| Index: net/http/http_stream_factory.cc
|
| diff --git a/net/http/http_stream_factory.cc b/net/http/http_stream_factory.cc
|
| index e16c9f0568ff42d287bc33bc346ab8a6473ea4cd..70d1101d07bd5e635d902a7a69ad61ca1c4bd29b 100644
|
| --- a/net/http/http_stream_factory.cc
|
| +++ b/net/http/http_stream_factory.cc
|
| @@ -1,247 +1,99 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "net/http/http_stream_factory.h"
|
| -
|
| -#include "base/logging.h"
|
| -#include "base/strings/string_number_conversions.h"
|
| -#include "base/strings/string_split.h"
|
| -#include "net/base/host_mapping_rules.h"
|
| -#include "net/base/host_port_pair.h"
|
| -#include "url/gurl.h"
|
| -
|
| -namespace net {
|
| -
|
| -// WARNING: If you modify or add any static flags, you must keep them in sync
|
| -// with |ResetStaticSettingsToInit|. This is critical for unit test isolation.
|
| -
|
| -// static
|
| -std::vector<std::string>* HttpStreamFactory::next_protos_ = NULL;
|
| -// static
|
| -bool HttpStreamFactory::enabled_protocols_[NUM_VALID_ALTERNATE_PROTOCOLS];
|
| -// static
|
| -bool HttpStreamFactory::spdy_enabled_ = true;
|
| -// static
|
| -bool HttpStreamFactory::use_alternate_protocols_ = false;
|
| -// static
|
| -bool HttpStreamFactory::force_spdy_over_ssl_ = true;
|
| -// static
|
| -bool HttpStreamFactory::force_spdy_always_ = false;
|
| -// static
|
| -std::list<HostPortPair>* HttpStreamFactory::forced_spdy_exclusions_ = NULL;
|
| -
|
| -HttpStreamFactory::~HttpStreamFactory() {}
|
| -
|
| -// static
|
| -bool HttpStreamFactory::IsProtocolEnabled(AlternateProtocol protocol) {
|
| - DCHECK(IsAlternateProtocolValid(protocol));
|
| - return enabled_protocols_[
|
| - protocol - ALTERNATE_PROTOCOL_MINIMUM_VALID_VERSION];
|
| -}
|
| -
|
| -// static
|
| -void HttpStreamFactory::SetProtocolEnabled(AlternateProtocol protocol) {
|
| - DCHECK(IsAlternateProtocolValid(protocol));
|
| - enabled_protocols_[
|
| - protocol - ALTERNATE_PROTOCOL_MINIMUM_VALID_VERSION] = true;
|
| -}
|
| -
|
| -// static
|
| -void HttpStreamFactory::ResetEnabledProtocols() {
|
| - for (int i = ALTERNATE_PROTOCOL_MINIMUM_VALID_VERSION;
|
| - i <= ALTERNATE_PROTOCOL_MAXIMUM_VALID_VERSION; ++i) {
|
| - enabled_protocols_[i - ALTERNATE_PROTOCOL_MINIMUM_VALID_VERSION] = false;
|
| - }
|
| -}
|
| -
|
| -// static
|
| -void HttpStreamFactory::ResetStaticSettingsToInit() {
|
| - // WARNING: These must match the initializers above.
|
| - delete next_protos_;
|
| - delete forced_spdy_exclusions_;
|
| - next_protos_ = NULL;
|
| - spdy_enabled_ = true;
|
| - use_alternate_protocols_ = false;
|
| - force_spdy_over_ssl_ = true;
|
| - force_spdy_always_ = false;
|
| - forced_spdy_exclusions_ = NULL;
|
| - ResetEnabledProtocols();
|
| -}
|
| -
|
| -void HttpStreamFactory::ProcessAlternateProtocol(
|
| - const base::WeakPtr<HttpServerProperties>& http_server_properties,
|
| - const std::string& alternate_protocol_str,
|
| - const HostPortPair& http_host_port_pair) {
|
| - std::vector<std::string> port_protocol_vector;
|
| - base::SplitString(alternate_protocol_str, ':', &port_protocol_vector);
|
| - if (port_protocol_vector.size() != 2) {
|
| - DVLOG(1) << kAlternateProtocolHeader
|
| - << " header has too many tokens: "
|
| - << alternate_protocol_str;
|
| - return;
|
| - }
|
| -
|
| - int port;
|
| - if (!base::StringToInt(port_protocol_vector[0], &port) ||
|
| - port <= 0 || port >= 1 << 16) {
|
| - DVLOG(1) << kAlternateProtocolHeader
|
| - << " header has unrecognizable port: "
|
| - << port_protocol_vector[0];
|
| - return;
|
| - }
|
| -
|
| - AlternateProtocol protocol =
|
| - AlternateProtocolFromString(port_protocol_vector[1]);
|
| - if (IsAlternateProtocolValid(protocol) && !IsProtocolEnabled(protocol)) {
|
| - protocol = ALTERNATE_PROTOCOL_BROKEN;
|
| - }
|
| -
|
| - if (protocol == ALTERNATE_PROTOCOL_BROKEN) {
|
| - DVLOG(1) << kAlternateProtocolHeader
|
| - << " header has unrecognized protocol: "
|
| - << port_protocol_vector[1];
|
| - return;
|
| - }
|
| -
|
| - HostPortPair host_port(http_host_port_pair);
|
| - const HostMappingRules* mapping_rules = GetHostMappingRules();
|
| - if (mapping_rules)
|
| - mapping_rules->RewriteHost(&host_port);
|
| -
|
| - if (http_server_properties->HasAlternateProtocol(host_port)) {
|
| - const PortAlternateProtocolPair existing_alternate =
|
| - http_server_properties->GetAlternateProtocol(host_port);
|
| - // If we think the alternate protocol is broken, don't change it.
|
| - if (existing_alternate.protocol == ALTERNATE_PROTOCOL_BROKEN)
|
| - return;
|
| - }
|
| -
|
| - http_server_properties->SetAlternateProtocol(host_port, port, protocol);
|
| -}
|
| -
|
| -GURL HttpStreamFactory::ApplyHostMappingRules(const GURL& url,
|
| - HostPortPair* endpoint) {
|
| - const HostMappingRules* mapping_rules = GetHostMappingRules();
|
| - if (mapping_rules && mapping_rules->RewriteHost(endpoint)) {
|
| - url::Replacements<char> replacements;
|
| - const std::string port_str = base::IntToString(endpoint->port());
|
| - replacements.SetPort(port_str.c_str(), url::Component(0, port_str.size()));
|
| - replacements.SetHost(endpoint->host().c_str(),
|
| - url::Component(0, endpoint->host().size()));
|
| - return url.ReplaceComponents(replacements);
|
| - }
|
| - return url;
|
| -}
|
| -
|
| -// static
|
| -void HttpStreamFactory::add_forced_spdy_exclusion(const std::string& value) {
|
| - HostPortPair pair = HostPortPair::FromURL(GURL(value));
|
| - if (!forced_spdy_exclusions_)
|
| - forced_spdy_exclusions_ = new std::list<HostPortPair>();
|
| - forced_spdy_exclusions_->push_back(pair);
|
| -}
|
| -
|
| -// static
|
| -bool HttpStreamFactory::HasSpdyExclusion(const HostPortPair& endpoint) {
|
| - std::list<HostPortPair>* exclusions = forced_spdy_exclusions_;
|
| - if (!exclusions)
|
| - return false;
|
| -
|
| - std::list<HostPortPair>::const_iterator it;
|
| - for (it = exclusions->begin(); it != exclusions->end(); ++it)
|
| - if (it->Equals(endpoint))
|
| - return true;
|
| - return false;
|
| -}
|
| -
|
| -// static
|
| -void HttpStreamFactory::EnableNpnHttpOnly() {
|
| - // Avoid alternate protocol in this case. Otherwise, browser will try SSL
|
| - // and then fallback to http. This introduces extra load.
|
| - set_use_alternate_protocols(false);
|
| - std::vector<NextProto> next_protos;
|
| - next_protos.push_back(kProtoHTTP11);
|
| - SetNextProtos(next_protos);
|
| -}
|
| -
|
| -// static
|
| -void HttpStreamFactory::EnableNpnSpdy3() {
|
| - set_use_alternate_protocols(true);
|
| - std::vector<NextProto> next_protos;
|
| - next_protos.push_back(kProtoHTTP11);
|
| - next_protos.push_back(kProtoQUIC1SPDY3);
|
| - next_protos.push_back(kProtoSPDY3);
|
| - SetNextProtos(next_protos);
|
| -}
|
| -
|
| -// static
|
| -void HttpStreamFactory::EnableNpnSpdy31() {
|
| - set_use_alternate_protocols(true);
|
| - std::vector<NextProto> next_protos;
|
| - next_protos.push_back(kProtoHTTP11);
|
| - next_protos.push_back(kProtoQUIC1SPDY3);
|
| - next_protos.push_back(kProtoSPDY3);
|
| - next_protos.push_back(kProtoSPDY31);
|
| - SetNextProtos(next_protos);
|
| -}
|
| -
|
| -// static
|
| -void HttpStreamFactory::EnableNpnSpdy31WithSpdy2() {
|
| - set_use_alternate_protocols(true);
|
| - std::vector<NextProto> next_protos;
|
| - next_protos.push_back(kProtoHTTP11);
|
| - next_protos.push_back(kProtoQUIC1SPDY3);
|
| - next_protos.push_back(kProtoDeprecatedSPDY2);
|
| - next_protos.push_back(kProtoSPDY3);
|
| - next_protos.push_back(kProtoSPDY31);
|
| - SetNextProtos(next_protos);
|
| -}
|
| -
|
| -// static
|
| -void HttpStreamFactory::EnableNpnSpdy4Http2() {
|
| - set_use_alternate_protocols(true);
|
| - std::vector<NextProto> next_protos;
|
| - next_protos.push_back(kProtoHTTP11);
|
| - next_protos.push_back(kProtoQUIC1SPDY3);
|
| - next_protos.push_back(kProtoSPDY3);
|
| - next_protos.push_back(kProtoSPDY31);
|
| - next_protos.push_back(kProtoSPDY4);
|
| - SetNextProtos(next_protos);
|
| -}
|
| -
|
| -// static
|
| -void HttpStreamFactory::SetNextProtos(const std::vector<NextProto>& value) {
|
| - if (!next_protos_)
|
| - next_protos_ = new std::vector<std::string>;
|
| -
|
| - next_protos_->clear();
|
| -
|
| - ResetEnabledProtocols();
|
| -
|
| - // TODO(rtenneti): bug 116575 - consider combining the NextProto and
|
| - // AlternateProtocol.
|
| - for (uint32 i = 0; i < value.size(); ++i) {
|
| - NextProto proto = value[i];
|
| - // Add the protocol to the TLS next protocol list, except for QUIC
|
| - // since it uses UDP.
|
| - if (proto != kProtoQUIC1SPDY3) {
|
| - next_protos_->push_back(SSLClientSocket::NextProtoToString(proto));
|
| - }
|
| -
|
| - // Enable the corresponding alternate protocol, except for HTTP
|
| - // which has not corresponding alternative.
|
| - if (proto != kProtoHTTP11) {
|
| - AlternateProtocol alternate = AlternateProtocolFromNextProto(proto);
|
| - if (!IsAlternateProtocolValid(alternate)) {
|
| - NOTREACHED() << "Invalid next proto: " << proto;
|
| - continue;
|
| - }
|
| - SetProtocolEnabled(alternate);
|
| - }
|
| - }
|
| -}
|
| -
|
| -HttpStreamFactory::HttpStreamFactory() {}
|
| -
|
| -} // namespace net
|
| +// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "net/http/http_stream_factory.h"
|
| +
|
| +#include "base/logging.h"
|
| +#include "base/strings/string_number_conversions.h"
|
| +#include "base/strings/string_split.h"
|
| +#include "net/base/host_mapping_rules.h"
|
| +#include "net/base/host_port_pair.h"
|
| +#include "net/http/http_network_session.h"
|
| +#include "url/gurl.h"
|
| +
|
| +namespace net {
|
| +
|
| +// WARNING: If you modify or add any static flags, you must keep them in sync
|
| +// with |ResetStaticSettingsToInit|. This is critical for unit test isolation.
|
| +
|
| +// static
|
| +bool HttpStreamFactory::spdy_enabled_ = true;
|
| +
|
| +HttpStreamFactory::~HttpStreamFactory() {}
|
| +
|
| +// static
|
| +void HttpStreamFactory::ResetStaticSettingsToInit() {
|
| + spdy_enabled_ = true;
|
| +}
|
| +
|
| +void HttpStreamFactory::ProcessAlternateProtocol(
|
| + const base::WeakPtr<HttpServerProperties>& http_server_properties,
|
| + const std::string& alternate_protocol_str,
|
| + const HostPortPair& http_host_port_pair,
|
| + const HttpNetworkSession& session) {
|
| + std::vector<std::string> port_protocol_vector;
|
| + base::SplitString(alternate_protocol_str, ':', &port_protocol_vector);
|
| + if (port_protocol_vector.size() != 2) {
|
| + DVLOG(1) << kAlternateProtocolHeader
|
| + << " header has too many tokens: "
|
| + << alternate_protocol_str;
|
| + return;
|
| + }
|
| +
|
| + int port;
|
| + if (!base::StringToInt(port_protocol_vector[0], &port) ||
|
| + port <= 0 || port >= 1 << 16) {
|
| + DVLOG(1) << kAlternateProtocolHeader
|
| + << " header has unrecognizable port: "
|
| + << port_protocol_vector[0];
|
| + return;
|
| + }
|
| +
|
| + AlternateProtocol protocol =
|
| + AlternateProtocolFromString(port_protocol_vector[1]);
|
| + if (IsAlternateProtocolValid(protocol) &&
|
| + !session.IsProtocolEnabled(protocol)) {
|
| + protocol = ALTERNATE_PROTOCOL_BROKEN;
|
| + }
|
| +
|
| + if (protocol == ALTERNATE_PROTOCOL_BROKEN) {
|
| + DVLOG(1) << kAlternateProtocolHeader
|
| + << " header has unrecognized protocol: "
|
| + << port_protocol_vector[1];
|
| + return;
|
| + }
|
| +
|
| + HostPortPair host_port(http_host_port_pair);
|
| + const HostMappingRules* mapping_rules = GetHostMappingRules();
|
| + if (mapping_rules)
|
| + mapping_rules->RewriteHost(&host_port);
|
| +
|
| + if (http_server_properties->HasAlternateProtocol(host_port)) {
|
| + const PortAlternateProtocolPair existing_alternate =
|
| + http_server_properties->GetAlternateProtocol(host_port);
|
| + // If we think the alternate protocol is broken, don't change it.
|
| + if (existing_alternate.protocol == ALTERNATE_PROTOCOL_BROKEN)
|
| + return;
|
| + }
|
| +
|
| + http_server_properties->SetAlternateProtocol(host_port, port, protocol);
|
| +}
|
| +
|
| +GURL HttpStreamFactory::ApplyHostMappingRules(const GURL& url,
|
| + HostPortPair* endpoint) {
|
| + const HostMappingRules* mapping_rules = GetHostMappingRules();
|
| + if (mapping_rules && mapping_rules->RewriteHost(endpoint)) {
|
| + url::Replacements<char> replacements;
|
| + const std::string port_str = base::IntToString(endpoint->port());
|
| + replacements.SetPort(port_str.c_str(), url::Component(0, port_str.size()));
|
| + replacements.SetHost(endpoint->host().c_str(),
|
| + url::Component(0, endpoint->host().size()));
|
| + return url.ReplaceComponents(replacements);
|
| + }
|
| + return url;
|
| +}
|
| +
|
| +HttpStreamFactory::HttpStreamFactory() {}
|
| +
|
| +} // namespace net
|
|
|