summaryrefslogtreecommitdiff
path: root/chromium/net/http/http_proxy_client_socket_pool.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/net/http/http_proxy_client_socket_pool.cc')
-rw-r--r--chromium/net/http/http_proxy_client_socket_pool.cc542
1 files changed, 542 insertions, 0 deletions
diff --git a/chromium/net/http/http_proxy_client_socket_pool.cc b/chromium/net/http/http_proxy_client_socket_pool.cc
new file mode 100644
index 00000000000..c75df6f0d2f
--- /dev/null
+++ b/chromium/net/http/http_proxy_client_socket_pool.cc
@@ -0,0 +1,542 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "net/http/http_proxy_client_socket_pool.h"
+
+#include <algorithm>
+
+#include "base/compiler_specific.h"
+#include "base/time/time.h"
+#include "base/values.h"
+#include "net/base/load_flags.h"
+#include "net/base/net_errors.h"
+#include "net/http/http_network_session.h"
+#include "net/http/http_proxy_client_socket.h"
+#include "net/socket/client_socket_factory.h"
+#include "net/socket/client_socket_handle.h"
+#include "net/socket/client_socket_pool_base.h"
+#include "net/socket/ssl_client_socket.h"
+#include "net/socket/ssl_client_socket_pool.h"
+#include "net/socket/transport_client_socket_pool.h"
+#include "net/spdy/spdy_proxy_client_socket.h"
+#include "net/spdy/spdy_session.h"
+#include "net/spdy/spdy_session_pool.h"
+#include "net/spdy/spdy_stream.h"
+#include "net/ssl/ssl_cert_request_info.h"
+#include "url/gurl.h"
+
+namespace net {
+
+HttpProxySocketParams::HttpProxySocketParams(
+ const scoped_refptr<TransportSocketParams>& transport_params,
+ const scoped_refptr<SSLSocketParams>& ssl_params,
+ const GURL& request_url,
+ const std::string& user_agent,
+ const HostPortPair& endpoint,
+ HttpAuthCache* http_auth_cache,
+ HttpAuthHandlerFactory* http_auth_handler_factory,
+ SpdySessionPool* spdy_session_pool,
+ bool tunnel)
+ : transport_params_(transport_params),
+ ssl_params_(ssl_params),
+ spdy_session_pool_(spdy_session_pool),
+ request_url_(request_url),
+ user_agent_(user_agent),
+ endpoint_(endpoint),
+ http_auth_cache_(tunnel ? http_auth_cache : NULL),
+ http_auth_handler_factory_(tunnel ? http_auth_handler_factory : NULL),
+ tunnel_(tunnel) {
+ DCHECK((transport_params.get() == NULL && ssl_params.get() != NULL) ||
+ (transport_params.get() != NULL && ssl_params.get() == NULL));
+ if (transport_params_.get()) {
+ ignore_limits_ = transport_params->ignore_limits();
+ } else {
+ ignore_limits_ = ssl_params->ignore_limits();
+ }
+}
+
+const HostResolver::RequestInfo& HttpProxySocketParams::destination() const {
+ if (transport_params_.get() == NULL) {
+ return ssl_params_->transport_params()->destination();
+ } else {
+ return transport_params_->destination();
+ }
+}
+
+HttpProxySocketParams::~HttpProxySocketParams() {}
+
+// HttpProxyConnectJobs will time out after this many seconds. Note this is on
+// top of the timeout for the transport socket.
+#if (defined(OS_ANDROID) || defined(OS_IOS)) && defined(SPDY_PROXY_AUTH_ORIGIN)
+static const int kHttpProxyConnectJobTimeoutInSeconds = 10;
+#else
+static const int kHttpProxyConnectJobTimeoutInSeconds = 30;
+#endif
+
+
+HttpProxyConnectJob::HttpProxyConnectJob(
+ const std::string& group_name,
+ const scoped_refptr<HttpProxySocketParams>& params,
+ const base::TimeDelta& timeout_duration,
+ TransportClientSocketPool* transport_pool,
+ SSLClientSocketPool* ssl_pool,
+ HostResolver* host_resolver,
+ Delegate* delegate,
+ NetLog* net_log)
+ : ConnectJob(group_name, timeout_duration, delegate,
+ BoundNetLog::Make(net_log, NetLog::SOURCE_CONNECT_JOB)),
+ weak_ptr_factory_(this),
+ params_(params),
+ transport_pool_(transport_pool),
+ ssl_pool_(ssl_pool),
+ resolver_(host_resolver),
+ callback_(base::Bind(&HttpProxyConnectJob::OnIOComplete,
+ weak_ptr_factory_.GetWeakPtr())),
+ using_spdy_(false),
+ protocol_negotiated_(kProtoUnknown) {
+}
+
+HttpProxyConnectJob::~HttpProxyConnectJob() {}
+
+LoadState HttpProxyConnectJob::GetLoadState() const {
+ switch (next_state_) {
+ case STATE_TCP_CONNECT:
+ case STATE_TCP_CONNECT_COMPLETE:
+ case STATE_SSL_CONNECT:
+ case STATE_SSL_CONNECT_COMPLETE:
+ return transport_socket_handle_->GetLoadState();
+ case STATE_HTTP_PROXY_CONNECT:
+ case STATE_HTTP_PROXY_CONNECT_COMPLETE:
+ case STATE_SPDY_PROXY_CREATE_STREAM:
+ case STATE_SPDY_PROXY_CREATE_STREAM_COMPLETE:
+ return LOAD_STATE_ESTABLISHING_PROXY_TUNNEL;
+ default:
+ NOTREACHED();
+ return LOAD_STATE_IDLE;
+ }
+}
+
+void HttpProxyConnectJob::GetAdditionalErrorState(ClientSocketHandle * handle) {
+ if (error_response_info_.cert_request_info.get()) {
+ handle->set_ssl_error_response_info(error_response_info_);
+ handle->set_is_ssl_error(true);
+ }
+}
+
+void HttpProxyConnectJob::OnIOComplete(int result) {
+ int rv = DoLoop(result);
+ if (rv != ERR_IO_PENDING)
+ NotifyDelegateOfCompletion(rv); // Deletes |this|
+}
+
+int HttpProxyConnectJob::DoLoop(int result) {
+ DCHECK_NE(next_state_, STATE_NONE);
+
+ int rv = result;
+ do {
+ State state = next_state_;
+ next_state_ = STATE_NONE;
+ switch (state) {
+ case STATE_TCP_CONNECT:
+ DCHECK_EQ(OK, rv);
+ rv = DoTransportConnect();
+ break;
+ case STATE_TCP_CONNECT_COMPLETE:
+ rv = DoTransportConnectComplete(rv);
+ break;
+ case STATE_SSL_CONNECT:
+ DCHECK_EQ(OK, rv);
+ rv = DoSSLConnect();
+ break;
+ case STATE_SSL_CONNECT_COMPLETE:
+ rv = DoSSLConnectComplete(rv);
+ break;
+ case STATE_HTTP_PROXY_CONNECT:
+ DCHECK_EQ(OK, rv);
+ rv = DoHttpProxyConnect();
+ break;
+ case STATE_HTTP_PROXY_CONNECT_COMPLETE:
+ rv = DoHttpProxyConnectComplete(rv);
+ break;
+ case STATE_SPDY_PROXY_CREATE_STREAM:
+ DCHECK_EQ(OK, rv);
+ rv = DoSpdyProxyCreateStream();
+ break;
+ case STATE_SPDY_PROXY_CREATE_STREAM_COMPLETE:
+ rv = DoSpdyProxyCreateStreamComplete(rv);
+ break;
+ default:
+ NOTREACHED() << "bad state";
+ rv = ERR_FAILED;
+ break;
+ }
+ } while (rv != ERR_IO_PENDING && next_state_ != STATE_NONE);
+
+ return rv;
+}
+
+int HttpProxyConnectJob::DoTransportConnect() {
+ next_state_ = STATE_TCP_CONNECT_COMPLETE;
+ transport_socket_handle_.reset(new ClientSocketHandle());
+ return transport_socket_handle_->Init(
+ group_name(), params_->transport_params(),
+ params_->transport_params()->destination().priority(), callback_,
+ transport_pool_, net_log());
+}
+
+int HttpProxyConnectJob::DoTransportConnectComplete(int result) {
+ if (result != OK)
+ return ERR_PROXY_CONNECTION_FAILED;
+
+ // Reset the timer to just the length of time allowed for HttpProxy handshake
+ // so that a fast TCP connection plus a slow HttpProxy failure doesn't take
+ // longer to timeout than it should.
+ ResetTimer(base::TimeDelta::FromSeconds(
+ kHttpProxyConnectJobTimeoutInSeconds));
+
+ next_state_ = STATE_HTTP_PROXY_CONNECT;
+ return result;
+}
+
+int HttpProxyConnectJob::DoSSLConnect() {
+ if (params_->tunnel()) {
+ SpdySessionKey key(params_->destination().host_port_pair(),
+ ProxyServer::Direct(),
+ kPrivacyModeDisabled);
+ if (params_->spdy_session_pool()->FindAvailableSession(key, net_log())) {
+ using_spdy_ = true;
+ next_state_ = STATE_SPDY_PROXY_CREATE_STREAM;
+ return OK;
+ }
+ }
+ next_state_ = STATE_SSL_CONNECT_COMPLETE;
+ transport_socket_handle_.reset(new ClientSocketHandle());
+ return transport_socket_handle_->Init(
+ group_name(), params_->ssl_params(),
+ params_->ssl_params()->transport_params()->destination().priority(),
+ callback_, ssl_pool_, net_log());
+}
+
+int HttpProxyConnectJob::DoSSLConnectComplete(int result) {
+ if (result == ERR_SSL_CLIENT_AUTH_CERT_NEEDED) {
+ error_response_info_ = transport_socket_handle_->ssl_error_response_info();
+ DCHECK(error_response_info_.cert_request_info.get());
+ error_response_info_.cert_request_info->is_proxy = true;
+ return result;
+ }
+ if (IsCertificateError(result)) {
+ if (params_->ssl_params()->load_flags() & LOAD_IGNORE_ALL_CERT_ERRORS) {
+ result = OK;
+ } else {
+ // TODO(rch): allow the user to deal with proxy cert errors in the
+ // same way as server cert errors.
+ transport_socket_handle_->socket()->Disconnect();
+ return ERR_PROXY_CERTIFICATE_INVALID;
+ }
+ }
+ if (result < 0) {
+ if (transport_socket_handle_->socket())
+ transport_socket_handle_->socket()->Disconnect();
+ return ERR_PROXY_CONNECTION_FAILED;
+ }
+
+ SSLClientSocket* ssl =
+ static_cast<SSLClientSocket*>(transport_socket_handle_->socket());
+ using_spdy_ = ssl->was_spdy_negotiated();
+ protocol_negotiated_ = ssl->GetNegotiatedProtocol();
+
+ // Reset the timer to just the length of time allowed for HttpProxy handshake
+ // so that a fast SSL connection plus a slow HttpProxy failure doesn't take
+ // longer to timeout than it should.
+ ResetTimer(base::TimeDelta::FromSeconds(
+ kHttpProxyConnectJobTimeoutInSeconds));
+ // TODO(rch): If we ever decide to implement a "trusted" SPDY proxy
+ // (one that we speak SPDY over SSL to, but to which we send HTTPS
+ // request directly instead of through CONNECT tunnels, then we
+ // need to add a predicate to this if statement so we fall through
+ // to the else case. (HttpProxyClientSocket currently acts as
+ // a "trusted" SPDY proxy).
+ if (using_spdy_ && params_->tunnel()) {
+ next_state_ = STATE_SPDY_PROXY_CREATE_STREAM;
+ } else {
+ next_state_ = STATE_HTTP_PROXY_CONNECT;
+ }
+ return result;
+}
+
+int HttpProxyConnectJob::DoHttpProxyConnect() {
+ next_state_ = STATE_HTTP_PROXY_CONNECT_COMPLETE;
+ const HostResolver::RequestInfo& tcp_destination = params_->destination();
+ const HostPortPair& proxy_server = tcp_destination.host_port_pair();
+
+ // Add a HttpProxy connection on top of the tcp socket.
+ transport_socket_.reset(
+ new HttpProxyClientSocket(transport_socket_handle_.release(),
+ params_->request_url(),
+ params_->user_agent(),
+ params_->endpoint(),
+ proxy_server,
+ params_->http_auth_cache(),
+ params_->http_auth_handler_factory(),
+ params_->tunnel(),
+ using_spdy_,
+ protocol_negotiated_,
+ params_->ssl_params().get() != NULL));
+ return transport_socket_->Connect(callback_);
+}
+
+int HttpProxyConnectJob::DoHttpProxyConnectComplete(int result) {
+ if (result == OK || result == ERR_PROXY_AUTH_REQUESTED ||
+ result == ERR_HTTPS_PROXY_TUNNEL_RESPONSE) {
+ SetSocket(transport_socket_.PassAs<StreamSocket>());
+ }
+
+ return result;
+}
+
+int HttpProxyConnectJob::DoSpdyProxyCreateStream() {
+ DCHECK(using_spdy_);
+ DCHECK(params_->tunnel());
+ SpdySessionKey key(params_->destination().host_port_pair(),
+ ProxyServer::Direct(),
+ kPrivacyModeDisabled);
+ SpdySessionPool* spdy_pool = params_->spdy_session_pool();
+ base::WeakPtr<SpdySession> spdy_session =
+ spdy_pool->FindAvailableSession(key, net_log());
+ // It's possible that a session to the proxy has recently been created
+ if (spdy_session) {
+ if (transport_socket_handle_.get()) {
+ if (transport_socket_handle_->socket())
+ transport_socket_handle_->socket()->Disconnect();
+ transport_socket_handle_->Reset();
+ }
+ } else {
+ // Create a session direct to the proxy itself
+ int rv = spdy_pool->CreateAvailableSessionFromSocket(
+ key, transport_socket_handle_.Pass(),
+ net_log(), OK, &spdy_session, /*using_ssl_*/ true);
+ if (rv < 0)
+ return rv;
+ }
+
+ next_state_ = STATE_SPDY_PROXY_CREATE_STREAM_COMPLETE;
+ return spdy_stream_request_.StartRequest(
+ SPDY_BIDIRECTIONAL_STREAM, spdy_session, params_->request_url(),
+ params_->destination().priority(), spdy_session->net_log(), callback_);
+}
+
+int HttpProxyConnectJob::DoSpdyProxyCreateStreamComplete(int result) {
+ if (result < 0)
+ return result;
+
+ next_state_ = STATE_HTTP_PROXY_CONNECT_COMPLETE;
+ base::WeakPtr<SpdyStream> stream = spdy_stream_request_.ReleaseStream();
+ DCHECK(stream.get());
+ // |transport_socket_| will set itself as |stream|'s delegate.
+ transport_socket_.reset(
+ new SpdyProxyClientSocket(stream,
+ params_->user_agent(),
+ params_->endpoint(),
+ params_->request_url(),
+ params_->destination().host_port_pair(),
+ net_log(),
+ params_->http_auth_cache(),
+ params_->http_auth_handler_factory()));
+ return transport_socket_->Connect(callback_);
+}
+
+int HttpProxyConnectJob::ConnectInternal() {
+ if (params_->transport_params().get()) {
+ next_state_ = STATE_TCP_CONNECT;
+ } else {
+ next_state_ = STATE_SSL_CONNECT;
+ }
+ return DoLoop(OK);
+}
+
+HttpProxyClientSocketPool::
+HttpProxyConnectJobFactory::HttpProxyConnectJobFactory(
+ TransportClientSocketPool* transport_pool,
+ SSLClientSocketPool* ssl_pool,
+ HostResolver* host_resolver,
+ NetLog* net_log)
+ : transport_pool_(transport_pool),
+ ssl_pool_(ssl_pool),
+ host_resolver_(host_resolver),
+ net_log_(net_log) {
+ base::TimeDelta max_pool_timeout = base::TimeDelta();
+
+#if (defined(OS_ANDROID) || defined(OS_IOS)) && defined(SPDY_PROXY_AUTH_ORIGIN)
+#else
+ if (transport_pool_)
+ max_pool_timeout = transport_pool_->ConnectionTimeout();
+ if (ssl_pool_)
+ max_pool_timeout = std::max(max_pool_timeout,
+ ssl_pool_->ConnectionTimeout());
+#endif
+ timeout_ = max_pool_timeout +
+ base::TimeDelta::FromSeconds(kHttpProxyConnectJobTimeoutInSeconds);
+}
+
+
+scoped_ptr<ConnectJob>
+HttpProxyClientSocketPool::HttpProxyConnectJobFactory::NewConnectJob(
+ const std::string& group_name,
+ const PoolBase::Request& request,
+ ConnectJob::Delegate* delegate) const {
+ return scoped_ptr<ConnectJob>(new HttpProxyConnectJob(group_name,
+ request.params(),
+ ConnectionTimeout(),
+ transport_pool_,
+ ssl_pool_,
+ host_resolver_,
+ delegate,
+ net_log_));
+}
+
+base::TimeDelta
+HttpProxyClientSocketPool::HttpProxyConnectJobFactory::ConnectionTimeout(
+ ) const {
+ return timeout_;
+}
+
+HttpProxyClientSocketPool::HttpProxyClientSocketPool(
+ int max_sockets,
+ int max_sockets_per_group,
+ ClientSocketPoolHistograms* histograms,
+ HostResolver* host_resolver,
+ TransportClientSocketPool* transport_pool,
+ SSLClientSocketPool* ssl_pool,
+ NetLog* net_log)
+ : transport_pool_(transport_pool),
+ ssl_pool_(ssl_pool),
+ base_(max_sockets, max_sockets_per_group, histograms,
+ ClientSocketPool::unused_idle_socket_timeout(),
+ ClientSocketPool::used_idle_socket_timeout(),
+ new HttpProxyConnectJobFactory(transport_pool,
+ ssl_pool,
+ host_resolver,
+ net_log)) {
+ // We should always have a |transport_pool_| except in unit tests.
+ if (transport_pool_)
+ transport_pool_->AddLayeredPool(this);
+ if (ssl_pool_)
+ ssl_pool_->AddLayeredPool(this);
+}
+
+HttpProxyClientSocketPool::~HttpProxyClientSocketPool() {
+ if (ssl_pool_)
+ ssl_pool_->RemoveLayeredPool(this);
+ // We should always have a |transport_pool_| except in unit tests.
+ if (transport_pool_)
+ transport_pool_->RemoveLayeredPool(this);
+}
+
+int HttpProxyClientSocketPool::RequestSocket(
+ const std::string& group_name, const void* socket_params,
+ RequestPriority priority, ClientSocketHandle* handle,
+ const CompletionCallback& callback, const BoundNetLog& net_log) {
+ const scoped_refptr<HttpProxySocketParams>* casted_socket_params =
+ static_cast<const scoped_refptr<HttpProxySocketParams>*>(socket_params);
+
+ return base_.RequestSocket(group_name, *casted_socket_params, priority,
+ handle, callback, net_log);
+}
+
+void HttpProxyClientSocketPool::RequestSockets(
+ const std::string& group_name,
+ const void* params,
+ int num_sockets,
+ const BoundNetLog& net_log) {
+ const scoped_refptr<HttpProxySocketParams>* casted_params =
+ static_cast<const scoped_refptr<HttpProxySocketParams>*>(params);
+
+ base_.RequestSockets(group_name, *casted_params, num_sockets, net_log);
+}
+
+void HttpProxyClientSocketPool::CancelRequest(
+ const std::string& group_name,
+ ClientSocketHandle* handle) {
+ base_.CancelRequest(group_name, handle);
+}
+
+void HttpProxyClientSocketPool::ReleaseSocket(const std::string& group_name,
+ scoped_ptr<StreamSocket> socket,
+ int id) {
+ base_.ReleaseSocket(group_name, socket.Pass(), id);
+}
+
+void HttpProxyClientSocketPool::FlushWithError(int error) {
+ base_.FlushWithError(error);
+}
+
+bool HttpProxyClientSocketPool::IsStalled() const {
+ return base_.IsStalled() ||
+ (transport_pool_ && transport_pool_->IsStalled()) ||
+ (ssl_pool_ && ssl_pool_->IsStalled());
+}
+
+void HttpProxyClientSocketPool::CloseIdleSockets() {
+ base_.CloseIdleSockets();
+}
+
+int HttpProxyClientSocketPool::IdleSocketCount() const {
+ return base_.idle_socket_count();
+}
+
+int HttpProxyClientSocketPool::IdleSocketCountInGroup(
+ const std::string& group_name) const {
+ return base_.IdleSocketCountInGroup(group_name);
+}
+
+LoadState HttpProxyClientSocketPool::GetLoadState(
+ const std::string& group_name, const ClientSocketHandle* handle) const {
+ return base_.GetLoadState(group_name, handle);
+}
+
+void HttpProxyClientSocketPool::AddLayeredPool(LayeredPool* layered_pool) {
+ base_.AddLayeredPool(layered_pool);
+}
+
+void HttpProxyClientSocketPool::RemoveLayeredPool(LayeredPool* layered_pool) {
+ base_.RemoveLayeredPool(layered_pool);
+}
+
+base::DictionaryValue* HttpProxyClientSocketPool::GetInfoAsValue(
+ const std::string& name,
+ const std::string& type,
+ bool include_nested_pools) const {
+ base::DictionaryValue* dict = base_.GetInfoAsValue(name, type);
+ if (include_nested_pools) {
+ base::ListValue* list = new base::ListValue();
+ if (transport_pool_) {
+ list->Append(transport_pool_->GetInfoAsValue("transport_socket_pool",
+ "transport_socket_pool",
+ true));
+ }
+ if (ssl_pool_) {
+ list->Append(ssl_pool_->GetInfoAsValue("ssl_socket_pool",
+ "ssl_socket_pool",
+ true));
+ }
+ dict->Set("nested_pools", list);
+ }
+ return dict;
+}
+
+base::TimeDelta HttpProxyClientSocketPool::ConnectionTimeout() const {
+ return base_.ConnectionTimeout();
+}
+
+ClientSocketPoolHistograms* HttpProxyClientSocketPool::histograms() const {
+ return base_.histograms();
+}
+
+bool HttpProxyClientSocketPool::CloseOneIdleConnection() {
+ if (base_.CloseOneIdleSocket())
+ return true;
+ return base_.CloseOneIdleConnectionInLayeredPool();
+}
+
+} // namespace net