OLD | NEW |
---|---|
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "components/domain_reliability/monitor.h" | 5 #include "components/domain_reliability/monitor.h" |
6 | 6 |
7 #include "base/command_line.h" | 7 #include "base/command_line.h" |
8 #include "base/logging.h" | 8 #include "base/logging.h" |
9 #include "base/message_loop/message_loop.h" | 9 #include "base/message_loop/message_loop.h" |
10 #include "base/single_thread_task_runner.h" | 10 #include "base/single_thread_task_runner.h" |
(...skipping 178 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
189 contexts_.clear(); | 189 contexts_.clear(); |
190 } | 190 } |
191 | 191 |
192 void DomainReliabilityMonitor::OnRequestLegComplete( | 192 void DomainReliabilityMonitor::OnRequestLegComplete( |
193 const RequestInfo& request) { | 193 const RequestInfo& request) { |
194 int response_code; | 194 int response_code; |
195 if (request.response_info.headers) | 195 if (request.response_info.headers) |
196 response_code = request.response_info.headers->response_code(); | 196 response_code = request.response_info.headers->response_code(); |
197 else | 197 else |
198 response_code = -1; | 198 response_code = -1; |
199 ContextMap::iterator context_it; | |
200 std::string beacon_status; | 199 std::string beacon_status; |
201 | 200 |
202 int error_code = net::OK; | 201 int error_code = net::OK; |
203 if (request.status.status() == net::URLRequestStatus::FAILED) | 202 if (request.status.status() == net::URLRequestStatus::FAILED) |
204 error_code = request.status.error(); | 203 error_code = request.status.error(); |
205 | 204 |
205 DomainReliabilityContext* context; | |
206 | |
206 // Ignore requests where: | 207 // Ignore requests where: |
207 // 1. There is no context for the request host. | 208 // 1. There is no context for the request host. |
208 // 2. The request did not access the network. | 209 // 2. The request did not access the network. |
209 // 3. The request is not supposed to send cookies (to avoid associating the | 210 // 3. The request is not supposed to send cookies (to avoid associating the |
210 // request with any potentially unique data in the config). | 211 // request with any potentially unique data in the config). |
211 // 4. The request was itself a Domain Reliability upload (to avoid loops). | 212 // 4. The request was itself a Domain Reliability upload (to avoid loops). |
212 // 5. There is no defined beacon status for the error or HTTP response code | 213 // 5. There is no defined beacon status for the error or HTTP response code |
213 // (to avoid leaking network-local errors). | 214 // (to avoid leaking network-local errors). |
214 if ((context_it = contexts_.find(request.url.host())) == contexts_.end() || | 215 if (!(context = GetContextForHost(request.url.host())) || |
215 !request.AccessedNetwork() || | 216 !request.AccessedNetwork() || |
216 (request.load_flags & net::LOAD_DO_NOT_SEND_COOKIES) || | 217 (request.load_flags & net::LOAD_DO_NOT_SEND_COOKIES) || |
217 request.is_upload || | 218 request.is_upload || |
218 !GetDomainReliabilityBeaconStatus( | 219 !GetDomainReliabilityBeaconStatus( |
219 error_code, response_code, &beacon_status)) { | 220 error_code, response_code, &beacon_status)) { |
220 return; | 221 return; |
221 } | 222 } |
222 | 223 |
223 DomainReliabilityBeacon beacon; | 224 DomainReliabilityBeacon beacon; |
224 beacon.status = beacon_status; | 225 beacon.status = beacon_status; |
225 beacon.chrome_error = error_code; | 226 beacon.chrome_error = error_code; |
226 if (!request.response_info.was_fetched_via_proxy) | 227 if (!request.response_info.was_fetched_via_proxy) |
227 beacon.server_ip = request.response_info.socket_address.host(); | 228 beacon.server_ip = request.response_info.socket_address.host(); |
228 else | 229 else |
229 beacon.server_ip.clear(); | 230 beacon.server_ip.clear(); |
230 beacon.protocol = GetDomainReliabilityProtocol( | 231 beacon.protocol = GetDomainReliabilityProtocol( |
231 request.response_info.connection_info, | 232 request.response_info.connection_info, |
232 request.response_info.ssl_info.is_valid()); | 233 request.response_info.ssl_info.is_valid()); |
233 beacon.http_response_code = response_code; | 234 beacon.http_response_code = response_code; |
234 beacon.start_time = request.load_timing_info.request_start; | 235 beacon.start_time = request.load_timing_info.request_start; |
235 beacon.elapsed = time_->NowTicks() - beacon.start_time; | 236 beacon.elapsed = time_->NowTicks() - beacon.start_time; |
236 context_it->second->OnBeacon(request.url, beacon); | 237 context->OnBeacon(request.url, beacon); |
238 } | |
239 | |
240 // TODO(ttuttle): Keep a separate wildcard_contexts_ map to avoid having to | |
241 // prepend '*.' to domains. | |
242 DomainReliabilityContext* DomainReliabilityMonitor::GetContextForHost( | |
243 const std::string& host) const { | |
244 ContextMap::const_iterator context_it; | |
245 | |
246 context_it = contexts_.find(host); | |
247 if (context_it != contexts_.end()) | |
248 return context_it->second; | |
249 | |
250 std::string host_with_asterisk = "*." + host; | |
251 context_it = contexts_.find(host_with_asterisk); | |
252 if (context_it != contexts_.end()) | |
253 return context_it->second; | |
254 | |
255 size_t dot_pos = host.find('.'); | |
256 if (dot_pos == std::string::npos) | |
257 return NULL; | |
258 | |
259 // TODO(ttuttle): Make sure parent is not in PSL before using. | |
Ryan Sleevi
2014/07/22 18:56:52
This is big/important, but also, I think, requires
| |
260 | |
261 std::string parent_with_asterisk = "*." + host.substr(dot_pos + 1); | |
262 context_it = contexts_.find(parent_with_asterisk); | |
263 if (context_it != contexts_.end()) | |
264 return context_it->second; | |
265 | |
266 return NULL; | |
237 } | 267 } |
238 | 268 |
239 base::WeakPtr<DomainReliabilityMonitor> | 269 base::WeakPtr<DomainReliabilityMonitor> |
240 DomainReliabilityMonitor::MakeWeakPtr() { | 270 DomainReliabilityMonitor::MakeWeakPtr() { |
241 return weak_factory_.GetWeakPtr(); | 271 return weak_factory_.GetWeakPtr(); |
242 } | 272 } |
243 | 273 |
244 } // namespace domain_reliability | 274 } // namespace domain_reliability |
OLD | NEW |