OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/socket/client_socket_pool_manager.h" | 5 #include "net/socket/client_socket_pool_manager.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 | 8 |
9 #include "base/basictypes.h" | 9 #include "base/basictypes.h" |
10 #include "base/logging.h" | 10 #include "base/logging.h" |
(...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
59 kDefaultMaxSocketsPerProxyServer, // NORMAL_SOCKET_POOL | 59 kDefaultMaxSocketsPerProxyServer, // NORMAL_SOCKET_POOL |
60 kDefaultMaxSocketsPerProxyServer // WEBSOCKET_SOCKET_POOL | 60 kDefaultMaxSocketsPerProxyServer // WEBSOCKET_SOCKET_POOL |
61 }; | 61 }; |
62 | 62 |
63 static_assert(arraysize(g_max_sockets_per_proxy_server) == | 63 static_assert(arraysize(g_max_sockets_per_proxy_server) == |
64 HttpNetworkSession::NUM_SOCKET_POOL_TYPES, | 64 HttpNetworkSession::NUM_SOCKET_POOL_TYPES, |
65 "max sockets per proxy server length mismatch"); | 65 "max sockets per proxy server length mismatch"); |
66 | 66 |
67 // The meat of the implementation for the InitSocketHandleForHttpRequest, | 67 // The meat of the implementation for the InitSocketHandleForHttpRequest, |
68 // InitSocketHandleForRawConnect and PreconnectSocketsForHttpRequest methods. | 68 // InitSocketHandleForRawConnect and PreconnectSocketsForHttpRequest methods. |
69 int InitSocketPoolHelper(const GURL& request_url, | 69 int InitSocketPoolHelper(ClientSocketPoolManager::SocketGroupType group_type, |
| 70 const HostPortPair& endpoint, |
70 const HttpRequestHeaders& request_extra_headers, | 71 const HttpRequestHeaders& request_extra_headers, |
71 int request_load_flags, | 72 int request_load_flags, |
72 RequestPriority request_priority, | 73 RequestPriority request_priority, |
73 HttpNetworkSession* session, | 74 HttpNetworkSession* session, |
74 const ProxyInfo& proxy_info, | 75 const ProxyInfo& proxy_info, |
75 bool force_spdy_over_ssl, | 76 bool force_spdy_over_ssl, |
76 bool want_spdy_over_npn, | 77 bool want_spdy_over_npn, |
77 const SSLConfig& ssl_config_for_origin, | 78 const SSLConfig& ssl_config_for_origin, |
78 const SSLConfig& ssl_config_for_proxy, | 79 const SSLConfig& ssl_config_for_proxy, |
79 bool force_tunnel, | 80 bool force_tunnel, |
80 PrivacyMode privacy_mode, | 81 PrivacyMode privacy_mode, |
81 const BoundNetLog& net_log, | 82 const BoundNetLog& net_log, |
82 int num_preconnect_streams, | 83 int num_preconnect_streams, |
83 ClientSocketHandle* socket_handle, | 84 ClientSocketHandle* socket_handle, |
84 HttpNetworkSession::SocketPoolType socket_pool_type, | 85 HttpNetworkSession::SocketPoolType socket_pool_type, |
85 const OnHostResolutionCallback& resolution_callback, | 86 const OnHostResolutionCallback& resolution_callback, |
86 const CompletionCallback& callback) { | 87 const CompletionCallback& callback) { |
87 scoped_refptr<HttpProxySocketParams> http_proxy_params; | 88 scoped_refptr<HttpProxySocketParams> http_proxy_params; |
88 scoped_refptr<SOCKSSocketParams> socks_params; | 89 scoped_refptr<SOCKSSocketParams> socks_params; |
89 scoped_ptr<HostPortPair> proxy_host_port; | 90 scoped_ptr<HostPortPair> proxy_host_port; |
90 | 91 |
91 bool using_ssl = request_url.SchemeIs("https") || | 92 bool using_ssl = group_type == ClientSocketPoolManager::SSL_GROUP; |
92 request_url.SchemeIs("wss") || force_spdy_over_ssl; | 93 HostPortPair origin_host_port = endpoint; |
93 | |
94 HostPortPair origin_host_port = HostPortPair::FromURL(request_url); | |
95 | 94 |
96 if (!using_ssl && session->params().testing_fixed_http_port != 0) { | 95 if (!using_ssl && session->params().testing_fixed_http_port != 0) { |
97 origin_host_port.set_port(session->params().testing_fixed_http_port); | 96 origin_host_port.set_port(session->params().testing_fixed_http_port); |
98 } else if (using_ssl && session->params().testing_fixed_https_port != 0) { | 97 } else if (using_ssl && session->params().testing_fixed_https_port != 0) { |
99 origin_host_port.set_port(session->params().testing_fixed_https_port); | 98 origin_host_port.set_port(session->params().testing_fixed_https_port); |
100 } | 99 } |
101 | 100 |
102 bool disable_resolver_cache = | 101 bool disable_resolver_cache = |
103 request_load_flags & LOAD_BYPASS_CACHE || | 102 request_load_flags & LOAD_BYPASS_CACHE || |
104 request_load_flags & LOAD_VALIDATE_CACHE || | 103 request_load_flags & LOAD_VALIDATE_CACHE || |
105 request_load_flags & LOAD_DISABLE_CACHE; | 104 request_load_flags & LOAD_DISABLE_CACHE; |
106 | 105 |
107 int load_flags = request_load_flags; | 106 int load_flags = request_load_flags; |
108 if (session->params().ignore_certificate_errors) | 107 if (session->params().ignore_certificate_errors) |
109 load_flags |= LOAD_IGNORE_ALL_CERT_ERRORS; | 108 load_flags |= LOAD_IGNORE_ALL_CERT_ERRORS; |
110 | 109 |
111 // Build the string used to uniquely identify connections of this type. | 110 // Build the string used to uniquely identify connections of this type. |
112 // Determine the host and port to connect to. | 111 // Determine the host and port to connect to. |
113 std::string connection_group = origin_host_port.ToString(); | 112 std::string connection_group = origin_host_port.ToString(); |
114 DCHECK(!connection_group.empty()); | 113 DCHECK(!connection_group.empty()); |
115 if (request_url.SchemeIs("ftp")) { | 114 if (group_type == ClientSocketPoolManager::FTP_GROUP) { |
116 // Combining FTP with forced SPDY over SSL would be a "path to madness". | 115 // Combining FTP with forced SPDY over SSL would be a "path to madness". |
117 // Make sure we never do that. | 116 // Make sure we never do that. |
118 DCHECK(!using_ssl); | 117 DCHECK(!using_ssl); |
119 connection_group = "ftp/" + connection_group; | 118 connection_group = "ftp/" + connection_group; |
120 } | 119 } |
121 if (using_ssl) { | 120 if (using_ssl) { |
122 // All connections in a group should use the same SSLConfig settings. | 121 // All connections in a group should use the same SSLConfig settings. |
123 // Encode version_max in the connection group's name, unless it's the | 122 // Encode version_max in the connection group's name, unless it's the |
124 // default version_max. (We want the common case to use the shortest | 123 // default version_max. (We want the common case to use the shortest |
125 // encoding). A version_max of TLS 1.1 is encoded as "ssl(max:3.2)/" | 124 // encoding). A version_max of TLS 1.1 is encoded as "ssl(max:3.2)/" |
(...skipping 195 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
321 return OK; | 320 return OK; |
322 } | 321 } |
323 | 322 |
324 return socket_handle->Init(connection_group, tcp_params, | 323 return socket_handle->Init(connection_group, tcp_params, |
325 request_priority, callback, | 324 request_priority, callback, |
326 pool, net_log); | 325 pool, net_log); |
327 } | 326 } |
328 | 327 |
329 } // namespace | 328 } // namespace |
330 | 329 |
| 330 // static |
| 331 ClientSocketPoolManager::SocketGroupType |
| 332 ClientSocketPoolManager::GroupTypeFromScheme(const std::string& scheme) { |
| 333 if (scheme == "ftp") |
| 334 return FTP_GROUP; |
| 335 |
| 336 if (scheme == "https" || scheme == "wss") |
| 337 return SSL_GROUP; |
| 338 |
| 339 return NORMAL_GROUP; |
| 340 } |
| 341 |
331 ClientSocketPoolManager::ClientSocketPoolManager() {} | 342 ClientSocketPoolManager::ClientSocketPoolManager() {} |
332 ClientSocketPoolManager::~ClientSocketPoolManager() {} | 343 ClientSocketPoolManager::~ClientSocketPoolManager() {} |
333 | 344 |
334 // static | 345 // static |
335 int ClientSocketPoolManager::max_sockets_per_pool( | 346 int ClientSocketPoolManager::max_sockets_per_pool( |
336 HttpNetworkSession::SocketPoolType pool_type) { | 347 HttpNetworkSession::SocketPoolType pool_type) { |
337 DCHECK_LT(pool_type, HttpNetworkSession::NUM_SOCKET_POOL_TYPES); | 348 DCHECK_LT(pool_type, HttpNetworkSession::NUM_SOCKET_POOL_TYPES); |
338 return g_max_sockets_per_pool[pool_type]; | 349 return g_max_sockets_per_pool[pool_type]; |
339 } | 350 } |
340 | 351 |
(...skipping 46 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
387 DCHECK_LT(0, socket_count); | 398 DCHECK_LT(0, socket_count); |
388 DCHECK_GT(100, socket_count); // Sanity check. | 399 DCHECK_GT(100, socket_count); // Sanity check. |
389 DCHECK_LT(pool_type, HttpNetworkSession::NUM_SOCKET_POOL_TYPES); | 400 DCHECK_LT(pool_type, HttpNetworkSession::NUM_SOCKET_POOL_TYPES); |
390 // Assert this case early on. The max number of sockets per group cannot | 401 // Assert this case early on. The max number of sockets per group cannot |
391 // exceed the max number of sockets per proxy server. | 402 // exceed the max number of sockets per proxy server. |
392 DCHECK_LE(g_max_sockets_per_group[pool_type], socket_count); | 403 DCHECK_LE(g_max_sockets_per_group[pool_type], socket_count); |
393 g_max_sockets_per_proxy_server[pool_type] = socket_count; | 404 g_max_sockets_per_proxy_server[pool_type] = socket_count; |
394 } | 405 } |
395 | 406 |
396 int InitSocketHandleForHttpRequest( | 407 int InitSocketHandleForHttpRequest( |
397 const GURL& request_url, | 408 ClientSocketPoolManager::SocketGroupType group_type, |
| 409 const HostPortPair& endpoint, |
398 const HttpRequestHeaders& request_extra_headers, | 410 const HttpRequestHeaders& request_extra_headers, |
399 int request_load_flags, | 411 int request_load_flags, |
400 RequestPriority request_priority, | 412 RequestPriority request_priority, |
401 HttpNetworkSession* session, | 413 HttpNetworkSession* session, |
402 const ProxyInfo& proxy_info, | 414 const ProxyInfo& proxy_info, |
403 bool force_spdy_over_ssl, | 415 bool force_spdy_over_ssl, |
404 bool want_spdy_over_npn, | 416 bool want_spdy_over_npn, |
405 const SSLConfig& ssl_config_for_origin, | 417 const SSLConfig& ssl_config_for_origin, |
406 const SSLConfig& ssl_config_for_proxy, | 418 const SSLConfig& ssl_config_for_proxy, |
407 PrivacyMode privacy_mode, | 419 PrivacyMode privacy_mode, |
408 const BoundNetLog& net_log, | 420 const BoundNetLog& net_log, |
409 ClientSocketHandle* socket_handle, | 421 ClientSocketHandle* socket_handle, |
410 const OnHostResolutionCallback& resolution_callback, | 422 const OnHostResolutionCallback& resolution_callback, |
411 const CompletionCallback& callback) { | 423 const CompletionCallback& callback) { |
412 DCHECK(socket_handle); | 424 DCHECK(socket_handle); |
413 return InitSocketPoolHelper( | 425 return InitSocketPoolHelper( |
414 request_url, request_extra_headers, request_load_flags, request_priority, | 426 group_type, endpoint, request_extra_headers, request_load_flags, |
415 session, proxy_info, force_spdy_over_ssl, want_spdy_over_npn, | 427 request_priority, session, proxy_info, force_spdy_over_ssl, |
416 ssl_config_for_origin, ssl_config_for_proxy, false, privacy_mode, net_log, | 428 want_spdy_over_npn, ssl_config_for_origin, ssl_config_for_proxy, false, |
417 0, socket_handle, HttpNetworkSession::NORMAL_SOCKET_POOL, | 429 privacy_mode, net_log, 0, socket_handle, |
418 resolution_callback, callback); | 430 HttpNetworkSession::NORMAL_SOCKET_POOL, resolution_callback, callback); |
419 } | 431 } |
420 | 432 |
421 int InitSocketHandleForWebSocketRequest( | 433 int InitSocketHandleForWebSocketRequest( |
422 const GURL& request_url, | 434 ClientSocketPoolManager::SocketGroupType group_type, |
| 435 const HostPortPair& endpoint, |
423 const HttpRequestHeaders& request_extra_headers, | 436 const HttpRequestHeaders& request_extra_headers, |
424 int request_load_flags, | 437 int request_load_flags, |
425 RequestPriority request_priority, | 438 RequestPriority request_priority, |
426 HttpNetworkSession* session, | 439 HttpNetworkSession* session, |
427 const ProxyInfo& proxy_info, | 440 const ProxyInfo& proxy_info, |
428 bool force_spdy_over_ssl, | 441 bool force_spdy_over_ssl, |
429 bool want_spdy_over_npn, | 442 bool want_spdy_over_npn, |
430 const SSLConfig& ssl_config_for_origin, | 443 const SSLConfig& ssl_config_for_origin, |
431 const SSLConfig& ssl_config_for_proxy, | 444 const SSLConfig& ssl_config_for_proxy, |
432 PrivacyMode privacy_mode, | 445 PrivacyMode privacy_mode, |
433 const BoundNetLog& net_log, | 446 const BoundNetLog& net_log, |
434 ClientSocketHandle* socket_handle, | 447 ClientSocketHandle* socket_handle, |
435 const OnHostResolutionCallback& resolution_callback, | 448 const OnHostResolutionCallback& resolution_callback, |
436 const CompletionCallback& callback) { | 449 const CompletionCallback& callback) { |
437 DCHECK(socket_handle); | 450 DCHECK(socket_handle); |
438 return InitSocketPoolHelper( | 451 return InitSocketPoolHelper( |
439 request_url, request_extra_headers, request_load_flags, request_priority, | 452 group_type, endpoint, request_extra_headers, request_load_flags, |
440 session, proxy_info, force_spdy_over_ssl, want_spdy_over_npn, | 453 request_priority, session, proxy_info, force_spdy_over_ssl, |
441 ssl_config_for_origin, ssl_config_for_proxy, true, privacy_mode, net_log, | 454 want_spdy_over_npn, ssl_config_for_origin, ssl_config_for_proxy, true, |
442 0, socket_handle, HttpNetworkSession::WEBSOCKET_SOCKET_POOL, | 455 privacy_mode, net_log, 0, socket_handle, |
443 resolution_callback, callback); | 456 HttpNetworkSession::WEBSOCKET_SOCKET_POOL, resolution_callback, callback); |
444 } | 457 } |
445 | 458 |
446 int InitSocketHandleForRawConnect( | 459 int InitSocketHandleForRawConnect( |
447 const HostPortPair& host_port_pair, | 460 const HostPortPair& host_port_pair, |
448 HttpNetworkSession* session, | 461 HttpNetworkSession* session, |
449 const ProxyInfo& proxy_info, | 462 const ProxyInfo& proxy_info, |
450 const SSLConfig& ssl_config_for_origin, | 463 const SSLConfig& ssl_config_for_origin, |
451 const SSLConfig& ssl_config_for_proxy, | 464 const SSLConfig& ssl_config_for_proxy, |
452 PrivacyMode privacy_mode, | 465 PrivacyMode privacy_mode, |
453 const BoundNetLog& net_log, | 466 const BoundNetLog& net_log, |
454 ClientSocketHandle* socket_handle, | 467 ClientSocketHandle* socket_handle, |
455 const CompletionCallback& callback) { | 468 const CompletionCallback& callback) { |
456 DCHECK(socket_handle); | 469 DCHECK(socket_handle); |
457 // Synthesize an HttpRequestInfo. | |
458 GURL request_url = GURL("http://" + host_port_pair.ToString()); | |
459 HttpRequestHeaders request_extra_headers; | 470 HttpRequestHeaders request_extra_headers; |
460 int request_load_flags = 0; | 471 int request_load_flags = 0; |
461 RequestPriority request_priority = MEDIUM; | 472 RequestPriority request_priority = MEDIUM; |
462 | |
463 return InitSocketPoolHelper( | 473 return InitSocketPoolHelper( |
464 request_url, request_extra_headers, request_load_flags, request_priority, | 474 ClientSocketPoolManager::NORMAL_GROUP, host_port_pair, |
465 session, proxy_info, false, false, ssl_config_for_origin, | 475 request_extra_headers, request_load_flags, request_priority, session, |
466 ssl_config_for_proxy, true, privacy_mode, net_log, 0, socket_handle, | 476 proxy_info, false, false, ssl_config_for_origin, ssl_config_for_proxy, |
| 477 true, privacy_mode, net_log, 0, socket_handle, |
467 HttpNetworkSession::NORMAL_SOCKET_POOL, OnHostResolutionCallback(), | 478 HttpNetworkSession::NORMAL_SOCKET_POOL, OnHostResolutionCallback(), |
468 callback); | 479 callback); |
469 } | 480 } |
470 | 481 |
471 int InitSocketHandleForTlsConnect( | 482 int InitSocketHandleForTlsConnect(const HostPortPair& endpoint, |
472 const HostPortPair& host_port_pair, | 483 HttpNetworkSession* session, |
473 HttpNetworkSession* session, | 484 const ProxyInfo& proxy_info, |
474 const ProxyInfo& proxy_info, | 485 const SSLConfig& ssl_config_for_origin, |
475 const SSLConfig& ssl_config_for_origin, | 486 const SSLConfig& ssl_config_for_proxy, |
476 const SSLConfig& ssl_config_for_proxy, | 487 PrivacyMode privacy_mode, |
477 PrivacyMode privacy_mode, | 488 const BoundNetLog& net_log, |
478 const BoundNetLog& net_log, | 489 ClientSocketHandle* socket_handle, |
479 ClientSocketHandle* socket_handle, | 490 const CompletionCallback& callback) { |
480 const CompletionCallback& callback) { | |
481 DCHECK(socket_handle); | 491 DCHECK(socket_handle); |
482 // Synthesize an HttpRequestInfo. | |
483 GURL request_url = GURL("https://" + host_port_pair.ToString()); | |
484 HttpRequestHeaders request_extra_headers; | 492 HttpRequestHeaders request_extra_headers; |
485 int request_load_flags = 0; | 493 int request_load_flags = 0; |
486 RequestPriority request_priority = MEDIUM; | 494 RequestPriority request_priority = MEDIUM; |
487 | |
488 return InitSocketPoolHelper( | 495 return InitSocketPoolHelper( |
489 request_url, request_extra_headers, request_load_flags, request_priority, | 496 ClientSocketPoolManager::SSL_GROUP, endpoint, request_extra_headers, |
490 session, proxy_info, false, false, ssl_config_for_origin, | 497 request_load_flags, request_priority, session, proxy_info, false, false, |
491 ssl_config_for_proxy, true, privacy_mode, net_log, 0, socket_handle, | 498 ssl_config_for_origin, ssl_config_for_proxy, true, privacy_mode, net_log, |
492 HttpNetworkSession::NORMAL_SOCKET_POOL, OnHostResolutionCallback(), | 499 0, socket_handle, HttpNetworkSession::NORMAL_SOCKET_POOL, |
493 callback); | 500 OnHostResolutionCallback(), callback); |
494 } | 501 } |
495 | 502 |
496 int PreconnectSocketsForHttpRequest( | 503 int PreconnectSocketsForHttpRequest( |
497 const GURL& request_url, | 504 ClientSocketPoolManager::SocketGroupType group_type, |
| 505 const HostPortPair& endpoint, |
498 const HttpRequestHeaders& request_extra_headers, | 506 const HttpRequestHeaders& request_extra_headers, |
499 int request_load_flags, | 507 int request_load_flags, |
500 RequestPriority request_priority, | 508 RequestPriority request_priority, |
501 HttpNetworkSession* session, | 509 HttpNetworkSession* session, |
502 const ProxyInfo& proxy_info, | 510 const ProxyInfo& proxy_info, |
503 bool force_spdy_over_ssl, | 511 bool force_spdy_over_ssl, |
504 bool want_spdy_over_npn, | 512 bool want_spdy_over_npn, |
505 const SSLConfig& ssl_config_for_origin, | 513 const SSLConfig& ssl_config_for_origin, |
506 const SSLConfig& ssl_config_for_proxy, | 514 const SSLConfig& ssl_config_for_proxy, |
507 PrivacyMode privacy_mode, | 515 PrivacyMode privacy_mode, |
508 const BoundNetLog& net_log, | 516 const BoundNetLog& net_log, |
509 int num_preconnect_streams) { | 517 int num_preconnect_streams) { |
510 return InitSocketPoolHelper( | 518 return InitSocketPoolHelper( |
511 request_url, request_extra_headers, request_load_flags, request_priority, | 519 group_type, endpoint, request_extra_headers, request_load_flags, |
512 session, proxy_info, force_spdy_over_ssl, want_spdy_over_npn, | 520 request_priority, session, proxy_info, force_spdy_over_ssl, |
513 ssl_config_for_origin, ssl_config_for_proxy, false, privacy_mode, net_log, | 521 want_spdy_over_npn, ssl_config_for_origin, ssl_config_for_proxy, false, |
514 num_preconnect_streams, NULL, HttpNetworkSession::NORMAL_SOCKET_POOL, | 522 privacy_mode, net_log, num_preconnect_streams, NULL, |
515 OnHostResolutionCallback(), CompletionCallback()); | 523 HttpNetworkSession::NORMAL_SOCKET_POOL, OnHostResolutionCallback(), |
| 524 CompletionCallback()); |
516 } | 525 } |
517 | 526 |
518 } // namespace net | 527 } // namespace net |
OLD | NEW |