| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2016 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "net/http/http_stream_factory_impl_job_controller.h" | |
| 6 | |
| 7 #include "base/metrics/histogram_macros.h" | |
| 8 #include "base/strings/string_number_conversions.h" | |
| 9 #include "base/strings/string_util.h" | |
| 10 #include "net/base/host_mapping_rules.h" | |
| 11 #include "net/http/bidirectional_stream_impl.h" | |
| 12 #include "net/http/transport_security_state.h" | |
| 13 #include "net/spdy/spdy_session.h" | |
| 14 | |
| 15 namespace net { | |
| 16 | |
| 17 HttpStreamFactoryImpl::JobController::JobController( | |
| 18 HttpStreamFactoryImpl* factory, | |
| 19 HttpStreamRequest::Delegate* delegate, | |
| 20 HttpNetworkSession* session, | |
| 21 JobFactory* job_factory) | |
| 22 : factory_(factory), | |
| 23 session_(session), | |
| 24 job_factory_(job_factory), | |
| 25 request_(nullptr), | |
| 26 delegate_(delegate), | |
| 27 is_preconnect_(false), | |
| 28 job_bound_(false), | |
| 29 bound_job_(nullptr) { | |
| 30 DCHECK(factory); | |
| 31 } | |
| 32 | |
| 33 HttpStreamFactoryImpl::JobController::~JobController() { | |
| 34 main_job_.reset(); | |
| 35 alternative_job_.reset(); | |
| 36 bound_job_ = nullptr; | |
| 37 } | |
| 38 | |
| 39 bool HttpStreamFactoryImpl::JobController::for_websockets() { | |
| 40 return factory_->for_websockets_; | |
| 41 } | |
| 42 | |
| 43 HttpStreamFactoryImpl::Request* HttpStreamFactoryImpl::JobController::Start( | |
| 44 const HttpRequestInfo& request_info, | |
| 45 HttpStreamRequest::Delegate* delegate, | |
| 46 WebSocketHandshakeStreamBase::CreateHelper* | |
| 47 websocket_handshake_stream_create_helper, | |
| 48 const BoundNetLog& net_log, | |
| 49 HttpStreamRequest::StreamType stream_type, | |
| 50 RequestPriority priority, | |
| 51 const SSLConfig& server_ssl_config, | |
| 52 const SSLConfig& proxy_ssl_config) { | |
| 53 DCHECK(factory_); | |
| 54 DCHECK(!request_); | |
| 55 | |
| 56 request_ = new Request(request_info.url, this, delegate, | |
| 57 websocket_handshake_stream_create_helper, net_log, | |
| 58 stream_type); | |
| 59 | |
| 60 CreateJobs(request_info, priority, server_ssl_config, proxy_ssl_config, | |
| 61 delegate, stream_type, net_log); | |
| 62 | |
| 63 return request_; | |
| 64 } | |
| 65 | |
| 66 void HttpStreamFactoryImpl::JobController::Preconnect( | |
| 67 int num_streams, | |
| 68 const HttpRequestInfo& request_info, | |
| 69 const SSLConfig& server_ssl_config, | |
| 70 const SSLConfig& proxy_ssl_config) { | |
| 71 DCHECK(!main_job_); | |
| 72 DCHECK(!alternative_job_); | |
| 73 | |
| 74 is_preconnect_ = true; | |
| 75 HostPortPair destination(HostPortPair::FromURL(request_info.url)); | |
| 76 GURL origin_url = ApplyHostMappingRules(request_info.url, &destination); | |
| 77 | |
| 78 const AlternativeService alternative_service = GetAlternativeServiceFor( | |
| 79 request_info, nullptr, HttpStreamRequest::HTTP_STREAM); | |
| 80 | |
| 81 if (alternative_service.protocol != UNINITIALIZED_ALTERNATE_PROTOCOL) { | |
| 82 if (session_->params().quic_disable_preconnect_if_0rtt && | |
| 83 alternative_service.protocol == QUIC && | |
| 84 session_->quic_stream_factory()->ZeroRTTEnabledFor(QuicServerId( | |
| 85 alternative_service.host_port_pair(), request_info.privacy_mode))) { | |
| 86 MaybeNotifyFactoryOfCompletion(); | |
| 87 return; | |
| 88 } | |
| 89 destination = alternative_service.host_port_pair(); | |
| 90 ignore_result(ApplyHostMappingRules(request_info.url, &destination)); | |
| 91 } | |
| 92 | |
| 93 // Due to how the socket pools handle priorities and idle sockets, only IDLE | |
| 94 // priority currently makes sense for preconnects. The priority for | |
| 95 // preconnects is currently ignored (see RequestSocketsForPool()), but could | |
| 96 // be used at some point for proxy resolution or something. | |
| 97 main_job_.reset(job_factory_->CreateJob( | |
| 98 this, PRECONNECT, session_, request_info, IDLE, server_ssl_config, | |
| 99 proxy_ssl_config, destination, origin_url, alternative_service, | |
| 100 session_->net_log())); | |
| 101 main_job_->Preconnect(num_streams); | |
| 102 } | |
| 103 | |
| 104 LoadState HttpStreamFactoryImpl::JobController::GetLoadState() const { | |
| 105 DCHECK(request_); | |
| 106 if (bound_job_) | |
| 107 return bound_job_->GetLoadState(); | |
| 108 | |
| 109 // Just pick the first one. | |
| 110 return main_job_->GetLoadState(); | |
| 111 } | |
| 112 | |
| 113 void HttpStreamFactoryImpl::JobController::OnRequestComplete() { | |
| 114 CancelJobs(); | |
| 115 DCHECK(request_); | |
| 116 request_ = nullptr; | |
| 117 if (bound_job_) { | |
| 118 if (bound_job_->job_type() == MAIN) { | |
| 119 main_job_.reset(); | |
| 120 } else { | |
| 121 DCHECK(bound_job_->job_type() == ALTERNATIVE); | |
| 122 alternative_job_.reset(); | |
| 123 } | |
| 124 bound_job_ = nullptr; | |
| 125 } | |
| 126 MaybeNotifyFactoryOfCompletion(); | |
| 127 } | |
| 128 | |
| 129 int HttpStreamFactoryImpl::JobController::RestartTunnelWithProxyAuth( | |
| 130 const AuthCredentials& credentials) { | |
| 131 DCHECK(bound_job_); | |
| 132 return bound_job_->RestartTunnelWithProxyAuth(credentials); | |
| 133 } | |
| 134 | |
| 135 void HttpStreamFactoryImpl::JobController::SetPriority( | |
| 136 RequestPriority priority) { | |
| 137 if (main_job_) { | |
| 138 main_job_->SetPriority(priority); | |
| 139 } | |
| 140 if (alternative_job_) { | |
| 141 alternative_job_->SetPriority(priority); | |
| 142 } | |
| 143 } | |
| 144 | |
| 145 void HttpStreamFactoryImpl::JobController::OnStreamReady( | |
| 146 Job* job, | |
| 147 const SSLConfig& used_ssl_config, | |
| 148 const ProxyInfo& used_proxy_info) { | |
| 149 DCHECK(job); | |
| 150 | |
| 151 if (job_bound_ && bound_job_ != job) { | |
| 152 // We have bound a job to the associated Request, |job| has been orphaned. | |
| 153 OnOrphanedJobComplete(job); | |
| 154 return; | |
| 155 } | |
| 156 std::unique_ptr<HttpStream> stream = job->ReleaseStream(); | |
| 157 DCHECK(stream); | |
| 158 | |
| 159 MarkRequestComplete(job->was_npn_negotiated(), job->protocol_negotiated(), | |
| 160 job->using_spdy()); | |
| 161 | |
| 162 if (!request_) | |
| 163 return; | |
| 164 DCHECK(!factory_->for_websockets_); | |
| 165 DCHECK_EQ(HttpStreamRequest::HTTP_STREAM, request_->stream_type()); | |
| 166 OnJobSucceeded(job); | |
| 167 request_->OnStreamReady(used_ssl_config, used_proxy_info, stream.release()); | |
| 168 } | |
| 169 | |
| 170 void HttpStreamFactoryImpl::JobController::OnBidirectionalStreamImplReady( | |
| 171 Job* job, | |
| 172 const SSLConfig& used_ssl_config, | |
| 173 const ProxyInfo& used_proxy_info) { | |
| 174 DCHECK(job); | |
| 175 | |
| 176 if (job_bound_ && bound_job_ != job) { | |
| 177 // We have bound a job to the associated Request, |job| has been orphaned. | |
| 178 OnOrphanedJobComplete(job); | |
| 179 return; | |
| 180 } | |
| 181 | |
| 182 MarkRequestComplete(job->was_npn_negotiated(), job->protocol_negotiated(), | |
| 183 job->using_spdy()); | |
| 184 | |
| 185 if (!request_) | |
| 186 return; | |
| 187 std::unique_ptr<BidirectionalStreamImpl> stream = | |
| 188 job->ReleaseBidirectionalStream(); | |
| 189 DCHECK(stream); | |
| 190 DCHECK(!factory_->for_websockets_); | |
| 191 DCHECK_EQ(HttpStreamRequest::BIDIRECTIONAL_STREAM, request_->stream_type()); | |
| 192 | |
| 193 OnJobSucceeded(job); | |
| 194 request_->OnBidirectionalStreamImplReady(used_ssl_config, used_proxy_info, | |
| 195 stream.release()); | |
| 196 } | |
| 197 | |
| 198 void HttpStreamFactoryImpl::JobController::OnWebSocketHandshakeStreamReady( | |
| 199 Job* job, | |
| 200 const SSLConfig& used_ssl_config, | |
| 201 const ProxyInfo& used_proxy_info, | |
| 202 WebSocketHandshakeStreamBase* stream) { | |
| 203 DCHECK(job); | |
| 204 | |
| 205 MarkRequestComplete(job->was_npn_negotiated(), job->protocol_negotiated(), | |
| 206 job->using_spdy()); | |
| 207 | |
| 208 if (!request_) | |
| 209 return; | |
| 210 DCHECK(factory_->for_websockets_); | |
| 211 DCHECK_EQ(HttpStreamRequest::HTTP_STREAM, request_->stream_type()); | |
| 212 DCHECK(stream); | |
| 213 | |
| 214 OnJobSucceeded(job); | |
| 215 request_->OnWebSocketHandshakeStreamReady(used_ssl_config, used_proxy_info, | |
| 216 stream); | |
| 217 } | |
| 218 | |
| 219 void HttpStreamFactoryImpl::JobController::OnStreamFailed( | |
| 220 Job* job, | |
| 221 int status, | |
| 222 const SSLConfig& used_ssl_config, | |
| 223 SSLFailureState ssl_failure_state) { | |
| 224 if (job_bound_ && bound_job_ != job) { | |
| 225 // We have bound a job to the associated Request, |job| has been orphaned. | |
| 226 OnOrphanedJobComplete(job); | |
| 227 return; | |
| 228 } | |
| 229 | |
| 230 if (!request_) | |
| 231 return; | |
| 232 DCHECK_NE(OK, status); | |
| 233 DCHECK(job); | |
| 234 | |
| 235 if (!bound_job_) { | |
| 236 if (main_job_ && alternative_job_) { | |
| 237 // Hey, we've got other jobs! Maybe one of them will succeed, let's just | |
| 238 // ignore this failure. | |
| 239 factory_->request_map_.erase(job); | |
| 240 // Notify all the other jobs that this one failed. | |
| 241 if (job->job_type() == MAIN) { | |
| 242 alternative_job_->MarkOtherJobComplete(*job); | |
| 243 main_job_.reset(); | |
| 244 } else { | |
| 245 DCHECK(job->job_type() == ALTERNATIVE); | |
| 246 main_job_->MarkOtherJobComplete(*job); | |
| 247 alternative_job_.reset(); | |
| 248 } | |
| 249 return; | |
| 250 } else { | |
| 251 BindJob(job); | |
| 252 } | |
| 253 } | |
| 254 | |
| 255 request_->OnStreamFailed(status, used_ssl_config, ssl_failure_state); | |
| 256 } | |
| 257 | |
| 258 void HttpStreamFactoryImpl::JobController::OnCertificateError( | |
| 259 Job* job, | |
| 260 int status, | |
| 261 const SSLConfig& used_ssl_config, | |
| 262 const SSLInfo& ssl_info) { | |
| 263 if (job_bound_ && bound_job_ != job) { | |
| 264 // We have bound a job to the associated Request, |job| has been orphaned. | |
| 265 OnOrphanedJobComplete(job); | |
| 266 return; | |
| 267 } | |
| 268 | |
| 269 if (!request_) | |
| 270 return; | |
| 271 DCHECK_NE(OK, status); | |
| 272 if (!bound_job_) | |
| 273 BindJob(job); | |
| 274 | |
| 275 request_->OnCertificateError(status, used_ssl_config, ssl_info); | |
| 276 } | |
| 277 | |
| 278 void HttpStreamFactoryImpl::JobController::OnHttpsProxyTunnelResponse( | |
| 279 Job* job, | |
| 280 const HttpResponseInfo& response_info, | |
| 281 const SSLConfig& used_ssl_config, | |
| 282 const ProxyInfo& used_proxy_info, | |
| 283 HttpStream* stream) { | |
| 284 if (job_bound_ && bound_job_ != job) { | |
| 285 // We have bound a job to the associated Request, |job| has been orphaned. | |
| 286 OnOrphanedJobComplete(job); | |
| 287 return; | |
| 288 } | |
| 289 | |
| 290 if (!bound_job_) | |
| 291 BindJob(job); | |
| 292 if (!request_) | |
| 293 return; | |
| 294 request_->OnHttpsProxyTunnelResponse(response_info, used_ssl_config, | |
| 295 used_proxy_info, stream); | |
| 296 } | |
| 297 | |
| 298 void HttpStreamFactoryImpl::JobController::OnNeedsClientAuth( | |
| 299 Job* job, | |
| 300 const SSLConfig& used_ssl_config, | |
| 301 SSLCertRequestInfo* cert_info) { | |
| 302 if (job_bound_ && bound_job_ != job) { | |
| 303 // We have bound a job to the associated Request, |job| has been orphaned. | |
| 304 OnOrphanedJobComplete(job); | |
| 305 return; | |
| 306 } | |
| 307 if (!request_) | |
| 308 return; | |
| 309 if (!bound_job_) | |
| 310 BindJob(job); | |
| 311 | |
| 312 request_->OnNeedsClientAuth(used_ssl_config, cert_info); | |
| 313 } | |
| 314 | |
| 315 void HttpStreamFactoryImpl::JobController::OnNeedsProxyAuth( | |
| 316 Job* job, | |
| 317 const HttpResponseInfo& proxy_response, | |
| 318 const SSLConfig& used_ssl_config, | |
| 319 const ProxyInfo& used_proxy_info, | |
| 320 HttpAuthController* auth_controller) { | |
| 321 if (job_bound_ && bound_job_ != job) { | |
| 322 // We have bound a job to the associated Request, |job| has been orphaned. | |
| 323 OnOrphanedJobComplete(job); | |
| 324 return; | |
| 325 } | |
| 326 | |
| 327 if (!request_) | |
| 328 return; | |
| 329 if (!bound_job_) | |
| 330 BindJob(job); | |
| 331 request_->OnNeedsProxyAuth(proxy_response, used_ssl_config, used_proxy_info, | |
| 332 auth_controller); | |
| 333 } | |
| 334 | |
| 335 void HttpStreamFactoryImpl::JobController::OnNewSpdySessionReady( | |
| 336 Job* job, | |
| 337 const base::WeakPtr<SpdySession>& spdy_session, | |
| 338 bool direct) { | |
| 339 DCHECK(job); | |
| 340 DCHECK(job->using_spdy()); | |
| 341 | |
| 342 bool is_job_orphaned = job_bound_ && bound_job_ != job; | |
| 343 | |
| 344 // Cache these values in case the job gets deleted. | |
| 345 const SSLConfig used_ssl_config = job->server_ssl_config(); | |
| 346 const ProxyInfo used_proxy_info = job->proxy_info(); | |
| 347 const bool was_npn_negotiated = job->was_npn_negotiated(); | |
| 348 const NextProto protocol_negotiated = job->protocol_negotiated(); | |
| 349 const bool using_spdy = job->using_spdy(); | |
| 350 const BoundNetLog net_log = job->net_log(); | |
| 351 | |
| 352 // Cache this so we can still use it if the JobController is deleted. | |
| 353 HttpStreamFactoryImpl* factory = factory_; | |
| 354 | |
| 355 // Notify |request_|. | |
| 356 if (!is_preconnect_ && !is_job_orphaned) { | |
| 357 DCHECK(request_); | |
| 358 | |
| 359 // The first case is the usual case. | |
| 360 if (!job_bound_) { | |
| 361 BindJob(job); | |
| 362 } | |
| 363 | |
| 364 MarkRequestComplete(was_npn_negotiated, protocol_negotiated, using_spdy); | |
| 365 | |
| 366 std::unique_ptr<HttpStream> stream; | |
| 367 std::unique_ptr<BidirectionalStreamImpl> bidirectional_stream_impl; | |
| 368 | |
| 369 if (for_websockets()) { | |
| 370 // TODO(ricea): Re-instate this code when WebSockets over SPDY is | |
| 371 // implemented. | |
| 372 NOTREACHED(); | |
| 373 } else if (job->stream_type() == HttpStreamRequest::BIDIRECTIONAL_STREAM) { | |
| 374 bidirectional_stream_impl = job->ReleaseBidirectionalStream(); | |
| 375 DCHECK(bidirectional_stream_impl); | |
| 376 delegate_->OnBidirectionalStreamImplReady( | |
| 377 used_ssl_config, used_proxy_info, | |
| 378 bidirectional_stream_impl.release()); | |
| 379 } else { | |
| 380 stream = job->ReleaseStream(); | |
| 381 DCHECK(stream); | |
| 382 delegate_->OnStreamReady(used_ssl_config, used_proxy_info, | |
| 383 stream.release()); | |
| 384 } | |
| 385 } | |
| 386 | |
| 387 // Notify |factory_|. |request_| and |bounded_job_| might be deleted already. | |
| 388 if (spdy_session && spdy_session->IsAvailable()) { | |
| 389 factory->OnNewSpdySessionReady(spdy_session, direct, used_ssl_config, | |
| 390 used_proxy_info, was_npn_negotiated, | |
| 391 protocol_negotiated, using_spdy, net_log); | |
| 392 } | |
| 393 if (is_job_orphaned) { | |
| 394 OnOrphanedJobComplete(job); | |
| 395 } | |
| 396 } | |
| 397 | |
| 398 void HttpStreamFactoryImpl::JobController::OnPreconnectsComplete(Job* job) { | |
| 399 DCHECK_EQ(main_job_.get(), job); | |
| 400 main_job_.reset(); | |
| 401 factory_->OnPreconnectsCompleteInternal(); | |
| 402 MaybeNotifyFactoryOfCompletion(); | |
| 403 } | |
| 404 | |
| 405 void HttpStreamFactoryImpl::JobController::OnOrphanedJobComplete( | |
| 406 const Job* job) { | |
| 407 if (job->job_type() == MAIN) { | |
| 408 DCHECK_EQ(main_job_.get(), job); | |
| 409 main_job_.reset(); | |
| 410 } else { | |
| 411 DCHECK_EQ(alternative_job_.get(), job); | |
| 412 alternative_job_.reset(); | |
| 413 } | |
| 414 | |
| 415 MaybeNotifyFactoryOfCompletion(); | |
| 416 } | |
| 417 | |
| 418 void HttpStreamFactoryImpl::JobController::AddConnectionAttemptsToRequest( | |
| 419 Job* job, | |
| 420 const ConnectionAttempts& attempts) { | |
| 421 if (is_preconnect_ || (job_bound_ && bound_job_ != job)) | |
| 422 return; | |
| 423 | |
| 424 DCHECK(request_); | |
| 425 request_->AddConnectionAttempts(attempts); | |
| 426 } | |
| 427 | |
| 428 void HttpStreamFactoryImpl::JobController::SetSpdySessionKey( | |
| 429 Job* job, | |
| 430 const SpdySessionKey& spdy_session_key) { | |
| 431 if (is_preconnect_ || (job_bound_ && bound_job_ != job)) | |
| 432 return; | |
| 433 | |
| 434 DCHECK(request_); | |
| 435 if (!request_->HasSpdySessionKey()) { | |
| 436 RequestSet& request_set = | |
| 437 factory_->spdy_session_request_map_[spdy_session_key]; | |
| 438 DCHECK(!ContainsKey(request_set, request_)); | |
| 439 request_set.insert(request_); | |
| 440 request_->SetSpdySessionKey(spdy_session_key); | |
| 441 } | |
| 442 } | |
| 443 | |
| 444 void HttpStreamFactoryImpl::JobController:: | |
| 445 RemoveRequestFromSpdySessionRequestMapForJob(Job* job) { | |
| 446 if (is_preconnect_ || (job_bound_ && bound_job_ != job)) | |
| 447 return; | |
| 448 DCHECK(request_); | |
| 449 | |
| 450 RemoveRequestFromSpdySessionRequestMap(); | |
| 451 } | |
| 452 | |
| 453 void HttpStreamFactoryImpl::JobController:: | |
| 454 RemoveRequestFromSpdySessionRequestMap() { | |
| 455 const SpdySessionKey* spdy_session_key = request_->spdy_session_key(); | |
| 456 if (spdy_session_key) { | |
| 457 SpdySessionRequestMap& spdy_session_request_map = | |
| 458 factory_->spdy_session_request_map_; | |
| 459 DCHECK(ContainsKey(spdy_session_request_map, *spdy_session_key)); | |
| 460 RequestSet& request_set = spdy_session_request_map[*spdy_session_key]; | |
| 461 DCHECK(ContainsKey(request_set, request_)); | |
| 462 request_set.erase(request_); | |
| 463 if (request_set.empty()) | |
| 464 spdy_session_request_map.erase(*spdy_session_key); | |
| 465 request_->ResetSpdySessionKey(); | |
| 466 } | |
| 467 } | |
| 468 | |
| 469 const BoundNetLog* HttpStreamFactoryImpl::JobController::GetNetLog( | |
| 470 Job* job) const { | |
| 471 if (is_preconnect_ || (job_bound_ && bound_job_ != job)) | |
| 472 return nullptr; | |
| 473 DCHECK(request_); | |
| 474 return &request_->net_log(); | |
| 475 } | |
| 476 | |
| 477 WebSocketHandshakeStreamBase::CreateHelper* HttpStreamFactoryImpl:: | |
| 478 JobController::websocket_handshake_stream_create_helper() { | |
| 479 DCHECK(request_); | |
| 480 return request_->websocket_handshake_stream_create_helper(); | |
| 481 } | |
| 482 | |
| 483 void HttpStreamFactoryImpl::JobController::CreateJobs( | |
| 484 const HttpRequestInfo& request_info, | |
| 485 RequestPriority priority, | |
| 486 const SSLConfig& server_ssl_config, | |
| 487 const SSLConfig& proxy_ssl_config, | |
| 488 HttpStreamRequest::Delegate* delegate, | |
| 489 HttpStreamRequest::StreamType stream_type, | |
| 490 const BoundNetLog& net_log) { | |
| 491 DCHECK(!main_job_); | |
| 492 DCHECK(!alternative_job_); | |
| 493 HostPortPair destination(HostPortPair::FromURL(request_info.url)); | |
| 494 GURL origin_url = ApplyHostMappingRules(request_info.url, &destination); | |
| 495 | |
| 496 main_job_.reset(job_factory_->CreateJob( | |
| 497 this, MAIN, session_, request_info, priority, server_ssl_config, | |
| 498 proxy_ssl_config, destination, origin_url, net_log.net_log())); | |
| 499 AttachJob(main_job_.get()); | |
| 500 | |
| 501 // Create an alternative job if alternative service is set up for this domain. | |
| 502 const AlternativeService alternative_service = | |
| 503 GetAlternativeServiceFor(request_info, delegate, stream_type); | |
| 504 | |
| 505 if (alternative_service.protocol != UNINITIALIZED_ALTERNATE_PROTOCOL) { | |
| 506 // Never share connection with other jobs for FTP requests. | |
| 507 DVLOG(1) << "Selected alternative service (host: " | |
| 508 << alternative_service.host_port_pair().host() | |
| 509 << " port: " << alternative_service.host_port_pair().port() << ")"; | |
| 510 | |
| 511 DCHECK(!request_info.url.SchemeIs("ftp")); | |
| 512 HostPortPair alternative_destination(alternative_service.host_port_pair()); | |
| 513 ignore_result( | |
| 514 ApplyHostMappingRules(request_info.url, &alternative_destination)); | |
| 515 | |
| 516 alternative_job_.reset(job_factory_->CreateJob( | |
| 517 this, ALTERNATIVE, session_, request_info, priority, server_ssl_config, | |
| 518 proxy_ssl_config, alternative_destination, origin_url, | |
| 519 alternative_service, net_log.net_log())); | |
| 520 AttachJob(alternative_job_.get()); | |
| 521 | |
| 522 main_job_->WaitFor(alternative_job_.get()); | |
| 523 // Make sure to wait until we call WaitFor(), before starting | |
| 524 // |alternative_job|, otherwise |alternative_job| will not notify |job| | |
| 525 // appropriately. | |
| 526 alternative_job_->Start(request_->stream_type()); | |
| 527 } | |
| 528 // Even if |alternative_job| has already finished, it will not have notified | |
| 529 // the request yet, since we defer that to the next iteration of the | |
| 530 // MessageLoop, so starting |main_job_| is always safe. | |
| 531 main_job_->Start(request_->stream_type()); | |
| 532 } | |
| 533 | |
| 534 void HttpStreamFactoryImpl::JobController::AttachJob(Job* job) { | |
| 535 DCHECK(job); | |
| 536 factory_->request_map_[job] = request_; | |
| 537 } | |
| 538 | |
| 539 void HttpStreamFactoryImpl::JobController::BindJob(Job* job) { | |
| 540 DCHECK(request_); | |
| 541 DCHECK(job); | |
| 542 DCHECK(job == alternative_job_.get() || job == main_job_.get()); | |
| 543 DCHECK(!job_bound_); | |
| 544 DCHECK(!bound_job_); | |
| 545 | |
| 546 job_bound_ = true; | |
| 547 bound_job_ = job; | |
| 548 factory_->request_map_.erase(job); | |
| 549 | |
| 550 request_->net_log().AddEvent( | |
| 551 NetLog::TYPE_HTTP_STREAM_REQUEST_BOUND_TO_JOB, | |
| 552 job->net_log().source().ToEventParametersCallback()); | |
| 553 job->net_log().AddEvent( | |
| 554 NetLog::TYPE_HTTP_STREAM_JOB_BOUND_TO_REQUEST, | |
| 555 request_->net_log().source().ToEventParametersCallback()); | |
| 556 | |
| 557 OrphanUnboundJob(); | |
| 558 } | |
| 559 | |
| 560 void HttpStreamFactoryImpl::JobController::CancelJobs() { | |
| 561 DCHECK(request_); | |
| 562 RemoveRequestFromSpdySessionRequestMap(); | |
| 563 if (job_bound_) | |
| 564 return; | |
| 565 if (alternative_job_) { | |
| 566 factory_->request_map_.erase(alternative_job_.get()); | |
| 567 alternative_job_.reset(); | |
| 568 } | |
| 569 if (main_job_) { | |
| 570 factory_->request_map_.erase(main_job_.get()); | |
| 571 main_job_.reset(); | |
| 572 } | |
| 573 } | |
| 574 | |
| 575 void HttpStreamFactoryImpl::JobController::OrphanUnboundJob() { | |
| 576 DCHECK(request_); | |
| 577 RemoveRequestFromSpdySessionRequestMap(); | |
| 578 | |
| 579 DCHECK(bound_job_); | |
| 580 if (bound_job_->job_type() == MAIN && alternative_job_) { | |
| 581 factory_->request_map_.erase(alternative_job_.get()); | |
| 582 alternative_job_->Orphan(); | |
| 583 } else if (bound_job_->job_type() == ALTERNATIVE && main_job_) { | |
| 584 // Orphan main job. | |
| 585 factory_->request_map_.erase(main_job_.get()); | |
| 586 main_job_->Orphan(); | |
| 587 } | |
| 588 } | |
| 589 | |
| 590 void HttpStreamFactoryImpl::JobController::OnJobSucceeded(Job* job) { | |
| 591 // |job| should only be nullptr if we're being serviced by a late bound | |
| 592 // SpdySession (one that was not created by a job in our |jobs_| set). | |
| 593 if (!job) { | |
| 594 DCHECK(!bound_job_); | |
| 595 // NOTE(willchan): We do *NOT* call OrphanUnboundJob() here. The reason is | |
| 596 // because we *WANT* to cancel the unnecessary Jobs from other requests if | |
| 597 // another Job completes first. | |
| 598 // TODO(mbelshe): Revisit this when we implement ip connection pooling of | |
| 599 // SpdySessions. Do we want to orphan the jobs for a different hostname so | |
| 600 // they complete? Or do we want to prevent connecting a new SpdySession if | |
| 601 // we've already got one available for a different hostname where the ip | |
| 602 // address matches up? | |
| 603 CancelJobs(); | |
| 604 return; | |
| 605 } | |
| 606 if (!bound_job_) { | |
| 607 if (main_job_ && alternative_job_) { | |
| 608 job->ReportJobSucceededForRequest(); | |
| 609 // Notify all the other jobs that this one succeeded. | |
| 610 if (job->job_type() == MAIN) { | |
| 611 alternative_job_->MarkOtherJobComplete(*job); | |
| 612 } else { | |
| 613 DCHECK(job->job_type() == ALTERNATIVE); | |
| 614 main_job_->MarkOtherJobComplete(*job); | |
| 615 } | |
| 616 } | |
| 617 BindJob(job); | |
| 618 return; | |
| 619 } | |
| 620 DCHECK(bound_job_); | |
| 621 } | |
| 622 | |
| 623 void HttpStreamFactoryImpl::JobController::MarkRequestComplete( | |
| 624 bool was_npn_negotiated, | |
| 625 NextProto protocol_negotiated, | |
| 626 bool using_spdy) { | |
| 627 if (request_) | |
| 628 request_->Complete(was_npn_negotiated, protocol_negotiated, using_spdy); | |
| 629 } | |
| 630 | |
| 631 void HttpStreamFactoryImpl::JobController::MaybeNotifyFactoryOfCompletion() { | |
| 632 if (!request_ && !main_job_ && !alternative_job_) { | |
| 633 DCHECK(!bound_job_); | |
| 634 factory_->OnJobControllerComplete(this); | |
| 635 } | |
| 636 } | |
| 637 | |
| 638 GURL HttpStreamFactoryImpl::JobController::ApplyHostMappingRules( | |
| 639 const GURL& url, | |
| 640 HostPortPair* endpoint) { | |
| 641 const HostMappingRules* mapping_rules = session_->params().host_mapping_rules; | |
| 642 if (mapping_rules && mapping_rules->RewriteHost(endpoint)) { | |
| 643 url::Replacements<char> replacements; | |
| 644 const std::string port_str = base::UintToString(endpoint->port()); | |
| 645 replacements.SetPort(port_str.c_str(), url::Component(0, port_str.size())); | |
| 646 replacements.SetHost(endpoint->host().c_str(), | |
| 647 url::Component(0, endpoint->host().size())); | |
| 648 return url.ReplaceComponents(replacements); | |
| 649 } | |
| 650 return url; | |
| 651 } | |
| 652 | |
| 653 bool HttpStreamFactoryImpl::JobController::IsQuicWhitelistedForHost( | |
| 654 const std::string& host) { | |
| 655 bool whitelist_needed = false; | |
| 656 for (QuicVersion version : session_->params().quic_supported_versions) { | |
| 657 if (version <= QUIC_VERSION_30) { | |
| 658 whitelist_needed = true; | |
| 659 break; | |
| 660 } | |
| 661 } | |
| 662 | |
| 663 // The QUIC whitelist is not needed in QUIC versions after 30. | |
| 664 if (!whitelist_needed) | |
| 665 return true; | |
| 666 | |
| 667 if (session_->params().transport_security_state->IsGooglePinnedHost(host)) | |
| 668 return true; | |
| 669 | |
| 670 return ContainsKey(session_->params().quic_host_whitelist, | |
| 671 base::ToLowerASCII(host)); | |
| 672 } | |
| 673 | |
| 674 AlternativeService | |
| 675 HttpStreamFactoryImpl::JobController::GetAlternativeServiceFor( | |
| 676 const HttpRequestInfo& request_info, | |
| 677 HttpStreamRequest::Delegate* delegate, | |
| 678 HttpStreamRequest::StreamType stream_type) { | |
| 679 AlternativeService alternative_service = | |
| 680 GetAlternativeServiceForInternal(request_info, delegate, stream_type); | |
| 681 AlternativeServiceType type; | |
| 682 if (alternative_service.protocol == UNINITIALIZED_ALTERNATE_PROTOCOL) { | |
| 683 type = NO_ALTERNATIVE_SERVICE; | |
| 684 } else if (alternative_service.protocol == QUIC) { | |
| 685 if (request_info.url.host() == alternative_service.host) { | |
| 686 type = QUIC_SAME_DESTINATION; | |
| 687 } else { | |
| 688 type = QUIC_DIFFERENT_DESTINATION; | |
| 689 } | |
| 690 } else { | |
| 691 if (request_info.url.host() == alternative_service.host) { | |
| 692 type = NOT_QUIC_SAME_DESTINATION; | |
| 693 } else { | |
| 694 type = NOT_QUIC_DIFFERENT_DESTINATION; | |
| 695 } | |
| 696 } | |
| 697 UMA_HISTOGRAM_ENUMERATION("Net.AlternativeServiceTypeForRequest", type, | |
| 698 MAX_ALTERNATIVE_SERVICE_TYPE); | |
| 699 return alternative_service; | |
| 700 } | |
| 701 | |
| 702 AlternativeService | |
| 703 HttpStreamFactoryImpl::JobController::GetAlternativeServiceForInternal( | |
| 704 const HttpRequestInfo& request_info, | |
| 705 HttpStreamRequest::Delegate* delegate, | |
| 706 HttpStreamRequest::StreamType stream_type) { | |
| 707 GURL original_url = request_info.url; | |
| 708 | |
| 709 if (original_url.SchemeIs("ftp")) | |
| 710 return AlternativeService(); | |
| 711 | |
| 712 if (!session_->params().enable_alternative_service_for_insecure_origins && | |
| 713 !original_url.SchemeIs("https")) | |
| 714 return AlternativeService(); | |
| 715 | |
| 716 url::SchemeHostPort origin(original_url); | |
| 717 HttpServerProperties& http_server_properties = | |
| 718 *session_->http_server_properties(); | |
| 719 const AlternativeServiceVector alternative_service_vector = | |
| 720 http_server_properties.GetAlternativeServices(origin); | |
| 721 if (alternative_service_vector.empty()) | |
| 722 return AlternativeService(); | |
| 723 | |
| 724 bool quic_advertised = false; | |
| 725 bool quic_all_broken = true; | |
| 726 | |
| 727 const bool enable_different_host = | |
| 728 session_->params().enable_alternative_service_with_different_host; | |
| 729 | |
| 730 // First Alt-Svc that is not marked as broken. | |
| 731 AlternativeService first_alternative_service; | |
| 732 | |
| 733 for (const AlternativeService& alternative_service : | |
| 734 alternative_service_vector) { | |
| 735 DCHECK(IsAlternateProtocolValid(alternative_service.protocol)); | |
| 736 if (!quic_advertised && alternative_service.protocol == QUIC) | |
| 737 quic_advertised = true; | |
| 738 if (http_server_properties.IsAlternativeServiceBroken( | |
| 739 alternative_service)) { | |
| 740 HistogramAlternateProtocolUsage(ALTERNATE_PROTOCOL_USAGE_BROKEN); | |
| 741 continue; | |
| 742 } | |
| 743 | |
| 744 if (origin.host() != alternative_service.host && !enable_different_host) | |
| 745 continue; | |
| 746 | |
| 747 // Some shared unix systems may have user home directories (like | |
| 748 // http://foo.com/~mike) which allow users to emit headers. This is a bad | |
| 749 // idea already, but with Alternate-Protocol, it provides the ability for a | |
| 750 // single user on a multi-user system to hijack the alternate protocol. | |
| 751 // These systems also enforce ports <1024 as restricted ports. So don't | |
| 752 // allow protocol upgrades to user-controllable ports. | |
| 753 const int kUnrestrictedPort = 1024; | |
| 754 if (!session_->params().enable_user_alternate_protocol_ports && | |
| 755 (alternative_service.port >= kUnrestrictedPort && | |
| 756 origin.port() < kUnrestrictedPort)) | |
| 757 continue; | |
| 758 | |
| 759 if (alternative_service.protocol >= NPN_SPDY_MINIMUM_VERSION && | |
| 760 alternative_service.protocol <= NPN_SPDY_MAXIMUM_VERSION) { | |
| 761 if (!HttpStreamFactory::spdy_enabled()) | |
| 762 continue; | |
| 763 | |
| 764 // TODO(bnc): Re-enable when https://crbug.com/615413 is fixed. | |
| 765 if (origin.host() != alternative_service.host) | |
| 766 continue; | |
| 767 | |
| 768 // Cache this entry if we don't have a non-broken Alt-Svc yet. | |
| 769 if (first_alternative_service.protocol == | |
| 770 UNINITIALIZED_ALTERNATE_PROTOCOL) | |
| 771 first_alternative_service = alternative_service; | |
| 772 continue; | |
| 773 } | |
| 774 | |
| 775 DCHECK_EQ(QUIC, alternative_service.protocol); | |
| 776 quic_all_broken = false; | |
| 777 if (!session_->params().enable_quic) | |
| 778 continue; | |
| 779 | |
| 780 if (!IsQuicWhitelistedForHost(origin.host())) | |
| 781 continue; | |
| 782 | |
| 783 if (stream_type == HttpStreamRequest::BIDIRECTIONAL_STREAM && | |
| 784 session_->params().quic_disable_bidirectional_streams) { | |
| 785 continue; | |
| 786 } | |
| 787 | |
| 788 if (session_->quic_stream_factory()->IsQuicDisabled( | |
| 789 alternative_service.port)) | |
| 790 continue; | |
| 791 | |
| 792 if (!original_url.SchemeIs("https")) | |
| 793 continue; | |
| 794 | |
| 795 // Check whether there is an existing QUIC session to use for this origin. | |
| 796 HostPortPair mapped_origin(origin.host(), origin.port()); | |
| 797 ignore_result(ApplyHostMappingRules(original_url, &mapped_origin)); | |
| 798 QuicServerId server_id(mapped_origin, request_info.privacy_mode); | |
| 799 | |
| 800 HostPortPair destination(alternative_service.host_port_pair()); | |
| 801 ignore_result(ApplyHostMappingRules(original_url, &destination)); | |
| 802 | |
| 803 if (session_->quic_stream_factory()->CanUseExistingSession(server_id, | |
| 804 destination)) { | |
| 805 return alternative_service; | |
| 806 } | |
| 807 | |
| 808 // Cache this entry if we don't have a non-broken Alt-Svc yet. | |
| 809 if (first_alternative_service.protocol == UNINITIALIZED_ALTERNATE_PROTOCOL) | |
| 810 first_alternative_service = alternative_service; | |
| 811 } | |
| 812 | |
| 813 // Ask delegate to mark QUIC as broken for the origin. | |
| 814 if (quic_advertised && quic_all_broken && delegate != nullptr) | |
| 815 delegate->OnQuicBroken(); | |
| 816 | |
| 817 return first_alternative_service; | |
| 818 } | |
| 819 } | |
| OLD | NEW |