Cast: Stop logging kVideoFrameSentToEncoder and rename a couple events.
[chromium-blink-merge.git] / net / proxy / proxy_service.h
blob36b4589f55be4a6ed0d21a899e6745596c5a2272
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef NET_PROXY_PROXY_SERVICE_H_
6 #define NET_PROXY_PROXY_SERVICE_H_
8 #include <string>
9 #include <vector>
11 #include "base/gtest_prod_util.h"
12 #include "base/memory/ref_counted.h"
13 #include "base/memory/scoped_ptr.h"
14 #include "base/synchronization/waitable_event.h"
15 #include "base/threading/non_thread_safe.h"
16 #include "net/base/completion_callback.h"
17 #include "net/base/load_states.h"
18 #include "net/base/net_export.h"
19 #include "net/base/net_log.h"
20 #include "net/base/network_change_notifier.h"
21 #include "net/proxy/proxy_config_service.h"
22 #include "net/proxy/proxy_info.h"
23 #include "net/proxy/proxy_server.h"
25 class GURL;
27 namespace base {
28 class MessageLoop;
29 class SingleThreadTaskRunner;
30 class TimeDelta;
31 } // namespace base
33 namespace net {
35 class DhcpProxyScriptFetcher;
36 class HostResolver;
37 class NetworkDelegate;
38 class ProxyResolver;
39 class ProxyResolverScriptData;
40 class ProxyScriptDecider;
41 class ProxyScriptFetcher;
43 // This class can be used to resolve the proxy server to use when loading a
44 // HTTP(S) URL. It uses the given ProxyResolver to handle the actual proxy
45 // resolution. See ProxyResolverV8 for example.
46 class NET_EXPORT ProxyService : public NetworkChangeNotifier::IPAddressObserver,
47 public NetworkChangeNotifier::DNSObserver,
48 public ProxyConfigService::Observer,
49 NON_EXPORTED_BASE(public base::NonThreadSafe) {
50 public:
51 static const size_t kDefaultNumPacThreads = 4;
53 // This interface defines the set of policies for when to poll the PAC
54 // script for changes.
56 // The polling policy decides what the next poll delay should be in
57 // milliseconds. It also decides how to wait for this delay -- either
58 // by starting a timer to do the poll at exactly |next_delay_ms|
59 // (MODE_USE_TIMER) or by waiting for the first network request issued after
60 // |next_delay_ms| (MODE_START_AFTER_ACTIVITY).
62 // The timer method is more precise and guarantees that polling happens when
63 // it was requested. However it has the disadvantage of causing spurious CPU
64 // and network activity. It is a reasonable choice to use for short poll
65 // intervals which only happen a couple times.
67 // However for repeated timers this will prevent the browser from going
68 // idle. MODE_START_AFTER_ACTIVITY solves this problem by only polling in
69 // direct response to network activity. The drawback to
70 // MODE_START_AFTER_ACTIVITY is since the poll is initiated only after the
71 // request is received, the first couple requests initiated after a long
72 // period of inactivity will likely see a stale version of the PAC script
73 // until the background polling gets a chance to update things.
74 class NET_EXPORT_PRIVATE PacPollPolicy {
75 public:
76 enum Mode {
77 MODE_USE_TIMER,
78 MODE_START_AFTER_ACTIVITY,
81 virtual ~PacPollPolicy() {}
83 // Decides the next poll delay. |current_delay| is the delay used
84 // by the preceding poll, or a negative TimeDelta value if determining
85 // the delay for the initial poll. |initial_error| is the network error
86 // code that the last PAC fetch (or WPAD initialization) failed with,
87 // or OK if it completed successfully. Implementations must set
88 // |next_delay| to a non-negative value.
89 virtual Mode GetNextDelay(int initial_error,
90 base::TimeDelta current_delay,
91 base::TimeDelta* next_delay) const = 0;
94 // The instance takes ownership of |config_service| and |resolver|.
95 // |net_log| is a possibly NULL destination to send log events to. It must
96 // remain alive for the lifetime of this ProxyService.
97 ProxyService(ProxyConfigService* config_service,
98 ProxyResolver* resolver,
99 NetLog* net_log);
101 virtual ~ProxyService();
103 // Used internally to handle PAC queries.
104 // TODO(eroman): consider naming this simply "Request".
105 class PacRequest;
107 // Returns ERR_IO_PENDING if the proxy information could not be provided
108 // synchronously, to indicate that the result will be available when the
109 // callback is run. The callback is run on the thread that calls
110 // ResolveProxy.
112 // The caller is responsible for ensuring that |results| and |callback|
113 // remain valid until the callback is run or until |pac_request| is cancelled
114 // via CancelPacRequest. |pac_request| is only valid while the completion
115 // callback is still pending. NULL can be passed for |pac_request| if
116 // the caller will not need to cancel the request.
118 // We use the three possible proxy access types in the following order,
119 // doing fallback if one doesn't work. See "pac_script_decider.h"
120 // for the specifics.
121 // 1. WPAD auto-detection
122 // 2. PAC URL
123 // 3. named proxy
125 // Profiling information for the request is saved to |net_log| if non-NULL.
126 int ResolveProxy(const GURL& url,
127 ProxyInfo* results,
128 const net::CompletionCallback& callback,
129 PacRequest** pac_request,
130 const BoundNetLog& net_log);
132 // This method is called after a failure to connect or resolve a host name.
133 // It gives the proxy service an opportunity to reconsider the proxy to use.
134 // The |results| parameter contains the results returned by an earlier call
135 // to ResolveProxy. The semantics of this call are otherwise similar to
136 // ResolveProxy.
138 // NULL can be passed for |pac_request| if the caller will not need to
139 // cancel the request.
141 // Returns ERR_FAILED if there is not another proxy config to try.
143 // Profiling information for the request is saved to |net_log| if non-NULL.
144 int ReconsiderProxyAfterError(const GURL& url,
145 ProxyInfo* results,
146 const CompletionCallback& callback,
147 PacRequest** pac_request,
148 const BoundNetLog& net_log);
150 // Explicitly trigger proxy fallback for the given |results| by updating our
151 // list of bad proxies to include the first entry of |results|, and,
152 // optionally, another bad proxy. Will retry after |retry_delay| if positive,
153 // and will use the default proxy retry duration otherwise. Proxies marked as
154 // bad will not be retried until |retry_delay| has passed. Returns true if
155 // there will be at least one proxy remaining in the list after fallback and
156 // false otherwise.
157 bool MarkProxiesAsBadUntil(const ProxyInfo& results,
158 base::TimeDelta retry_delay,
159 const ProxyServer& another_bad_proxy,
160 const BoundNetLog& net_log);
162 // Called to report that the last proxy connection succeeded. If |proxy_info|
163 // has a non empty proxy_retry_info map, the proxies that have been tried (and
164 // failed) for this request will be marked as bad.
165 void ReportSuccess(const ProxyInfo& proxy_info);
167 // Call this method with a non-null |pac_request| to cancel the PAC request.
168 void CancelPacRequest(PacRequest* pac_request);
170 // Returns the LoadState for this |pac_request| which must be non-NULL.
171 LoadState GetLoadState(const PacRequest* pac_request) const;
173 // Sets the ProxyScriptFetcher and DhcpProxyScriptFetcher dependencies. This
174 // is needed if the ProxyResolver is of type ProxyResolverWithoutFetch.
175 // ProxyService takes ownership of both objects.
176 void SetProxyScriptFetchers(
177 ProxyScriptFetcher* proxy_script_fetcher,
178 DhcpProxyScriptFetcher* dhcp_proxy_script_fetcher);
179 ProxyScriptFetcher* GetProxyScriptFetcher() const;
181 // Tells this ProxyService to start using a new ProxyConfigService to
182 // retrieve its ProxyConfig from. The new ProxyConfigService will immediately
183 // be queried for new config info which will be used for all subsequent
184 // ResolveProxy calls. ProxyService takes ownership of
185 // |new_proxy_config_service|.
186 void ResetConfigService(ProxyConfigService* new_proxy_config_service);
188 // Returns the last configuration fetched from ProxyConfigService.
189 const ProxyConfig& fetched_config() {
190 return fetched_config_;
193 // Returns the current configuration being used by ProxyConfigService.
194 const ProxyConfig& config() {
195 return config_;
198 // Returns the map of proxies which have been marked as "bad".
199 const ProxyRetryInfoMap& proxy_retry_info() const {
200 return proxy_retry_info_;
203 // Clears the list of bad proxy servers that has been cached.
204 void ClearBadProxiesCache() {
205 proxy_retry_info_.clear();
208 // Forces refetching the proxy configuration, and applying it.
209 // This re-does everything from fetching the system configuration,
210 // to downloading and testing the PAC files.
211 void ForceReloadProxyConfig();
213 // Same as CreateProxyServiceUsingV8ProxyResolver, except it uses system
214 // libraries for evaluating the PAC script if available, otherwise skips
215 // proxy autoconfig.
216 static ProxyService* CreateUsingSystemProxyResolver(
217 ProxyConfigService* proxy_config_service,
218 size_t num_pac_threads,
219 NetLog* net_log);
221 // Creates a ProxyService without support for proxy autoconfig.
222 static ProxyService* CreateWithoutProxyResolver(
223 ProxyConfigService* proxy_config_service,
224 NetLog* net_log);
226 // Convenience methods that creates a proxy service using the
227 // specified fixed settings.
228 static ProxyService* CreateFixed(const ProxyConfig& pc);
229 static ProxyService* CreateFixed(const std::string& proxy);
231 // Creates a proxy service that uses a DIRECT connection for all requests.
232 static ProxyService* CreateDirect();
233 // |net_log|'s lifetime must exceed ProxyService.
234 static ProxyService* CreateDirectWithNetLog(NetLog* net_log);
236 // This method is used by tests to create a ProxyService that returns a
237 // hardcoded proxy fallback list (|pac_string|) for every URL.
239 // |pac_string| is a list of proxy servers, in the format that a PAC script
240 // would return it. For example, "PROXY foobar:99; SOCKS fml:2; DIRECT"
241 static ProxyService* CreateFixedFromPacResult(const std::string& pac_string);
243 // Creates a config service appropriate for this platform that fetches the
244 // system proxy settings.
245 static ProxyConfigService* CreateSystemProxyConfigService(
246 base::SingleThreadTaskRunner* io_thread_task_runner,
247 base::MessageLoop* file_loop);
249 // This method should only be used by unit tests.
250 void set_stall_proxy_auto_config_delay(base::TimeDelta delay) {
251 stall_proxy_auto_config_delay_ = delay;
254 // This method should only be used by unit tests. Returns the previously
255 // active policy.
256 static const PacPollPolicy* set_pac_script_poll_policy(
257 const PacPollPolicy* policy);
259 // This method should only be used by unit tests. Creates an instance
260 // of the default internal PacPollPolicy used by ProxyService.
261 static scoped_ptr<PacPollPolicy> CreateDefaultPacPollPolicy();
263 void set_quick_check_enabled(bool value) {
264 quick_check_enabled_ = value;
267 bool quick_check_enabled() const { return quick_check_enabled_; }
269 #if defined(SPDY_PROXY_AUTH_ORIGIN)
270 // Values of the UMA DataReductionProxy.BypassInfo{Primary|Fallback}
271 // histograms. This enum must remain synchronized with the enum of the same
272 // name in metrics/histograms/histograms.xml.
273 enum DataReductionProxyBypassEventType {
274 // Bypass the proxy for less than 30 minutes.
275 SHORT_BYPASS = 0,
277 // Bypass the proxy for 30 minutes or more.
278 LONG_BYPASS,
280 // Bypass the proxy because of an internal server error.
281 INTERNAL_SERVER_ERROR_BYPASS,
283 // Bypass the proxy because of any other error.
284 ERROR_BYPASS,
286 // Bypass the proxy because responses appear not to be coming via it.
287 MISSING_VIA_HEADER,
289 // This must always be last.
290 BYPASS_EVENT_TYPE_MAX
293 // Records a |DataReductionProxyBypassEventType| for either the data reduction
294 // proxy (|is_primary| is true) or the data reduction proxy fallback.
295 void RecordDataReductionProxyBypassInfo(
296 bool is_primary,
297 const ProxyServer& proxy_server,
298 DataReductionProxyBypassEventType bypass_type) const;
299 #endif
301 private:
302 FRIEND_TEST_ALL_PREFIXES(ProxyServiceTest, UpdateConfigAfterFailedAutodetect);
303 FRIEND_TEST_ALL_PREFIXES(ProxyServiceTest, UpdateConfigFromPACToDirect);
304 friend class PacRequest;
305 class InitProxyResolver;
306 class ProxyScriptDeciderPoller;
308 // TODO(eroman): change this to a std::set. Note that this requires updating
309 // some tests in proxy_service_unittest.cc such as:
310 // ProxyServiceTest.InitialPACScriptDownload
311 // which expects requests to finish in the order they were added.
312 typedef std::vector<scoped_refptr<PacRequest> > PendingRequests;
314 enum State {
315 STATE_NONE,
316 STATE_WAITING_FOR_PROXY_CONFIG,
317 STATE_WAITING_FOR_INIT_PROXY_RESOLVER,
318 STATE_READY,
321 // Resets all the variables associated with the current proxy configuration,
322 // and rewinds the current state to |STATE_NONE|. Returns the previous value
323 // of |current_state_|. If |reset_fetched_config| is true then
324 // |fetched_config_| will also be reset, otherwise it will be left as-is.
325 // Resetting it means that we will have to re-fetch the configuration from
326 // the ProxyConfigService later.
327 State ResetProxyConfig(bool reset_fetched_config);
329 // Retrieves the current proxy configuration from the ProxyConfigService, and
330 // starts initializing for it.
331 void ApplyProxyConfigIfAvailable();
333 // Callback for when the proxy resolver has been initialized with a
334 // PAC script.
335 void OnInitProxyResolverComplete(int result);
337 // Returns ERR_IO_PENDING if the request cannot be completed synchronously.
338 // Otherwise it fills |result| with the proxy information for |url|.
339 // Completing synchronously means we don't need to query ProxyResolver.
340 int TryToCompleteSynchronously(const GURL& url, ProxyInfo* result);
342 // Cancels all of the requests sent to the ProxyResolver. These will be
343 // restarted when calling SetReady().
344 void SuspendAllPendingRequests();
346 // Advances the current state to |STATE_READY|, and resumes any pending
347 // requests which had been stalled waiting for initialization to complete.
348 void SetReady();
350 // Returns true if |pending_requests_| contains |req|.
351 bool ContainsPendingRequest(PacRequest* req);
353 // Removes |req| from the list of pending requests.
354 void RemovePendingRequest(PacRequest* req);
356 // Called when proxy resolution has completed (either synchronously or
357 // asynchronously). Handles logging the result, and cleaning out
358 // bad entries from the results list.
359 int DidFinishResolvingProxy(ProxyInfo* result,
360 int result_code,
361 const BoundNetLog& net_log);
363 // Start initialization using |fetched_config_|.
364 void InitializeUsingLastFetchedConfig();
366 // Start the initialization skipping past the "decision" phase.
367 void InitializeUsingDecidedConfig(
368 int decider_result,
369 ProxyResolverScriptData* script_data,
370 const ProxyConfig& effective_config);
372 // NetworkChangeNotifier::IPAddressObserver
373 // When this is called, we re-fetch PAC scripts and re-run WPAD.
374 virtual void OnIPAddressChanged() OVERRIDE;
376 // NetworkChangeNotifier::DNSObserver
377 // We respond as above.
378 virtual void OnDNSChanged() OVERRIDE;
380 // ProxyConfigService::Observer
381 virtual void OnProxyConfigChanged(
382 const ProxyConfig& config,
383 ProxyConfigService::ConfigAvailability availability) OVERRIDE;
385 scoped_ptr<ProxyConfigService> config_service_;
386 scoped_ptr<ProxyResolver> resolver_;
388 // We store the proxy configuration that was last fetched from the
389 // ProxyConfigService, as well as the resulting "effective" configuration.
390 // The effective configuration is what we condense the original fetched
391 // settings to after testing the various automatic settings (auto-detect
392 // and custom PAC url).
393 ProxyConfig fetched_config_;
394 ProxyConfig config_;
396 // Increasing ID to give to the next ProxyConfig that we set.
397 int next_config_id_;
399 // The time when the proxy configuration was last read from the system.
400 base::TimeTicks config_last_update_time_;
402 // Map of the known bad proxies and the information about the retry time.
403 ProxyRetryInfoMap proxy_retry_info_;
405 // Set of pending/inprogress requests.
406 PendingRequests pending_requests_;
408 // The fetcher to use when downloading PAC scripts for the ProxyResolver.
409 // This dependency can be NULL if our ProxyResolver has no need for
410 // external PAC script fetching.
411 scoped_ptr<ProxyScriptFetcher> proxy_script_fetcher_;
413 // The fetcher to use when attempting to download the most appropriate PAC
414 // script configured in DHCP, if any. Can be NULL if the ProxyResolver has
415 // no need for DHCP PAC script fetching.
416 scoped_ptr<DhcpProxyScriptFetcher> dhcp_proxy_script_fetcher_;
418 // Helper to download the PAC script (wpad + custom) and apply fallback rules.
420 // Note that the declaration is important here: |proxy_script_fetcher_| and
421 // |proxy_resolver_| must outlive |init_proxy_resolver_|.
422 scoped_ptr<InitProxyResolver> init_proxy_resolver_;
424 // Helper to poll the PAC script for changes.
425 scoped_ptr<ProxyScriptDeciderPoller> script_poller_;
427 State current_state_;
429 // Either OK or an ERR_* value indicating that a permanent error (e.g.
430 // failed to fetch the PAC script) prevents proxy resolution.
431 int permanent_error_;
433 // This is the log where any events generated by |init_proxy_resolver_| are
434 // sent to.
435 NetLog* net_log_;
437 // The earliest time at which we should run any proxy auto-config. (Used to
438 // stall re-configuration following an IP address change).
439 base::TimeTicks stall_proxy_autoconfig_until_;
441 // The amount of time to stall requests following IP address changes.
442 base::TimeDelta stall_proxy_auto_config_delay_;
444 // Whether child ProxyScriptDeciders should use QuickCheck
445 bool quick_check_enabled_;
447 DISALLOW_COPY_AND_ASSIGN(ProxyService);
450 // Wrapper for invoking methods on a ProxyService synchronously.
451 class NET_EXPORT SyncProxyServiceHelper
452 : public base::RefCountedThreadSafe<SyncProxyServiceHelper> {
453 public:
454 SyncProxyServiceHelper(base::MessageLoop* io_message_loop,
455 ProxyService* proxy_service);
457 int ResolveProxy(const GURL& url,
458 ProxyInfo* proxy_info,
459 const BoundNetLog& net_log);
460 int ReconsiderProxyAfterError(const GURL& url,
461 ProxyInfo* proxy_info,
462 const BoundNetLog& net_log);
464 private:
465 friend class base::RefCountedThreadSafe<SyncProxyServiceHelper>;
467 virtual ~SyncProxyServiceHelper();
469 void StartAsyncResolve(const GURL& url, const BoundNetLog& net_log);
470 void StartAsyncReconsider(const GURL& url, const BoundNetLog& net_log);
472 void OnCompletion(int result);
474 base::MessageLoop* io_message_loop_;
475 ProxyService* proxy_service_;
477 base::WaitableEvent event_;
478 CompletionCallback callback_;
479 ProxyInfo proxy_info_;
480 int result_;
483 } // namespace net
485 #endif // NET_PROXY_PROXY_SERVICE_H_