Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(68)

Side by Side Diff: chrome/browser/net/dns_probe_service.cc

Issue 13270005: Display DNS probe results. (Closed) Base URL: http://git.chromium.org/chromium/src.git@master
Patch Set: Tweak things, clean up unit tests Created 7 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/net/dns_probe_service.h" 5 #include "chrome/browser/net/dns_probe_service.h"
6 6
7 #include "base/metrics/field_trial.h" 7 #include "base/metrics/field_trial.h"
8 #include "base/metrics/histogram.h" 8 #include "base/metrics/histogram.h"
9 #include "base/strings/string_number_conversions.h" 9 #include "base/strings/string_number_conversions.h"
10 #include "chrome/browser/net/dns_probe_job.h"
11 #include "chrome/common/net/net_error_info.h"
12 #include "net/base/ip_endpoint.h" 10 #include "net/base/ip_endpoint.h"
13 #include "net/base/net_util.h" 11 #include "net/base/net_util.h"
14 #include "net/dns/dns_client.h" 12 #include "net/dns/dns_client.h"
15 #include "net/dns/dns_config_service.h" 13 #include "net/dns/dns_config_service.h"
16 #include "net/dns/dns_protocol.h" 14 #include "net/dns/dns_protocol.h"
17 15
18 using base::FieldTrialList; 16 using base::FieldTrialList;
19 using base::StringToInt; 17 using base::StringToInt;
20 using chrome_common_net::DnsProbeResult; 18 using chrome_common_net::DnsProbeStatus;
21 using net::DnsClient; 19 using net::DnsClient;
22 using net::DnsConfig; 20 using net::DnsConfig;
23 using net::IPAddressNumber; 21 using net::IPAddressNumber;
24 using net::IPEndPoint; 22 using net::IPEndPoint;
25 using net::ParseIPLiteralToNumber; 23 using net::ParseIPLiteralToNumber;
26 using net::NetworkChangeNotifier; 24 using net::NetworkChangeNotifier;
27 25
28 namespace chrome_browser_net {
29
30 namespace { 26 namespace {
31 27
32 // How long the DnsProbeService will cache the probe result for. 28 // How long the DnsProbeService will cache the probe result for.
33 // If it's older than this and we get a probe request, the service expires it 29 // If it's older than this and we get a probe request, the service expires it
34 // and starts a new probe. 30 // and starts a new probe.
35 const int kMaxResultAgeMs = 5000; 31 const int kMaxResultAgeMs = 5000;
36 32
37 // The public DNS servers used by the DnsProbeService to verify internet 33 // The public DNS servers used by the DnsProbeService to verify internet
38 // connectivity. 34 // connectivity.
39 const char kPublicDnsPrimary[] = "8.8.8.8"; 35 const char kGooglePublicDns1[] = "8.8.8.8";
40 const char kPublicDnsSecondary[] = "8.8.4.4"; 36 const char kGooglePublicDns2[] = "8.8.4.4";
41 37
42 IPEndPoint MakeDnsEndPoint(const std::string& dns_ip_literal) { 38 IPEndPoint MakeDnsEndPoint(const std::string& dns_ip_literal) {
43 IPAddressNumber dns_ip_number; 39 IPAddressNumber dns_ip_number;
44 bool rv = ParseIPLiteralToNumber(dns_ip_literal, &dns_ip_number); 40 bool rv = ParseIPLiteralToNumber(dns_ip_literal, &dns_ip_number);
45 DCHECK(rv); 41 DCHECK(rv);
46 return IPEndPoint(dns_ip_number, net::dns_protocol::kDefaultPort); 42 return IPEndPoint(dns_ip_number, net::dns_protocol::kDefaultPort);
47 } 43 }
48 44
49 const int kAttemptsUseDefault = -1;
50
51 const char kAttemptsFieldTrialName[] = "DnsProbe-Attempts";
52
53 int GetAttemptsFromFieldTrial() {
54 std::string group = FieldTrialList::FindFullName(kAttemptsFieldTrialName);
55 if (group == "" || group == "default")
56 return kAttemptsUseDefault;
57
58 int attempts;
59 if (!StringToInt(group, &attempts))
60 return kAttemptsUseDefault;
61
62 return attempts;
63 }
64
65 bool IsLocalhost(const IPAddressNumber& ip) {
66 return (ip.size() == net::kIPv4AddressSize)
67 && (ip[0] == 127) && (ip[1] == 0) && (ip[2] == 0) && (ip[3] == 1);
68 }
69
70 // The maximum number of nameservers counted in histograms.
71 const int kNameserverCountMax = 10;
72
73 } // namespace 45 } // namespace
74 46
47 namespace chrome_browser_net {
48
75 DnsProbeService::DnsProbeService() 49 DnsProbeService::DnsProbeService()
76 : system_result_(DnsProbeJob::SERVERS_UNKNOWN), 50 : state_(STATE_NO_RESULTS) {
77 public_result_(DnsProbeJob::SERVERS_UNKNOWN), 51 NetworkChangeNotifier::AddDNSObserver(this);
78 state_(STATE_NO_RESULTS), 52 SetSystemClientToCurrentConfig();
79 result_(chrome_common_net::DNS_PROBE_UNKNOWN), 53 SetPublicClientToGooglePublicDns();
80 dns_attempts_(GetAttemptsFromFieldTrial()) {
81 NetworkChangeNotifier::AddIPAddressObserver(this);
82 } 54 }
83 55
84 DnsProbeService::~DnsProbeService() { 56 DnsProbeService::~DnsProbeService() {
85 NetworkChangeNotifier::RemoveIPAddressObserver(this); 57 NetworkChangeNotifier::RemoveDNSObserver(this);
86 } 58 }
87 59
88 void DnsProbeService::ProbeDns(const DnsProbeService::CallbackType& callback) { 60 void DnsProbeService::ProbeDns(const DnsProbeService::ProbeCallback& callback) {
89 callbacks_.push_back(callback); 61 pending_callbacks_.push_back(callback);
90 62
91 if (state_ == STATE_RESULTS_CACHED && ResultsExpired()) 63 if (state_ == STATE_RESULTS_CACHED && ResultsExpired())
92 ExpireResults(); 64 ExpireResult();
93 65
94 switch (state_) { 66 switch (state_) {
95 case STATE_NO_RESULTS: 67 case STATE_NO_RESULTS:
96 StartProbes(); 68 StartProbes();
97 break; 69 break;
98 case STATE_RESULTS_CACHED: 70 case STATE_RESULTS_CACHED:
99 CallCallbacks(); 71 CallCallbacks();
100 break; 72 break;
101 case STATE_PROBE_RUNNING: 73 case STATE_PROBE_RUNNING:
102 // do nothing; probe is already running, and will call the callback 74 // do nothing; probe is already running, and will call the callback
103 break; 75 break;
104 } 76 }
105 } 77 }
106 78
107 scoped_ptr<DnsProbeJob> DnsProbeService::CreateSystemProbeJob( 79 void DnsProbeService::OnDNSChanged() {
108 const DnsProbeJob::CallbackType& job_callback) { 80 ExpireResult();
81 SetSystemClientToCurrentConfig();
82 }
83
84 void DnsProbeService::SetSystemClientForTesting(
85 scoped_ptr<DnsClient> system_client) {
86 SetSystemClient(system_client.Pass());
87 }
88
89 void DnsProbeService::SetPublicClientForTesting(
90 scoped_ptr<DnsClient> public_client) {
91 SetPublicClient(public_client.Pass());
92 }
93
94 void DnsProbeService::ExpireResultForTesting() {
95 ExpireResult();
96 }
97
98 void DnsProbeService::SetSystemClientToCurrentConfig() {
109 DnsConfig system_config; 99 DnsConfig system_config;
110 GetSystemDnsConfig(&system_config); 100 NetworkChangeNotifier::GetDnsConfig(&system_config);
111 return CreateProbeJob(system_config, job_callback); 101 system_config.search.clear();
112 } 102 system_config.attempts = 1;
113 103 system_config.randomize_ports = false;
114 scoped_ptr<DnsProbeJob> DnsProbeService::CreatePublicProbeJob( 104
115 const DnsProbeJob::CallbackType& job_callback) { 105 scoped_ptr<DnsClient> system_client(DnsClient::CreateClient(NULL));
106 system_client->SetConfig(system_config);
107
108 SetSystemClient(system_client.Pass());
109 }
110
111 void DnsProbeService::SetPublicClientToGooglePublicDns() {
116 DnsConfig public_config; 112 DnsConfig public_config;
117 GetPublicDnsConfig(&public_config); 113 public_config.nameservers.push_back(MakeDnsEndPoint(kGooglePublicDns1));
118 return CreateProbeJob(public_config, job_callback); 114 public_config.nameservers.push_back(MakeDnsEndPoint(kGooglePublicDns1));
119 } 115 public_config.attempts = 1;
120 116 public_config.randomize_ports = false;
121 void DnsProbeService::OnIPAddressChanged() { 117
122 if (state_ == STATE_RESULTS_CACHED) 118 scoped_ptr<DnsClient> public_client(DnsClient::CreateClient(NULL));
123 ExpireResults(); 119 public_client->SetConfig(public_config);
124 } 120
125 121 SetPublicClient(public_client.Pass());
126 void DnsProbeService::ExpireResults() { 122 }
127 DCHECK_EQ(STATE_RESULTS_CACHED, state_); 123
128 124 void DnsProbeService::SetSystemClient(scoped_ptr<DnsClient> system_client) {
129 state_ = STATE_NO_RESULTS; 125 system_runner_.SetClient(system_client.Pass());
szym 2013/06/13 20:50:48 I don't think these wrapper functions help much. M
Deprecated (see juliatuttle) 2013/06/18 19:36:37 Done.
130 result_ = chrome_common_net::DNS_PROBE_UNKNOWN; 126 }
127
128 void DnsProbeService::SetPublicClient(scoped_ptr<DnsClient> public_client) {
129 public_runner_.SetClient(public_client.Pass());
131 } 130 }
132 131
133 void DnsProbeService::StartProbes() { 132 void DnsProbeService::StartProbes() {
134 DCHECK_NE(STATE_PROBE_RUNNING, state_); 133 DCHECK_EQ(STATE_NO_RESULTS, state_);
135 DCHECK(!system_job_.get());
136 DCHECK(!public_job_.get());
137
138 DnsProbeJob::CallbackType job_callback =
139 base::Bind(&DnsProbeService::OnProbeJobComplete,
140 base::Unretained(this));
141
142 // TODO(ttuttle): Do we want to keep explicit flags for "job done"?
143 // Or maybe DnsProbeJob should have a "finished" flag?
144 system_result_ = DnsProbeJob::SERVERS_UNKNOWN;
145 public_result_ = DnsProbeJob::SERVERS_UNKNOWN;
146
147 system_job_ = CreateSystemProbeJob(job_callback);
148 public_job_ = CreatePublicProbeJob(job_callback);
149
150 // If we can't create one or both jobs, fail the probe immediately.
151 if (!system_job_.get() || !public_job_.get()) {
152 system_job_.reset();
153 public_job_.reset();
154 state_ = STATE_RESULTS_CACHED;
155 // TODO(ttuttle): Should this be BAD_CONFIG? Currently I think it only
156 // happens when the system DnsConfig has no servers.
157 result_ = chrome_common_net::DNS_PROBE_UNKNOWN;
158 CallCallbacks();
159 return;
160 }
161 134
162 state_ = STATE_PROBE_RUNNING; 135 state_ = STATE_PROBE_RUNNING;
163 probe_start_time_ = base::Time::Now(); 136 probe_start_time_ = base::Time::Now();
164 } 137
165 138 DCHECK(!system_runner_.IsRunning());
166 void DnsProbeService::OnProbesComplete() { 139 DCHECK(!public_runner_.IsRunning());
140
141 // Probes can call us back synchronously (e.g. if the connect call fails
142 // becasue we have no working network interfaces).
143 const base::Callback<void(ProbeType, DnsProbeRunner::Result)> callback =
144 base::Bind(&DnsProbeService::OnProbeComplete, base::Unretained(this));
145 system_runner_.RunProbe(base::Bind(callback, SYSTEM));
146 public_runner_.RunProbe(base::Bind(callback, PUBLIC));
147
148 DCHECK(system_runner_.IsRunning());
szym 2013/06/13 20:50:48 I think this DCHECK will fail if the probe runner
Deprecated (see juliatuttle) 2013/06/18 19:36:37 The probe runner can't, anymore. (There was alrea
149 DCHECK(public_runner_.IsRunning());
150 }
151
152 void DnsProbeService::OnProbeComplete(
153 ProbeType type,
154 DnsProbeRunner::Result result) {
167 DCHECK_EQ(STATE_PROBE_RUNNING, state_); 155 DCHECK_EQ(STATE_PROBE_RUNNING, state_);
168 156
157 switch (type) {
158 case SYSTEM:
159 DCHECK(!system_runner_.IsRunning());
160 system_result_ = result;
szym 2013/06/13 20:50:48 You could simplify this if you put the last result
Deprecated (see juliatuttle) 2013/06/18 19:36:37 Done.
161 break;
162 case PUBLIC:
163 DCHECK(!public_runner_.IsRunning());
164 public_result_ = result;
165 break;
166 default:
167 NOTREACHED();
168 return;
169 }
170
171 if (system_runner_.IsRunning() || public_runner_.IsRunning())
172 return;
173
169 state_ = STATE_RESULTS_CACHED; 174 state_ = STATE_RESULTS_CACHED;
170 result_ = EvaluateResults(); 175 cached_result_ = EvaluateResults();
171 176
172 HistogramProbes(); 177 HistogramProbes();
173 178
174 CallCallbacks(); 179 CallCallbacks();
175 } 180 }
176 181
177 void DnsProbeService::HistogramProbes() const { 182 DnsProbeStatus DnsProbeService::EvaluateResults() const {
178 const DnsProbeResult kMaxResult = chrome_common_net::DNS_PROBE_MAX; 183 DCHECK_NE(DnsProbeRunner::UNKNOWN, system_result_);
179 184 DCHECK_NE(DnsProbeRunner::UNKNOWN, public_result_);
180 DCHECK_EQ(STATE_RESULTS_CACHED, state_);
181 DCHECK_NE(kMaxResult, result_);
182
183 base::TimeDelta elapsed = base::Time::Now() - probe_start_time_;
184
185 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Probe.Result", result_, kMaxResult);
186 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.Elapsed", elapsed);
187
188 if (NetworkChangeNotifier::IsOffline()) {
189 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Probe.NcnOffline.Result",
190 result_, kMaxResult);
191 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.NcnOffline.Elapsed", elapsed);
192 } else {
193 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Probe.NcnOnline.Result",
194 result_, kMaxResult);
195 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.NcnOnline.Elapsed", elapsed);
196 }
197
198 switch (result_) {
199 case chrome_common_net::DNS_PROBE_UNKNOWN:
200 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.ResultUnknown.Elapsed",
201 elapsed);
202 break;
203 case chrome_common_net::DNS_PROBE_NO_INTERNET:
204 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.ResultNoInternet.Elapsed",
205 elapsed);
206 break;
207 case chrome_common_net::DNS_PROBE_BAD_CONFIG:
208 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.ResultBadConfig.Elapsed",
209 elapsed);
210
211 // Histogram some extra data to see why BAD_CONFIG is happening.
212 UMA_HISTOGRAM_ENUMERATION(
213 "DnsProbe.Probe.ResultBadConfig.SystemJobResult",
214 system_result_,
215 DnsProbeJob::MAX_RESULT);
216 UMA_HISTOGRAM_CUSTOM_COUNTS(
217 "DnsProbe.Probe.ResultBadConfig.SystemNameserverCount",
218 system_nameserver_count_,
219 0, kNameserverCountMax, kNameserverCountMax + 1);
220 UMA_HISTOGRAM_BOOLEAN(
221 "DnsProbe.Probe.ResultBadConfig.SystemIsLocalhost",
222 system_is_localhost_);
223 break;
224 case chrome_common_net::DNS_PROBE_NXDOMAIN:
225 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.ResultNxdomain.Elapsed",
226 elapsed);
227 break;
228 case chrome_common_net::DNS_PROBE_MAX:
229 NOTREACHED();
230 break;
231 }
232 }
233
234 DnsProbeResult DnsProbeService::EvaluateResults() const {
235 DCHECK_NE(DnsProbeJob::SERVERS_UNKNOWN, system_result_);
236 DCHECK_NE(DnsProbeJob::SERVERS_UNKNOWN, public_result_);
237 185
238 // If the system DNS is working, assume the domain doesn't exist. 186 // If the system DNS is working, assume the domain doesn't exist.
239 if (system_result_ == DnsProbeJob::SERVERS_CORRECT) 187 if (system_result_ == DnsProbeRunner::CORRECT)
240 return chrome_common_net::DNS_PROBE_NXDOMAIN; 188 return chrome_common_net::DNS_PROBE_FINISHED_NXDOMAIN;
241 189
242 // If the system DNS is not working but another public server is, assume the 190 // If the system DNS is not working but another public server is, assume the
243 // DNS config is bad (or perhaps the DNS servers are down or broken). 191 // DNS config is bad (or perhaps the DNS servers are down or broken).
244 if (public_result_ == DnsProbeJob::SERVERS_CORRECT) 192 if (public_result_ == DnsProbeRunner::CORRECT)
245 return chrome_common_net::DNS_PROBE_BAD_CONFIG; 193 return chrome_common_net::DNS_PROBE_FINISHED_BAD_CONFIG;
246 194
247 // If the system DNS is not working and another public server is unreachable, 195 // If the system DNS is not working and another public server is unreachable,
248 // assume the internet connection is down (note that system DNS may be a 196 // assume the internet connection is down (note that system DNS may be a
249 // router on the LAN, so it may be reachable but returning errors.) 197 // router on the LAN, so it may be reachable but returning errors.)
250 if (public_result_ == DnsProbeJob::SERVERS_UNREACHABLE) 198 if (public_result_ == DnsProbeRunner::UNREACHABLE)
251 return chrome_common_net::DNS_PROBE_NO_INTERNET; 199 return chrome_common_net::DNS_PROBE_FINISHED_NO_INTERNET;
252 200
253 // Otherwise: the system DNS is not working and another public server is 201 // Otherwise: the system DNS is not working and another public server is
254 // responding but with errors or incorrect results. This is an awkward case; 202 // responding but with errors or incorrect results. This is an awkward case;
255 // an invasive captive portal or a restrictive firewall may be intercepting 203 // an invasive captive portal or a restrictive firewall may be intercepting
256 // or rewriting DNS traffic, or the public server may itself be failing or 204 // or rewriting DNS traffic, or the public server may itself be failing or
257 // down. 205 // down.
258 return chrome_common_net::DNS_PROBE_UNKNOWN; 206 return chrome_common_net::DNS_PROBE_FINISHED_UNKNOWN;
207 }
208
209 // TODO(ttuttle): Make sure we're not changing result histogram mappings going
210 // from DnsProbeJob to DnsProbeRunner.
211 void DnsProbeService::HistogramProbes() const {
212 const DnsProbeStatus kMaxStatus = chrome_common_net::DNS_PROBE_MAX;
213
214 DCHECK_EQ(STATE_RESULTS_CACHED, state_);
215 DCHECK(chrome_common_net::DnsProbeStatusIsFinished(cached_result_));
216
217 base::TimeDelta elapsed = base::Time::Now() - probe_start_time_;
218
219 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Status", cached_result_, kMaxStatus);
220 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed", elapsed);
221
222 if (NetworkChangeNotifier::IsOffline()) {
223 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Status_NcnOffline",
224 cached_result_, kMaxStatus);
225 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_NcnOffline", elapsed);
226 } else {
227 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Status_NcnOnline",
228 cached_result_, kMaxStatus);
229 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_NcnOnline", elapsed);
230 }
231
232 switch (cached_result_) {
233 case chrome_common_net::DNS_PROBE_FINISHED_UNKNOWN:
234 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_Unknown",
235 elapsed);
236 break;
237 case chrome_common_net::DNS_PROBE_FINISHED_NO_INTERNET:
238 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_NoInternet",
239 elapsed);
240 break;
241 case chrome_common_net::DNS_PROBE_FINISHED_BAD_CONFIG:
242 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_BadConfig",
243 elapsed);
244 break;
245 case chrome_common_net::DNS_PROBE_FINISHED_NXDOMAIN:
246 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_Nxdomain",
247 elapsed);
248 break;
249
250 // These aren't actually results.
251 case chrome_common_net::DNS_PROBE_POSSIBLE:
252 case chrome_common_net::DNS_PROBE_NOT_RUN:
253 case chrome_common_net::DNS_PROBE_STARTED:
254 case chrome_common_net::DNS_PROBE_MAX:
255 NOTREACHED();
256 break;
257 }
259 } 258 }
260 259
261 void DnsProbeService::CallCallbacks() { 260 void DnsProbeService::CallCallbacks() {
262 DCHECK_EQ(STATE_RESULTS_CACHED, state_); 261 DCHECK_EQ(STATE_RESULTS_CACHED, state_);
263 DCHECK(!callbacks_.empty()); 262 DCHECK(chrome_common_net::DnsProbeStatusIsFinished(cached_result_));
264 263 DCHECK(!pending_callbacks_.empty());
265 std::vector<CallbackType> callbacks = callbacks_; 264
266 callbacks_.clear(); 265 std::vector<ProbeCallback> callbacks = pending_callbacks_;
267 266 pending_callbacks_.clear();
268 for (std::vector<CallbackType>::const_iterator i = callbacks.begin(); 267
268 for (std::vector<ProbeCallback>::const_iterator i = callbacks.begin();
269 i != callbacks.end(); ++i) { 269 i != callbacks.end(); ++i) {
270 i->Run(result_); 270 i->Run(cached_result_);
271 } 271 }
272 } 272 }
273 273
274 scoped_ptr<DnsProbeJob> DnsProbeService::CreateProbeJob( 274 void DnsProbeService::ExpireResult() {
275 const DnsConfig& dns_config, 275 if (state_ == STATE_RESULTS_CACHED) {
276 const DnsProbeJob::CallbackType& job_callback) { 276 state_ = STATE_NO_RESULTS;
277 if (!dns_config.IsValid()) 277 cached_result_ = chrome_common_net::DNS_PROBE_MAX;
278 return scoped_ptr<DnsProbeJob>(); 278 }
279 279 }
280 scoped_ptr<DnsClient> dns_client(DnsClient::CreateClient(NULL)); 280
281 dns_client->SetConfig(dns_config); 281 bool DnsProbeService::ResultsExpired() const {
282 return DnsProbeJob::CreateJob(dns_client.Pass(), job_callback, NULL);
283 }
284
285 void DnsProbeService::OnProbeJobComplete(DnsProbeJob* job,
286 DnsProbeJob::Result result) {
287 DCHECK_EQ(STATE_PROBE_RUNNING, state_);
288
289 if (job == system_job_.get()) {
290 system_result_ = result;
291 system_job_.reset();
292 } else if (job == public_job_.get()) {
293 public_result_ = result;
294 public_job_.reset();
295 } else {
296 NOTREACHED();
297 return;
298 }
299
300 if (system_result_ != DnsProbeJob::SERVERS_UNKNOWN &&
301 public_result_ != DnsProbeJob::SERVERS_UNKNOWN) {
302 OnProbesComplete();
303 }
304 }
305
306 void DnsProbeService::GetSystemDnsConfig(DnsConfig* config) {
307 NetworkChangeNotifier::GetDnsConfig(config);
308
309 // DNS probes don't need or want the suffix search list populated
310 config->search.clear();
311
312 if (dns_attempts_ != kAttemptsUseDefault)
313 config->attempts = dns_attempts_;
314
315 // Take notes in case the config turns out to be bad, so we can histogram
316 // some useful data.
317 system_nameserver_count_ = config->nameservers.size();
318 system_is_localhost_ = (system_nameserver_count_ == 1)
319 && IsLocalhost(config->nameservers[0].address());
320
321 // Disable port randomization.
322 config->randomize_ports = false;
323 }
324
325 void DnsProbeService::GetPublicDnsConfig(DnsConfig* config) {
326 *config = DnsConfig();
327
328 config->nameservers.push_back(MakeDnsEndPoint(kPublicDnsPrimary));
329 config->nameservers.push_back(MakeDnsEndPoint(kPublicDnsSecondary));
330
331 if (dns_attempts_ != kAttemptsUseDefault)
332 config->attempts = dns_attempts_;
333
334 // Disable port randomization.
335 config->randomize_ports = false;
336 }
337
338 bool DnsProbeService::ResultsExpired() {
339 const base::TimeDelta kMaxResultAge = 282 const base::TimeDelta kMaxResultAge =
340 base::TimeDelta::FromMilliseconds(kMaxResultAgeMs); 283 base::TimeDelta::FromMilliseconds(kMaxResultAgeMs);
341 return base::Time::Now() - probe_start_time_ > kMaxResultAge; 284 return base::Time::Now() - probe_start_time_ > kMaxResultAge;
342 } 285 }
343 286
344 } // namespace chrome_browser_net 287 } // namespace chrome_browser_net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698