Check USB device path access when prompting users to select a device.
[chromium-blink-merge.git] / net / tools / flip_server / spdy_interface.cc
blobfacbe5bf6db3ba01aa7e7d135a9ccf8f1315ef1f
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/tools/flip_server/spdy_interface.h"
7 #include <algorithm>
8 #include <string>
10 #include "net/spdy/spdy_framer.h"
11 #include "net/spdy/spdy_protocol.h"
12 #include "net/tools/dump_cache/url_utilities.h"
13 #include "net/tools/flip_server/constants.h"
14 #include "net/tools/flip_server/flip_config.h"
15 #include "net/tools/flip_server/http_interface.h"
16 #include "net/tools/flip_server/spdy_util.h"
18 namespace net {
20 // static
21 std::string SpdySM::forward_ip_header_;
23 class SpdyFrameDataFrame : public DataFrame {
24 public:
25 explicit SpdyFrameDataFrame(SpdyFrame* spdy_frame) : frame(spdy_frame) {
26 data = spdy_frame->data();
27 size = spdy_frame->size();
30 ~SpdyFrameDataFrame() override { delete frame; }
32 const SpdyFrame* frame;
35 SpdySM::SpdySM(SMConnection* connection,
36 SMInterface* sm_http_interface,
37 EpollServer* epoll_server,
38 MemoryCache* memory_cache,
39 FlipAcceptor* acceptor,
40 SpdyMajorVersion spdy_version)
41 : buffered_spdy_framer_(new BufferedSpdyFramer(spdy_version, true)),
42 valid_spdy_session_(false),
43 connection_(connection),
44 client_output_list_(connection->output_list()),
45 client_output_ordering_(connection),
46 next_outgoing_stream_id_(2),
47 epoll_server_(epoll_server),
48 acceptor_(acceptor),
49 memory_cache_(memory_cache),
50 close_on_error_(false) {
51 buffered_spdy_framer_->set_visitor(this);
54 SpdySM::~SpdySM() { }
56 void SpdySM::InitSMConnection(SMConnectionPoolInterface* connection_pool,
57 SMInterface* sm_interface,
58 EpollServer* epoll_server,
59 int fd,
60 std::string server_ip,
61 std::string server_port,
62 std::string remote_ip,
63 bool use_ssl) {
64 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: Initializing server connection.";
65 connection_->InitSMConnection(connection_pool,
66 sm_interface,
67 epoll_server,
68 fd,
69 server_ip,
70 server_port,
71 remote_ip,
72 use_ssl);
75 SMInterface* SpdySM::NewConnectionInterface() {
76 SMConnection* server_connection =
77 SMConnection::NewSMConnection(epoll_server_,
78 NULL,
79 memory_cache_,
80 acceptor_,
81 "http_conn: ");
82 if (server_connection == NULL) {
83 LOG(ERROR) << "SpdySM: Could not create server connection";
84 return NULL;
86 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: Creating new HTTP interface";
87 SMInterface* sm_http_interface =
88 new HttpSM(server_connection, this, memory_cache_, acceptor_);
89 return sm_http_interface;
92 SMInterface* SpdySM::FindOrMakeNewSMConnectionInterface(
93 const std::string& server_ip,
94 const std::string& server_port) {
95 SMInterface* sm_http_interface;
96 int32 server_idx;
97 if (unused_server_interface_list.empty()) {
98 sm_http_interface = NewConnectionInterface();
99 server_idx = server_interface_list.size();
100 server_interface_list.push_back(sm_http_interface);
101 VLOG(2) << ACCEPTOR_CLIENT_IDENT
102 << "SpdySM: Making new server connection on index: " << server_idx;
103 } else {
104 server_idx = unused_server_interface_list.back();
105 unused_server_interface_list.pop_back();
106 sm_http_interface = server_interface_list.at(server_idx);
107 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: Reusing connection on "
108 << "index: " << server_idx;
111 sm_http_interface->InitSMInterface(this, server_idx);
112 sm_http_interface->InitSMConnection(NULL,
113 sm_http_interface,
114 epoll_server_,
116 server_ip,
117 server_port,
118 std::string(),
119 false);
121 return sm_http_interface;
124 int SpdySM::SpdyHandleNewStream(SpdyStreamId stream_id,
125 SpdyPriority priority,
126 const SpdyHeaderBlock& headers,
127 std::string& http_data,
128 bool* is_https_scheme) {
129 *is_https_scheme = false;
130 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: OnSyn(" << stream_id << ")";
131 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: # headers: " << headers.size();
133 SpdyHeaderBlock::const_iterator method = headers.end();
134 SpdyHeaderBlock::const_iterator host = headers.end();
135 SpdyHeaderBlock::const_iterator path = headers.end();
136 SpdyHeaderBlock::const_iterator scheme = headers.end();
137 SpdyHeaderBlock::const_iterator version = headers.end();
138 SpdyHeaderBlock::const_iterator url = headers.end();
140 std::string path_string, host_string, version_string;
142 if (spdy_version() == SPDY2) {
143 url = headers.find("url");
144 method = headers.find("method");
145 version = headers.find("version");
146 scheme = headers.find("scheme");
147 if (url == headers.end() || method == headers.end() ||
148 version == headers.end() || scheme == headers.end()) {
149 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: A mandatory header is "
150 << "missing. Not creating stream";
151 return 0;
153 // url->second here only ever seems to contain just the path. When this
154 // path contains a query string with a http:// in one of its values,
155 // UrlUtilities::GetUrlPath will fail and always return a / breaking
156 // the request. GetUrlPath assumes the absolute URL is being passed in.
157 path_string = UrlUtilities::GetUrlPath(url->second);
158 host_string = UrlUtilities::GetUrlHost(url->second);
159 version_string = version->second;
160 } else {
161 method = headers.find(":method");
162 host = headers.find(":host");
163 path = headers.find(":path");
164 scheme = headers.find(":scheme");
165 if (method == headers.end() || host == headers.end() ||
166 path == headers.end() || scheme == headers.end()) {
167 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: A mandatory header is "
168 << "missing. Not creating stream";
169 return 0;
171 host_string = host->second;
172 path_string = path->second;
173 version_string = "HTTP/1.1";
176 if (scheme->second.compare("https") == 0) {
177 *is_https_scheme = true;
180 if (acceptor_->flip_handler_type_ == FLIP_HANDLER_SPDY_SERVER) {
181 VLOG(1) << ACCEPTOR_CLIENT_IDENT << "Request: " << method->second
182 << " " << path_string;
183 std::string filename = EncodeURL(path_string,
184 host_string,
185 method->second);
186 NewStream(stream_id, priority, filename);
187 } else {
188 http_data +=
189 method->second + " " + path_string + " " + version_string + "\r\n";
190 VLOG(1) << ACCEPTOR_CLIENT_IDENT << "Request: " << method->second << " "
191 << path_string << " " << version_string;
192 http_data += "Host: " + (*is_https_scheme ?
193 acceptor_->https_server_ip_ :
194 acceptor_->http_server_ip_) + "\r\n";
195 for (SpdyHeaderBlock::const_iterator i = headers.begin();
196 i != headers.end(); ++i) {
197 if ((i->first.size() > 0 && i->first[0] == ':') ||
198 i->first == "host" ||
199 i == method ||
200 i == host ||
201 i == path ||
202 i == scheme ||
203 i == version ||
204 i == url) {
205 // Ignore the entry.
206 } else {
207 http_data += i->first + ": " + i->second + "\r\n";
208 VLOG(2) << ACCEPTOR_CLIENT_IDENT << i->first.c_str() << ":"
209 << i->second.c_str();
212 if (forward_ip_header_.length()) {
213 // X-Client-Cluster-IP header
214 http_data += forward_ip_header_ + ": " +
215 connection_->client_ip() + "\r\n";
217 http_data += "\r\n";
220 VLOG(3) << ACCEPTOR_CLIENT_IDENT << "SpdySM: HTTP Request:\n" << http_data;
221 return 1;
224 void SpdySM::OnStreamFrameData(SpdyStreamId stream_id,
225 const char* data,
226 size_t len,
227 bool fin) {
228 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: StreamData(" << stream_id
229 << ", [" << len << "])";
230 StreamToSmif::iterator it = stream_to_smif_.find(stream_id);
231 if (it == stream_to_smif_.end()) {
232 VLOG(2) << "Dropping frame from unknown stream " << stream_id;
233 if (!valid_spdy_session_)
234 close_on_error_ = true;
235 return;
238 SMInterface* interface = it->second;
239 if (acceptor_->flip_handler_type_ == FLIP_HANDLER_PROXY)
240 interface->ProcessWriteInput(data, len);
243 void SpdySM::OnStreamPadding(SpdyStreamId stream_id, size_t len) {
244 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: StreamPadding(" << stream_id
245 << ", [" << len << "])";
248 void SpdySM::OnSynStream(SpdyStreamId stream_id,
249 SpdyStreamId associated_stream_id,
250 SpdyPriority priority,
251 bool fin,
252 bool unidirectional,
253 const SpdyHeaderBlock& headers) {
254 std::string http_data;
255 bool is_https_scheme;
256 int ret = SpdyHandleNewStream(
257 stream_id, priority, headers, http_data, &is_https_scheme);
258 if (!ret) {
259 LOG(ERROR) << "SpdySM: Could not convert spdy into http.";
260 return;
262 // We've seen a valid looking SYN_STREAM, consider this to have
263 // been a real spdy session.
264 valid_spdy_session_ = true;
266 if (acceptor_->flip_handler_type_ == FLIP_HANDLER_PROXY) {
267 std::string server_ip;
268 std::string server_port;
269 if (is_https_scheme) {
270 server_ip = acceptor_->https_server_ip_;
271 server_port = acceptor_->https_server_port_;
272 } else {
273 server_ip = acceptor_->http_server_ip_;
274 server_port = acceptor_->http_server_port_;
276 SMInterface* sm_http_interface =
277 FindOrMakeNewSMConnectionInterface(server_ip, server_port);
278 stream_to_smif_[stream_id] = sm_http_interface;
279 sm_http_interface->SetStreamID(stream_id);
280 sm_http_interface->ProcessWriteInput(http_data.c_str(), http_data.size());
284 void SpdySM::OnSynReply(SpdyStreamId stream_id,
285 bool fin,
286 const SpdyHeaderBlock& headers) {
287 // TODO(willchan): if there is an error parsing headers, we
288 // should send a RST_STREAM.
289 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: OnSynReply(" << stream_id << ")";
292 void SpdySM::OnHeaders(SpdyStreamId stream_id,
293 bool has_priority,
294 SpdyPriority priority,
295 bool fin,
296 const SpdyHeaderBlock& headers) {
297 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: OnHeaders(" << stream_id << ")";
300 void SpdySM::OnRstStream(SpdyStreamId stream_id, SpdyRstStreamStatus status) {
301 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: OnRstStream(" << stream_id
302 << ")";
303 client_output_ordering_.RemoveStreamId(stream_id);
306 bool SpdySM::OnUnknownFrame(SpdyStreamId stream_id, int frame_type) {
307 return false;
310 size_t SpdySM::ProcessReadInput(const char* data, size_t len) {
311 DCHECK(buffered_spdy_framer_);
312 return buffered_spdy_framer_->ProcessInput(data, len);
315 size_t SpdySM::ProcessWriteInput(const char* data, size_t len) { return 0; }
317 bool SpdySM::MessageFullyRead() const {
318 DCHECK(buffered_spdy_framer_);
319 return buffered_spdy_framer_->MessageFullyRead();
322 bool SpdySM::Error() const {
323 DCHECK(buffered_spdy_framer_);
324 return close_on_error_ || buffered_spdy_framer_->HasError();
327 const char* SpdySM::ErrorAsString() const {
328 DCHECK(Error());
329 DCHECK(buffered_spdy_framer_);
330 return SpdyFramer::ErrorCodeToString(buffered_spdy_framer_->error_code());
333 void SpdySM::ResetForNewInterface(int32 server_idx) {
334 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: Reset for new interface: "
335 << "server_idx: " << server_idx;
336 unused_server_interface_list.push_back(server_idx);
339 void SpdySM::ResetForNewConnection() {
340 // seq_num is not cleared, intentionally.
341 buffered_spdy_framer_.reset();
342 valid_spdy_session_ = false;
343 client_output_ordering_.Reset();
344 next_outgoing_stream_id_ = 2;
347 // Send a settings frame
348 int SpdySM::PostAcceptHook() {
349 // We should have buffered_spdy_framer_ set after reuse
350 DCHECK(buffered_spdy_framer_);
351 SettingsMap settings;
352 settings[SETTINGS_MAX_CONCURRENT_STREAMS] =
353 SettingsFlagsAndValue(SETTINGS_FLAG_NONE, 100);
354 SpdyFrame* settings_frame = buffered_spdy_framer_->CreateSettings(settings);
356 VLOG(1) << ACCEPTOR_CLIENT_IDENT << "Sending Settings Frame";
357 EnqueueDataFrame(new SpdyFrameDataFrame(settings_frame));
358 return 1;
361 void SpdySM::NewStream(uint32 stream_id,
362 uint32 priority,
363 const std::string& filename) {
364 MemCacheIter mci;
365 mci.stream_id = stream_id;
366 mci.priority = priority;
367 // TODO(yhirano): The program will crash when
368 // acceptor_->flip_handler_type_ != FLIP_HANDLER_SPDY_SERVER.
369 // It should be fixed or an assertion should be placed.
370 if (acceptor_->flip_handler_type_ == FLIP_HANDLER_SPDY_SERVER) {
371 if (!memory_cache_->AssignFileData(filename, &mci)) {
372 // error creating new stream.
373 VLOG(1) << ACCEPTOR_CLIENT_IDENT << "Sending ErrorNotFound";
374 SendErrorNotFound(stream_id);
375 } else {
376 AddToOutputOrder(mci);
378 } else {
379 AddToOutputOrder(mci);
383 void SpdySM::AddToOutputOrder(const MemCacheIter& mci) {
384 client_output_ordering_.AddToOutputOrder(mci);
387 void SpdySM::SendEOF(uint32 stream_id) { SendEOFImpl(stream_id); }
389 void SpdySM::SendErrorNotFound(uint32 stream_id) {
390 SendErrorNotFoundImpl(stream_id);
393 size_t SpdySM::SendSynStream(uint32 stream_id, const BalsaHeaders& headers) {
394 return SendSynStreamImpl(stream_id, headers);
397 size_t SpdySM::SendSynReply(uint32 stream_id, const BalsaHeaders& headers) {
398 return SendSynReplyImpl(stream_id, headers);
401 void SpdySM::SendDataFrame(uint32 stream_id,
402 const char* data,
403 int64 len,
404 uint32 flags,
405 bool compress) {
406 SpdyDataFlags spdy_flags = static_cast<SpdyDataFlags>(flags);
407 SendDataFrameImpl(stream_id, data, len, spdy_flags, compress);
410 void SpdySM::SendEOFImpl(uint32 stream_id) {
411 SendDataFrame(stream_id, NULL, 0, DATA_FLAG_FIN, false);
412 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: Sending EOF: " << stream_id;
413 KillStream(stream_id);
414 stream_to_smif_.erase(stream_id);
417 void SpdySM::SendErrorNotFoundImpl(uint32 stream_id) {
418 BalsaHeaders my_headers;
419 my_headers.SetFirstlineFromStringPieces("HTTP/1.1", "404", "Not Found");
420 SendSynReplyImpl(stream_id, my_headers);
421 SendDataFrame(stream_id, "wtf?", 4, DATA_FLAG_FIN, false);
422 client_output_ordering_.RemoveStreamId(stream_id);
425 void SpdySM::KillStream(uint32 stream_id) {
426 client_output_ordering_.RemoveStreamId(stream_id);
429 void SpdySM::CopyHeaders(SpdyHeaderBlock& dest, const BalsaHeaders& headers) {
430 for (BalsaHeaders::const_header_lines_iterator hi =
431 headers.header_lines_begin();
432 hi != headers.header_lines_end();
433 ++hi) {
434 // It is illegal to send SPDY headers with empty value or header
435 // names.
436 if (!hi->first.length() || !hi->second.length())
437 continue;
439 // Key must be all lower case in SPDY headers.
440 std::string key = hi->first.as_string();
441 std::transform(key.begin(), key.end(), key.begin(), ::tolower);
442 SpdyHeaderBlock::iterator fhi = dest.find(key);
443 if (fhi == dest.end()) {
444 dest[key] = hi->second.as_string();
445 } else {
446 dest[key] = (std::string(fhi->second.data(), fhi->second.size()) + "\0" +
447 std::string(hi->second.data(), hi->second.size()));
451 // These headers have no value
452 dest.erase("X-Associated-Content"); // TODO(mbelshe): case-sensitive
453 dest.erase("X-Original-Url"); // TODO(mbelshe): case-sensitive
456 size_t SpdySM::SendSynStreamImpl(uint32 stream_id,
457 const BalsaHeaders& headers) {
458 SpdyHeaderBlock block;
459 CopyHeaders(block, headers);
460 if (spdy_version() == SPDY2) {
461 block["method"] = headers.request_method().as_string();
462 if (!headers.HasHeader("version"))
463 block["version"] = headers.request_version().as_string();
464 if (headers.HasHeader("X-Original-Url")) {
465 std::string original_url =
466 headers.GetHeader("X-Original-Url").as_string();
467 block["url"] = UrlUtilities::GetUrlPath(original_url);
468 } else {
469 block["url"] = headers.request_uri().as_string();
471 } else {
472 block[":method"] = headers.request_method().as_string();
473 block[":version"] = headers.request_version().as_string();
474 if (headers.HasHeader("X-Original-Url")) {
475 std::string original_url =
476 headers.GetHeader("X-Original-Url").as_string();
477 block[":path"] = UrlUtilities::GetUrlPath(original_url);
478 block[":host"] = UrlUtilities::GetUrlPath(original_url);
479 } else {
480 block[":path"] = headers.request_uri().as_string();
481 if (block.find("host") != block.end()) {
482 block[":host"] = headers.GetHeader("Host").as_string();
483 block.erase("host");
488 DCHECK(buffered_spdy_framer_);
489 SpdyFrame* fsrcf = buffered_spdy_framer_->CreateSynStream(
490 stream_id, 0, 0, CONTROL_FLAG_NONE, &block);
491 size_t df_size = fsrcf->size();
492 EnqueueDataFrame(new SpdyFrameDataFrame(fsrcf));
494 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: Sending SynStreamheader "
495 << stream_id;
496 return df_size;
499 size_t SpdySM::SendSynReplyImpl(uint32 stream_id, const BalsaHeaders& headers) {
500 SpdyHeaderBlock block;
501 CopyHeaders(block, headers);
502 if (spdy_version() == SPDY2) {
503 block["status"] = headers.response_code().as_string() + " " +
504 headers.response_reason_phrase().as_string();
505 block["version"] = headers.response_version().as_string();
506 } else {
507 block[":status"] = headers.response_code().as_string() + " " +
508 headers.response_reason_phrase().as_string();
509 block[":version"] = headers.response_version().as_string();
512 DCHECK(buffered_spdy_framer_);
513 SpdyFrame* fsrcf = buffered_spdy_framer_->CreateSynReply(
514 stream_id, CONTROL_FLAG_NONE, &block);
515 size_t df_size = fsrcf->size();
516 EnqueueDataFrame(new SpdyFrameDataFrame(fsrcf));
518 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: Sending SynReplyheader "
519 << stream_id;
520 return df_size;
523 void SpdySM::SendDataFrameImpl(uint32 stream_id,
524 const char* data,
525 int64 len,
526 SpdyDataFlags flags,
527 bool compress) {
528 DCHECK(buffered_spdy_framer_);
529 // TODO(mbelshe): We can't compress here - before going into the
530 // priority queue. Compression needs to be done
531 // with late binding.
532 if (len == 0) {
533 SpdyFrame* fdf =
534 buffered_spdy_framer_->CreateDataFrame(stream_id, data, len, flags);
535 EnqueueDataFrame(new SpdyFrameDataFrame(fdf));
536 return;
539 // Chop data frames into chunks so that one stream can't monopolize the
540 // output channel.
541 while (len > 0) {
542 int64 size = std::min(len, static_cast<int64>(kSpdySegmentSize));
543 SpdyDataFlags chunk_flags = flags;
545 // If we chunked this block, and the FIN flag was set, there is more
546 // data coming. So, remove the flag.
547 if ((size < len) && (flags & DATA_FLAG_FIN))
548 chunk_flags = static_cast<SpdyDataFlags>(chunk_flags & ~DATA_FLAG_FIN);
550 SpdyFrame* fdf = buffered_spdy_framer_->CreateDataFrame(
551 stream_id, data, size, chunk_flags);
552 EnqueueDataFrame(new SpdyFrameDataFrame(fdf));
554 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: Sending data frame "
555 << stream_id << " [" << size << "] shrunk to "
556 << (fdf->size() - kSpdyOverhead) << ", flags=" << flags;
558 data += size;
559 len -= size;
563 void SpdySM::EnqueueDataFrame(DataFrame* df) {
564 connection_->EnqueueDataFrame(df);
567 void SpdySM::GetOutput() {
568 while (client_output_list_->size() < 2) {
569 MemCacheIter* mci = client_output_ordering_.GetIter();
570 if (mci == NULL) {
571 VLOG(2) << ACCEPTOR_CLIENT_IDENT
572 << "SpdySM: GetOutput: nothing to output!?";
573 return;
575 if (!mci->transformed_header) {
576 mci->transformed_header = true;
577 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: GetOutput transformed "
578 << "header stream_id: [" << mci->stream_id << "]";
579 if ((mci->stream_id % 2) == 0) {
580 // this is a server initiated stream.
581 // Ideally, we'd do a 'syn-push' here, instead of a syn-reply.
582 BalsaHeaders headers;
583 headers.CopyFrom(*(mci->file_data->headers()));
584 headers.ReplaceOrAppendHeader("status", "200");
585 headers.ReplaceOrAppendHeader("version", "http/1.1");
586 headers.SetRequestFirstlineFromStringPieces(
587 "PUSH", mci->file_data->filename(), "");
588 mci->bytes_sent = SendSynStream(mci->stream_id, headers);
589 } else {
590 BalsaHeaders headers;
591 headers.CopyFrom(*(mci->file_data->headers()));
592 mci->bytes_sent = SendSynReply(mci->stream_id, headers);
594 return;
596 if (mci->body_bytes_consumed >= mci->file_data->body().size()) {
597 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: GetOutput "
598 << "remove_stream_id: [" << mci->stream_id << "]";
599 SendEOF(mci->stream_id);
600 return;
602 size_t num_to_write =
603 mci->file_data->body().size() - mci->body_bytes_consumed;
604 if (num_to_write > mci->max_segment_size)
605 num_to_write = mci->max_segment_size;
607 bool should_compress = false;
608 if (!mci->file_data->headers()->HasHeader("content-encoding")) {
609 if (mci->file_data->headers()->HasHeader("content-type")) {
610 std::string content_type =
611 mci->file_data->headers()->GetHeader("content-type").as_string();
612 if (content_type.find("image") == content_type.npos)
613 should_compress = true;
617 SendDataFrame(mci->stream_id,
618 mci->file_data->body().data() + mci->body_bytes_consumed,
619 num_to_write,
621 should_compress);
622 VLOG(2) << ACCEPTOR_CLIENT_IDENT << "SpdySM: GetOutput SendDataFrame["
623 << mci->stream_id << "]: " << num_to_write;
624 mci->body_bytes_consumed += num_to_write;
625 mci->bytes_sent += num_to_write;
629 void SpdySM::CreateFramer(SpdyMajorVersion spdy_version) {
630 DCHECK(!buffered_spdy_framer_);
631 buffered_spdy_framer_.reset(new BufferedSpdyFramer(spdy_version, true));
632 buffered_spdy_framer_->set_visitor(this);
635 } // namespace net