Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(177)

Side by Side Diff: chrome/browser/net/dns_probe_service.cc

Issue 13270005: Display DNS probe results. (Closed) Base URL: http://git.chromium.org/chromium/src.git@master
Patch Set: Fix moar nits Created 7 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/net/dns_probe_service.h" 5 #include "chrome/browser/net/dns_probe_service.h"
6 6
7 #include "base/metrics/field_trial.h" 7 #include "base/metrics/field_trial.h"
8 #include "base/metrics/histogram.h" 8 #include "base/metrics/histogram.h"
9 #include "base/strings/string_number_conversions.h" 9 #include "base/strings/string_number_conversions.h"
10 #include "chrome/browser/net/dns_probe_job.h"
11 #include "chrome/common/net/net_error_info.h"
12 #include "net/base/ip_endpoint.h" 10 #include "net/base/ip_endpoint.h"
13 #include "net/base/net_util.h" 11 #include "net/base/net_util.h"
14 #include "net/dns/dns_client.h" 12 #include "net/dns/dns_client.h"
15 #include "net/dns/dns_config_service.h" 13 #include "net/dns/dns_config_service.h"
16 #include "net/dns/dns_protocol.h" 14 #include "net/dns/dns_protocol.h"
17 15
18 using base::FieldTrialList; 16 using base::FieldTrialList;
19 using base::StringToInt; 17 using base::StringToInt;
20 using chrome_common_net::DnsProbeResult; 18 using chrome_common_net::DnsProbeStatus;
21 using net::DnsClient; 19 using net::DnsClient;
22 using net::DnsConfig; 20 using net::DnsConfig;
23 using net::IPAddressNumber; 21 using net::IPAddressNumber;
24 using net::IPEndPoint; 22 using net::IPEndPoint;
25 using net::ParseIPLiteralToNumber; 23 using net::ParseIPLiteralToNumber;
26 using net::NetworkChangeNotifier; 24 using net::NetworkChangeNotifier;
27 25
28 namespace chrome_browser_net { 26 namespace chrome_browser_net {
29 27
30 namespace { 28 namespace {
31 29
32 // How long the DnsProbeService will cache the probe result for. 30 // How long the DnsProbeService will cache the probe result for.
33 // If it's older than this and we get a probe request, the service expires it 31 // If it's older than this and we get a probe request, the service expires it
34 // and starts a new probe. 32 // and starts a new probe.
35 const int kMaxResultAgeMs = 5000; 33 const int kMaxResultAgeMs = 5000;
36 34
37 // The public DNS servers used by the DnsProbeService to verify internet 35 // The public DNS servers used by the DnsProbeService to verify internet
38 // connectivity. 36 // connectivity.
39 const char kPublicDnsPrimary[] = "8.8.8.8"; 37 const char kGooglePublicDns1[] = "8.8.8.8";
40 const char kPublicDnsSecondary[] = "8.8.4.4"; 38 const char kGooglePublicDns2[] = "8.8.4.4";
41 39
42 IPEndPoint MakeDnsEndPoint(const std::string& dns_ip_literal) { 40 IPEndPoint MakeDnsEndPoint(const std::string& dns_ip_literal) {
43 IPAddressNumber dns_ip_number; 41 IPAddressNumber dns_ip_number;
44 bool rv = ParseIPLiteralToNumber(dns_ip_literal, &dns_ip_number); 42 bool rv = ParseIPLiteralToNumber(dns_ip_literal, &dns_ip_number);
45 DCHECK(rv); 43 DCHECK(rv);
46 return IPEndPoint(dns_ip_number, net::dns_protocol::kDefaultPort); 44 return IPEndPoint(dns_ip_number, net::dns_protocol::kDefaultPort);
47 } 45 }
48 46
49 const int kAttemptsUseDefault = -1; 47 DnsProbeStatus EvaluateResults(DnsProbeRunner::Result system_result,
50 48 DnsProbeRunner::Result public_result) {
51 const char kAttemptsFieldTrialName[] = "DnsProbe-Attempts";
52
53 int GetAttemptsFromFieldTrial() {
54 std::string group = FieldTrialList::FindFullName(kAttemptsFieldTrialName);
55 if (group == "" || group == "default")
56 return kAttemptsUseDefault;
57
58 int attempts;
59 if (!StringToInt(group, &attempts))
60 return kAttemptsUseDefault;
61
62 return attempts;
63 }
64
65 bool IsLocalhost(const IPAddressNumber& ip) {
66 return (ip.size() == net::kIPv4AddressSize)
67 && (ip[0] == 127) && (ip[1] == 0) && (ip[2] == 0) && (ip[3] == 1);
68 }
69
70 // The maximum number of nameservers counted in histograms.
71 const int kNameserverCountMax = 10;
72
73 } // namespace
74
75 DnsProbeService::DnsProbeService()
76 : system_result_(DnsProbeJob::SERVERS_UNKNOWN),
77 public_result_(DnsProbeJob::SERVERS_UNKNOWN),
78 state_(STATE_NO_RESULTS),
79 result_(chrome_common_net::DNS_PROBE_UNKNOWN),
80 dns_attempts_(GetAttemptsFromFieldTrial()) {
81 NetworkChangeNotifier::AddIPAddressObserver(this);
82 }
83
84 DnsProbeService::~DnsProbeService() {
85 NetworkChangeNotifier::RemoveIPAddressObserver(this);
86 }
87
88 void DnsProbeService::ProbeDns(const DnsProbeService::CallbackType& callback) {
89 callbacks_.push_back(callback);
90
91 if (state_ == STATE_RESULTS_CACHED && ResultsExpired())
92 ExpireResults();
93
94 switch (state_) {
95 case STATE_NO_RESULTS:
96 StartProbes();
97 break;
98 case STATE_RESULTS_CACHED:
99 CallCallbacks();
100 break;
101 case STATE_PROBE_RUNNING:
102 // do nothing; probe is already running, and will call the callback
103 break;
104 }
105 }
106
107 scoped_ptr<DnsProbeJob> DnsProbeService::CreateSystemProbeJob(
108 const DnsProbeJob::CallbackType& job_callback) {
109 DnsConfig system_config;
110 GetSystemDnsConfig(&system_config);
111 return CreateProbeJob(system_config, job_callback);
112 }
113
114 scoped_ptr<DnsProbeJob> DnsProbeService::CreatePublicProbeJob(
115 const DnsProbeJob::CallbackType& job_callback) {
116 DnsConfig public_config;
117 GetPublicDnsConfig(&public_config);
118 return CreateProbeJob(public_config, job_callback);
119 }
120
121 void DnsProbeService::OnIPAddressChanged() {
122 if (state_ == STATE_RESULTS_CACHED)
123 ExpireResults();
124 }
125
126 void DnsProbeService::ExpireResults() {
127 DCHECK_EQ(STATE_RESULTS_CACHED, state_);
128
129 state_ = STATE_NO_RESULTS;
130 result_ = chrome_common_net::DNS_PROBE_UNKNOWN;
131 }
132
133 void DnsProbeService::StartProbes() {
134 DCHECK_NE(STATE_PROBE_RUNNING, state_);
135 DCHECK(!system_job_.get());
136 DCHECK(!public_job_.get());
137
138 DnsProbeJob::CallbackType job_callback =
139 base::Bind(&DnsProbeService::OnProbeJobComplete,
140 base::Unretained(this));
141
142 // TODO(ttuttle): Do we want to keep explicit flags for "job done"?
143 // Or maybe DnsProbeJob should have a "finished" flag?
144 system_result_ = DnsProbeJob::SERVERS_UNKNOWN;
145 public_result_ = DnsProbeJob::SERVERS_UNKNOWN;
146
147 system_job_ = CreateSystemProbeJob(job_callback);
148 public_job_ = CreatePublicProbeJob(job_callback);
149
150 // If we can't create one or both jobs, fail the probe immediately.
151 if (!system_job_.get() || !public_job_.get()) {
152 system_job_.reset();
153 public_job_.reset();
154 state_ = STATE_RESULTS_CACHED;
155 // TODO(ttuttle): Should this be BAD_CONFIG? Currently I think it only
156 // happens when the system DnsConfig has no servers.
157 result_ = chrome_common_net::DNS_PROBE_UNKNOWN;
158 CallCallbacks();
159 return;
160 }
161
162 state_ = STATE_PROBE_RUNNING;
163 probe_start_time_ = base::Time::Now();
164 }
165
166 void DnsProbeService::OnProbesComplete() {
167 DCHECK_EQ(STATE_PROBE_RUNNING, state_);
168
169 state_ = STATE_RESULTS_CACHED;
170 result_ = EvaluateResults();
171
172 HistogramProbes();
173
174 CallCallbacks();
175 }
176
177 void DnsProbeService::HistogramProbes() const {
178 const DnsProbeResult kMaxResult = chrome_common_net::DNS_PROBE_MAX;
179
180 DCHECK_EQ(STATE_RESULTS_CACHED, state_);
181 DCHECK_NE(kMaxResult, result_);
182
183 base::TimeDelta elapsed = base::Time::Now() - probe_start_time_;
184
185 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Probe.Result", result_, kMaxResult);
186 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.Elapsed", elapsed);
187
188 if (NetworkChangeNotifier::IsOffline()) {
189 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Probe.NcnOffline.Result",
190 result_, kMaxResult);
191 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.NcnOffline.Elapsed", elapsed);
192 } else {
193 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Probe.NcnOnline.Result",
194 result_, kMaxResult);
195 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.NcnOnline.Elapsed", elapsed);
196 }
197
198 switch (result_) {
199 case chrome_common_net::DNS_PROBE_UNKNOWN:
200 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.ResultUnknown.Elapsed",
201 elapsed);
202 break;
203 case chrome_common_net::DNS_PROBE_NO_INTERNET:
204 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.ResultNoInternet.Elapsed",
205 elapsed);
206 break;
207 case chrome_common_net::DNS_PROBE_BAD_CONFIG:
208 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.ResultBadConfig.Elapsed",
209 elapsed);
210
211 // Histogram some extra data to see why BAD_CONFIG is happening.
212 UMA_HISTOGRAM_ENUMERATION(
213 "DnsProbe.Probe.ResultBadConfig.SystemJobResult",
214 system_result_,
215 DnsProbeJob::MAX_RESULT);
216 UMA_HISTOGRAM_CUSTOM_COUNTS(
217 "DnsProbe.Probe.ResultBadConfig.SystemNameserverCount",
218 system_nameserver_count_,
219 0, kNameserverCountMax, kNameserverCountMax + 1);
220 UMA_HISTOGRAM_BOOLEAN(
221 "DnsProbe.Probe.ResultBadConfig.SystemIsLocalhost",
222 system_is_localhost_);
223 break;
224 case chrome_common_net::DNS_PROBE_NXDOMAIN:
225 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Probe.ResultNxdomain.Elapsed",
226 elapsed);
227 break;
228 case chrome_common_net::DNS_PROBE_MAX:
229 NOTREACHED();
230 break;
231 }
232 }
233
234 DnsProbeResult DnsProbeService::EvaluateResults() const {
235 DCHECK_NE(DnsProbeJob::SERVERS_UNKNOWN, system_result_);
236 DCHECK_NE(DnsProbeJob::SERVERS_UNKNOWN, public_result_);
237
238 // If the system DNS is working, assume the domain doesn't exist. 49 // If the system DNS is working, assume the domain doesn't exist.
239 if (system_result_ == DnsProbeJob::SERVERS_CORRECT) 50 if (system_result == DnsProbeRunner::CORRECT)
240 return chrome_common_net::DNS_PROBE_NXDOMAIN; 51 return chrome_common_net::DNS_PROBE_FINISHED_NXDOMAIN;
241 52
242 // If the system DNS is not working but another public server is, assume the 53 // If the system DNS is not working but another public server is, assume the
243 // DNS config is bad (or perhaps the DNS servers are down or broken). 54 // DNS config is bad (or perhaps the DNS servers are down or broken).
244 if (public_result_ == DnsProbeJob::SERVERS_CORRECT) 55 if (public_result == DnsProbeRunner::CORRECT)
245 return chrome_common_net::DNS_PROBE_BAD_CONFIG; 56 return chrome_common_net::DNS_PROBE_FINISHED_BAD_CONFIG;
246 57
247 // If the system DNS is not working and another public server is unreachable, 58 // If the system DNS is not working and another public server is unreachable,
248 // assume the internet connection is down (note that system DNS may be a 59 // assume the internet connection is down (note that system DNS may be a
249 // router on the LAN, so it may be reachable but returning errors.) 60 // router on the LAN, so it may be reachable but returning errors.)
250 if (public_result_ == DnsProbeJob::SERVERS_UNREACHABLE) 61 if (public_result == DnsProbeRunner::UNREACHABLE)
251 return chrome_common_net::DNS_PROBE_NO_INTERNET; 62 return chrome_common_net::DNS_PROBE_FINISHED_NO_INTERNET;
252 63
253 // Otherwise: the system DNS is not working and another public server is 64 // Otherwise: the system DNS is not working and another public server is
254 // responding but with errors or incorrect results. This is an awkward case; 65 // responding but with errors or incorrect results. This is an awkward case;
255 // an invasive captive portal or a restrictive firewall may be intercepting 66 // an invasive captive portal or a restrictive firewall may be intercepting
256 // or rewriting DNS traffic, or the public server may itself be failing or 67 // or rewriting DNS traffic, or the public server may itself be failing or
257 // down. 68 // down.
258 return chrome_common_net::DNS_PROBE_UNKNOWN; 69 return chrome_common_net::DNS_PROBE_FINISHED_UNKNOWN;
70 }
71
72 // TODO(ttuttle): Make sure we're not changing result histogram mappings going
73 // from DnsProbeJob to DnsProbeRunner.
mmenke 2013/06/26 15:48:20 Have you done this?
Deprecated (see juliatuttle) 2013/06/28 16:59:46 I have now!
74 void HistogramProbe(DnsProbeStatus result, base::TimeDelta elapsed) {
75 DCHECK(chrome_common_net::DnsProbeStatusIsFinished(result));
76
77 const DnsProbeStatus kMaxStatus = chrome_common_net::DNS_PROBE_MAX;
78
79 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Status", result, kMaxStatus);
80 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed", elapsed);
81
82 if (NetworkChangeNotifier::IsOffline()) {
83 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Status_NcnOffline",
84 result, kMaxStatus);
85 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_NcnOffline", elapsed);
86 } else {
87 UMA_HISTOGRAM_ENUMERATION("DnsProbe.Status_NcnOnline",
88 result, kMaxStatus);
89 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_NcnOnline", elapsed);
90 }
91
92 switch (result) {
93 case chrome_common_net::DNS_PROBE_FINISHED_UNKNOWN:
mmenke 2013/06/26 15:48:20 nit: +indent.
Deprecated (see juliatuttle) 2013/06/26 22:23:56 Done.
94 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_Unknown",
95 elapsed);
96 break;
97 case chrome_common_net::DNS_PROBE_FINISHED_NO_INTERNET:
98 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_NoInternet",
99 elapsed);
100 break;
101 case chrome_common_net::DNS_PROBE_FINISHED_BAD_CONFIG:
102 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_BadConfig",
103 elapsed);
104 break;
105 case chrome_common_net::DNS_PROBE_FINISHED_NXDOMAIN:
106 UMA_HISTOGRAM_MEDIUM_TIMES("DnsProbe.Elapsed_Nxdomain",
107 elapsed);
108 break;
109
110 // These aren't actually results.
111 case chrome_common_net::DNS_PROBE_POSSIBLE:
112 case chrome_common_net::DNS_PROBE_NOT_RUN:
113 case chrome_common_net::DNS_PROBE_STARTED:
114 case chrome_common_net::DNS_PROBE_MAX:
115 NOTREACHED();
116 break;
117 }
118 }
119
120 } // namespace
121
122 DnsProbeService::DnsProbeService()
123 : state_(STATE_NO_RESULT) {
124 NetworkChangeNotifier::AddDNSObserver(this);
125 SetSystemClientToCurrentConfig();
126 SetPublicClientToGooglePublicDns();
127 }
128
129 DnsProbeService::~DnsProbeService() {
130 NetworkChangeNotifier::RemoveDNSObserver(this);
131 }
132
133 void DnsProbeService::ProbeDns(const DnsProbeService::ProbeCallback& callback) {
134 pending_callbacks_.push_back(callback);
135
136 if (CachedResultIsExpired())
137 ClearCachedResult();
138
139 switch (state_) {
140 case STATE_NO_RESULT:
mmenke 2013/06/26 15:48:20 nit: +indent.
Deprecated (see juliatuttle) 2013/06/26 22:23:56 Done.
141 StartProbes();
142 break;
143 case STATE_RESULT_CACHED:
144 CallCallbacks();
145 break;
146 case STATE_PROBE_RUNNING:
147 // Do nothing; probe is already running, and will call the callback.
148 break;
149 }
150 }
151
152 void DnsProbeService::OnDNSChanged() {
153 ClearCachedResult();
154 SetSystemClientToCurrentConfig();
155 }
156
157 void DnsProbeService::SetSystemClientForTesting(
158 scoped_ptr<DnsClient> system_client) {
159 system_runner_.SetClient(system_client.Pass());
160 }
161
162 void DnsProbeService::SetPublicClientForTesting(
163 scoped_ptr<DnsClient> public_client) {
164 public_runner_.SetClient(public_client.Pass());
165 }
166
167 void DnsProbeService::ClearCachedResultForTesting() {
168 ClearCachedResult();
169 }
170
171 void DnsProbeService::SetSystemClientToCurrentConfig() {
172 DnsConfig system_config;
173 NetworkChangeNotifier::GetDnsConfig(&system_config);
174 system_config.search.clear();
175 system_config.attempts = 1;
176 system_config.randomize_ports = false;
177
178 scoped_ptr<DnsClient> system_client(DnsClient::CreateClient(NULL));
179 system_client->SetConfig(system_config);
180
181 system_runner_.SetClient(system_client.Pass());
182 }
183
184 void DnsProbeService::SetPublicClientToGooglePublicDns() {
185 DnsConfig public_config;
186 public_config.nameservers.push_back(MakeDnsEndPoint(kGooglePublicDns1));
187 public_config.nameservers.push_back(MakeDnsEndPoint(kGooglePublicDns2));
188 public_config.attempts = 1;
189 public_config.randomize_ports = false;
190
191 scoped_ptr<DnsClient> public_client(DnsClient::CreateClient(NULL));
192 public_client->SetConfig(public_config);
193
194 public_runner_.SetClient(public_client.Pass());
195 }
196
197 void DnsProbeService::StartProbes() {
198 DCHECK_EQ(STATE_NO_RESULT, state_);
199
200 DCHECK(!system_runner_.IsRunning());
201 DCHECK(!public_runner_.IsRunning());
202
203 const base::Closure callback = base::Bind(&DnsProbeService::OnProbeComplete,
204 base::Unretained(this));
205 system_runner_.RunProbe(callback);
206 public_runner_.RunProbe(callback);
207 probe_start_time_ = base::Time::Now();
208 state_ = STATE_PROBE_RUNNING;
209
210 DCHECK(system_runner_.IsRunning());
211 DCHECK(public_runner_.IsRunning());
212 }
213
214 void DnsProbeService::OnProbeComplete() {
215 DCHECK_EQ(STATE_PROBE_RUNNING, state_);
216
217 if (system_runner_.IsRunning() || public_runner_.IsRunning())
218 return;
219
220 cached_result_ = EvaluateResults(system_runner_.result(),
221 public_runner_.result());
222 state_ = STATE_RESULT_CACHED;
223
224 HistogramProbe(cached_result_, base::Time::Now() - probe_start_time_);
225
226 CallCallbacks();
259 } 227 }
260 228
261 void DnsProbeService::CallCallbacks() { 229 void DnsProbeService::CallCallbacks() {
262 DCHECK_EQ(STATE_RESULTS_CACHED, state_); 230 DCHECK_EQ(STATE_RESULT_CACHED, state_);
263 DCHECK(!callbacks_.empty()); 231 DCHECK(chrome_common_net::DnsProbeStatusIsFinished(cached_result_));
264 232 DCHECK(!pending_callbacks_.empty());
265 std::vector<CallbackType> callbacks = callbacks_; 233
266 callbacks_.clear(); 234 std::vector<ProbeCallback> callbacks = pending_callbacks_;
267 235 pending_callbacks_.clear();
mmenke 2013/06/26 15:48:20 nit: Rather than copy + clear, maybe use swap?
Deprecated (see juliatuttle) 2013/06/26 22:23:56 Done.
268 for (std::vector<CallbackType>::const_iterator i = callbacks.begin(); 236
237 for (std::vector<ProbeCallback>::const_iterator i = callbacks.begin();
269 i != callbacks.end(); ++i) { 238 i != callbacks.end(); ++i) {
270 i->Run(result_); 239 i->Run(cached_result_);
271 } 240 }
272 } 241 }
273 242
274 scoped_ptr<DnsProbeJob> DnsProbeService::CreateProbeJob( 243 void DnsProbeService::ClearCachedResult() {
275 const DnsConfig& dns_config, 244 if (state_ == STATE_RESULT_CACHED) {
276 const DnsProbeJob::CallbackType& job_callback) { 245 state_ = STATE_NO_RESULT;
277 if (!dns_config.IsValid()) 246 cached_result_ = chrome_common_net::DNS_PROBE_MAX;
278 return scoped_ptr<DnsProbeJob>(); 247 }
279 248 }
280 scoped_ptr<DnsClient> dns_client(DnsClient::CreateClient(NULL)); 249
281 dns_client->SetConfig(dns_config); 250 bool DnsProbeService::CachedResultIsExpired() const {
282 return DnsProbeJob::CreateJob(dns_client.Pass(), job_callback, NULL); 251 if (state_ != STATE_RESULT_CACHED)
283 } 252 return false;
284 253
285 void DnsProbeService::OnProbeJobComplete(DnsProbeJob* job,
286 DnsProbeJob::Result result) {
287 DCHECK_EQ(STATE_PROBE_RUNNING, state_);
288
289 if (job == system_job_.get()) {
290 system_result_ = result;
291 system_job_.reset();
292 } else if (job == public_job_.get()) {
293 public_result_ = result;
294 public_job_.reset();
295 } else {
296 NOTREACHED();
297 return;
298 }
299
300 if (system_result_ != DnsProbeJob::SERVERS_UNKNOWN &&
301 public_result_ != DnsProbeJob::SERVERS_UNKNOWN) {
302 OnProbesComplete();
303 }
304 }
305
306 void DnsProbeService::GetSystemDnsConfig(DnsConfig* config) {
307 NetworkChangeNotifier::GetDnsConfig(config);
308
309 // DNS probes don't need or want the suffix search list populated
310 config->search.clear();
311
312 if (dns_attempts_ != kAttemptsUseDefault)
313 config->attempts = dns_attempts_;
314
315 // Take notes in case the config turns out to be bad, so we can histogram
316 // some useful data.
317 system_nameserver_count_ = config->nameservers.size();
318 system_is_localhost_ = (system_nameserver_count_ == 1)
319 && IsLocalhost(config->nameservers[0].address());
320
321 // Disable port randomization.
322 config->randomize_ports = false;
323 }
324
325 void DnsProbeService::GetPublicDnsConfig(DnsConfig* config) {
326 *config = DnsConfig();
327
328 config->nameservers.push_back(MakeDnsEndPoint(kPublicDnsPrimary));
329 config->nameservers.push_back(MakeDnsEndPoint(kPublicDnsSecondary));
330
331 if (dns_attempts_ != kAttemptsUseDefault)
332 config->attempts = dns_attempts_;
333
334 // Disable port randomization.
335 config->randomize_ports = false;
336 }
337
338 bool DnsProbeService::ResultsExpired() {
339 const base::TimeDelta kMaxResultAge = 254 const base::TimeDelta kMaxResultAge =
340 base::TimeDelta::FromMilliseconds(kMaxResultAgeMs); 255 base::TimeDelta::FromMilliseconds(kMaxResultAgeMs);
341 return base::Time::Now() - probe_start_time_ > kMaxResultAge; 256 return base::Time::Now() - probe_start_time_ > kMaxResultAge;
342 } 257 }
343 258
344 } // namespace chrome_browser_net 259 } // namespace chrome_browser_net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698