Index: net/http/http_proxy_client_socket_pool.cc |
diff --git a/net/http/http_proxy_client_socket_pool.cc b/net/http/http_proxy_client_socket_pool.cc |
deleted file mode 100644 |
index b97c957cdc8a65a77ab96a9d10f559f09ceb385b..0000000000000000000000000000000000000000 |
--- a/net/http/http_proxy_client_socket_pool.cc |
+++ /dev/null |
@@ -1,575 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "net/http/http_proxy_client_socket_pool.h" |
- |
-#include <algorithm> |
- |
-#include "base/compiler_specific.h" |
-#include "base/time/time.h" |
-#include "base/values.h" |
-#include "net/base/load_flags.h" |
-#include "net/base/net_errors.h" |
-#include "net/base/proxy_delegate.h" |
-#include "net/http/http_network_session.h" |
-#include "net/http/http_proxy_client_socket.h" |
-#include "net/socket/client_socket_factory.h" |
-#include "net/socket/client_socket_handle.h" |
-#include "net/socket/client_socket_pool_base.h" |
-#include "net/socket/ssl_client_socket.h" |
-#include "net/socket/ssl_client_socket_pool.h" |
-#include "net/socket/transport_client_socket_pool.h" |
-#include "net/spdy/spdy_proxy_client_socket.h" |
-#include "net/spdy/spdy_session.h" |
-#include "net/spdy/spdy_session_pool.h" |
-#include "net/spdy/spdy_stream.h" |
-#include "net/ssl/ssl_cert_request_info.h" |
-#include "url/gurl.h" |
- |
-namespace net { |
- |
-HttpProxySocketParams::HttpProxySocketParams( |
- const scoped_refptr<TransportSocketParams>& transport_params, |
- const scoped_refptr<SSLSocketParams>& ssl_params, |
- const GURL& request_url, |
- const std::string& user_agent, |
- const HostPortPair& endpoint, |
- HttpAuthCache* http_auth_cache, |
- HttpAuthHandlerFactory* http_auth_handler_factory, |
- SpdySessionPool* spdy_session_pool, |
- bool tunnel, |
- ProxyDelegate* proxy_delegate) |
- : transport_params_(transport_params), |
- ssl_params_(ssl_params), |
- spdy_session_pool_(spdy_session_pool), |
- request_url_(request_url), |
- user_agent_(user_agent), |
- endpoint_(endpoint), |
- http_auth_cache_(tunnel ? http_auth_cache : NULL), |
- http_auth_handler_factory_(tunnel ? http_auth_handler_factory : NULL), |
- tunnel_(tunnel), |
- proxy_delegate_(proxy_delegate) { |
- DCHECK((transport_params.get() == NULL && ssl_params.get() != NULL) || |
- (transport_params.get() != NULL && ssl_params.get() == NULL)); |
- if (transport_params_.get()) { |
- ignore_limits_ = transport_params->ignore_limits(); |
- } else { |
- ignore_limits_ = ssl_params->ignore_limits(); |
- } |
-} |
- |
-const HostResolver::RequestInfo& HttpProxySocketParams::destination() const { |
- if (transport_params_.get() == NULL) { |
- return ssl_params_->GetDirectConnectionParams()->destination(); |
- } else { |
- return transport_params_->destination(); |
- } |
-} |
- |
-HttpProxySocketParams::~HttpProxySocketParams() {} |
- |
-// HttpProxyConnectJobs will time out after this many seconds. Note this is on |
-// top of the timeout for the transport socket. |
-// TODO(kundaji): Proxy connect timeout should be independent of platform and be |
-// based on proxy. Bug http://crbug.com/407446. |
-#if defined(OS_ANDROID) || defined(OS_IOS) |
-static const int kHttpProxyConnectJobTimeoutInSeconds = 10; |
-#else |
-static const int kHttpProxyConnectJobTimeoutInSeconds = 30; |
-#endif |
- |
-HttpProxyConnectJob::HttpProxyConnectJob( |
- const std::string& group_name, |
- RequestPriority priority, |
- const scoped_refptr<HttpProxySocketParams>& params, |
- const base::TimeDelta& timeout_duration, |
- TransportClientSocketPool* transport_pool, |
- SSLClientSocketPool* ssl_pool, |
- Delegate* delegate, |
- NetLog* net_log) |
- : ConnectJob(group_name, timeout_duration, priority, delegate, |
- BoundNetLog::Make(net_log, NetLog::SOURCE_CONNECT_JOB)), |
- params_(params), |
- transport_pool_(transport_pool), |
- ssl_pool_(ssl_pool), |
- using_spdy_(false), |
- protocol_negotiated_(kProtoUnknown), |
- weak_ptr_factory_(this) { |
- callback_= base::Bind(&HttpProxyConnectJob::OnIOComplete, |
- weak_ptr_factory_.GetWeakPtr()); |
-} |
- |
-HttpProxyConnectJob::~HttpProxyConnectJob() {} |
- |
-LoadState HttpProxyConnectJob::GetLoadState() const { |
- switch (next_state_) { |
- case STATE_TCP_CONNECT: |
- case STATE_TCP_CONNECT_COMPLETE: |
- case STATE_SSL_CONNECT: |
- case STATE_SSL_CONNECT_COMPLETE: |
- return transport_socket_handle_->GetLoadState(); |
- case STATE_HTTP_PROXY_CONNECT: |
- case STATE_HTTP_PROXY_CONNECT_COMPLETE: |
- case STATE_SPDY_PROXY_CREATE_STREAM: |
- case STATE_SPDY_PROXY_CREATE_STREAM_COMPLETE: |
- return LOAD_STATE_ESTABLISHING_PROXY_TUNNEL; |
- default: |
- NOTREACHED(); |
- return LOAD_STATE_IDLE; |
- } |
-} |
- |
-void HttpProxyConnectJob::GetAdditionalErrorState(ClientSocketHandle * handle) { |
- if (error_response_info_.cert_request_info.get()) { |
- handle->set_ssl_error_response_info(error_response_info_); |
- handle->set_is_ssl_error(true); |
- } |
-} |
- |
-void HttpProxyConnectJob::OnIOComplete(int result) { |
- // TODO(pkasting): Remove ScopedTracker below once crbug.com/455884 is fixed. |
- tracked_objects::ScopedTracker tracking_profile( |
- FROM_HERE_WITH_EXPLICIT_FUNCTION( |
- "455884 HttpProxyConnectJob::OnIOComplete")); |
- int rv = DoLoop(result); |
- if (rv != ERR_IO_PENDING) { |
- NotifyProxyDelegateOfCompletion(rv); |
- NotifyDelegateOfCompletion(rv); // Deletes |this| |
- } |
-} |
- |
-int HttpProxyConnectJob::DoLoop(int result) { |
- DCHECK_NE(next_state_, STATE_NONE); |
- |
- int rv = result; |
- do { |
- State state = next_state_; |
- next_state_ = STATE_NONE; |
- switch (state) { |
- case STATE_TCP_CONNECT: |
- DCHECK_EQ(OK, rv); |
- rv = DoTransportConnect(); |
- break; |
- case STATE_TCP_CONNECT_COMPLETE: |
- rv = DoTransportConnectComplete(rv); |
- break; |
- case STATE_SSL_CONNECT: |
- DCHECK_EQ(OK, rv); |
- rv = DoSSLConnect(); |
- break; |
- case STATE_SSL_CONNECT_COMPLETE: |
- rv = DoSSLConnectComplete(rv); |
- break; |
- case STATE_HTTP_PROXY_CONNECT: |
- DCHECK_EQ(OK, rv); |
- rv = DoHttpProxyConnect(); |
- break; |
- case STATE_HTTP_PROXY_CONNECT_COMPLETE: |
- rv = DoHttpProxyConnectComplete(rv); |
- break; |
- case STATE_SPDY_PROXY_CREATE_STREAM: |
- DCHECK_EQ(OK, rv); |
- rv = DoSpdyProxyCreateStream(); |
- break; |
- case STATE_SPDY_PROXY_CREATE_STREAM_COMPLETE: |
- rv = DoSpdyProxyCreateStreamComplete(rv); |
- break; |
- default: |
- NOTREACHED() << "bad state"; |
- rv = ERR_FAILED; |
- break; |
- } |
- } while (rv != ERR_IO_PENDING && next_state_ != STATE_NONE); |
- |
- return rv; |
-} |
- |
-int HttpProxyConnectJob::DoTransportConnect() { |
- next_state_ = STATE_TCP_CONNECT_COMPLETE; |
- transport_socket_handle_.reset(new ClientSocketHandle()); |
- return transport_socket_handle_->Init(group_name(), |
- params_->transport_params(), |
- priority(), |
- callback_, |
- transport_pool_, |
- net_log()); |
-} |
- |
-int HttpProxyConnectJob::DoTransportConnectComplete(int result) { |
- if (result != OK) |
- return ERR_PROXY_CONNECTION_FAILED; |
- |
- // Reset the timer to just the length of time allowed for HttpProxy handshake |
- // so that a fast TCP connection plus a slow HttpProxy failure doesn't take |
- // longer to timeout than it should. |
- ResetTimer(base::TimeDelta::FromSeconds( |
- kHttpProxyConnectJobTimeoutInSeconds)); |
- |
- next_state_ = STATE_HTTP_PROXY_CONNECT; |
- return result; |
-} |
- |
-int HttpProxyConnectJob::DoSSLConnect() { |
- if (params_->tunnel()) { |
- SpdySessionKey key(params_->destination().host_port_pair(), |
- ProxyServer::Direct(), |
- PRIVACY_MODE_DISABLED); |
- if (params_->spdy_session_pool()->FindAvailableSession(key, net_log())) { |
- using_spdy_ = true; |
- next_state_ = STATE_SPDY_PROXY_CREATE_STREAM; |
- return OK; |
- } |
- } |
- next_state_ = STATE_SSL_CONNECT_COMPLETE; |
- transport_socket_handle_.reset(new ClientSocketHandle()); |
- return transport_socket_handle_->Init( |
- group_name(), params_->ssl_params(), priority(), callback_, |
- ssl_pool_, net_log()); |
-} |
- |
-int HttpProxyConnectJob::DoSSLConnectComplete(int result) { |
- if (result == ERR_SSL_CLIENT_AUTH_CERT_NEEDED) { |
- error_response_info_ = transport_socket_handle_->ssl_error_response_info(); |
- DCHECK(error_response_info_.cert_request_info.get()); |
- error_response_info_.cert_request_info->is_proxy = true; |
- return result; |
- } |
- if (IsCertificateError(result)) { |
- if (params_->ssl_params()->load_flags() & LOAD_IGNORE_ALL_CERT_ERRORS) { |
- result = OK; |
- } else { |
- // TODO(rch): allow the user to deal with proxy cert errors in the |
- // same way as server cert errors. |
- transport_socket_handle_->socket()->Disconnect(); |
- return ERR_PROXY_CERTIFICATE_INVALID; |
- } |
- } |
- // A SPDY session to the proxy completed prior to resolving the proxy |
- // hostname. Surface this error, and allow the delegate to retry. |
- // See crbug.com/334413. |
- if (result == ERR_SPDY_SESSION_ALREADY_EXISTS) { |
- DCHECK(!transport_socket_handle_->socket()); |
- return ERR_SPDY_SESSION_ALREADY_EXISTS; |
- } |
- if (result < 0) { |
- if (transport_socket_handle_->socket()) |
- transport_socket_handle_->socket()->Disconnect(); |
- return ERR_PROXY_CONNECTION_FAILED; |
- } |
- |
- SSLClientSocket* ssl = |
- static_cast<SSLClientSocket*>(transport_socket_handle_->socket()); |
- using_spdy_ = ssl->was_spdy_negotiated(); |
- protocol_negotiated_ = ssl->GetNegotiatedProtocol(); |
- |
- // Reset the timer to just the length of time allowed for HttpProxy handshake |
- // so that a fast SSL connection plus a slow HttpProxy failure doesn't take |
- // longer to timeout than it should. |
- ResetTimer(base::TimeDelta::FromSeconds( |
- kHttpProxyConnectJobTimeoutInSeconds)); |
- // TODO(rch): If we ever decide to implement a "trusted" SPDY proxy |
- // (one that we speak SPDY over SSL to, but to which we send HTTPS |
- // request directly instead of through CONNECT tunnels, then we |
- // need to add a predicate to this if statement so we fall through |
- // to the else case. (HttpProxyClientSocket currently acts as |
- // a "trusted" SPDY proxy). |
- if (using_spdy_ && params_->tunnel()) { |
- next_state_ = STATE_SPDY_PROXY_CREATE_STREAM; |
- } else { |
- next_state_ = STATE_HTTP_PROXY_CONNECT; |
- } |
- return result; |
-} |
- |
-int HttpProxyConnectJob::DoHttpProxyConnect() { |
- next_state_ = STATE_HTTP_PROXY_CONNECT_COMPLETE; |
- const HostResolver::RequestInfo& tcp_destination = params_->destination(); |
- const HostPortPair& proxy_server = tcp_destination.host_port_pair(); |
- |
- // Add a HttpProxy connection on top of the tcp socket. |
- transport_socket_.reset( |
- new HttpProxyClientSocket(transport_socket_handle_.release(), |
- params_->request_url(), |
- params_->user_agent(), |
- params_->endpoint(), |
- proxy_server, |
- params_->http_auth_cache(), |
- params_->http_auth_handler_factory(), |
- params_->tunnel(), |
- using_spdy_, |
- protocol_negotiated_, |
- params_->proxy_delegate(), |
- params_->ssl_params().get() != NULL)); |
- return transport_socket_->Connect(callback_); |
-} |
- |
-int HttpProxyConnectJob::DoHttpProxyConnectComplete(int result) { |
- if (result == OK || result == ERR_PROXY_AUTH_REQUESTED || |
- result == ERR_HTTPS_PROXY_TUNNEL_RESPONSE) { |
- SetSocket(transport_socket_.Pass()); |
- } |
- |
- if (result == ERR_HTTP_1_1_REQUIRED) |
- return ERR_PROXY_HTTP_1_1_REQUIRED; |
- |
- return result; |
-} |
- |
-int HttpProxyConnectJob::DoSpdyProxyCreateStream() { |
- DCHECK(using_spdy_); |
- DCHECK(params_->tunnel()); |
- SpdySessionKey key(params_->destination().host_port_pair(), |
- ProxyServer::Direct(), |
- PRIVACY_MODE_DISABLED); |
- SpdySessionPool* spdy_pool = params_->spdy_session_pool(); |
- base::WeakPtr<SpdySession> spdy_session = |
- spdy_pool->FindAvailableSession(key, net_log()); |
- // It's possible that a session to the proxy has recently been created |
- if (spdy_session) { |
- if (transport_socket_handle_.get()) { |
- if (transport_socket_handle_->socket()) |
- transport_socket_handle_->socket()->Disconnect(); |
- transport_socket_handle_->Reset(); |
- } |
- } else { |
- // Create a session direct to the proxy itself |
- spdy_session = |
- spdy_pool->CreateAvailableSessionFromSocket( |
- key, transport_socket_handle_.Pass(), |
- net_log(), OK, /*using_ssl_*/ true); |
- DCHECK(spdy_session); |
- } |
- |
- next_state_ = STATE_SPDY_PROXY_CREATE_STREAM_COMPLETE; |
- return spdy_stream_request_.StartRequest(SPDY_BIDIRECTIONAL_STREAM, |
- spdy_session, |
- params_->request_url(), |
- priority(), |
- spdy_session->net_log(), |
- callback_); |
-} |
- |
-int HttpProxyConnectJob::DoSpdyProxyCreateStreamComplete(int result) { |
- if (result < 0) |
- return result; |
- |
- next_state_ = STATE_HTTP_PROXY_CONNECT_COMPLETE; |
- base::WeakPtr<SpdyStream> stream = spdy_stream_request_.ReleaseStream(); |
- DCHECK(stream.get()); |
- // |transport_socket_| will set itself as |stream|'s delegate. |
- transport_socket_.reset( |
- new SpdyProxyClientSocket(stream, |
- params_->user_agent(), |
- params_->endpoint(), |
- params_->request_url(), |
- params_->destination().host_port_pair(), |
- net_log(), |
- params_->http_auth_cache(), |
- params_->http_auth_handler_factory())); |
- return transport_socket_->Connect(callback_); |
-} |
- |
-void HttpProxyConnectJob::NotifyProxyDelegateOfCompletion(int result) { |
- if (!params_->proxy_delegate()) |
- return; |
- |
- const HostPortPair& proxy_server = params_->destination().host_port_pair(); |
- params_->proxy_delegate()->OnTunnelConnectCompleted(params_->endpoint(), |
- proxy_server, |
- result); |
-} |
- |
-int HttpProxyConnectJob::ConnectInternal() { |
- if (params_->transport_params().get()) { |
- next_state_ = STATE_TCP_CONNECT; |
- } else { |
- next_state_ = STATE_SSL_CONNECT; |
- } |
- |
- int rv = DoLoop(OK); |
- if (rv != ERR_IO_PENDING) { |
- NotifyProxyDelegateOfCompletion(rv); |
- } |
- |
- return rv; |
-} |
- |
-HttpProxyClientSocketPool:: |
-HttpProxyConnectJobFactory::HttpProxyConnectJobFactory( |
- TransportClientSocketPool* transport_pool, |
- SSLClientSocketPool* ssl_pool, |
- NetLog* net_log) |
- : transport_pool_(transport_pool), |
- ssl_pool_(ssl_pool), |
- net_log_(net_log) { |
- base::TimeDelta max_pool_timeout = base::TimeDelta(); |
- |
-// TODO(kundaji): Proxy connect timeout should be independent of platform and be |
-// based on proxy. Bug http://crbug.com/407446. |
-#if (defined(OS_ANDROID) || defined(OS_IOS)) |
-#else |
- if (transport_pool_) |
- max_pool_timeout = transport_pool_->ConnectionTimeout(); |
- if (ssl_pool_) |
- max_pool_timeout = std::max(max_pool_timeout, |
- ssl_pool_->ConnectionTimeout()); |
-#endif |
- timeout_ = max_pool_timeout + |
- base::TimeDelta::FromSeconds(kHttpProxyConnectJobTimeoutInSeconds); |
-} |
- |
- |
-scoped_ptr<ConnectJob> |
-HttpProxyClientSocketPool::HttpProxyConnectJobFactory::NewConnectJob( |
- const std::string& group_name, |
- const PoolBase::Request& request, |
- ConnectJob::Delegate* delegate) const { |
- return scoped_ptr<ConnectJob>(new HttpProxyConnectJob(group_name, |
- request.priority(), |
- request.params(), |
- ConnectionTimeout(), |
- transport_pool_, |
- ssl_pool_, |
- delegate, |
- net_log_)); |
-} |
- |
-base::TimeDelta |
-HttpProxyClientSocketPool::HttpProxyConnectJobFactory::ConnectionTimeout( |
- ) const { |
- return timeout_; |
-} |
- |
-HttpProxyClientSocketPool::HttpProxyClientSocketPool( |
- int max_sockets, |
- int max_sockets_per_group, |
- ClientSocketPoolHistograms* histograms, |
- TransportClientSocketPool* transport_pool, |
- SSLClientSocketPool* ssl_pool, |
- NetLog* net_log) |
- : transport_pool_(transport_pool), |
- ssl_pool_(ssl_pool), |
- base_(this, max_sockets, max_sockets_per_group, histograms, |
- ClientSocketPool::unused_idle_socket_timeout(), |
- ClientSocketPool::used_idle_socket_timeout(), |
- new HttpProxyConnectJobFactory(transport_pool, |
- ssl_pool, |
- net_log)) { |
- // We should always have a |transport_pool_| except in unit tests. |
- if (transport_pool_) |
- base_.AddLowerLayeredPool(transport_pool_); |
- if (ssl_pool_) |
- base_.AddLowerLayeredPool(ssl_pool_); |
-} |
- |
-HttpProxyClientSocketPool::~HttpProxyClientSocketPool() { |
-} |
- |
-int HttpProxyClientSocketPool::RequestSocket( |
- const std::string& group_name, const void* socket_params, |
- RequestPriority priority, ClientSocketHandle* handle, |
- const CompletionCallback& callback, const BoundNetLog& net_log) { |
- const scoped_refptr<HttpProxySocketParams>* casted_socket_params = |
- static_cast<const scoped_refptr<HttpProxySocketParams>*>(socket_params); |
- |
- return base_.RequestSocket(group_name, *casted_socket_params, priority, |
- handle, callback, net_log); |
-} |
- |
-void HttpProxyClientSocketPool::RequestSockets( |
- const std::string& group_name, |
- const void* params, |
- int num_sockets, |
- const BoundNetLog& net_log) { |
- const scoped_refptr<HttpProxySocketParams>* casted_params = |
- static_cast<const scoped_refptr<HttpProxySocketParams>*>(params); |
- |
- base_.RequestSockets(group_name, *casted_params, num_sockets, net_log); |
-} |
- |
-void HttpProxyClientSocketPool::CancelRequest( |
- const std::string& group_name, |
- ClientSocketHandle* handle) { |
- base_.CancelRequest(group_name, handle); |
-} |
- |
-void HttpProxyClientSocketPool::ReleaseSocket(const std::string& group_name, |
- scoped_ptr<StreamSocket> socket, |
- int id) { |
- base_.ReleaseSocket(group_name, socket.Pass(), id); |
-} |
- |
-void HttpProxyClientSocketPool::FlushWithError(int error) { |
- base_.FlushWithError(error); |
-} |
- |
-void HttpProxyClientSocketPool::CloseIdleSockets() { |
- base_.CloseIdleSockets(); |
-} |
- |
-int HttpProxyClientSocketPool::IdleSocketCount() const { |
- return base_.idle_socket_count(); |
-} |
- |
-int HttpProxyClientSocketPool::IdleSocketCountInGroup( |
- const std::string& group_name) const { |
- return base_.IdleSocketCountInGroup(group_name); |
-} |
- |
-LoadState HttpProxyClientSocketPool::GetLoadState( |
- const std::string& group_name, const ClientSocketHandle* handle) const { |
- return base_.GetLoadState(group_name, handle); |
-} |
- |
-base::DictionaryValue* HttpProxyClientSocketPool::GetInfoAsValue( |
- const std::string& name, |
- const std::string& type, |
- bool include_nested_pools) const { |
- base::DictionaryValue* dict = base_.GetInfoAsValue(name, type); |
- if (include_nested_pools) { |
- base::ListValue* list = new base::ListValue(); |
- if (transport_pool_) { |
- list->Append(transport_pool_->GetInfoAsValue("transport_socket_pool", |
- "transport_socket_pool", |
- true)); |
- } |
- if (ssl_pool_) { |
- list->Append(ssl_pool_->GetInfoAsValue("ssl_socket_pool", |
- "ssl_socket_pool", |
- true)); |
- } |
- dict->Set("nested_pools", list); |
- } |
- return dict; |
-} |
- |
-base::TimeDelta HttpProxyClientSocketPool::ConnectionTimeout() const { |
- return base_.ConnectionTimeout(); |
-} |
- |
-ClientSocketPoolHistograms* HttpProxyClientSocketPool::histograms() const { |
- return base_.histograms(); |
-} |
- |
-bool HttpProxyClientSocketPool::IsStalled() const { |
- return base_.IsStalled(); |
-} |
- |
-void HttpProxyClientSocketPool::AddHigherLayeredPool( |
- HigherLayeredPool* higher_pool) { |
- base_.AddHigherLayeredPool(higher_pool); |
-} |
- |
-void HttpProxyClientSocketPool::RemoveHigherLayeredPool( |
- HigherLayeredPool* higher_pool) { |
- base_.RemoveHigherLayeredPool(higher_pool); |
-} |
- |
-bool HttpProxyClientSocketPool::CloseOneIdleConnection() { |
- if (base_.CloseOneIdleSocket()) |
- return true; |
- return base_.CloseOneIdleConnectionInHigherLayeredPool(); |
-} |
- |
-} // namespace net |