| Index: net/http/http_stream_factory_impl_job.cc
|
| diff --git a/net/http/http_stream_factory_impl_job.cc b/net/http/http_stream_factory_impl_job.cc
|
| deleted file mode 100644
|
| index 8729dfbba293736b550fd70027c9852804520ffa..0000000000000000000000000000000000000000
|
| --- a/net/http/http_stream_factory_impl_job.cc
|
| +++ /dev/null
|
| @@ -1,1490 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "net/http/http_stream_factory_impl_job.h"
|
| -
|
| -#include <algorithm>
|
| -#include <string>
|
| -
|
| -#include "base/bind.h"
|
| -#include "base/bind_helpers.h"
|
| -#include "base/logging.h"
|
| -#include "base/profiler/scoped_tracker.h"
|
| -#include "base/stl_util.h"
|
| -#include "base/strings/string_util.h"
|
| -#include "base/strings/stringprintf.h"
|
| -#include "base/values.h"
|
| -#include "build/build_config.h"
|
| -#include "net/base/connection_type_histograms.h"
|
| -#include "net/base/net_log.h"
|
| -#include "net/base/net_util.h"
|
| -#include "net/http/http_basic_stream.h"
|
| -#include "net/http/http_network_session.h"
|
| -#include "net/http/http_proxy_client_socket.h"
|
| -#include "net/http/http_proxy_client_socket_pool.h"
|
| -#include "net/http/http_request_info.h"
|
| -#include "net/http/http_server_properties.h"
|
| -#include "net/http/http_stream_factory.h"
|
| -#include "net/http/http_stream_factory_impl_request.h"
|
| -#include "net/quic/quic_http_stream.h"
|
| -#include "net/socket/client_socket_handle.h"
|
| -#include "net/socket/client_socket_pool.h"
|
| -#include "net/socket/client_socket_pool_manager.h"
|
| -#include "net/socket/socks_client_socket_pool.h"
|
| -#include "net/socket/ssl_client_socket.h"
|
| -#include "net/socket/ssl_client_socket_pool.h"
|
| -#include "net/spdy/spdy_http_stream.h"
|
| -#include "net/spdy/spdy_session.h"
|
| -#include "net/spdy/spdy_session_pool.h"
|
| -#include "net/ssl/ssl_cert_request_info.h"
|
| -
|
| -namespace net {
|
| -
|
| -// Returns parameters associated with the start of a HTTP stream job.
|
| -base::Value* NetLogHttpStreamJobCallback(const GURL* original_url,
|
| - const GURL* url,
|
| - RequestPriority priority,
|
| - NetLog::LogLevel /* log_level */) {
|
| - base::DictionaryValue* dict = new base::DictionaryValue();
|
| - dict->SetString("original_url", original_url->GetOrigin().spec());
|
| - dict->SetString("url", url->GetOrigin().spec());
|
| - dict->SetString("priority", RequestPriorityToString(priority));
|
| - return dict;
|
| -}
|
| -
|
| -// Returns parameters associated with the Proto (with NPN negotiation) of a HTTP
|
| -// stream.
|
| -base::Value* NetLogHttpStreamProtoCallback(
|
| - const SSLClientSocket::NextProtoStatus status,
|
| - const std::string* proto,
|
| - NetLog::LogLevel /* log_level */) {
|
| - base::DictionaryValue* dict = new base::DictionaryValue();
|
| -
|
| - dict->SetString("next_proto_status",
|
| - SSLClientSocket::NextProtoStatusToString(status));
|
| - dict->SetString("proto", *proto);
|
| - return dict;
|
| -}
|
| -
|
| -HttpStreamFactoryImpl::Job::Job(HttpStreamFactoryImpl* stream_factory,
|
| - HttpNetworkSession* session,
|
| - const HttpRequestInfo& request_info,
|
| - RequestPriority priority,
|
| - const SSLConfig& server_ssl_config,
|
| - const SSLConfig& proxy_ssl_config,
|
| - NetLog* net_log)
|
| - : request_(NULL),
|
| - request_info_(request_info),
|
| - priority_(priority),
|
| - server_ssl_config_(server_ssl_config),
|
| - proxy_ssl_config_(proxy_ssl_config),
|
| - net_log_(BoundNetLog::Make(net_log, NetLog::SOURCE_HTTP_STREAM_JOB)),
|
| - io_callback_(base::Bind(&Job::OnIOComplete, base::Unretained(this))),
|
| - connection_(new ClientSocketHandle),
|
| - session_(session),
|
| - stream_factory_(stream_factory),
|
| - next_state_(STATE_NONE),
|
| - pac_request_(NULL),
|
| - blocking_job_(NULL),
|
| - waiting_job_(NULL),
|
| - using_ssl_(false),
|
| - using_spdy_(false),
|
| - using_quic_(false),
|
| - quic_request_(session_->quic_stream_factory()),
|
| - using_existing_quic_session_(false),
|
| - spdy_certificate_error_(OK),
|
| - establishing_tunnel_(false),
|
| - was_npn_negotiated_(false),
|
| - protocol_negotiated_(kProtoUnknown),
|
| - num_streams_(0),
|
| - spdy_session_direct_(false),
|
| - job_status_(STATUS_RUNNING),
|
| - other_job_status_(STATUS_RUNNING),
|
| - ptr_factory_(this) {
|
| - DCHECK(stream_factory);
|
| - DCHECK(session);
|
| -}
|
| -
|
| -HttpStreamFactoryImpl::Job::~Job() {
|
| - net_log_.EndEvent(NetLog::TYPE_HTTP_STREAM_JOB);
|
| -
|
| - // When we're in a partially constructed state, waiting for the user to
|
| - // provide certificate handling information or authentication, we can't reuse
|
| - // this stream at all.
|
| - if (next_state_ == STATE_WAITING_USER_ACTION) {
|
| - connection_->socket()->Disconnect();
|
| - connection_.reset();
|
| - }
|
| -
|
| - if (pac_request_)
|
| - session_->proxy_service()->CancelPacRequest(pac_request_);
|
| -
|
| - // The stream could be in a partial state. It is not reusable.
|
| - if (stream_.get() && next_state_ != STATE_DONE)
|
| - stream_->Close(true /* not reusable */);
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::Start(Request* request) {
|
| - DCHECK(request);
|
| - request_ = request;
|
| - StartInternal();
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::Preconnect(int num_streams) {
|
| - DCHECK_GT(num_streams, 0);
|
| - base::WeakPtr<HttpServerProperties> http_server_properties =
|
| - session_->http_server_properties();
|
| - if (http_server_properties &&
|
| - http_server_properties->SupportsRequestPriority(
|
| - HostPortPair::FromURL(request_info_.url))) {
|
| - num_streams_ = 1;
|
| - } else {
|
| - num_streams_ = num_streams;
|
| - }
|
| - return StartInternal();
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::RestartTunnelWithProxyAuth(
|
| - const AuthCredentials& credentials) {
|
| - DCHECK(establishing_tunnel_);
|
| - next_state_ = STATE_RESTART_TUNNEL_AUTH;
|
| - stream_.reset();
|
| - return RunLoop(OK);
|
| -}
|
| -
|
| -LoadState HttpStreamFactoryImpl::Job::GetLoadState() const {
|
| - switch (next_state_) {
|
| - case STATE_RESOLVE_PROXY_COMPLETE:
|
| - return session_->proxy_service()->GetLoadState(pac_request_);
|
| - case STATE_INIT_CONNECTION_COMPLETE:
|
| - case STATE_CREATE_STREAM_COMPLETE:
|
| - return using_quic_ ? LOAD_STATE_CONNECTING : connection_->GetLoadState();
|
| - default:
|
| - return LOAD_STATE_IDLE;
|
| - }
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::MarkAsAlternate(
|
| - const GURL& original_url,
|
| - AlternateProtocolInfo alternate) {
|
| - DCHECK(!original_url_.get());
|
| - original_url_.reset(new GURL(original_url));
|
| - alternate_protocol_ = alternate;
|
| - if (alternate.protocol == QUIC) {
|
| - DCHECK(session_->params().enable_quic);
|
| - using_quic_ = true;
|
| - }
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::WaitFor(Job* job) {
|
| - DCHECK_EQ(STATE_NONE, next_state_);
|
| - DCHECK_EQ(STATE_NONE, job->next_state_);
|
| - DCHECK(!blocking_job_);
|
| - DCHECK(!job->waiting_job_);
|
| - blocking_job_ = job;
|
| - job->waiting_job_ = this;
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::Resume(Job* job) {
|
| - DCHECK_EQ(blocking_job_, job);
|
| - blocking_job_ = NULL;
|
| -
|
| - // We know we're blocked if the next_state_ is STATE_WAIT_FOR_JOB_COMPLETE.
|
| - // Unblock |this|.
|
| - if (next_state_ == STATE_WAIT_FOR_JOB_COMPLETE) {
|
| - base::MessageLoop::current()->PostTask(
|
| - FROM_HERE,
|
| - base::Bind(&HttpStreamFactoryImpl::Job::OnIOComplete,
|
| - ptr_factory_.GetWeakPtr(), OK));
|
| - }
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::Orphan(const Request* request) {
|
| - DCHECK_EQ(request_, request);
|
| - request_ = NULL;
|
| - if (blocking_job_) {
|
| - // We've been orphaned, but there's a job we're blocked on. Don't bother
|
| - // racing, just cancel ourself.
|
| - DCHECK(blocking_job_->waiting_job_);
|
| - blocking_job_->waiting_job_ = NULL;
|
| - blocking_job_ = NULL;
|
| - if (stream_factory_->for_websockets_ &&
|
| - connection_ && connection_->socket()) {
|
| - connection_->socket()->Disconnect();
|
| - }
|
| - stream_factory_->OnOrphanedJobComplete(this);
|
| - } else if (stream_factory_->for_websockets_) {
|
| - // We cancel this job because a WebSocketHandshakeStream can't be created
|
| - // without a WebSocketHandshakeStreamBase::CreateHelper which is stored in
|
| - // the Request class and isn't accessible from this job.
|
| - if (connection_ && connection_->socket()) {
|
| - connection_->socket()->Disconnect();
|
| - }
|
| - stream_factory_->OnOrphanedJobComplete(this);
|
| - }
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::SetPriority(RequestPriority priority) {
|
| - priority_ = priority;
|
| - // TODO(akalin): Propagate this to |connection_| and maybe the
|
| - // preconnect state.
|
| -}
|
| -
|
| -bool HttpStreamFactoryImpl::Job::was_npn_negotiated() const {
|
| - return was_npn_negotiated_;
|
| -}
|
| -
|
| -NextProto HttpStreamFactoryImpl::Job::protocol_negotiated() const {
|
| - return protocol_negotiated_;
|
| -}
|
| -
|
| -bool HttpStreamFactoryImpl::Job::using_spdy() const {
|
| - return using_spdy_;
|
| -}
|
| -
|
| -const SSLConfig& HttpStreamFactoryImpl::Job::server_ssl_config() const {
|
| - return server_ssl_config_;
|
| -}
|
| -
|
| -const SSLConfig& HttpStreamFactoryImpl::Job::proxy_ssl_config() const {
|
| - return proxy_ssl_config_;
|
| -}
|
| -
|
| -const ProxyInfo& HttpStreamFactoryImpl::Job::proxy_info() const {
|
| - return proxy_info_;
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::GetSSLInfo() {
|
| - DCHECK(using_ssl_);
|
| - DCHECK(!establishing_tunnel_);
|
| - DCHECK(connection_.get() && connection_->socket());
|
| - SSLClientSocket* ssl_socket =
|
| - static_cast<SSLClientSocket*>(connection_->socket());
|
| - ssl_socket->GetSSLInfo(&ssl_info_);
|
| -}
|
| -
|
| -SpdySessionKey HttpStreamFactoryImpl::Job::GetSpdySessionKey() const {
|
| - // In the case that we're using an HTTPS proxy for an HTTP url,
|
| - // we look for a SPDY session *to* the proxy, instead of to the
|
| - // origin server.
|
| - PrivacyMode privacy_mode = request_info_.privacy_mode;
|
| - if (IsHttpsProxyAndHttpUrl()) {
|
| - return SpdySessionKey(proxy_info_.proxy_server().host_port_pair(),
|
| - ProxyServer::Direct(),
|
| - privacy_mode);
|
| - } else {
|
| - return SpdySessionKey(origin_,
|
| - proxy_info_.proxy_server(),
|
| - privacy_mode);
|
| - }
|
| -}
|
| -
|
| -bool HttpStreamFactoryImpl::Job::CanUseExistingSpdySession() const {
|
| - // We need to make sure that if a spdy session was created for
|
| - // https://somehost/ that we don't use that session for http://somehost:443/.
|
| - // The only time we can use an existing session is if the request URL is
|
| - // https (the normal case) or if we're connection to a SPDY proxy, or
|
| - // if we're running with force_spdy_always_. crbug.com/133176
|
| - // TODO(ricea): Add "wss" back to this list when SPDY WebSocket support is
|
| - // working.
|
| - return request_info_.url.SchemeIs("https") ||
|
| - proxy_info_.proxy_server().is_https() ||
|
| - session_->params().force_spdy_always;
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::OnStreamReadyCallback() {
|
| - DCHECK(stream_.get());
|
| - DCHECK(!IsPreconnecting());
|
| - DCHECK(!stream_factory_->for_websockets_);
|
| - if (IsOrphaned()) {
|
| - stream_factory_->OnOrphanedJobComplete(this);
|
| - } else {
|
| - request_->Complete(was_npn_negotiated(),
|
| - protocol_negotiated(),
|
| - using_spdy(),
|
| - net_log_);
|
| - request_->OnStreamReady(this, server_ssl_config_, proxy_info_,
|
| - stream_.release());
|
| - }
|
| - // |this| may be deleted after this call.
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::OnWebSocketHandshakeStreamReadyCallback() {
|
| - DCHECK(websocket_stream_);
|
| - DCHECK(!IsPreconnecting());
|
| - DCHECK(stream_factory_->for_websockets_);
|
| - // An orphaned WebSocket job will be closed immediately and
|
| - // never be ready.
|
| - DCHECK(!IsOrphaned());
|
| - request_->Complete(was_npn_negotiated(),
|
| - protocol_negotiated(),
|
| - using_spdy(),
|
| - net_log_);
|
| - request_->OnWebSocketHandshakeStreamReady(this,
|
| - server_ssl_config_,
|
| - proxy_info_,
|
| - websocket_stream_.release());
|
| - // |this| may be deleted after this call.
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::OnNewSpdySessionReadyCallback() {
|
| - DCHECK(stream_.get());
|
| - DCHECK(!IsPreconnecting());
|
| - DCHECK(using_spdy());
|
| - // Note: an event loop iteration has passed, so |new_spdy_session_| may be
|
| - // NULL at this point if the SpdySession closed immediately after creation.
|
| - base::WeakPtr<SpdySession> spdy_session = new_spdy_session_;
|
| - new_spdy_session_.reset();
|
| -
|
| - // TODO(jgraettinger): Notify the factory, and let that notify |request_|,
|
| - // rather than notifying |request_| directly.
|
| - if (IsOrphaned()) {
|
| - if (spdy_session) {
|
| - stream_factory_->OnNewSpdySessionReady(
|
| - spdy_session, spdy_session_direct_, server_ssl_config_, proxy_info_,
|
| - was_npn_negotiated(), protocol_negotiated(), using_spdy(), net_log_);
|
| - }
|
| - stream_factory_->OnOrphanedJobComplete(this);
|
| - } else {
|
| - request_->OnNewSpdySessionReady(
|
| - this, stream_.Pass(), spdy_session, spdy_session_direct_);
|
| - }
|
| - // |this| may be deleted after this call.
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::OnStreamFailedCallback(int result) {
|
| - DCHECK(!IsPreconnecting());
|
| - if (IsOrphaned())
|
| - stream_factory_->OnOrphanedJobComplete(this);
|
| - else
|
| - request_->OnStreamFailed(this, result, server_ssl_config_);
|
| - // |this| may be deleted after this call.
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::OnCertificateErrorCallback(
|
| - int result, const SSLInfo& ssl_info) {
|
| - DCHECK(!IsPreconnecting());
|
| - if (IsOrphaned())
|
| - stream_factory_->OnOrphanedJobComplete(this);
|
| - else
|
| - request_->OnCertificateError(this, result, server_ssl_config_, ssl_info);
|
| - // |this| may be deleted after this call.
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::OnNeedsProxyAuthCallback(
|
| - const HttpResponseInfo& response,
|
| - HttpAuthController* auth_controller) {
|
| - DCHECK(!IsPreconnecting());
|
| - if (IsOrphaned())
|
| - stream_factory_->OnOrphanedJobComplete(this);
|
| - else
|
| - request_->OnNeedsProxyAuth(
|
| - this, response, server_ssl_config_, proxy_info_, auth_controller);
|
| - // |this| may be deleted after this call.
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::OnNeedsClientAuthCallback(
|
| - SSLCertRequestInfo* cert_info) {
|
| - DCHECK(!IsPreconnecting());
|
| - if (IsOrphaned())
|
| - stream_factory_->OnOrphanedJobComplete(this);
|
| - else
|
| - request_->OnNeedsClientAuth(this, server_ssl_config_, cert_info);
|
| - // |this| may be deleted after this call.
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::OnHttpsProxyTunnelResponseCallback(
|
| - const HttpResponseInfo& response_info,
|
| - HttpStream* stream) {
|
| - DCHECK(!IsPreconnecting());
|
| - if (IsOrphaned())
|
| - stream_factory_->OnOrphanedJobComplete(this);
|
| - else
|
| - request_->OnHttpsProxyTunnelResponse(
|
| - this, response_info, server_ssl_config_, proxy_info_, stream);
|
| - // |this| may be deleted after this call.
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::OnPreconnectsComplete() {
|
| - DCHECK(!request_);
|
| - if (new_spdy_session_.get()) {
|
| - stream_factory_->OnNewSpdySessionReady(new_spdy_session_,
|
| - spdy_session_direct_,
|
| - server_ssl_config_,
|
| - proxy_info_,
|
| - was_npn_negotiated(),
|
| - protocol_negotiated(),
|
| - using_spdy(),
|
| - net_log_);
|
| - }
|
| - stream_factory_->OnPreconnectsComplete(this);
|
| - // |this| may be deleted after this call.
|
| -}
|
| -
|
| -// static
|
| -int HttpStreamFactoryImpl::Job::OnHostResolution(
|
| - SpdySessionPool* spdy_session_pool,
|
| - const SpdySessionKey& spdy_session_key,
|
| - const AddressList& addresses,
|
| - const BoundNetLog& net_log) {
|
| - // It is OK to dereference spdy_session_pool, because the
|
| - // ClientSocketPoolManager will be destroyed in the same callback that
|
| - // destroys the SpdySessionPool.
|
| - return
|
| - spdy_session_pool->FindAvailableSession(spdy_session_key, net_log) ?
|
| - ERR_SPDY_SESSION_ALREADY_EXISTS : OK;
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::OnIOComplete(int result) {
|
| - // TODO(pkasting): Remove ScopedTracker below once crbug.com/455884 is fixed.
|
| - tracked_objects::ScopedTracker tracking_profile(
|
| - FROM_HERE_WITH_EXPLICIT_FUNCTION(
|
| - "455884 HttpStreamFactoryImpl::Job::OnIOComplete"));
|
| - RunLoop(result);
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::RunLoop(int result) {
|
| - result = DoLoop(result);
|
| -
|
| - if (result == ERR_IO_PENDING)
|
| - return result;
|
| -
|
| - // If there was an error, we should have already resumed the |waiting_job_|,
|
| - // if there was one.
|
| - DCHECK(result == OK || waiting_job_ == NULL);
|
| -
|
| - if (IsPreconnecting()) {
|
| - base::MessageLoop::current()->PostTask(
|
| - FROM_HERE,
|
| - base::Bind(&HttpStreamFactoryImpl::Job::OnPreconnectsComplete,
|
| - ptr_factory_.GetWeakPtr()));
|
| - return ERR_IO_PENDING;
|
| - }
|
| -
|
| - if (IsCertificateError(result)) {
|
| - // Retrieve SSL information from the socket.
|
| - GetSSLInfo();
|
| -
|
| - next_state_ = STATE_WAITING_USER_ACTION;
|
| - base::MessageLoop::current()->PostTask(
|
| - FROM_HERE,
|
| - base::Bind(&HttpStreamFactoryImpl::Job::OnCertificateErrorCallback,
|
| - ptr_factory_.GetWeakPtr(), result, ssl_info_));
|
| - return ERR_IO_PENDING;
|
| - }
|
| -
|
| - switch (result) {
|
| - case ERR_PROXY_AUTH_REQUESTED: {
|
| - UMA_HISTOGRAM_BOOLEAN("Net.ProxyAuthRequested.HasConnection",
|
| - connection_.get() != NULL);
|
| - if (!connection_.get())
|
| - return ERR_PROXY_AUTH_REQUESTED_WITH_NO_CONNECTION;
|
| - CHECK(connection_->socket());
|
| - CHECK(establishing_tunnel_);
|
| -
|
| - next_state_ = STATE_WAITING_USER_ACTION;
|
| - ProxyClientSocket* proxy_socket =
|
| - static_cast<ProxyClientSocket*>(connection_->socket());
|
| - base::MessageLoop::current()->PostTask(
|
| - FROM_HERE,
|
| - base::Bind(&Job::OnNeedsProxyAuthCallback, ptr_factory_.GetWeakPtr(),
|
| - *proxy_socket->GetConnectResponseInfo(),
|
| - proxy_socket->GetAuthController()));
|
| - return ERR_IO_PENDING;
|
| - }
|
| -
|
| - case ERR_SSL_CLIENT_AUTH_CERT_NEEDED:
|
| - base::MessageLoop::current()->PostTask(
|
| - FROM_HERE,
|
| - base::Bind(&Job::OnNeedsClientAuthCallback, ptr_factory_.GetWeakPtr(),
|
| - connection_->ssl_error_response_info().cert_request_info));
|
| - return ERR_IO_PENDING;
|
| -
|
| - case ERR_HTTPS_PROXY_TUNNEL_RESPONSE: {
|
| - DCHECK(connection_.get());
|
| - DCHECK(connection_->socket());
|
| - DCHECK(establishing_tunnel_);
|
| -
|
| - ProxyClientSocket* proxy_socket =
|
| - static_cast<ProxyClientSocket*>(connection_->socket());
|
| - base::MessageLoop::current()->PostTask(
|
| - FROM_HERE,
|
| - base::Bind(&Job::OnHttpsProxyTunnelResponseCallback,
|
| - ptr_factory_.GetWeakPtr(),
|
| - *proxy_socket->GetConnectResponseInfo(),
|
| - proxy_socket->CreateConnectResponseStream()));
|
| - return ERR_IO_PENDING;
|
| - }
|
| -
|
| - case OK:
|
| - job_status_ = STATUS_SUCCEEDED;
|
| - MaybeMarkAlternateProtocolBroken();
|
| - next_state_ = STATE_DONE;
|
| - if (new_spdy_session_.get()) {
|
| - base::MessageLoop::current()->PostTask(
|
| - FROM_HERE,
|
| - base::Bind(&Job::OnNewSpdySessionReadyCallback,
|
| - ptr_factory_.GetWeakPtr()));
|
| - } else if (stream_factory_->for_websockets_) {
|
| - DCHECK(websocket_stream_);
|
| - base::MessageLoop::current()->PostTask(
|
| - FROM_HERE,
|
| - base::Bind(&Job::OnWebSocketHandshakeStreamReadyCallback,
|
| - ptr_factory_.GetWeakPtr()));
|
| - } else {
|
| - DCHECK(stream_.get());
|
| - base::MessageLoop::current()->PostTask(
|
| - FROM_HERE,
|
| - base::Bind(&Job::OnStreamReadyCallback, ptr_factory_.GetWeakPtr()));
|
| - }
|
| - return ERR_IO_PENDING;
|
| -
|
| - default:
|
| - if (job_status_ != STATUS_BROKEN) {
|
| - DCHECK_EQ(STATUS_RUNNING, job_status_);
|
| - job_status_ = STATUS_FAILED;
|
| - MaybeMarkAlternateProtocolBroken();
|
| - }
|
| - base::MessageLoop::current()->PostTask(
|
| - FROM_HERE,
|
| - base::Bind(&Job::OnStreamFailedCallback, ptr_factory_.GetWeakPtr(),
|
| - result));
|
| - return ERR_IO_PENDING;
|
| - }
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::DoLoop(int result) {
|
| - DCHECK_NE(next_state_, STATE_NONE);
|
| - int rv = result;
|
| - do {
|
| - State state = next_state_;
|
| - next_state_ = STATE_NONE;
|
| - switch (state) {
|
| - case STATE_START:
|
| - DCHECK_EQ(OK, rv);
|
| - rv = DoStart();
|
| - break;
|
| - case STATE_RESOLVE_PROXY:
|
| - DCHECK_EQ(OK, rv);
|
| - rv = DoResolveProxy();
|
| - break;
|
| - case STATE_RESOLVE_PROXY_COMPLETE:
|
| - rv = DoResolveProxyComplete(rv);
|
| - break;
|
| - case STATE_WAIT_FOR_JOB:
|
| - DCHECK_EQ(OK, rv);
|
| - rv = DoWaitForJob();
|
| - break;
|
| - case STATE_WAIT_FOR_JOB_COMPLETE:
|
| - rv = DoWaitForJobComplete(rv);
|
| - break;
|
| - case STATE_INIT_CONNECTION:
|
| - DCHECK_EQ(OK, rv);
|
| - rv = DoInitConnection();
|
| - break;
|
| - case STATE_INIT_CONNECTION_COMPLETE:
|
| - rv = DoInitConnectionComplete(rv);
|
| - break;
|
| - case STATE_WAITING_USER_ACTION:
|
| - rv = DoWaitingUserAction(rv);
|
| - break;
|
| - case STATE_RESTART_TUNNEL_AUTH:
|
| - DCHECK_EQ(OK, rv);
|
| - rv = DoRestartTunnelAuth();
|
| - break;
|
| - case STATE_RESTART_TUNNEL_AUTH_COMPLETE:
|
| - rv = DoRestartTunnelAuthComplete(rv);
|
| - break;
|
| - case STATE_CREATE_STREAM:
|
| - DCHECK_EQ(OK, rv);
|
| - rv = DoCreateStream();
|
| - break;
|
| - case STATE_CREATE_STREAM_COMPLETE:
|
| - rv = DoCreateStreamComplete(rv);
|
| - break;
|
| - default:
|
| - NOTREACHED() << "bad state";
|
| - rv = ERR_FAILED;
|
| - break;
|
| - }
|
| - } while (rv != ERR_IO_PENDING && next_state_ != STATE_NONE);
|
| - return rv;
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::StartInternal() {
|
| - CHECK_EQ(STATE_NONE, next_state_);
|
| - next_state_ = STATE_START;
|
| - int rv = RunLoop(OK);
|
| - DCHECK_EQ(ERR_IO_PENDING, rv);
|
| - return rv;
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::DoStart() {
|
| - origin_ = HostPortPair::FromURL(request_info_.url);
|
| - origin_url_ = stream_factory_->ApplyHostMappingRules(
|
| - request_info_.url, &origin_);
|
| -
|
| - net_log_.BeginEvent(NetLog::TYPE_HTTP_STREAM_JOB,
|
| - base::Bind(&NetLogHttpStreamJobCallback,
|
| - &request_info_.url, &origin_url_,
|
| - priority_));
|
| -
|
| - // Don't connect to restricted ports.
|
| - bool is_port_allowed = IsPortAllowedByDefault(origin_.port());
|
| - if (request_info_.url.SchemeIs("ftp")) {
|
| - // Never share connection with other jobs for FTP requests.
|
| - DCHECK(!waiting_job_);
|
| -
|
| - is_port_allowed = IsPortAllowedByFtp(origin_.port());
|
| - }
|
| - if (!is_port_allowed && !IsPortAllowedByOverride(origin_.port())) {
|
| - if (waiting_job_) {
|
| - waiting_job_->Resume(this);
|
| - waiting_job_ = NULL;
|
| - }
|
| - return ERR_UNSAFE_PORT;
|
| - }
|
| -
|
| - next_state_ = STATE_RESOLVE_PROXY;
|
| - return OK;
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::DoResolveProxy() {
|
| - DCHECK(!pac_request_);
|
| - DCHECK(session_);
|
| -
|
| - next_state_ = STATE_RESOLVE_PROXY_COMPLETE;
|
| -
|
| - if (request_info_.load_flags & LOAD_BYPASS_PROXY) {
|
| - proxy_info_.UseDirect();
|
| - return OK;
|
| - }
|
| -
|
| - return session_->proxy_service()->ResolveProxy(
|
| - request_info_.url, request_info_.load_flags, &proxy_info_, io_callback_,
|
| - &pac_request_, session_->network_delegate(), net_log_);
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::DoResolveProxyComplete(int result) {
|
| - pac_request_ = NULL;
|
| -
|
| - if (result == OK) {
|
| - // Remove unsupported proxies from the list.
|
| - proxy_info_.RemoveProxiesWithoutScheme(
|
| - ProxyServer::SCHEME_DIRECT | ProxyServer::SCHEME_QUIC |
|
| - ProxyServer::SCHEME_HTTP | ProxyServer::SCHEME_HTTPS |
|
| - ProxyServer::SCHEME_SOCKS4 | ProxyServer::SCHEME_SOCKS5);
|
| -
|
| - if (proxy_info_.is_empty()) {
|
| - // No proxies/direct to choose from. This happens when we don't support
|
| - // any of the proxies in the returned list.
|
| - result = ERR_NO_SUPPORTED_PROXIES;
|
| - } else if (using_quic_ &&
|
| - (!proxy_info_.is_quic() && !proxy_info_.is_direct())) {
|
| - // QUIC can not be spoken to non-QUIC proxies. This error should not be
|
| - // user visible, because the non-alternate job should be resumed.
|
| - result = ERR_NO_SUPPORTED_PROXIES;
|
| - }
|
| - }
|
| -
|
| - if (result != OK) {
|
| - if (waiting_job_) {
|
| - waiting_job_->Resume(this);
|
| - waiting_job_ = NULL;
|
| - }
|
| - return result;
|
| - }
|
| -
|
| - if (blocking_job_)
|
| - next_state_ = STATE_WAIT_FOR_JOB;
|
| - else
|
| - next_state_ = STATE_INIT_CONNECTION;
|
| - return OK;
|
| -}
|
| -
|
| -bool HttpStreamFactoryImpl::Job::ShouldForceSpdySSL() const {
|
| - bool rv = session_->params().force_spdy_always &&
|
| - session_->params().force_spdy_over_ssl;
|
| - return rv && !session_->HasSpdyExclusion(origin_);
|
| -}
|
| -
|
| -bool HttpStreamFactoryImpl::Job::ShouldForceSpdyWithoutSSL() const {
|
| - bool rv = session_->params().force_spdy_always &&
|
| - !session_->params().force_spdy_over_ssl;
|
| - return rv && !session_->HasSpdyExclusion(origin_);
|
| -}
|
| -
|
| -bool HttpStreamFactoryImpl::Job::ShouldForceQuic() const {
|
| - return session_->params().enable_quic &&
|
| - session_->params().origin_to_force_quic_on.Equals(origin_) &&
|
| - proxy_info_.is_direct();
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::DoWaitForJob() {
|
| - DCHECK(blocking_job_);
|
| - next_state_ = STATE_WAIT_FOR_JOB_COMPLETE;
|
| - return ERR_IO_PENDING;
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::DoWaitForJobComplete(int result) {
|
| - DCHECK(!blocking_job_);
|
| - DCHECK_EQ(OK, result);
|
| - next_state_ = STATE_INIT_CONNECTION;
|
| - return OK;
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::DoInitConnection() {
|
| - DCHECK(!blocking_job_);
|
| - DCHECK(!connection_->is_initialized());
|
| - DCHECK(proxy_info_.proxy_server().is_valid());
|
| - next_state_ = STATE_INIT_CONNECTION_COMPLETE;
|
| -
|
| - using_ssl_ = request_info_.url.SchemeIs("https") ||
|
| - request_info_.url.SchemeIs("wss") || ShouldForceSpdySSL();
|
| - using_spdy_ = false;
|
| -
|
| - if (ShouldForceQuic())
|
| - using_quic_ = true;
|
| -
|
| - if (proxy_info_.is_quic())
|
| - using_quic_ = true;
|
| -
|
| - if (using_quic_) {
|
| - DCHECK(session_->params().enable_quic);
|
| - if (proxy_info_.is_quic() && !request_info_.url.SchemeIs("http")) {
|
| - NOTREACHED();
|
| - // TODO(rch): support QUIC proxies for HTTPS urls.
|
| - return ERR_NOT_IMPLEMENTED;
|
| - }
|
| - HostPortPair destination = proxy_info_.is_quic() ?
|
| - proxy_info_.proxy_server().host_port_pair() : origin_;
|
| - next_state_ = STATE_INIT_CONNECTION_COMPLETE;
|
| - bool secure_quic = using_ssl_ || proxy_info_.is_quic();
|
| - int rv = quic_request_.Request(
|
| - destination, secure_quic, request_info_.privacy_mode,
|
| - request_info_.method, net_log_, io_callback_);
|
| - if (rv == OK) {
|
| - using_existing_quic_session_ = true;
|
| - } else {
|
| - // OK, there's no available QUIC session. Let |waiting_job_| resume
|
| - // if it's paused.
|
| - if (waiting_job_) {
|
| - waiting_job_->Resume(this);
|
| - waiting_job_ = NULL;
|
| - }
|
| - }
|
| - return rv;
|
| - }
|
| -
|
| - // Check first if we have a spdy session for this group. If so, then go
|
| - // straight to using that.
|
| - SpdySessionKey spdy_session_key = GetSpdySessionKey();
|
| - base::WeakPtr<SpdySession> spdy_session =
|
| - session_->spdy_session_pool()->FindAvailableSession(
|
| - spdy_session_key, net_log_);
|
| - if (spdy_session && CanUseExistingSpdySession()) {
|
| - // If we're preconnecting, but we already have a SpdySession, we don't
|
| - // actually need to preconnect any sockets, so we're done.
|
| - if (IsPreconnecting())
|
| - return OK;
|
| - using_spdy_ = true;
|
| - next_state_ = STATE_CREATE_STREAM;
|
| - existing_spdy_session_ = spdy_session;
|
| - return OK;
|
| - } else if (request_ && !request_->HasSpdySessionKey() &&
|
| - (using_ssl_ || ShouldForceSpdyWithoutSSL())) {
|
| - // Update the spdy session key for the request that launched this job.
|
| - request_->SetSpdySessionKey(spdy_session_key);
|
| - }
|
| -
|
| - // OK, there's no available SPDY session. Let |waiting_job_| resume if it's
|
| - // paused.
|
| -
|
| - if (waiting_job_) {
|
| - waiting_job_->Resume(this);
|
| - waiting_job_ = NULL;
|
| - }
|
| -
|
| - if (proxy_info_.is_http() || proxy_info_.is_https())
|
| - establishing_tunnel_ = using_ssl_;
|
| -
|
| - bool want_spdy_over_npn = original_url_ != NULL;
|
| -
|
| - if (proxy_info_.is_https()) {
|
| - InitSSLConfig(proxy_info_.proxy_server().host_port_pair(),
|
| - &proxy_ssl_config_,
|
| - true /* is a proxy server */);
|
| - // Disable revocation checking for HTTPS proxies since the revocation
|
| - // requests are probably going to need to go through the proxy too.
|
| - proxy_ssl_config_.rev_checking_enabled = false;
|
| - }
|
| - if (using_ssl_) {
|
| - InitSSLConfig(origin_, &server_ssl_config_,
|
| - false /* not a proxy server */);
|
| - }
|
| -
|
| - base::WeakPtr<HttpServerProperties> http_server_properties =
|
| - session_->http_server_properties();
|
| - if (http_server_properties) {
|
| - http_server_properties->MaybeForceHTTP11(origin_, &server_ssl_config_);
|
| - if (proxy_info_.is_http() || proxy_info_.is_https()) {
|
| - http_server_properties->MaybeForceHTTP11(
|
| - proxy_info_.proxy_server().host_port_pair(), &proxy_ssl_config_);
|
| - }
|
| - }
|
| -
|
| - if (IsPreconnecting()) {
|
| - DCHECK(!stream_factory_->for_websockets_);
|
| - return PreconnectSocketsForHttpRequest(
|
| - origin_url_,
|
| - request_info_.extra_headers,
|
| - request_info_.load_flags,
|
| - priority_,
|
| - session_,
|
| - proxy_info_,
|
| - ShouldForceSpdySSL(),
|
| - want_spdy_over_npn,
|
| - server_ssl_config_,
|
| - proxy_ssl_config_,
|
| - request_info_.privacy_mode,
|
| - net_log_,
|
| - num_streams_);
|
| - }
|
| -
|
| - // If we can't use a SPDY session, don't both checking for one after
|
| - // the hostname is resolved.
|
| - OnHostResolutionCallback resolution_callback = CanUseExistingSpdySession() ?
|
| - base::Bind(&Job::OnHostResolution, session_->spdy_session_pool(),
|
| - GetSpdySessionKey()) :
|
| - OnHostResolutionCallback();
|
| - if (stream_factory_->for_websockets_) {
|
| - // TODO(ricea): Re-enable NPN when WebSockets over SPDY is supported.
|
| - SSLConfig websocket_server_ssl_config = server_ssl_config_;
|
| - websocket_server_ssl_config.next_protos.clear();
|
| - return InitSocketHandleForWebSocketRequest(
|
| - origin_url_, request_info_.extra_headers, request_info_.load_flags,
|
| - priority_, session_, proxy_info_, ShouldForceSpdySSL(),
|
| - want_spdy_over_npn, websocket_server_ssl_config, proxy_ssl_config_,
|
| - request_info_.privacy_mode, net_log_,
|
| - connection_.get(), resolution_callback, io_callback_);
|
| - }
|
| -
|
| - return InitSocketHandleForHttpRequest(
|
| - origin_url_, request_info_.extra_headers, request_info_.load_flags,
|
| - priority_, session_, proxy_info_, ShouldForceSpdySSL(),
|
| - want_spdy_over_npn, server_ssl_config_, proxy_ssl_config_,
|
| - request_info_.privacy_mode, net_log_,
|
| - connection_.get(), resolution_callback, io_callback_);
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::DoInitConnectionComplete(int result) {
|
| - if (IsPreconnecting()) {
|
| - if (using_quic_)
|
| - return result;
|
| - DCHECK_EQ(OK, result);
|
| - return OK;
|
| - }
|
| -
|
| - if (result == ERR_SPDY_SESSION_ALREADY_EXISTS) {
|
| - // We found a SPDY connection after resolving the host. This is
|
| - // probably an IP pooled connection.
|
| - SpdySessionKey spdy_session_key = GetSpdySessionKey();
|
| - existing_spdy_session_ =
|
| - session_->spdy_session_pool()->FindAvailableSession(
|
| - spdy_session_key, net_log_);
|
| - if (existing_spdy_session_) {
|
| - using_spdy_ = true;
|
| - next_state_ = STATE_CREATE_STREAM;
|
| - } else {
|
| - // It is possible that the spdy session no longer exists.
|
| - ReturnToStateInitConnection(true /* close connection */);
|
| - }
|
| - return OK;
|
| - }
|
| -
|
| - // TODO(willchan): Make this a bit more exact. Maybe there are recoverable
|
| - // errors, such as ignoring certificate errors for Alternate-Protocol.
|
| - if (result < 0 && waiting_job_) {
|
| - waiting_job_->Resume(this);
|
| - waiting_job_ = NULL;
|
| - }
|
| -
|
| - // |result| may be the result of any of the stacked pools. The following
|
| - // logic is used when determining how to interpret an error.
|
| - // If |result| < 0:
|
| - // and connection_->socket() != NULL, then the SSL handshake ran and it
|
| - // is a potentially recoverable error.
|
| - // and connection_->socket == NULL and connection_->is_ssl_error() is true,
|
| - // then the SSL handshake ran with an unrecoverable error.
|
| - // otherwise, the error came from one of the other pools.
|
| - bool ssl_started = using_ssl_ && (result == OK || connection_->socket() ||
|
| - connection_->is_ssl_error());
|
| -
|
| - if (ssl_started && (result == OK || IsCertificateError(result))) {
|
| - if (using_quic_ && result == OK) {
|
| - was_npn_negotiated_ = true;
|
| - NextProto protocol_negotiated =
|
| - SSLClientSocket::NextProtoFromString("quic/1+spdy/3");
|
| - protocol_negotiated_ = protocol_negotiated;
|
| - } else {
|
| - SSLClientSocket* ssl_socket =
|
| - static_cast<SSLClientSocket*>(connection_->socket());
|
| - if (ssl_socket->WasNpnNegotiated()) {
|
| - was_npn_negotiated_ = true;
|
| - std::string proto;
|
| - SSLClientSocket::NextProtoStatus status =
|
| - ssl_socket->GetNextProto(&proto);
|
| - NextProto protocol_negotiated =
|
| - SSLClientSocket::NextProtoFromString(proto);
|
| - protocol_negotiated_ = protocol_negotiated;
|
| - net_log_.AddEvent(
|
| - NetLog::TYPE_HTTP_STREAM_REQUEST_PROTO,
|
| - base::Bind(&NetLogHttpStreamProtoCallback,
|
| - status, &proto));
|
| - if (ssl_socket->was_spdy_negotiated())
|
| - SwitchToSpdyMode();
|
| - }
|
| - if (ShouldForceSpdySSL())
|
| - SwitchToSpdyMode();
|
| - }
|
| - } else if (proxy_info_.is_https() && connection_->socket() &&
|
| - result == OK) {
|
| - ProxyClientSocket* proxy_socket =
|
| - static_cast<ProxyClientSocket*>(connection_->socket());
|
| - if (proxy_socket->IsUsingSpdy()) {
|
| - was_npn_negotiated_ = true;
|
| - protocol_negotiated_ = proxy_socket->GetProtocolNegotiated();
|
| - SwitchToSpdyMode();
|
| - }
|
| - }
|
| -
|
| - // We may be using spdy without SSL
|
| - if (ShouldForceSpdyWithoutSSL())
|
| - SwitchToSpdyMode();
|
| -
|
| - if (result == ERR_PROXY_AUTH_REQUESTED ||
|
| - result == ERR_HTTPS_PROXY_TUNNEL_RESPONSE) {
|
| - DCHECK(!ssl_started);
|
| - // Other state (i.e. |using_ssl_|) suggests that |connection_| will have an
|
| - // SSL socket, but there was an error before that could happen. This
|
| - // puts the in progress HttpProxy socket into |connection_| in order to
|
| - // complete the auth (or read the response body). The tunnel restart code
|
| - // is careful to remove it before returning control to the rest of this
|
| - // class.
|
| - connection_.reset(connection_->release_pending_http_proxy_connection());
|
| - return result;
|
| - }
|
| -
|
| - if (!ssl_started && result < 0 && original_url_.get()) {
|
| - job_status_ = STATUS_BROKEN;
|
| - MaybeMarkAlternateProtocolBroken();
|
| - return result;
|
| - }
|
| -
|
| - if (using_quic_) {
|
| - if (result < 0) {
|
| - job_status_ = STATUS_BROKEN;
|
| - MaybeMarkAlternateProtocolBroken();
|
| - return result;
|
| - }
|
| - stream_ = quic_request_.ReleaseStream();
|
| - next_state_ = STATE_NONE;
|
| - return OK;
|
| - }
|
| -
|
| - if (result < 0 && !ssl_started)
|
| - return ReconsiderProxyAfterError(result);
|
| - establishing_tunnel_ = false;
|
| -
|
| - if (connection_->socket()) {
|
| - LogHttpConnectedMetrics(*connection_);
|
| -
|
| - // We officially have a new connection. Record the type.
|
| - if (!connection_->is_reused()) {
|
| - ConnectionType type = using_spdy_ ? CONNECTION_SPDY : CONNECTION_HTTP;
|
| - UpdateConnectionTypeHistograms(type);
|
| - }
|
| - }
|
| -
|
| - // Handle SSL errors below.
|
| - if (using_ssl_) {
|
| - DCHECK(ssl_started);
|
| - if (IsCertificateError(result)) {
|
| - if (using_spdy_ && original_url_.get() &&
|
| - original_url_->SchemeIs("http")) {
|
| - // We ignore certificate errors for http over spdy.
|
| - spdy_certificate_error_ = result;
|
| - result = OK;
|
| - } else {
|
| - result = HandleCertificateError(result);
|
| - if (result == OK && !connection_->socket()->IsConnectedAndIdle()) {
|
| - ReturnToStateInitConnection(true /* close connection */);
|
| - return result;
|
| - }
|
| - }
|
| - }
|
| - if (result < 0)
|
| - return result;
|
| - }
|
| -
|
| - next_state_ = STATE_CREATE_STREAM;
|
| - return OK;
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::DoWaitingUserAction(int result) {
|
| - // This state indicates that the stream request is in a partially
|
| - // completed state, and we've called back to the delegate for more
|
| - // information.
|
| -
|
| - // We're always waiting here for the delegate to call us back.
|
| - return ERR_IO_PENDING;
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::SetSpdyHttpStream(
|
| - base::WeakPtr<SpdySession> session, bool direct) {
|
| - // TODO(ricea): Restore the code for WebSockets over SPDY once it's
|
| - // implemented.
|
| - if (stream_factory_->for_websockets_)
|
| - return ERR_NOT_IMPLEMENTED;
|
| -
|
| - // TODO(willchan): Delete this code, because eventually, the
|
| - // HttpStreamFactoryImpl will be creating all the SpdyHttpStreams, since it
|
| - // will know when SpdySessions become available.
|
| -
|
| - bool use_relative_url = direct || request_info_.url.SchemeIs("https");
|
| - stream_.reset(new SpdyHttpStream(session, use_relative_url));
|
| - return OK;
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::DoCreateStream() {
|
| - DCHECK(connection_->socket() || existing_spdy_session_.get() || using_quic_);
|
| -
|
| - next_state_ = STATE_CREATE_STREAM_COMPLETE;
|
| -
|
| - // We only set the socket motivation if we're the first to use
|
| - // this socket. Is there a race for two SPDY requests? We really
|
| - // need to plumb this through to the connect level.
|
| - if (connection_->socket() && !connection_->is_reused())
|
| - SetSocketMotivation();
|
| -
|
| - if (!using_spdy_) {
|
| - // We may get ftp scheme when fetching ftp resources through proxy.
|
| - bool using_proxy = (proxy_info_.is_http() || proxy_info_.is_https()) &&
|
| - (request_info_.url.SchemeIs("http") ||
|
| - request_info_.url.SchemeIs("ftp"));
|
| - if (stream_factory_->for_websockets_) {
|
| - DCHECK(request_);
|
| - DCHECK(request_->websocket_handshake_stream_create_helper());
|
| - websocket_stream_.reset(
|
| - request_->websocket_handshake_stream_create_helper()
|
| - ->CreateBasicStream(connection_.Pass(), using_proxy));
|
| - } else {
|
| - stream_.reset(new HttpBasicStream(connection_.release(), using_proxy));
|
| - }
|
| - return OK;
|
| - }
|
| -
|
| - CHECK(!stream_.get());
|
| -
|
| - bool direct = true;
|
| - const ProxyServer& proxy_server = proxy_info_.proxy_server();
|
| - PrivacyMode privacy_mode = request_info_.privacy_mode;
|
| - if (IsHttpsProxyAndHttpUrl())
|
| - direct = false;
|
| -
|
| - if (existing_spdy_session_.get()) {
|
| - // We picked up an existing session, so we don't need our socket.
|
| - if (connection_->socket())
|
| - connection_->socket()->Disconnect();
|
| - connection_->Reset();
|
| -
|
| - int set_result = SetSpdyHttpStream(existing_spdy_session_, direct);
|
| - existing_spdy_session_.reset();
|
| - return set_result;
|
| - }
|
| -
|
| - SpdySessionKey spdy_session_key(origin_, proxy_server, privacy_mode);
|
| - if (IsHttpsProxyAndHttpUrl()) {
|
| - // If we don't have a direct SPDY session, and we're using an HTTPS
|
| - // proxy, then we might have a SPDY session to the proxy.
|
| - // We never use privacy mode for connection to proxy server.
|
| - spdy_session_key = SpdySessionKey(proxy_server.host_port_pair(),
|
| - ProxyServer::Direct(),
|
| - PRIVACY_MODE_DISABLED);
|
| - }
|
| -
|
| - SpdySessionPool* spdy_pool = session_->spdy_session_pool();
|
| - base::WeakPtr<SpdySession> spdy_session =
|
| - spdy_pool->FindAvailableSession(spdy_session_key, net_log_);
|
| -
|
| - if (spdy_session) {
|
| - return SetSpdyHttpStream(spdy_session, direct);
|
| - }
|
| -
|
| - spdy_session =
|
| - spdy_pool->CreateAvailableSessionFromSocket(spdy_session_key,
|
| - connection_.Pass(),
|
| - net_log_,
|
| - spdy_certificate_error_,
|
| - using_ssl_);
|
| - if (!spdy_session->HasAcceptableTransportSecurity()) {
|
| - spdy_session->CloseSessionOnError(
|
| - ERR_SPDY_INADEQUATE_TRANSPORT_SECURITY, "");
|
| - return ERR_SPDY_INADEQUATE_TRANSPORT_SECURITY;
|
| - }
|
| -
|
| - new_spdy_session_ = spdy_session;
|
| - spdy_session_direct_ = direct;
|
| - const HostPortPair& host_port_pair = spdy_session_key.host_port_pair();
|
| - base::WeakPtr<HttpServerProperties> http_server_properties =
|
| - session_->http_server_properties();
|
| - if (http_server_properties)
|
| - http_server_properties->SetSupportsSpdy(host_port_pair, true);
|
| -
|
| - // Create a SpdyHttpStream attached to the session;
|
| - // OnNewSpdySessionReadyCallback is not called until an event loop
|
| - // iteration later, so if the SpdySession is closed between then, allow
|
| - // reuse state from the underlying socket, sampled by SpdyHttpStream,
|
| - // bubble up to the request.
|
| - return SetSpdyHttpStream(new_spdy_session_, spdy_session_direct_);
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::DoCreateStreamComplete(int result) {
|
| - if (result < 0)
|
| - return result;
|
| -
|
| - session_->proxy_service()->ReportSuccess(proxy_info_,
|
| - session_->network_delegate());
|
| - next_state_ = STATE_NONE;
|
| - return OK;
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::DoRestartTunnelAuth() {
|
| - next_state_ = STATE_RESTART_TUNNEL_AUTH_COMPLETE;
|
| - ProxyClientSocket* proxy_socket =
|
| - static_cast<ProxyClientSocket*>(connection_->socket());
|
| - return proxy_socket->RestartWithAuth(io_callback_);
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::DoRestartTunnelAuthComplete(int result) {
|
| - if (result == ERR_PROXY_AUTH_REQUESTED)
|
| - return result;
|
| -
|
| - if (result == OK) {
|
| - // Now that we've got the HttpProxyClientSocket connected. We have
|
| - // to release it as an idle socket into the pool and start the connection
|
| - // process from the beginning. Trying to pass it in with the
|
| - // SSLSocketParams might cause a deadlock since params are dispatched
|
| - // interchangeably. This request won't necessarily get this http proxy
|
| - // socket, but there will be forward progress.
|
| - establishing_tunnel_ = false;
|
| - ReturnToStateInitConnection(false /* do not close connection */);
|
| - return OK;
|
| - }
|
| -
|
| - return ReconsiderProxyAfterError(result);
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::ReturnToStateInitConnection(
|
| - bool close_connection) {
|
| - if (close_connection && connection_->socket())
|
| - connection_->socket()->Disconnect();
|
| - connection_->Reset();
|
| -
|
| - if (request_)
|
| - request_->RemoveRequestFromSpdySessionRequestMap();
|
| -
|
| - next_state_ = STATE_INIT_CONNECTION;
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::SetSocketMotivation() {
|
| - if (request_info_.motivation == HttpRequestInfo::PRECONNECT_MOTIVATED)
|
| - connection_->socket()->SetSubresourceSpeculation();
|
| - else if (request_info_.motivation == HttpRequestInfo::OMNIBOX_MOTIVATED)
|
| - connection_->socket()->SetOmniboxSpeculation();
|
| - // TODO(mbelshe): Add other motivations (like EARLY_LOAD_MOTIVATED).
|
| -}
|
| -
|
| -bool HttpStreamFactoryImpl::Job::IsHttpsProxyAndHttpUrl() const {
|
| - if (!proxy_info_.is_https())
|
| - return false;
|
| - if (original_url_.get()) {
|
| - // We currently only support Alternate-Protocol where the original scheme
|
| - // is http.
|
| - DCHECK(original_url_->SchemeIs("http"));
|
| - return original_url_->SchemeIs("http");
|
| - }
|
| - return request_info_.url.SchemeIs("http");
|
| -}
|
| -
|
| -// Sets several fields of ssl_config for the given origin_server based on the
|
| -// proxy info and other factors.
|
| -void HttpStreamFactoryImpl::Job::InitSSLConfig(
|
| - const HostPortPair& origin_server,
|
| - SSLConfig* ssl_config,
|
| - bool is_proxy) const {
|
| - if (proxy_info_.is_https() && ssl_config->send_client_cert) {
|
| - // When connecting through an HTTPS proxy, disable TLS False Start so
|
| - // that client authentication errors can be distinguished between those
|
| - // originating from the proxy server (ERR_PROXY_CONNECTION_FAILED) and
|
| - // those originating from the endpoint (ERR_SSL_PROTOCOL_ERROR /
|
| - // ERR_BAD_SSL_CLIENT_AUTH_CERT).
|
| - // TODO(rch): This assumes that the HTTPS proxy will only request a
|
| - // client certificate during the initial handshake.
|
| - // http://crbug.com/59292
|
| - ssl_config->false_start_enabled = false;
|
| - }
|
| -
|
| - enum {
|
| - FALLBACK_NONE = 0, // SSL version fallback did not occur.
|
| - FALLBACK_SSL3 = 1, // Fell back to SSL 3.0.
|
| - FALLBACK_TLS1 = 2, // Fell back to TLS 1.0.
|
| - FALLBACK_TLS1_1 = 3, // Fell back to TLS 1.1.
|
| - FALLBACK_MAX
|
| - };
|
| -
|
| - int fallback = FALLBACK_NONE;
|
| - if (ssl_config->version_fallback) {
|
| - switch (ssl_config->version_max) {
|
| - case SSL_PROTOCOL_VERSION_SSL3:
|
| - fallback = FALLBACK_SSL3;
|
| - break;
|
| - case SSL_PROTOCOL_VERSION_TLS1:
|
| - fallback = FALLBACK_TLS1;
|
| - break;
|
| - case SSL_PROTOCOL_VERSION_TLS1_1:
|
| - fallback = FALLBACK_TLS1_1;
|
| - break;
|
| - }
|
| - }
|
| - UMA_HISTOGRAM_ENUMERATION("Net.ConnectionUsedSSLVersionFallback",
|
| - fallback, FALLBACK_MAX);
|
| -
|
| - // We also wish to measure the amount of fallback connections for a host that
|
| - // we know implements TLS up to 1.2. Ideally there would be no fallback here
|
| - // but high numbers of SSLv3 would suggest that SSLv3 fallback is being
|
| - // caused by network middleware rather than buggy HTTPS servers.
|
| - const std::string& host = origin_server.host();
|
| - if (!is_proxy &&
|
| - host.size() >= 10 &&
|
| - host.compare(host.size() - 10, 10, "google.com") == 0 &&
|
| - (host.size() == 10 || host[host.size()-11] == '.')) {
|
| - UMA_HISTOGRAM_ENUMERATION("Net.GoogleConnectionUsedSSLVersionFallback",
|
| - fallback, FALLBACK_MAX);
|
| - }
|
| -
|
| - if (request_info_.load_flags & LOAD_VERIFY_EV_CERT)
|
| - ssl_config->verify_ev_cert = true;
|
| -
|
| - // Disable Channel ID if privacy mode is enabled.
|
| - if (request_info_.privacy_mode == PRIVACY_MODE_ENABLED)
|
| - ssl_config->channel_id_enabled = false;
|
| -}
|
| -
|
| -
|
| -int HttpStreamFactoryImpl::Job::ReconsiderProxyAfterError(int error) {
|
| - DCHECK(!pac_request_);
|
| - DCHECK(session_);
|
| -
|
| - // A failure to resolve the hostname or any error related to establishing a
|
| - // TCP connection could be grounds for trying a new proxy configuration.
|
| - //
|
| - // Why do this when a hostname cannot be resolved? Some URLs only make sense
|
| - // to proxy servers. The hostname in those URLs might fail to resolve if we
|
| - // are still using a non-proxy config. We need to check if a proxy config
|
| - // now exists that corresponds to a proxy server that could load the URL.
|
| - //
|
| - switch (error) {
|
| - case ERR_PROXY_CONNECTION_FAILED:
|
| - case ERR_NAME_NOT_RESOLVED:
|
| - case ERR_INTERNET_DISCONNECTED:
|
| - case ERR_ADDRESS_UNREACHABLE:
|
| - case ERR_CONNECTION_CLOSED:
|
| - case ERR_CONNECTION_TIMED_OUT:
|
| - case ERR_CONNECTION_RESET:
|
| - case ERR_CONNECTION_REFUSED:
|
| - case ERR_CONNECTION_ABORTED:
|
| - case ERR_TIMED_OUT:
|
| - case ERR_TUNNEL_CONNECTION_FAILED:
|
| - case ERR_SOCKS_CONNECTION_FAILED:
|
| - // This can happen in the case of trying to talk to a proxy using SSL, and
|
| - // ending up talking to a captive portal that supports SSL instead.
|
| - case ERR_PROXY_CERTIFICATE_INVALID:
|
| - // This can happen when trying to talk SSL to a non-SSL server (Like a
|
| - // captive portal).
|
| - case ERR_SSL_PROTOCOL_ERROR:
|
| - break;
|
| - case ERR_SOCKS_CONNECTION_HOST_UNREACHABLE:
|
| - // Remap the SOCKS-specific "host unreachable" error to a more
|
| - // generic error code (this way consumers like the link doctor
|
| - // know to substitute their error page).
|
| - //
|
| - // Note that if the host resolving was done by the SOCKS5 proxy, we can't
|
| - // differentiate between a proxy-side "host not found" versus a proxy-side
|
| - // "address unreachable" error, and will report both of these failures as
|
| - // ERR_ADDRESS_UNREACHABLE.
|
| - return ERR_ADDRESS_UNREACHABLE;
|
| - default:
|
| - return error;
|
| - }
|
| -
|
| - if (request_info_.load_flags & LOAD_BYPASS_PROXY) {
|
| - return error;
|
| - }
|
| -
|
| - if (proxy_info_.is_https() && proxy_ssl_config_.send_client_cert) {
|
| - session_->ssl_client_auth_cache()->Remove(
|
| - proxy_info_.proxy_server().host_port_pair());
|
| - }
|
| -
|
| - int rv = session_->proxy_service()->ReconsiderProxyAfterError(
|
| - request_info_.url, request_info_.load_flags, error, &proxy_info_,
|
| - io_callback_, &pac_request_, session_->network_delegate(), net_log_);
|
| - if (rv == OK || rv == ERR_IO_PENDING) {
|
| - // If the error was during connection setup, there is no socket to
|
| - // disconnect.
|
| - if (connection_->socket())
|
| - connection_->socket()->Disconnect();
|
| - connection_->Reset();
|
| - if (request_)
|
| - request_->RemoveRequestFromSpdySessionRequestMap();
|
| - next_state_ = STATE_RESOLVE_PROXY_COMPLETE;
|
| - } else {
|
| - // If ReconsiderProxyAfterError() failed synchronously, it means
|
| - // there was nothing left to fall-back to, so fail the transaction
|
| - // with the last connection error we got.
|
| - // TODO(eroman): This is a confusing contract, make it more obvious.
|
| - rv = error;
|
| - }
|
| -
|
| - return rv;
|
| -}
|
| -
|
| -int HttpStreamFactoryImpl::Job::HandleCertificateError(int error) {
|
| - DCHECK(using_ssl_);
|
| - DCHECK(IsCertificateError(error));
|
| -
|
| - SSLClientSocket* ssl_socket =
|
| - static_cast<SSLClientSocket*>(connection_->socket());
|
| - ssl_socket->GetSSLInfo(&ssl_info_);
|
| -
|
| - // Add the bad certificate to the set of allowed certificates in the
|
| - // SSL config object. This data structure will be consulted after calling
|
| - // RestartIgnoringLastError(). And the user will be asked interactively
|
| - // before RestartIgnoringLastError() is ever called.
|
| - SSLConfig::CertAndStatus bad_cert;
|
| -
|
| - // |ssl_info_.cert| may be NULL if we failed to create
|
| - // X509Certificate for whatever reason, but normally it shouldn't
|
| - // happen, unless this code is used inside sandbox.
|
| - if (ssl_info_.cert.get() == NULL ||
|
| - !X509Certificate::GetDEREncoded(ssl_info_.cert->os_cert_handle(),
|
| - &bad_cert.der_cert)) {
|
| - return error;
|
| - }
|
| - bad_cert.cert_status = ssl_info_.cert_status;
|
| - server_ssl_config_.allowed_bad_certs.push_back(bad_cert);
|
| -
|
| - int load_flags = request_info_.load_flags;
|
| - if (session_->params().ignore_certificate_errors)
|
| - load_flags |= LOAD_IGNORE_ALL_CERT_ERRORS;
|
| - if (ssl_socket->IgnoreCertError(error, load_flags))
|
| - return OK;
|
| - return error;
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::SwitchToSpdyMode() {
|
| - if (HttpStreamFactory::spdy_enabled())
|
| - using_spdy_ = true;
|
| -}
|
| -
|
| -// static
|
| -void HttpStreamFactoryImpl::Job::LogHttpConnectedMetrics(
|
| - const ClientSocketHandle& handle) {
|
| - UMA_HISTOGRAM_ENUMERATION("Net.HttpSocketType", handle.reuse_type(),
|
| - ClientSocketHandle::NUM_TYPES);
|
| -
|
| - switch (handle.reuse_type()) {
|
| - case ClientSocketHandle::UNUSED:
|
| - UMA_HISTOGRAM_CUSTOM_TIMES("Net.HttpConnectionLatency",
|
| - handle.setup_time(),
|
| - base::TimeDelta::FromMilliseconds(1),
|
| - base::TimeDelta::FromMinutes(10),
|
| - 100);
|
| - break;
|
| - case ClientSocketHandle::UNUSED_IDLE:
|
| - UMA_HISTOGRAM_CUSTOM_TIMES("Net.SocketIdleTimeBeforeNextUse_UnusedSocket",
|
| - handle.idle_time(),
|
| - base::TimeDelta::FromMilliseconds(1),
|
| - base::TimeDelta::FromMinutes(6),
|
| - 100);
|
| - break;
|
| - case ClientSocketHandle::REUSED_IDLE:
|
| - UMA_HISTOGRAM_CUSTOM_TIMES("Net.SocketIdleTimeBeforeNextUse_ReusedSocket",
|
| - handle.idle_time(),
|
| - base::TimeDelta::FromMilliseconds(1),
|
| - base::TimeDelta::FromMinutes(6),
|
| - 100);
|
| - break;
|
| - default:
|
| - NOTREACHED();
|
| - break;
|
| - }
|
| -}
|
| -
|
| -bool HttpStreamFactoryImpl::Job::IsPreconnecting() const {
|
| - DCHECK_GE(num_streams_, 0);
|
| - return num_streams_ > 0;
|
| -}
|
| -
|
| -bool HttpStreamFactoryImpl::Job::IsOrphaned() const {
|
| - return !IsPreconnecting() && !request_;
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::ReportJobSuccededForRequest() {
|
| - if (using_existing_quic_session_) {
|
| - // If an existing session was used, then no TCP connection was
|
| - // started.
|
| - HistogramAlternateProtocolUsage(ALTERNATE_PROTOCOL_USAGE_NO_RACE);
|
| - } else if (original_url_) {
|
| - // This job was the alternate protocol job, and hence won the race.
|
| - HistogramAlternateProtocolUsage(ALTERNATE_PROTOCOL_USAGE_WON_RACE);
|
| - } else {
|
| - // This job was the normal job, and hence the alternate protocol job lost
|
| - // the race.
|
| - HistogramAlternateProtocolUsage(ALTERNATE_PROTOCOL_USAGE_LOST_RACE);
|
| - }
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::MarkOtherJobComplete(const Job& job) {
|
| - DCHECK_EQ(STATUS_RUNNING, other_job_status_);
|
| - other_job_status_ = job.job_status_;
|
| - other_job_alternate_protocol_ = job.alternate_protocol_;
|
| - MaybeMarkAlternateProtocolBroken();
|
| -}
|
| -
|
| -void HttpStreamFactoryImpl::Job::MaybeMarkAlternateProtocolBroken() {
|
| - if (job_status_ == STATUS_RUNNING || other_job_status_ == STATUS_RUNNING)
|
| - return;
|
| -
|
| - bool is_alternate_protocol_job = original_url_.get() != NULL;
|
| - if (is_alternate_protocol_job) {
|
| - if (job_status_ == STATUS_BROKEN && other_job_status_ == STATUS_SUCCEEDED) {
|
| - HistogramBrokenAlternateProtocolLocation(
|
| - BROKEN_ALTERNATE_PROTOCOL_LOCATION_HTTP_STREAM_FACTORY_IMPL_JOB_ALT);
|
| - session_->http_server_properties()->SetBrokenAlternateProtocol(
|
| - HostPortPair::FromURL(*original_url_));
|
| - }
|
| - return;
|
| - }
|
| -
|
| - if (job_status_ == STATUS_SUCCEEDED && other_job_status_ == STATUS_BROKEN) {
|
| - HistogramBrokenAlternateProtocolLocation(
|
| - BROKEN_ALTERNATE_PROTOCOL_LOCATION_HTTP_STREAM_FACTORY_IMPL_JOB_MAIN);
|
| - session_->http_server_properties()->SetBrokenAlternateProtocol(
|
| - HostPortPair::FromURL(request_info_.url));
|
| - }
|
| -}
|
| -
|
| -} // namespace net
|
|
|