| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/net/dns_probe_service.h" | 5 #include "chrome/browser/net/dns_probe_service.h" |
| 6 | 6 |
| 7 #include "base/metrics/field_trial.h" | 7 #include "base/metrics/field_trial.h" |
| 8 #include "base/metrics/histogram.h" | 8 #include "base/metrics/histogram.h" |
| 9 #include "base/strings/string_number_conversions.h" | 9 #include "base/strings/string_number_conversions.h" |
| 10 #include "chrome/browser/net/dns_probe_job.h" | 10 #include "chrome/browser/net/dns_probe_runner.h" |
| 11 #include "chrome/common/net/net_error_info.h" | 11 #include "chrome/common/net/net_error_info.h" |
| 12 #include "net/base/ip_endpoint.h" | 12 #include "net/base/ip_endpoint.h" |
| 13 #include "net/base/net_util.h" | 13 #include "net/base/net_util.h" |
| 14 #include "net/base/network_change_notifier.h" |
| 14 #include "net/dns/dns_client.h" | 15 #include "net/dns/dns_client.h" |
| 15 #include "net/dns/dns_config_service.h" | 16 #include "net/dns/dns_config_service.h" |
| 16 #include "net/dns/dns_protocol.h" | 17 #include "net/dns/dns_protocol.h" |
| 17 | 18 |
| 18 using base::FieldTrialList; | 19 using base::FieldTrialList; |
| 19 using base::StringToInt; | 20 using base::StringToInt; |
| 20 using chrome_common_net::DnsProbeResult; | 21 using chrome_common_net::DnsProbeStatus; |
| 21 using net::DnsClient; | 22 using net::DnsClient; |
| 22 using net::DnsConfig; | 23 using net::DnsConfig; |
| 23 using net::IPAddressNumber; | 24 using net::IPAddressNumber; |
| 24 using net::IPEndPoint; | 25 using net::IPEndPoint; |
| 25 using net::ParseIPLiteralToNumber; | 26 using net::ParseIPLiteralToNumber; |
| 26 using net::NetworkChangeNotifier; | 27 using net::NetworkChangeNotifier; |
| 27 | 28 |
| 28 namespace chrome_browser_net { | |
| 29 | |
| 30 namespace { | 29 namespace { |
| 31 | 30 |
| 32 // How long the DnsProbeService will cache the probe result for. | 31 // How long the DnsProbeService will cache the probe result for. |
| 33 // If it's older than this and we get a probe request, the service expires it | 32 // If it's older than this and we get a probe request, the service expires it |
| 34 // and starts a new probe. | 33 // and starts a new probe. |
| 35 const int kMaxResultAgeMs = 5000; | 34 const int kMaxResultAgeMs = 5000; |
| 36 | 35 |
| 37 // The public DNS servers used by the DnsProbeService to verify internet | 36 // The public DNS servers used by the DnsProbeService to verify internet |
| 38 // connectivity. | 37 // connectivity. |
| 39 const char kPublicDnsPrimary[] = "8.8.8.8"; | 38 const char kPublicDnsPrimary[] = "8.8.8.8"; |
| (...skipping 15 matching lines...) Expand all Loading... |
| 55 if (group == "" || group == "default") | 54 if (group == "" || group == "default") |
| 56 return kAttemptsUseDefault; | 55 return kAttemptsUseDefault; |
| 57 | 56 |
| 58 int attempts; | 57 int attempts; |
| 59 if (!StringToInt(group, &attempts)) | 58 if (!StringToInt(group, &attempts)) |
| 60 return kAttemptsUseDefault; | 59 return kAttemptsUseDefault; |
| 61 | 60 |
| 62 return attempts; | 61 return attempts; |
| 63 } | 62 } |
| 64 | 63 |
| 65 bool IsLocalhost(const IPAddressNumber& ip) { | |
| 66 return (ip.size() == net::kIPv4AddressSize) | |
| 67 && (ip[0] == 127) && (ip[1] == 0) && (ip[2] == 0) && (ip[3] == 1); | |
| 68 } | |
| 69 | |
| 70 // The maximum number of nameservers counted in histograms. | |
| 71 const int kNameserverCountMax = 10; | |
| 72 | |
| 73 } // namespace | 64 } // namespace |
| 74 | 65 |
| 75 DnsProbeService::DnsProbeService() | 66 DnsProbeService::DnsProbeService() |
| 76 : system_result_(DnsProbeJob::SERVERS_UNKNOWN), | 67 : state_(STATE_NO_RESULTS), |
| 77 public_result_(DnsProbeJob::SERVERS_UNKNOWN), | 68 system_result_(DnsProbeRunner::UNKNOWN), |
| 78 state_(STATE_NO_RESULTS), | 69 public_result_(DnsProbeRunner::UNKNOWN), |
| 79 result_(chrome_common_net::DNS_PROBE_UNKNOWN), | 70 result_(chrome_common_net::DNS_PROBE_MAX) { |
| 80 dns_attempts_(GetAttemptsFromFieldTrial()) { | 71 NetworkChangeNotifier::AddDNSObserver(this); |
| 81 NetworkChangeNotifier::AddIPAddressObserver(this); | |
| 82 } | 72 } |
| 83 | 73 |
| 84 DnsProbeService::~DnsProbeService() { | 74 DnsProbeService::~DnsProbeService() { |
| 85 NetworkChangeNotifier::RemoveIPAddressObserver(this); | 75 NetworkChangeNotifier::RemoveDNSObserver(this); |
| 86 } | 76 } |
| 87 | 77 |
| 88 void DnsProbeService::ProbeDns(const DnsProbeService::CallbackType& callback) { | 78 void DnsProbeService::ProbeDns(const DnsProbeService::ProbeCallback& callback) { |
| 89 callbacks_.push_back(callback); | 79 pending_callbacks_.push_back(callback); |
| 90 | 80 |
| 91 if (state_ == STATE_RESULTS_CACHED && ResultsExpired()) | 81 if (state_ == STATE_RESULTS_CACHED && ResultsExpired()) |
| 92 ExpireResults(); | 82 ExpireResult(); |
| 93 | 83 |
| 94 switch (state_) { | 84 switch (state_) { |
| 95 case STATE_NO_RESULTS: | 85 case STATE_NO_RESULTS: |
| 96 StartProbes(); | 86 StartProbes(); |
| 97 break; | 87 break; |
| 98 case STATE_RESULTS_CACHED: | 88 case STATE_RESULTS_CACHED: |
| 99 CallCallbacks(); | 89 CallCallbacks(); |
| 100 break; | 90 break; |
| 101 case STATE_PROBE_RUNNING: | 91 case STATE_PROBE_RUNNING: |
| 102 // do nothing; probe is already running, and will call the callback | 92 // do nothing; probe is already running, and will call the callback |
| 103 break; | 93 break; |
| 104 } | 94 } |
| 105 } | 95 } |
| 106 | 96 |
| 107 scoped_ptr<DnsProbeJob> DnsProbeService::CreateSystemProbeJob( | 97 void DnsProbeService::ExpireResultForTesting() { |
| 108 const DnsProbeJob::CallbackType& job_callback) { | 98 ExpireResult(); |
| 109 DnsConfig system_config; | |
| 110 GetSystemDnsConfig(&system_config); | |
| 111 return CreateProbeJob(system_config, job_callback); | |
| 112 } | 99 } |
| 113 | 100 |
| 114 scoped_ptr<DnsProbeJob> DnsProbeService::CreatePublicProbeJob( | 101 DnsProbeRunner* DnsProbeService::GetProbeRunnerForTesting() { |
| 115 const DnsProbeJob::CallbackType& job_callback) { | 102 return &probe_runner_; |
| 116 DnsConfig public_config; | |
| 117 GetPublicDnsConfig(&public_config); | |
| 118 return CreateProbeJob(public_config, job_callback); | |
| 119 } | 103 } |
| 120 | 104 |
| 121 void DnsProbeService::OnIPAddressChanged() { | 105 void DnsProbeService::OnDNSChanged() { |
| 122 if (state_ == STATE_RESULTS_CACHED) | 106 ExpireResult(); |
| 123 ExpireResults(); | |
| 124 } | 107 } |
| 125 | 108 |
| 126 void DnsProbeService::ExpireResults() { | 109 void DnsProbeService::ExpireResult() { |
| 127 DCHECK_EQ(STATE_RESULTS_CACHED, state_); | 110 if (state_ == STATE_RESULTS_CACHED) { |
| 128 | 111 state_ = STATE_NO_RESULTS; |
| 129 state_ = STATE_NO_RESULTS; | 112 result_ = chrome_common_net::DNS_PROBE_MAX; |
| 130 result_ = chrome_common_net::DNS_PROBE_UNKNOWN; | 113 } |
| 131 } | 114 } |
| 132 | 115 |
| 133 void DnsProbeService::StartProbes() { | 116 void DnsProbeService::StartProbes() { |
| 134 DCHECK_NE(STATE_PROBE_RUNNING, state_); | 117 DCHECK_NE(STATE_PROBE_RUNNING, state_); |
| 135 DCHECK(!system_job_.get()); | |
| 136 DCHECK(!public_job_.get()); | |
| 137 | 118 |
| 138 DnsProbeJob::CallbackType job_callback = | 119 const DnsProbeRunner::ProbeCallback probe_callback = |
| 139 base::Bind(&DnsProbeService::OnProbeJobComplete, | 120 base::Bind(&DnsProbeService::OnProbeComplete, base::Unretained(this)); |
| 140 base::Unretained(this)); | |
| 141 | 121 |
| 142 // TODO(ttuttle): Do we want to keep explicit flags for "job done"? | 122 system_done_ = false; |
| 143 // Or maybe DnsProbeJob should have a "finished" flag? | 123 public_done_ = false; |
| 144 system_result_ = DnsProbeJob::SERVERS_UNKNOWN; | 124 system_result_ = DnsProbeRunner::UNKNOWN; |
| 145 public_result_ = DnsProbeJob::SERVERS_UNKNOWN; | 125 public_result_ = DnsProbeRunner::UNKNOWN; |
| 146 | |
| 147 system_job_ = CreateSystemProbeJob(job_callback); | |
| 148 public_job_ = CreatePublicProbeJob(job_callback); | |
| 149 | |
| 150 // If we can't create one or both jobs, fail the probe immediately. | |
| 151 if (!system_job_.get() || !public_job_.get()) { | |
| 152 system_job_.reset(); | |
| 153 public_job_.reset(); | |
| 154 state_ = STATE_RESULTS_CACHED; | |
| 155 // TODO(ttuttle): Should this be BAD_CONFIG? Currently I think it only | |
| 156 // happens when the system DnsConfig has no servers. | |
| 157 result_ = chrome_common_net::DNS_PROBE_UNKNOWN; | |
| 158 CallCallbacks(); | |
| 159 return; | |
| 160 } | |
| 161 | 126 |
| 162 state_ = STATE_PROBE_RUNNING; | 127 state_ = STATE_PROBE_RUNNING; |
| 163 probe_start_time_ = base::Time::Now(); | 128 probe_start_time_ = base::Time::Now(); |
| 129 |
| 130 probe_runner_.RunProbe(DnsProbeRunner::SYSTEM, probe_callback); |
| 131 probe_runner_.RunProbe(DnsProbeRunner::PUBLIC, probe_callback); |
| 164 } | 132 } |
| 165 | 133 |
| 166 void DnsProbeService::OnProbesComplete() { | 134 void DnsProbeService::OnProbesComplete() { |
| 167 DCHECK_EQ(STATE_PROBE_RUNNING, state_); | 135 DCHECK_EQ(STATE_PROBE_RUNNING, state_); |
| 168 | 136 |
| 169 state_ = STATE_RESULTS_CACHED; | 137 state_ = STATE_RESULTS_CACHED; |
| 170 result_ = EvaluateResults(); | 138 result_ = EvaluateResults(); |
| 171 | 139 |
| 172 HistogramProbes(); | 140 HistogramProbes(); |
| 173 | 141 |
| 174 CallCallbacks(); | 142 CallCallbacks(); |
| 175 } | 143 } |
| 176 | 144 |
| 145 // TODO(ttuttle): Make sure we're not changing result histogram mappings going |
| 146 // from DnsProbeJob to DnsProbeRunner. |
| 177 void DnsProbeService::HistogramProbes() const { | 147 void DnsProbeService::HistogramProbes() const { |
| 178 const DnsProbeResult kMaxResult = chrome_common_net::DNS_PROBE_MAX; | 148 const DnsProbeStatus kMaxStatus = chrome_common_net::DNS_PROBE_MAX; |
| 179 | 149 |
| 180 DCHECK_EQ(STATE_RESULTS_CACHED, state_); | 150 DCHECK_EQ(STATE_RESULTS_CACHED, state_); |
| 181 DCHECK_NE(kMaxResult, result_); | 151 DCHECK(chrome_common_net::DnsProbeStatusIsFinished(result_)); |
| 182 | 152 |
| 183 base::TimeDelta elapsed = base::Time::Now() - probe_start_time_; | 153 base::TimeDelta elapsed = base::Time::Now() - probe_start_time_; |
| 184 | 154 |
| 185 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Probe.Result", result_, kMaxResult); | 155 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Status", result_, kMaxStatus); |
| 186 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.Elapsed", elapsed); | 156 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed", elapsed); |
| 187 | 157 |
| 188 if (NetworkChangeNotifier::IsOffline()) { | 158 if (NetworkChangeNotifier::IsOffline()) { |
| 189 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Probe.NcnOffline.Result", | 159 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Status_NcnOffline", |
| 190 result_, kMaxResult); | 160 result_, kMaxStatus); |
| 191 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.NcnOffline.Elapsed", elapsed); | 161 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_NcnOffline", elapsed); |
| 192 } else { | 162 } else { |
| 193 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Probe.NcnOnline.Result", | 163 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Status_NcnOnline", |
| 194 result_, kMaxResult); | 164 result_, kMaxStatus); |
| 195 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.NcnOnline.Elapsed", elapsed); | 165 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_NcnOnline", elapsed); |
| 196 } | 166 } |
| 197 | 167 |
| 198 switch (result_) { | 168 switch (result_) { |
| 199 case chrome_common_net::DNS_PROBE_UNKNOWN: | 169 case chrome_common_net::DNS_PROBE_FINISHED_UNKNOWN: |
| 200 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.ResultUnknown.Elapsed", | 170 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_Unknown", |
| 201 elapsed); | 171 elapsed); |
| 202 break; | 172 break; |
| 203 case chrome_common_net::DNS_PROBE_NO_INTERNET: | 173 case chrome_common_net::DNS_PROBE_FINISHED_NO_INTERNET: |
| 204 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.ResultNoInternet.Elapsed", | 174 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_NoInternet", |
| 205 elapsed); | 175 elapsed); |
| 206 break; | 176 break; |
| 207 case chrome_common_net::DNS_PROBE_BAD_CONFIG: | 177 case chrome_common_net::DNS_PROBE_FINISHED_BAD_CONFIG: |
| 208 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.ResultBadConfig.Elapsed", | 178 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_BadConfig", |
| 209 elapsed); | |
| 210 | |
| 211 // Histogram some extra data to see why BAD_CONFIG is happening. | |
| 212 UMA_HISTOGRAM_ENUMERATION( | |
| 213 "DnsProbe.Probe.ResultBadConfig.SystemJobResult", | |
| 214 system_result_, | |
| 215 DnsProbeJob::MAX_RESULT); | |
| 216 UMA_HISTOGRAM_CUSTOM_COUNTS( | |
| 217 "DnsProbe.Probe.ResultBadConfig.SystemNameserverCount", | |
| 218 system_nameserver_count_, | |
| 219 0, kNameserverCountMax, kNameserverCountMax + 1); | |
| 220 UMA_HISTOGRAM_BOOLEAN( | |
| 221 "DnsProbe.Probe.ResultBadConfig.SystemIsLocalhost", | |
| 222 system_is_localhost_); | |
| 223 break; | |
| 224 case chrome_common_net::DNS_PROBE_NXDOMAIN: | |
| 225 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.ResultNxdomain.Elapsed", | |
| 226 elapsed); | 179 elapsed); |
| 227 break; | 180 break; |
| 181 case chrome_common_net::DNS_PROBE_FINISHED_NXDOMAIN: |
| 182 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_Nxdomain", |
| 183 elapsed); |
| 184 break; |
| 185 |
| 186 // These aren't actually results. |
| 187 case chrome_common_net::DNS_PROBE_POSSIBLE: |
| 188 case chrome_common_net::DNS_PROBE_NOT_RUN: |
| 189 case chrome_common_net::DNS_PROBE_STARTED: |
| 228 case chrome_common_net::DNS_PROBE_MAX: | 190 case chrome_common_net::DNS_PROBE_MAX: |
| 229 NOTREACHED(); | 191 NOTREACHED(); |
| 230 break; | 192 break; |
| 231 } | 193 } |
| 232 } | 194 } |
| 233 | 195 |
| 234 DnsProbeResult DnsProbeService::EvaluateResults() const { | 196 DnsProbeStatus DnsProbeService::EvaluateResults() const { |
| 235 DCHECK_NE(DnsProbeJob::SERVERS_UNKNOWN, system_result_); | 197 DCHECK_NE(DnsProbeRunner::UNKNOWN, system_result_); |
| 236 DCHECK_NE(DnsProbeJob::SERVERS_UNKNOWN, public_result_); | 198 DCHECK_NE(DnsProbeRunner::UNKNOWN, public_result_); |
| 237 | 199 |
| 238 // If the system DNS is working, assume the domain doesn't exist. | 200 // If the system DNS is working, assume the domain doesn't exist. |
| 239 if (system_result_ == DnsProbeJob::SERVERS_CORRECT) | 201 if (system_result_ == DnsProbeRunner::CORRECT) |
| 240 return chrome_common_net::DNS_PROBE_NXDOMAIN; | 202 return chrome_common_net::DNS_PROBE_FINISHED_NXDOMAIN; |
| 241 | 203 |
| 242 // If the system DNS is not working but another public server is, assume the | 204 // If the system DNS is not working but another public server is, assume the |
| 243 // DNS config is bad (or perhaps the DNS servers are down or broken). | 205 // DNS config is bad (or perhaps the DNS servers are down or broken). |
| 244 if (public_result_ == DnsProbeJob::SERVERS_CORRECT) | 206 if (public_result_ == DnsProbeRunner::CORRECT) |
| 245 return chrome_common_net::DNS_PROBE_BAD_CONFIG; | 207 return chrome_common_net::DNS_PROBE_FINISHED_BAD_CONFIG; |
| 246 | 208 |
| 247 // If the system DNS is not working and another public server is unreachable, | 209 // If the system DNS is not working and another public server is unreachable, |
| 248 // assume the internet connection is down (note that system DNS may be a | 210 // assume the internet connection is down (note that system DNS may be a |
| 249 // router on the LAN, so it may be reachable but returning errors.) | 211 // router on the LAN, so it may be reachable but returning errors.) |
| 250 if (public_result_ == DnsProbeJob::SERVERS_UNREACHABLE) | 212 if (public_result_ == DnsProbeRunner::UNREACHABLE) |
| 251 return chrome_common_net::DNS_PROBE_NO_INTERNET; | 213 return chrome_common_net::DNS_PROBE_FINISHED_NO_INTERNET; |
| 252 | 214 |
| 253 // Otherwise: the system DNS is not working and another public server is | 215 // Otherwise: the system DNS is not working and another public server is |
| 254 // responding but with errors or incorrect results. This is an awkward case; | 216 // responding but with errors or incorrect results. This is an awkward case; |
| 255 // an invasive captive portal or a restrictive firewall may be intercepting | 217 // an invasive captive portal or a restrictive firewall may be intercepting |
| 256 // or rewriting DNS traffic, or the public server may itself be failing or | 218 // or rewriting DNS traffic, or the public server may itself be failing or |
| 257 // down. | 219 // down. |
| 258 return chrome_common_net::DNS_PROBE_UNKNOWN; | 220 return chrome_common_net::DNS_PROBE_FINISHED_UNKNOWN; |
| 259 } | 221 } |
| 260 | 222 |
| 261 void DnsProbeService::CallCallbacks() { | 223 void DnsProbeService::CallCallbacks() { |
| 262 DCHECK_EQ(STATE_RESULTS_CACHED, state_); | 224 DCHECK_EQ(STATE_RESULTS_CACHED, state_); |
| 263 DCHECK(!callbacks_.empty()); | 225 DCHECK(chrome_common_net::DnsProbeStatusIsFinished(result_)); |
| 226 DCHECK(!pending_callbacks_.empty()); |
| 264 | 227 |
| 265 std::vector<CallbackType> callbacks = callbacks_; | 228 std::vector<ProbeCallback> callbacks = pending_callbacks_; |
| 266 callbacks_.clear(); | 229 pending_callbacks_.clear(); |
| 267 | 230 |
| 268 for (std::vector<CallbackType>::const_iterator i = callbacks.begin(); | 231 for (std::vector<ProbeCallback>::const_iterator i = callbacks.begin(); |
| 269 i != callbacks.end(); ++i) { | 232 i != callbacks.end(); ++i) { |
| 270 i->Run(result_); | 233 i->Run(result_); |
| 271 } | 234 } |
| 272 } | 235 } |
| 273 | 236 |
| 274 scoped_ptr<DnsProbeJob> DnsProbeService::CreateProbeJob( | 237 void DnsProbeService::OnProbeComplete(DnsProbeRunner::Type type, |
| 275 const DnsConfig& dns_config, | 238 DnsProbeRunner::Result result) { |
| 276 const DnsProbeJob::CallbackType& job_callback) { | |
| 277 if (!dns_config.IsValid()) | |
| 278 return scoped_ptr<DnsProbeJob>(NULL); | |
| 279 | |
| 280 scoped_ptr<DnsClient> dns_client(DnsClient::CreateClient(NULL)); | |
| 281 dns_client->SetConfig(dns_config); | |
| 282 return DnsProbeJob::CreateJob(dns_client.Pass(), job_callback, NULL); | |
| 283 } | |
| 284 | |
| 285 void DnsProbeService::OnProbeJobComplete(DnsProbeJob* job, | |
| 286 DnsProbeJob::Result result) { | |
| 287 DCHECK_EQ(STATE_PROBE_RUNNING, state_); | 239 DCHECK_EQ(STATE_PROBE_RUNNING, state_); |
| 288 | 240 |
| 289 if (job == system_job_.get()) { | 241 switch (type) { |
| 242 case DnsProbeRunner::SYSTEM: |
| 243 DCHECK(!system_done_); |
| 290 system_result_ = result; | 244 system_result_ = result; |
| 291 system_job_.reset(); | 245 system_done_ = true; |
| 292 } else if (job == public_job_.get()) { | 246 break; |
| 247 case DnsProbeRunner::PUBLIC: |
| 248 DCHECK(!public_done_); |
| 293 public_result_ = result; | 249 public_result_ = result; |
| 294 public_job_.reset(); | 250 public_done_ = true; |
| 295 } else { | |
| 296 NOTREACHED(); | |
| 297 return; | |
| 298 } | 251 } |
| 299 | 252 |
| 300 if (system_result_ != DnsProbeJob::SERVERS_UNKNOWN && | 253 if (system_done_ && public_done_) { |
| 301 public_result_ != DnsProbeJob::SERVERS_UNKNOWN) { | |
| 302 OnProbesComplete(); | 254 OnProbesComplete(); |
| 303 } | 255 } |
| 304 } | 256 } |
| 305 | 257 |
| 306 void DnsProbeService::GetSystemDnsConfig(DnsConfig* config) { | |
| 307 NetworkChangeNotifier::GetDnsConfig(config); | |
| 308 | |
| 309 // DNS probes don't need or want the suffix search list populated | |
| 310 config->search.clear(); | |
| 311 | |
| 312 if (dns_attempts_ != kAttemptsUseDefault) | |
| 313 config->attempts = dns_attempts_; | |
| 314 | |
| 315 // Take notes in case the config turns out to be bad, so we can histogram | |
| 316 // some useful data. | |
| 317 system_nameserver_count_ = config->nameservers.size(); | |
| 318 system_is_localhost_ = (system_nameserver_count_ == 1) | |
| 319 && IsLocalhost(config->nameservers[0].address()); | |
| 320 | |
| 321 // Disable port randomization. | |
| 322 config->randomize_ports = false; | |
| 323 } | |
| 324 | |
| 325 void DnsProbeService::GetPublicDnsConfig(DnsConfig* config) { | |
| 326 *config = DnsConfig(); | |
| 327 | |
| 328 config->nameservers.push_back(MakeDnsEndPoint(kPublicDnsPrimary)); | |
| 329 config->nameservers.push_back(MakeDnsEndPoint(kPublicDnsSecondary)); | |
| 330 | |
| 331 if (dns_attempts_ != kAttemptsUseDefault) | |
| 332 config->attempts = dns_attempts_; | |
| 333 | |
| 334 // Disable port randomization. | |
| 335 config->randomize_ports = false; | |
| 336 } | |
| 337 | |
| 338 bool DnsProbeService::ResultsExpired() { | 258 bool DnsProbeService::ResultsExpired() { |
| 339 const base::TimeDelta kMaxResultAge = | 259 const base::TimeDelta kMaxResultAge = |
| 340 base::TimeDelta::FromMilliseconds(kMaxResultAgeMs); | 260 base::TimeDelta::FromMilliseconds(kMaxResultAgeMs); |
| 341 return base::Time::Now() - probe_start_time_ > kMaxResultAge; | 261 return base::Time::Now() - probe_start_time_ > kMaxResultAge; |
| 342 } | 262 } |
| 343 | |
| 344 } // namespace chrome_browser_net | |
| OLD | NEW |