blob: 1f4f38e1889444bc0ba5720543f78bd976297827 [file] [log] [blame]
// Copyright 2011 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/dns/dns_util.h"
#include <errno.h>
#include <limits.h>
#include <stdint.h>
#include <cstring>
#include <string>
#include <unordered_map>
#include <vector>
#include "base/big_endian.h"
#include "base/check_op.h"
#include "base/containers/contains.h"
#include "base/feature_list.h"
#include "base/metrics/field_trial.h"
#include "base/metrics/histogram_macros.h"
#include "base/ranges/algorithm.h"
#include "base/strings/string_number_conversions.h"
#include "base/strings/string_piece.h"
#include "base/strings/string_split.h"
#include "build/build_config.h"
#include "net/dns/public/dns_protocol.h"
#include "net/dns/public/doh_provider_entry.h"
#include "net/dns/public/util.h"
#include "net/third_party/uri_template/uri_template.h"
#if BUILDFLAG(IS_POSIX)
#include <net/if.h>
#include <netinet/in.h>
#if !BUILDFLAG(IS_ANDROID)
#include <ifaddrs.h>
#endif // !BUILDFLAG(IS_ANDROID)
#endif // BUILDFLAG(IS_POSIX)
#if BUILDFLAG(IS_ANDROID)
#include "net/android/network_library.h"
#endif
namespace net {
namespace {
DohProviderEntry::List GetDohProviderEntriesFromNameservers(
const std::vector<IPEndPoint>& dns_servers) {
const DohProviderEntry::List& providers = DohProviderEntry::GetList();
DohProviderEntry::List entries;
for (const auto& server : dns_servers) {
for (const auto* entry : providers) {
// DoH servers should only be added once.
// Note: Check whether the provider is enabled *after* we've determined
// that the IP addresses match so that if we are doing experimentation via
// Finch, the experiment only includes possible users of the
// corresponding DoH provider (since the client will be included in the
// experiment if the provider feature flag is checked).
if (base::Contains(entry->ip_addresses, server.address()) &&
base::FeatureList::IsEnabled(entry->feature) &&
!base::Contains(entries, entry)) {
entries.push_back(entry);
}
}
}
return entries;
}
} // namespace
std::string GetURLFromTemplateWithoutParameters(const string& server_template) {
std::string url_string;
std::unordered_map<string, string> parameters;
uri_template::Expand(server_template, parameters, &url_string);
return url_string;
}
namespace {
bool GetTimeDeltaForConnectionTypeFromFieldTrial(
const char* field_trial,
NetworkChangeNotifier::ConnectionType type,
base::TimeDelta* out) {
std::string group = base::FieldTrialList::FindFullName(field_trial);
if (group.empty())
return false;
std::vector<base::StringPiece> group_parts = base::SplitStringPiece(
group, ":", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL);
if (type < 0)
return false;
size_t type_size = static_cast<size_t>(type);
if (type_size >= group_parts.size())
return false;
int64_t ms;
if (!base::StringToInt64(group_parts[type_size], &ms))
return false;
*out = base::Milliseconds(ms);
return true;
}
} // namespace
base::TimeDelta GetTimeDeltaForConnectionTypeFromFieldTrialOrDefault(
const char* field_trial,
base::TimeDelta default_delta,
NetworkChangeNotifier::ConnectionType type) {
base::TimeDelta out;
if (!GetTimeDeltaForConnectionTypeFromFieldTrial(field_trial, type, &out))
out = default_delta;
return out;
}
std::string CreateNamePointer(uint16_t offset) {
DCHECK_EQ(offset & ~dns_protocol::kOffsetMask, 0);
char buf[2];
base::WriteBigEndian(buf, offset);
buf[0] |= dns_protocol::kLabelPointer;
return std::string(buf, sizeof(buf));
}
uint16_t DnsQueryTypeToQtype(DnsQueryType dns_query_type) {
switch (dns_query_type) {
case DnsQueryType::UNSPECIFIED:
NOTREACHED();
return 0;
case DnsQueryType::A:
return dns_protocol::kTypeA;
case DnsQueryType::AAAA:
return dns_protocol::kTypeAAAA;
case DnsQueryType::TXT:
return dns_protocol::kTypeTXT;
case DnsQueryType::PTR:
return dns_protocol::kTypePTR;
case DnsQueryType::SRV:
return dns_protocol::kTypeSRV;
case DnsQueryType::HTTPS:
return dns_protocol::kTypeHttps;
}
}
DnsQueryType AddressFamilyToDnsQueryType(AddressFamily address_family) {
switch (address_family) {
case ADDRESS_FAMILY_UNSPECIFIED:
return DnsQueryType::UNSPECIFIED;
case ADDRESS_FAMILY_IPV4:
return DnsQueryType::A;
case ADDRESS_FAMILY_IPV6:
return DnsQueryType::AAAA;
default:
NOTREACHED();
return DnsQueryType::UNSPECIFIED;
}
}
std::vector<DnsOverHttpsServerConfig> GetDohUpgradeServersFromDotHostname(
const std::string& dot_server) {
std::vector<DnsOverHttpsServerConfig> doh_servers;
if (dot_server.empty())
return doh_servers;
for (const auto* entry : DohProviderEntry::GetList()) {
// Note: Check whether the provider is enabled *after* we've determined that
// the hostnames match so that if we are doing experimentation via Finch,
// the experiment only includes possible users of the corresponding DoH
// provider (since the client will be included in the experiment if the
// provider feature flag is checked).
if (base::Contains(entry->dns_over_tls_hostnames, dot_server) &&
base::FeatureList::IsEnabled(entry->feature)) {
doh_servers.push_back(entry->doh_server_config);
}
}
return doh_servers;
}
std::vector<DnsOverHttpsServerConfig> GetDohUpgradeServersFromNameservers(
const std::vector<IPEndPoint>& dns_servers) {
const auto entries = GetDohProviderEntriesFromNameservers(dns_servers);
std::vector<DnsOverHttpsServerConfig> doh_servers;
doh_servers.reserve(entries.size());
base::ranges::transform(entries, std::back_inserter(doh_servers),
&DohProviderEntry::doh_server_config);
return doh_servers;
}
std::string GetDohProviderIdForHistogramFromServerConfig(
const DnsOverHttpsServerConfig& doh_server) {
const auto& entries = DohProviderEntry::GetList();
const auto it = base::ranges::find(entries, doh_server,
&DohProviderEntry::doh_server_config);
return it != entries.end() ? (*it)->provider : "Other";
}
std::string GetDohProviderIdForHistogramFromNameserver(
const IPEndPoint& nameserver) {
const auto entries = GetDohProviderEntriesFromNameservers({nameserver});
return entries.empty() ? "Other" : entries[0]->provider;
}
std::string SecureDnsModeToString(const SecureDnsMode secure_dns_mode) {
switch (secure_dns_mode) {
case SecureDnsMode::kOff:
return "Off";
case SecureDnsMode::kAutomatic:
return "Automatic";
case SecureDnsMode::kSecure:
return "Secure";
}
}
} // namespace net