Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(15)

Side by Side Diff: net/http/http_network_transaction.cc

Issue 3038048: Revert 54906 - Refactor HttpNetworkTransaction to eliminate the SPDY... (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Created 10 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « net/http/http_network_transaction.h ('k') | net/spdy/spdy_network_transaction_unittest.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/http/http_network_transaction.h" 5 #include "net/http/http_network_transaction.h"
6 6
7 #include <set> 7 #include <set>
8 #include <vector> 8 #include <vector>
9 9
10 #include "base/compiler_specific.h" 10 #include "base/compiler_specific.h"
(...skipping 280 matching lines...) Expand 10 before | Expand all | Expand 10 after
291 return rv; 291 return rv;
292 } 292 }
293 293
294 int HttpNetworkTransaction::RestartIgnoringLastError( 294 int HttpNetworkTransaction::RestartIgnoringLastError(
295 CompletionCallback* callback) { 295 CompletionCallback* callback) {
296 if (connection_->socket() && connection_->socket()->IsConnectedAndIdle()) { 296 if (connection_->socket() && connection_->socket()->IsConnectedAndIdle()) {
297 // TODO(wtc): Should we update any of the connection histograms that we 297 // TODO(wtc): Should we update any of the connection histograms that we
298 // update in DoSSLConnectComplete if |result| is OK? 298 // update in DoSSLConnectComplete if |result| is OK?
299 if (using_spdy_) { 299 if (using_spdy_) {
300 // TODO(cbentzel): Add auth support to spdy. See http://crbug.com/46620 300 // TODO(cbentzel): Add auth support to spdy. See http://crbug.com/46620
301 next_state_ = STATE_INIT_STREAM; 301 next_state_ = STATE_SPDY_GET_STREAM;
302 } else { 302 } else {
303 next_state_ = STATE_GENERATE_PROXY_AUTH_TOKEN; 303 next_state_ = STATE_GENERATE_PROXY_AUTH_TOKEN;
304 } 304 }
305 } else { 305 } else {
306 if (connection_->socket()) 306 if (connection_->socket())
307 connection_->socket()->Disconnect(); 307 connection_->socket()->Disconnect();
308 connection_->Reset(); 308 connection_->Reset();
309 next_state_ = STATE_INIT_CONNECTION; 309 next_state_ = STATE_INIT_CONNECTION;
310 } 310 }
311 int rv = DoLoop(OK); 311 int rv = DoLoop(OK);
(...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after
363 return rv; 363 return rv;
364 } 364 }
365 365
366 void HttpNetworkTransaction::PrepareForAuthRestart(HttpAuth::Target target) { 366 void HttpNetworkTransaction::PrepareForAuthRestart(HttpAuth::Target target) {
367 DCHECK(HaveAuth(target)); 367 DCHECK(HaveAuth(target));
368 DCHECK(!establishing_tunnel_); 368 DCHECK(!establishing_tunnel_);
369 bool keep_alive = false; 369 bool keep_alive = false;
370 // Even if the server says the connection is keep-alive, we have to be 370 // Even if the server says the connection is keep-alive, we have to be
371 // able to find the end of each response in order to reuse the connection. 371 // able to find the end of each response in order to reuse the connection.
372 if (GetResponseHeaders()->IsKeepAlive() && 372 if (GetResponseHeaders()->IsKeepAlive() &&
373 stream_->CanFindEndOfResponse()) { 373 http_stream_->CanFindEndOfResponse()) {
374 // If the response body hasn't been completely read, we need to drain 374 // If the response body hasn't been completely read, we need to drain
375 // it first. 375 // it first.
376 if (!stream_->IsResponseBodyComplete()) { 376 if (!http_stream_->IsResponseBodyComplete()) {
377 next_state_ = STATE_DRAIN_BODY_FOR_AUTH_RESTART; 377 next_state_ = STATE_DRAIN_BODY_FOR_AUTH_RESTART;
378 read_buf_ = new IOBuffer(kDrainBodyBufferSize); // A bit bucket. 378 read_buf_ = new IOBuffer(kDrainBodyBufferSize); // A bit bucket.
379 read_buf_len_ = kDrainBodyBufferSize; 379 read_buf_len_ = kDrainBodyBufferSize;
380 return; 380 return;
381 } 381 }
382 keep_alive = true; 382 keep_alive = true;
383 } 383 }
384 384
385 // We don't need to drain the response body, so we act as if we had drained 385 // We don't need to drain the response body, so we act as if we had drained
386 // the response body. 386 // the response body.
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after
423 // See http://crbug.com/8473. 423 // See http://crbug.com/8473.
424 DCHECK(proxy_info_.is_http()); 424 DCHECK(proxy_info_.is_http());
425 DCHECK_EQ(headers->response_code(), 407); 425 DCHECK_EQ(headers->response_code(), 407);
426 LOG(WARNING) << "Blocked proxy response with status " 426 LOG(WARNING) << "Blocked proxy response with status "
427 << headers->response_code() << " to CONNECT request for " 427 << headers->response_code() << " to CONNECT request for "
428 << GetHostAndPort(request_->url) << "."; 428 << GetHostAndPort(request_->url) << ".";
429 return ERR_TUNNEL_CONNECTION_FAILED; 429 return ERR_TUNNEL_CONNECTION_FAILED;
430 } 430 }
431 431
432 // Are we using SPDY or HTTP? 432 // Are we using SPDY or HTTP?
433 next_state = STATE_READ_BODY; 433 if (using_spdy_) {
434 DCHECK(stream_->GetResponseInfo()->headers); 434 DCHECK(!http_stream_.get());
435 if (!using_spdy_ && !connection_->is_initialized()) { 435 DCHECK(spdy_http_stream_->GetResponseInfo()->headers);
436 return 0; // |*connection_| has been reset. Treat like EOF. 436 next_state = STATE_SPDY_READ_BODY;
437 } else {
438 DCHECK(!spdy_http_stream_.get());
439 next_state = STATE_READ_BODY;
440
441 if (!connection_->is_initialized())
442 return 0; // |*connection_| has been reset. Treat like EOF.
437 } 443 }
438 444
439 read_buf_ = buf; 445 read_buf_ = buf;
440 read_buf_len_ = buf_len; 446 read_buf_len_ = buf_len;
441 447
442 next_state_ = next_state; 448 next_state_ = next_state;
443 int rv = DoLoop(OK); 449 int rv = DoLoop(OK);
444 if (rv == ERR_IO_PENDING) 450 if (rv == ERR_IO_PENDING)
445 user_callback_ = callback; 451 user_callback_ = callback;
446 return rv; 452 return rv;
447 } 453 }
448 454
449 const HttpResponseInfo* HttpNetworkTransaction::GetResponseInfo() const { 455 const HttpResponseInfo* HttpNetworkTransaction::GetResponseInfo() const {
450 return ((headers_valid_ && response_.headers) || response_.ssl_info.cert || 456 return ((headers_valid_ && response_.headers) || response_.ssl_info.cert ||
451 response_.cert_request_info) ? &response_ : NULL; 457 response_.cert_request_info) ? &response_ : NULL;
452 } 458 }
453 459
454 LoadState HttpNetworkTransaction::GetLoadState() const { 460 LoadState HttpNetworkTransaction::GetLoadState() const {
455 // TODO(wtc): Define a new LoadState value for the 461 // TODO(wtc): Define a new LoadState value for the
456 // STATE_INIT_CONNECTION_COMPLETE state, which delays the HTTP request. 462 // STATE_INIT_CONNECTION_COMPLETE state, which delays the HTTP request.
457 switch (next_state_) { 463 switch (next_state_) {
458 case STATE_RESOLVE_PROXY_COMPLETE: 464 case STATE_RESOLVE_PROXY_COMPLETE:
459 return LOAD_STATE_RESOLVING_PROXY_FOR_URL; 465 return LOAD_STATE_RESOLVING_PROXY_FOR_URL;
460 case STATE_INIT_CONNECTION_COMPLETE: 466 case STATE_INIT_CONNECTION_COMPLETE:
461 return connection_->GetLoadState(); 467 return connection_->GetLoadState();
462 case STATE_GENERATE_PROXY_AUTH_TOKEN_COMPLETE: 468 case STATE_GENERATE_PROXY_AUTH_TOKEN_COMPLETE:
463 case STATE_GENERATE_SERVER_AUTH_TOKEN_COMPLETE: 469 case STATE_GENERATE_SERVER_AUTH_TOKEN_COMPLETE:
464 case STATE_SEND_REQUEST_COMPLETE: 470 case STATE_SEND_REQUEST_COMPLETE:
465 case STATE_INIT_STREAM_COMPLETE: 471 case STATE_SPDY_GET_STREAM:
472 case STATE_SPDY_SEND_REQUEST_COMPLETE:
466 return LOAD_STATE_SENDING_REQUEST; 473 return LOAD_STATE_SENDING_REQUEST;
467 case STATE_READ_HEADERS_COMPLETE: 474 case STATE_READ_HEADERS_COMPLETE:
475 case STATE_SPDY_READ_HEADERS_COMPLETE:
468 return LOAD_STATE_WAITING_FOR_RESPONSE; 476 return LOAD_STATE_WAITING_FOR_RESPONSE;
469 case STATE_READ_BODY_COMPLETE: 477 case STATE_READ_BODY_COMPLETE:
478 case STATE_SPDY_READ_BODY_COMPLETE:
470 return LOAD_STATE_READING_RESPONSE; 479 return LOAD_STATE_READING_RESPONSE;
471 default: 480 default:
472 return LOAD_STATE_IDLE; 481 return LOAD_STATE_IDLE;
473 } 482 }
474 } 483 }
475 484
476 uint64 HttpNetworkTransaction::GetUploadProgress() const { 485 uint64 HttpNetworkTransaction::GetUploadProgress() const {
477 if (!stream_.get()) 486 if (!http_stream_.get())
478 return 0; 487 return 0;
479 488
480 return stream_->GetUploadProgress(); 489 return http_stream_->GetUploadProgress();
481 } 490 }
482 491
483 HttpNetworkTransaction::~HttpNetworkTransaction() { 492 HttpNetworkTransaction::~HttpNetworkTransaction() {
484 // If we still have an open socket, then make sure to disconnect it so it 493 // If we still have an open socket, then make sure to disconnect it so it
485 // won't call us back and we don't try to reuse it later on. However, 494 // won't call us back and we don't try to reuse it later on. However,
486 // don't close the socket if we should keep the connection alive. 495 // don't close the socket if we should keep the connection alive.
487 if (connection_.get() && connection_->is_initialized()) { 496 if (connection_.get() && connection_->is_initialized()) {
488 // The STATE_NONE check guarantees there are no pending socket IOs that 497 // The STATE_NONE check guarantees there are no pending socket IOs that
489 // could try to call this object back after it is deleted. 498 // could try to call this object back after it is deleted.
490 bool keep_alive = next_state_ == STATE_NONE && 499 bool keep_alive = next_state_ == STATE_NONE &&
491 !using_spdy_ && 500 http_stream_.get() &&
492 stream_.get() && 501 http_stream_->IsResponseBodyComplete() &&
493 stream_->IsResponseBodyComplete() && 502 http_stream_->CanFindEndOfResponse() &&
494 stream_->CanFindEndOfResponse() &&
495 GetResponseHeaders()->IsKeepAlive(); 503 GetResponseHeaders()->IsKeepAlive();
496 if (!keep_alive) 504 if (!keep_alive)
497 connection_->socket()->Disconnect(); 505 connection_->socket()->Disconnect();
498 } 506 }
499 507
500 if (pac_request_) 508 if (pac_request_)
501 session_->proxy_service()->CancelPacRequest(pac_request_); 509 session_->proxy_service()->CancelPacRequest(pac_request_);
502 510
503 if (using_spdy_ && stream_.get()) 511 if (spdy_http_stream_.get())
504 static_cast<SpdyHttpStream*>(stream_.get())->Cancel(); 512 spdy_http_stream_->Cancel();
505 } 513 }
506 514
507 void HttpNetworkTransaction::DoCallback(int rv) { 515 void HttpNetworkTransaction::DoCallback(int rv) {
508 DCHECK(rv != ERR_IO_PENDING); 516 DCHECK(rv != ERR_IO_PENDING);
509 DCHECK(user_callback_); 517 DCHECK(user_callback_);
510 518
511 // Since Run may result in Read being called, clear user_callback_ up front. 519 // Since Run may result in Read being called, clear user_callback_ up front.
512 CompletionCallback* c = user_callback_; 520 CompletionCallback* c = user_callback_;
513 user_callback_ = NULL; 521 user_callback_ = NULL;
514 c->Run(rv); 522 c->Run(rv);
(...skipping 20 matching lines...) Expand all
535 case STATE_RESOLVE_PROXY_COMPLETE: 543 case STATE_RESOLVE_PROXY_COMPLETE:
536 rv = DoResolveProxyComplete(rv); 544 rv = DoResolveProxyComplete(rv);
537 break; 545 break;
538 case STATE_INIT_CONNECTION: 546 case STATE_INIT_CONNECTION:
539 DCHECK_EQ(OK, rv); 547 DCHECK_EQ(OK, rv);
540 rv = DoInitConnection(); 548 rv = DoInitConnection();
541 break; 549 break;
542 case STATE_INIT_CONNECTION_COMPLETE: 550 case STATE_INIT_CONNECTION_COMPLETE:
543 rv = DoInitConnectionComplete(rv); 551 rv = DoInitConnectionComplete(rv);
544 break; 552 break;
545 case STATE_INIT_STREAM:
546 DCHECK_EQ(OK, rv);
547 rv = DoInitStream();
548 break;
549 case STATE_INIT_STREAM_COMPLETE:
550 rv = DoInitStreamComplete(rv);
551 break;
552 case STATE_RESTART_TUNNEL_AUTH: 553 case STATE_RESTART_TUNNEL_AUTH:
553 DCHECK_EQ(OK, rv); 554 DCHECK_EQ(OK, rv);
554 rv = DoRestartTunnelAuth(); 555 rv = DoRestartTunnelAuth();
555 break; 556 break;
556 case STATE_RESTART_TUNNEL_AUTH_COMPLETE: 557 case STATE_RESTART_TUNNEL_AUTH_COMPLETE:
557 rv = DoRestartTunnelAuthComplete(rv); 558 rv = DoRestartTunnelAuthComplete(rv);
558 break; 559 break;
559 case STATE_GENERATE_PROXY_AUTH_TOKEN: 560 case STATE_GENERATE_PROXY_AUTH_TOKEN:
560 DCHECK_EQ(OK, rv); 561 DCHECK_EQ(OK, rv);
561 rv = DoGenerateProxyAuthToken(); 562 rv = DoGenerateProxyAuthToken();
(...skipping 39 matching lines...) Expand 10 before | Expand all | Expand 10 after
601 DCHECK_EQ(OK, rv); 602 DCHECK_EQ(OK, rv);
602 net_log_.BeginEvent( 603 net_log_.BeginEvent(
603 NetLog::TYPE_HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART, NULL); 604 NetLog::TYPE_HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART, NULL);
604 rv = DoDrainBodyForAuthRestart(); 605 rv = DoDrainBodyForAuthRestart();
605 break; 606 break;
606 case STATE_DRAIN_BODY_FOR_AUTH_RESTART_COMPLETE: 607 case STATE_DRAIN_BODY_FOR_AUTH_RESTART_COMPLETE:
607 rv = DoDrainBodyForAuthRestartComplete(rv); 608 rv = DoDrainBodyForAuthRestartComplete(rv);
608 net_log_.EndEvent( 609 net_log_.EndEvent(
609 NetLog::TYPE_HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART, NULL); 610 NetLog::TYPE_HTTP_TRANSACTION_DRAIN_BODY_FOR_AUTH_RESTART, NULL);
610 break; 611 break;
612 case STATE_SPDY_GET_STREAM:
613 DCHECK_EQ(OK, rv);
614 rv = DoSpdyGetStream();
615 break;
616 case STATE_SPDY_GET_STREAM_COMPLETE:
617 rv = DoSpdyGetStreamComplete(rv);
618 break;
619 case STATE_SPDY_SEND_REQUEST:
620 DCHECK_EQ(OK, rv);
621 net_log_.BeginEvent(NetLog::TYPE_SPDY_TRANSACTION_SEND_REQUEST, NULL);
622 rv = DoSpdySendRequest();
623 break;
624 case STATE_SPDY_SEND_REQUEST_COMPLETE:
625 rv = DoSpdySendRequestComplete(rv);
626 net_log_.EndEvent(NetLog::TYPE_SPDY_TRANSACTION_SEND_REQUEST, NULL);
627 break;
628 case STATE_SPDY_READ_HEADERS:
629 DCHECK_EQ(OK, rv);
630 net_log_.BeginEvent(NetLog::TYPE_SPDY_TRANSACTION_READ_HEADERS, NULL);
631 rv = DoSpdyReadHeaders();
632 break;
633 case STATE_SPDY_READ_HEADERS_COMPLETE:
634 rv = DoSpdyReadHeadersComplete(rv);
635 net_log_.EndEvent(NetLog::TYPE_SPDY_TRANSACTION_READ_HEADERS, NULL);
636 break;
637 case STATE_SPDY_READ_BODY:
638 DCHECK_EQ(OK, rv);
639 net_log_.BeginEvent(NetLog::TYPE_SPDY_TRANSACTION_READ_BODY, NULL);
640 rv = DoSpdyReadBody();
641 break;
642 case STATE_SPDY_READ_BODY_COMPLETE:
643 rv = DoSpdyReadBodyComplete(rv);
644 net_log_.EndEvent(NetLog::TYPE_SPDY_TRANSACTION_READ_BODY, NULL);
645 break;
611 default: 646 default:
612 NOTREACHED() << "bad state"; 647 NOTREACHED() << "bad state";
613 rv = ERR_FAILED; 648 rv = ERR_FAILED;
614 break; 649 break;
615 } 650 }
616 } while (rv != ERR_IO_PENDING && next_state_ != STATE_NONE); 651 } while (rv != ERR_IO_PENDING && next_state_ != STATE_NONE);
617 652
618 return rv; 653 return rv;
619 } 654 }
620 655
(...skipping 85 matching lines...) Expand 10 before | Expand all | Expand 10 after
706 want_spdy_over_npn; 741 want_spdy_over_npn;
707 using_spdy_ = false; 742 using_spdy_ = false;
708 response_.was_fetched_via_proxy = !proxy_info_.is_direct(); 743 response_.was_fetched_via_proxy = !proxy_info_.is_direct();
709 744
710 // Check first if we have a spdy session for this group. If so, then go 745 // Check first if we have a spdy session for this group. If so, then go
711 // straight to using that. 746 // straight to using that.
712 HostPortProxyPair pair(endpoint_, proxy_info_.ToPacString()); 747 HostPortProxyPair pair(endpoint_, proxy_info_.ToPacString());
713 if (session_->spdy_session_pool()->HasSession(pair)) { 748 if (session_->spdy_session_pool()->HasSession(pair)) {
714 using_spdy_ = true; 749 using_spdy_ = true;
715 reused_socket_ = true; 750 reused_socket_ = true;
716 next_state_ = STATE_INIT_STREAM; 751 next_state_ = STATE_SPDY_GET_STREAM;
717 spdy_session_ =
718 session_->spdy_session_pool()->Get(pair, session_, net_log_);
719 return OK; 752 return OK;
720 } 753 }
721 754
722 // Build the string used to uniquely identify connections of this type. 755 // Build the string used to uniquely identify connections of this type.
723 // Determine the host and port to connect to. 756 // Determine the host and port to connect to.
724 std::string connection_group = endpoint_.ToString(); 757 std::string connection_group = endpoint_.ToString();
725 DCHECK(!connection_group.empty()); 758 DCHECK(!connection_group.empty());
726 759
727 if (using_ssl_) 760 if (using_ssl_)
728 connection_group = StringPrintf("ssl/%s", connection_group.c_str()); 761 connection_group = StringPrintf("ssl/%s", connection_group.c_str());
(...skipping 187 matching lines...) Expand 10 before | Expand all | Expand 10 after
916 if (!reused_socket_) { 949 if (!reused_socket_) {
917 if (using_spdy_) 950 if (using_spdy_)
918 UpdateConnectionTypeHistograms(CONNECTION_SPDY); 951 UpdateConnectionTypeHistograms(CONNECTION_SPDY);
919 else 952 else
920 UpdateConnectionTypeHistograms(CONNECTION_HTTP); 953 UpdateConnectionTypeHistograms(CONNECTION_HTTP);
921 } 954 }
922 955
923 if (!using_ssl_) { 956 if (!using_ssl_) {
924 DCHECK_EQ(OK, result); 957 DCHECK_EQ(OK, result);
925 if (using_spdy_) 958 if (using_spdy_)
926 next_state_ = STATE_INIT_STREAM; 959 next_state_ = STATE_SPDY_GET_STREAM;
927 else 960 else
928 next_state_ = STATE_GENERATE_PROXY_AUTH_TOKEN; 961 next_state_ = STATE_GENERATE_PROXY_AUTH_TOKEN;
929 return result; 962 return result;
930 } 963 }
931 } 964 }
932 965
933 // Handle SSL errors below. 966 // Handle SSL errors below.
934 DCHECK(using_ssl_); 967 DCHECK(using_ssl_);
935 DCHECK(ssl_started); 968 DCHECK(ssl_started);
936 if (IsCertificateError(result)) { 969 if (IsCertificateError(result)) {
(...skipping 16 matching lines...) Expand all
953 response_.cert_request_info = 986 response_.cert_request_info =
954 connection_->ssl_error_response_info().cert_request_info; 987 connection_->ssl_error_response_info().cert_request_info;
955 return HandleCertificateRequest(result); 988 return HandleCertificateRequest(result);
956 } 989 }
957 if (result < 0) 990 if (result < 0)
958 return HandleSSLHandshakeError(result); 991 return HandleSSLHandshakeError(result);
959 992
960 if (using_spdy_) { 993 if (using_spdy_) {
961 UpdateConnectionTypeHistograms(CONNECTION_SPDY); 994 UpdateConnectionTypeHistograms(CONNECTION_SPDY);
962 // TODO(cbentzel): Add auth support to spdy. See http://crbug.com/46620 995 // TODO(cbentzel): Add auth support to spdy. See http://crbug.com/46620
963 next_state_ = STATE_INIT_STREAM; 996 next_state_ = STATE_SPDY_GET_STREAM;
964 } else { 997 } else {
965 next_state_ = STATE_GENERATE_PROXY_AUTH_TOKEN; 998 next_state_ = STATE_GENERATE_PROXY_AUTH_TOKEN;
966 } 999 }
967 return OK; 1000 return OK;
968 } 1001 }
969 1002
970 int HttpNetworkTransaction::DoInitStream() {
971 next_state_ = STATE_INIT_STREAM_COMPLETE;
972
973 if (!using_spdy_) {
974 stream_.reset(new HttpBasicStream(connection_.get()));
975 return stream_->InitializeStream(request_, net_log_, &io_callback_);
976 }
977
978 CHECK(!stream_.get());
979
980 const scoped_refptr<SpdySessionPool> spdy_pool =
981 session_->spdy_session_pool();
982
983 HostPortProxyPair pair(endpoint_, proxy_info_.ToPacString());
984 if (!spdy_session_.get()) {
985 // SPDY can be negotiated using the TLS next protocol negotiation (NPN)
986 // extension, or just directly using SSL. Either way, |connection_| must
987 // contain an SSLClientSocket.
988 CHECK(connection_->socket());
989 int error = spdy_pool->GetSpdySessionFromSocket(
990 pair, session_, connection_.release(), net_log_,
991 spdy_certificate_error_, &spdy_session_, using_ssl_);
992 if (error != OK)
993 return error;
994 }
995 CHECK(spdy_session_.get());
996 if (spdy_session_->IsClosed())
997 return ERR_CONNECTION_CLOSED;
998
999 headers_valid_ = false;
1000
1001 stream_.reset(new SpdyHttpStream(spdy_session_.release()));
1002 return stream_->InitializeStream(request_, net_log_, &io_callback_);
1003 }
1004
1005 int HttpNetworkTransaction::DoInitStreamComplete(int result) {
1006 if (result < 0)
1007 return result;
1008
1009 next_state_ = STATE_SEND_REQUEST;
1010 return OK;
1011 }
1012
1013 int HttpNetworkTransaction::DoRestartTunnelAuth() { 1003 int HttpNetworkTransaction::DoRestartTunnelAuth() {
1014 next_state_ = STATE_RESTART_TUNNEL_AUTH_COMPLETE; 1004 next_state_ = STATE_RESTART_TUNNEL_AUTH_COMPLETE;
1015 HttpProxyClientSocket* http_proxy_socket = 1005 HttpProxyClientSocket* http_proxy_socket =
1016 static_cast<HttpProxyClientSocket*>(connection_->socket()); 1006 static_cast<HttpProxyClientSocket*>(connection_->socket());
1017 return http_proxy_socket->RestartWithAuth(&io_callback_); 1007 return http_proxy_socket->RestartWithAuth(&io_callback_);
1018 } 1008 }
1019 1009
1020 int HttpNetworkTransaction::DoRestartTunnelAuthComplete(int result) { 1010 int HttpNetworkTransaction::DoRestartTunnelAuthComplete(int result) {
1021 if (result == ERR_PROXY_AUTH_REQUESTED) 1011 if (result == ERR_PROXY_AUTH_REQUESTED)
1022 return HandleTunnelAuthFailure(result); 1012 return HandleTunnelAuthFailure(result);
(...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after
1066 if (!ShouldApplyServerAuth()) 1056 if (!ShouldApplyServerAuth())
1067 return OK; 1057 return OK;
1068 return auth_controllers_[target]->MaybeGenerateAuthToken(request_, 1058 return auth_controllers_[target]->MaybeGenerateAuthToken(request_,
1069 &io_callback_, 1059 &io_callback_,
1070 net_log_); 1060 net_log_);
1071 } 1061 }
1072 1062
1073 int HttpNetworkTransaction::DoGenerateServerAuthTokenComplete(int rv) { 1063 int HttpNetworkTransaction::DoGenerateServerAuthTokenComplete(int rv) {
1074 DCHECK_NE(ERR_IO_PENDING, rv); 1064 DCHECK_NE(ERR_IO_PENDING, rv);
1075 if (rv == OK) 1065 if (rv == OK)
1076 next_state_ = STATE_INIT_STREAM; 1066 next_state_ = STATE_SEND_REQUEST;
1077 return rv; 1067 return rv;
1078 } 1068 }
1079 1069
1080 int HttpNetworkTransaction::DoSendRequest() { 1070 int HttpNetworkTransaction::DoSendRequest() {
1081 next_state_ = STATE_SEND_REQUEST_COMPLETE; 1071 next_state_ = STATE_SEND_REQUEST_COMPLETE;
1082 1072
1083 UploadDataStream* request_body = NULL; 1073 UploadDataStream* request_body = NULL;
1084 if (request_->upload_data) { 1074 if (request_->upload_data) {
1085 int error_code; 1075 int error_code;
1086 request_body = UploadDataStream::Create(request_->upload_data, &error_code); 1076 request_body = UploadDataStream::Create(request_->upload_data, &error_code);
1087 if (!request_body) 1077 if (!request_body)
1088 return error_code; 1078 return error_code;
1089 } 1079 }
1090 1080
1091 // This is constructed lazily (instead of within our Start method), so that 1081 // This is constructed lazily (instead of within our Start method), so that
1092 // we have proxy info available. 1082 // we have proxy info available.
1093 if (request_headers_.empty() && !using_spdy_) { 1083 if (request_headers_.empty()) {
1094 // Figure out if we can/should add Proxy-Authentication & Authentication 1084 // Figure out if we can/should add Proxy-Authentication & Authentication
1095 // headers. 1085 // headers.
1096 HttpRequestHeaders authorization_headers; 1086 HttpRequestHeaders authorization_headers;
1097 bool have_proxy_auth = (ShouldApplyProxyAuth() && 1087 bool have_proxy_auth = (ShouldApplyProxyAuth() &&
1098 HaveAuth(HttpAuth::AUTH_PROXY)); 1088 HaveAuth(HttpAuth::AUTH_PROXY));
1099 bool have_server_auth = (ShouldApplyServerAuth() && 1089 bool have_server_auth = (ShouldApplyServerAuth() &&
1100 HaveAuth(HttpAuth::AUTH_SERVER)); 1090 HaveAuth(HttpAuth::AUTH_SERVER));
1101 if (have_proxy_auth) 1091 if (have_proxy_auth)
1102 auth_controllers_[HttpAuth::AUTH_PROXY]->AddAuthorizationHeader( 1092 auth_controllers_[HttpAuth::AUTH_PROXY]->AddAuthorizationHeader(
1103 &authorization_headers); 1093 &authorization_headers);
(...skipping 12 matching lines...) Expand all
1116 if (net_log_.HasListener()) { 1106 if (net_log_.HasListener()) {
1117 net_log_.AddEvent( 1107 net_log_.AddEvent(
1118 NetLog::TYPE_HTTP_TRANSACTION_SEND_REQUEST_HEADERS, 1108 NetLog::TYPE_HTTP_TRANSACTION_SEND_REQUEST_HEADERS,
1119 new NetLogHttpRequestParameter(request_line, request_headers)); 1109 new NetLogHttpRequestParameter(request_line, request_headers));
1120 } 1110 }
1121 1111
1122 request_headers_ = request_line + request_headers.ToString(); 1112 request_headers_ = request_line + request_headers.ToString();
1123 } 1113 }
1124 1114
1125 headers_valid_ = false; 1115 headers_valid_ = false;
1126 return stream_->SendRequest(request_headers_, request_body, &response_, 1116 http_stream_.reset(new HttpBasicStream(connection_.get()));
1127 &io_callback_); 1117 http_stream_->InitializeStream(request_, net_log_, NULL);
1118 return http_stream_->SendRequest(request_headers_, request_body, &response_,
1119 &io_callback_);
1128 } 1120 }
1129 1121
1130 int HttpNetworkTransaction::DoSendRequestComplete(int result) { 1122 int HttpNetworkTransaction::DoSendRequestComplete(int result) {
1131 if (result < 0) 1123 if (result < 0)
1132 return HandleIOError(result); 1124 return HandleIOError(result);
1133 next_state_ = STATE_READ_HEADERS; 1125 next_state_ = STATE_READ_HEADERS;
1134 return OK; 1126 return OK;
1135 } 1127 }
1136 1128
1137 int HttpNetworkTransaction::DoReadHeaders() { 1129 int HttpNetworkTransaction::DoReadHeaders() {
1138 next_state_ = STATE_READ_HEADERS_COMPLETE; 1130 next_state_ = STATE_READ_HEADERS_COMPLETE;
1139 return stream_->ReadResponseHeaders(&io_callback_); 1131 return http_stream_->ReadResponseHeaders(&io_callback_);
1140 } 1132 }
1141 1133
1142 int HttpNetworkTransaction::HandleConnectionClosedBeforeEndOfHeaders() { 1134 int HttpNetworkTransaction::HandleConnectionClosedBeforeEndOfHeaders() {
1143 if (!response_.headers) { 1135 if (!response_.headers) {
1144 // The connection was closed before any data was sent. Likely an error 1136 // The connection was closed before any data was sent. Likely an error
1145 // rather than empty HTTP/0.9 response. 1137 // rather than empty HTTP/0.9 response.
1146 return ERR_EMPTY_RESPONSE; 1138 return ERR_EMPTY_RESPONSE;
1147 } 1139 }
1148 1140
1149 return OK; 1141 return OK;
1150 } 1142 }
1151 1143
1152 int HttpNetworkTransaction::DoReadHeadersComplete(int result) { 1144 int HttpNetworkTransaction::DoReadHeadersComplete(int result) {
1153 if (using_spdy_) {
1154 // TODO(willchan): Flesh out the support for HTTP authentication here.
1155 if (result < 0)
1156 return HandleIOError(result);
1157
1158 if (result == OK)
1159 headers_valid_ = true;
1160
1161 LogTransactionConnectedMetrics();
1162 return result;
1163 }
1164
1165 // We can get a certificate error or ERR_SSL_CLIENT_AUTH_CERT_NEEDED here 1145 // We can get a certificate error or ERR_SSL_CLIENT_AUTH_CERT_NEEDED here
1166 // due to SSL renegotiation. 1146 // due to SSL renegotiation.
1167 if (using_ssl_) { 1147 if (using_ssl_) {
1168 if (IsCertificateError(result)) { 1148 if (IsCertificateError(result)) {
1169 // We don't handle a certificate error during SSL renegotiation, so we 1149 // We don't handle a certificate error during SSL renegotiation, so we
1170 // have to return an error that's not in the certificate error range 1150 // have to return an error that's not in the certificate error range
1171 // (-2xx). 1151 // (-2xx).
1172 LOG(ERROR) << "Got a server certificate with error " << result 1152 LOG(ERROR) << "Got a server certificate with error " << result
1173 << " during SSL renegotiation"; 1153 << " during SSL renegotiation";
1174 result = ERR_CERT_ERROR_IN_SSL_RENEGOTIATION; 1154 result = ERR_CERT_ERROR_IN_SSL_RENEGOTIATION;
(...skipping 85 matching lines...) Expand 10 before | Expand all | Expand 10 after
1260 ssl_socket->GetSSLInfo(&response_.ssl_info); 1240 ssl_socket->GetSSLInfo(&response_.ssl_info);
1261 } 1241 }
1262 1242
1263 headers_valid_ = true; 1243 headers_valid_ = true;
1264 return OK; 1244 return OK;
1265 } 1245 }
1266 1246
1267 int HttpNetworkTransaction::DoReadBody() { 1247 int HttpNetworkTransaction::DoReadBody() {
1268 DCHECK(read_buf_); 1248 DCHECK(read_buf_);
1269 DCHECK_GT(read_buf_len_, 0); 1249 DCHECK_GT(read_buf_len_, 0);
1270 if (!using_spdy_) 1250 DCHECK(connection_->is_initialized());
1271 DCHECK(connection_->is_initialized());
1272 1251
1273 next_state_ = STATE_READ_BODY_COMPLETE; 1252 next_state_ = STATE_READ_BODY_COMPLETE;
1274 return stream_->ReadResponseBody(read_buf_, read_buf_len_, &io_callback_); 1253 return http_stream_->ReadResponseBody(read_buf_, read_buf_len_,
1254 &io_callback_);
1275 } 1255 }
1276 1256
1277 int HttpNetworkTransaction::DoReadBodyComplete(int result) { 1257 int HttpNetworkTransaction::DoReadBodyComplete(int result) {
1278 // We are done with the Read call. 1258 // We are done with the Read call.
1279 bool done = false, keep_alive = false; 1259 bool done = false, keep_alive = false;
1280 if (result <= 0) 1260 if (result <= 0)
1281 done = true; 1261 done = true;
1282 1262
1283 if (stream_->IsResponseBodyComplete()) { 1263 if (http_stream_->IsResponseBodyComplete()) {
1284 done = true; 1264 done = true;
1285 if (stream_->CanFindEndOfResponse()) 1265 if (http_stream_->CanFindEndOfResponse())
1286 keep_alive = GetResponseHeaders()->IsKeepAlive(); 1266 keep_alive = GetResponseHeaders()->IsKeepAlive();
1287 } 1267 }
1288 1268
1289 // Clean up connection_->if we are done. 1269 // Clean up connection_->if we are done.
1290 if (done) { 1270 if (done) {
1291 LogTransactionMetrics(); 1271 LogTransactionMetrics();
1292 if (!using_spdy_) { 1272 if (!keep_alive)
1293 if (!keep_alive) 1273 connection_->socket()->Disconnect();
1294 connection_->socket()->Disconnect(); 1274 connection_->Reset();
1295 connection_->Reset(); 1275 // The next Read call will return 0 (EOF).
1296 // The next Read call will return 0 (EOF).
1297 }
1298 } 1276 }
1299 1277
1300 // Clear these to avoid leaving around old state. 1278 // Clear these to avoid leaving around old state.
1301 read_buf_ = NULL; 1279 read_buf_ = NULL;
1302 read_buf_len_ = 0; 1280 read_buf_len_ = 0;
1303 1281
1304 return result; 1282 return result;
1305 } 1283 }
1306 1284
1307 int HttpNetworkTransaction::DoDrainBodyForAuthRestart() { 1285 int HttpNetworkTransaction::DoDrainBodyForAuthRestart() {
1308 // This method differs from DoReadBody only in the next_state_. So we just 1286 // This method differs from DoReadBody only in the next_state_. So we just
1309 // call DoReadBody and override the next_state_. Perhaps there is a more 1287 // call DoReadBody and override the next_state_. Perhaps there is a more
1310 // elegant way for these two methods to share code. 1288 // elegant way for these two methods to share code.
1311 int rv = DoReadBody(); 1289 int rv = DoReadBody();
1312 DCHECK(next_state_ == STATE_READ_BODY_COMPLETE); 1290 DCHECK(next_state_ == STATE_READ_BODY_COMPLETE);
1313 next_state_ = STATE_DRAIN_BODY_FOR_AUTH_RESTART_COMPLETE; 1291 next_state_ = STATE_DRAIN_BODY_FOR_AUTH_RESTART_COMPLETE;
1314 return rv; 1292 return rv;
1315 } 1293 }
1316 1294
1317 // TODO(wtc): This method and the DoReadBodyComplete method are almost 1295 // TODO(wtc): This method and the DoReadBodyComplete method are almost
1318 // the same. Figure out a good way for these two methods to share code. 1296 // the same. Figure out a good way for these two methods to share code.
1319 int HttpNetworkTransaction::DoDrainBodyForAuthRestartComplete(int result) { 1297 int HttpNetworkTransaction::DoDrainBodyForAuthRestartComplete(int result) {
1320 // keep_alive defaults to true because the very reason we're draining the 1298 // keep_alive defaults to true because the very reason we're draining the
1321 // response body is to reuse the connection for auth restart. 1299 // response body is to reuse the connection for auth restart.
1322 bool done = false, keep_alive = true; 1300 bool done = false, keep_alive = true;
1323 if (result < 0) { 1301 if (result < 0) {
1324 // Error or closed connection while reading the socket. 1302 // Error or closed connection while reading the socket.
1325 done = true; 1303 done = true;
1326 keep_alive = false; 1304 keep_alive = false;
1327 } else if (stream_->IsResponseBodyComplete()) { 1305 } else if (http_stream_->IsResponseBodyComplete()) {
1328 done = true; 1306 done = true;
1329 } 1307 }
1330 1308
1331 if (done) { 1309 if (done) {
1332 DidDrainBodyForAuthRestart(keep_alive); 1310 DidDrainBodyForAuthRestart(keep_alive);
1333 } else { 1311 } else {
1334 // Keep draining. 1312 // Keep draining.
1335 next_state_ = STATE_DRAIN_BODY_FOR_AUTH_RESTART; 1313 next_state_ = STATE_DRAIN_BODY_FOR_AUTH_RESTART;
1336 } 1314 }
1337 1315
1338 return OK; 1316 return OK;
1339 } 1317 }
1340 1318
1319 int HttpNetworkTransaction::DoSpdyGetStream() {
1320 next_state_ = STATE_SPDY_GET_STREAM_COMPLETE;
1321 CHECK(!spdy_http_stream_.get());
1322
1323 // First we get a SPDY session. Theoretically, we've just negotiated one, but
1324 // if one already exists, then screw it, use the existing one! Otherwise,
1325 // use the existing TCP socket.
1326
1327 const scoped_refptr<SpdySessionPool> spdy_pool =
1328 session_->spdy_session_pool();
1329 scoped_refptr<SpdySession> spdy_session;
1330
1331 HostPortProxyPair pair(endpoint_, proxy_info_.ToPacString());
1332 if (spdy_pool->HasSession(pair)) {
1333 spdy_session = spdy_pool->Get(pair, session_, net_log_);
1334 } else {
1335 if(using_ssl_) {
1336 // SPDY can be negotiated using the TLS next protocol negotiation (NPN)
1337 // extension, or just directly using SSL. Either way, |connection_| must
1338 // contain an SSLClientSocket.
1339 CHECK(connection_->socket());
1340 int error = spdy_pool->GetSpdySessionFromSocket(
1341 pair, session_, connection_.release(), net_log_,
1342 spdy_certificate_error_, &spdy_session, true);
1343 if (error != OK)
1344 return error;
1345 }
1346 else {
1347 // We may want SPDY without SSL
1348 int error = spdy_pool->GetSpdySessionFromSocket(
1349 pair, session_, connection_.release(), net_log_,
1350 spdy_certificate_error_, &spdy_session, false);
1351 if (error != OK)
1352 return error;
1353 }
1354 }
1355
1356 CHECK(spdy_session.get());
1357 if (spdy_session->IsClosed())
1358 return ERR_CONNECTION_CLOSED;
1359
1360 headers_valid_ = false;
1361
1362 spdy_http_stream_.reset(new SpdyHttpStream(spdy_session));
1363 return spdy_http_stream_->InitializeStream(request_, net_log_, &io_callback_);
1364 }
1365
1366 int HttpNetworkTransaction::DoSpdyGetStreamComplete(int result) {
1367 if (result < 0)
1368 return result;
1369
1370 next_state_ = STATE_SPDY_SEND_REQUEST;
1371 return OK;
1372 }
1373
1374 int HttpNetworkTransaction::DoSpdySendRequest() {
1375 next_state_ = STATE_SPDY_SEND_REQUEST_COMPLETE;
1376
1377 UploadDataStream* upload_data_stream = NULL;
1378 if (request_->upload_data) {
1379 int error_code = OK;
1380 upload_data_stream = UploadDataStream::Create(request_->upload_data,
1381 &error_code);
1382 if (!upload_data_stream)
1383 return error_code;
1384 }
1385 return spdy_http_stream_->SendRequest(request_headers_, upload_data_stream,
1386 &response_, &io_callback_);
1387 }
1388
1389 int HttpNetworkTransaction::DoSpdySendRequestComplete(int result) {
1390 if (result < 0)
1391 return HandleIOError(result);
1392
1393 next_state_ = STATE_SPDY_READ_HEADERS;
1394 return OK;
1395 }
1396
1397 int HttpNetworkTransaction::DoSpdyReadHeaders() {
1398 next_state_ = STATE_SPDY_READ_HEADERS_COMPLETE;
1399 return spdy_http_stream_->ReadResponseHeaders(&io_callback_);
1400 }
1401
1402 int HttpNetworkTransaction::DoSpdyReadHeadersComplete(int result) {
1403 // TODO(willchan): Flesh out the support for HTTP authentication here.
1404 if (result < 0)
1405 return HandleIOError(result);
1406
1407 if (result == OK)
1408 headers_valid_ = true;
1409
1410 LogTransactionConnectedMetrics();
1411 return result;
1412 }
1413
1414 int HttpNetworkTransaction::DoSpdyReadBody() {
1415 next_state_ = STATE_SPDY_READ_BODY_COMPLETE;
1416
1417 return spdy_http_stream_->ReadResponseBody(
1418 read_buf_, read_buf_len_, &io_callback_);
1419 }
1420
1421 int HttpNetworkTransaction::DoSpdyReadBodyComplete(int result) {
1422 read_buf_ = NULL;
1423 read_buf_len_ = 0;
1424
1425 if (result <= 0)
1426 spdy_http_stream_.reset();
1427
1428 return result;
1429 }
1430
1341 void HttpNetworkTransaction::LogHttpConnectedMetrics( 1431 void HttpNetworkTransaction::LogHttpConnectedMetrics(
1342 const ClientSocketHandle& handle) { 1432 const ClientSocketHandle& handle) {
1343 UMA_HISTOGRAM_ENUMERATION("Net.HttpSocketType", handle.reuse_type(), 1433 UMA_HISTOGRAM_ENUMERATION("Net.HttpSocketType", handle.reuse_type(),
1344 ClientSocketHandle::NUM_TYPES); 1434 ClientSocketHandle::NUM_TYPES);
1345 1435
1346 switch (handle.reuse_type()) { 1436 switch (handle.reuse_type()) {
1347 case ClientSocketHandle::UNUSED: 1437 case ClientSocketHandle::UNUSED:
1348 UMA_HISTOGRAM_CUSTOM_TIMES("Net.HttpConnectionLatency", 1438 UMA_HISTOGRAM_CUSTOM_TIMES("Net.HttpConnectionLatency",
1349 handle.setup_time(), 1439 handle.setup_time(),
1350 base::TimeDelta::FromMilliseconds(1), 1440 base::TimeDelta::FromMilliseconds(1),
(...skipping 258 matching lines...) Expand 10 before | Expand all | Expand 10 after
1609 } 1699 }
1610 break; 1700 break;
1611 } 1701 }
1612 return error; 1702 return error;
1613 } 1703 }
1614 1704
1615 void HttpNetworkTransaction::ResetStateForRestart() { 1705 void HttpNetworkTransaction::ResetStateForRestart() {
1616 pending_auth_target_ = HttpAuth::AUTH_NONE; 1706 pending_auth_target_ = HttpAuth::AUTH_NONE;
1617 read_buf_ = NULL; 1707 read_buf_ = NULL;
1618 read_buf_len_ = 0; 1708 read_buf_len_ = 0;
1619 stream_.reset(); 1709 http_stream_.reset();
1620 headers_valid_ = false; 1710 headers_valid_ = false;
1621 request_headers_.clear(); 1711 request_headers_.clear();
1622 response_ = HttpResponseInfo(); 1712 response_ = HttpResponseInfo();
1623 } 1713 }
1624 1714
1625 HttpResponseHeaders* HttpNetworkTransaction::GetResponseHeaders() const { 1715 HttpResponseHeaders* HttpNetworkTransaction::GetResponseHeaders() const {
1626 return response_.headers; 1716 return response_.headers;
1627 } 1717 }
1628 1718
1629 bool HttpNetworkTransaction::ShouldResendRequest(int error) const { 1719 bool HttpNetworkTransaction::ShouldResendRequest(int error) const {
1630 if (using_spdy_ && stream_ != NULL) 1720 if (using_spdy_ && spdy_http_stream_ != NULL)
1631 return static_cast<SpdyHttpStream *>(stream_.get())-> 1721 return spdy_http_stream_->ShouldResendFailedRequest(error);
1632 ShouldResendFailedRequest(error);
1633 1722
1634 // NOTE: we resend a request only if we reused a keep-alive connection. 1723 // NOTE: we resend a request only if we reused a keep-alive connection.
1635 // This automatically prevents an infinite resend loop because we'll run 1724 // This automatically prevents an infinite resend loop because we'll run
1636 // out of the cached keep-alive connections eventually. 1725 // out of the cached keep-alive connections eventually.
1637 if (!connection_->ShouldResendFailedRequest(error) || 1726 if (!connection_->ShouldResendFailedRequest(error) ||
1638 GetResponseHeaders()) { // We have received some response headers. 1727 GetResponseHeaders()) { // We have received some response headers.
1639 return false; 1728 return false;
1640 } 1729 }
1641 return true; 1730 return true;
1642 } 1731 }
1643 1732
1644 void HttpNetworkTransaction::ResetConnectionAndRequestForResend() { 1733 void HttpNetworkTransaction::ResetConnectionAndRequestForResend() {
1645 // Note: When using SPDY we may not own a connection. 1734 // Note: When using SPDY we may not own a connection.
1646 if (connection_.get()) { 1735 if (connection_.get()) {
1647 if (connection_->socket()) 1736 if (connection_->socket())
1648 connection_->socket()->Disconnect(); 1737 connection_->socket()->Disconnect();
1649 connection_->Reset(); 1738 connection_->Reset();
1650 } else { 1739 } else {
1651 DCHECK(using_spdy_); 1740 DCHECK(using_spdy_);
1652 connection_.reset(new ClientSocketHandle); 1741 connection_.reset(new ClientSocketHandle);
1653 } 1742 }
1654 1743
1655 // We need to clear request_headers_ because it contains the real request 1744 // We need to clear request_headers_ because it contains the real request
1656 // headers, but we may need to resend the CONNECT request first to recreate 1745 // headers, but we may need to resend the CONNECT request first to recreate
1657 // the SSL tunnel. 1746 // the SSL tunnel.
1658 1747
1659 stream_.reset(NULL); 1748 spdy_http_stream_.reset(NULL);
1660 1749
1661 request_headers_.clear(); 1750 request_headers_.clear();
1662 next_state_ = STATE_INIT_CONNECTION; // Resend the request. 1751 next_state_ = STATE_INIT_CONNECTION; // Resend the request.
1663 } 1752 }
1664 1753
1665 int HttpNetworkTransaction::ReconsiderProxyAfterError(int error) { 1754 int HttpNetworkTransaction::ReconsiderProxyAfterError(int error) {
1666 DCHECK(!pac_request_); 1755 DCHECK(!pac_request_);
1667 1756
1668 // A failure to resolve the hostname or any error related to establishing a 1757 // A failure to resolve the hostname or any error related to establishing a
1669 // TCP connection could be grounds for trying a new proxy configuration. 1758 // TCP connection could be grounds for trying a new proxy configuration.
(...skipping 128 matching lines...) Expand 10 before | Expand all | Expand 10 after
1798 description = StringPrintf("%s (0x%08X)", #s, s); \ 1887 description = StringPrintf("%s (0x%08X)", #s, s); \
1799 break 1888 break
1800 1889
1801 std::string HttpNetworkTransaction::DescribeState(State state) { 1890 std::string HttpNetworkTransaction::DescribeState(State state) {
1802 std::string description; 1891 std::string description;
1803 switch (state) { 1892 switch (state) {
1804 STATE_CASE(STATE_RESOLVE_PROXY); 1893 STATE_CASE(STATE_RESOLVE_PROXY);
1805 STATE_CASE(STATE_RESOLVE_PROXY_COMPLETE); 1894 STATE_CASE(STATE_RESOLVE_PROXY_COMPLETE);
1806 STATE_CASE(STATE_INIT_CONNECTION); 1895 STATE_CASE(STATE_INIT_CONNECTION);
1807 STATE_CASE(STATE_INIT_CONNECTION_COMPLETE); 1896 STATE_CASE(STATE_INIT_CONNECTION_COMPLETE);
1808 STATE_CASE(STATE_INIT_STREAM);
1809 STATE_CASE(STATE_INIT_STREAM_COMPLETE);
1810 STATE_CASE(STATE_GENERATE_PROXY_AUTH_TOKEN); 1897 STATE_CASE(STATE_GENERATE_PROXY_AUTH_TOKEN);
1811 STATE_CASE(STATE_GENERATE_PROXY_AUTH_TOKEN_COMPLETE); 1898 STATE_CASE(STATE_GENERATE_PROXY_AUTH_TOKEN_COMPLETE);
1812 STATE_CASE(STATE_GENERATE_SERVER_AUTH_TOKEN); 1899 STATE_CASE(STATE_GENERATE_SERVER_AUTH_TOKEN);
1813 STATE_CASE(STATE_GENERATE_SERVER_AUTH_TOKEN_COMPLETE); 1900 STATE_CASE(STATE_GENERATE_SERVER_AUTH_TOKEN_COMPLETE);
1814 STATE_CASE(STATE_SEND_REQUEST); 1901 STATE_CASE(STATE_SEND_REQUEST);
1815 STATE_CASE(STATE_SEND_REQUEST_COMPLETE); 1902 STATE_CASE(STATE_SEND_REQUEST_COMPLETE);
1816 STATE_CASE(STATE_READ_HEADERS); 1903 STATE_CASE(STATE_READ_HEADERS);
1817 STATE_CASE(STATE_READ_HEADERS_COMPLETE); 1904 STATE_CASE(STATE_READ_HEADERS_COMPLETE);
1818 STATE_CASE(STATE_READ_BODY); 1905 STATE_CASE(STATE_READ_BODY);
1819 STATE_CASE(STATE_READ_BODY_COMPLETE); 1906 STATE_CASE(STATE_READ_BODY_COMPLETE);
1820 STATE_CASE(STATE_DRAIN_BODY_FOR_AUTH_RESTART); 1907 STATE_CASE(STATE_DRAIN_BODY_FOR_AUTH_RESTART);
1821 STATE_CASE(STATE_DRAIN_BODY_FOR_AUTH_RESTART_COMPLETE); 1908 STATE_CASE(STATE_DRAIN_BODY_FOR_AUTH_RESTART_COMPLETE);
1909 STATE_CASE(STATE_SPDY_GET_STREAM);
1910 STATE_CASE(STATE_SPDY_GET_STREAM_COMPLETE);
1911 STATE_CASE(STATE_SPDY_SEND_REQUEST);
1912 STATE_CASE(STATE_SPDY_SEND_REQUEST_COMPLETE);
1913 STATE_CASE(STATE_SPDY_READ_HEADERS);
1914 STATE_CASE(STATE_SPDY_READ_HEADERS_COMPLETE);
1915 STATE_CASE(STATE_SPDY_READ_BODY);
1916 STATE_CASE(STATE_SPDY_READ_BODY_COMPLETE);
1822 STATE_CASE(STATE_NONE); 1917 STATE_CASE(STATE_NONE);
1823 default: 1918 default:
1824 description = StringPrintf("Unknown state 0x%08X (%u)", state, state); 1919 description = StringPrintf("Unknown state 0x%08X (%u)", state, state);
1825 break; 1920 break;
1826 } 1921 }
1827 return description; 1922 return description;
1828 } 1923 }
1829 1924
1830 // TODO(gavinp): re-adjust this once SPDY v3 has three priority bits, 1925 // TODO(gavinp): re-adjust this once SPDY v3 has three priority bits,
1831 // eliminating the need for this folding. 1926 // eliminating the need for this folding.
1832 int ConvertRequestPriorityToSpdyPriority(const RequestPriority priority) { 1927 int ConvertRequestPriorityToSpdyPriority(const RequestPriority priority) {
1833 DCHECK(HIGHEST <= priority && priority < NUM_PRIORITIES); 1928 DCHECK(HIGHEST <= priority && priority < NUM_PRIORITIES);
1834 switch (priority) { 1929 switch (priority) {
1835 case LOWEST: 1930 case LOWEST:
1836 return SPDY_PRIORITY_LOWEST-1; 1931 return SPDY_PRIORITY_LOWEST-1;
1837 case IDLE: 1932 case IDLE:
1838 return SPDY_PRIORITY_LOWEST; 1933 return SPDY_PRIORITY_LOWEST;
1839 default: 1934 default:
1840 return priority; 1935 return priority;
1841 } 1936 }
1842 } 1937 }
1843 1938
1844 1939
1845 1940
1846 #undef STATE_CASE 1941 #undef STATE_CASE
1847 1942
1848 } // namespace net 1943 } // namespace net
OLDNEW
« no previous file with comments | « net/http/http_network_transaction.h ('k') | net/spdy/spdy_network_transaction_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698