Add --output-dir flag for page_runner.py to specify a custom directory for
[chromium-blink-merge.git] / net / dns / dns_config_service.cc
blobbfa4b8db84e648393eecfd4ce8a4d82ff6afcce7
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/dns/dns_config_service.h"
7 #include "base/logging.h"
8 #include "base/metrics/histogram.h"
9 #include "base/values.h"
10 #include "net/base/ip_endpoint.h"
11 #include "net/base/ip_pattern.h"
13 namespace net {
15 NameServerClassifier::NameServerClassifier() {
16 // Google Public DNS addresses from:
17 // https://developers.google.com/speed/public-dns/docs/using
18 AddRule("8.8.8.8", NAME_SERVERS_TYPE_GOOGLE_PUBLIC_DNS);
19 AddRule("8.8.4.4", NAME_SERVERS_TYPE_GOOGLE_PUBLIC_DNS);
20 AddRule("2001:4860:4860:0:0:0:0:8888", NAME_SERVERS_TYPE_GOOGLE_PUBLIC_DNS),
21 AddRule("2001:4860:4860:0:0:0:0:8844", NAME_SERVERS_TYPE_GOOGLE_PUBLIC_DNS),
23 // Count localhost as private, since we don't know what upstream it uses:
24 AddRule("127.*.*.*", NAME_SERVERS_TYPE_PRIVATE);
25 AddRule("0:0:0:0:0:0:0:1", NAME_SERVERS_TYPE_PRIVATE);
27 // RFC 1918 private addresses:
28 AddRule("10.*.*.*", NAME_SERVERS_TYPE_PRIVATE);
29 AddRule("172.[16-31].*.*", NAME_SERVERS_TYPE_PRIVATE);
30 AddRule("192.168.*.*", NAME_SERVERS_TYPE_PRIVATE);
32 // IPv4 link-local addresses:
33 AddRule("169.254.*.*", NAME_SERVERS_TYPE_PRIVATE);
35 // IPv6 link-local addresses:
36 AddRule("fe80:*:*:*:*:*:*:*", NAME_SERVERS_TYPE_PRIVATE);
38 // Anything else counts as public:
39 AddRule("*.*.*.*", NAME_SERVERS_TYPE_PUBLIC);
40 AddRule("*:*:*:*:*:*:*:*", NAME_SERVERS_TYPE_PUBLIC);
43 NameServerClassifier::~NameServerClassifier() {}
45 NameServerClassifier::NameServersType NameServerClassifier::GetNameServersType(
46 const std::vector<IPEndPoint>& nameservers) const {
47 NameServersType type = NAME_SERVERS_TYPE_NONE;
48 for (std::vector<IPEndPoint>::const_iterator it = nameservers.begin();
49 it != nameservers.end();
50 ++it) {
51 type = MergeNameServersTypes(type, GetNameServerType(it->address()));
53 return type;
56 struct NameServerClassifier::NameServerTypeRule {
57 NameServerTypeRule(const char* pattern_string, NameServersType type)
58 : type(type) {
59 bool parsed = pattern.ParsePattern(pattern_string);
60 DCHECK(parsed);
63 IPPattern pattern;
64 NameServersType type;
67 void NameServerClassifier::AddRule(const char* pattern_string,
68 NameServersType address_type) {
69 rules_.push_back(new NameServerTypeRule(pattern_string, address_type));
72 NameServerClassifier::NameServersType NameServerClassifier::GetNameServerType(
73 const IPAddressNumber& address) const {
74 for (ScopedVector<NameServerTypeRule>::const_iterator it = rules_.begin();
75 it != rules_.end();
76 ++it) {
77 if ((*it)->pattern.Match(address))
78 return (*it)->type;
80 NOTREACHED();
81 return NAME_SERVERS_TYPE_NONE;
84 NameServerClassifier::NameServersType
85 NameServerClassifier::MergeNameServersTypes(NameServersType a,
86 NameServersType b) {
87 if (a == NAME_SERVERS_TYPE_NONE)
88 return b;
89 if (b == NAME_SERVERS_TYPE_NONE)
90 return a;
91 if (a == b)
92 return a;
93 return NAME_SERVERS_TYPE_MIXED;
96 // Default values are taken from glibc resolv.h except timeout which is set to
97 // |kDnsTimeoutSeconds|.
98 DnsConfig::DnsConfig()
99 : unhandled_options(false),
100 append_to_multi_label_name(true),
101 randomize_ports(false),
102 ndots(1),
103 timeout(base::TimeDelta::FromSeconds(kDnsTimeoutSeconds)),
104 attempts(2),
105 rotate(false),
106 edns0(false),
107 use_local_ipv6(false) {}
109 DnsConfig::~DnsConfig() {}
111 bool DnsConfig::Equals(const DnsConfig& d) const {
112 return EqualsIgnoreHosts(d) && (hosts == d.hosts);
115 bool DnsConfig::EqualsIgnoreHosts(const DnsConfig& d) const {
116 return (nameservers == d.nameservers) &&
117 (search == d.search) &&
118 (unhandled_options == d.unhandled_options) &&
119 (append_to_multi_label_name == d.append_to_multi_label_name) &&
120 (ndots == d.ndots) &&
121 (timeout == d.timeout) &&
122 (attempts == d.attempts) &&
123 (rotate == d.rotate) &&
124 (edns0 == d.edns0) &&
125 (use_local_ipv6 == d.use_local_ipv6);
128 void DnsConfig::CopyIgnoreHosts(const DnsConfig& d) {
129 nameservers = d.nameservers;
130 search = d.search;
131 unhandled_options = d.unhandled_options;
132 append_to_multi_label_name = d.append_to_multi_label_name;
133 ndots = d.ndots;
134 timeout = d.timeout;
135 attempts = d.attempts;
136 rotate = d.rotate;
137 edns0 = d.edns0;
138 use_local_ipv6 = d.use_local_ipv6;
141 base::Value* DnsConfig::ToValue() const {
142 base::DictionaryValue* dict = new base::DictionaryValue();
144 base::ListValue* list = new base::ListValue();
145 for (size_t i = 0; i < nameservers.size(); ++i)
146 list->Append(new base::StringValue(nameservers[i].ToString()));
147 dict->Set("nameservers", list);
149 list = new base::ListValue();
150 for (size_t i = 0; i < search.size(); ++i)
151 list->Append(new base::StringValue(search[i]));
152 dict->Set("search", list);
154 dict->SetBoolean("unhandled_options", unhandled_options);
155 dict->SetBoolean("append_to_multi_label_name", append_to_multi_label_name);
156 dict->SetInteger("ndots", ndots);
157 dict->SetDouble("timeout", timeout.InSecondsF());
158 dict->SetInteger("attempts", attempts);
159 dict->SetBoolean("rotate", rotate);
160 dict->SetBoolean("edns0", edns0);
161 dict->SetBoolean("use_local_ipv6", use_local_ipv6);
162 dict->SetInteger("num_hosts", hosts.size());
164 return dict;
168 DnsConfigService::DnsConfigService()
169 : watch_failed_(false),
170 have_config_(false),
171 have_hosts_(false),
172 need_update_(false),
173 last_sent_empty_(true) {}
175 DnsConfigService::~DnsConfigService() {
178 void DnsConfigService::ReadConfig(const CallbackType& callback) {
179 DCHECK(CalledOnValidThread());
180 DCHECK(!callback.is_null());
181 DCHECK(callback_.is_null());
182 callback_ = callback;
183 ReadNow();
186 void DnsConfigService::WatchConfig(const CallbackType& callback) {
187 DCHECK(CalledOnValidThread());
188 DCHECK(!callback.is_null());
189 DCHECK(callback_.is_null());
190 callback_ = callback;
191 watch_failed_ = !StartWatching();
192 ReadNow();
195 void DnsConfigService::InvalidateConfig() {
196 DCHECK(CalledOnValidThread());
197 base::TimeTicks now = base::TimeTicks::Now();
198 if (!last_invalidate_config_time_.is_null()) {
199 UMA_HISTOGRAM_LONG_TIMES("AsyncDNS.ConfigNotifyInterval",
200 now - last_invalidate_config_time_);
202 last_invalidate_config_time_ = now;
203 if (!have_config_)
204 return;
205 have_config_ = false;
206 StartTimer();
209 void DnsConfigService::InvalidateHosts() {
210 DCHECK(CalledOnValidThread());
211 base::TimeTicks now = base::TimeTicks::Now();
212 if (!last_invalidate_hosts_time_.is_null()) {
213 UMA_HISTOGRAM_LONG_TIMES("AsyncDNS.HostsNotifyInterval",
214 now - last_invalidate_hosts_time_);
216 last_invalidate_hosts_time_ = now;
217 if (!have_hosts_)
218 return;
219 have_hosts_ = false;
220 StartTimer();
223 void DnsConfigService::OnConfigRead(const DnsConfig& config) {
224 DCHECK(CalledOnValidThread());
225 DCHECK(config.IsValid());
227 bool changed = false;
228 if (!config.EqualsIgnoreHosts(dns_config_)) {
229 dns_config_.CopyIgnoreHosts(config);
230 need_update_ = true;
231 changed = true;
233 if (!changed && !last_sent_empty_time_.is_null()) {
234 UMA_HISTOGRAM_LONG_TIMES("AsyncDNS.UnchangedConfigInterval",
235 base::TimeTicks::Now() - last_sent_empty_time_);
237 UMA_HISTOGRAM_BOOLEAN("AsyncDNS.ConfigChange", changed);
238 UMA_HISTOGRAM_ENUMERATION(
239 "AsyncDNS.NameServersType",
240 classifier_.GetNameServersType(dns_config_.nameservers),
241 NameServerClassifier::NAME_SERVERS_TYPE_MAX_VALUE);
243 have_config_ = true;
244 if (have_hosts_ || watch_failed_)
245 OnCompleteConfig();
248 void DnsConfigService::OnHostsRead(const DnsHosts& hosts) {
249 DCHECK(CalledOnValidThread());
251 bool changed = false;
252 if (hosts != dns_config_.hosts) {
253 dns_config_.hosts = hosts;
254 need_update_ = true;
255 changed = true;
257 if (!changed && !last_sent_empty_time_.is_null()) {
258 UMA_HISTOGRAM_LONG_TIMES("AsyncDNS.UnchangedHostsInterval",
259 base::TimeTicks::Now() - last_sent_empty_time_);
261 UMA_HISTOGRAM_BOOLEAN("AsyncDNS.HostsChange", changed);
263 have_hosts_ = true;
264 if (have_config_ || watch_failed_)
265 OnCompleteConfig();
268 void DnsConfigService::StartTimer() {
269 DCHECK(CalledOnValidThread());
270 if (last_sent_empty_) {
271 DCHECK(!timer_.IsRunning());
272 return; // No need to withdraw again.
274 timer_.Stop();
276 // Give it a short timeout to come up with a valid config. Otherwise withdraw
277 // the config from the receiver. The goal is to avoid perceivable network
278 // outage (when using the wrong config) but at the same time avoid
279 // unnecessary Job aborts in HostResolverImpl. The signals come from multiple
280 // sources so it might receive multiple events during a config change.
282 // DHCP and user-induced changes are on the order of seconds, so 150ms should
283 // not add perceivable delay. On the other hand, config readers should finish
284 // within 150ms with the rare exception of I/O block or extra large HOSTS.
285 const base::TimeDelta kTimeout = base::TimeDelta::FromMilliseconds(150);
287 timer_.Start(FROM_HERE,
288 kTimeout,
289 this,
290 &DnsConfigService::OnTimeout);
293 void DnsConfigService::OnTimeout() {
294 DCHECK(CalledOnValidThread());
295 DCHECK(!last_sent_empty_);
296 // Indicate that even if there is no change in On*Read, we will need to
297 // update the receiver when the config becomes complete.
298 need_update_ = true;
299 // Empty config is considered invalid.
300 last_sent_empty_ = true;
301 last_sent_empty_time_ = base::TimeTicks::Now();
302 callback_.Run(DnsConfig());
305 void DnsConfigService::OnCompleteConfig() {
306 timer_.Stop();
307 if (!need_update_)
308 return;
309 need_update_ = false;
310 last_sent_empty_ = false;
311 if (watch_failed_) {
312 // If a watch failed, the config may not be accurate, so report empty.
313 callback_.Run(DnsConfig());
314 } else {
315 callback_.Run(dns_config_);
319 } // namespace net