Index: net/spdy/spdy_session_pool.cc |
diff --git a/net/spdy/spdy_session_pool.cc b/net/spdy/spdy_session_pool.cc |
deleted file mode 100644 |
index a2d2ed607b5b8261ac3067f08a821a2af85d8827..0000000000000000000000000000000000000000 |
--- a/net/spdy/spdy_session_pool.cc |
+++ /dev/null |
@@ -1,412 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "net/spdy/spdy_session_pool.h" |
- |
-#include "base/logging.h" |
-#include "base/metrics/histogram.h" |
-#include "base/profiler/scoped_tracker.h" |
-#include "base/values.h" |
-#include "net/base/address_list.h" |
-#include "net/http/http_network_session.h" |
-#include "net/http/http_server_properties.h" |
-#include "net/spdy/spdy_session.h" |
- |
- |
-namespace net { |
- |
-namespace { |
- |
-enum SpdySessionGetTypes { |
- CREATED_NEW = 0, |
- FOUND_EXISTING = 1, |
- FOUND_EXISTING_FROM_IP_POOL = 2, |
- IMPORTED_FROM_SOCKET = 3, |
- SPDY_SESSION_GET_MAX = 4 |
-}; |
- |
-} // namespace |
- |
-SpdySessionPool::SpdySessionPool( |
- HostResolver* resolver, |
- SSLConfigService* ssl_config_service, |
- const base::WeakPtr<HttpServerProperties>& http_server_properties, |
- TransportSecurityState* transport_security_state, |
- bool force_single_domain, |
- bool enable_compression, |
- bool enable_ping_based_connection_checking, |
- NextProto default_protocol, |
- size_t stream_initial_recv_window_size, |
- size_t initial_max_concurrent_streams, |
- size_t max_concurrent_streams_limit, |
- SpdySessionPool::TimeFunc time_func, |
- const std::string& trusted_spdy_proxy) |
- : http_server_properties_(http_server_properties), |
- transport_security_state_(transport_security_state), |
- ssl_config_service_(ssl_config_service), |
- resolver_(resolver), |
- verify_domain_authentication_(true), |
- enable_sending_initial_data_(true), |
- force_single_domain_(force_single_domain), |
- enable_compression_(enable_compression), |
- enable_ping_based_connection_checking_( |
- enable_ping_based_connection_checking), |
- // TODO(akalin): Force callers to have a valid value of |
- // |default_protocol_|. |
- default_protocol_( |
- (default_protocol == kProtoUnknown) ? |
- kProtoSPDY31 : default_protocol), |
- stream_initial_recv_window_size_(stream_initial_recv_window_size), |
- initial_max_concurrent_streams_(initial_max_concurrent_streams), |
- max_concurrent_streams_limit_(max_concurrent_streams_limit), |
- time_func_(time_func), |
- trusted_spdy_proxy_( |
- HostPortPair::FromString(trusted_spdy_proxy)) { |
- DCHECK(default_protocol_ >= kProtoSPDYMinimumVersion && |
- default_protocol_ <= kProtoSPDYMaximumVersion); |
- // TODO(michaeln): Remove ScopedTracker below once crbug.com/454983 is fixed |
- tracked_objects::ScopedTracker tracking_profile( |
- FROM_HERE_WITH_EXPLICIT_FUNCTION( |
- "454983 SpdySessionPool::SpdySessionPool")); |
- NetworkChangeNotifier::AddIPAddressObserver(this); |
- if (ssl_config_service_.get()) |
- ssl_config_service_->AddObserver(this); |
- CertDatabase::GetInstance()->AddObserver(this); |
-} |
- |
-SpdySessionPool::~SpdySessionPool() { |
- CloseAllSessions(); |
- |
- while (!sessions_.empty()) { |
- // Destroy sessions to enforce that lifetime is scoped to SpdySessionPool. |
- // Write callbacks queued upon session drain are not invoked. |
- RemoveUnavailableSession((*sessions_.begin())->GetWeakPtr()); |
- } |
- |
- if (ssl_config_service_.get()) |
- ssl_config_service_->RemoveObserver(this); |
- NetworkChangeNotifier::RemoveIPAddressObserver(this); |
- CertDatabase::GetInstance()->RemoveObserver(this); |
-} |
- |
-base::WeakPtr<SpdySession> SpdySessionPool::CreateAvailableSessionFromSocket( |
- const SpdySessionKey& key, |
- scoped_ptr<ClientSocketHandle> connection, |
- const BoundNetLog& net_log, |
- int certificate_error_code, |
- bool is_secure) { |
- DCHECK_GE(default_protocol_, kProtoSPDYMinimumVersion); |
- DCHECK_LE(default_protocol_, kProtoSPDYMaximumVersion); |
- |
- UMA_HISTOGRAM_ENUMERATION( |
- "Net.SpdySessionGet", IMPORTED_FROM_SOCKET, SPDY_SESSION_GET_MAX); |
- |
- scoped_ptr<SpdySession> new_session( |
- new SpdySession(key, |
- http_server_properties_, |
- transport_security_state_, |
- verify_domain_authentication_, |
- enable_sending_initial_data_, |
- enable_compression_, |
- enable_ping_based_connection_checking_, |
- default_protocol_, |
- stream_initial_recv_window_size_, |
- initial_max_concurrent_streams_, |
- max_concurrent_streams_limit_, |
- time_func_, |
- trusted_spdy_proxy_, |
- net_log.net_log())); |
- |
- new_session->InitializeWithSocket( |
- connection.Pass(), this, is_secure, certificate_error_code); |
- |
- base::WeakPtr<SpdySession> available_session = new_session->GetWeakPtr(); |
- sessions_.insert(new_session.release()); |
- MapKeyToAvailableSession(key, available_session); |
- |
- net_log.AddEvent( |
- NetLog::TYPE_SPDY_SESSION_POOL_IMPORTED_SESSION_FROM_SOCKET, |
- available_session->net_log().source().ToEventParametersCallback()); |
- |
- // Look up the IP address for this session so that we can match |
- // future sessions (potentially to different domains) which can |
- // potentially be pooled with this one. Because GetPeerAddress() |
- // reports the proxy's address instead of the origin server, check |
- // to see if this is a direct connection. |
- if (key.proxy_server().is_direct()) { |
- IPEndPoint address; |
- if (available_session->GetPeerAddress(&address) == OK) |
- aliases_[address] = key; |
- } |
- |
- return available_session; |
-} |
- |
-base::WeakPtr<SpdySession> SpdySessionPool::FindAvailableSession( |
- const SpdySessionKey& key, |
- const BoundNetLog& net_log) { |
- AvailableSessionMap::iterator it = LookupAvailableSessionByKey(key); |
- if (it != available_sessions_.end()) { |
- UMA_HISTOGRAM_ENUMERATION( |
- "Net.SpdySessionGet", FOUND_EXISTING, SPDY_SESSION_GET_MAX); |
- net_log.AddEvent( |
- NetLog::TYPE_SPDY_SESSION_POOL_FOUND_EXISTING_SESSION, |
- it->second->net_log().source().ToEventParametersCallback()); |
- return it->second; |
- } |
- |
- // Look up the key's from the resolver's cache. |
- net::HostResolver::RequestInfo resolve_info(key.host_port_pair()); |
- AddressList addresses; |
- int rv = resolver_->ResolveFromCache(resolve_info, &addresses, net_log); |
- DCHECK_NE(rv, ERR_IO_PENDING); |
- if (rv != OK) |
- return base::WeakPtr<SpdySession>(); |
- |
- // Check if we have a session through a domain alias. |
- for (AddressList::const_iterator address_it = addresses.begin(); |
- address_it != addresses.end(); |
- ++address_it) { |
- AliasMap::const_iterator alias_it = aliases_.find(*address_it); |
- if (alias_it == aliases_.end()) |
- continue; |
- |
- // We found an alias. |
- const SpdySessionKey& alias_key = alias_it->second; |
- |
- // We can reuse this session only if the proxy and privacy |
- // settings match. |
- if (!(alias_key.proxy_server() == key.proxy_server()) || |
- !(alias_key.privacy_mode() == key.privacy_mode())) |
- continue; |
- |
- AvailableSessionMap::iterator available_session_it = |
- LookupAvailableSessionByKey(alias_key); |
- if (available_session_it == available_sessions_.end()) { |
- NOTREACHED(); // It shouldn't be in the aliases table if we can't get it! |
- continue; |
- } |
- |
- const base::WeakPtr<SpdySession>& available_session = |
- available_session_it->second; |
- DCHECK(ContainsKey(sessions_, available_session.get())); |
- // If the session is a secure one, we need to verify that the |
- // server is authenticated to serve traffic for |host_port_proxy_pair| too. |
- if (!available_session->VerifyDomainAuthentication( |
- key.host_port_pair().host())) { |
- UMA_HISTOGRAM_ENUMERATION("Net.SpdyIPPoolDomainMatch", 0, 2); |
- continue; |
- } |
- |
- UMA_HISTOGRAM_ENUMERATION("Net.SpdyIPPoolDomainMatch", 1, 2); |
- UMA_HISTOGRAM_ENUMERATION("Net.SpdySessionGet", |
- FOUND_EXISTING_FROM_IP_POOL, |
- SPDY_SESSION_GET_MAX); |
- net_log.AddEvent( |
- NetLog::TYPE_SPDY_SESSION_POOL_FOUND_EXISTING_SESSION_FROM_IP_POOL, |
- available_session->net_log().source().ToEventParametersCallback()); |
- // Add this session to the map so that we can find it next time. |
- MapKeyToAvailableSession(key, available_session); |
- available_session->AddPooledAlias(key); |
- return available_session; |
- } |
- |
- return base::WeakPtr<SpdySession>(); |
-} |
- |
-void SpdySessionPool::MakeSessionUnavailable( |
- const base::WeakPtr<SpdySession>& available_session) { |
- UnmapKey(available_session->spdy_session_key()); |
- RemoveAliases(available_session->spdy_session_key()); |
- const std::set<SpdySessionKey>& aliases = available_session->pooled_aliases(); |
- for (std::set<SpdySessionKey>::const_iterator it = aliases.begin(); |
- it != aliases.end(); ++it) { |
- UnmapKey(*it); |
- RemoveAliases(*it); |
- } |
- DCHECK(!IsSessionAvailable(available_session)); |
-} |
- |
-void SpdySessionPool::RemoveUnavailableSession( |
- const base::WeakPtr<SpdySession>& unavailable_session) { |
- DCHECK(!IsSessionAvailable(unavailable_session)); |
- |
- unavailable_session->net_log().AddEvent( |
- NetLog::TYPE_SPDY_SESSION_POOL_REMOVE_SESSION, |
- unavailable_session->net_log().source().ToEventParametersCallback()); |
- |
- SessionSet::iterator it = sessions_.find(unavailable_session.get()); |
- CHECK(it != sessions_.end()); |
- scoped_ptr<SpdySession> owned_session(*it); |
- sessions_.erase(it); |
-} |
- |
-// Make a copy of |sessions_| in the Close* functions below to avoid |
-// reentrancy problems. Since arbitrary functions get called by close |
-// handlers, it doesn't suffice to simply increment the iterator |
-// before closing. |
- |
-void SpdySessionPool::CloseCurrentSessions(net::Error error) { |
- CloseCurrentSessionsHelper(error, "Closing current sessions.", |
- false /* idle_only */); |
-} |
- |
-void SpdySessionPool::CloseCurrentIdleSessions() { |
- CloseCurrentSessionsHelper(ERR_ABORTED, "Closing idle sessions.", |
- true /* idle_only */); |
-} |
- |
-void SpdySessionPool::CloseAllSessions() { |
- while (!available_sessions_.empty()) { |
- CloseCurrentSessionsHelper(ERR_ABORTED, "Closing all sessions.", |
- false /* idle_only */); |
- } |
-} |
- |
-base::Value* SpdySessionPool::SpdySessionPoolInfoToValue() const { |
- base::ListValue* list = new base::ListValue(); |
- |
- for (AvailableSessionMap::const_iterator it = available_sessions_.begin(); |
- it != available_sessions_.end(); ++it) { |
- // Only add the session if the key in the map matches the main |
- // host_port_proxy_pair (not an alias). |
- const SpdySessionKey& key = it->first; |
- const SpdySessionKey& session_key = it->second->spdy_session_key(); |
- if (key.Equals(session_key)) |
- list->Append(it->second->GetInfoAsValue()); |
- } |
- return list; |
-} |
- |
-void SpdySessionPool::OnIPAddressChanged() { |
- WeakSessionList current_sessions = GetCurrentSessions(); |
- for (WeakSessionList::const_iterator it = current_sessions.begin(); |
- it != current_sessions.end(); ++it) { |
- if (!*it) |
- continue; |
- |
-// For OSs that terminate TCP connections upon relevant network changes, |
-// attempt to preserve active streams by marking all sessions as going |
-// away, rather than explicitly closing them. Streams may still fail due |
-// to a generated TCP reset. |
-#if defined(OS_ANDROID) || defined(OS_WIN) || defined(OS_IOS) |
- (*it)->MakeUnavailable(); |
- (*it)->StartGoingAway(kLastStreamId, ERR_NETWORK_CHANGED); |
- (*it)->MaybeFinishGoingAway(); |
-#else |
- (*it)->CloseSessionOnError(ERR_NETWORK_CHANGED, |
- "Closing current sessions."); |
- DCHECK((*it)->IsDraining()); |
-#endif // defined(OS_ANDROID) || defined(OS_WIN) || defined(OS_IOS) |
- DCHECK(!IsSessionAvailable(*it)); |
- } |
- http_server_properties_->ClearAllSpdySettings(); |
-} |
- |
-void SpdySessionPool::OnSSLConfigChanged() { |
- CloseCurrentSessions(ERR_NETWORK_CHANGED); |
-} |
- |
-void SpdySessionPool::OnCertAdded(const X509Certificate* cert) { |
- CloseCurrentSessions(ERR_CERT_DATABASE_CHANGED); |
-} |
- |
-void SpdySessionPool::OnCACertChanged(const X509Certificate* cert) { |
- // Per wtc, we actually only need to CloseCurrentSessions when trust is |
- // reduced. CloseCurrentSessions now because OnCACertChanged does not |
- // tell us this. |
- // See comments in ClientSocketPoolManager::OnCACertChanged. |
- CloseCurrentSessions(ERR_CERT_DATABASE_CHANGED); |
-} |
- |
-bool SpdySessionPool::IsSessionAvailable( |
- const base::WeakPtr<SpdySession>& session) const { |
- for (AvailableSessionMap::const_iterator it = available_sessions_.begin(); |
- it != available_sessions_.end(); ++it) { |
- if (it->second.get() == session.get()) |
- return true; |
- } |
- return false; |
-} |
- |
-const SpdySessionKey& SpdySessionPool::NormalizeListKey( |
- const SpdySessionKey& key) const { |
- if (!force_single_domain_) |
- return key; |
- |
- static SpdySessionKey* single_domain_key = NULL; |
- if (!single_domain_key) { |
- HostPortPair single_domain = HostPortPair("singledomain.com", 80); |
- single_domain_key = new SpdySessionKey(single_domain, |
- ProxyServer::Direct(), |
- PRIVACY_MODE_DISABLED); |
- } |
- return *single_domain_key; |
-} |
- |
-void SpdySessionPool::MapKeyToAvailableSession( |
- const SpdySessionKey& key, |
- const base::WeakPtr<SpdySession>& session) { |
- DCHECK(ContainsKey(sessions_, session.get())); |
- const SpdySessionKey& normalized_key = NormalizeListKey(key); |
- std::pair<AvailableSessionMap::iterator, bool> result = |
- available_sessions_.insert(std::make_pair(normalized_key, session)); |
- CHECK(result.second); |
-} |
- |
-SpdySessionPool::AvailableSessionMap::iterator |
-SpdySessionPool::LookupAvailableSessionByKey( |
- const SpdySessionKey& key) { |
- const SpdySessionKey& normalized_key = NormalizeListKey(key); |
- return available_sessions_.find(normalized_key); |
-} |
- |
-void SpdySessionPool::UnmapKey(const SpdySessionKey& key) { |
- AvailableSessionMap::iterator it = LookupAvailableSessionByKey(key); |
- CHECK(it != available_sessions_.end()); |
- available_sessions_.erase(it); |
-} |
- |
-void SpdySessionPool::RemoveAliases(const SpdySessionKey& key) { |
- // Walk the aliases map, find references to this pair. |
- // TODO(mbelshe): Figure out if this is too expensive. |
- for (AliasMap::iterator it = aliases_.begin(); it != aliases_.end(); ) { |
- if (it->second.Equals(key)) { |
- AliasMap::iterator old_it = it; |
- ++it; |
- aliases_.erase(old_it); |
- } else { |
- ++it; |
- } |
- } |
-} |
- |
-SpdySessionPool::WeakSessionList SpdySessionPool::GetCurrentSessions() const { |
- WeakSessionList current_sessions; |
- for (SessionSet::const_iterator it = sessions_.begin(); |
- it != sessions_.end(); ++it) { |
- current_sessions.push_back((*it)->GetWeakPtr()); |
- } |
- return current_sessions; |
-} |
- |
-void SpdySessionPool::CloseCurrentSessionsHelper( |
- Error error, |
- const std::string& description, |
- bool idle_only) { |
- WeakSessionList current_sessions = GetCurrentSessions(); |
- for (WeakSessionList::const_iterator it = current_sessions.begin(); |
- it != current_sessions.end(); ++it) { |
- if (!*it) |
- continue; |
- |
- if (idle_only && (*it)->is_active()) |
- continue; |
- |
- (*it)->CloseSessionOnError(error, description); |
- DCHECK(!IsSessionAvailable(*it)); |
- } |
-} |
- |
-} // namespace net |