blob: f077893d071df9e71a975142448a93037f081e7f [file] [log] [blame]
// Copyright 2012 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef NET_DNS_HOST_CACHE_H_
#define NET_DNS_HOST_CACHE_H_
#include <stddef.h>
#include <functional>
#include <map>
#include <memory>
#include <ostream>
#include <set>
#include <string>
#include <tuple>
#include <utility>
#include <vector>
#include "base/check.h"
#include "base/gtest_prod_util.h"
#include "base/memory/raw_ptr.h"
#include "base/numerics/clamped_math.h"
#include "base/threading/thread_checker.h"
#include "base/time/time.h"
#include "base/types/optional_util.h"
#include "base/values.h"
#include "net/base/address_family.h"
#include "net/base/connection_endpoint_metadata.h"
#include "net/base/expiring_cache.h"
#include "net/base/host_port_pair.h"
#include "net/base/ip_endpoint.h"
#include "net/base/net_errors.h"
#include "net/base/net_export.h"
#include "net/base/network_anonymization_key.h"
#include "net/dns/public/dns_query_type.h"
#include "net/dns/public/host_resolver_results.h"
#include "net/dns/public/host_resolver_source.h"
#include "net/log/net_log_capture_mode.h"
#include "third_party/abseil-cpp/absl/types/optional.h"
#include "third_party/abseil-cpp/absl/types/variant.h"
#include "url/scheme_host_port.h"
namespace base {
class TickClock;
} // namespace base
namespace net {
class HostResolverInternalResult;
// Cache used by HostResolver to map hostnames to their resolved result.
class NET_EXPORT HostCache {
public:
struct NET_EXPORT Key {
// Hostnames in `host` must not be IP literals. IP literals should be
// resolved directly to the IP address and not be stored/queried in
// HostCache.
Key(absl::variant<url::SchemeHostPort, std::string> host,
DnsQueryType dns_query_type,
HostResolverFlags host_resolver_flags,
HostResolverSource host_resolver_source,
const NetworkAnonymizationKey& network_anonymization_key);
Key();
Key(const Key& key);
Key(Key&& key);
~Key();
// This is a helper used in comparing keys. The order of comparisons of
// `Key` fields is arbitrary, but the tuple is constructed with
// `dns_query_type` and `host_resolver_flags` before `host` under the
// assumption that integer comparisons are faster than string comparisons.
static auto GetTuple(const Key* key) {
return std::tie(key->dns_query_type, key->host_resolver_flags, key->host,
key->host_resolver_source, key->network_anonymization_key,
key->secure);
}
bool operator==(const Key& other) const {
return GetTuple(this) == GetTuple(&other);
}
bool operator!=(const Key& other) const {
return GetTuple(this) != GetTuple(&other);
}
bool operator<(const Key& other) const {
return GetTuple(this) < GetTuple(&other);
}
absl::variant<url::SchemeHostPort, std::string> host;
DnsQueryType dns_query_type = DnsQueryType::UNSPECIFIED;
HostResolverFlags host_resolver_flags = 0;
HostResolverSource host_resolver_source = HostResolverSource::ANY;
NetworkAnonymizationKey network_anonymization_key;
bool secure = false;
};
struct NET_EXPORT EntryStaleness {
// Time since the entry's TTL has expired. Negative if not expired.
base::TimeDelta expired_by;
// Number of network changes since this result was cached.
int network_changes;
// Number of hits to the cache entry while stale (expired or past-network).
int stale_hits;
bool is_stale() const {
return network_changes > 0 || expired_by >= base::TimeDelta();
}
};
// Stores the latest address list that was looked up for a hostname.
class NET_EXPORT Entry {
public:
enum Source : int {
// Address list was obtained from an unknown source.
SOURCE_UNKNOWN,
// Address list was obtained via a DNS lookup.
SOURCE_DNS,
// Address list was obtained by searching a HOSTS file.
SOURCE_HOSTS,
// Address list was a preset from the DnsConfig.
SOURCE_CONFIG,
};
// |ttl=absl::nullopt| for unknown TTL.
template <typename T>
Entry(int error,
T&& results,
Source source,
absl::optional<base::TimeDelta> ttl)
: error_(error),
source_(source),
ttl_(ttl ? ttl.value() : kUnknownTtl) {
DCHECK(!ttl || ttl.value() >= base::TimeDelta());
SetResult(std::forward<T>(results));
}
// Use when |ttl| is unknown.
template <typename T>
Entry(int error, T&& results, Source source)
: Entry(error, std::forward<T>(results), source, absl::nullopt) {}
// Use for address entries.
Entry(int error,
std::vector<IPEndPoint> ip_endpoints,
std::set<std::string> aliases,
Source source,
absl::optional<base::TimeDelta> ttl = absl::nullopt);
// For errors with no |results|.
Entry(int error,
Source source,
absl::optional<base::TimeDelta> ttl = absl::nullopt);
// Adaptor to construct from HostResolverInternalResults. Only supports
// results extracted from a single DnsTransaction.
Entry(std::vector<std::unique_ptr<HostResolverInternalResult>> results,
base::Time now,
base::TimeTicks now_ticks);
Entry(const Entry& entry);
Entry(Entry&& entry);
~Entry();
Entry& operator=(const Entry& entry);
Entry& operator=(Entry&& entry);
bool operator==(const Entry& other) const {
return ContentsEqual(other) &&
std::tie(source_, pinning_, ttl_, expires_, network_changes_,
total_hits_, stale_hits_) ==
std::tie(other.source_, other.pinning_, other.ttl_,
other.expires_, other.network_changes_,
other.total_hits_, other.stale_hits_);
}
bool ContentsEqual(const Entry& other) const {
return std::tie(error_, ip_endpoints_, endpoint_metadatas_, aliases_,
text_records_, hostnames_, https_record_compatibility_,
canonical_names_) ==
std::tie(
other.error_, other.ip_endpoints_, other.endpoint_metadatas_,
other.aliases_, other.text_records_, other.hostnames_,
other.https_record_compatibility_, other.canonical_names_);
}
int error() const { return error_; }
bool did_complete() const {
return error_ != ERR_NETWORK_CHANGED &&
error_ != ERR_HOST_RESOLVER_QUEUE_TOO_LARGE;
}
void set_error(int error) { error_ = error; }
absl::optional<std::vector<HostResolverEndpointResult>> GetEndpoints()
const;
const std::vector<IPEndPoint>* ip_endpoints() const {
return base::OptionalToPtr(ip_endpoints_);
}
void set_ip_endpoints(
absl::optional<std::vector<IPEndPoint>> ip_endpoints) {
ip_endpoints_ = std::move(ip_endpoints);
}
absl::optional<std::vector<ConnectionEndpointMetadata>> GetMetadatas()
const;
void ClearMetadatas() { endpoint_metadatas_.reset(); }
const std::set<std::string>* aliases() const {
return base::OptionalToPtr(aliases_);
}
void set_aliases(std::set<std::string> aliases) {
aliases_ = std::move(aliases);
}
const absl::optional<std::vector<std::string>>& text_records() const {
return text_records_;
}
void set_text_records(
absl::optional<std::vector<std::string>> text_records) {
text_records_ = std::move(text_records);
}
const absl::optional<std::vector<HostPortPair>>& hostnames() const {
return hostnames_;
}
void set_hostnames(absl::optional<std::vector<HostPortPair>> hostnames) {
hostnames_ = std::move(hostnames);
}
const std::vector<bool>* https_record_compatibility() const {
return base::OptionalToPtr(https_record_compatibility_);
}
void set_https_record_compatibility(
absl::optional<std::vector<bool>> https_record_compatibility) {
https_record_compatibility_ = std::move(https_record_compatibility);
}
absl::optional<bool> pinning() const { return pinning_; }
void set_pinning(absl::optional<bool> pinning) { pinning_ = pinning; }
const absl::optional<std::set<std::string>>& canonical_names() const {
return canonical_names_;
}
void set_canonical_names(
absl::optional<std::set<std::string>> canonical_names) {
canonical_names_ = std::move(canonical_names);
}
Source source() const { return source_; }
bool has_ttl() const { return ttl_ >= base::TimeDelta(); }
base::TimeDelta ttl() const { return ttl_; }
absl::optional<base::TimeDelta> GetOptionalTtl() const;
void set_ttl(base::TimeDelta ttl) { ttl_ = ttl; }
base::TimeTicks expires() const { return expires_; }
// Public for the net-internals UI.
int network_changes() const { return network_changes_; }
// Merge |front| and |back|, representing results from multiple transactions
// for the same overall host resolution query.
//
// Merges lists, placing elements from |front| before elements from |back|.
// Further, dedupes legacy address lists and moves IPv6 addresses before
// IPv4 addresses (maintaining stable order otherwise).
//
// Fields that cannot be merged take precedence from |front|.
static Entry MergeEntries(Entry front, Entry back);
// Creates a value representation of the entry for use with NetLog.
base::Value NetLogParams() const;
// Creates a copy of |this| with the port of all address and hostname values
// set to |port| if the current port is 0. Preserves any non-zero ports.
HostCache::Entry CopyWithDefaultPort(uint16_t port) const;
private:
using HttpsRecordPriority = uint16_t;
friend class HostCache;
static constexpr base::TimeDelta kUnknownTtl = base::Seconds(-1);
Entry(const Entry& entry,
base::TimeTicks now,
base::TimeDelta ttl,
int network_changes);
Entry(int error,
absl::optional<std::vector<IPEndPoint>> ip_endpoints,
absl::optional<
std::multimap<HttpsRecordPriority, ConnectionEndpointMetadata>>
endpoint_metadatas,
absl::optional<std::set<std::string>> aliases,
absl::optional<std::vector<std::string>>&& text_results,
absl::optional<std::vector<HostPortPair>>&& hostnames,
absl::optional<std::vector<bool>>&& https_record_compatibility,
Source source,
base::TimeTicks expires,
int network_changes);
void PrepareForCacheInsertion();
void SetResult(
std::multimap<HttpsRecordPriority, ConnectionEndpointMetadata>
endpoint_metadatas) {
endpoint_metadatas_ = std::move(endpoint_metadatas);
}
void SetResult(std::vector<std::string> text_records) {
text_records_ = std::move(text_records);
}
void SetResult(std::vector<HostPortPair> hostnames) {
hostnames_ = std::move(hostnames);
}
void SetResult(std::vector<bool> https_record_compatibility) {
https_record_compatibility_ = std::move(https_record_compatibility);
}
int total_hits() const { return total_hits_; }
int stale_hits() const { return stale_hits_; }
bool IsStale(base::TimeTicks now, int network_changes) const;
void CountHit(bool hit_is_stale);
void GetStaleness(base::TimeTicks now,
int network_changes,
EntryStaleness* out) const;
base::Value::Dict GetAsValue(bool include_staleness) const;
// The resolve results for this entry.
int error_ = ERR_FAILED;
absl::optional<std::vector<IPEndPoint>> ip_endpoints_;
absl::optional<
std::multimap<HttpsRecordPriority, ConnectionEndpointMetadata>>
endpoint_metadatas_;
absl::optional<std::set<std::string>> aliases_;
absl::optional<std::vector<std::string>> text_records_;
absl::optional<std::vector<HostPortPair>> hostnames_;
// Bool of whether each HTTPS record received is compatible
// (draft-ietf-dnsop-svcb-https-08#section-8), considering alias records to
// always be compatible.
//
// This field may be reused for experimental query types to record
// successfully received records of that experimental type.
//
// For either usage, cleared before inserting in cache.
absl::optional<std::vector<bool>> https_record_compatibility_;
// Where results were obtained (e.g. DNS lookup, hosts file, etc).
Source source_ = SOURCE_UNKNOWN;
// If true, this entry cannot be evicted from the cache until after the next
// network change. When an Entry is replaced by one whose pinning flag
// is not set, HostCache will copy this flag to the replacement.
// If this flag is null, HostCache will set it to false for simplicity.
// Note: This flag is not yet used, and should be removed if the proposals
// for followup queries after insecure/expired bootstrap are abandoned (see
// TODO(crbug.com/1200908) in HostResolverManager).
absl::optional<bool> pinning_;
// The final name at the end of the alias chain that was the record name for
// the A/AAAA records.
absl::optional<std::set<std::string>> canonical_names_;
// TTL obtained from the nameserver. Negative if unknown.
base::TimeDelta ttl_ = kUnknownTtl;
base::TimeTicks expires_;
// Copied from the cache's network_changes_ when the entry is set; can
// later be compared to it to see if the entry was received on the current
// network.
int network_changes_ = -1;
// Use clamped math to cap hit counts at INT_MAX.
base::ClampedNumeric<int> total_hits_ = 0;
base::ClampedNumeric<int> stale_hits_ = 0;
};
// Interface for interacting with persistent storage, to be provided by the
// embedder. Does not include support for writes that must happen immediately.
class PersistenceDelegate {
public:
// Calling ScheduleWrite() signals that data has changed and should be
// written to persistent storage. The write might be delayed.
virtual void ScheduleWrite() = 0;
};
using EntryMap = std::map<Key, Entry>;
// The two ways to serialize the cache to a value.
enum class SerializationType {
// Entries with transient NetworkAnonymizationKeys are not serialized, and
// RestoreFromListValue() can load the returned value.
kRestorable,
// Entries with transient NetworkAnonymizationKeys are serialized, and
// RestoreFromListValue() cannot load the returned value, since the debug
// serialization of NetworkAnonymizationKeys is used instead of the
// deserializable representation.
kDebug,
};
// A HostCache::EntryStaleness representing a non-stale (fresh) cache entry.
static const HostCache::EntryStaleness kNotStale;
// Constructs a HostCache that stores up to |max_entries|.
explicit HostCache(size_t max_entries);
HostCache(const HostCache&) = delete;
HostCache& operator=(const HostCache&) = delete;
~HostCache();
// Returns a pointer to the matching (key, entry) pair, which is valid at time
// |now|. If |ignore_secure| is true, ignores the secure field in |key| when
// looking for a match. If there is no matching entry, returns NULL.
const std::pair<const Key, Entry>* Lookup(const Key& key,
base::TimeTicks now,
bool ignore_secure = false);
// Returns a pointer to the matching (key, entry) pair, whether it is valid or
// stale at time |now|. Fills in |stale_out| with information about how stale
// it is. If |ignore_secure| is true, ignores the secure field in |key| when
// looking for a match. If there is no matching entry, returns NULL.
const std::pair<const Key, Entry>* LookupStale(const Key& key,
base::TimeTicks now,
EntryStaleness* stale_out,
bool ignore_secure = false);
// Overwrites or creates an entry for |key|.
// |entry| is the value to set, |now| is the current time
// |ttl| is the "time to live".
void Set(const Key& key,
const Entry& entry,
base::TimeTicks now,
base::TimeDelta ttl);
// Checks whether an entry exists for `hostname`.
// If so, returns the matching key and writes the source (e.g. DNS, HOSTS
// file, etc.) to `source_out` and the staleness to `stale_out` (if they are
// not null). If no entry exists, returns nullptr.
//
// For testing use only and not very performant. Production code should only
// do lookups by precise Key.
const HostCache::Key* GetMatchingKeyForTesting(
base::StringPiece hostname,
HostCache::Entry::Source* source_out = nullptr,
HostCache::EntryStaleness* stale_out = nullptr) const;
// Marks all entries as stale on account of a network change.
void Invalidate();
void set_persistence_delegate(PersistenceDelegate* delegate);
void set_tick_clock_for_testing(const base::TickClock* tick_clock) {
tick_clock_ = tick_clock;
}
// Empties the cache.
void clear();
// Clears hosts matching |host_filter| from the cache.
void ClearForHosts(
const base::RepeatingCallback<bool(const std::string&)>& host_filter);
// Fills the provided base::Value with the contents of the cache for
// serialization. `entry_list` must be non-null list, and will be cleared
// before adding the cache contents.
void GetList(base::Value::List& entry_list,
bool include_staleness,
SerializationType serialization_type) const;
// Takes a base::Value list representing cache entries and stores them in the
// cache, skipping any that already have entries. Returns true on success,
// false on failure.
bool RestoreFromListValue(const base::Value::List& old_cache);
// Returns the number of entries that were restored in the last call to
// RestoreFromListValue().
size_t last_restore_size() const { return restore_size_; }
// Returns the number of entries in the cache.
size_t size() const;
// Following are used by net_internals UI.
size_t max_entries() const;
int network_changes() const { return network_changes_; }
const EntryMap& entries() const { return entries_; }
// Creates a default cache.
static std::unique_ptr<HostCache> CreateDefaultCache();
private:
FRIEND_TEST_ALL_PREFIXES(HostCacheTest, NoCache);
enum SetOutcome : int;
enum LookupOutcome : int;
enum EraseReason : int;
// Returns the result that is least stale, based on the number of network
// changes since the result was cached. If the results are equally stale,
// prefers a securely retrieved result. Returns nullptr if both results are
// nullptr.
static std::pair<const HostCache::Key, HostCache::Entry>*
GetLessStaleMoreSecureResult(
base::TimeTicks now,
std::pair<const HostCache::Key, HostCache::Entry>* result1,
std::pair<const HostCache::Key, HostCache::Entry>* result2);
// Returns matching key and entry from cache and nullptr if no match. Ignores
// the secure field in |initial_key| if |ignore_secure| is true.
std::pair<const Key, Entry>* LookupInternalIgnoringFields(
const Key& initial_key,
base::TimeTicks now,
bool ignore_secure);
// Returns matching key and entry from cache and nullptr if no match. An exact
// match for |key| is required.
std::pair<const Key, Entry>* LookupInternal(const Key& key);
// Returns true if this HostCache can contain no entries.
bool caching_is_disabled() const { return max_entries_ == 0; }
// Returns true if an entry was removed.
bool EvictOneEntry(base::TimeTicks now);
// Helper to check if an Entry is currently pinned in the cache.
bool HasActivePin(const Entry& entry);
// Helper to insert an Entry into the cache.
void AddEntry(const Key& key, Entry&& entry);
// Map from hostname (presumably in lowercase canonicalized format) to
// a resolved result entry.
EntryMap entries_;
size_t max_entries_;
int network_changes_ = 0;
// Number of cache entries that were restored in the last call to
// RestoreFromListValue(). Used in histograms.
size_t restore_size_ = 0;
raw_ptr<PersistenceDelegate> delegate_ = nullptr;
// Shared tick clock, overridden for testing.
raw_ptr<const base::TickClock> tick_clock_;
THREAD_CHECKER(thread_checker_);
};
} // namespace net
// Debug logging support
std::ostream& operator<<(std::ostream& out,
const net::HostCache::EntryStaleness& s);
#endif // NET_DNS_HOST_CACHE_H_