Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(84)

Unified Diff: net/http/http_proxy_client_socket_pool.cc

Issue 992733002: Remove //net (except for Android test stuff) and sdch (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 5 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/http/http_proxy_client_socket_pool.h ('k') | net/http/http_proxy_client_socket_pool_unittest.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/http/http_proxy_client_socket_pool.cc
diff --git a/net/http/http_proxy_client_socket_pool.cc b/net/http/http_proxy_client_socket_pool.cc
deleted file mode 100644
index b97c957cdc8a65a77ab96a9d10f559f09ceb385b..0000000000000000000000000000000000000000
--- a/net/http/http_proxy_client_socket_pool.cc
+++ /dev/null
@@ -1,575 +0,0 @@
-// Copyright (c) 2012 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "net/http/http_proxy_client_socket_pool.h"
-
-#include <algorithm>
-
-#include "base/compiler_specific.h"
-#include "base/time/time.h"
-#include "base/values.h"
-#include "net/base/load_flags.h"
-#include "net/base/net_errors.h"
-#include "net/base/proxy_delegate.h"
-#include "net/http/http_network_session.h"
-#include "net/http/http_proxy_client_socket.h"
-#include "net/socket/client_socket_factory.h"
-#include "net/socket/client_socket_handle.h"
-#include "net/socket/client_socket_pool_base.h"
-#include "net/socket/ssl_client_socket.h"
-#include "net/socket/ssl_client_socket_pool.h"
-#include "net/socket/transport_client_socket_pool.h"
-#include "net/spdy/spdy_proxy_client_socket.h"
-#include "net/spdy/spdy_session.h"
-#include "net/spdy/spdy_session_pool.h"
-#include "net/spdy/spdy_stream.h"
-#include "net/ssl/ssl_cert_request_info.h"
-#include "url/gurl.h"
-
-namespace net {
-
-HttpProxySocketParams::HttpProxySocketParams(
- const scoped_refptr<TransportSocketParams>& transport_params,
- const scoped_refptr<SSLSocketParams>& ssl_params,
- const GURL& request_url,
- const std::string& user_agent,
- const HostPortPair& endpoint,
- HttpAuthCache* http_auth_cache,
- HttpAuthHandlerFactory* http_auth_handler_factory,
- SpdySessionPool* spdy_session_pool,
- bool tunnel,
- ProxyDelegate* proxy_delegate)
- : transport_params_(transport_params),
- ssl_params_(ssl_params),
- spdy_session_pool_(spdy_session_pool),
- request_url_(request_url),
- user_agent_(user_agent),
- endpoint_(endpoint),
- http_auth_cache_(tunnel ? http_auth_cache : NULL),
- http_auth_handler_factory_(tunnel ? http_auth_handler_factory : NULL),
- tunnel_(tunnel),
- proxy_delegate_(proxy_delegate) {
- DCHECK((transport_params.get() == NULL && ssl_params.get() != NULL) ||
- (transport_params.get() != NULL && ssl_params.get() == NULL));
- if (transport_params_.get()) {
- ignore_limits_ = transport_params->ignore_limits();
- } else {
- ignore_limits_ = ssl_params->ignore_limits();
- }
-}
-
-const HostResolver::RequestInfo& HttpProxySocketParams::destination() const {
- if (transport_params_.get() == NULL) {
- return ssl_params_->GetDirectConnectionParams()->destination();
- } else {
- return transport_params_->destination();
- }
-}
-
-HttpProxySocketParams::~HttpProxySocketParams() {}
-
-// HttpProxyConnectJobs will time out after this many seconds. Note this is on
-// top of the timeout for the transport socket.
-// TODO(kundaji): Proxy connect timeout should be independent of platform and be
-// based on proxy. Bug http://crbug.com/407446.
-#if defined(OS_ANDROID) || defined(OS_IOS)
-static const int kHttpProxyConnectJobTimeoutInSeconds = 10;
-#else
-static const int kHttpProxyConnectJobTimeoutInSeconds = 30;
-#endif
-
-HttpProxyConnectJob::HttpProxyConnectJob(
- const std::string& group_name,
- RequestPriority priority,
- const scoped_refptr<HttpProxySocketParams>& params,
- const base::TimeDelta& timeout_duration,
- TransportClientSocketPool* transport_pool,
- SSLClientSocketPool* ssl_pool,
- Delegate* delegate,
- NetLog* net_log)
- : ConnectJob(group_name, timeout_duration, priority, delegate,
- BoundNetLog::Make(net_log, NetLog::SOURCE_CONNECT_JOB)),
- params_(params),
- transport_pool_(transport_pool),
- ssl_pool_(ssl_pool),
- using_spdy_(false),
- protocol_negotiated_(kProtoUnknown),
- weak_ptr_factory_(this) {
- callback_= base::Bind(&HttpProxyConnectJob::OnIOComplete,
- weak_ptr_factory_.GetWeakPtr());
-}
-
-HttpProxyConnectJob::~HttpProxyConnectJob() {}
-
-LoadState HttpProxyConnectJob::GetLoadState() const {
- switch (next_state_) {
- case STATE_TCP_CONNECT:
- case STATE_TCP_CONNECT_COMPLETE:
- case STATE_SSL_CONNECT:
- case STATE_SSL_CONNECT_COMPLETE:
- return transport_socket_handle_->GetLoadState();
- case STATE_HTTP_PROXY_CONNECT:
- case STATE_HTTP_PROXY_CONNECT_COMPLETE:
- case STATE_SPDY_PROXY_CREATE_STREAM:
- case STATE_SPDY_PROXY_CREATE_STREAM_COMPLETE:
- return LOAD_STATE_ESTABLISHING_PROXY_TUNNEL;
- default:
- NOTREACHED();
- return LOAD_STATE_IDLE;
- }
-}
-
-void HttpProxyConnectJob::GetAdditionalErrorState(ClientSocketHandle * handle) {
- if (error_response_info_.cert_request_info.get()) {
- handle->set_ssl_error_response_info(error_response_info_);
- handle->set_is_ssl_error(true);
- }
-}
-
-void HttpProxyConnectJob::OnIOComplete(int result) {
- // TODO(pkasting): Remove ScopedTracker below once crbug.com/455884 is fixed.
- tracked_objects::ScopedTracker tracking_profile(
- FROM_HERE_WITH_EXPLICIT_FUNCTION(
- "455884 HttpProxyConnectJob::OnIOComplete"));
- int rv = DoLoop(result);
- if (rv != ERR_IO_PENDING) {
- NotifyProxyDelegateOfCompletion(rv);
- NotifyDelegateOfCompletion(rv); // Deletes |this|
- }
-}
-
-int HttpProxyConnectJob::DoLoop(int result) {
- DCHECK_NE(next_state_, STATE_NONE);
-
- int rv = result;
- do {
- State state = next_state_;
- next_state_ = STATE_NONE;
- switch (state) {
- case STATE_TCP_CONNECT:
- DCHECK_EQ(OK, rv);
- rv = DoTransportConnect();
- break;
- case STATE_TCP_CONNECT_COMPLETE:
- rv = DoTransportConnectComplete(rv);
- break;
- case STATE_SSL_CONNECT:
- DCHECK_EQ(OK, rv);
- rv = DoSSLConnect();
- break;
- case STATE_SSL_CONNECT_COMPLETE:
- rv = DoSSLConnectComplete(rv);
- break;
- case STATE_HTTP_PROXY_CONNECT:
- DCHECK_EQ(OK, rv);
- rv = DoHttpProxyConnect();
- break;
- case STATE_HTTP_PROXY_CONNECT_COMPLETE:
- rv = DoHttpProxyConnectComplete(rv);
- break;
- case STATE_SPDY_PROXY_CREATE_STREAM:
- DCHECK_EQ(OK, rv);
- rv = DoSpdyProxyCreateStream();
- break;
- case STATE_SPDY_PROXY_CREATE_STREAM_COMPLETE:
- rv = DoSpdyProxyCreateStreamComplete(rv);
- break;
- default:
- NOTREACHED() << "bad state";
- rv = ERR_FAILED;
- break;
- }
- } while (rv != ERR_IO_PENDING && next_state_ != STATE_NONE);
-
- return rv;
-}
-
-int HttpProxyConnectJob::DoTransportConnect() {
- next_state_ = STATE_TCP_CONNECT_COMPLETE;
- transport_socket_handle_.reset(new ClientSocketHandle());
- return transport_socket_handle_->Init(group_name(),
- params_->transport_params(),
- priority(),
- callback_,
- transport_pool_,
- net_log());
-}
-
-int HttpProxyConnectJob::DoTransportConnectComplete(int result) {
- if (result != OK)
- return ERR_PROXY_CONNECTION_FAILED;
-
- // Reset the timer to just the length of time allowed for HttpProxy handshake
- // so that a fast TCP connection plus a slow HttpProxy failure doesn't take
- // longer to timeout than it should.
- ResetTimer(base::TimeDelta::FromSeconds(
- kHttpProxyConnectJobTimeoutInSeconds));
-
- next_state_ = STATE_HTTP_PROXY_CONNECT;
- return result;
-}
-
-int HttpProxyConnectJob::DoSSLConnect() {
- if (params_->tunnel()) {
- SpdySessionKey key(params_->destination().host_port_pair(),
- ProxyServer::Direct(),
- PRIVACY_MODE_DISABLED);
- if (params_->spdy_session_pool()->FindAvailableSession(key, net_log())) {
- using_spdy_ = true;
- next_state_ = STATE_SPDY_PROXY_CREATE_STREAM;
- return OK;
- }
- }
- next_state_ = STATE_SSL_CONNECT_COMPLETE;
- transport_socket_handle_.reset(new ClientSocketHandle());
- return transport_socket_handle_->Init(
- group_name(), params_->ssl_params(), priority(), callback_,
- ssl_pool_, net_log());
-}
-
-int HttpProxyConnectJob::DoSSLConnectComplete(int result) {
- if (result == ERR_SSL_CLIENT_AUTH_CERT_NEEDED) {
- error_response_info_ = transport_socket_handle_->ssl_error_response_info();
- DCHECK(error_response_info_.cert_request_info.get());
- error_response_info_.cert_request_info->is_proxy = true;
- return result;
- }
- if (IsCertificateError(result)) {
- if (params_->ssl_params()->load_flags() & LOAD_IGNORE_ALL_CERT_ERRORS) {
- result = OK;
- } else {
- // TODO(rch): allow the user to deal with proxy cert errors in the
- // same way as server cert errors.
- transport_socket_handle_->socket()->Disconnect();
- return ERR_PROXY_CERTIFICATE_INVALID;
- }
- }
- // A SPDY session to the proxy completed prior to resolving the proxy
- // hostname. Surface this error, and allow the delegate to retry.
- // See crbug.com/334413.
- if (result == ERR_SPDY_SESSION_ALREADY_EXISTS) {
- DCHECK(!transport_socket_handle_->socket());
- return ERR_SPDY_SESSION_ALREADY_EXISTS;
- }
- if (result < 0) {
- if (transport_socket_handle_->socket())
- transport_socket_handle_->socket()->Disconnect();
- return ERR_PROXY_CONNECTION_FAILED;
- }
-
- SSLClientSocket* ssl =
- static_cast<SSLClientSocket*>(transport_socket_handle_->socket());
- using_spdy_ = ssl->was_spdy_negotiated();
- protocol_negotiated_ = ssl->GetNegotiatedProtocol();
-
- // Reset the timer to just the length of time allowed for HttpProxy handshake
- // so that a fast SSL connection plus a slow HttpProxy failure doesn't take
- // longer to timeout than it should.
- ResetTimer(base::TimeDelta::FromSeconds(
- kHttpProxyConnectJobTimeoutInSeconds));
- // TODO(rch): If we ever decide to implement a "trusted" SPDY proxy
- // (one that we speak SPDY over SSL to, but to which we send HTTPS
- // request directly instead of through CONNECT tunnels, then we
- // need to add a predicate to this if statement so we fall through
- // to the else case. (HttpProxyClientSocket currently acts as
- // a "trusted" SPDY proxy).
- if (using_spdy_ && params_->tunnel()) {
- next_state_ = STATE_SPDY_PROXY_CREATE_STREAM;
- } else {
- next_state_ = STATE_HTTP_PROXY_CONNECT;
- }
- return result;
-}
-
-int HttpProxyConnectJob::DoHttpProxyConnect() {
- next_state_ = STATE_HTTP_PROXY_CONNECT_COMPLETE;
- const HostResolver::RequestInfo& tcp_destination = params_->destination();
- const HostPortPair& proxy_server = tcp_destination.host_port_pair();
-
- // Add a HttpProxy connection on top of the tcp socket.
- transport_socket_.reset(
- new HttpProxyClientSocket(transport_socket_handle_.release(),
- params_->request_url(),
- params_->user_agent(),
- params_->endpoint(),
- proxy_server,
- params_->http_auth_cache(),
- params_->http_auth_handler_factory(),
- params_->tunnel(),
- using_spdy_,
- protocol_negotiated_,
- params_->proxy_delegate(),
- params_->ssl_params().get() != NULL));
- return transport_socket_->Connect(callback_);
-}
-
-int HttpProxyConnectJob::DoHttpProxyConnectComplete(int result) {
- if (result == OK || result == ERR_PROXY_AUTH_REQUESTED ||
- result == ERR_HTTPS_PROXY_TUNNEL_RESPONSE) {
- SetSocket(transport_socket_.Pass());
- }
-
- if (result == ERR_HTTP_1_1_REQUIRED)
- return ERR_PROXY_HTTP_1_1_REQUIRED;
-
- return result;
-}
-
-int HttpProxyConnectJob::DoSpdyProxyCreateStream() {
- DCHECK(using_spdy_);
- DCHECK(params_->tunnel());
- SpdySessionKey key(params_->destination().host_port_pair(),
- ProxyServer::Direct(),
- PRIVACY_MODE_DISABLED);
- SpdySessionPool* spdy_pool = params_->spdy_session_pool();
- base::WeakPtr<SpdySession> spdy_session =
- spdy_pool->FindAvailableSession(key, net_log());
- // It's possible that a session to the proxy has recently been created
- if (spdy_session) {
- if (transport_socket_handle_.get()) {
- if (transport_socket_handle_->socket())
- transport_socket_handle_->socket()->Disconnect();
- transport_socket_handle_->Reset();
- }
- } else {
- // Create a session direct to the proxy itself
- spdy_session =
- spdy_pool->CreateAvailableSessionFromSocket(
- key, transport_socket_handle_.Pass(),
- net_log(), OK, /*using_ssl_*/ true);
- DCHECK(spdy_session);
- }
-
- next_state_ = STATE_SPDY_PROXY_CREATE_STREAM_COMPLETE;
- return spdy_stream_request_.StartRequest(SPDY_BIDIRECTIONAL_STREAM,
- spdy_session,
- params_->request_url(),
- priority(),
- spdy_session->net_log(),
- callback_);
-}
-
-int HttpProxyConnectJob::DoSpdyProxyCreateStreamComplete(int result) {
- if (result < 0)
- return result;
-
- next_state_ = STATE_HTTP_PROXY_CONNECT_COMPLETE;
- base::WeakPtr<SpdyStream> stream = spdy_stream_request_.ReleaseStream();
- DCHECK(stream.get());
- // |transport_socket_| will set itself as |stream|'s delegate.
- transport_socket_.reset(
- new SpdyProxyClientSocket(stream,
- params_->user_agent(),
- params_->endpoint(),
- params_->request_url(),
- params_->destination().host_port_pair(),
- net_log(),
- params_->http_auth_cache(),
- params_->http_auth_handler_factory()));
- return transport_socket_->Connect(callback_);
-}
-
-void HttpProxyConnectJob::NotifyProxyDelegateOfCompletion(int result) {
- if (!params_->proxy_delegate())
- return;
-
- const HostPortPair& proxy_server = params_->destination().host_port_pair();
- params_->proxy_delegate()->OnTunnelConnectCompleted(params_->endpoint(),
- proxy_server,
- result);
-}
-
-int HttpProxyConnectJob::ConnectInternal() {
- if (params_->transport_params().get()) {
- next_state_ = STATE_TCP_CONNECT;
- } else {
- next_state_ = STATE_SSL_CONNECT;
- }
-
- int rv = DoLoop(OK);
- if (rv != ERR_IO_PENDING) {
- NotifyProxyDelegateOfCompletion(rv);
- }
-
- return rv;
-}
-
-HttpProxyClientSocketPool::
-HttpProxyConnectJobFactory::HttpProxyConnectJobFactory(
- TransportClientSocketPool* transport_pool,
- SSLClientSocketPool* ssl_pool,
- NetLog* net_log)
- : transport_pool_(transport_pool),
- ssl_pool_(ssl_pool),
- net_log_(net_log) {
- base::TimeDelta max_pool_timeout = base::TimeDelta();
-
-// TODO(kundaji): Proxy connect timeout should be independent of platform and be
-// based on proxy. Bug http://crbug.com/407446.
-#if (defined(OS_ANDROID) || defined(OS_IOS))
-#else
- if (transport_pool_)
- max_pool_timeout = transport_pool_->ConnectionTimeout();
- if (ssl_pool_)
- max_pool_timeout = std::max(max_pool_timeout,
- ssl_pool_->ConnectionTimeout());
-#endif
- timeout_ = max_pool_timeout +
- base::TimeDelta::FromSeconds(kHttpProxyConnectJobTimeoutInSeconds);
-}
-
-
-scoped_ptr<ConnectJob>
-HttpProxyClientSocketPool::HttpProxyConnectJobFactory::NewConnectJob(
- const std::string& group_name,
- const PoolBase::Request& request,
- ConnectJob::Delegate* delegate) const {
- return scoped_ptr<ConnectJob>(new HttpProxyConnectJob(group_name,
- request.priority(),
- request.params(),
- ConnectionTimeout(),
- transport_pool_,
- ssl_pool_,
- delegate,
- net_log_));
-}
-
-base::TimeDelta
-HttpProxyClientSocketPool::HttpProxyConnectJobFactory::ConnectionTimeout(
- ) const {
- return timeout_;
-}
-
-HttpProxyClientSocketPool::HttpProxyClientSocketPool(
- int max_sockets,
- int max_sockets_per_group,
- ClientSocketPoolHistograms* histograms,
- TransportClientSocketPool* transport_pool,
- SSLClientSocketPool* ssl_pool,
- NetLog* net_log)
- : transport_pool_(transport_pool),
- ssl_pool_(ssl_pool),
- base_(this, max_sockets, max_sockets_per_group, histograms,
- ClientSocketPool::unused_idle_socket_timeout(),
- ClientSocketPool::used_idle_socket_timeout(),
- new HttpProxyConnectJobFactory(transport_pool,
- ssl_pool,
- net_log)) {
- // We should always have a |transport_pool_| except in unit tests.
- if (transport_pool_)
- base_.AddLowerLayeredPool(transport_pool_);
- if (ssl_pool_)
- base_.AddLowerLayeredPool(ssl_pool_);
-}
-
-HttpProxyClientSocketPool::~HttpProxyClientSocketPool() {
-}
-
-int HttpProxyClientSocketPool::RequestSocket(
- const std::string& group_name, const void* socket_params,
- RequestPriority priority, ClientSocketHandle* handle,
- const CompletionCallback& callback, const BoundNetLog& net_log) {
- const scoped_refptr<HttpProxySocketParams>* casted_socket_params =
- static_cast<const scoped_refptr<HttpProxySocketParams>*>(socket_params);
-
- return base_.RequestSocket(group_name, *casted_socket_params, priority,
- handle, callback, net_log);
-}
-
-void HttpProxyClientSocketPool::RequestSockets(
- const std::string& group_name,
- const void* params,
- int num_sockets,
- const BoundNetLog& net_log) {
- const scoped_refptr<HttpProxySocketParams>* casted_params =
- static_cast<const scoped_refptr<HttpProxySocketParams>*>(params);
-
- base_.RequestSockets(group_name, *casted_params, num_sockets, net_log);
-}
-
-void HttpProxyClientSocketPool::CancelRequest(
- const std::string& group_name,
- ClientSocketHandle* handle) {
- base_.CancelRequest(group_name, handle);
-}
-
-void HttpProxyClientSocketPool::ReleaseSocket(const std::string& group_name,
- scoped_ptr<StreamSocket> socket,
- int id) {
- base_.ReleaseSocket(group_name, socket.Pass(), id);
-}
-
-void HttpProxyClientSocketPool::FlushWithError(int error) {
- base_.FlushWithError(error);
-}
-
-void HttpProxyClientSocketPool::CloseIdleSockets() {
- base_.CloseIdleSockets();
-}
-
-int HttpProxyClientSocketPool::IdleSocketCount() const {
- return base_.idle_socket_count();
-}
-
-int HttpProxyClientSocketPool::IdleSocketCountInGroup(
- const std::string& group_name) const {
- return base_.IdleSocketCountInGroup(group_name);
-}
-
-LoadState HttpProxyClientSocketPool::GetLoadState(
- const std::string& group_name, const ClientSocketHandle* handle) const {
- return base_.GetLoadState(group_name, handle);
-}
-
-base::DictionaryValue* HttpProxyClientSocketPool::GetInfoAsValue(
- const std::string& name,
- const std::string& type,
- bool include_nested_pools) const {
- base::DictionaryValue* dict = base_.GetInfoAsValue(name, type);
- if (include_nested_pools) {
- base::ListValue* list = new base::ListValue();
- if (transport_pool_) {
- list->Append(transport_pool_->GetInfoAsValue("transport_socket_pool",
- "transport_socket_pool",
- true));
- }
- if (ssl_pool_) {
- list->Append(ssl_pool_->GetInfoAsValue("ssl_socket_pool",
- "ssl_socket_pool",
- true));
- }
- dict->Set("nested_pools", list);
- }
- return dict;
-}
-
-base::TimeDelta HttpProxyClientSocketPool::ConnectionTimeout() const {
- return base_.ConnectionTimeout();
-}
-
-ClientSocketPoolHistograms* HttpProxyClientSocketPool::histograms() const {
- return base_.histograms();
-}
-
-bool HttpProxyClientSocketPool::IsStalled() const {
- return base_.IsStalled();
-}
-
-void HttpProxyClientSocketPool::AddHigherLayeredPool(
- HigherLayeredPool* higher_pool) {
- base_.AddHigherLayeredPool(higher_pool);
-}
-
-void HttpProxyClientSocketPool::RemoveHigherLayeredPool(
- HigherLayeredPool* higher_pool) {
- base_.RemoveHigherLayeredPool(higher_pool);
-}
-
-bool HttpProxyClientSocketPool::CloseOneIdleConnection() {
- if (base_.CloseOneIdleSocket())
- return true;
- return base_.CloseOneIdleConnectionInHigherLayeredPool();
-}
-
-} // namespace net
« no previous file with comments | « net/http/http_proxy_client_socket_pool.h ('k') | net/http/http_proxy_client_socket_pool_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698