PrusaSlicer-NonPlainar/src/slic3r/Utils/Bonjour.cpp

807 lines
18 KiB
C++
Raw Normal View History

2018-02-20 14:37:26 +00:00
#include "Bonjour.hpp"
#include <cstdint>
#include <algorithm>
#include <array>
#include <vector>
#include <string>
#include <map>
2018-02-20 14:37:26 +00:00
#include <thread>
#include <boost/optional.hpp>
#include <boost/system/error_code.hpp>
#include <boost/endian/conversion.hpp>
#include <boost/asio.hpp>
#include <boost/date_time/posix_time/posix_time_duration.hpp>
#include <boost/format.hpp>
using boost::optional;
using boost::system::error_code;
namespace endian = boost::endian;
namespace asio = boost::asio;
using boost::asio::ip::udp;
namespace Slic3r {
2018-03-02 14:05:17 +00:00
// Minimal implementation of a MDNS/DNS-SD client
2018-02-20 14:37:26 +00:00
// This implementation is extremely simple, only the bits that are useful
// for basic MDNS discovery of OctoPi devices are present.
// However, the bits that are present are implemented with security in mind.
// Only fully correct DNS replies are allowed through.
// While decoding the decoder will bail the moment it encounters anything fishy.
// At least that's the idea. To help prove this is actually the case,
// the implementations has been tested with AFL.
2018-02-20 14:37:26 +00:00
// Relevant RFCs:
// https://tools.ietf.org/html/rfc6762.txt
// https://tools.ietf.org/html/rfc6763.txt
2018-02-20 14:37:26 +00:00
struct DnsName: public std::string
{
enum
{
MAX_RECURSION = 10, // Keep this low
};
2018-03-02 14:05:17 +00:00
static optional<DnsName> decode(const std::vector<char> &buffer, size_t &offset, unsigned depth = 0)
2018-02-20 14:37:26 +00:00
{
2018-03-02 14:05:17 +00:00
// Check offset sanity:
if (offset + 1 >= buffer.size()) {
return boost::none;
}
2018-02-20 14:37:26 +00:00
// Check for recursion depth to prevent parsing names that are nested too deeply or end up cyclic:
2018-02-20 14:37:26 +00:00
if (depth >= MAX_RECURSION) {
return boost::none;
}
DnsName res;
2018-03-02 14:05:17 +00:00
const size_t bsize = buffer.size();
2018-02-20 14:37:26 +00:00
while (true) {
const char* ptr = buffer.data() + offset;
2018-03-02 14:05:17 +00:00
unsigned len = static_cast<unsigned char>(*ptr);
2018-02-20 14:37:26 +00:00
if (len & 0xc0) {
// This is a recursive label
2018-03-02 14:05:17 +00:00
unsigned len_2 = static_cast<unsigned char>(ptr[1]);
size_t pointer = (len & 0x3f) << 8 | len_2;
2018-02-20 14:37:26 +00:00
const auto nested = decode(buffer, pointer, depth + 1);
if (!nested) {
return boost::none;
} else {
if (res.size() > 0) {
res.push_back('.');
}
res.append(*nested);
offset += 2;
return std::move(res);
}
} else if (len == 0) {
// This is a name terminator
offset++;
break;
} else {
// This is a regular label
len &= 0x3f;
if (len + offset + 1 >= bsize) {
return boost::none;
}
res.reserve(len);
if (res.size() > 0) {
res.push_back('.');
}
ptr++;
for (const auto end = ptr + len; ptr < end; ptr++) {
char c = *ptr;
if (c >= 0x20 && c <= 0x7f) {
res.push_back(c);
} else {
return boost::none;
}
}
offset += len + 1;
}
}
if (res.size() > 0) {
return std::move(res);
} else {
return boost::none;
}
}
};
struct DnsHeader
{
uint16_t id;
uint16_t flags;
uint16_t qdcount;
uint16_t ancount;
uint16_t nscount;
uint16_t arcount;
enum
{
SIZE = 12,
};
static DnsHeader decode(const std::vector<char> &buffer) {
DnsHeader res;
const uint16_t *data_16 = reinterpret_cast<const uint16_t*>(buffer.data());
res.id = endian::big_to_native(data_16[0]);
res.flags = endian::big_to_native(data_16[1]);
res.qdcount = endian::big_to_native(data_16[2]);
res.ancount = endian::big_to_native(data_16[3]);
res.nscount = endian::big_to_native(data_16[4]);
res.arcount = endian::big_to_native(data_16[5]);
return res;
}
uint32_t rrcount() const {
return ancount + nscount + arcount;
}
};
struct DnsQuestion
{
enum
{
MIN_SIZE = 5,
};
DnsName name;
uint16_t type;
uint16_t qclass;
DnsQuestion()
: type(0)
, qclass(0)
2018-02-20 14:37:26 +00:00
{}
2018-03-02 14:05:17 +00:00
static optional<DnsQuestion> decode(const std::vector<char> &buffer, size_t &offset)
2018-02-20 14:37:26 +00:00
{
auto qname = DnsName::decode(buffer, offset);
if (!qname) {
return boost::none;
}
DnsQuestion res;
res.name = std::move(*qname);
const uint16_t *data_16 = reinterpret_cast<const uint16_t*>(buffer.data() + offset);
res.type = endian::big_to_native(data_16[0]);
res.qclass = endian::big_to_native(data_16[1]);
offset += 4;
return std::move(res);
}
};
struct DnsResource
{
DnsName name;
uint16_t type;
uint16_t rclass;
uint32_t ttl;
std::vector<char> data;
DnsResource()
: type(0)
, rclass(0)
, ttl(0)
2018-02-20 14:37:26 +00:00
{}
2018-03-02 14:05:17 +00:00
static optional<DnsResource> decode(const std::vector<char> &buffer, size_t &offset, size_t &dataoffset)
2018-02-20 14:37:26 +00:00
{
2018-03-02 14:05:17 +00:00
const size_t bsize = buffer.size();
if (offset + 1 >= bsize) {
return boost::none;
}
2018-02-20 14:37:26 +00:00
auto rname = DnsName::decode(buffer, offset);
if (!rname) {
return boost::none;
}
if (offset + 10 >= bsize) {
return boost::none;
}
DnsResource res;
res.name = std::move(*rname);
const uint16_t *data_16 = reinterpret_cast<const uint16_t*>(buffer.data() + offset);
res.type = endian::big_to_native(data_16[0]);
res.rclass = endian::big_to_native(data_16[1]);
res.ttl = endian::big_to_native(*reinterpret_cast<const uint32_t*>(data_16 + 2));
uint16_t rdlength = endian::big_to_native(data_16[4]);
offset += 10;
if (offset + rdlength > bsize) {
return boost::none;
}
dataoffset = offset;
res.data = std::move(std::vector<char>(buffer.begin() + offset, buffer.begin() + offset + rdlength));
offset += rdlength;
return std::move(res);
}
};
struct DnsRR_A
{
enum { TAG = 0x1 };
asio::ip::address_v4 ip;
static void decode(optional<DnsRR_A> &result, const DnsResource &rr)
{
if (rr.data.size() == 4) {
DnsRR_A res;
const uint32_t ip = endian::big_to_native(*reinterpret_cast<const uint32_t*>(rr.data.data()));
res.ip = asio::ip::address_v4(ip);
result = std::move(res);
}
}
};
struct DnsRR_AAAA
{
enum { TAG = 0x1c };
asio::ip::address_v6 ip;
static void decode(optional<DnsRR_AAAA> &result, const DnsResource &rr)
{
if (rr.data.size() == 16) {
DnsRR_AAAA res;
std::array<unsigned char, 16> ip;
std::copy_n(rr.data.begin(), 16, ip.begin());
res.ip = asio::ip::address_v6(ip);
result = std::move(res);
}
}
};
struct DnsRR_SRV
{
enum
{
TAG = 0x21,
MIN_SIZE = 8,
};
uint16_t priority;
uint16_t weight;
uint16_t port;
DnsName hostname;
2018-03-02 14:05:17 +00:00
static optional<DnsRR_SRV> decode(const std::vector<char> &buffer, const DnsResource &rr, size_t dataoffset)
2018-02-20 14:37:26 +00:00
{
if (rr.data.size() < MIN_SIZE) {
2018-03-02 14:05:17 +00:00
return boost::none;
2018-02-20 14:37:26 +00:00
}
DnsRR_SRV res;
const uint16_t *data_16 = reinterpret_cast<const uint16_t*>(rr.data.data());
res.priority = endian::big_to_native(data_16[0]);
res.weight = endian::big_to_native(data_16[1]);
res.port = endian::big_to_native(data_16[2]);
2018-03-02 14:05:17 +00:00
size_t offset = dataoffset + 6;
2018-02-20 14:37:26 +00:00
auto hostname = DnsName::decode(buffer, offset);
if (hostname) {
res.hostname = std::move(*hostname);
2018-03-02 14:05:17 +00:00
return std::move(res);
} else {
return boost::none;
}
}
};
struct DnsRR_TXT
{
enum
{
TAG = 0x10,
};
BonjourReply::TxtData data;
2018-03-02 14:05:17 +00:00
static optional<DnsRR_TXT> decode(const DnsResource &rr, const Bonjour::TxtKeys &txt_keys)
2018-03-02 14:05:17 +00:00
{
const size_t size = rr.data.size();
if (size < 2) {
return boost::none;
}
DnsRR_TXT res;
for (auto it = rr.data.begin(); it != rr.data.end(); ) {
unsigned val_size = static_cast<unsigned char>(*it);
if (val_size == 0 || it + val_size >= rr.data.end()) {
return boost::none;
}
++it;
const auto it_end = it + val_size;
const auto it_eq = std::find(it, it_end, '=');
if (it_eq > it && it_eq < it_end - 1) {
std::string key(it_eq - it, ' ');
std::copy(it, it_eq, key.begin());
if (txt_keys.find(key) != txt_keys.end() || key == "path") {
// This key-value has been requested for
std::string value(it_end - it_eq - 1, ' ');
std::copy(it_eq + 1, it_end, value.begin());
res.data.insert(std::make_pair(std::move(key), std::move(value)));
}
}
2018-03-02 14:05:17 +00:00
it = it_end;
2018-03-02 14:05:17 +00:00
}
return std::move(res);
}
};
struct DnsSDPair
{
optional<DnsRR_SRV> srv;
optional<DnsRR_TXT> txt;
};
struct DnsSDMap : public std::map<std::string, DnsSDPair>
{
void insert_srv(std::string &&name, DnsRR_SRV &&srv)
{
auto hit = this->find(name);
if (hit != this->end()) {
hit->second.srv = std::move(srv);
} else {
DnsSDPair pair;
pair.srv = std::move(srv);
this->insert(std::make_pair(std::move(name), std::move(pair)));
}
}
void insert_txt(std::string &&name, DnsRR_TXT &&txt)
{
auto hit = this->find(name);
if (hit != this->end()) {
hit->second.txt = std::move(txt);
} else {
DnsSDPair pair;
pair.txt = std::move(txt);
this->insert(std::make_pair(std::move(name), std::move(pair)));
2018-02-20 14:37:26 +00:00
}
}
};
struct DnsMessage
{
enum
{
MAX_SIZE = 4096,
MAX_ANS = 30,
};
DnsHeader header;
optional<DnsQuestion> question;
optional<DnsRR_A> rr_a;
optional<DnsRR_AAAA> rr_aaaa;
std::vector<DnsRR_SRV> rr_srv;
2018-03-02 14:05:17 +00:00
DnsSDMap sdmap;
static optional<DnsMessage> decode(const std::vector<char> &buffer, const Bonjour::TxtKeys &txt_keys)
2018-02-20 14:37:26 +00:00
{
const auto size = buffer.size();
if (size < DnsHeader::SIZE + DnsQuestion::MIN_SIZE || size > MAX_SIZE) {
return boost::none;
}
DnsMessage res;
res.header = DnsHeader::decode(buffer);
if (res.header.qdcount > 1 || res.header.ancount > MAX_ANS) {
return boost::none;
}
2018-03-02 14:05:17 +00:00
size_t offset = DnsHeader::SIZE;
2018-02-20 14:37:26 +00:00
if (res.header.qdcount == 1) {
res.question = DnsQuestion::decode(buffer, offset);
}
for (unsigned i = 0; i < res.header.rrcount(); i++) {
2018-03-02 14:05:17 +00:00
size_t dataoffset = 0;
2018-02-20 14:37:26 +00:00
auto rr = DnsResource::decode(buffer, offset, dataoffset);
if (!rr) {
return boost::none;
} else {
res.parse_rr(buffer, std::move(*rr), dataoffset, txt_keys);
2018-02-20 14:37:26 +00:00
}
}
return std::move(res);
}
2018-02-20 14:37:26 +00:00
private:
void parse_rr(const std::vector<char> &buffer, DnsResource &&rr, size_t dataoffset, const Bonjour::TxtKeys &txt_keys)
2018-02-20 14:37:26 +00:00
{
switch (rr.type) {
case DnsRR_A::TAG: DnsRR_A::decode(this->rr_a, rr); break;
case DnsRR_AAAA::TAG: DnsRR_AAAA::decode(this->rr_aaaa, rr); break;
2018-03-02 14:05:17 +00:00
case DnsRR_SRV::TAG: {
auto srv = DnsRR_SRV::decode(buffer, rr, dataoffset);
if (srv) { this->sdmap.insert_srv(std::move(rr.name), std::move(*srv)); }
break;
}
case DnsRR_TXT::TAG: {
auto txt = DnsRR_TXT::decode(rr, txt_keys);
2018-03-02 14:05:17 +00:00
if (txt) { this->sdmap.insert_txt(std::move(rr.name), std::move(*txt)); }
break;
}
2018-02-20 14:37:26 +00:00
}
}
};
std::ostream& operator<<(std::ostream &os, const DnsMessage &msg)
{
os << boost::format("DnsMessage(ID: %1%, Q: %2%, A: %3%, AAAA: %4%, services: [")
% msg.header.id
% (msg.question ? msg.question->name.c_str() : "none")
% (msg.rr_a ? msg.rr_a->ip.to_string() : "none")
% (msg.rr_aaaa ? msg.rr_aaaa->ip.to_string() : "none");
enum { SRV_PRINT_MAX = 3 };
unsigned i = 0;
for (const auto &sdpair : msg.sdmap) {
if (i > 0) { os << ", "; }
if (i < SRV_PRINT_MAX) {
os << sdpair.first;
} else {
os << "...";
break;
}
i++;
}
return os << "])";
}
2018-02-20 14:37:26 +00:00
struct BonjourRequest
{
static const asio::ip::address_v4 MCAST_IP4;
static const uint16_t MCAST_PORT;
std::vector<char> data;
static optional<BonjourRequest> make(const std::string &service, const std::string &protocol);
private:
BonjourRequest(std::vector<char> &&data) : data(std::move(data)) {}
2018-02-20 14:37:26 +00:00
};
const asio::ip::address_v4 BonjourRequest::MCAST_IP4{0xe00000fb};
const uint16_t BonjourRequest::MCAST_PORT = 5353;
optional<BonjourRequest> BonjourRequest::make(const std::string &service, const std::string &protocol)
{
if (service.size() > 15 || protocol.size() > 15) {
return boost::none;
}
std::vector<char> data;
data.reserve(service.size() + 18);
// Add metadata
2018-03-02 14:05:17 +00:00
static const unsigned char rq_meta[] = {
0x00, 0x00, // Query ID (zero for mDNS)
0x00, 0x00, // Flags
0x00, 0x01, // One query
0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // Zero Answer, Authority, and Additional RRs
2018-02-20 14:37:26 +00:00
};
std::copy(rq_meta, rq_meta + sizeof(rq_meta), std::back_inserter(data));
// Add PTR query name
data.push_back(service.size() + 1);
data.push_back('_');
data.insert(data.end(), service.begin(), service.end());
data.push_back(protocol.size() + 1);
data.push_back('_');
data.insert(data.end(), protocol.begin(), protocol.end());
// Add the rest of PTR record
2018-03-02 14:05:17 +00:00
static const unsigned char ptr_tail[] = {
0x05, // length of "label"
0x6c, 0x6f, 0x63, 0x61, 0x6c, 0x00, // "label" string and terminator
0x00, 0x0c, // Type PTR
0x00, 0xff, // Class ANY
2018-02-20 14:37:26 +00:00
};
std::copy(ptr_tail, ptr_tail + sizeof(ptr_tail), std::back_inserter(data));
return BonjourRequest(std::move(data));
2018-02-20 14:37:26 +00:00
}
// API - private part
struct Bonjour::priv
{
const std::string service;
std::string protocol;
std::string service_dn;
TxtKeys txt_keys;
2018-02-20 14:37:26 +00:00
unsigned timeout;
unsigned retries;
2018-02-20 14:37:26 +00:00
std::vector<char> buffer;
std::thread io_thread;
Bonjour::ReplyFn replyfn;
Bonjour::CompleteFn completefn;
priv(std::string &&service);
2018-02-20 14:37:26 +00:00
std::string strip_service_dn(const std::string &service_name) const;
2018-03-02 14:05:17 +00:00
void udp_receive(udp::endpoint from, size_t bytes);
2018-02-20 14:37:26 +00:00
void lookup_perform();
};
Bonjour::priv::priv(std::string &&service)
: service(std::move(service))
, protocol("tcp")
, timeout(10)
, retries(1)
2018-02-20 14:37:26 +00:00
{
buffer.resize(DnsMessage::MAX_SIZE);
}
std::string Bonjour::priv::strip_service_dn(const std::string &service_name) const
{
if (service_name.size() <= service_dn.size()) {
return service_name;
}
auto needle = service_name.rfind(service_dn);
if (needle == service_name.size() - service_dn.size()) {
return service_name.substr(0, needle - 1);
} else {
return service_name;
}
}
2018-03-02 14:05:17 +00:00
void Bonjour::priv::udp_receive(udp::endpoint from, size_t bytes)
2018-02-20 14:37:26 +00:00
{
2018-03-02 14:05:17 +00:00
if (bytes == 0 || !replyfn) {
2018-02-20 14:37:26 +00:00
return;
}
buffer.resize(bytes);
auto dns_msg = DnsMessage::decode(buffer, txt_keys);
2018-02-20 14:37:26 +00:00
if (dns_msg) {
2018-03-02 14:05:17 +00:00
asio::ip::address ip = from.address();
if (dns_msg->rr_a) { ip = dns_msg->rr_a->ip; }
else if (dns_msg->rr_aaaa) { ip = dns_msg->rr_aaaa->ip; }
2018-02-20 14:37:26 +00:00
for (auto &sdpair : dns_msg->sdmap) {
2018-03-02 14:05:17 +00:00
if (! sdpair.second.srv) {
continue;
2018-02-20 14:37:26 +00:00
}
2018-03-02 14:05:17 +00:00
const auto &srv = *sdpair.second.srv;
auto service_name = strip_service_dn(sdpair.first);
std::string path;
std::string version;
2018-03-02 14:05:17 +00:00
BonjourReply::TxtData txt_data;
2018-03-02 14:05:17 +00:00
if (sdpair.second.txt) {
txt_data = std::move(sdpair.second.txt->data);
2018-03-02 14:05:17 +00:00
}
BonjourReply reply(ip, srv.port, std::move(service_name), srv.hostname, std::move(txt_data));
2018-03-02 14:05:17 +00:00
replyfn(std::move(reply));
2018-02-20 14:37:26 +00:00
}
}
}
void Bonjour::priv::lookup_perform()
{
service_dn = (boost::format("_%1%._%2%.local") % service % protocol).str();
2018-02-20 14:37:26 +00:00
const auto brq = BonjourRequest::make(service, protocol);
if (!brq) {
return;
}
auto self = this;
try {
boost::asio::io_service io_service;
udp::socket socket(io_service);
socket.open(udp::v4());
socket.set_option(udp::socket::reuse_address(true));
udp::endpoint mcast(BonjourRequest::MCAST_IP4, BonjourRequest::MCAST_PORT);
socket.send_to(asio::buffer(brq->data), mcast);
bool expired = false;
bool retry = false;
2018-02-20 14:37:26 +00:00
asio::deadline_timer timer(io_service);
retries--;
std::function<void(const error_code &)> timer_handler = [&](const error_code &error) {
if (retries == 0 || error) {
expired = true;
if (self->completefn) {
self->completefn();
}
} else {
retry = true;
retries--;
timer.expires_from_now(boost::posix_time::seconds(timeout));
timer.async_wait(timer_handler);
2018-02-20 14:37:26 +00:00
}
};
timer.expires_from_now(boost::posix_time::seconds(timeout));
timer.async_wait(timer_handler);
2018-02-20 14:37:26 +00:00
2018-03-02 14:05:17 +00:00
udp::endpoint recv_from;
const auto recv_handler = [&](const error_code &error, size_t bytes) {
if (!error) { self->udp_receive(recv_from, bytes); }
2018-02-20 14:37:26 +00:00
};
2018-03-02 14:05:17 +00:00
socket.async_receive_from(asio::buffer(buffer, buffer.size()), recv_from, recv_handler);
2018-02-20 14:37:26 +00:00
while (io_service.run_one()) {
if (expired) {
2018-02-20 14:37:26 +00:00
socket.cancel();
} else if (retry) {
retry = false;
socket.send_to(asio::buffer(brq->data), mcast);
2018-02-20 14:37:26 +00:00
} else {
buffer.resize(DnsMessage::MAX_SIZE);
2018-03-02 14:05:17 +00:00
socket.async_receive_from(asio::buffer(buffer, buffer.size()), recv_from, recv_handler);
2018-02-20 14:37:26 +00:00
}
}
} catch (std::exception& /* e */) {
2018-02-20 14:37:26 +00:00
}
}
// API - public part
BonjourReply::BonjourReply(boost::asio::ip::address ip, uint16_t port, std::string service_name, std::string hostname, BonjourReply::TxtData txt_data)
: ip(std::move(ip))
, port(port)
, service_name(std::move(service_name))
, hostname(std::move(hostname))
, txt_data(std::move(txt_data))
{
std::string proto;
std::string port_suffix;
if (port == 443) { proto = "https://"; }
if (port != 443 && port != 80) { port_suffix = std::to_string(port).insert(0, 1, ':'); }
std::string path = this->path();
if (path[0] != '/') { path.insert(0, 1, '/'); }
full_address = proto + ip.to_string() + port_suffix;
if (path != "/") { full_address += path; }
txt_data["path"] = std::move(path);
}
std::string BonjourReply::path() const
{
const auto it = txt_data.find("path");
return it != txt_data.end() ? it->second : std::string("/");
}
bool BonjourReply::operator==(const BonjourReply &other) const
{
return this->full_address == other.full_address
&& this->service_name == other.service_name;
}
bool BonjourReply::operator<(const BonjourReply &other) const
{
if (this->ip != other.ip) {
// So that the common case doesn't involve string comparison
return this->ip < other.ip;
} else {
auto cmp = this->full_address.compare(other.full_address);
return cmp != 0 ? cmp < 0 : this->service_name < other.service_name;
}
}
2018-03-02 14:05:17 +00:00
std::ostream& operator<<(std::ostream &os, const BonjourReply &reply)
{
os << boost::format("BonjourReply(%1%, %2%, %3%, %4%")
% reply.ip.to_string()
% reply.service_name
% reply.hostname
% reply.full_address;
for (const auto &kv : reply.txt_data) {
os << boost::format(", %1%=%2%") % kv.first % kv.second;
}
return os << ')';
2018-03-02 14:05:17 +00:00
}
Bonjour::Bonjour(std::string service)
: p(new priv(std::move(service)))
2018-02-20 14:37:26 +00:00
{}
Bonjour::Bonjour(Bonjour &&other) : p(std::move(other.p)) {}
Bonjour::~Bonjour()
{
if (p && p->io_thread.joinable()) {
p->io_thread.detach();
}
}
Bonjour& Bonjour::set_protocol(std::string protocol)
{
if (p) { p->protocol = std::move(protocol); }
return *this;
}
Bonjour& Bonjour::set_txt_keys(TxtKeys txt_keys)
{
if (p) { p->txt_keys = std::move(txt_keys); }
return *this;
}
2018-02-20 14:37:26 +00:00
Bonjour& Bonjour::set_timeout(unsigned timeout)
{
if (p) { p->timeout = timeout; }
return *this;
}
Bonjour& Bonjour::set_retries(unsigned retries)
{
if (p && retries > 0) { p->retries = retries; }
return *this;
}
2018-02-20 14:37:26 +00:00
Bonjour& Bonjour::on_reply(ReplyFn fn)
{
if (p) { p->replyfn = std::move(fn); }
return *this;
}
Bonjour& Bonjour::on_complete(CompleteFn fn)
{
if (p) { p->completefn = std::move(fn); }
return *this;
}
Bonjour::Ptr Bonjour::lookup()
{
auto self = std::make_shared<Bonjour>(std::move(*this));
if (self->p) {
auto io_thread = std::thread([self]() {
2018-02-20 14:37:26 +00:00
self->p->lookup_perform();
});
self->p->io_thread = std::move(io_thread);
}
return self;
}
}