Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(350)

Unified Diff: net/http/disk_based_cert_cache.cc

Issue 329733002: Disk Based Certificate Cache Implementation (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fixed issues with last upload, and changed cleanup_callback_ to be previously bound with the correc… Created 6 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/http/disk_based_cert_cache.cc
diff --git a/net/http/disk_based_cert_cache.cc b/net/http/disk_based_cert_cache.cc
new file mode 100644
index 0000000000000000000000000000000000000000..38cd8db5498b889665fa52507f95446cc5d77eb6
--- /dev/null
+++ b/net/http/disk_based_cert_cache.cc
@@ -0,0 +1,470 @@
+// Copyright (c) 2014 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "net/http/disk_based_cert_cache.h"
+
+#include <list>
Ryan Sleevi 2014/06/18 22:16:03 Curious: Was there a particular reason for choosin
brandonsalmon 2014/06/19 21:32:31 In this circumstance, I could not see any particul
+
+#include "base/callback_helpers.h"
+#include "base/memory/ref_counted.h"
+#include "base/stl_util.h"
+#include "base/strings/string_number_conversions.h"
+#include "net/base/io_buffer.h"
+#include "net/base/net_errors.h"
+#include "net/disk_cache/disk_cache.h"
+
+namespace net {
+
+// WriteWorkers represent pending set jobs in the DiskBasedCertCache. Each
+// certificate requested to be cached is assigned a Writeworker on a one-to-one
+// basis. The same certificate should not have multiple WriteWorkers at the same
+// time, instead, add a user_callback_ to the existing WriteWorker.
Ryan Sleevi 2014/06/18 22:16:04 comment nit: // time, instead, add a user_callback
+class DiskBasedCertCache::WriteWorker {
+ public:
+ // |backend| is a pointer to the initialized disk_cache::backend stored in
+ // DiskBasedCertCache. |key| is the key corresponding to this certificate
+ // to be used in caching. |cert_handle| is the certificate to be stored.
+ // |cleanup_callback| is a callback to the function that will
+ // delete this worker. |user_callback| is a callback to the user
+ // to signify that the certificate has been correctly stored, or that the
+ // operation failed.
Ryan Sleevi 2014/06/18 22:16:04 comment style: we generally don't note types in pr
+ WriteWorker(disk_cache::Backend* backend,
+ const std::string& key,
+ const X509Certificate::OSCertHandle cert_handle,
+ const base::Callback<void(void)>& cleanup_callback,
+ const SetCallback& user_callback);
Ryan Sleevi 2014/06/18 22:16:03 It seems like, for consistency, that the caller sh
+
+ ~WriteWorker();
+
+ // Begin the do-loop for this WriteWorker (will call all user_callbacks_ on
+ // completion).
Ryan Sleevi 2014/06/18 22:16:03 Comment rewording: // Writes the given certificat
+ void Start();
+
+ // Add a callback to this worker. Should be used when |cert_handle_| is
+ // requested to be stored in the cache multiple times within the lifetime
+ // of this worker.
Ryan Sleevi 2014/06/18 22:16:03 Comment rewording: We try to avoid descriptions of
+ void AddCallback(const SetCallback& user_callback);
+
+ private:
+ enum WriteState {
+ CREATE_OR_OPEN,
+ FINISH_CREATE_OR_OPEN,
+ START_WRITE,
+ FINISH_WRITE,
+ WRITE_NONE
+ };
+
+ void OnIOComplete(int rv);
+ void DoLoop(int rv);
+ int DoCreateOrOpen();
+ int DoFinishCreateOrOpen(int rv);
+ int DoStartWrite();
+ int DoFinishWrite(int rv);
+
+ // CallCallbacks is used to call all user callbacks (i.e. callbacks that were
+ // given by the user to the DiskBasedCertCache when calling Set).
Ryan Sleevi 2014/06/18 22:16:03 // Invokes all of the |user_callbacks_|
+ void CallCallbacks(const std::string& key);
Ryan Sleevi 2014/06/18 22:16:03 Why do you pass |key|, when you have |key_| as a m
brandonsalmon 2014/06/19 21:32:31 I did this so I could use CallCallbacks(std::strin
+
+ disk_cache::Backend* backend_;
+ const X509Certificate::OSCertHandle cert_handle_;
+ std::string key_;
+
+ disk_cache::Entry* entry_;
+ WriteState state_;
+ bool create_failed_;
+ scoped_refptr<IOBuffer> buffer;
+
+ base::Callback<void(void)> cleanup_callback_;
Ryan Sleevi 2014/06/18 22:16:03 the name for this is "base::Closure" - avoids the
+ std::list<SetCallback> user_callbacks_;
+ CompletionCallback io_callback_; /* used to access the backend */
Ryan Sleevi 2014/06/18 22:16:03 Delete this comment; Among other things, io_callba
+
+ base::WeakPtrFactory<WriteWorker> weak_factory_;
+};
+
+// ReadWorkers represent pending get jobs in the DiskBasedCertCache. Each
Ryan Sleevi 2014/06/18 22:16:03 s/get/Get/
+// certificate requested to be retrieved from the cache is assigned a ReadWorker
+// on a one-to-one basis. The same |key| should not have multiple ReadWorkers
+// at the same time, instead, call AddCallback to add a user_callback_ to
+// the the existing ReadWorker.
Ryan Sleevi 2014/06/18 22:16:04 Similar comment cleanup as above.
+class DiskBasedCertCache::ReadWorker {
+ public:
+ // |backend| is a pointer to the initialized disk_cache::backend stored in
+ // DiskBasedCertCache. |key| is the key corresponding to this certificate
+ // to be used in caching. |cleanup_callback| is a callback to the function
+ // that will delete this worker. |user_callback| is a callback to the user
+ // to signify that the certificate has been correctly stored, or that the
+ // operation failed.
+ ReadWorker(disk_cache::Backend* backend,
Ryan Sleevi 2014/06/18 22:16:03 Same comment comments as above
+ const std::string& key,
+ const base::Callback<void(void)>& cleanup_callback,
+ const GetCallback& user_callback);
Ryan Sleevi 2014/06/18 22:16:03 ditto AddCallback
+
+ ~ReadWorker();
+
+ // Begin the do-loop for this ReadWorker (will call all user_callbacks_ on
+ // completion).
+ void Start();
+
+ // Add a callback to this worker. Should be used when |key_| is
+ // requested to be retrieved from the cache multiple times within lifetime
+ // of this worker.
+ void AddCallback(const GetCallback& user_callback);
+
+ private:
+ enum ReadState { OPEN, START_READ, FINISH_READ, READ_NONE };
+
+ void OnIOComplete(int rv);
+ void DoLoop(int rv);
+ int DoOpen();
+ int DoStartRead(int rv);
+ int DoFinishRead(int rv);
+
+ // CallCallbacks is used to call all user callbacks (i.e. callbacks that were
+ // given by the user to the DiskBasedCertCache when calling Get).
+ void CallCallbacks(X509Certificate::OSCertHandle cert_handle);
+
+ disk_cache::Backend* backend_;
+
+ std::string key_;
+ disk_cache::Entry* entry_;
+ ReadState state_;
+ int entry_size_;
+ scoped_refptr<IOBuffer> buffer;
+
+ base::Callback<void(void)> cleanup_callback_;
+ std::list<GetCallback> user_callbacks_;
+ CompletionCallback io_callback_;
+ base::WeakPtrFactory<ReadWorker> weak_factory_;
+};
+
+std::string GetCacheKeyToCert(const X509Certificate::OSCertHandle cert_handle) {
+ SHA1HashValue fingerprint =
+ X509Certificate::CalculateFingerprint(cert_handle);
+
+ return "cert:" +
+ base::HexEncode(fingerprint.data, arraysize(fingerprint.data));
+}
Ryan Sleevi 2014/06/18 22:16:03 This function should be between lines 18/19 in an
+
+DiskBasedCertCache::WriteWorker::WriteWorker(
+ disk_cache::Backend* backend,
+ const std::string& key,
+ X509Certificate::OSCertHandle cert_handle,
+ const base::Callback<void(void)>& cleanup_callback,
+ const SetCallback& user_callback)
+ : backend_(backend),
+ cert_handle_(cert_handle),
+ key_(key),
+ entry_(NULL),
+ state_(CREATE_OR_OPEN),
+ create_failed_(false),
+ cleanup_callback_(cleanup_callback),
+ weak_factory_(this) {
+ io_callback_ =
+ base::Bind(&WriteWorker::OnIOComplete, weak_factory_.GetWeakPtr());
+ AddCallback(user_callback);
+}
+
+void DiskBasedCertCache::WriteWorker::Start() {
+ DoLoop(OK);
+
+ if (state_ == WRITE_NONE) {
Ryan Sleevi 2014/06/18 22:16:03 if (state_ != WRITE_NONE) return; if (entry_)
+ if (entry_)
+ entry_->Close();
+ base::ResetAndReturn(&cleanup_callback_).Run();
+ }
+}
+
+void DiskBasedCertCache::WriteWorker::AddCallback(
+ const SetCallback& user_callback) {
+ user_callbacks_.push_back(user_callback);
+}
+
+void DiskBasedCertCache::WriteWorker::OnIOComplete(int rv) {
+ DoLoop(rv);
+
+ if (state_ == WRITE_NONE) {
+ if (entry_)
+ entry_->Close();
+ base::ResetAndReturn(&cleanup_callback_).Run();
+ }
Ryan Sleevi 2014/06/18 22:16:03 Ditto cleanup as above.
+}
+
+void DiskBasedCertCache::WriteWorker::DoLoop(int rv) {
+ do {
+ switch (state_) {
+ case CREATE_OR_OPEN:
+ rv = DoCreateOrOpen();
+ break;
+ case FINISH_CREATE_OR_OPEN:
+ rv = DoFinishCreateOrOpen(rv);
+ break;
+ case START_WRITE:
+ rv = DoStartWrite();
+ break;
+ case FINISH_WRITE:
+ rv = DoFinishWrite(rv);
+ break;
+ case WRITE_NONE:
+ break;
+ }
+ } while (rv != ERR_IO_PENDING && state_ != WRITE_NONE);
+}
+
+int DiskBasedCertCache::WriteWorker::DoCreateOrOpen() {
+ state_ = FINISH_CREATE_OR_OPEN;
+
+ if (create_failed_)
+ return backend_->OpenEntry(key_, &entry_, io_callback_);
+
+ return backend_->CreateEntry(key_, &entry_, io_callback_);
+}
+
+int DiskBasedCertCache::WriteWorker::DoFinishCreateOrOpen(int rv) {
+ // ERR_FAILED implies create entry failed. In order to avoid trying
+ // to open the entry multiple times, the flag create_failed_ is set and
+ // checked.
+ if (rv == ERR_FAILED && !create_failed_) {
Ryan Sleevi 2014/06/18 22:16:03 Why combine CREATE_OR_OPEN into one state? It see
+ create_failed_ = true;
+ state_ = CREATE_OR_OPEN;
+ return OK;
+ } else if (rv < 0) {
+ CallCallbacks(std::string());
Ryan Sleevi 2014/06/18 22:16:03 DANGER! So the same comments I made on the previo
+ state_ = WRITE_NONE;
+ return ERR_FAILED;
+ }
+
+ state_ = START_WRITE;
+ return OK;
+}
+
+int DiskBasedCertCache::WriteWorker::DoStartWrite() {
+ std::string write_data;
+ bool encoded = X509Certificate::GetDEREncoded(cert_handle_, &write_data);
+
+ if (!encoded) {
+ CallCallbacks(std::string());
+ state_ = WRITE_NONE;
+ return ERR_FAILED;
+ }
Ryan Sleevi 2014/06/18 22:16:04 Let's chat in person how to structure these 'failu
+
+ buffer = new IOBuffer(write_data.size());
+ memcpy(buffer->data(), write_data.data(), write_data.size());
+
+ state_ = FINISH_WRITE;
+
+ return entry_->WriteData(0 /* index */,
+ 0 /* offset */,
+ buffer,
+ write_data.size(),
+ io_callback_,
+ true /* truncate */);
+}
+
+int DiskBasedCertCache::WriteWorker::DoFinishWrite(int rv) {
+ if (rv < 0) {
+ CallCallbacks(std::string());
+ state_ = WRITE_NONE;
+ return ERR_FAILED;
+ }
+
+ state_ = WRITE_NONE;
+
+ CallCallbacks(key_);
+ return OK;
+}
+
+void DiskBasedCertCache::WriteWorker::CallCallbacks(const std::string& key) {
+ for (std::list<SetCallback>::iterator it = user_callbacks_.begin();
+ it != user_callbacks_.end();
+ it++) {
+ base::ResetAndReturn(&(*it)).Run(key_);
Ryan Sleevi 2014/06/18 22:16:03 Same danger regarding the risk of the following:
+ }
+}
+
+DiskBasedCertCache::WriteWorker::~WriteWorker() {
+}
+
+DiskBasedCertCache::ReadWorker::ReadWorker(
+ disk_cache::Backend* backend,
+ const std::string& key,
+ const base::Callback<void(void)>& cleanup_callback,
+ const GetCallback& user_callback)
+ : backend_(backend),
+ key_(key),
+ entry_(NULL),
+ state_(OPEN),
+ entry_size_(0),
+ cleanup_callback_(cleanup_callback),
+ weak_factory_(this) {
+ io_callback_ =
+ base::Bind(&ReadWorker::OnIOComplete, weak_factory_.GetWeakPtr());
+ AddCallback(user_callback);
+}
+
+void DiskBasedCertCache::ReadWorker::Start() {
+ DoLoop(OK);
+
+ if (state_ == READ_NONE) {
+ if (entry_)
+ entry_->Close();
+ base::ResetAndReturn(&cleanup_callback_).Run();
+ }
+}
+
+void DiskBasedCertCache::ReadWorker::AddCallback(
+ const GetCallback& user_callback) {
+ user_callbacks_.push_back(user_callback);
+}
+
+void DiskBasedCertCache::ReadWorker::OnIOComplete(int rv) {
+ DoLoop(rv);
+
+ if (state_ == READ_NONE) {
+ if (entry_)
+ entry_->Close();
+ base::ResetAndReturn(&cleanup_callback_).Run();
+ }
+}
+
+void DiskBasedCertCache::ReadWorker::DoLoop(int rv) {
+ do {
+ switch (state_) {
+ case OPEN:
+ rv = DoOpen();
+ break;
+ case START_READ:
+ rv = DoStartRead(rv);
+ break;
+ case FINISH_READ:
+ rv = DoFinishRead(rv);
+ break;
+ case READ_NONE:
+ break;
+ }
+ } while (rv != ERR_IO_PENDING && state_ != READ_NONE);
+}
+
+int DiskBasedCertCache::ReadWorker::DoOpen() {
+ state_ = START_READ;
+ return backend_->OpenEntry(key_, &entry_, io_callback_);
+}
+
+int DiskBasedCertCache::ReadWorker::DoStartRead(int rv) {
+ if (rv < 0) {
+ CallCallbacks(NULL);
+ state_ = READ_NONE;
+ return ERR_FAILED;
+ }
+
+ entry_size_ = entry_->GetDataSize(0 /* index */);
+ state_ = FINISH_READ;
+ buffer = new IOBuffer(entry_size_);
+ return entry_->ReadData(
+ 0 /* index */, 0 /* offset */, buffer, entry_size_, io_callback_);
+}
+
+int DiskBasedCertCache::ReadWorker::DoFinishRead(int rv) {
+ if (rv < 0) {
+ CallCallbacks(NULL);
+ state_ = READ_NONE;
+ return ERR_FAILED;
+ }
+
+ state_ = READ_NONE;
+
+ X509Certificate::OSCertHandle retrieved_cert_handle =
+ X509Certificate::CreateOSCertHandleFromBytes(buffer->data(), entry_size_);
+
+ DCHECK(retrieved_cert_handle);
+
+ CallCallbacks(retrieved_cert_handle);
+ X509Certificate::FreeOSCertHandle(retrieved_cert_handle);
+ return OK;
+}
+
+void DiskBasedCertCache::ReadWorker::CallCallbacks(
+ X509Certificate::OSCertHandle cert_handle) {
+ for (std::list<GetCallback>::iterator it = user_callbacks_.begin();
+ it != user_callbacks_.end();
+ it++) {
+ base::ResetAndReturn(&(*it)).Run(cert_handle);
+ }
+}
+
+DiskBasedCertCache::ReadWorker::~ReadWorker() {
+}
+
+DiskBasedCertCache::DiskBasedCertCache(disk_cache::Backend* backend)
+ : backend_(backend), weak_factory_(this) {
+ DCHECK(backend_);
+}
+
+DiskBasedCertCache::~DiskBasedCertCache() {
+ STLDeleteContainerPairSecondPointers(read_worker_map_.begin(),
+ read_worker_map_.end());
+ STLDeleteContainerPairSecondPointers(write_worker_map_.begin(),
+ write_worker_map_.end());
+}
+
+void DiskBasedCertCache::Get(const std::string& key, const GetCallback& cb) {
+ DCHECK(!key.empty());
+
+ ReadWorkerMap::iterator it = read_worker_map_.find(key);
+
+ if (it == read_worker_map_.end()) {
+ std::pair<ReadWorkerMap::iterator, bool> entry = read_worker_map_.insert(
+ make_pair(key,
+ new ReadWorker(
+ backend_,
+ key,
+ base::Bind(&DiskBasedCertCache::FinishedReadOperation,
+ weak_factory_.GetWeakPtr(),
+ key),
+ cb)));
+ DCHECK(entry.second);
+ entry.first->second->Start();
+ } else {
+ it->second->AddCallback(cb);
+ }
+}
+
+void DiskBasedCertCache::Set(const X509Certificate::OSCertHandle cert_handle,
+ const SetCallback& cb) {
+ DCHECK(!cb.is_null());
+ DCHECK(cert_handle);
+ std::string key = GetCacheKeyToCert(cert_handle);
+
+ WriteWorkerMap::iterator it = write_worker_map_.find(key);
+
+ if (it == write_worker_map_.end()) {
+ std::pair<WriteWorkerMap::iterator, bool> entry = write_worker_map_.insert(
+ make_pair(key,
+ new WriteWorker(
+ backend_,
+ key,
+ cert_handle,
+ base::Bind(&DiskBasedCertCache::FinishedWriteOperation,
+ weak_factory_.GetWeakPtr(),
+ key),
+ cb)));
+ DCHECK(entry.second);
+ entry.first->second->Start();
+ } else {
+ it->second->AddCallback(cb);
+ }
+}
+
+void DiskBasedCertCache::FinishedWriteOperation(const std::string& key) {
+ WriteWorkerMap::iterator it = write_worker_map_.find(key);
+ delete it->second;
+ write_worker_map_.erase(it);
+}
+
+void DiskBasedCertCache::FinishedReadOperation(const std::string& key) {
+ ReadWorkerMap::iterator it = read_worker_map_.find(key);
+ delete it->second;
+ read_worker_map_.erase(it);
+}
+
+} // namespace net

Powered by Google App Engine
This is Rietveld 408576698