OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/http/http_stream_parser.h" | 5 #include "net/http/http_stream_parser.h" |
6 | 6 |
7 #include <utility> | 7 #include <utility> |
8 | 8 |
9 #include "base/bind.h" | 9 #include "base/bind.h" |
10 #include "base/compiler_specific.h" | 10 #include "base/compiler_specific.h" |
11 #include "base/logging.h" | 11 #include "base/logging.h" |
12 #include "base/metrics/histogram_macros.h" | 12 #include "base/metrics/histogram_macros.h" |
13 #include "base/profiler/scoped_tracker.h" | 13 #include "base/profiler/scoped_tracker.h" |
14 #include "base/strings/string_util.h" | 14 #include "base/strings/string_util.h" |
15 #include "base/values.h" | 15 #include "base/values.h" |
16 #include "net/base/io_buffer.h" | 16 #include "net/base/io_buffer.h" |
17 #include "net/base/ip_endpoint.h" | 17 #include "net/base/ip_endpoint.h" |
18 #include "net/base/upload_data_stream.h" | 18 #include "net/base/upload_data_stream.h" |
19 #include "net/http/http_chunked_decoder.h" | 19 #include "net/http/http_chunked_decoder.h" |
20 #include "net/http/http_request_headers.h" | 20 #include "net/http/http_request_headers.h" |
21 #include "net/http/http_request_info.h" | 21 #include "net/http/http_request_info.h" |
22 #include "net/http/http_response_headers.h" | 22 #include "net/http/http_response_headers.h" |
23 #include "net/http/http_status_line_validator.h" | 23 #include "net/http/http_status_line_validator.h" |
24 #include "net/http/http_util.h" | 24 #include "net/http/http_util.h" |
25 #include "net/socket/client_socket_handle.h" | 25 #include "net/socket/client_socket_handle.h" |
26 #include "net/socket/ssl_client_socket.h" | 26 #include "net/socket/ssl_client_socket.h" |
27 #include "net/ssl/token_binding.h" | 27 #include "net/ssl/token_binding.h" |
28 #include "url/url_canon.h" | |
29 | 28 |
30 namespace net { | 29 namespace net { |
31 | 30 |
32 namespace { | 31 namespace { |
33 | 32 |
34 enum HttpHeaderParserEvent { | 33 enum HttpHeaderParserEvent { |
35 HEADER_PARSER_INVOKED = 0, | 34 HEADER_PARSER_INVOKED = 0, |
36 // Obsolete: HEADER_HTTP_09_RESPONSE = 1, | 35 // Obsolete: HEADER_HTTP_09_RESPONSE = 1, |
37 HEADER_ALLOWED_TRUNCATED_HEADERS = 2, | 36 HEADER_ALLOWED_TRUNCATED_HEADERS = 2, |
38 HEADER_SKIPPED_WS_PREFIX = 3, | 37 HEADER_SKIPPED_WS_PREFIX = 3, |
(...skipping 162 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
201 const size_t HttpStreamParser::kChunkHeaderFooterSize = 12; | 200 const size_t HttpStreamParser::kChunkHeaderFooterSize = 12; |
202 | 201 |
203 HttpStreamParser::HttpStreamParser(ClientSocketHandle* connection, | 202 HttpStreamParser::HttpStreamParser(ClientSocketHandle* connection, |
204 const HttpRequestInfo* request, | 203 const HttpRequestInfo* request, |
205 GrowableIOBuffer* read_buffer, | 204 GrowableIOBuffer* read_buffer, |
206 const BoundNetLog& net_log) | 205 const BoundNetLog& net_log) |
207 : io_state_(STATE_NONE), | 206 : io_state_(STATE_NONE), |
208 request_(request), | 207 request_(request), |
209 request_headers_(nullptr), | 208 request_headers_(nullptr), |
210 request_headers_length_(0), | 209 request_headers_length_(0), |
211 http_09_on_non_default_ports_enabled_(false), | |
212 read_buf_(read_buffer), | 210 read_buf_(read_buffer), |
213 read_buf_unused_offset_(0), | 211 read_buf_unused_offset_(0), |
214 response_header_start_offset_(-1), | 212 response_header_start_offset_(-1), |
215 received_bytes_(0), | 213 received_bytes_(0), |
216 sent_bytes_(0), | 214 sent_bytes_(0), |
217 response_(nullptr), | 215 response_(nullptr), |
218 response_body_length_(-1), | 216 response_body_length_(-1), |
219 response_is_keep_alive_(false), | 217 response_is_keep_alive_(false), |
220 response_body_read_(0), | 218 response_body_read_(0), |
221 user_read_buf_(nullptr), | 219 user_read_buf_(nullptr), |
(...skipping 770 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
992 } | 990 } |
993 | 991 |
994 if (response_header_start_offset_ >= 0) { | 992 if (response_header_start_offset_ >= 0) { |
995 received_bytes_ += end_offset; | 993 received_bytes_ += end_offset; |
996 std::string raw_headers = | 994 std::string raw_headers = |
997 HttpUtil::AssembleRawHeaders(read_buf_->StartOfBuffer(), end_offset); | 995 HttpUtil::AssembleRawHeaders(read_buf_->StartOfBuffer(), end_offset); |
998 ValidateStatusLine( | 996 ValidateStatusLine( |
999 std::string(read_buf_->StartOfBuffer(), raw_headers.find('\0'))); | 997 std::string(read_buf_->StartOfBuffer(), raw_headers.find('\0'))); |
1000 headers = new HttpResponseHeaders(raw_headers); | 998 headers = new HttpResponseHeaders(raw_headers); |
1001 } else { | 999 } else { |
1002 // Enough data was read -- there is no status line, so this is HTTP/0.9, or | 1000 // Enough data was read -- there is no status line. |
1003 // the server is broken / doesn't speak HTTP. | |
1004 | |
1005 // If the port is not the default for the scheme, assume it's not a real | |
1006 // HTTP/0.9 response, and fail the request. | |
1007 // TODO(crbug.com/624462): Further restrict the cases in which we allow | |
1008 // HTTP/0.9. | |
1009 std::string scheme(request_->url.scheme()); | |
1010 if (!http_09_on_non_default_ports_enabled_ && | |
1011 url::DefaultPortForScheme(scheme.c_str(), scheme.length()) != | |
1012 request_->url.EffectiveIntPort()) { | |
1013 return ERR_INVALID_HTTP_RESPONSE; | |
1014 } | |
1015 | |
1016 headers = new HttpResponseHeaders(std::string("HTTP/0.9 200 OK")); | 1001 headers = new HttpResponseHeaders(std::string("HTTP/0.9 200 OK")); |
1017 | 1002 |
1018 if (request_->url.SchemeIsCryptographic()) { | 1003 if (request_->url.SchemeIsCryptographic()) { |
1019 RecordHeaderParserEvent(HEADER_HTTP_09_RESPONSE_OVER_SSL); | 1004 RecordHeaderParserEvent(HEADER_HTTP_09_RESPONSE_OVER_SSL); |
1020 } else { | 1005 } else { |
1021 RecordHeaderParserEvent(HEADER_HTTP_09_RESPONSE_OVER_HTTP); | 1006 RecordHeaderParserEvent(HEADER_HTTP_09_RESPONSE_OVER_HTTP); |
1022 } | 1007 } |
1023 if (connection_->is_reused()) | 1008 if (connection_->is_reused()) |
1024 RecordHeaderParserEvent(HEADER_HTTP_09_ON_REUSED_SOCKET); | 1009 RecordHeaderParserEvent(HEADER_HTTP_09_ON_REUSED_SOCKET); |
1025 } | 1010 } |
(...skipping 206 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1232 UMA_HISTOGRAM_ENUMERATION("Net.HttpStatusLineStatus", status, | 1217 UMA_HISTOGRAM_ENUMERATION("Net.HttpStatusLineStatus", status, |
1233 HttpStatusLineValidator::STATUS_LINE_MAX); | 1218 HttpStatusLineValidator::STATUS_LINE_MAX); |
1234 } | 1219 } |
1235 | 1220 |
1236 bool HttpStreamParser::SendRequestBuffersEmpty() { | 1221 bool HttpStreamParser::SendRequestBuffersEmpty() { |
1237 return request_headers_ == nullptr && request_body_send_buf_ == nullptr && | 1222 return request_headers_ == nullptr && request_body_send_buf_ == nullptr && |
1238 request_body_send_buf_ == nullptr; | 1223 request_body_send_buf_ == nullptr; |
1239 } | 1224 } |
1240 | 1225 |
1241 } // namespace net | 1226 } // namespace net |
OLD | NEW |