blob: 66873abc36bca278a33e0194f0dd85ae52f91740 [file] [log] [blame]
James Robinson646469d2014-10-03 15:33:28 -07001// Copyright 2013 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/dns/mdns_client_impl.h"
6
7#include <queue>
8
9#include "base/bind.h"
10#include "base/message_loop/message_loop_proxy.h"
11#include "base/stl_util.h"
12#include "base/time/default_clock.h"
13#include "base/time/time.h"
14#include "net/base/dns_util.h"
15#include "net/base/net_errors.h"
16#include "net/base/net_log.h"
17#include "net/base/rand_callback.h"
18#include "net/dns/dns_protocol.h"
19#include "net/dns/record_rdata.h"
20#include "net/udp/datagram_socket.h"
21
22// TODO(gene): Remove this temporary method of disabling NSEC support once it
23// becomes clear whether this feature should be
24// supported. http://crbug.com/255232
25#define ENABLE_NSEC
26
27namespace net {
28
29namespace {
30
31const unsigned MDnsTransactionTimeoutSeconds = 3;
32// The fractions of the record's original TTL after which an active listener
33// (one that had |SetActiveRefresh(true)| called) will send a query to refresh
34// its cache. This happens both at 85% of the original TTL and again at 95% of
35// the original TTL.
36const double kListenerRefreshRatio1 = 0.85;
37const double kListenerRefreshRatio2 = 0.95;
38
39} // namespace
40
41void MDnsSocketFactoryImpl::CreateSockets(
42 ScopedVector<DatagramServerSocket>* sockets) {
43 InterfaceIndexFamilyList interfaces(GetMDnsInterfacesToBind());
44 for (size_t i = 0; i < interfaces.size(); ++i) {
45 DCHECK(interfaces[i].second == net::ADDRESS_FAMILY_IPV4 ||
46 interfaces[i].second == net::ADDRESS_FAMILY_IPV6);
47 scoped_ptr<DatagramServerSocket> socket(
48 CreateAndBindMDnsSocket(interfaces[i].second, interfaces[i].first));
49 if (socket)
50 sockets->push_back(socket.release());
51 }
52}
53
54MDnsConnection::SocketHandler::SocketHandler(
55 scoped_ptr<DatagramServerSocket> socket,
56 MDnsConnection* connection)
57 : socket_(socket.Pass()),
58 connection_(connection),
59 response_(dns_protocol::kMaxMulticastSize),
60 send_in_progress_(false) {
61}
62
63MDnsConnection::SocketHandler::~SocketHandler() {
64}
65
66int MDnsConnection::SocketHandler::Start() {
67 IPEndPoint end_point;
68 int rv = socket_->GetLocalAddress(&end_point);
69 if (rv != OK)
70 return rv;
71 DCHECK(end_point.GetFamily() == ADDRESS_FAMILY_IPV4 ||
72 end_point.GetFamily() == ADDRESS_FAMILY_IPV6);
73 multicast_addr_ = GetMDnsIPEndPoint(end_point.GetFamily());
74 return DoLoop(0);
75}
76
77int MDnsConnection::SocketHandler::DoLoop(int rv) {
78 do {
79 if (rv > 0)
80 connection_->OnDatagramReceived(&response_, recv_addr_, rv);
81
82 rv = socket_->RecvFrom(
83 response_.io_buffer(),
84 response_.io_buffer()->size(),
85 &recv_addr_,
86 base::Bind(&MDnsConnection::SocketHandler::OnDatagramReceived,
87 base::Unretained(this)));
88 } while (rv > 0);
89
90 if (rv != ERR_IO_PENDING)
91 return rv;
92
93 return OK;
94}
95
96void MDnsConnection::SocketHandler::OnDatagramReceived(int rv) {
97 if (rv >= OK)
98 rv = DoLoop(rv);
99
100 if (rv != OK)
101 connection_->PostOnError(this, rv);
102}
103
104void MDnsConnection::SocketHandler::Send(const scoped_refptr<IOBuffer>& buffer,
105 unsigned size) {
106 if (send_in_progress_) {
107 send_queue_.push(std::make_pair(buffer, size));
108 return;
109 }
110 int rv = socket_->SendTo(buffer.get(),
111 size,
112 multicast_addr_,
113 base::Bind(&MDnsConnection::SocketHandler::SendDone,
114 base::Unretained(this)));
115 if (rv == ERR_IO_PENDING) {
116 send_in_progress_ = true;
117 } else if (rv < OK) {
118 connection_->PostOnError(this, rv);
119 }
120}
121
122void MDnsConnection::SocketHandler::SendDone(int rv) {
123 DCHECK(send_in_progress_);
124 send_in_progress_ = false;
125 if (rv != OK)
126 connection_->PostOnError(this, rv);
127 while (!send_in_progress_ && !send_queue_.empty()) {
128 std::pair<scoped_refptr<IOBuffer>, unsigned> buffer = send_queue_.front();
129 send_queue_.pop();
130 Send(buffer.first, buffer.second);
131 }
132}
133
134MDnsConnection::MDnsConnection(MDnsConnection::Delegate* delegate)
135 : delegate_(delegate), weak_ptr_factory_(this) {
136}
137
138MDnsConnection::~MDnsConnection() {
139}
140
141bool MDnsConnection::Init(MDnsSocketFactory* socket_factory) {
142 ScopedVector<DatagramServerSocket> sockets;
143 socket_factory->CreateSockets(&sockets);
144
145 for (size_t i = 0; i < sockets.size(); ++i) {
146 socket_handlers_.push_back(
147 new MDnsConnection::SocketHandler(make_scoped_ptr(sockets[i]), this));
148 }
149 sockets.weak_clear();
150
151 // All unbound sockets need to be bound before processing untrusted input.
152 // This is done for security reasons, so that an attacker can't get an unbound
153 // socket.
154 for (size_t i = 0; i < socket_handlers_.size();) {
155 int rv = socket_handlers_[i]->Start();
156 if (rv != OK) {
157 socket_handlers_.erase(socket_handlers_.begin() + i);
158 VLOG(1) << "Start failed, socket=" << i << ", error=" << rv;
159 } else {
160 ++i;
161 }
162 }
163 VLOG(1) << "Sockets ready:" << socket_handlers_.size();
164 return !socket_handlers_.empty();
165}
166
167void MDnsConnection::Send(const scoped_refptr<IOBuffer>& buffer,
168 unsigned size) {
169 for (size_t i = 0; i < socket_handlers_.size(); ++i)
170 socket_handlers_[i]->Send(buffer, size);
171}
172
173void MDnsConnection::PostOnError(SocketHandler* loop, int rv) {
174 VLOG(1) << "Socket error. id="
175 << std::find(socket_handlers_.begin(), socket_handlers_.end(), loop) -
176 socket_handlers_.begin() << ", error=" << rv;
177 // Post to allow deletion of this object by delegate.
178 base::MessageLoop::current()->PostTask(
179 FROM_HERE,
180 base::Bind(&MDnsConnection::OnError, weak_ptr_factory_.GetWeakPtr(), rv));
181}
182
183void MDnsConnection::OnError(int rv) {
184 // TODO(noamsml): Specific handling of intermittent errors that can be handled
185 // in the connection.
186 delegate_->OnConnectionError(rv);
187}
188
189void MDnsConnection::OnDatagramReceived(
190 DnsResponse* response,
191 const IPEndPoint& recv_addr,
192 int bytes_read) {
193 // TODO(noamsml): More sophisticated error handling.
194 DCHECK_GT(bytes_read, 0);
195 delegate_->HandlePacket(response, bytes_read);
196}
197
James Robinsond753aca2015-01-12 13:07:20 -0800198MDnsClientImpl::Core::Core() : connection_(new MDnsConnection(this)) {
James Robinson646469d2014-10-03 15:33:28 -0700199}
200
201MDnsClientImpl::Core::~Core() {
202 STLDeleteValues(&listeners_);
203}
204
205bool MDnsClientImpl::Core::Init(MDnsSocketFactory* socket_factory) {
206 return connection_->Init(socket_factory);
207}
208
209bool MDnsClientImpl::Core::SendQuery(uint16 rrtype, std::string name) {
210 std::string name_dns;
211 if (!DNSDomainFromDot(name, &name_dns))
212 return false;
213
214 DnsQuery query(0, name_dns, rrtype);
215 query.set_flags(0); // Remove the RD flag from the query. It is unneeded.
216
217 connection_->Send(query.io_buffer(), query.io_buffer()->size());
218 return true;
219}
220
221void MDnsClientImpl::Core::HandlePacket(DnsResponse* response,
222 int bytes_read) {
223 unsigned offset;
224 // Note: We store cache keys rather than record pointers to avoid
225 // erroneous behavior in case a packet contains multiple exclusive
226 // records with the same type and name.
227 std::map<MDnsCache::Key, MDnsCache::UpdateType> update_keys;
228
229 if (!response->InitParseWithoutQuery(bytes_read)) {
230 DVLOG(1) << "Could not understand an mDNS packet.";
231 return; // Message is unreadable.
232 }
233
234 // TODO(noamsml): duplicate query suppression.
235 if (!(response->flags() & dns_protocol::kFlagResponse))
236 return; // Message is a query. ignore it.
237
238 DnsRecordParser parser = response->Parser();
239 unsigned answer_count = response->answer_count() +
240 response->additional_answer_count();
241
242 for (unsigned i = 0; i < answer_count; i++) {
243 offset = parser.GetOffset();
244 scoped_ptr<const RecordParsed> record = RecordParsed::CreateFrom(
245 &parser, base::Time::Now());
246
247 if (!record) {
248 DVLOG(1) << "Could not understand an mDNS record.";
249
250 if (offset == parser.GetOffset()) {
251 DVLOG(1) << "Abandoned parsing the rest of the packet.";
252 return; // The parser did not advance, abort reading the packet.
253 } else {
254 continue; // We may be able to extract other records from the packet.
255 }
256 }
257
258 if ((record->klass() & dns_protocol::kMDnsClassMask) !=
259 dns_protocol::kClassIN) {
260 DVLOG(1) << "Received an mDNS record with non-IN class. Ignoring.";
261 continue; // Ignore all records not in the IN class.
262 }
263
264 MDnsCache::Key update_key = MDnsCache::Key::CreateFor(record.get());
265 MDnsCache::UpdateType update = cache_.UpdateDnsRecord(record.Pass());
266
267 // Cleanup time may have changed.
268 ScheduleCleanup(cache_.next_expiration());
269
270 update_keys.insert(std::make_pair(update_key, update));
271 }
272
273 for (std::map<MDnsCache::Key, MDnsCache::UpdateType>::iterator i =
274 update_keys.begin(); i != update_keys.end(); i++) {
275 const RecordParsed* record = cache_.LookupKey(i->first);
276 if (!record)
277 continue;
278
279 if (record->type() == dns_protocol::kTypeNSEC) {
280#if defined(ENABLE_NSEC)
281 NotifyNsecRecord(record);
282#endif
283 } else {
284 AlertListeners(i->second, ListenerKey(record->name(), record->type()),
285 record);
286 }
287 }
288}
289
290void MDnsClientImpl::Core::NotifyNsecRecord(const RecordParsed* record) {
291 DCHECK_EQ(dns_protocol::kTypeNSEC, record->type());
292 const NsecRecordRdata* rdata = record->rdata<NsecRecordRdata>();
293 DCHECK(rdata);
294
295 // Remove all cached records matching the nonexistent RR types.
296 std::vector<const RecordParsed*> records_to_remove;
297
298 cache_.FindDnsRecords(0, record->name(), &records_to_remove,
299 base::Time::Now());
300
301 for (std::vector<const RecordParsed*>::iterator i = records_to_remove.begin();
302 i != records_to_remove.end(); i++) {
303 if ((*i)->type() == dns_protocol::kTypeNSEC)
304 continue;
305 if (!rdata->GetBit((*i)->type())) {
306 scoped_ptr<const RecordParsed> record_removed = cache_.RemoveRecord((*i));
307 DCHECK(record_removed);
308 OnRecordRemoved(record_removed.get());
309 }
310 }
311
312 // Alert all listeners waiting for the nonexistent RR types.
313 ListenerMap::iterator i =
314 listeners_.upper_bound(ListenerKey(record->name(), 0));
315 for (; i != listeners_.end() && i->first.first == record->name(); i++) {
316 if (!rdata->GetBit(i->first.second)) {
317 FOR_EACH_OBSERVER(MDnsListenerImpl, *i->second, AlertNsecRecord());
318 }
319 }
320}
321
322void MDnsClientImpl::Core::OnConnectionError(int error) {
323 // TODO(noamsml): On connection error, recreate connection and flush cache.
324}
325
326void MDnsClientImpl::Core::AlertListeners(
327 MDnsCache::UpdateType update_type,
328 const ListenerKey& key,
329 const RecordParsed* record) {
330 ListenerMap::iterator listener_map_iterator = listeners_.find(key);
331 if (listener_map_iterator == listeners_.end()) return;
332
333 FOR_EACH_OBSERVER(MDnsListenerImpl, *listener_map_iterator->second,
334 HandleRecordUpdate(update_type, record));
335}
336
337void MDnsClientImpl::Core::AddListener(
338 MDnsListenerImpl* listener) {
339 ListenerKey key(listener->GetName(), listener->GetType());
340 std::pair<ListenerMap::iterator, bool> observer_insert_result =
341 listeners_.insert(
342 make_pair(key, static_cast<ObserverList<MDnsListenerImpl>*>(NULL)));
343
344 // If an equivalent key does not exist, actually create the observer list.
345 if (observer_insert_result.second)
346 observer_insert_result.first->second = new ObserverList<MDnsListenerImpl>();
347
348 ObserverList<MDnsListenerImpl>* observer_list =
349 observer_insert_result.first->second;
350
351 observer_list->AddObserver(listener);
352}
353
354void MDnsClientImpl::Core::RemoveListener(MDnsListenerImpl* listener) {
355 ListenerKey key(listener->GetName(), listener->GetType());
356 ListenerMap::iterator observer_list_iterator = listeners_.find(key);
357
358 DCHECK(observer_list_iterator != listeners_.end());
359 DCHECK(observer_list_iterator->second->HasObserver(listener));
360
361 observer_list_iterator->second->RemoveObserver(listener);
362
363 // Remove the observer list from the map if it is empty
364 if (!observer_list_iterator->second->might_have_observers()) {
365 // Schedule the actual removal for later in case the listener removal
366 // happens while iterating over the observer list.
367 base::MessageLoop::current()->PostTask(
368 FROM_HERE, base::Bind(
369 &MDnsClientImpl::Core::CleanupObserverList, AsWeakPtr(), key));
370 }
371}
372
373void MDnsClientImpl::Core::CleanupObserverList(const ListenerKey& key) {
374 ListenerMap::iterator found = listeners_.find(key);
375 if (found != listeners_.end() && !found->second->might_have_observers()) {
376 delete found->second;
377 listeners_.erase(found);
378 }
379}
380
381void MDnsClientImpl::Core::ScheduleCleanup(base::Time cleanup) {
382 // Cleanup is already scheduled, no need to do anything.
383 if (cleanup == scheduled_cleanup_) return;
384 scheduled_cleanup_ = cleanup;
385
386 // This cancels the previously scheduled cleanup.
387 cleanup_callback_.Reset(base::Bind(
388 &MDnsClientImpl::Core::DoCleanup, base::Unretained(this)));
389
390 // If |cleanup| is empty, then no cleanup necessary.
391 if (cleanup != base::Time()) {
392 base::MessageLoop::current()->PostDelayedTask(
393 FROM_HERE,
394 cleanup_callback_.callback(),
395 cleanup - base::Time::Now());
396 }
397}
398
399void MDnsClientImpl::Core::DoCleanup() {
400 cache_.CleanupRecords(base::Time::Now(), base::Bind(
401 &MDnsClientImpl::Core::OnRecordRemoved, base::Unretained(this)));
402
403 ScheduleCleanup(cache_.next_expiration());
404}
405
406void MDnsClientImpl::Core::OnRecordRemoved(
407 const RecordParsed* record) {
408 AlertListeners(MDnsCache::RecordRemoved,
409 ListenerKey(record->name(), record->type()), record);
410}
411
412void MDnsClientImpl::Core::QueryCache(
413 uint16 rrtype, const std::string& name,
414 std::vector<const RecordParsed*>* records) const {
415 cache_.FindDnsRecords(rrtype, name, records, base::Time::Now());
416}
417
418MDnsClientImpl::MDnsClientImpl() {
419}
420
421MDnsClientImpl::~MDnsClientImpl() {
422}
423
424bool MDnsClientImpl::StartListening(MDnsSocketFactory* socket_factory) {
425 DCHECK(!core_.get());
James Robinsond753aca2015-01-12 13:07:20 -0800426 core_.reset(new Core());
James Robinson646469d2014-10-03 15:33:28 -0700427 if (!core_->Init(socket_factory)) {
428 core_.reset();
429 return false;
430 }
431 return true;
432}
433
434void MDnsClientImpl::StopListening() {
435 core_.reset();
436}
437
438bool MDnsClientImpl::IsListening() const {
439 return core_.get() != NULL;
440}
441
442scoped_ptr<MDnsListener> MDnsClientImpl::CreateListener(
443 uint16 rrtype,
444 const std::string& name,
445 MDnsListener::Delegate* delegate) {
446 return scoped_ptr<net::MDnsListener>(
447 new MDnsListenerImpl(rrtype, name, delegate, this));
448}
449
450scoped_ptr<MDnsTransaction> MDnsClientImpl::CreateTransaction(
451 uint16 rrtype,
452 const std::string& name,
453 int flags,
454 const MDnsTransaction::ResultCallback& callback) {
455 return scoped_ptr<MDnsTransaction>(
456 new MDnsTransactionImpl(rrtype, name, flags, callback, this));
457}
458
459MDnsListenerImpl::MDnsListenerImpl(
460 uint16 rrtype,
461 const std::string& name,
462 MDnsListener::Delegate* delegate,
463 MDnsClientImpl* client)
464 : rrtype_(rrtype), name_(name), client_(client), delegate_(delegate),
465 started_(false), active_refresh_(false) {
466}
467
468MDnsListenerImpl::~MDnsListenerImpl() {
469 if (started_) {
470 DCHECK(client_->core());
471 client_->core()->RemoveListener(this);
472 }
473}
474
475bool MDnsListenerImpl::Start() {
476 DCHECK(!started_);
477
478 started_ = true;
479
480 DCHECK(client_->core());
481 client_->core()->AddListener(this);
482
483 return true;
484}
485
486void MDnsListenerImpl::SetActiveRefresh(bool active_refresh) {
487 active_refresh_ = active_refresh;
488
489 if (started_) {
490 if (!active_refresh_) {
491 next_refresh_.Cancel();
492 } else if (last_update_ != base::Time()) {
493 ScheduleNextRefresh();
494 }
495 }
496}
497
498const std::string& MDnsListenerImpl::GetName() const {
499 return name_;
500}
501
502uint16 MDnsListenerImpl::GetType() const {
503 return rrtype_;
504}
505
506void MDnsListenerImpl::HandleRecordUpdate(MDnsCache::UpdateType update_type,
507 const RecordParsed* record) {
508 DCHECK(started_);
509
510 if (update_type != MDnsCache::RecordRemoved) {
511 ttl_ = record->ttl();
512 last_update_ = record->time_created();
513
514 ScheduleNextRefresh();
515 }
516
517 if (update_type != MDnsCache::NoChange) {
518 MDnsListener::UpdateType update_external;
519
520 switch (update_type) {
521 case MDnsCache::RecordAdded:
522 update_external = MDnsListener::RECORD_ADDED;
523 break;
524 case MDnsCache::RecordChanged:
525 update_external = MDnsListener::RECORD_CHANGED;
526 break;
527 case MDnsCache::RecordRemoved:
528 update_external = MDnsListener::RECORD_REMOVED;
529 break;
530 case MDnsCache::NoChange:
531 default:
532 NOTREACHED();
533 // Dummy assignment to suppress compiler warning.
534 update_external = MDnsListener::RECORD_CHANGED;
535 break;
536 }
537
538 delegate_->OnRecordUpdate(update_external, record);
539 }
540}
541
542void MDnsListenerImpl::AlertNsecRecord() {
543 DCHECK(started_);
544 delegate_->OnNsecRecord(name_, rrtype_);
545}
546
547void MDnsListenerImpl::ScheduleNextRefresh() {
548 DCHECK(last_update_ != base::Time());
549
550 if (!active_refresh_)
551 return;
552
553 // A zero TTL is a goodbye packet and should not be refreshed.
554 if (ttl_ == 0) {
555 next_refresh_.Cancel();
556 return;
557 }
558
559 next_refresh_.Reset(base::Bind(&MDnsListenerImpl::DoRefresh,
560 AsWeakPtr()));
561
562 // Schedule refreshes at both 85% and 95% of the original TTL. These will both
563 // be canceled and rescheduled if the record's TTL is updated due to a
564 // response being received.
565 base::Time next_refresh1 = last_update_ + base::TimeDelta::FromMilliseconds(
566 static_cast<int>(base::Time::kMillisecondsPerSecond *
567 kListenerRefreshRatio1 * ttl_));
568
569 base::Time next_refresh2 = last_update_ + base::TimeDelta::FromMilliseconds(
570 static_cast<int>(base::Time::kMillisecondsPerSecond *
571 kListenerRefreshRatio2 * ttl_));
572
573 base::MessageLoop::current()->PostDelayedTask(
574 FROM_HERE,
575 next_refresh_.callback(),
576 next_refresh1 - base::Time::Now());
577
578 base::MessageLoop::current()->PostDelayedTask(
579 FROM_HERE,
580 next_refresh_.callback(),
581 next_refresh2 - base::Time::Now());
582}
583
584void MDnsListenerImpl::DoRefresh() {
585 client_->core()->SendQuery(rrtype_, name_);
586}
587
588MDnsTransactionImpl::MDnsTransactionImpl(
589 uint16 rrtype,
590 const std::string& name,
591 int flags,
592 const MDnsTransaction::ResultCallback& callback,
593 MDnsClientImpl* client)
594 : rrtype_(rrtype), name_(name), callback_(callback), client_(client),
595 started_(false), flags_(flags) {
596 DCHECK((flags_ & MDnsTransaction::FLAG_MASK) == flags_);
597 DCHECK(flags_ & MDnsTransaction::QUERY_CACHE ||
598 flags_ & MDnsTransaction::QUERY_NETWORK);
599}
600
601MDnsTransactionImpl::~MDnsTransactionImpl() {
602 timeout_.Cancel();
603}
604
605bool MDnsTransactionImpl::Start() {
606 DCHECK(!started_);
607 started_ = true;
608
609 base::WeakPtr<MDnsTransactionImpl> weak_this = AsWeakPtr();
610 if (flags_ & MDnsTransaction::QUERY_CACHE) {
611 ServeRecordsFromCache();
612
613 if (!weak_this || !is_active()) return true;
614 }
615
616 if (flags_ & MDnsTransaction::QUERY_NETWORK) {
617 return QueryAndListen();
618 }
619
620 // If this is a cache only query, signal that the transaction is over
621 // immediately.
622 SignalTransactionOver();
623 return true;
624}
625
626const std::string& MDnsTransactionImpl::GetName() const {
627 return name_;
628}
629
630uint16 MDnsTransactionImpl::GetType() const {
631 return rrtype_;
632}
633
634void MDnsTransactionImpl::CacheRecordFound(const RecordParsed* record) {
635 DCHECK(started_);
636 OnRecordUpdate(MDnsListener::RECORD_ADDED, record);
637}
638
639void MDnsTransactionImpl::TriggerCallback(MDnsTransaction::Result result,
640 const RecordParsed* record) {
641 DCHECK(started_);
642 if (!is_active()) return;
643
644 // Ensure callback is run after touching all class state, so that
645 // the callback can delete the transaction.
646 MDnsTransaction::ResultCallback callback = callback_;
647
648 // Reset the transaction if it expects a single result, or if the result
649 // is a final one (everything except for a record).
650 if (flags_ & MDnsTransaction::SINGLE_RESULT ||
651 result != MDnsTransaction::RESULT_RECORD) {
652 Reset();
653 }
654
655 callback.Run(result, record);
656}
657
658void MDnsTransactionImpl::Reset() {
659 callback_.Reset();
660 listener_.reset();
661 timeout_.Cancel();
662}
663
664void MDnsTransactionImpl::OnRecordUpdate(MDnsListener::UpdateType update,
665 const RecordParsed* record) {
666 DCHECK(started_);
667 if (update == MDnsListener::RECORD_ADDED ||
668 update == MDnsListener::RECORD_CHANGED)
669 TriggerCallback(MDnsTransaction::RESULT_RECORD, record);
670}
671
672void MDnsTransactionImpl::SignalTransactionOver() {
673 DCHECK(started_);
674 if (flags_ & MDnsTransaction::SINGLE_RESULT) {
675 TriggerCallback(MDnsTransaction::RESULT_NO_RESULTS, NULL);
676 } else {
677 TriggerCallback(MDnsTransaction::RESULT_DONE, NULL);
678 }
679}
680
681void MDnsTransactionImpl::ServeRecordsFromCache() {
682 std::vector<const RecordParsed*> records;
683 base::WeakPtr<MDnsTransactionImpl> weak_this = AsWeakPtr();
684
685 if (client_->core()) {
686 client_->core()->QueryCache(rrtype_, name_, &records);
687 for (std::vector<const RecordParsed*>::iterator i = records.begin();
688 i != records.end() && weak_this; ++i) {
689 weak_this->TriggerCallback(MDnsTransaction::RESULT_RECORD, *i);
690 }
691
692#if defined(ENABLE_NSEC)
693 if (records.empty()) {
694 DCHECK(weak_this);
695 client_->core()->QueryCache(dns_protocol::kTypeNSEC, name_, &records);
696 if (!records.empty()) {
697 const NsecRecordRdata* rdata =
698 records.front()->rdata<NsecRecordRdata>();
699 DCHECK(rdata);
700 if (!rdata->GetBit(rrtype_))
701 weak_this->TriggerCallback(MDnsTransaction::RESULT_NSEC, NULL);
702 }
703 }
704#endif
705 }
706}
707
708bool MDnsTransactionImpl::QueryAndListen() {
709 listener_ = client_->CreateListener(rrtype_, name_, this);
710 if (!listener_->Start())
711 return false;
712
713 DCHECK(client_->core());
714 if (!client_->core()->SendQuery(rrtype_, name_))
715 return false;
716
717 timeout_.Reset(base::Bind(&MDnsTransactionImpl::SignalTransactionOver,
718 AsWeakPtr()));
719 base::MessageLoop::current()->PostDelayedTask(
720 FROM_HERE,
721 timeout_.callback(),
722 base::TimeDelta::FromSeconds(MDnsTransactionTimeoutSeconds));
723
724 return true;
725}
726
727void MDnsTransactionImpl::OnNsecRecord(const std::string& name, unsigned type) {
728 TriggerCallback(RESULT_NSEC, NULL);
729}
730
731void MDnsTransactionImpl::OnCachePurged() {
732 // TODO(noamsml): Cache purge situations not yet implemented
733}
734
735} // namespace net