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| // Create a DnsConfig containing IP addresses associated with Cloudflare, |
| // SafeBrowsing family filter, SafeBrowsing security filter, and other IPs |
| // not associated with hardcoded DoH services. |
| DnsConfig original_config = CreateUpgradableDnsConfig(); |
| original_config.secure_dns_mode = SecureDnsMode::kSecure; |
| ChangeDnsConfig(original_config); |
| |
| const DnsConfig* fetched_config = client_ptr->GetEffectiveConfig(); |
| EXPECT_EQ(original_config.nameservers, fetched_config->nameservers); |
| EXPECT_THAT(fetched_config->doh_config.servers(), IsEmpty()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| DohMappingUnhandledOptionsIneligibleForUpgrade) { |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| // Create a DnsConfig containing IP addresses associated with Cloudflare, |
| // SafeBrowsing family filter, SafeBrowsing security filter, and other IPs |
| // not associated with hardcoded DoH services. |
| DnsConfig original_config = CreateUpgradableDnsConfig(); |
| original_config.unhandled_options = true; |
| ChangeDnsConfig(original_config); |
| |
| EXPECT_FALSE(client_ptr->GetEffectiveConfig()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DohMappingWithExclusion) { |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| base::test::ScopedFeatureList feature_list; |
| feature_list.InitWithFeatures( |
| /*enabled_features=*/{}, /*disabled_features=*/{ |
| GetDohProviderEntryForTesting("CleanBrowsingSecure").feature, |
| GetDohProviderEntryForTesting("Cloudflare").feature}); |
| |
| // Create a DnsConfig containing IP addresses associated with Cloudflare, |
| // SafeBrowsing family filter, SafeBrowsing security filter, and other IPs |
| // not associated with hardcoded DoH services. |
| DnsConfig original_config = CreateUpgradableDnsConfig(); |
| ChangeDnsConfig(original_config); |
| |
| // A DoH upgrade should be attempted on the DNS servers in the config, but |
| // only for permitted providers. |
| const DnsConfig* fetched_config = client_ptr->GetEffectiveConfig(); |
| EXPECT_EQ(original_config.nameservers, fetched_config->nameservers); |
| auto expected_doh_config = *DnsOverHttpsConfig::FromString( |
| "https://doh.cleanbrowsing.org/doh/family-filter{?dns}"); |
| EXPECT_EQ(expected_doh_config, fetched_config->doh_config); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DohMappingIgnoredIfTemplateSpecified) { |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| // Create a DnsConfig containing IP addresses associated with Cloudflare, |
| // SafeBrowsing family filter, SafeBrowsing security filter, and other IPs |
| // not associated with hardcoded DoH services. |
| DnsConfig original_config = CreateUpgradableDnsConfig(); |
| ChangeDnsConfig(original_config); |
| |
| // If the overrides contains DoH servers, no DoH upgrade should be attempted. |
| DnsConfigOverrides overrides; |
| const auto dns_over_https_config_override = |
| *DnsOverHttpsConfig::FromString("https://doh.server.override.com/"); |
| overrides.dns_over_https_config = dns_over_https_config_override; |
| resolver_->SetDnsConfigOverrides(overrides); |
| const DnsConfig* fetched_config = client_ptr->GetEffectiveConfig(); |
| EXPECT_EQ(original_config.nameservers, fetched_config->nameservers); |
| EXPECT_EQ(dns_over_https_config_override, fetched_config->doh_config); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| DohMappingUnhandledOptionsAndTemplateSpecified) { |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| // Create a DnsConfig containing IP addresses associated with Cloudflare, |
| // SafeBrowsing family filter, SafeBrowsing security filter, and other IPs |
| // not associated with hardcoded DoH services. |
| DnsConfig original_config = CreateUpgradableDnsConfig(); |
| original_config.unhandled_options = true; |
| ChangeDnsConfig(original_config); |
| |
| // If the overrides contains DoH servers, no DoH upgrade should be attempted. |
| DnsConfigOverrides overrides; |
| const auto dns_over_https_config_override = |
| *DnsOverHttpsConfig::FromString("https://doh.server.override.com/"); |
| overrides.dns_over_https_config = dns_over_https_config_override; |
| resolver_->SetDnsConfigOverrides(overrides); |
| const DnsConfig* fetched_config = client_ptr->GetEffectiveConfig(); |
| EXPECT_TRUE(fetched_config->nameservers.empty()); |
| EXPECT_FALSE(client_ptr->CanUseInsecureDnsTransactions()); |
| EXPECT_EQ(dns_over_https_config_override, fetched_config->doh_config); |
| EXPECT_TRUE(client_ptr->CanUseSecureDnsTransactions()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DohMappingWithAutomaticDot) { |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| // Create a DnsConfig containing IP addresses associated with Cloudflare, |
| // SafeBrowsing family filter, SafeBrowsing security filter, and other IPs |
| // not associated with hardcoded DoH services. |
| DnsConfig original_config = CreateUpgradableDnsConfig(); |
| original_config.dns_over_tls_active = true; |
| ChangeDnsConfig(original_config); |
| |
| const DnsConfig* fetched_config = client_ptr->GetEffectiveConfig(); |
| EXPECT_EQ(original_config.nameservers, fetched_config->nameservers); |
| auto expected_doh_config = *DnsOverHttpsConfig::FromTemplatesForTesting( |
| {"https://chrome.cloudflare-dns.com/dns-query", |
| "https://doh.cleanbrowsing.org/doh/family-filter{?dns}", |
| "https://doh.cleanbrowsing.org/doh/security-filter{?dns}"}); |
| EXPECT_EQ(expected_doh_config, fetched_config->doh_config); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DohMappingWithStrictDot) { |
| // Use a real DnsClient to test config-handling behavior. |
| AlwaysFailSocketFactory socket_factory; |
| auto client = DnsClient::CreateClient(nullptr /* net_log */); |
| DnsClient* client_ptr = client.get(); |
| resolver_->SetDnsClientForTesting(std::move(client)); |
| |
| // Create a DnsConfig containing IP addresses associated with Cloudflare, |
| // SafeBrowsing family filter, SafeBrowsing security filter, and other IPs |
| // not associated with hardcoded DoH services. |
| DnsConfig original_config = CreateUpgradableDnsConfig(); |
| original_config.secure_dns_mode = SecureDnsMode::kAutomatic; |
| original_config.dns_over_tls_active = true; |
| |
| // Google DoT hostname |
| original_config.dns_over_tls_hostname = "dns.google"; |
| ChangeDnsConfig(original_config); |
| const DnsConfig* fetched_config = client_ptr->GetEffectiveConfig(); |
| EXPECT_EQ(original_config.nameservers, fetched_config->nameservers); |
| auto expected_doh_config = |
| *DnsOverHttpsConfig::FromString("https://dns.google/dns-query{?dns}"); |
| EXPECT_EQ(expected_doh_config, fetched_config->doh_config); |
| } |
| |
| #endif // !BUILDFLAG(IS_IOS) |
| |
| TEST_F(HostResolverManagerDnsTest, FlushCacheOnDnsConfigOverridesChange) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| HostResolver::ResolveHostParameters local_source_parameters; |
| local_source_parameters.source = HostResolverSource::LOCAL_ONLY; |
| |
| // Populate cache. |
| ResolveHostResponseHelper initial_response(resolver_->CreateRequest( |
| HostPortPair("ok", 70), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(initial_response.result_error(), IsOk()); |
| |
| // Confirm result now cached. |
| ResolveHostResponseHelper cached_response(resolver_->CreateRequest( |
| HostPortPair("ok", 75), NetworkAnonymizationKey(), NetLogWithSource(), |
| local_source_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ASSERT_THAT(cached_response.result_error(), IsOk()); |
| ASSERT_TRUE(cached_response.request()->GetStaleInfo()); |
| |
| // Flush cache by triggering a DnsConfigOverrides change. |
| DnsConfigOverrides overrides; |
| overrides.attempts = 4; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| // Expect no longer cached |
| ResolveHostResponseHelper flushed_response(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| local_source_parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(flushed_response.result_error(), IsError(ERR_DNS_CACHE_MISS)); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| FlushContextSessionDataOnDnsConfigOverridesChange) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| DnsSession* session_before = dns_client_->GetCurrentSession(); |
| resolve_context_->RecordServerSuccess( |
| 0u /* server_index */, true /* is_doh_server */, session_before); |
| ASSERT_TRUE(resolve_context_->GetDohServerAvailability(0u, session_before)); |
| |
| // Flush data by triggering a DnsConfigOverrides change. |
| DnsConfigOverrides overrides; |
| overrides.attempts = 4; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| DnsSession* session_after = dns_client_->GetCurrentSession(); |
| EXPECT_NE(session_before, session_after); |
| |
| EXPECT_FALSE(resolve_context_->GetDohServerAvailability(0u, session_after)); |
| |
| // Confirm new session is in use. |
| resolve_context_->RecordServerSuccess( |
| 0u /* server_index */, true /* is_doh_server */, session_after); |
| EXPECT_TRUE(resolve_context_->GetDohServerAvailability(0u, session_after)); |
| } |
| |
| // Test that even when using config overrides, a change to the base system |
| // config cancels pending requests. |
| TEST_F(HostResolverManagerDnsTest, CancellationOnBaseConfigChange) { |
| DnsConfig original_config = CreateValidDnsConfig(); |
| ChangeDnsConfig(original_config); |
| |
| DnsConfigOverrides overrides; |
| overrides.nameservers.emplace({CreateExpected("123.123.123.123", 80)}); |
| ASSERT_FALSE(overrides.OverridesEverything()); |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("4slow_ok", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ASSERT_FALSE(response.complete()); |
| |
| DnsConfig new_config = original_config; |
| new_config.attempts = 103; |
| ChangeDnsConfig(new_config); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_NETWORK_CHANGED)); |
| } |
| |
| // Test that when all configuration is overridden, system configuration changes |
| // do not cancel requests. |
| TEST_F(HostResolverManagerDnsTest, |
| CancellationOnBaseConfigChange_OverridesEverything) { |
| DnsConfig original_config = CreateValidDnsConfig(); |
| ChangeDnsConfig(original_config); |
| |
| DnsConfigOverrides overrides = |
| DnsConfigOverrides::CreateOverridingEverythingWithDefaults(); |
| overrides.nameservers.emplace({CreateExpected("123.123.123.123", 80)}); |
| ASSERT_TRUE(overrides.OverridesEverything()); |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("4slow_ok", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ASSERT_FALSE(response.complete()); |
| |
| DnsConfig new_config = original_config; |
| new_config.attempts = 103; |
| ChangeDnsConfig(new_config); |
| |
| dns_client_->CompleteDelayedTransactions(); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| } |
| |
| // Test that in-progress queries are cancelled on applying new DNS config |
| // overrides, same as receiving a new DnsConfig from the system. |
| TEST_F(HostResolverManagerDnsTest, CancelQueriesOnSettingOverrides) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("4slow_ok", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ASSERT_FALSE(response.complete()); |
| |
| DnsConfigOverrides overrides; |
| overrides.attempts = 123; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_NETWORK_CHANGED)); |
| } |
| |
| // Queries should not be cancelled if equal overrides are set. |
| TEST_F(HostResolverManagerDnsTest, |
| CancelQueriesOnSettingOverrides_SameOverrides) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.attempts = 123; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("4slow_ok", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ASSERT_FALSE(response.complete()); |
| |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| dns_client_->CompleteDelayedTransactions(); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| } |
| |
| // Test that in-progress queries are cancelled on clearing DNS config overrides, |
| // same as receiving a new DnsConfig from the system. |
| TEST_F(HostResolverManagerDnsTest, CancelQueriesOnClearingOverrides) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.attempts = 123; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("4slow_ok", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ASSERT_FALSE(response.complete()); |
| |
| resolver_->SetDnsConfigOverrides(DnsConfigOverrides()); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_NETWORK_CHANGED)); |
| } |
| |
| // Queries should not be cancelled on clearing overrides if there were not any |
| // overrides. |
| TEST_F(HostResolverManagerDnsTest, |
| CancelQueriesOnClearingOverrides_NoOverrides) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("4slow_ok", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| ASSERT_FALSE(response.complete()); |
| |
| resolver_->SetDnsConfigOverrides(DnsConfigOverrides()); |
| |
| dns_client_->CompleteDelayedTransactions(); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| FlushContextSessionDataOnSystemConfigChange) { |
| DnsConfig original_config = CreateValidDnsConfig(); |
| ChangeDnsConfig(original_config); |
| |
| DnsSession* session_before = dns_client_->GetCurrentSession(); |
| resolve_context_->RecordServerSuccess( |
| 0u /* server_index */, true /* is_doh_server */, session_before); |
| ASSERT_TRUE(resolve_context_->GetDohServerAvailability(0u, session_before)); |
| |
| // Flush data by triggering a config change. |
| DnsConfig new_config = original_config; |
| new_config.attempts = 103; |
| ChangeDnsConfig(new_config); |
| |
| DnsSession* session_after = dns_client_->GetCurrentSession(); |
| EXPECT_NE(session_before, session_after); |
| |
| EXPECT_FALSE(resolve_context_->GetDohServerAvailability(0u, session_after)); |
| |
| // Confirm new session is in use. |
| resolve_context_->RecordServerSuccess( |
| 0u /* server_index */, true /* is_doh_server */, session_after); |
| EXPECT_TRUE(resolve_context_->GetDohServerAvailability(0u, session_after)); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, TxtQuery) { |
| // Simulate two separate DNS records, each with multiple strings. |
| std::vector<std::string> foo_records = {"foo1", "foo2", "foo3"}; |
| std::vector<std::string> bar_records = {"bar1", "bar2"}; |
| std::vector<std::vector<std::string>> text_records = {foo_records, |
| bar_records}; |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back("host", dns_protocol::kTypeTXT, false /* secure */, |
| MockDnsClientRule::Result(BuildTestDnsTextResponse( |
| "host", std::move(text_records))), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 0u); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::TXT; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Order between separate DNS records is undefined, but each record should |
| // stay in order as that order may be meaningful. |
| ASSERT_THAT(response.request()->GetTextResults(), |
| testing::Optional(testing::UnorderedElementsAre( |
| "foo1", "foo2", "foo3", "bar1", "bar2"))); |
| std::vector<std::string> results = |
| response.request()->GetTextResults().value(); |
| EXPECT_NE(results.end(), base::ranges::search(results, foo_records)); |
| EXPECT_NE(results.end(), base::ranges::search(results, bar_records)); |
| |
| // Expect result to be cached. |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 1u); |
| parameters.source = HostResolverSource::LOCAL_ONLY; |
| ResolveHostResponseHelper cached_response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(cached_response.result_error(), IsOk()); |
| ASSERT_THAT(cached_response.request()->GetTextResults(), |
| testing::Optional(testing::UnorderedElementsAre( |
| "foo1", "foo2", "foo3", "bar1", "bar2"))); |
| results = cached_response.request()->GetTextResults().value(); |
| EXPECT_NE(results.end(), base::ranges::search(results, foo_records)); |
| EXPECT_NE(results.end(), base::ranges::search(results, bar_records)); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, TxtQueryRejectsIpLiteral) { |
| MockDnsClientRuleList rules; |
| |
| // Entry that would resolve if DNS is mistakenly queried to ensure that does |
| // not happen. |
| rules.emplace_back("8.8.8.8", dns_protocol::kTypeTXT, /*secure=*/false, |
| MockDnsClientRule::Result( |
| BuildTestDnsTextResponse("8.8.8.8", {{"text"}})), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::TXT; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("8.8.8.8", 108), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| // Test that TXT records can be extracted from a response that also contains |
| // unrecognized record types. |
| TEST_F(HostResolverManagerDnsTest, TxtQuery_MixedWithUnrecognizedType) { |
| std::vector<std::string> text_strings = {"foo"}; |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypeTXT, false /* secure */, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| "host", dns_protocol::kTypeTXT, |
| {BuildTestDnsRecord("host", 3u /* type */, "fake rdata 1"), |
| BuildTestTextRecord("host", std::move(text_strings)), |
| BuildTestDnsRecord("host", 3u /* type */, "fake rdata 2")})), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::TXT; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| EXPECT_THAT(response.request()->GetTextResults(), |
| testing::Optional(testing::ElementsAre("foo"))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, TxtQuery_InvalidConfig) { |
| set_allow_fallback_to_systemtask(false); |
| // Set empty DnsConfig. |
| InvalidateDnsConfig(); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::TXT; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_CACHE_MISS)); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, TxtQuery_NonexistentDomain) { |
| // Setup fallback to confirm it is not used for non-address results. |
| set_allow_fallback_to_systemtask(true); |
| proc_->AddRuleForAllFamilies("host", "192.168.1.102"); |
| proc_->SignalMultiple(1u); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypeTXT, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kNoDomain), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 0u); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::TXT; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Expect result to be cached. |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 1u); |
| parameters.source = HostResolverSource::LOCAL_ONLY; |
| ResolveHostResponseHelper cached_response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(cached_response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(cached_response.request()->GetAddressResults()); |
| EXPECT_FALSE(cached_response.request()->GetEndpointResults()); |
| EXPECT_FALSE(cached_response.request()->GetTextResults()); |
| EXPECT_FALSE(cached_response.request()->GetHostnameResults()); |
| EXPECT_FALSE(cached_response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, TxtQuery_Failure) { |
| // Setup fallback to confirm it is not used for non-address results. |
| set_allow_fallback_to_systemtask(true); |
| proc_->AddRuleForAllFamilies("host", "192.168.1.102"); |
| proc_->SignalMultiple(1u); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypeTXT, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kFail), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::TXT; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Expect result not cached. |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 0u); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, TxtQuery_Timeout) { |
| // Setup fallback to confirm it is not used for non-address results. |
| set_allow_fallback_to_systemtask(true); |
| proc_->AddRuleForAllFamilies("host", "192.168.1.102"); |
| proc_->SignalMultiple(1u); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypeTXT, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kTimeout), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::TXT; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_TIMED_OUT)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Expect result not cached. |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 0u); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, TxtQuery_Empty) { |
| // Setup fallback to confirm it is not used for non-address results. |
| set_allow_fallback_to_systemtask(true); |
| proc_->AddRuleForAllFamilies("host", "192.168.1.102"); |
| proc_->SignalMultiple(1u); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypeTXT, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kEmpty), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 0u); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::TXT; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Expect result to be cached. |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 1u); |
| parameters.source = HostResolverSource::LOCAL_ONLY; |
| ResolveHostResponseHelper cached_response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(cached_response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(cached_response.request()->GetAddressResults()); |
| EXPECT_FALSE(cached_response.request()->GetEndpointResults()); |
| EXPECT_FALSE(cached_response.request()->GetTextResults()); |
| EXPECT_FALSE(cached_response.request()->GetHostnameResults()); |
| EXPECT_FALSE(cached_response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, TxtQuery_Malformed) { |
| // Setup fallback to confirm it is not used for non-address results. |
| set_allow_fallback_to_systemtask(true); |
| proc_->AddRuleForAllFamilies("host", "192.168.1.102"); |
| proc_->SignalMultiple(1u); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypeTXT, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kMalformed), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::TXT; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_MALFORMED_RESPONSE)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Expect result not cached. |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 0u); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, TxtQuery_MismatchedName) { |
| std::vector<std::vector<std::string>> text_records = {{"text"}}; |
| MockDnsClientRuleList rules; |
| rules.emplace_back("host", dns_protocol::kTypeTXT, false /* secure */, |
| MockDnsClientRule::Result(BuildTestDnsTextResponse( |
| "host", std::move(text_records), "not.host")), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::TXT; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_MALFORMED_RESPONSE)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Expect result not cached. |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 0u); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, TxtQuery_WrongType) { |
| // Respond to a TXT query with an A response. |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypeTXT, false /* secure */, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| "host", dns_protocol::kTypeTXT, |
| {BuildTestAddressRecord("host", IPAddress(1, 2, 3, 4))})), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::TXT; |
| |
| // Responses for the wrong type should be ignored. |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Expect result not cached. |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 0u); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| TxtInsecureQueryDisallowedWhenAdditionalTypesDisallowed) { |
| const std::string kName = "txt.test"; |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kOff; |
| resolver_->SetDnsConfigOverrides(overrides); |
| resolver_->SetInsecureDnsClientEnabled( |
| /*enabled=*/true, |
| /*additional_dns_types_enabled=*/false); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::TXT; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair(kName, 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| // No non-local work is done, so ERR_DNS_CACHE_MISS is the result. |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_CACHE_MISS)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| // Same as TxtQuery except we specify DNS HostResolverSource instead of relying |
| // on automatic determination. Expect same results since DNS should be what we |
| // automatically determine, but some slightly different logic paths are |
| // involved. |
| TEST_F(HostResolverManagerDnsTest, TxtDnsQuery) { |
| // Simulate two separate DNS records, each with multiple strings. |
| std::vector<std::string> foo_records = {"foo1", "foo2", "foo3"}; |
| std::vector<std::string> bar_records = {"bar1", "bar2"}; |
| std::vector<std::vector<std::string>> text_records = {foo_records, |
| bar_records}; |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back("host", dns_protocol::kTypeTXT, false /* secure */, |
| MockDnsClientRule::Result(BuildTestDnsTextResponse( |
| "host", std::move(text_records))), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 0u); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.source = HostResolverSource::DNS; |
| parameters.dns_query_type = DnsQueryType::TXT; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Order between separate DNS records is undefined, but each record should |
| // stay in order as that order may be meaningful. |
| ASSERT_THAT(response.request()->GetTextResults(), |
| testing::Optional(testing::UnorderedElementsAre( |
| "foo1", "foo2", "foo3", "bar1", "bar2"))); |
| std::vector<std::string> results = |
| response.request()->GetTextResults().value(); |
| EXPECT_NE(results.end(), base::ranges::search(results, foo_records)); |
| EXPECT_NE(results.end(), base::ranges::search(results, bar_records)); |
| |
| // Expect result to be cached. |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 1u); |
| ResolveHostResponseHelper cached_response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(cached_response.result_error(), IsOk()); |
| EXPECT_TRUE(cached_response.request()->GetStaleInfo()); |
| ASSERT_THAT(cached_response.request()->GetTextResults(), |
| testing::Optional(testing::UnorderedElementsAre( |
| "foo1", "foo2", "foo3", "bar1", "bar2"))); |
| results = cached_response.request()->GetTextResults().value(); |
| EXPECT_NE(results.end(), base::ranges::search(results, foo_records)); |
| EXPECT_NE(results.end(), base::ranges::search(results, bar_records)); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, PtrQuery) { |
| MockDnsClientRuleList rules; |
| rules.emplace_back("host", dns_protocol::kTypePTR, false /* secure */, |
| MockDnsClientRule::Result(BuildTestDnsPointerResponse( |
| "host", {"foo.com", "bar.com"})), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::PTR; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Order between separate records is undefined. |
| EXPECT_THAT(response.request()->GetHostnameResults(), |
| testing::Optional(testing::UnorderedElementsAre( |
| HostPortPair("foo.com", 108), HostPortPair("bar.com", 108)))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, PtrQueryRejectsIpLiteral) { |
| MockDnsClientRuleList rules; |
| |
| // Entry that would resolve if DNS is mistakenly queried to ensure that does |
| // not happen. |
| rules.emplace_back("8.8.8.8", dns_protocol::kTypePTR, /*secure=*/false, |
| MockDnsClientRule::Result(BuildTestDnsPointerResponse( |
| "8.8.8.8", {"foo.com", "bar.com"})), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::PTR; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("8.8.8.8", 108), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, PtrQueryHandlesReverseIpLookup) { |
| const char kHostname[] = "8.8.8.8.in-addr.arpa"; |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back(kHostname, dns_protocol::kTypePTR, /*secure=*/false, |
| MockDnsClientRule::Result(BuildTestDnsPointerResponse( |
| kHostname, {"dns.google.test", "foo.test"})), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::PTR; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair(kHostname, 108), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Order between separate records is undefined. |
| EXPECT_THAT(response.request()->GetHostnameResults(), |
| testing::Optional(testing::UnorderedElementsAre( |
| HostPortPair("dns.google.test", 108), |
| HostPortPair("foo.test", 108)))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, PtrQuery_NonexistentDomain) { |
| // Setup fallback to confirm it is not used for non-address results. |
| set_allow_fallback_to_systemtask(true); |
| proc_->AddRuleForAllFamilies("host", "192.168.1.102"); |
| proc_->SignalMultiple(1u); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypePTR, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kNoDomain), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::PTR; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, PtrQuery_Failure) { |
| // Setup fallback to confirm it is not used for non-address results. |
| set_allow_fallback_to_systemtask(true); |
| proc_->AddRuleForAllFamilies("host", "192.168.1.102"); |
| proc_->SignalMultiple(1u); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypePTR, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kFail), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::PTR; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, PtrQuery_Timeout) { |
| // Setup fallback to confirm it is not used for non-address results. |
| set_allow_fallback_to_systemtask(true); |
| proc_->AddRuleForAllFamilies("host", "192.168.1.102"); |
| proc_->SignalMultiple(1u); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypePTR, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kTimeout), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::PTR; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_TIMED_OUT)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, PtrQuery_Empty) { |
| // Setup fallback to confirm it is not used for non-address results. |
| set_allow_fallback_to_systemtask(true); |
| proc_->AddRuleForAllFamilies("host", "192.168.1.102"); |
| proc_->SignalMultiple(1u); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypePTR, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kEmpty), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::PTR; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, PtrQuery_Malformed) { |
| // Setup fallback to confirm it is not used for non-address results. |
| set_allow_fallback_to_systemtask(true); |
| proc_->AddRuleForAllFamilies("host", "192.168.1.102"); |
| proc_->SignalMultiple(1u); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypePTR, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kMalformed), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::PTR; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_MALFORMED_RESPONSE)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, PtrQuery_MismatchedName) { |
| std::vector<std::string> ptr_records = {{"foo.com"}}; |
| MockDnsClientRuleList rules; |
| rules.emplace_back("host", dns_protocol::kTypePTR, false /* secure */, |
| MockDnsClientRule::Result(BuildTestDnsPointerResponse( |
| "host", std::move(ptr_records), "not.host")), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::PTR; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_MALFORMED_RESPONSE)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, PtrQuery_WrongType) { |
| // Respond to a TXT query with an A response. |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypePTR, false /* secure */, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| "host", dns_protocol::kTypePTR, |
| {BuildTestAddressRecord("host", IPAddress(1, 2, 3, 4))})), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::PTR; |
| |
| // Responses for the wrong type should be ignored. |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| PtrInsecureQueryDisallowedWhenAdditionalTypesDisallowed) { |
| const std::string kName = "ptr.test"; |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kOff; |
| resolver_->SetDnsConfigOverrides(overrides); |
| resolver_->SetInsecureDnsClientEnabled( |
| /*enabled=*/true, |
| /*additional_dns_types_enabled=*/false); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::PTR; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair(kName, 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| // No non-local work is done, so ERR_DNS_CACHE_MISS is the result. |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_CACHE_MISS)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| // Same as PtrQuery except we specify DNS HostResolverSource instead of relying |
| // on automatic determination. Expect same results since DNS should be what we |
| // automatically determine, but some slightly different logic paths are |
| // involved. |
| TEST_F(HostResolverManagerDnsTest, PtrDnsQuery) { |
| MockDnsClientRuleList rules; |
| rules.emplace_back("host", dns_protocol::kTypePTR, false /* secure */, |
| MockDnsClientRule::Result(BuildTestDnsPointerResponse( |
| "host", {"foo.com", "bar.com"})), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.source = HostResolverSource::DNS; |
| parameters.dns_query_type = DnsQueryType::PTR; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Order between separate records is undefined. |
| EXPECT_THAT(response.request()->GetHostnameResults(), |
| testing::Optional(testing::UnorderedElementsAre( |
| HostPortPair("foo.com", 108), HostPortPair("bar.com", 108)))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SrvQuery) { |
| const TestServiceRecord kRecord1 = {2, 3, 1223, "foo.com"}; |
| const TestServiceRecord kRecord2 = {5, 10, 80, "bar.com"}; |
| const TestServiceRecord kRecord3 = {5, 1, 5, "google.com"}; |
| const TestServiceRecord kRecord4 = {2, 100, 12345, "chromium.org"}; |
| MockDnsClientRuleList rules; |
| rules.emplace_back("host", dns_protocol::kTypeSRV, false /* secure */, |
| MockDnsClientRule::Result(BuildTestDnsServiceResponse( |
| "host", {kRecord1, kRecord2, kRecord3, kRecord4})), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::SRV; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Expect ordered by priority, and random within a priority. |
| absl::optional<std::vector<HostPortPair>> results = |
| response.request()->GetHostnameResults(); |
| ASSERT_THAT( |
| results, |
| testing::Optional(testing::UnorderedElementsAre( |
| HostPortPair("foo.com", 1223), HostPortPair("bar.com", 80), |
| HostPortPair("google.com", 5), HostPortPair("chromium.org", 12345)))); |
| auto priority2 = std::vector<HostPortPair>(results.value().begin(), |
| results.value().begin() + 2); |
| EXPECT_THAT(priority2, testing::UnorderedElementsAre( |
| HostPortPair("foo.com", 1223), |
| HostPortPair("chromium.org", 12345))); |
| auto priority5 = std::vector<HostPortPair>(results.value().begin() + 2, |
| results.value().end()); |
| EXPECT_THAT(priority5, |
| testing::UnorderedElementsAre(HostPortPair("bar.com", 80), |
| HostPortPair("google.com", 5))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SrvQueryRejectsIpLiteral) { |
| MockDnsClientRuleList rules; |
| |
| // Entry that would resolve if DNS is mistakenly queried to ensure that does |
| // not happen. |
| rules.emplace_back("8.8.8.8", dns_protocol::kTypeSRV, /*secure=*/false, |
| MockDnsClientRule::Result(BuildTestDnsServiceResponse( |
| "8.8.8.8", {{/*priority=*/4, /*weight=*/0, /*port=*/90, |
| /*target=*/"google.test"}})), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::SRV; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("8.8.8.8", 108), NetworkAnonymizationKey(), |
| NetLogWithSource(), parameters, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| // 0-weight services are allowed. Ensure that we can handle such records, |
| // especially the case where all entries have weight 0. |
| TEST_F(HostResolverManagerDnsTest, SrvQuery_ZeroWeight) { |
| const TestServiceRecord kRecord1 = {5, 0, 80, "bar.com"}; |
| const TestServiceRecord kRecord2 = {5, 0, 5, "google.com"}; |
| MockDnsClientRuleList rules; |
| rules.emplace_back("host", dns_protocol::kTypeSRV, false /* secure */, |
| MockDnsClientRule::Result(BuildTestDnsServiceResponse( |
| "host", {kRecord1, kRecord2})), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::SRV; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Expect ordered by priority, and random within a priority. |
| EXPECT_THAT(response.request()->GetHostnameResults(), |
| testing::Optional(testing::UnorderedElementsAre( |
| HostPortPair("bar.com", 80), HostPortPair("google.com", 5)))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SrvQuery_NonexistentDomain) { |
| // Setup fallback to confirm it is not used for non-address results. |
| set_allow_fallback_to_systemtask(true); |
| proc_->AddRuleForAllFamilies("host", "192.168.1.102"); |
| proc_->SignalMultiple(1u); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypeSRV, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kNoDomain), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::SRV; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SrvQuery_Failure) { |
| // Setup fallback to confirm it is not used for non-address results. |
| set_allow_fallback_to_systemtask(true); |
| proc_->AddRuleForAllFamilies("host", "192.168.1.102"); |
| proc_->SignalMultiple(1u); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypeSRV, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kFail), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::SRV; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SrvQuery_Timeout) { |
| // Setup fallback to confirm it is not used for non-address results. |
| set_allow_fallback_to_systemtask(true); |
| proc_->AddRuleForAllFamilies("host", "192.168.1.102"); |
| proc_->SignalMultiple(1u); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypeSRV, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kTimeout), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::SRV; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_TIMED_OUT)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SrvQuery_Empty) { |
| // Setup fallback to confirm it is not used for non-address results. |
| set_allow_fallback_to_systemtask(true); |
| proc_->AddRuleForAllFamilies("host", "192.168.1.102"); |
| proc_->SignalMultiple(1u); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypeSRV, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kEmpty), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::SRV; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SrvQuery_Malformed) { |
| // Setup fallback to confirm it is not used for non-address results. |
| set_allow_fallback_to_systemtask(true); |
| proc_->AddRuleForAllFamilies("host", "192.168.1.102"); |
| proc_->SignalMultiple(1u); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypeSRV, false /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kMalformed), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::SRV; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_MALFORMED_RESPONSE)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SrvQuery_MismatchedName) { |
| std::vector<TestServiceRecord> srv_records = {{1, 2, 3, "foo.com"}}; |
| MockDnsClientRuleList rules; |
| rules.emplace_back("host", dns_protocol::kTypeSRV, false /* secure */, |
| MockDnsClientRule::Result(BuildTestDnsServiceResponse( |
| "host", std::move(srv_records), "not.host")), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::SRV; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_MALFORMED_RESPONSE)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, SrvQuery_WrongType) { |
| // Respond to a SRV query with an A response. |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| "host", dns_protocol::kTypeSRV, false /* secure */, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| "host", dns_protocol::kTypeSRV, |
| {BuildTestAddressRecord("host", IPAddress(1, 2, 3, 4))})), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::SRV; |
| |
| // Responses for the wrong type should be ignored. |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| SrvInsecureQueryDisallowedWhenAdditionalTypesDisallowed) { |
| const std::string kName = "srv.test"; |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kOff; |
| resolver_->SetDnsConfigOverrides(overrides); |
| resolver_->SetInsecureDnsClientEnabled( |
| /*enabled=*/true, |
| /*additional_dns_types_enabled=*/false); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::SRV; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair(kName, 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| // No non-local work is done, so ERR_DNS_CACHE_MISS is the result. |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_CACHE_MISS)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| // Same as SrvQuery except we specify DNS HostResolverSource instead of relying |
| // on automatic determination. Expect same results since DNS should be what we |
| // automatically determine, but some slightly different logic paths are |
| // involved. |
| TEST_F(HostResolverManagerDnsTest, SrvDnsQuery) { |
| const TestServiceRecord kRecord1 = {2, 3, 1223, "foo.com"}; |
| const TestServiceRecord kRecord2 = {5, 10, 80, "bar.com"}; |
| const TestServiceRecord kRecord3 = {5, 1, 5, "google.com"}; |
| const TestServiceRecord kRecord4 = {2, 100, 12345, "chromium.org"}; |
| MockDnsClientRuleList rules; |
| rules.emplace_back("host", dns_protocol::kTypeSRV, false /* secure */, |
| MockDnsClientRule::Result(BuildTestDnsServiceResponse( |
| "host", {kRecord1, kRecord2, kRecord3, kRecord4})), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.source = HostResolverSource::DNS; |
| parameters.dns_query_type = DnsQueryType::SRV; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("host", 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Expect ordered by priority, and random within a priority. |
| absl::optional<std::vector<HostPortPair>> results = |
| response.request()->GetHostnameResults(); |
| ASSERT_THAT( |
| results, |
| testing::Optional(testing::UnorderedElementsAre( |
| HostPortPair("foo.com", 1223), HostPortPair("bar.com", 80), |
| HostPortPair("google.com", 5), HostPortPair("chromium.org", 12345)))); |
| auto priority2 = std::vector<HostPortPair>(results.value().begin(), |
| results.value().begin() + 2); |
| EXPECT_THAT(priority2, testing::UnorderedElementsAre( |
| HostPortPair("foo.com", 1223), |
| HostPortPair("chromium.org", 12345))); |
| auto priority5 = std::vector<HostPortPair>(results.value().begin() + 2, |
| results.value().end()); |
| EXPECT_THAT(priority5, |
| testing::UnorderedElementsAre(HostPortPair("bar.com", 80), |
| HostPortPair("google.com", 5))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, HttpsQuery) { |
| const std::string kName = "https.test"; |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/false, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::HTTPS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), parameters, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::ElementsAre(true))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, HttpsQueryForNonStandardPort) { |
| const std::string kName = "https.test"; |
| const std::string kExpectedQueryName = "_1111._https." + kName; |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = {BuildTestHttpsServiceRecord( |
| kExpectedQueryName, /*priority=*/1, /*service_name=*/kName, |
| /*params=*/{})}; |
| rules.emplace_back( |
| kExpectedQueryName, dns_protocol::kTypeHttps, |
| /*secure=*/false, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kExpectedQueryName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::HTTPS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 1111), |
| NetworkAnonymizationKey(), NetLogWithSource(), parameters, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::ElementsAre(true))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, HttpsQueryForHttpUpgrade) { |
| const std::string kName = "https.test"; |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/false, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::HTTPS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpScheme, kName, 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), parameters, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_NAME_HTTPS_ONLY)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| // Test that HTTPS requests for an http host with port 443 will result in a |
| // transaction hostname without prepending port and scheme, despite not having |
| // the default port for an http host. The request host ("http://https.test:443") |
| // will be mapped to the equivalent https upgrade host |
| // ("https://https.test:443") at port 443, which is the default port for an |
| // https host, so port and scheme are not prefixed. |
| TEST_F(HostResolverManagerDnsTest, HttpsQueryForHttpUpgradeFromHttpsPort) { |
| const std::string kName = "https.test"; |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/false, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::HTTPS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), parameters, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_NAME_HTTPS_ONLY)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsQueryForHttpUpgradeWithNonStandardPort) { |
| const std::string kName = "https.test"; |
| const std::string kExpectedQueryName = "_1111._https." + kName; |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = {BuildTestHttpsServiceRecord( |
| kExpectedQueryName, /*priority=*/1, /*service_name=*/kName, |
| /*params=*/{})}; |
| rules.emplace_back( |
| kExpectedQueryName, dns_protocol::kTypeHttps, |
| /*secure=*/false, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kExpectedQueryName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.dns_query_type = DnsQueryType::HTTPS; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpScheme, kName, 1111), |
| NetworkAnonymizationKey(), NetLogWithSource(), parameters, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_NAME_HTTPS_ONLY)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, HttpsInAddressQuery) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features(features::kUseDnsHttpsSvcb); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult( |
| testing::SizeIs(2), |
| ExpectConnectionEndpointMetadata( |
| testing::ElementsAre(dns_protocol::kHttpsServiceDefaultAlpn), |
| testing::IsEmpty(), kName)), |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::ElementsAre(true))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, HttpsInAddressQueryWithNonstandardPort) { |
| const char kName[] = "name.test"; |
| const char kExpectedHttpsQueryName[] = "_108._https.name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = {BuildTestHttpsServiceRecord( |
| kExpectedHttpsQueryName, /*priority=*/1, /*service_name=*/kName, |
| /*params=*/{})}; |
| rules.emplace_back( |
| kExpectedHttpsQueryName, dns_protocol::kTypeHttps, |
| /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kExpectedHttpsQueryName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 108), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult( |
| testing::SizeIs(2), |
| ExpectConnectionEndpointMetadata( |
| testing::ElementsAre(dns_protocol::kHttpsServiceDefaultAlpn), |
| testing::IsEmpty(), kName)), |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::ElementsAre(true))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsInAddressQueryWithNonstandardPortAndDefaultServiceName) { |
| const char kName[] = "name.test"; |
| const char kExpectedHttpsQueryName[] = "_108._https.name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = {BuildTestHttpsServiceRecord( |
| kExpectedHttpsQueryName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back( |
| kExpectedHttpsQueryName, dns_protocol::kTypeHttps, |
| /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kExpectedHttpsQueryName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 108), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| // Expect only A/AAAA results without metadata because the HTTPS service |
| // target name matches the port-prefixed name which does not match the A/AAAA |
| // name and is thus not supported due to requiring followup queries. |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::ElementsAre(true))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, HttpsInAddressQueryWithAlpnAndEch) { |
| const char kName[] = "name.test"; |
| const uint8_t kEch[] = "ECH is neato!"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = {BuildTestHttpsServiceRecord( |
| kName, /*priority=*/8, /*service_name=*/".", |
| /*params=*/ |
| {BuildTestHttpsServiceAlpnParam({"foo1", "foo2"}), |
| BuildTestHttpsServiceEchConfigParam(kEch)})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult( |
| testing::SizeIs(2), |
| ExpectConnectionEndpointMetadata( |
| testing::UnorderedElementsAre( |
| "foo1", "foo2", dns_protocol::kHttpsServiceDefaultAlpn), |
| testing::ElementsAreArray(kEch), kName)), |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::ElementsAre(true))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, HttpsInAddressQueryWithNonMatchingPort) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/8, /*service_name=*/".", |
| /*params=*/ |
| {BuildTestHttpsServicePortParam(3000)})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::ElementsAre(true))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, HttpsInAddressQueryWithMatchingPort) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/8, /*service_name=*/".", |
| /*params=*/ |
| {BuildTestHttpsServicePortParam(443)})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult( |
| testing::SizeIs(2), |
| ExpectConnectionEndpointMetadata( |
| testing::ElementsAre(dns_protocol::kHttpsServiceDefaultAlpn), |
| testing::IsEmpty(), kName)), |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::ElementsAre(true))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, HttpsInAddressQueryWithoutAddresses) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kEmpty), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kEmpty), |
| /*delay=*/false); |
| |
| // Will fall back to insecure due to lack of addresses. |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/false, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kEmpty), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kEmpty), |
| /*delay=*/false); |
| |
| // Will fall back to system resolver due to lack of addresses. |
| proc_->AddRuleForAllFamilies("just.testing", ""); |
| proc_->SignalMultiple(1u); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| // No address results overrides overall result. |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| // No results maintained when overall error is ERR_NAME_NOT_RESOLVED (and also |
| // because of the fallback to system resolver). |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, HttpsQueriedInAddressQueryButNoResults) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kEmpty), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::IsEmpty())); |
| } |
| |
| // For a response where DnsTransaction can at least do its basic parsing and |
| // return a DnsResponse object to HostResolverManager. See |
| // `UnparsableHttpsInAddressRequestIsFatal` for a response so unparsable that |
| // DnsTransaction couldn't do that. |
| TEST_F(HostResolverManagerDnsTest, |
| MalformedHttpsInResponseInAddressRequestIsIgnored) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {{"UseDnsHttpsSvcbEnforceSecureResponse", "true"}, |
| // Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kMalformed), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::IsEmpty())); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| MalformedHttpsRdataInAddressRequestIsIgnored) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {{"UseDnsHttpsSvcbEnforceSecureResponse", "true"}, |
| // Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, /*answers=*/ |
| {BuildTestDnsRecord(kName, dns_protocol::kTypeHttps, |
| /*rdata=*/"malformed rdata")})), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::IsEmpty())); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| FailedHttpsInAddressRequestIsFatalWhenFeatureEnabled) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {{"UseDnsHttpsSvcbEnforceSecureResponse", "true"}, |
| // Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kFail), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Expect result not cached. |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 0u); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| FailedHttpsInAddressRequestIgnoredWhenFeatureDisabled) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {{"UseDnsHttpsSvcbEnforceSecureResponse", "false"}, |
| // Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kFail), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::IsEmpty())); |
| } |
| |
| TEST_F( |
| HostResolverManagerDnsTest, |
| FailedHttpsInAddressRequestAfterAddressFailureIsFatalWhenFeatureEnabled) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {{"UseDnsHttpsSvcbEnforceSecureResponse", "true"}, |
| // Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| // Delay HTTPS result to ensure it comes after A failure. |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kFail), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kFail), |
| /*delay=*/false); |
| // Delay AAAA result to ensure it is cancelled after A failure. |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kUnexpected), |
| /*delay=*/true); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| base::RunLoop().RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| dns_client_->CompleteDelayedTransactions(); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Expect result not cached. |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 0u); |
| } |
| |
| TEST_F( |
| HostResolverManagerDnsTest, |
| FailedHttpsInAddressRequestAfterAddressFailureIgnoredWhenFeatureDisabled) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {{"UseDnsHttpsSvcbEnforceSecureResponse", "false"}, |
| // Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| // Delay HTTPS result to ensure it is cancelled after AAAA failure. |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kUnexpected), |
| /*delay=*/true); |
| // Delay A result to ensure it is cancelled after AAAA failure. |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kUnexpected), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kFail), |
| /*delay=*/false); |
| |
| // Expect fall back to insecure due to AAAA failure. |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kEmpty), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| base::RunLoop().RunUntilIdle(); |
| // Unnecessary to complete delayed transactions because they should be |
| // cancelled after first failure (AAAA). |
| EXPECT_TRUE(response.complete()); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_TRUE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_TRUE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, TimeoutHttpsInAddressRequestIsFatal) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {{"UseDnsHttpsSvcbEnforceSecureResponse", "true"}, |
| // Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kTimeout), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_TIMED_OUT)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Expect result not cached. |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 0u); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, ServfailHttpsInAddressRequestIsFatal) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {{"UseDnsHttpsSvcbEnforceSecureResponse", "true"}, |
| // Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result( |
| MockDnsClientRule::ResultType::kFail, |
| BuildTestDnsResponse(kName, dns_protocol::kTypeHttps, /*answers=*/{}, |
| /*authority=*/{}, /*additional=*/{}, |
| dns_protocol::kRcodeSERVFAIL), |
| ERR_DNS_SERVER_FAILED), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_SERVER_FAILED)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Expect result not cached. |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 0u); |
| } |
| |
| // For a response so malformed that DnsTransaction can't do its basic parsing to |
| // determine an RCODE and return a DnsResponse object to HostResolverManager. |
| // Essentially equivalent to a network error. See |
| // `MalformedHttpsInResponseInAddressRequestIsFatal` for a malformed response |
| // that can at least send a DnsResponse to HostResolverManager. |
| TEST_F(HostResolverManagerDnsTest, UnparsableHttpsInAddressRequestIsFatal) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {{"UseDnsHttpsSvcbEnforceSecureResponse", "true"}, |
| // Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kFail, |
| /*response=*/absl::nullopt, |
| ERR_DNS_MALFORMED_RESPONSE), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_MALFORMED_RESPONSE)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| |
| // Expect result not cached. |
| EXPECT_EQ(resolve_context_->host_cache()->size(), 0u); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, RefusedHttpsInAddressRequestIsIgnored) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {{"UseDnsHttpsSvcbEnforceSecureResponse", "true"}, |
| // Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result( |
| MockDnsClientRule::ResultType::kFail, |
| BuildTestDnsResponse(kName, dns_protocol::kTypeHttps, /*answers=*/{}, |
| /*authority=*/{}, /*additional=*/{}, |
| dns_protocol::kRcodeREFUSED), |
| ERR_DNS_SERVER_FAILED), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::IsEmpty())); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, HttpsInAddressQueryForWssScheme) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kWssScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult( |
| testing::SizeIs(2), |
| ExpectConnectionEndpointMetadata( |
| testing::ElementsAre(dns_protocol::kHttpsServiceDefaultAlpn), |
| testing::IsEmpty(), kName)), |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::ElementsAre(true))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, NoHttpsInAddressQueryWithoutScheme) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| // Should not be queried. |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kUnexpected), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair(kName, 443), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, NoHttpsInAddressQueryForNonHttpScheme) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| // Should not be queried. |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kUnexpected), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kFtpScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsInAddressQueryForHttpSchemeWhenUpgradeEnabled) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpScheme, kName, 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_NAME_HTTPS_ONLY)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsInAddressQueryForHttpSchemeWhenUpgradeEnabledWithAliasRecord) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsAliasRecord(kName, "alias.test")}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpScheme, kName, 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_NAME_HTTPS_ONLY)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F( |
| HostResolverManagerDnsTest, |
| HttpsInAddressQueryForHttpSchemeWhenUpgradeEnabledWithIncompatibleServiceRecord) { |
| const char kName[] = "name.test"; |
| const uint16_t kMadeUpParam = 65300; // From the private-use block. |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = {BuildTestHttpsServiceRecord( |
| kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/ |
| {BuildTestHttpsServiceMandatoryParam({kMadeUpParam}), |
| {kMadeUpParam, "foo"}})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpScheme, kName, 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| // Expect incompatible HTTPS record to have no effect on results (except |
| // `GetExperimentalResultsForTesting()` which returns the record |
| // compatibility). |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_TRUE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::ElementsAre(false))); |
| } |
| |
| // Even if no addresses are received for a request, finding an HTTPS record |
| // should still force an HTTP->HTTPS upgrade. |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsInAddressQueryForHttpSchemeWhenUpgradeEnabledWithoutAddresses) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kEmpty), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kEmpty), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpScheme, kName, 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_NAME_HTTPS_ONLY)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, HttpsInSecureModeAddressQuery) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsAliasRecord(kName, "alias.test")}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_TRUE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::ElementsAre(true))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, HttpsInSecureModeAddressQueryForHttpScheme) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpScheme, kName, 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_NAME_HTTPS_ONLY)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, HttpsInInsecureAddressQuery) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/false, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult( |
| testing::SizeIs(2), |
| ExpectConnectionEndpointMetadata( |
| testing::ElementsAre(dns_protocol::kHttpsServiceDefaultAlpn), |
| testing::IsEmpty(), kName)), |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::ElementsAre(true))); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, HttpsInInsecureAddressQueryForHttpScheme) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/false, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpScheme, kName, 80), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsError(ERR_DNS_NAME_HTTPS_ONLY)); |
| EXPECT_FALSE(response.request()->GetAddressResults()); |
| EXPECT_FALSE(response.request()->GetEndpointResults()); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, FailedHttpsInInsecureAddressRequestIgnored) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kFail), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::IsEmpty())); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| TimeoutHttpsInInsecureAddressRequestIgnored) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kTimeout), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::IsEmpty())); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| ServfailHttpsInInsecureAddressRequestIgnored) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/false, |
| MockDnsClientRule::Result( |
| MockDnsClientRule::ResultType::kFail, |
| BuildTestDnsResponse(kName, dns_protocol::kTypeHttps, /*answers=*/{}, |
| /*authority=*/{}, /*additional=*/{}, |
| dns_protocol::kRcodeSERVFAIL), |
| ERR_DNS_SERVER_FAILED), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::IsEmpty())); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| UnparsableHttpsInInsecureAddressRequestIgnored) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kFail, |
| /*response=*/absl::nullopt, |
| ERR_DNS_MALFORMED_RESPONSE), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::IsEmpty())); |
| } |
| |
| // Test that when additional HTTPS timeout Feature params are disabled, the task |
| // does not timeout until the transactions themselves timeout. |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsInAddressQueryWaitsWithoutAdditionalTimeout) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| rules.emplace_back( |
| kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kTimeout), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Wait an absurd amount of time (1 hour) and expect the request to not |
| // complete because it is waiting on the transaction, where the mock is |
| // delaying completion. |
| FastForwardBy(base::Hours(1)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| dns_client_->CompleteDelayedTransactions(); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::IsEmpty())); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsInSecureAddressQueryWithOnlyMinTimeout) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {{"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "30m"}, |
| // Set a Secure absolute timeout of 10 minutes via the "min" param. |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "10m"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Wait until 1 second before expected timeout. |
| FastForwardBy(base::Minutes(10) - base::Seconds(1)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Exceed expected timeout. |
| FastForwardBy(base::Seconds(2)); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| // No experimental results if transaction did not complete. |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsInSecureAddressQueryWithOnlyMaxTimeout) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {{"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "30m"}, |
| // Set a Secure absolute timeout of 10 minutes via the "max" param. |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "10m"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Wait until 1 second before expected timeout. |
| FastForwardBy(base::Minutes(10) - base::Seconds(1)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Exceed expected timeout. |
| FastForwardBy(base::Seconds(2)); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| // No experimental results if transaction did not complete. |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsInSecureAddressQueryWithRelativeTimeout) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {{"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "30m"}, |
| // Set a Secure relative timeout of 10%. |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "10"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/true); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Complete final address transaction after 100 seconds total. |
| FastForwardBy(base::Seconds(50)); |
| ASSERT_TRUE( |
| dns_client_->CompleteOneDelayedTransactionOfType(DnsQueryType::A)); |
| FastForwardBy(base::Seconds(50)); |
| ASSERT_TRUE( |
| dns_client_->CompleteOneDelayedTransactionOfType(DnsQueryType::AAAA)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Expect timeout at additional 10 seconds. |
| FastForwardBy(base::Seconds(9)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| FastForwardBy(base::Seconds(2)); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| // No experimental results if transaction did not complete. |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsInSecureAddressQueryWithMaxTimeoutFirst) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {{"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| // Set a Secure max timeout of 30s and a relative timeout of 100%. |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "30s"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "100"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "10s"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/true); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Complete final address transaction after 4 minutes total. |
| FastForwardBy(base::Minutes(2)); |
| ASSERT_TRUE( |
| dns_client_->CompleteOneDelayedTransactionOfType(DnsQueryType::A)); |
| FastForwardBy(base::Minutes(2)); |
| ASSERT_TRUE( |
| dns_client_->CompleteOneDelayedTransactionOfType(DnsQueryType::AAAA)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Wait until 1 second before expected timeout (from the max timeout). |
| FastForwardBy(base::Seconds(29)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Exceed expected timeout. |
| FastForwardBy(base::Seconds(2)); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| // No experimental results if transaction did not complete. |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsInAddressQueryWithRelativeTimeoutFirst) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {{"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| // Set a Secure max timeout of 20 minutes and a relative timeout of 10%. |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "20m"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "10"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "1s"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/true); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Complete final address transaction after 100 seconds total. |
| FastForwardBy(base::Seconds(50)); |
| ASSERT_TRUE( |
| dns_client_->CompleteOneDelayedTransactionOfType(DnsQueryType::A)); |
| FastForwardBy(base::Seconds(50)); |
| ASSERT_TRUE( |
| dns_client_->CompleteOneDelayedTransactionOfType(DnsQueryType::AAAA)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Expect timeout at additional 10 seconds (from the relative timeout). |
| FastForwardBy(base::Seconds(9)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| FastForwardBy(base::Seconds(2)); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| // No experimental results if transaction did not complete. |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsInAddressQueryWithRelativeTimeoutShorterThanMinTimeout) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {{"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| // Set a Secure min timeout of 1 minute and a relative timeout of 10%. |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "20m"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "10"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "1m"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/true); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Complete final address transaction after 100 seconds total. |
| FastForwardBy(base::Seconds(50)); |
| ASSERT_TRUE( |
| dns_client_->CompleteOneDelayedTransactionOfType(DnsQueryType::A)); |
| FastForwardBy(base::Seconds(50)); |
| ASSERT_TRUE( |
| dns_client_->CompleteOneDelayedTransactionOfType(DnsQueryType::AAAA)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Expect timeout at additional 1 minute (from the min timeout). |
| FastForwardBy(base::Minutes(1) - base::Seconds(1)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| FastForwardBy(base::Seconds(2)); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| // No experimental results if transaction did not complete. |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsInInsecureAddressQueryWithOnlyMinTimeout) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Set an Insecure absolute timeout of 10 minutes via the "min" param. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "10m"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/false, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Wait until 1 second before expected timeout. |
| FastForwardBy(base::Minutes(10) - base::Seconds(1)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Exceed expected timeout. |
| FastForwardBy(base::Seconds(2)); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| // No experimental results if transaction did not complete. |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsInInsecureAddressQueryWithOnlyMaxTimeout) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Set an Insecure absolute timeout of 10 minutes via the "max" param. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "10m"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/false, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Wait until 1 second before expected timeout. |
| FastForwardBy(base::Minutes(10) - base::Seconds(1)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Exceed expected timeout. |
| FastForwardBy(base::Seconds(2)); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| // No experimental results if transaction did not complete. |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsInInsecureAddressQueryWithRelativeTimeout) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Set an Insecure relative timeout of 10%. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "10"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/false, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/true); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Complete final address transaction after 100 seconds total. |
| FastForwardBy(base::Seconds(50)); |
| ASSERT_TRUE( |
| dns_client_->CompleteOneDelayedTransactionOfType(DnsQueryType::A)); |
| FastForwardBy(base::Seconds(50)); |
| ASSERT_TRUE( |
| dns_client_->CompleteOneDelayedTransactionOfType(DnsQueryType::AAAA)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Expect timeout at additional 10 seconds. |
| FastForwardBy(base::Seconds(9)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| FastForwardBy(base::Seconds(2)); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| // No experimental results if transaction did not complete. |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| // Test that HTTPS timeouts are not used when fatal for the request. |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsInAddressQueryWaitsWithoutTimeoutIfFatal) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Set timeouts but also enforce secure responses. |
| {"UseDnsHttpsSvcbEnforceSecureResponse", "true"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "20m"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/true, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/true, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kAutomatic; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Wait an absurd amount of time (1 hour) and expect the request to not |
| // complete because it is waiting on the transaction, where the mock is |
| // delaying completion. |
| FastForwardBy(base::Hours(1)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| dns_client_->CompleteDelayedTransactions(); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult( |
| testing::SizeIs(2), |
| ExpectConnectionEndpointMetadata( |
| testing::ElementsAre(dns_protocol::kHttpsServiceDefaultAlpn), |
| testing::IsEmpty(), kName)), |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| EXPECT_THAT(response.request()->GetExperimentalResultsForTesting(), |
| testing::Pointee(testing::ElementsAre(true))); |
| } |
| |
| // Test that HTTPS timeouts are always respected for insecure requests. |
| TEST_F(HostResolverManagerDnsTest, |
| HttpsInAddressQueryAlwaysRespectsTimeoutsForInsecure) { |
| const char kName[] = "name.test"; |
| |
| base::test::ScopedFeatureList features; |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Set timeouts but also enforce secure responses. |
| {"UseDnsHttpsSvcbEnforceSecureResponse", "true"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "20m"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestHttpsServiceRecord(kName, /*priority=*/1, /*service_name=*/".", |
| /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeHttps, /*secure=*/false, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeHttps, records)), |
| /*delay=*/true); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, /*secure=*/false, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| /*delay=*/false); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| url::SchemeHostPort(url::kHttpsScheme, kName, 443), |
| NetworkAnonymizationKey(), NetLogWithSource(), absl::nullopt, |
| resolve_context_.get(), resolve_context_->host_cache())); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| // Wait until 1s before expected timeout. |
| FastForwardBy(base::Minutes(20) - base::Seconds(1)); |
| RunUntilIdle(); |
| EXPECT_FALSE(response.complete()); |
| |
| FastForwardBy(base::Seconds(2)); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| // No experimental results if transaction did not complete. |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, UnsolicitedHttps) { |
| const char kName[] = "unsolicited.test"; |
| |
| MockDnsClientRuleList rules; |
| std::vector<DnsResourceRecord> records = { |
| BuildTestAddressRecord(kName, IPAddress(1, 2, 3, 4))}; |
| std::vector<DnsResourceRecord> additional = {BuildTestHttpsServiceRecord( |
| kName, /*priority=*/1, /*service_name=*/".", /*params=*/{})}; |
| rules.emplace_back(kName, dns_protocol::kTypeA, true /* secure */, |
| MockDnsClientRule::Result(BuildTestDnsResponse( |
| kName, dns_protocol::kTypeA, records, |
| {} /* authority */, additional)), |
| false /* delay */); |
| rules.emplace_back( |
| kName, dns_protocol::kTypeAAAA, true /* secure */, |
| MockDnsClientRule::Result(MockDnsClientRule::ResultType::kOk), |
| false /* delay */); |
| |
| CreateResolver(); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair(kName, 108), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_TRUE(response.request()->GetAddressResults()); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::SizeIs(2))))); |
| EXPECT_FALSE(response.request()->GetTextResults()); |
| EXPECT_FALSE(response.request()->GetHostnameResults()); |
| // Unsolicited records not included in results. |
| EXPECT_FALSE(response.request()->GetExperimentalResultsForTesting()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DohProbeRequest) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| EXPECT_FALSE(dns_client_->factory()->doh_probes_running()); |
| |
| std::unique_ptr<HostResolver::ProbeRequest> request = |
| resolver_->CreateDohProbeRequest(resolve_context_.get()); |
| EXPECT_THAT(request->Start(), IsError(ERR_IO_PENDING)); |
| |
| EXPECT_TRUE(dns_client_->factory()->doh_probes_running()); |
| |
| request.reset(); |
| |
| EXPECT_FALSE(dns_client_->factory()->doh_probes_running()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DohProbeRequest_BeforeConfig) { |
| InvalidateDnsConfig(); |
| |
| std::unique_ptr<HostResolver::ProbeRequest> request = |
| resolver_->CreateDohProbeRequest(resolve_context_.get()); |
| EXPECT_THAT(request->Start(), IsError(ERR_IO_PENDING)); |
| EXPECT_FALSE(dns_client_->factory()->doh_probes_running()); |
| |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| EXPECT_TRUE(dns_client_->factory()->doh_probes_running()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DohProbeRequest_InvalidateConfig) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| std::unique_ptr<HostResolver::ProbeRequest> request = |
| resolver_->CreateDohProbeRequest(resolve_context_.get()); |
| EXPECT_THAT(request->Start(), IsError(ERR_IO_PENDING)); |
| ASSERT_TRUE(dns_client_->factory()->doh_probes_running()); |
| |
| InvalidateDnsConfig(); |
| |
| EXPECT_FALSE(dns_client_->factory()->doh_probes_running()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, DohProbeRequest_RestartOnConnectionChange) { |
| DestroyResolver(); |
| test::ScopedMockNetworkChangeNotifier notifier; |
| CreateSerialResolver(); |
| notifier.mock_network_change_notifier()->SetConnectionType( |
| NetworkChangeNotifier::CONNECTION_NONE); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| std::unique_ptr<HostResolver::ProbeRequest> request = |
| resolver_->CreateDohProbeRequest(resolve_context_.get()); |
| EXPECT_THAT(request->Start(), IsError(ERR_IO_PENDING)); |
| EXPECT_TRUE(dns_client_->factory()->doh_probes_running()); |
| dns_client_->factory()->CompleteDohProbeRuners(); |
| ASSERT_FALSE(dns_client_->factory()->doh_probes_running()); |
| |
| notifier.mock_network_change_notifier()->SetConnectionTypeAndNotifyObservers( |
| NetworkChangeNotifier::CONNECTION_NONE); |
| |
| EXPECT_TRUE(dns_client_->factory()->doh_probes_running()); |
| } |
| |
| TEST_F(HostResolverManagerDnsTest, MultipleDohProbeRequests) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| EXPECT_FALSE(dns_client_->factory()->doh_probes_running()); |
| |
| std::unique_ptr<HostResolver::ProbeRequest> request1 = |
| resolver_->CreateDohProbeRequest(resolve_context_.get()); |
| EXPECT_THAT(request1->Start(), IsError(ERR_IO_PENDING)); |
| std::unique_ptr<HostResolver::ProbeRequest> request2 = |
| resolver_->CreateDohProbeRequest(resolve_context_.get()); |
| EXPECT_THAT(request2->Start(), IsError(ERR_IO_PENDING)); |
| |
| EXPECT_TRUE(dns_client_->factory()->doh_probes_running()); |
| |
| request1.reset(); |
| EXPECT_TRUE(dns_client_->factory()->doh_probes_running()); |
| |
| request2.reset(); |
| EXPECT_FALSE(dns_client_->factory()->doh_probes_running()); |
| } |
| |
| // Test that a newly-registered ResolveContext is immediately usable with a DNS |
| // configuration loaded before the context registration. |
| TEST_F(HostResolverManagerDnsTest, |
| NewlyRegisteredContext_ConfigBeforeRegistration) { |
| ResolveContext context(nullptr /* url_request_context */, |
| true /* enable_caching */); |
| set_allow_fallback_to_systemtask(false); |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ASSERT_TRUE(dns_client_->GetCurrentSession()); |
| |
| resolver_->RegisterResolveContext(&context); |
| EXPECT_EQ(context.current_session_for_testing(), |
| dns_client_->GetCurrentSession()); |
| |
| // Test a SECURE-mode DoH request with SetForceDohServerAvailable(false). |
| // Should only succeed if a DoH server is marked available in the |
| // ResolveContext. MockDnsClient skips most other interaction with |
| // ResolveContext. |
| dns_client_->SetForceDohServerAvailable(false); |
| context.RecordServerSuccess(0u /* server_index */, true /* is_doh_server */, |
| dns_client_->GetCurrentSession()); |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("secure", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, &context, context.host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| |
| resolver_->DeregisterResolveContext(&context); |
| } |
| |
| // Test interaction with a ResolveContext registered before a DNS config is |
| // ready. |
| TEST_F(HostResolverManagerDnsTest, |
| NewlyRegisteredContext_NoConfigAtRegistration) { |
| ResolveContext context(nullptr /* url_request_context */, |
| true /* enable_caching */); |
| set_allow_fallback_to_systemtask(false); |
| InvalidateDnsConfig(); |
| DnsConfigOverrides overrides; |
| overrides.secure_dns_mode = SecureDnsMode::kSecure; |
| resolver_->SetDnsConfigOverrides(overrides); |
| |
| ASSERT_FALSE(dns_client_->GetCurrentSession()); |
| |
| // Register context before loading a DNS config. |
| resolver_->RegisterResolveContext(&context); |
| EXPECT_FALSE(context.current_session_for_testing()); |
| |
| // Load DNS config and expect the session to be loaded into the ResolveContext |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| ASSERT_TRUE(dns_client_->GetCurrentSession()); |
| EXPECT_EQ(context.current_session_for_testing(), |
| dns_client_->GetCurrentSession()); |
| |
| // Test a SECURE-mode DoH request with SetForceDohServerAvailable(false). |
| // Should only succeed if a DoH server is marked available in the |
| // ResolveContext. MockDnsClient skips most other interaction with |
| // ResolveContext. |
| dns_client_->SetForceDohServerAvailable(false); |
| context.RecordServerSuccess(0u /* server_index */, true /* is_doh_server */, |
| dns_client_->GetCurrentSession()); |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("secure", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| absl::nullopt, &context, context.host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| |
| resolver_->DeregisterResolveContext(&context); |
| } |
| |
| // `HostResolver::ResolveHostParameters::avoid_multicast_resolution` not |
| // currently supported to do anything except with the system resolver. So with |
| // DnsTask, expect it to be ignored. |
| TEST_F(HostResolverManagerDnsTest, AvoidMulticastIgnoredWithDnsTask) { |
| ChangeDnsConfig(CreateValidDnsConfig()); |
| |
| HostResolver::ResolveHostParameters parameters; |
| parameters.avoid_multicast_resolution = true; |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("ok", 80), NetworkAnonymizationKey(), NetLogWithSource(), |
| parameters, resolve_context_.get(), resolve_context_->host_cache())); |
| EXPECT_THAT(response.result_error(), IsOk()); |
| } |
| |
| class HostResolverManagerBootstrapTest : public HostResolverManagerDnsTest { |
| protected: |
| using MockResult = MockDnsClientRule::ResultType; |
| |
| void SetUp() override { |
| // The request host scheme and port are only preserved if the SVCB feature |
| // is enabled. |
| features.InitAndEnableFeatureWithParameters( |
| features::kUseDnsHttpsSvcb, |
| {// Disable timeouts. |
| {"UseDnsHttpsSvcbInsecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbInsecureExtraTimeMin", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMax", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimePercent", "0"}, |
| {"UseDnsHttpsSvcbSecureExtraTimeMin", "0"}}); |
| |
| HostResolverManagerDnsTest::SetUp(); |
| |
| // MockHostResolverProc only returns failure if there is at least one |
| // non-matching rule. |
| proc_->AddRuleForAllFamilies("other_name", {}); |
| proc_->SignalMultiple(1u); // Allow up to one proc query. |
| } |
| |
| const NetworkAnonymizationKey kAnonymizationKey; |
| const url::SchemeHostPort kEndpoint = |
| url::SchemeHostPort(url::kHttpsScheme, "bootstrap", 443); |
| const std::vector<IPEndPoint> kCacheAddrs = { |
| {{0x20, 0x01, 0x0d, 0xb1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1}, 0}, |
| {{192, 0, 2, 1}, 0}}; |
| const std::vector<IPEndPoint> kBootstrapAddrs = { |
| {{0x20, 0x01, 0x0d, 0xb1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2}, 0}, |
| {{192, 0, 2, 2}, 0}}; |
| // The mock DNS client always returns localhost. |
| const std::vector<IPEndPoint> kRemoteAddrs = { |
| {IPAddress::IPv6Localhost(), 0}, |
| {IPAddress::IPv4Localhost(), 0}}; |
| |
| static HostResolver::ResolveHostParameters bootstrap_params() { |
| HostResolver::ResolveHostParameters params; |
| params.secure_dns_policy = SecureDnsPolicy::kBootstrap; |
| return params; |
| } |
| |
| void ConfigureMockDns(MockResult insecure_result, MockResult secure_result) { |
| MockDnsClientRuleList rules; |
| AddDnsRule(&rules, kEndpoint.host(), dns_protocol::kTypeA, insecure_result, |
| /*delay=*/false); |
| AddDnsRule(&rules, kEndpoint.host(), dns_protocol::kTypeAAAA, |
| insecure_result, /*delay=*/false); |
| AddSecureDnsRule(&rules, kEndpoint.host(), dns_protocol::kTypeA, |
| secure_result, /*delay=*/false); |
| AddSecureDnsRule(&rules, kEndpoint.host(), dns_protocol::kTypeAAAA, |
| secure_result, /*delay=*/false); |
| UseMockDnsClient(CreateValidDnsConfig(), std::move(rules)); |
| dns_client_->set_preset_endpoint(kEndpoint); |
| } |
| |
| HostCache::Key MakeCacheKey(bool secure) { |
| HostCache::Key cache_key(kEndpoint, DnsQueryType::UNSPECIFIED, 0, |
| HostResolverSource::ANY, kAnonymizationKey); |
| cache_key.secure = secure; |
| return cache_key; |
| } |
| |
| void PopulateCache(bool secure) { |
| constexpr base::TimeDelta kTtl = base::Seconds(3600); |
| HostCache::Entry entry(OK, kCacheAddrs, /*aliases=*/{}, |
| HostCache::Entry::SOURCE_DNS, kTtl); |
| resolve_context_->host_cache()->Set(MakeCacheKey(secure), std::move(entry), |
| GetMockTickClock()->NowTicks(), kTtl); |
| } |
| |
| base::test::ScopedFeatureList features; |
| }; |
| |
| std::vector<IPAddress> IPAddresses(const std::vector<IPEndPoint>& endpoints) { |
| std::vector<IPAddress> ip_addresses; |
| base::ranges::transform(endpoints, std::back_inserter(ip_addresses), |
| &IPEndPoint::address); |
| return ip_addresses; |
| } |
| |
| std::vector<IPAddress> IPAddresses(const AddressList& addresses) { |
| return IPAddresses(addresses.endpoints()); |
| } |
| |
| MATCHER_P(AddressesMatch, expected, "Matches addresses between AddressLists") { |
| return testing::Matches(testing::UnorderedElementsAreArray( |
| IPAddresses(expected)))(IPAddresses(arg)); |
| } |
| |
| TEST_F(HostResolverManagerBootstrapTest, BlankSlate) { |
| ConfigureMockDns(/*insecure_result=*/MockResult::kOk, |
| /*secure_result=*/MockResult::kUnexpected); |
| |
| ResolveHostResponseHelper bootstrap_response(resolver_->CreateRequest( |
| kEndpoint, kAnonymizationKey, NetLogWithSource(), bootstrap_params(), |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_FALSE(bootstrap_response.complete()); |
| EXPECT_THAT(bootstrap_response.result_error(), IsOk()); |
| EXPECT_THAT(bootstrap_response.request()->GetAddressResults(), |
| testing::Pointee(AddressesMatch(kRemoteAddrs))); |
| EXPECT_THAT(bootstrap_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(AddressesMatch(kRemoteAddrs))))); |
| } |
| |
| TEST_F(HostResolverManagerBootstrapTest, InsecureCacheEntry) { |
| ConfigureMockDns(/*insecure_result=*/MockResult::kUnexpected, |
| /*secure_result=*/MockResult::kUnexpected); |
| PopulateCache(/*secure=*/false); |
| |
| ResolveHostResponseHelper bootstrap_response(resolver_->CreateRequest( |
| kEndpoint, kAnonymizationKey, NetLogWithSource(), bootstrap_params(), |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_TRUE(bootstrap_response.complete()); |
| EXPECT_THAT(bootstrap_response.result_error(), IsOk()); |
| EXPECT_THAT(bootstrap_response.request()->GetAddressResults(), |
| testing::Pointee(AddressesMatch(kCacheAddrs))); |
| EXPECT_THAT(bootstrap_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(AddressesMatch(kCacheAddrs))))); |
| } |
| |
| TEST_F(HostResolverManagerBootstrapTest, SecureCacheEntry) { |
| ConfigureMockDns(/*insecure_result=*/MockResult::kUnexpected, |
| /*secure_result=*/MockResult::kUnexpected); |
| PopulateCache(/*secure=*/true); |
| |
| ResolveHostResponseHelper bootstrap_response(resolver_->CreateRequest( |
| kEndpoint, kAnonymizationKey, NetLogWithSource(), bootstrap_params(), |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_TRUE(bootstrap_response.complete()); |
| EXPECT_THAT(bootstrap_response.result_error(), IsOk()); |
| EXPECT_THAT(bootstrap_response.request()->GetAddressResults(), |
| testing::Pointee(AddressesMatch(kCacheAddrs))); |
| EXPECT_THAT(bootstrap_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(AddressesMatch(kCacheAddrs))))); |
| } |
| |
| TEST_F(HostResolverManagerBootstrapTest, OnlyBootstrap) { |
| ConfigureMockDns(/*insecure_result=*/MockResult::kUnexpected, |
| /*secure_result=*/MockResult::kOk); |
| dns_client_->set_preset_addrs(kBootstrapAddrs); |
| |
| ResolveHostResponseHelper bootstrap_response(resolver_->CreateRequest( |
| kEndpoint, kAnonymizationKey, NetLogWithSource(), bootstrap_params(), |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_TRUE(bootstrap_response.complete()); |
| EXPECT_THAT(bootstrap_response.result_error(), IsOk()); |
| EXPECT_THAT(bootstrap_response.request()->GetAddressResults(), |
| testing::Pointee(AddressesMatch(kBootstrapAddrs))); |
| EXPECT_THAT(bootstrap_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(AddressesMatch(kBootstrapAddrs))))); |
| |
| // Run the followup query. |
| RunUntilIdle(); |
| |
| // Confirm that the remote addresses are now in the secure cache. |
| const auto* secure_result = resolve_context_->host_cache()->Lookup( |
| MakeCacheKey(/*secure=*/true), GetMockTickClock()->NowTicks()); |
| ASSERT_THAT(secure_result, testing::NotNull()); |
| EXPECT_THAT(secure_result->second.GetEndpoints(), |
| testing::Optional(testing::ElementsAre( |
| ExpectEndpointResult(AddressesMatch(kRemoteAddrs))))); |
| } |
| |
| // The insecure cache is ignored, so the results are identical to |
| // OnlyBootstrap. |
| TEST_F(HostResolverManagerBootstrapTest, BootstrapAndInsecureCache) { |
| ConfigureMockDns(/*insecure_result=*/MockResult::kUnexpected, |
| /*secure_result=*/MockResult::kOk); |
| dns_client_->set_preset_addrs(kBootstrapAddrs); |
| PopulateCache(/*secure=*/false); |
| |
| ResolveHostResponseHelper bootstrap_response(resolver_->CreateRequest( |
| kEndpoint, kAnonymizationKey, NetLogWithSource(), bootstrap_params(), |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_TRUE(bootstrap_response.complete()); |
| EXPECT_THAT(bootstrap_response.result_error(), IsOk()); |
| EXPECT_THAT(bootstrap_response.request()->GetAddressResults(), |
| testing::Pointee(AddressesMatch(kBootstrapAddrs))); |
| EXPECT_THAT(bootstrap_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(AddressesMatch(kBootstrapAddrs))))); |
| |
| // Run the followup query. |
| RunUntilIdle(); |
| |
| // Confirm that the remote addresses are now in the secure cache. |
| const auto* secure_result = resolve_context_->host_cache()->Lookup( |
| MakeCacheKey(/*secure=*/true), GetMockTickClock()->NowTicks()); |
| ASSERT_THAT(secure_result, testing::NotNull()); |
| EXPECT_THAT(secure_result->second.GetEndpoints(), |
| testing::Optional(testing::ElementsAre( |
| ExpectEndpointResult(AddressesMatch(kRemoteAddrs))))); |
| } |
| |
| // The bootstrap addrs are ignored, so the results are identical to |
| // SecureCacheEntry. |
| TEST_F(HostResolverManagerBootstrapTest, BootstrapAndSecureCacheEntry) { |
| ConfigureMockDns(/*insecure_result=*/MockResult::kUnexpected, |
| /*secure_result=*/MockResult::kUnexpected); |
| dns_client_->set_preset_addrs(kBootstrapAddrs); |
| PopulateCache(/*secure=*/true); |
| |
| ResolveHostResponseHelper bootstrap_response(resolver_->CreateRequest( |
| kEndpoint, kAnonymizationKey, NetLogWithSource(), bootstrap_params(), |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_TRUE(bootstrap_response.complete()); |
| EXPECT_THAT(bootstrap_response.result_error(), IsOk()); |
| EXPECT_THAT(bootstrap_response.request()->GetAddressResults(), |
| testing::Pointee(AddressesMatch(kCacheAddrs))); |
| EXPECT_THAT(bootstrap_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(AddressesMatch(kCacheAddrs))))); |
| } |
| |
| TEST_F(HostResolverManagerBootstrapTest, BlankSlateFailure) { |
| ConfigureMockDns(/*insecure_result=*/MockResult::kFail, |
| /*secure_result=*/MockResult::kUnexpected); |
| |
| ResolveHostResponseHelper bootstrap_response(resolver_->CreateRequest( |
| kEndpoint, kAnonymizationKey, NetLogWithSource(), bootstrap_params(), |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_FALSE(bootstrap_response.complete()); |
| EXPECT_THAT(bootstrap_response.result_error(), |
| IsError(ERR_NAME_NOT_RESOLVED)); |
| EXPECT_FALSE(bootstrap_response.request() |
| ->GetResolveErrorInfo() |
| .is_secure_network_error); |
| } |
| |
| TEST_F(HostResolverManagerBootstrapTest, BootstrapFollowupFailure) { |
| ConfigureMockDns(/*insecure_result=*/MockResult::kUnexpected, |
| /*secure_result=*/MockResult::kFail); |
| dns_client_->set_preset_addrs(kBootstrapAddrs); |
| |
| ResolveHostResponseHelper bootstrap_response(resolver_->CreateRequest( |
| kEndpoint, kAnonymizationKey, NetLogWithSource(), bootstrap_params(), |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_TRUE(bootstrap_response.complete()); |
| EXPECT_THAT(bootstrap_response.result_error(), IsOk()); |
| EXPECT_THAT(bootstrap_response.request()->GetAddressResults(), |
| testing::Pointee(AddressesMatch(kBootstrapAddrs))); |
| EXPECT_THAT(bootstrap_response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(AddressesMatch(kBootstrapAddrs))))); |
| |
| // Run the followup query. |
| RunUntilIdle(); |
| |
| // Confirm that the secure cache remains empty. |
| const auto* secure_result = resolve_context_->host_cache()->Lookup( |
| MakeCacheKey(/*secure=*/true), GetMockTickClock()->NowTicks()); |
| EXPECT_THAT(secure_result, testing::IsNull()); |
| } |
| |
| TEST_F(HostResolverManagerBootstrapTest, ContextClose) { |
| ConfigureMockDns(/*insecure_result=*/MockResult::kUnexpected, |
| /*secure_result=*/MockResult::kOk); |
| dns_client_->set_preset_addrs(kBootstrapAddrs); |
| |
| // Trigger a followup request. |
| ResolveHostResponseHelper bootstrap_response(resolver_->CreateRequest( |
| kEndpoint, kAnonymizationKey, NetLogWithSource(), bootstrap_params(), |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| // Deregistering the resolve context should clean up the pending followup job. |
| EXPECT_EQ(1u, resolver_->num_jobs_for_testing()); |
| resolver_->DeregisterResolveContext(resolve_context_.get()); |
| EXPECT_EQ(0u, resolver_->num_jobs_for_testing()); |
| |
| resolver_ = nullptr; // Avoid duplicate Deregister in TearDown. |
| } |
| |
| // Equivalent to OnlyBootstrap + BootstrapAndSecureCacheEntry |
| TEST_F(HostResolverManagerBootstrapTest, BootstrapAfterFollowup) { |
| ConfigureMockDns(/*insecure_result=*/MockResult::kUnexpected, |
| /*secure_result=*/MockResult::kOk); |
| dns_client_->set_preset_addrs(kBootstrapAddrs); |
| |
| // Run bootstrap and its followup query. |
| ResolveHostResponseHelper bootstrap_response1(resolver_->CreateRequest( |
| kEndpoint, kAnonymizationKey, NetLogWithSource(), bootstrap_params(), |
| resolve_context_.get(), resolve_context_->host_cache())); |
| RunUntilIdle(); |
| |
| // The remote addresses are now in the secure cache. |
| // Rerun bootstrap, which reads the secure cache results. |
| ResolveHostResponseHelper bootstrap_response2(resolver_->CreateRequest( |
| kEndpoint, kAnonymizationKey, NetLogWithSource(), bootstrap_params(), |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_TRUE(bootstrap_response2.complete()); |
| EXPECT_THAT(bootstrap_response2.result_error(), IsOk()); |
| EXPECT_THAT(bootstrap_response2.request()->GetAddressResults(), |
| testing::Pointee(AddressesMatch(kRemoteAddrs))); |
| EXPECT_THAT(bootstrap_response2.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(AddressesMatch(kRemoteAddrs))))); |
| } |
| |
| TEST_F(HostResolverManagerBootstrapTest, BootstrapFollowupFailureTwice) { |
| ConfigureMockDns(/*insecure_result=*/MockResult::kUnexpected, |
| /*secure_result=*/MockResult::kFail); |
| dns_client_->set_preset_addrs(kBootstrapAddrs); |
| |
| // Run the bootstrap query and the followup, which will fail. |
| ResolveHostResponseHelper bootstrap_response1(resolver_->CreateRequest( |
| kEndpoint, kAnonymizationKey, NetLogWithSource(), bootstrap_params(), |
| resolve_context_.get(), resolve_context_->host_cache())); |
| RunUntilIdle(); |
| |
| // Reissue the bootstrap query. |
| ResolveHostResponseHelper bootstrap_response2(resolver_->CreateRequest( |
| kEndpoint, kAnonymizationKey, NetLogWithSource(), bootstrap_params(), |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_TRUE(bootstrap_response2.complete()); |
| EXPECT_THAT(bootstrap_response2.result_error(), IsOk()); |
| EXPECT_THAT(bootstrap_response2.request()->GetAddressResults(), |
| testing::Pointee(AddressesMatch(kBootstrapAddrs))); |
| EXPECT_THAT(bootstrap_response2.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(AddressesMatch(kBootstrapAddrs))))); |
| |
| // Run the followup query again. |
| RunUntilIdle(); |
| |
| // Confirm that the secure cache remains empty. |
| const auto* secure_result = resolve_context_->host_cache()->Lookup( |
| MakeCacheKey(/*secure=*/true), GetMockTickClock()->NowTicks()); |
| EXPECT_THAT(secure_result, testing::IsNull()); |
| } |
| |
| TEST_F(HostResolverManagerBootstrapTest, OnlyBootstrapTwice) { |
| ConfigureMockDns(/*insecure_result=*/MockResult::kUnexpected, |
| /*secure_result=*/MockResult::kOk); |
| dns_client_->set_preset_addrs(kBootstrapAddrs); |
| |
| ResolveHostResponseHelper bootstrap_response1(resolver_->CreateRequest( |
| kEndpoint, kAnonymizationKey, NetLogWithSource(), bootstrap_params(), |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_TRUE(bootstrap_response1.complete()); |
| EXPECT_THAT(bootstrap_response1.result_error(), IsOk()); |
| EXPECT_THAT(bootstrap_response1.request()->GetAddressResults(), |
| testing::Pointee(AddressesMatch(kBootstrapAddrs))); |
| EXPECT_THAT(bootstrap_response1.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(AddressesMatch(kBootstrapAddrs))))); |
| |
| ResolveHostResponseHelper bootstrap_response2(resolver_->CreateRequest( |
| kEndpoint, kAnonymizationKey, NetLogWithSource(), bootstrap_params(), |
| resolve_context_.get(), resolve_context_->host_cache())); |
| |
| EXPECT_TRUE(bootstrap_response2.complete()); |
| EXPECT_THAT(bootstrap_response2.result_error(), IsOk()); |
| EXPECT_THAT(bootstrap_response2.request()->GetAddressResults(), |
| testing::Pointee(AddressesMatch(kBootstrapAddrs))); |
| EXPECT_THAT(bootstrap_response2.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(AddressesMatch(kBootstrapAddrs))))); |
| |
| // Run the followup query. |
| RunUntilIdle(); |
| |
| // Confirm that the remote addresses are now in the secure cache. |
| const auto* secure_result = resolve_context_->host_cache()->Lookup( |
| MakeCacheKey(/*secure=*/true), GetMockTickClock()->NowTicks()); |
| ASSERT_THAT(secure_result, testing::NotNull()); |
| EXPECT_THAT(secure_result->second.GetEndpoints(), |
| testing::Optional(testing::ElementsAre( |
| ExpectEndpointResult(AddressesMatch(kRemoteAddrs))))); |
| } |
| |
| void HostResolverManagerTest::IPv4AddressLiteralInIPv6OnlyNetworkTest( |
| bool is_async) { |
| base::test::ScopedFeatureList feature_list; |
| feature_list.InitWithFeatures( |
| /*enabled_features=*/{features::kUseNAT64ForIPv4Literal}, |
| /*disabled_features=*/{}); |
| |
| HostResolver::ManagerOptions options = DefaultOptions(); |
| CreateResolverWithOptionsAndParams(std::move(options), DefaultParams(proc_), |
| true /* ipv6_reachable */, is_async, |
| false /* ipv4_reachable */); |
| proc_->AddRule("ipv4only.arpa", ADDRESS_FAMILY_IPV6, |
| "64:ff9b::c000:aa,64:ff9b::c000:ab,2001:db8:43::c000:aa," |
| "2001:db8:43::c000:ab"); |
| proc_->SignalMultiple(1u); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("192.168.1.42", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.top_level_result_error(), IsOk()); |
| EXPECT_THAT( |
| response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("64:ff9b::c0a8:12a", 80), |
| CreateExpected("2001:db8:43::c0a8:12a", 80))); |
| EXPECT_THAT( |
| response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("64:ff9b::c0a8:12a", 80), |
| CreateExpected("2001:db8:43::c0a8:12a", 80)))))); |
| EXPECT_FALSE(response.request()->GetStaleInfo()); |
| |
| ASSERT_TRUE(!proc_->GetCaptureList().empty()); |
| EXPECT_EQ("ipv4only.arpa", proc_->GetCaptureList()[0].hostname); |
| |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result = |
| GetCacheHit(HostCache::Key( |
| "ipv4only.arpa", DnsQueryType::AAAA, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey())); |
| EXPECT_TRUE(cache_result); |
| } |
| |
| TEST_F(HostResolverManagerTest, IPv4AddressLiteralInIPv6OnlyNetworkAsync) { |
| IPv4AddressLiteralInIPv6OnlyNetworkTest(true); |
| } |
| |
| TEST_F(HostResolverManagerTest, IPv4AddressLiteralInIPv6OnlyNetworkSync) { |
| IPv4AddressLiteralInIPv6OnlyNetworkTest(false); |
| } |
| |
| void HostResolverManagerTest::IPv4AddressLiteralInIPv6OnlyNetworkPort443Test( |
| bool is_async) { |
| base::test::ScopedFeatureList feature_list; |
| feature_list.InitWithFeatures( |
| /*enabled_features=*/{features::kUseNAT64ForIPv4Literal}, |
| /*disabled_features=*/{}); |
| |
| HostResolver::ManagerOptions options = DefaultOptions(); |
| CreateResolverWithOptionsAndParams(std::move(options), DefaultParams(proc_), |
| true /* ipv6_reachable */, is_async, |
| false /* ipv4_reachable */); |
| proc_->AddRule("ipv4only.arpa", ADDRESS_FAMILY_IPV6, |
| "64:ff9b::c000:aa,64:ff9b::c000:ab,2001:db8:43::c000:aa," |
| "2001:db8:43::c000:ab"); |
| proc_->SignalMultiple(1u); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("192.168.1.42", 443), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.top_level_result_error(), IsOk()); |
| EXPECT_THAT( |
| response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("64:ff9b::c0a8:12a", 443), |
| CreateExpected("2001:db8:43::c0a8:12a", 443))); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre( |
| ExpectEndpointResult(testing::ElementsAre( |
| CreateExpected("64:ff9b::c0a8:12a", 443), |
| CreateExpected("2001:db8:43::c0a8:12a", 443)))))); |
| EXPECT_FALSE(response.request()->GetStaleInfo()); |
| |
| ASSERT_TRUE(!proc_->GetCaptureList().empty()); |
| EXPECT_EQ("ipv4only.arpa", proc_->GetCaptureList()[0].hostname); |
| |
| const std::pair<const HostCache::Key, HostCache::Entry>* cache_result = |
| GetCacheHit(HostCache::Key( |
| "ipv4only.arpa", DnsQueryType::AAAA, 0 /* host_resolver_flags */, |
| HostResolverSource::ANY, NetworkAnonymizationKey())); |
| EXPECT_TRUE(cache_result); |
| } |
| |
| TEST_F(HostResolverManagerTest, |
| IPv4AddressLiteralInIPv6OnlyNetworkPort443Async) { |
| IPv4AddressLiteralInIPv6OnlyNetworkPort443Test(true); |
| } |
| |
| TEST_F(HostResolverManagerTest, |
| IPv4AddressLiteralInIPv6OnlyNetworkPort443Sync) { |
| IPv4AddressLiteralInIPv6OnlyNetworkPort443Test(false); |
| } |
| |
| void HostResolverManagerTest::IPv4AddressLiteralInIPv6OnlyNetworkNoDns64Test( |
| bool is_async) { |
| base::test::ScopedFeatureList feature_list; |
| feature_list.InitWithFeatures( |
| /*enabled_features=*/{features::kUseNAT64ForIPv4Literal}, |
| /*disabled_features=*/{}); |
| |
| HostResolver::ManagerOptions options = DefaultOptions(); |
| CreateResolverWithOptionsAndParams(std::move(options), DefaultParams(proc_), |
| true /* ipv6_reachable */, is_async, |
| false /* ipv4_reachable */); |
| proc_->AddRule("ipv4only.arpa", ADDRESS_FAMILY_IPV6, std::string()); |
| proc_->SignalMultiple(1u); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("192.168.1.42", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.top_level_result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80))); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80)))))); |
| EXPECT_FALSE(response.request()->GetStaleInfo()); |
| } |
| |
| TEST_F(HostResolverManagerTest, |
| IPv4AddressLiteralInIPv6OnlyNetworkNoDns64Async) { |
| IPv4AddressLiteralInIPv6OnlyNetworkNoDns64Test(true); |
| } |
| |
| TEST_F(HostResolverManagerTest, |
| IPv4AddressLiteralInIPv6OnlyNetworkNoDns64Sync) { |
| IPv4AddressLiteralInIPv6OnlyNetworkNoDns64Test(false); |
| } |
| |
| void HostResolverManagerTest::IPv4AddressLiteralInIPv6OnlyNetworkBadAddressTest( |
| bool is_async) { |
| base::test::ScopedFeatureList feature_list; |
| feature_list.InitWithFeatures( |
| /*enabled_features=*/{features::kUseNAT64ForIPv4Literal}, |
| /*disabled_features=*/{}); |
| |
| HostResolver::ManagerOptions options = DefaultOptions(); |
| CreateResolverWithOptionsAndParams(std::move(options), DefaultParams(proc_), |
| true /* ipv6_reachable */, is_async, |
| false /* ipv4_reachable */); |
| proc_->AddRule("ipv4only.arpa", ADDRESS_FAMILY_IPV6, "2001:db8::1"); |
| proc_->SignalMultiple(1u); |
| |
| ResolveHostResponseHelper response(resolver_->CreateRequest( |
| HostPortPair("192.168.1.42", 80), NetworkAnonymizationKey(), |
| NetLogWithSource(), absl::nullopt, resolve_context_.get(), |
| resolve_context_->host_cache())); |
| |
| EXPECT_THAT(response.result_error(), IsOk()); |
| EXPECT_THAT(response.top_level_result_error(), IsOk()); |
| EXPECT_THAT(response.request()->GetAddressResults()->endpoints(), |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80))); |
| EXPECT_THAT(response.request()->GetEndpointResults(), |
| testing::Pointee(testing::ElementsAre(ExpectEndpointResult( |
| testing::ElementsAre(CreateExpected("192.168.1.42", 80)))))); |
| EXPECT_FALSE(response.request()->GetStaleInfo()); |
| } |
| // Test when DNS returns bad IPv6 address of ipv4only.arpa., and the |
| // IPv4 address of ipv4only.arpa is not contained in the IPv6 address. |
| TEST_F(HostResolverManagerTest, |
| IPv4AddressLiteralInIPv6OnlyNetworkBadAddressAsync) { |
| IPv4AddressLiteralInIPv6OnlyNetworkBadAddressTest(true); |
| } |
| |
| TEST_F(HostResolverManagerTest, |
| IPv4AddressLiteralInIPv6OnlyNetworkBadAddressSync) { |
| IPv4AddressLiteralInIPv6OnlyNetworkBadAddressTest(false); |
| } |
| |
| } // namespace net |