Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2009 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2009 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 // | 4 // |
| 5 // TODO(ukai): code is similar with http_network_transaction.cc. We should | 5 // TODO(ukai): code is similar with http_network_transaction.cc. We should |
| 6 // think about ways to share code, if possible. | 6 // think about ways to share code, if possible. |
| 7 | 7 |
| 8 #include "net/socket_stream/socket_stream.h" | 8 #include "net/socket_stream/socket_stream.h" |
| 9 | 9 |
| 10 #include <string> | 10 #include <string> |
| (...skipping 197 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 208 } | 208 } |
| 209 | 209 |
| 210 void SocketStream::SetClientSocketFactory( | 210 void SocketStream::SetClientSocketFactory( |
| 211 ClientSocketFactory* factory) { | 211 ClientSocketFactory* factory) { |
| 212 DCHECK(factory); | 212 DCHECK(factory); |
| 213 factory_ = factory; | 213 factory_ = factory; |
| 214 } | 214 } |
| 215 | 215 |
| 216 int SocketStream::DidEstablishConnection() { | 216 int SocketStream::DidEstablishConnection() { |
| 217 if (!socket_.get() || !socket_->IsConnected()) { | 217 if (!socket_.get() || !socket_->IsConnected()) { |
| 218 next_state_ = STATE_CLOSE; | |
| 218 return ERR_CONNECTION_FAILED; | 219 return ERR_CONNECTION_FAILED; |
| 219 } | 220 } |
| 220 next_state_ = STATE_READ_WRITE; | 221 next_state_ = STATE_READ_WRITE; |
| 221 | 222 |
| 222 if (delegate_) | 223 if (delegate_) |
| 223 delegate_->OnConnected(this, max_pending_send_allowed_); | 224 delegate_->OnConnected(this, max_pending_send_allowed_); |
| 224 | 225 |
| 225 return OK; | 226 return OK; |
| 226 } | 227 } |
| 227 | 228 |
| (...skipping 114 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 342 result = DoReadWrite(result); | 343 result = DoReadWrite(result); |
| 343 break; | 344 break; |
| 344 case STATE_CLOSE: | 345 case STATE_CLOSE: |
| 345 DCHECK_LE(result, OK); | 346 DCHECK_LE(result, OK); |
| 346 if (result == OK) | 347 if (result == OK) |
| 347 result = ERR_CONNECTION_CLOSED; | 348 result = ERR_CONNECTION_CLOSED; |
| 348 Finish(result); | 349 Finish(result); |
| 349 return; | 350 return; |
| 350 default: | 351 default: |
| 351 NOTREACHED() << "bad state"; | 352 NOTREACHED() << "bad state"; |
| 352 result = ERR_UNEXPECTED; | 353 Finish(result); |
| 353 break; | 354 break; |
| 354 } | 355 } |
| 355 } while (result != ERR_IO_PENDING); | 356 } while (result != ERR_IO_PENDING); |
| 356 } | 357 } |
| 357 | 358 |
| 358 int SocketStream::DoResolveProxy() { | 359 int SocketStream::DoResolveProxy() { |
| 359 DCHECK(!pac_request_); | 360 DCHECK(!pac_request_); |
| 360 next_state_ = STATE_RESOLVE_PROXY_COMPLETE; | 361 next_state_ = STATE_RESOLVE_PROXY_COMPLETE; |
| 361 | 362 |
| 362 return proxy_service()->ResolveProxy( | 363 return proxy_service()->ResolveProxy( |
| (...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 401 | 402 |
| 402 HostResolver::RequestInfo resolve_info(host, port); | 403 HostResolver::RequestInfo resolve_info(host, port); |
| 403 | 404 |
| 404 resolver_.reset(new SingleRequestHostResolver(host_resolver_.get())); | 405 resolver_.reset(new SingleRequestHostResolver(host_resolver_.get())); |
| 405 return resolver_->Resolve(resolve_info, &addresses_, &io_callback_, NULL); | 406 return resolver_->Resolve(resolve_info, &addresses_, &io_callback_, NULL); |
| 406 } | 407 } |
| 407 | 408 |
| 408 int SocketStream::DoResolveHostComplete(int result) { | 409 int SocketStream::DoResolveHostComplete(int result) { |
| 409 if (result == OK) | 410 if (result == OK) |
| 410 next_state_ = STATE_TCP_CONNECT; | 411 next_state_ = STATE_TCP_CONNECT; |
| 412 else | |
| 413 next_state_ = STATE_CLOSE; | |
| 411 // TODO(ukai): if error occured, reconsider proxy after error. | 414 // TODO(ukai): if error occured, reconsider proxy after error. |
| 412 return result; | 415 return result; |
| 413 } | 416 } |
| 414 | 417 |
| 415 int SocketStream::DoTcpConnect() { | 418 int SocketStream::DoTcpConnect() { |
| 416 next_state_ = STATE_TCP_CONNECT_COMPLETE; | 419 next_state_ = STATE_TCP_CONNECT_COMPLETE; |
| 417 DCHECK(factory_); | 420 DCHECK(factory_); |
| 418 socket_.reset(factory_->CreateTCPClientSocket(addresses_)); | 421 socket_.reset(factory_->CreateTCPClientSocket(addresses_)); |
| 419 return socket_->Connect(&io_callback_); | 422 return socket_->Connect(&io_callback_); |
| 420 } | 423 } |
| 421 | 424 |
| 422 int SocketStream::DoTcpConnectComplete(int result) { | 425 int SocketStream::DoTcpConnectComplete(int result) { |
| 423 // TODO(ukai): if error occured, reconsider proxy after error. | 426 // TODO(ukai): if error occured, reconsider proxy after error. |
| 424 if (result != OK) | 427 if (result != OK) { |
| 428 next_state_ = STATE_CLOSE; | |
| 425 return result; | 429 return result; |
| 430 } | |
| 426 | 431 |
| 427 if (proxy_mode_ == kTunnelProxy) | 432 if (proxy_mode_ == kTunnelProxy) |
| 428 next_state_ = STATE_WRITE_TUNNEL_HEADERS; | 433 next_state_ = STATE_WRITE_TUNNEL_HEADERS; |
| 429 else if (proxy_mode_ == kSOCKSProxy) | 434 else if (proxy_mode_ == kSOCKSProxy) |
| 430 next_state_ = STATE_SOCKS_CONNECT; | 435 next_state_ = STATE_SOCKS_CONNECT; |
| 431 else if (is_secure()) { | 436 else if (is_secure()) { |
| 432 next_state_ = STATE_SSL_CONNECT; | 437 next_state_ = STATE_SSL_CONNECT; |
| 433 } else { | 438 } else { |
| 434 result = DidEstablishConnection(); | 439 result = DidEstablishConnection(); |
| 435 } | 440 } |
| (...skipping 52 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 488 tunnel_request_headers_->SetDataOffset(tunnel_request_headers_bytes_sent_); | 493 tunnel_request_headers_->SetDataOffset(tunnel_request_headers_bytes_sent_); |
| 489 int buf_len = static_cast<int>(tunnel_request_headers_->headers_.size() - | 494 int buf_len = static_cast<int>(tunnel_request_headers_->headers_.size() - |
| 490 tunnel_request_headers_bytes_sent_); | 495 tunnel_request_headers_bytes_sent_); |
| 491 DCHECK_GT(buf_len, 0); | 496 DCHECK_GT(buf_len, 0); |
| 492 return socket_->Write(tunnel_request_headers_, buf_len, &io_callback_); | 497 return socket_->Write(tunnel_request_headers_, buf_len, &io_callback_); |
| 493 } | 498 } |
| 494 | 499 |
| 495 int SocketStream::DoWriteTunnelHeadersComplete(int result) { | 500 int SocketStream::DoWriteTunnelHeadersComplete(int result) { |
| 496 DCHECK_EQ(kTunnelProxy, proxy_mode_); | 501 DCHECK_EQ(kTunnelProxy, proxy_mode_); |
| 497 | 502 |
| 498 if (result < 0) | 503 if (result < 0) { |
| 504 next_state_ = STATE_CLOSE; | |
| 499 return result; | 505 return result; |
| 506 } | |
| 500 | 507 |
| 501 tunnel_request_headers_bytes_sent_ += result; | 508 tunnel_request_headers_bytes_sent_ += result; |
| 502 if (tunnel_request_headers_bytes_sent_ < | 509 if (tunnel_request_headers_bytes_sent_ < |
| 503 tunnel_request_headers_->headers_.size()) | 510 tunnel_request_headers_->headers_.size()) |
| 504 next_state_ = STATE_WRITE_TUNNEL_HEADERS; | 511 next_state_ = STATE_WRITE_TUNNEL_HEADERS; |
| 505 else | 512 else |
| 506 next_state_ = STATE_READ_TUNNEL_HEADERS; | 513 next_state_ = STATE_READ_TUNNEL_HEADERS; |
| 507 return OK; | 514 return OK; |
| 508 } | 515 } |
| 509 | 516 |
| (...skipping 13 matching lines...) Expand all Loading... | |
| 523 tunnel_response_headers_len_; | 530 tunnel_response_headers_len_; |
| 524 tunnel_response_headers_->SetDataOffset(tunnel_response_headers_len_); | 531 tunnel_response_headers_->SetDataOffset(tunnel_response_headers_len_); |
| 525 CHECK(tunnel_response_headers_->data()); | 532 CHECK(tunnel_response_headers_->data()); |
| 526 | 533 |
| 527 return socket_->Read(tunnel_response_headers_, buf_len, &io_callback_); | 534 return socket_->Read(tunnel_response_headers_, buf_len, &io_callback_); |
| 528 } | 535 } |
| 529 | 536 |
| 530 int SocketStream::DoReadTunnelHeadersComplete(int result) { | 537 int SocketStream::DoReadTunnelHeadersComplete(int result) { |
| 531 DCHECK_EQ(kTunnelProxy, proxy_mode_); | 538 DCHECK_EQ(kTunnelProxy, proxy_mode_); |
| 532 | 539 |
| 533 if (result < 0) | 540 if (result < 0) { |
| 541 next_state_ = STATE_CLOSE; | |
| 534 return result; | 542 return result; |
| 543 } | |
| 535 | 544 |
| 536 if (result == 0) { | 545 if (result == 0) { |
| 537 // 0 indicates end-of-file, so socket was closed. | 546 // 0 indicates end-of-file, so socket was closed. |
| 538 next_state_ = STATE_CLOSE; | 547 next_state_ = STATE_CLOSE; |
| 539 return ERR_CONNECTION_CLOSED; | 548 return ERR_CONNECTION_CLOSED; |
| 540 } | 549 } |
| 541 | 550 |
| 542 tunnel_response_headers_len_ += result; | 551 tunnel_response_headers_len_ += result; |
| 543 DCHECK(tunnel_response_headers_len_ <= tunnel_response_headers_capacity_); | 552 DCHECK(tunnel_response_headers_len_ <= tunnel_response_headers_capacity_); |
| 544 | 553 |
| (...skipping 47 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 592 // Wait until RestartWithAuth or Close is called. | 601 // Wait until RestartWithAuth or Close is called. |
| 593 MessageLoop::current()->PostTask( | 602 MessageLoop::current()->PostTask( |
| 594 FROM_HERE, | 603 FROM_HERE, |
| 595 NewRunnableMethod(this, &SocketStream::DoAuthRequired)); | 604 NewRunnableMethod(this, &SocketStream::DoAuthRequired)); |
| 596 next_state_ = STATE_AUTH_REQUIRED; | 605 next_state_ = STATE_AUTH_REQUIRED; |
| 597 return ERR_IO_PENDING; | 606 return ERR_IO_PENDING; |
| 598 } | 607 } |
| 599 default: | 608 default: |
| 600 break; | 609 break; |
| 601 } | 610 } |
| 611 next_state_ = STATE_CLOSE; | |
| 602 return ERR_TUNNEL_CONNECTION_FAILED; | 612 return ERR_TUNNEL_CONNECTION_FAILED; |
| 603 } | 613 } |
| 604 | 614 |
| 605 int SocketStream::DoSOCKSConnect() { | 615 int SocketStream::DoSOCKSConnect() { |
| 606 DCHECK_EQ(kSOCKSProxy, proxy_mode_); | 616 DCHECK_EQ(kSOCKSProxy, proxy_mode_); |
| 607 | 617 |
| 608 next_state_ = STATE_SOCKS_CONNECT_COMPLETE; | 618 next_state_ = STATE_SOCKS_CONNECT_COMPLETE; |
| 609 | 619 |
| 610 ClientSocket* s = socket_.release(); | 620 ClientSocket* s = socket_.release(); |
| 611 HostResolver::RequestInfo req_info(url_.HostNoBrackets(), | 621 HostResolver::RequestInfo req_info(url_.HostNoBrackets(), |
| 612 url_.EffectiveIntPort()); | 622 url_.EffectiveIntPort()); |
| 613 | 623 |
| 614 if (proxy_info_.proxy_server().scheme() == ProxyServer::SCHEME_SOCKS5) | 624 if (proxy_info_.proxy_server().scheme() == ProxyServer::SCHEME_SOCKS5) |
| 615 s = new SOCKS5ClientSocket(s, req_info, host_resolver_.get()); | 625 s = new SOCKS5ClientSocket(s, req_info, host_resolver_.get()); |
| 616 else | 626 else |
| 617 s = new SOCKSClientSocket(s, req_info, host_resolver_.get()); | 627 s = new SOCKSClientSocket(s, req_info, host_resolver_.get()); |
| 618 socket_.reset(s); | 628 socket_.reset(s); |
| 619 return socket_->Connect(&io_callback_); | 629 return socket_->Connect(&io_callback_); |
| 620 } | 630 } |
| 621 | 631 |
| 622 int SocketStream::DoSOCKSConnectComplete(int result) { | 632 int SocketStream::DoSOCKSConnectComplete(int result) { |
| 623 DCHECK_EQ(kSOCKSProxy, proxy_mode_); | 633 DCHECK_EQ(kSOCKSProxy, proxy_mode_); |
| 624 | 634 |
| 625 if (result == OK) { | 635 if (result == OK) { |
| 626 if (is_secure()) | 636 if (is_secure()) |
| 627 next_state_ = STATE_SSL_CONNECT; | 637 next_state_ = STATE_SSL_CONNECT; |
| 628 else | 638 else |
| 629 DidEstablishConnection(); | 639 DidEstablishConnection(); |
|
tyoshino (SeeGerritForStatus)
2009/11/02 02:18:27
result = DidEstablishConnection ?
| |
| 630 } | 640 } |
| 631 return result; | 641 return result; |
| 632 } | 642 } |
| 633 | 643 |
| 634 int SocketStream::DoSSLConnect() { | 644 int SocketStream::DoSSLConnect() { |
| 635 DCHECK(factory_); | 645 DCHECK(factory_); |
| 636 socket_.reset(factory_->CreateSSLClientSocket( | 646 socket_.reset(factory_->CreateSSLClientSocket( |
| 637 socket_.release(), url_.HostNoBrackets(), ssl_config_)); | 647 socket_.release(), url_.HostNoBrackets(), ssl_config_)); |
| 638 next_state_ = STATE_SSL_CONNECT_COMPLETE; | 648 next_state_ = STATE_SSL_CONNECT_COMPLETE; |
| 639 return socket_->Connect(&io_callback_); | 649 return socket_->Connect(&io_callback_); |
| 640 } | 650 } |
| 641 | 651 |
| 642 int SocketStream::DoSSLConnectComplete(int result) { | 652 int SocketStream::DoSSLConnectComplete(int result) { |
| 643 if (IsCertificateError(result)) | 653 if (IsCertificateError(result)) |
| 644 result = HandleCertificateError(result); | 654 result = HandleCertificateError(result); |
| 645 | 655 |
| 646 if (result == OK) | 656 if (result == OK) |
| 647 result = DidEstablishConnection(); | 657 result = DidEstablishConnection(); |
| 658 else | |
| 659 next_state_ = STATE_CLOSE; | |
| 648 return result; | 660 return result; |
| 649 } | 661 } |
| 650 | 662 |
| 651 int SocketStream::DoReadWrite(int result) { | 663 int SocketStream::DoReadWrite(int result) { |
| 652 if (result < OK) { | 664 if (result < OK) { |
| 665 next_state_ = STATE_CLOSE; | |
| 653 return result; | 666 return result; |
| 654 } | 667 } |
| 655 if (!socket_.get() || !socket_->IsConnected()) { | 668 if (!socket_.get() || !socket_->IsConnected()) { |
| 669 next_state_ = STATE_CLOSE; | |
| 656 return ERR_CONNECTION_CLOSED; | 670 return ERR_CONNECTION_CLOSED; |
| 657 } | 671 } |
| 658 | 672 |
| 659 next_state_ = STATE_READ_WRITE; | 673 next_state_ = STATE_READ_WRITE; |
| 660 | 674 |
| 661 if (!read_buf_) { | 675 if (!read_buf_) { |
| 662 // No read pending. | 676 // No read pending. |
| 663 read_buf_ = new IOBuffer(kReadBufferSize); | 677 read_buf_ = new IOBuffer(kReadBufferSize); |
| 664 result = socket_->Read(read_buf_, kReadBufferSize, &read_callback_); | 678 result = socket_->Read(read_buf_, kReadBufferSize, &read_callback_); |
| 665 if (result > 0) { | 679 if (result > 0) { |
| 666 DidReceiveData(result); | 680 DidReceiveData(result); |
| 667 return OK; | 681 return OK; |
| 668 } else if (result == 0) { | 682 } else if (result == 0) { |
| 669 // 0 indicates end-of-file, so socket was closed. | 683 // 0 indicates end-of-file, so socket was closed. |
| 684 next_state_ = STATE_CLOSE; | |
| 670 return ERR_CONNECTION_CLOSED; | 685 return ERR_CONNECTION_CLOSED; |
| 671 } | 686 } |
| 672 // If read is pending, try write as well. | 687 // If read is pending, try write as well. |
| 673 // Otherwise, return the result and do next loop. | 688 // Otherwise, return the result and do next loop. |
| 674 if (result != ERR_IO_PENDING) | 689 if (result != ERR_IO_PENDING) { |
| 690 next_state_ = STATE_CLOSE; | |
| 675 return result; | 691 return result; |
| 692 } | |
| 676 } | 693 } |
| 677 // Read is pending. | 694 // Read is pending. |
| 678 DCHECK(read_buf_); | 695 DCHECK(read_buf_); |
| 679 | 696 |
| 680 if (write_buf_ && !current_write_buf_) { | 697 if (write_buf_ && !current_write_buf_) { |
| 681 // No write pending. | 698 // No write pending. |
| 682 current_write_buf_ = new DrainableIOBuffer(write_buf_, write_buf_size_); | 699 current_write_buf_ = new DrainableIOBuffer(write_buf_, write_buf_size_); |
| 683 current_write_buf_->SetOffset(write_buf_offset_); | 700 current_write_buf_->SetOffset(write_buf_offset_); |
| 684 result = socket_->Write(current_write_buf_, | 701 result = socket_->Write(current_write_buf_, |
| 685 current_write_buf_->BytesRemaining(), | 702 current_write_buf_->BytesRemaining(), |
| 686 &write_callback_); | 703 &write_callback_); |
| 687 if (result > 0) { | 704 if (result > 0) { |
| 688 DidSendData(result); | 705 DidSendData(result); |
| 689 return OK; | 706 return OK; |
| 690 } | 707 } |
|
tyoshino (SeeGerritForStatus)
2009/11/02 02:18:27
Here, we should do the same as Read?
if (result !=
| |
| 691 return result; | 708 return result; |
| 692 } | 709 } |
| 693 | 710 |
| 694 // We arrived here when both operation is pending. | 711 // We arrived here when both operation is pending. |
| 695 return ERR_IO_PENDING; | 712 return ERR_IO_PENDING; |
| 696 } | 713 } |
| 697 | 714 |
| 698 GURL SocketStream::ProxyAuthOrigin() const { | 715 GURL SocketStream::ProxyAuthOrigin() const { |
| 699 return GURL("http://" + proxy_info_.proxy_server().host_and_port()); | 716 return GURL("http://" + proxy_info_.proxy_server().host_and_port()); |
| 700 } | 717 } |
| (...skipping 88 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 789 | 806 |
| 790 SSLConfigService* SocketStream::ssl_config_service() const { | 807 SSLConfigService* SocketStream::ssl_config_service() const { |
| 791 return context_->ssl_config_service(); | 808 return context_->ssl_config_service(); |
| 792 } | 809 } |
| 793 | 810 |
| 794 ProxyService* SocketStream::proxy_service() const { | 811 ProxyService* SocketStream::proxy_service() const { |
| 795 return context_->proxy_service(); | 812 return context_->proxy_service(); |
| 796 } | 813 } |
| 797 | 814 |
| 798 } // namespace net | 815 } // namespace net |
| OLD | NEW |